17 zero-day vulnerabilities in smart city systems which could debilitate core services . At the Black Hat conference in Las Vegas on Monday , the cybersecurity firm 's X-Force Red team of penetration testers and hackers demonstrated how old-school threats are placing the cities of the future at risk in the present day . Smart city technology spending is predicted to hit $ 80 billion this year and become as high as $ 135 billion by 2021 . Water and filtration systems , smart lighting , traffic controllers , utilities , and more all become intertwined in smart cities , which aim to make urban living more energy efficient , eco-friendly , and manageable . However , connecting all of these critical elements can have devastating effects should something go wrong -- such as a successful cyberattack . We 've already seen the damage which can be caused when threat actors target core country systems , such as in the case of Ukraine 's power grid , and unless security is considered every step of the way , every future city will be placed at similar levels of risk . Together with researchers from Threatcare , IBM X-Force Red discoveredVulnerability-related.DiscoverVulnerabilitythat smart city systems developed by Libelium , Echelon and Battelle were vulnerableVulnerability-related.DiscoverVulnerabilityto attack . Libelium is a wireless sensor network hardware manufacturer , while Echelon specializes in industrial IoT , and non-profit Battelle develops and commercializes related technologies . According to IBM X-Force Red researcher Daniel Crowley , out of the 17 previously-unknown vulnerabilities discoveredVulnerability-related.DiscoverVulnerabilityin systems used in four smart cities , eight are deemed critical in severity . Unfortunately , many of the bugs were due to poor , lax security practices -- such as the use of default passwords , authentication bypass , and SQL injections . In total , the researchers uncoveredVulnerability-related.DiscoverVulnerabilityfour instances of critical pre-authentication shell injection flaws in Libelium 's wireless sensor network , Meshlium .
Home routers are the first and sometimes last line of defense for a network . Despite this fact , many manufacturers of home routers fail to properly audit their devices for security issues before releasing them to the market . As security researchers , we are often disappointed to rediscover that this is not always the case , and that sometimes these vulnerabilities simply fall into our hands during our day-to-day lives . Such is the story of the two NETGEAR vulnerabilities I want to shareVulnerability-related.DiscoverVulnerabilitywith you today : It was a cold and rainy winter night , almost a year ago , when my lovely NETGEAR VEGN2610 modem/router lost connection to the Internet . I was tucked in bed , cozy and warm , there was no way I was going downstairs to reset the modem , `` I will just reboot it through the web panel '' I thought to myself . Unfortunately I could n't remember the password and it was too late at night to check whether my roommates had it . I considered my options : Needless to say , I chose the latter . I thought to myself , `` Well , it has a web interface and I need to bypass the authentication somehow , so the web server is a good start . '' I started manually fuzzing the web server with different parameters , I tried `` .. / .. '' classic directory traversal and such , and after about 1 minute of fuzzing , I tried `` … '' and I got this response : Fig 1 : unauth.cgi `` Hmm , what is that unauth.cgi thingy ? Luckily for me the Internet connection had come back on its own , but I was now a man on a mission , so I started to look around to see if there were any known vulnerabilities for my VEGN2610 . I started looking up what that `` unauth.cgi '' page could be , and I found 2 publicly disclosedVulnerability-related.DiscoverVulnerabilityexploits from 2014 , for different models that manage to do unauthenticated password disclosure . Those two guys found outVulnerability-related.DiscoverVulnerabilitythat the number we get from unauth.cgi can be used with passwordrecovered.cgi to retrieve the credentials . I tested the method described in both , and voila - I have my password , now I can go to sleep happy and satisfied . I woke up the next morning excited by the discovery , I thought to myself : `` 3 routers with same issue… Coincidence ? Luckily , I had another , older NETGEAR router laying around ; I tested it and bam ! I started asking people I knew if they have NETGEAR equipment so I could test further to see the scope of the issue . In order to make life easier for non-technical people I wrote a python script called netgore , similar to wnroast , to test for this issue . I am aware of that and that is why I do n't work as a full time programmer . As it turned out , I had an error in my code where it did n't correctly take the number from unauth.cgi and passed gibberish to passwordrecovered.cgi instead , but somehow it still managed to get the credentials ! After few trials and errors trying to reproduce the issue , I foundVulnerability-related.DiscoverVulnerabilitythat the very first call to passwordrecovered.cgi will give out the credentials no matter what the parameter you send . This is totally new bug that I have n't seen anywhere else . When I tested both bugs on different NETGEAR models , I foundVulnerability-related.DiscoverVulnerabilitythat my second bug works on a much wider range of models . A full description of both of these findings as well as the python script used for testing can be found here . The vulnerabilities have been assignedVulnerability-related.DiscoverVulnerabilityCVE-2017-5521 and TWSL2017-003 . The Responsible Disclosure Process This is where the story of discovery ends and the story of disclosure begins . Following our Responsible Disclosure policy we sent both findingsVulnerability-related.DiscoverVulnerabilityto NETGEAR in the beginning of April 2016 . In our initial contact , the first advisory had 18 models listed as vulnerableVulnerability-related.DiscoverVulnerability, although six of them did n't have the vulnerability in the latest firmware . Perhaps it was fixedVulnerability-related.PatchVulnerabilityas part of a different patch cycle . The second advisory included 25 models , all of which were vulnerableVulnerability-related.DiscoverVulnerabilityin their latest firmware version . In June NETGEAR published a notice that providedVulnerability-related.PatchVulnerabilitya fix for a small subset of vulnerable routers and a workaround for the rest . They also made the commitment to working toward 100 % coverage for all affected routers . The notice has been updated several time since