Brian Jackson - Fotolia

News Stay informed about the latest enterprise technology news and product updates.

Router security issues highlighted by CIA's CherryBlossom project

The latest WikiLeaks release on CIA hacking tools includes the CherryBlossom project, which highlights router security issues, including a lack of firmware signing validation.

Leaked information on the CIA's CherryBlossom project details how the agency may have abused router security issues with custom firmware.

WikiLeaks released information regarding CherryBlossom, which was allegedly developed by the CIA in conjunction with the Stanford Research Institute. WikiLeaks claimed the project "focused on compromising wireless networking devices, such as wireless routers and access points" in order to exploit and monitor the internet activity of targets.

"These devices are the ideal spot for man-in-the-middle [MitM] attacks, as they can easily monitor, control and manipulate the internet traffic of connected users. By altering the data stream between the user and Internet services, the infected device can inject malicious content into the stream to exploit vulnerabilities in applications or the operating system on the computer of the targeted user," WikiLeaks wrote in a blog post. "The wireless device itself is compromised by implanting a customized CherryBlossom firmware on it; some devices allow upgrading their firmware over a wireless link, so no physical access to the device is necessary for a successful infection."

Firmware router security issues

Experts noted that the major issue exploited by the CherryBlossom project is that many routers do not validate the digital signature of a firmware update.

Jake Williams, founder of consulting firm Rendition InfoSec LLC in Augusta, Ga., said the bigger story than the CIA's involvement is "how requiring digitally signed firmware will prevent this specific attack."

An important thing to note is that with admin level access (which the CIA needs for this) attackers without CIA level budget can achieve most of the same goals
Jake Williamsfounder, Rendition InfoSec LLC

"It's easy. If the router isn't validating digital signatures on the firmware, it's trivial to load custom malicious firmware," Williams told SearchSecurity. "Most routers don't validate signatures. You need enterprise-grade before most of them do it."

However, Bobby Kuzma, security researcher for Core Security, noted that there may be router security issues with enterprise-grade devices not enforcing firmware signing.

"On the enterprise side, the big router manufacturers have offered validation of signed firmware for quite some time. The problem is that it's not enabled by default for the most part, and it requires that a network admin actually go and do something," Kuzma told SearchSecurity. "Both the Cisco and Juniper tools rely on MD5 hashes. MD5 is broken as a hashing algorithm, with several known and feasible techniques for generating identical hashes from wildly different binary content."

John Bambenek, threat systems manager at Fidelis Cybersecurity, said if a malicious actor could control the router, they can control everything.

"I could easily redirect DNS requests to a server I control which would mean I know every domain you look up. I could reroute all of your traffic through a device I control, which means I could set up a wiretap," Bambenek told SearchSecurity. "I could have URLs and passwords sent to a central server. In essence, it turns your home router into an intelligence listening post."

Router security issues beyond firmware signing

Williams noted that loading custom firmware wouldn't even be necessary to perform similar attacks as with the  CherryBlossom project.

"To ever install firmware they need admin level access to the router. If they have that, they can modify the upstream info like DNS (and iptables in many models) and capture traffic on many models with no firmware at all. If I control your DNS, I MitM anything," Williams said via Twitter. "So an important thing to note is that with admin level access (which the CIA needs for this) attackers without CIA level budget can achieve most of the same goals."

Kuzma said that custom firmware allows for additional stealth and "all kinds of fun features that aren't standard."

"Via an implant you could silently redirect traffic, capture traffic as it transits the router, or even use the router itself as a pivot point to relay command traffic to implants elsewhere within a network, and to do so without raising suspicion in the form of logs of remote access," Kuzma said.

Ken Spinner, vice president of field engineering at Varonis Systems, said router security issues should often fall on the manufacturers who have a "ship-it-out-and-update-later mentality," even though many -- especially consumers -- never update router firmware.

"Attacks like these underscore that the perimeter will always have leaks -- and like many of our aging technologies, routers weren't built with security in mind. We've got to be more proactive in planning for attackers breaching the first line of defenses: and therefore have security controls in place to monitor and detect intruders," Spinner told SearchSecurity. "If hackers use something like CherryBlossom to scan for information like passwords, you're going to need security defenses on the inside to make sure that user accounts and access to sensitive information is monitored -- so that you know when a user starts behaving suspiciously or an account is compromised."

Next Steps

Learn about a Cisco firmware exploit that raised questions about internal network security

Find out why experts warned against SHA-1 during the MD5 deprecation process.

Get info on ways to prevent and mitigate router security issues.

Dig Deeper on Government information security management

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What processes do you have to ensure your routers are secure and firmware is signed properly?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close