Новости компьютерной безопасности:

  Latest News

Researchers Released PoC For Windows Bluetooth Service RCE Vulnerability

С сайта: Vulnerability(cybersecuritynews.com)

Researchers Released PoC For Windows Bluetooth Service RCE Vulnerability

Author: Eswar

Microsoft addressed a Remote code execution vulnerability on their Bluetooth service on March 2023 Patch Tuesday.

This vulnerability could allow an unauthorized threat actor to run a certain function on the Windows Bluetooth driver, which could lead to executing arbitrary code on the vulnerable system.

However, a threat actor must have access to the same network as the victim system before exploiting this vulnerability. This issue was associated with Bluetooth Low Energy (BLE) and advertising to provide a brief insight.

Windows Bluetooth Service RCE Vulnerability
According to the reports shared with Cyber Security News, BLE is used to send large amounts of data in short periods using BLE protocols.

On the other hand, Advertising is used by BLE-compatible devices to broadcast data for different purposes, including allowing scanning devices to detect these compatible devices.

Advertising information that is broadcasted by devices including several information such as name of the device, ID of the manufacturer, type and capabilities of the device and indicators that inform the receiving device on the connection possibilities. 

This transmission of data is done in three steps with the first one being the advertising host setting up advertising parameters among which one of them is the advertising data.

The second step involves a BLE packet containing this advertising data transferred between the controllers. Whereas the third one is the receiving sending a HCI (Host Controller Interface) event containing advertising data to the host. 

Two HCI events, LE Advertising Report and LE Extended Advertising Report, perform the transfer of advertising data to the host.

cyber security news
cyber security newsLE Advertising Report structure (Source: Ynwarcs)
cyber security newsLE Extended Advertising Report structure (Source: Ynwarcs)
Vulnerability Analysis
Windows Bluetooth Stack consists of multiple different drivers, services and user-mode libraries that are quite complex in their architecture.

However, the advertising data with several pieces of information is received by the BLE-compatible device and is parsed in different places. 

cyber security newsWindows Bluetooth Stack (Source: Ynwarcs)
For this, Microsoft has implemented a static library that is linked into the modules.

There are two functions in this library which play a major role in parsing the advertising data which are, BTHLELib_ADValidateEx and BthLeLib_ADValidateBasic.

BTHLELib_ADValidateEx is the function that external modules call for transforming the advertisement data into a more suitable format.

BthLeLib_ADValidateBasic ensures each advertisement section has the correct length and does not extend past the end of the data.

Further, it also counts the total number of sections in the data which BthLELib_ADValidateEx then uses to allocate memory for the array of output sections.

This is where the vulnerability lies which is triggered when a 8-bit unsigned integer having more than 255 sections in the data will result in variable overflow.

This eventually leads to a count value lower than the actual number of sections that will also cause the amount of memory allocated for the sections array lower than expected. 

This will result in out-of-bounds write vulnerability when the data from individual sections is copied into the memory that must belong to the section array.

The execution of this vulnerability with 257 empty section advertisement data is sent to the vulnerable system that will cause the BthLeLib_ADValidateBasic, num_sections to be equal to 1, and the amount of memory allocated for the sections array will be 0x153 bytes.

Further, the 257 iterations will result in a length of the variable larger than the allocated buffer which will be overwritten at offset 0x153 past the end of the memory.

However, this vulnerability was fixed by exiting BthLeLib_ADValidateBasic with an error if *out_num_sections ever reaches 255 on their Patch Tuesday of March 2023.

Further, a proof-of-concept for this vulnerability has also been published on GitHub.

This vulnerability is more likely exploitable by threat actors due to several facts like full control of the advertising data that can be used to control the number of sections in data to make the allocation fall into any heap that they want.

Products affected by this vulnerability includes,

  • Windows Server 2022
  • Windows Server 2022 (Server Core InstallatioN)
  • Windows 10 version 22H2 (ARM, x64)
  • Windows 11 version 21H2 (ARM, x64)
  • Windows 11 version 22H2 (ARM, x64)
  • Windows 10 version 20H2 (ARM)

Users of these Windows products are recommended to upgrade to their latest version to prevent unauthorized exploitation of this vulnerability by threat actors.



#Cyber_Security #Cyber_Security_News #Microsoft #Vulnerability #Bluetooth_Vulnerability #Patch_Tuesday #remote_code_execution #Windows_Security

Оригинальная версия на сайте: Researchers Released PoC For Windows Bluetooth Service RCE Vulnerability
Вернуться к списку новостей К свежим новостям Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.

Вернуться к списку новостей Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.


Новости проекта CSN:

✉ CSN.net4me.net

Обновление сайта csn.net4me.net

Обновление сайта csn.net4me.net 💻
cyber security news
  • Физически мы переехали на новый сервер. Благодарим наших подписчиков и постоянных читателей за терпение и понимание.
  • Сайт csn.net4me.net полностью адаптирован для работы по шифрованному SSL соединению.
  • Изменен механизм обработки и отображения опасных и критических уязвимостей.

Благодарим что вы с нами.


#CSN_обновление_сайта
https://csn.net4me.net/cyber_security_8301.html

Дополнительный материал

О проекте CSN

Проект CSN.net4me.net родился 16 Марта 2018 года.
Проект находится в самом начале своего развития. Конечно оформление, наполнение будет меняться. Одно останется неизменным - самые свежие новости компьютерной и сетевой безопасности.

О проекте net4me

Проект net4me.net развивался как сборник готовых решений и документации по темам компьютерной безопасности, сетевых решений и СПО (в часности linux). Темпы развития IT отрасли оказались столь быстрыми, что некоторые знания, технологии и информация о них устаревали мгновенно. Тем не менее, некоторый материал net4me.net до сих пор востребован.

Об источниках

Новости берутся CSN из открытых и доступных каждому источников. Авторы проекта стараются подбирать авторитетные и проверенные источники. Но, тем не менее, не несут ответственности за содержимое новостей. В каждой новости указывается источник этой новости, её автор и ссылка на оригинал новости.

Информация

Если вы желаете чтобы новости вашего ресурса были размещены на сайте CSN, то свяжитесь с авторами проекта csn@net4me.net и предложите ссылку на rss или xml ленту новостей вашего ресурса. Любая предложенная информация будет рассмотрена редакцией.