rvlsoft - Fotolia
Rufus, the open source software developed by Akeo Consulting, is an application used on Microsoft Windows platforms...
to create and format bootable USB flash drives. Due to a vulnerability disclosed in August 2017, Rufus failed to update itself when creating a bootable USB flash drive. What are the risks of this Rufus vulnerability? How can security teams fix the problem?
Because of this Rufus software vulnerability, an authenticated attacker could subvert the update process while creating a bootable flash drive. This made it possible for an attacker to execute arbitrary code on a vulnerable system.
Windows XP or later can be used to download bootable ISO images to boot up different operating systems -- including Windows, Linux, FreeDOS, Kubuntu and Unified Extensible Firmware Interface, which is an alternative to basic input/output systems (BIOS). If an operating system (OS) is already installed on a laptop or desktop, the bootable flash drive can be treated as a device in the BIOS system.
The order of the bootable devices -- including the CD drive -- may need to be changed in the system BIOS to ensure the OS on the flash drive boots when it is selected from a menu of multiple OSes. The bootable flash drive should have a higher priority than the CD drive.
Rufus software version 2.16 has built-in update capabilities that enable automatic retrieval of updates over HTTP. This version attempts to perform some basic signature checking of downloaded updates. One drawback, however, is the software isn't able to securely install updates over HTTP.
Because Rufus uses HTTP instead of HTTPS, there's no way to ensure the update has been signed by a trusted certificate authority that certifies the ownership of a public key by the named subject of the certificate. This could enable an attacker to self-sign his own certificate to perform arbitrary code execution on an untrusted network, such as public Wi-Fi.
The attacker needs to be on the same network as other Rufus software users to be in a position to affect network traffic. This increases the chance of a man-in-the-middle attack.
To stay ahead of attackers, organizations should use web browsers to obtain updates directly from the Rufus website and should avoid untrusted networks. The Rufus website uses HTTPS rather than HTTP, which secures communication over the internet. However, more work is necessary to fully secure Rufus software.
Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)
Discover more about USB man-in-the-middle attacks
Learn how to use Rufus to create a bootable VMware ESXi installer
Find out how to create a bootable Windows 7 USB drive
Dig Deeper on Open source security tools and software
Related Q&A from Judith Myerson
Not every enterprise needs the functionality of a standard VPN client. A site-to-site VPN may be a better choice for some companies, but it's not ... Continue Reading
The Constrained Application Protocol underpins IoT networks. But the protocol could allow a threat actor to launch an attack. Continue Reading
Dutch researchers discovered flaws in ATA security and TCG Opal affecting self-encrypting drives. What steps can you take to guard data stored on ... Continue Reading