then and currently contains 31 vulnerable models , 18 of which are patchedVulnerability-related.PatchVulnerabilitynow , and 2 models that they previously listed as vulnerableVulnerability-related.DiscoverVulnerability, but are now listed as not vulnerableVulnerability-related.DiscoverVulnerability. In fact , our tests show that one of the models listed as not vulnerableVulnerability-related.DiscoverVulnerability( DGN2200v4 ) is , in fact , vulnerable and this can easily be reproduced with the POC provided in our advisory . Over the past nine months we attempted to contact NETGEAR multiple times for clarification and to allow them time to patchVulnerability-related.PatchVulnerabilitymore models . Over that time we have foundVulnerability-related.DiscoverVulnerabilitymore vulnerable models that were not listed in the initial notice , although they were added later . We also discoveredVulnerability-related.DiscoverVulnerabilitythat the Lenovo R3220 router is powered by NETGEAR firmware and it was vulnerableVulnerability-related.DiscoverVulnerabilityas well . Luckily NETGEAR did eventually get back to us right before we were set to discloseVulnerability-related.DiscoverVulnerabilitythese vulnerabilities publicly . We were a little skeptical since our experience to date matched that of other third-party vulnerability researchers that have tried to responsibly discloseVulnerability-related.DiscoverVulnerabilityto NETGEAR only to be met with frustration . The first was that NETGEAR committed to pushing out firmware to the currently unpatched models on an aggressive timeline . The second change made us more confident that NETGEAR was not just serious about patchingVulnerability-related.PatchVulnerabilitythese vulnerabilities , but serious about changing how they handle third-party disclosure in general . We fully expect this move will not only smooth the relationship between third-party researchers and NETGEAR , but , in the end , will result in a more secure line of products and services . For starters , it affects a large number of models . We have foundVulnerability-related.DiscoverVulnerabilitymore than ten thousand vulnerable devices that are remotely accessible . The real number of affected devices is probably in the hundreds of thousands , if not over a million . The vulnerability can be used by a remote attacker if remote administration is set to be Internet facing .
Simon Kenin , a security researcher at Trustwave , was – by his own admission – being lazy the day he discoveredVulnerability-related.DiscoverVulnerabilityan authentication vulnerability in his Netgear router . Instead of getting up out of bed to address a connection problem , he started fuzzing the web interface and discoveredVulnerability-related.DiscoverVulnerabilitya serious issue . Kenin had hit upon unauth.cgi , code that was previously tied to two different exploits in 2014 for unauthenticated password disclosure flaws . The short version of the 2014 vulnerability is that an attacker can get unauth.cgi to issue a number that can be passed over to passwordrecovered.cgi in order to receive credentials . Kenin tested their exploits and was able to get his password . [ Learn about top security certifications : Who they 're for , what they cost , and which you need . The following day he started gathering other Netgear devices to test . While repeating the process , he made an error , but that did n't prevent him from obtaining credentials . That accidental discoveryVulnerability-related.DiscoverVulnerabilityresulted in CVE-2017-5521 . `` After few trials and errors trying to reproduce the issue , I foundVulnerability-related.DiscoverVulnerabilitythat the very first call to passwordrecovered.cgi will give out the credentials no matter what the parameter you send . This is totally new bug that I haven’t seenVulnerability-related.DiscoverVulnerabilityanywhere else . When I tested both bugs on different NETGEAR models , I foundVulnerability-related.DiscoverVulnerabilitythat my second bug works on a much wider range of models , '' Kenin explained in a recent blog post . There are at least ten thousand devices online that are vulnerableVulnerability-related.DiscoverVulnerabilityto the flaw that Kenin discoveredVulnerability-related.DiscoverVulnerability, but he says the real number could reach the hundreds of thousands , or even millions . `` The vulnerability can be used by a remote attacker if remote administration is set to be Internet facing . However , anyone with physical access to a network with a vulnerable router can exploit it locally . This would include public Wi-Fi spaces like cafés and libraries using vulnerable equipment , '' Kenin wrote . Kenin reached out to Netgear and reported the problems , but it was no easy task . The first advisory listed 18 devices that were vulnerableVulnerability-related.DiscoverVulnerability, followed by a second advisory detailing an additional 25 models . A few months later , in June 2016 , Netgear finally published an advisory that offeredVulnerability-related.PatchVulnerabilitya fix for a small subset of the vulnerable devices , and a workaround for others . Eventually , Netgear reported that they were going to fixVulnerability-related.PatchVulnerabilityall the unpatched models . They also teamed up with Bugcrowd to improve their vulnerability handling process . Netgear has a status page on the vulnerability , they also provide a workaround for those who ca n't update their firmware yet . It was n't until after the story ran that the PR firm representing Trustwave and pitching the research named Simon Kenin as one who made the discoveryVulnerability-related.DiscoverVulnerability. Netgear issued a statement , downplaying the discovery someVulnerability-related.DiscoverVulnerability, and reminding users that fixes are availableVulnerability-related.PatchVulnerabilityfor most of the impacted devices . The emailed comments are reprinted below : NETGEAR is aware of the vulnerability ( CVE-2017-5521 ) , that has been recently publicizedVulnerability-related.DiscoverVulnerabilityby Trustwave . We have been working with the security analysts to evaluate the vulnerability . NETGEAR has publishedVulnerability-related.DiscoverVulnerabilitya knowledge base article from our support page , which lists the affected routers and the available firmware fixVulnerability-related.PatchVulnerability. Firmware fixes are currently availableVulnerability-related.PatchVulnerabilityfor the majority of the affected devices . To download the firmware release that fixesVulnerability-related.PatchVulnerabilitythe password recovery vulnerability , click the link for the model and visit the firmware release page for further instructions .