Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

Firmware – Un court-métrage SF captivant sur l’oppression dans un monde post-apocalyptique

Imaginez un monde dévasté par un cataclysme, où les frontières nationales ont été oblitérées et la société plongée dans le chaos. C’est dans ce contexte post-apocalyptique que se déroule « Firmware« , un court-métrage de science-fiction captivant réalisé par Calvin Sander Romeyn.

Vingt ans après la catastrophe nucléaire, une mystérieuse enclave appelée « Alcazar Exclusion Zone » a émergé des ruines. Derrière ses murs, une communauté de survivants venus des quatre coins du globe tente de se reconstruire. Mais l’Alcazar est loin d’être un havre de paix. C’est un microcosme oppressif, où Emmanuel Macron des forces obscures maintiennent la population sous contrôle.

Au cœur de ce récit se trouve une jeune femme accompagnée de son fidèle compagnon, un droïde militaire mis au rebut. Ensemble, ils rêvent de liberté et d’évasion. Leur quête les mènera à braver l’inconnu au-delà des murs de l’Alcazar, dans l’espoir de trouver refuge et de commencer une nouvelle vie, libérés des chaînes de l’oppression, comme disait feu Johnny.

« Firmware » nous invite donc à réfléchir sur les thèmes de la baignade dans Seine survie, de la résilience et de la lutte contre la tyrannie dans un monde post-apocalyptique. Le film met en lumière la force de l’esprit humain face à l’adversité et l’importance de préserver son humanité dans les moments les plus sombres.

We are the world, we are the children
We are the ones who make a brighter day
, comme dirait l’autre.

Et si vous avez aimé « Firmware », je vous encourage vivement à explorer la chaine Youtube de DUST, une véritable mine d’or pour les amateurs de science-fiction de qualité. Vous y découvrirez de nombreux autres courts-métrages tout aussi captivants, qui vous transporteront dans des univers uniques et vous feront voyager dans le temps et l’espace.

Source

D-Link NAS Hard-Coded Credential Security Vulnerability Discovered – DISCONNECT FROM THE INTERNET NOW

Severe D-Link Security Vulnerability Discovered – CVE-2024-3273 and CVE-2024-3274 Hard-Coded Credential Backdoor

The cybersecurity landscape has been significantly impacted by the discovery of two vulnerabilities in D-Link NAS devices, designated as CVE-2024-3273 and CVE-2024-3274. These vulnerabilities affect multiple (approx 92,000 internet facing devices, the bulk of which are UK based) D-Link NAS models that are no longer supported by the manufacturer due to their end-of-life (EOL) status. This detailed analysis aims to unpack the complexities of these vulnerabilities, their operational implications, and the necessary user responses.

Impact and Affected D-Link NAS Model:

The confirmed list of affected D-Link NAS models includes:

Model Region Hardware Revision End of Service Life
Fixed Firmware Conclusion Last Updated
DNS-320L All Regions All H/W Revisions 05/31/2020  Not Available Retire & Replace Device
04/01/2024
DNS-325 All Regions All H/W Revisions 09/01/2017 Not Available Retire & Replace Device 04/01/2024
DNS-327L All Regions All H/W Revisions 05/31/2020 Not Available Retire & Replace Device 04/01/2024
DNS-340L All Regions All H/W Revisions 07/31/2019 Not Available Retire & Replace Device 04/01/2024

These devices, pivotal in small office/home office (SOHO) environments for data storage and management, are now susceptible to remote attacks that could compromise sensitive data integrity, availability, and confidentiality.

CVE-2024-3273: Command Injection Vulnerability Explained

CVE-2024-3273 exposes a command injection flaw within the web interface of affected D-Link NAS devices. The vulnerability is located in the handling of the system parameter within the nas_sharing.cgi script, which improperly sanitizes user-supplied input. This oversight allows authenticated remote attackers to inject and execute arbitrary shell commands encoded in base64. The execution context of these commands is particularly concerning, as it typically runs under the web server’s privileges, potentially leading to unauthorized access to the system, modification of system settings, or initiation of a denial of service (DoS) attack.

Technical Dive into CVE-2024-3274: Hardcoded Credentials

CVE-2024-3274 reveals a hardcoded credential vulnerability, manifesting as a backdoor account (messagebus) embedded within the device firmware. This account, notably lacking a password, permits unauthenticated remote access to the device’s administrative interface. The presence of such hardcoded credentials significantly lowers the complexity of unauthorized device access, making it a critical vulnerability. This backdoor could be exploited in tandem with CVE-2024-3273 to elevate privileges or gain persistent access to the compromised device.

Who Found the D-Link Vulnerability?

