Hackers can exploit Realtek Wi-Fi module bug to gain root access to devices
Realtek has already patched some newer modules
Security researchers have discovered several flaws in the Realtek RTL8195A Wi-Fi module that could allow cyber criminals to gain remote root access to the Wi-Fi module and ultimately take complete control of the device’s wireless communications.
According to a blog post by Israeli cyber security firm Vdoo, the module is a compact, low-power Wi-Fi module targeted at embedded-device users in the agriculture, automotive, energy, smart home, health care, gaming, and security industries.
The module uses Realtek’s "Ameba" API that allows developers to communicate via Wi-Fi, HTTP, mDNS, MQTT, and more.
While researchers verified the issues in only the RTL8195A module, they said the problems could extend to other modules, including the RTL8711AM, RTL8711AF, and RTL8710AF.
The most severe of the six flaws researchers found is a remote stack overflow that allows an attacker near an RTL8195 module to take it over. The attacker wouldn’t need the Wi-Fi network password (PSK), and it wouldn’t matter if the module is acting as a Wi-Fi access point or client.
Attackers can also exploit two other flaws without knowing the PSK, and three other flaws require the network’s PSK as a prerequisite for the attack.
Researchers said any version of the module built after April 21, 2020 are not affected by the vulnerabilities, while modules built after March 3, 2020 are protected from the most severe stack overflow exploit but are still vulnerable to all other flaws and will need patching.
Users can download an updated version of the Ameba SDK from Realtek’s website to patch systems. If users can’t update the device’s firmware, researchers advised using a strong, private WPA2 passphrase to prevent exploitation.
Stephen Kapp, CTO and founder of Cortex Insight, told ITPro that depending on the device function, there could be hundreds of devices, if not more, running vulnerable hardware modules.
“As a result, it is good practice to treat IoT devices as insecure by default and build controls around them to minimize risk. In this case, for example, it is difficult to know what devices have the vulnerable Realtek Wi-Fi module within them,” Kapp said.
Kapp said it could be impossible for end users to know if they need to update their device, making it the vendor’s responsibility to release an update that installs the patched firmware on the device.
“It looks like the most serious of the vulnerabilities released in the Realtek 8195A module do not require knowledge of the Wi-Fi password to exploit and thus use affected devices to gain access to networks containing the device. Therefore, if possible, it is recommended to install any available firmware updates and ensure network-level controls are in place to minimize the risk of the device being used as a stepping-stone into a wider environment,” added Kapp.
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download