article thumbnail

Pwn2Own – When The Latest Firmware Isn’t

LRQA Nettitude Labs

All exploits must either bypass authentication mechanisms or require no authentication. Firmware Updates Pwn2Own requires exploits to work against the latest firmware versions at the time of the competition. This competition involves teams researching certain devices to find and exploit vulnerabilities.

article thumbnail

Router Firmware Vulnerability Bypasses Authentication

Digital Guardian

A vulnerability found in some routers and modems could make the devices vulnerable to authentication bypass and in turn, allow attackers access to sensitive information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Exploited Vulnerability Targets Arcadyan Firmware Routers

Heimadal Security

A new vulnerability in home routers that run Arcadyan firmware wreaks havoc in the world of cybersecurity, being actively taken advantage of by threat actors. This exploited vulnerability is now classified as CVE-2021-20090 and the danger is that hackers can use this to skip the authentication procedure.

Firmware 115
article thumbnail

Hardening Firmware Across the Android Ecosystem

Google Security

For the purposes of this blog, we refer to the software that runs on all these other processors as “Firmware”. Android’s defense-in-depth strategy also applies to the firmware running on bare-metal environments in these microcontrollers, as they are a critical part of the attack surface of a device.

article thumbnail

Actively exploited bug bypasses authentication on millions of routers

Bleeping Computer

Threat actors actively exploit a critical authentication bypass vulnerability impacting home routers with Arcadyan firmware to take them over and deploy Mirai botnet malicious payloads. [.].

article thumbnail

Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs

Threatpost

A lack of proper code-signing verification and authentication for firmware updates opens the door to information disclosure, remote code execution, denial of service and more.

Firmware 114
article thumbnail

MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge

The Last Watchdog

Locking down firmware. Starks Federal Communications Commission member Geoffrey Starks recently alluded to the possibility that China may have secretly coded the firmware in Huawei’s equipment to support cyber espionage and cyber infrastructure attacks. telecoms by Chinese tech giant Huawei.

Firmware 197