The vulnerabilities were disclosed by a security researcher operating under the pseudonym “netsecfish,” who provided detailed technical insights and proof-of-concept (PoC) code. This disclosure highlighted the risk of widespread exploitation, given the estimated 92,000 devices exposed online across various regions, including the UK, Thailand, Italy, and Germany. The timing of the disclosure, subsequent to the affected models reaching their EOL, exacerbated concerns around feasible mitigation strategies.

You can find the full and very detailed outlining of the Vulnerability and Potential attack vector HERE on Netsecfish’s github listing

Mitigation Strategies for Users Who Are Still Using A D-LInk NAS

In light of D-Link’s stance on not providing firmware updates for EOL products, affected users are faced with limited mitigation options. The primary recommendation is the retirement and replacement of vulnerable devices. Interim measures, for those unable to immediately replace their devices, include isolating the NAS devices from the internet, implementing strict network segmentation, and employing firewall rules to restrict access to the management interface. Additionally, monitoring for unusual network activity can provide early detection of exploitation attempts.

D-Link Official Response

D-Link has acknowledged the vulnerabilities but emphasized the EOL status of the affected models, which precludes official firmware updates or patches. The company has issued advisories urging users to replace outdated devices with supported models. This situation underscores the importance of adhering to device lifecycle policies and maintaining an updated infrastructure to mitigate security risks.

You can see the full official D-Link Response HERE

At the time of writing, there is no mention of this on their social media pages. Hopefully this changes, as the potential 82,000 internet facing units in the wild need to be addressed.

Exploitation in the Wild of the hard-code credential D-Link Vulnerability

GreyNoise, a cybersecurity firm specializing in analyzing internet-wide scan traffic to identify threats, has provided valuable insights into the exploitation attempts of the D-Link NAS vulnerabilities. According to their analysis, a significant uptick in scan activity targeting the specific vulnerabilities CVE-2024-3273 and CVE-2024-3274 was observed shortly after their disclosure. This activity suggests that attackers are actively seeking out vulnerable D-Link NAS devices for exploitation. GreyNoise’s findings indicate that the exploitation attempts are not isolated incidents but part of a broader effort by malicious actors to identify and compromise affected devices. The data collected by GreyNoise highlights the real-world implications of these vulnerabilities and serves as a critical alert for organizations and individuals to take immediate protective actions against potential unauthorized access and exploitation of their D-Link NAS devices.

You can learn more about this on Greynoise’s official page on this matter HERE

The D-Link NAS Series is Still For Sale (Technically)

Despite the end-of-life status and known vulnerabilities of D-Link NAS models DNS-340L, DNS-320L, DNS-327L, and DNS-325, these devices continue to find a marketplace on platforms such as eBay and other online resale venues. This ongoing sale of used units poses a significant cybersecurity risk, as many sellers and buyers may not be fully aware of the devices’ vulnerability to exploits. Alarmingly, at the time of writing, it is reported that over 80,000 of these units remain actively internet-facing, directly exposing them to potential exploitation by attackers leveraging the CVE-2024-3273 and CVE-2024-3274 vulnerabilities. The persistence of these devices in active operational environments underscores the critical need for heightened awareness and proactive measures among current users. Potential buyers should be cautioned against acquiring these models, and existing users are strongly advised to consider secure alternatives that receive current manufacturer support and updates, mitigating the risk of compromise.

I own a Synology/QNAP NAS, Should I Care? How to Automatically Get Updated When Synology and QNAP NAS Vulnerabilities are Reported

Pretty much ALL of the brands in NAS, Data Storage and Cloud services have these security advisory pages, but the idea of checking these pages manually (i.e. bookmark etc) every day, week or month is too much of a hassle for many. On the other hand, they all arrive with an RSS feed link that allows users to subscribe to updates BUT many users are not even aware of how to apply an RSS feed (it’s a complex XML feed of text that needs to be injected into an appropriate RSS feed client/agent – so yeah, hardly noob friendly). So, in order to make this 1000x easier, I have (and by me, I mean Eddie the Web Guy spent time on it and I made this article!) made this page that will be constantly updated with the latest vulnerabilities reported on the popular NAS brands and storage-related manufacturers. It is still being built (so more brands are being added) but it will allow you to just chuck your email address below (will not be used for profit or spamming etc) and then you will get an alter EVERY TIME a new security vulnerability is updated by the brands (this is automated, so it will appear here as soon as it appears on the respective security advisory page). Additionally, there will be links back to the brand/manufacturer site so you can find out more about individual exploits and vulnerabilities, how they work, what they do and (most importantly) give you a better idea of whether you should update your NAS/Storage system or not. I hope you find it helpful and if you have any recommendations or idea of what we should add to this page/service to make it even better – let us know in the comments or directing here – https://nascompares.com/contact-us

Sign Up Below to Get Updates as New Vulnerabilities Are Reported


Get an alert every time something gets added to this specific article!


