European company uncovers Huawei vulnerabilities
Swascan uncovers Huawei 's
vulnerabilities
Swascan,
The Cyber Security Firm that thanks to its Research Team had already been able to unravel the vulnerabilities of Adobe, Microsoft and Lenovo recently brought to light some critical issues of Huawei’s web applications, the giant specialized in the production of systems and solutions for networks and telecommunications.
Swascan, the Italian Cyber Security company founded by Raoul Chiesa and Pierguido Iezzi, is the first cloud-based Cybersecurity Testing platform that allows to identify, analyze and solve the vulnerabilities of websites and information infrastructure.
Analysis and remediation
Through careful work, Swascan experts have identified a number of critical issues within Huawei’s infrastructure and web applications. The resulting Responsible Vulnerability Disclosure revealed a few vulnerabilities ranked as critical that, if exploited by Malicious Attackers or Cybercriminals, could have impacted business continuity, user’s data and information security and the regular operation of their services.
The Collaboration with Huawei
Following this discovery, Team Swascan contacted their Huawei counterparts to inform them of the vulnerabilities found and to set up a collaboration for the remediation activities needed for these flaws. Speaking on the need of collaboration Pierguido Iezzi, Co-Founder of Swascan said: "In the world of Cyber security the principle of collaboration is finally establishing itself. The risks increase by a huge margin every year and this has mandated a cultural as well as technological Paradigm Shift. Our experience with Huawei shows that if these values are correctly understood they can be an additional backbone to create an effective and efficient Cyber Security Framework".
The Vulnerabilities in detail
The high-level criticalities discovered were going to impact aspects of
Swascan Team
www.swascan.com
info@swascan.com
Discover more about Swascan
The Cyber Security Firm that thanks to its Research Team had already been able to unravel the vulnerabilities of Adobe, Microsoft and Lenovo recently brought to light some critical issues of Huawei’s web applications, the giant specialized in the production of systems and solutions for networks and telecommunications.
Swascan, the Italian Cyber Security company founded by Raoul Chiesa and Pierguido Iezzi, is the first cloud-based Cybersecurity Testing platform that allows to identify, analyze and solve the vulnerabilities of websites and information infrastructure.
Analysis and remediation
Through careful work, Swascan experts have identified a number of critical issues within Huawei’s infrastructure and web applications. The resulting Responsible Vulnerability Disclosure revealed a few vulnerabilities ranked as critical that, if exploited by Malicious Attackers or Cybercriminals, could have impacted business continuity, user’s data and information security and the regular operation of their services.
The Collaboration with Huawei
Following this discovery, Team Swascan contacted their Huawei counterparts to inform them of the vulnerabilities found and to set up a collaboration for the remediation activities needed for these flaws. Speaking on the need of collaboration Pierguido Iezzi, Co-Founder of Swascan said: "In the world of Cyber security the principle of collaboration is finally establishing itself. The risks increase by a huge margin every year and this has mandated a cultural as well as technological Paradigm Shift. Our experience with Huawei shows that if these values are correctly understood they can be an additional backbone to create an effective and efficient Cyber Security Framework".
The Vulnerabilities in detail
The high-level criticalities discovered were going to impact aspects of
- Confidentiality;
- Integrity;
- Availability.
In detail, the vulnerabilities belonged to the following CWE categories:
CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer):
The software performs operations on a memory buffer, but it can read from or write to a memory location
that is outside of the intended boundary of the buffer. If the memory accessible by the attacker can
be effectively controlled, it may be possible to execute arbitrary code, as with a standard buffer
overflow. If the attacker can overwrite a pointer's worth of memory (usually 32 or 64 bits), they can
redirect a function pointer to their own malicious code. Even when the attacker can only modify a
single byte arbitrary code execution can be possible. Sometimes this is because the same problem can
be exploited repeatedly to the same effect. Other times it is because the attacker can overwrite
security-critical application-specific data - such as a flag indicating whether the user is an
administrator. Out of bounds memory access will very likely result in the corruption of relevant
memory, and perhaps instructions, possibly leading to a crash. Other attacks leading to lack of
availability are possible, including putting the program into an infinite loop. In the case of out-of-bounds read, the attacker may have access to sensitive information. If the sensitive information
contains system details, such as the current buffer's position in memory, this knowledge can be used
to craft further attacks, possibly with more severe consequences.
CWE-125 (Out-of-bounds Read):
The software reads data past the end, or before the beginning, of
the intended buffer. Typically, this can allow attackers to read sensitive information from other memory
locations or cause a crash. A crash can occur when the code reads a variable amount of data and
assumes that a sentinel exists to stop the read operation, such as a NUL in a string. The expected
sentinel might not be located in the out-of-bounds memory, causing excessive data to be read,
leading to a segmentation fault or a buffer overflow. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A
subsequent read operation then produces undefined or unexpected results
CWE-78 (OS Command Injection): The software constructs all or part of an OS command using
externally-influenced input from an upstream component, but it does not neutralize or incorrectly
neutralizes special elements that could modify the intended OS command when it is sent to a
downstream component. Attackers could execute unauthorized commands, which could then be used
to disable the software or read and modify data for which the attacker does not have permissions to
access directly. Since the targeted application is directly executing the commands instead of the
attacker, any malicious activities may appear to come from the application or the application's owner.
Synergy for safety
The cooperation between Swascan and Huawei reaffirms what Pierguido Iezzi pointed out:
in order to face the emerging threats of Criminal hackers, double action is necessary:
on the company side, a secure IT infrastructure and a qualified staff are necessary, together
with the skills and tools that only the experts of Cyber Security can give.
Pierguido Iezzi, CyberSecurity Director
Raoul Chiesa, Swascan co-founder, InfoSec addicted.
Swascan Team
www.swascan.com
info@swascan.com
Discover more about Swascan
No comments:
Thanks for leaving a comment, we will surely make effort to reply