Hackers can exploit Realtek Wi-Fi module bug to gain root access to devices

Realtek has already patched some newer modules

Darkened image of a hacker wearing a hoodie using computing equipment

Security researchers have discovered several flaws in the Realtek RTL8195A Wi-Fi module that could allow cyber criminals to gain remote root access to the Wi-Fi module and ultimately take complete control of the device’s wireless communications.

According to a blog post by Israeli cyber security firm Vdoo, the module is a compact, low-power Wi-Fi module targeted at embedded-device users in the agriculture, automotive, energy, smart home, health care, gaming, and security industries.

The module uses Realtek’s "Ameba" API that allows developers to communicate via Wi-Fi, HTTP, mDNS, MQTT, and more.

While researchers verified the issues in only the RTL8195A module, they said the problems could extend to other modules, including the RTL8711AM, RTL8711AF, and RTL8710AF.

The most severe of the six flaws researchers found is a remote stack overflow that allows an attacker near an RTL8195 module to take it over. The attacker wouldn’t need the Wi-Fi network password (PSK), and it wouldn’t matter if the module is acting as a Wi-Fi access point or client. 

Attackers can also exploit two other flaws without knowing the PSK, and three other flaws require the network’s PSK as a prerequisite for the attack.

Researchers said any version of the module built after April 21, 2020  are not affected by the vulnerabilities, while modules built after March 3, 2020 are protected from the most severe stack overflow exploit but are still vulnerable to all other flaws and will need patching. 

Users can download an updated version of the Ameba SDK from Realtek’s website to patch systems. If users can’t update the device’s firmware, researchers advised using a strong, private WPA2 passphrase to prevent exploitation.

Stephen Kapp, CTO and founder of Cortex Insight, told ITPro that depending on the device function, there could be hundreds of devices, if not more, running vulnerable hardware modules.

“As a result, it is good practice to treat IoT devices as insecure by default and build controls around them to minimize risk.  In this case, for example, it is difficult to know what devices have the vulnerable Realtek Wi-Fi module within them,” Kapp said. 

Kapp said it could be impossible for end users to know if they need to update their device, making it the vendor’s responsibility to release an update that installs the patched firmware on the device. 

“It looks like the most serious of the vulnerabilities released in the Realtek 8195A module do not require knowledge of the Wi-Fi password to exploit and thus use affected devices to gain access to networks containing the device. Therefore, if possible, it is recommended to install any available firmware updates and ensure network-level controls are in place to minimize the risk of the device being used as a stepping-stone into a wider environment,” added Kapp.

Most Popular

The benefits of workload optimisation

The benefits of workload optimisation

16 Jul 2021
Samsung Galaxy S21 5G review: A rose-tinted experience
Mobile Phones

Samsung Galaxy S21 5G review: A rose-tinted experience

14 Jul 2021
Google Cloud beefs up security following surge in ransomware attacks
cloud security

Google Cloud beefs up security following surge in ransomware attacks

21 Jul 2021