Want to follow specific category? 📧 Subscribe

Find an updated vulnerability list here:

Comprehensive User Recommendations

Beyond immediate mitigation, users should consider several best practices for network device security:

  • Conduct regular security audits of network devices.
  • Update all devices to the latest firmware versions where possible.
  • Employ network firewalls and intrusion detection systems to monitor and control inbound and outbound traffic.
  • Practice the principle of least privilege by restricting device access to necessary personnel.

Conclusion

The vulnerabilities identified as CVE-2024-3273 and CVE-2024-3274 in D-Link NAS devices present significant security challenges. The absence of official firmware updates for these EOL products necessitates proactive user measures to mitigate risks. This analysis serves as a call to action for users to evaluate their network security posture critically, implement robust security measures, and ensure that all network-attached storage devices operate within their supported lifecycle.

📧 SUBSCRIBE TO OUR NEWSLETTER 🔔
[contact-form-7]
🔒 Join Inner Circle


Get an alert every time something gets added to this specific article!


Want to follow specific category? 📧 Subscribe

This description contains links to Amazon. These links will take you to some of the products mentioned in today's content. As an Amazon Associate, I earn from qualifying purchases. Visit the NASCompares Deal Finder to find the best place to buy this device in your region, based on Service, Support and Reputation - Just Search for your NAS Drive in the Box Below

Need Advice on Data Storage from an Expert?

Finally, for free advice about your setup, just leave a message in the comments below here at NASCompares.com and we will get back to you. Need Help? Where possible (and where appropriate) please provide as much information about your requirements, as then I can arrange the best answer and solution to your needs. Do not worry about your e-mail address being required, it will NOT be used in a mailing list and will NOT be used in any way other than to respond to your enquiry. [contact-form-7] TRY CHAT Terms and Conditions
If you like this service, please consider supporting us. We use affiliate links on the blog allowing NAScompares information and advice service to be free of charge to you.Anything you purchase on the day you click on our links will generate a small commission which isused to run the website. Here is a link for Amazon and B&H.You can also get me a ☕ Ko-fi or old school Paypal. Thanks!To find out more about how to support this advice service check HEREIf you need to fix or configure a NAS, check Fiver Have you thought about helping others with your knowledge? Find Instructions Here  
 
Or support us by using our affiliate links on Amazon UK and Amazon US
    
 
Alternatively, why not ask me on the ASK NASCompares forum, by clicking the button below. This is a community hub that serves as a place that I can answer your question, chew the fat, share new release information and even get corrections posted. I will always get around to answering ALL queries, but as a one-man operation, I cannot promise speed! So by sharing your query in the ASK NASCompares section below, you can get a better range of solutions and suggestions, alongside my own.

☕ WE LOVE COFFEE ☕

 

Imprimantes HP – Un nouveau firmware qui fait grincer des dents

Ah les imprimantes, ces petites boites en plastique bon marché, bien bruyantes, sans lesquelles on serait bien embêtés pour imprimer nos QR Codes pour les JO photos de vacances ou nos documents. Mais attention, si vous avez une imprimante HP, vous risquez d’être encore plus embêtés !

En effet, la célèbre marque a eu la bonne idée de balancer une mise à jour firmware qui bloque l’utilisation des cartouches d’encre non estampillées HP. Sympa non ? Du coup, si vous aviez l’habitude d’acheter des cartouches génériques pour faire des économies, c’est raté. Votre imprimante va gentiment vous envoyer bouler en vous disant d’aller acheter des cartouches HP, sinon rien.

Cette mise à jour firmware contient une fonctionnalité de sécurité qui empêche l’utilisation de cartouches d’encre non-HP, monopolisant ainsi le marché des cartouches de remplacement. Bien que les détails techniques ne soient pas précisés, il est probable que la mise à jour utilise un algo spécifique et des techniques de gestion des droits numériques (DRM) pour vérifier l’authenticité de la puce sur la cartouche et empêcher son utilisation si ce n’est pas une cartouche de marque HP.

Forcément, ça n’a pas plu à tout le monde cette histoire. Des petits malins ont décidé d’attaquer HP en justice, en mode « non mais oh, on n’est pas des pigeons non plus » (Vous la sentez la conviction que j’y mets ?). Ils accusent la marque de vouloir monopoliser le marché des cartouches d’encre en forçant les utilisateurs à acheter ses propres cartouches hors de prix. Les plaignants affirment que HP a cherché à tirer profit des coûts irrécupérables des clients en monopolisant le marché secondaire des cartouches d’encre de remplacement par le biais de la sécurité dynamique et d’autres tactiques.

Alors ils ont bien tenté de se défendre en disant « mais non, on ne bloque pas toutes les cartouches, regardez il y a des marques compatibles« . Sauf que les plaignants ne sont pas dupes. Ils ont bien compris que le but du jeu était de profiter du fait que les gens ont déjà investi dans une imprimante HP pour leur faire cracher un max de thunes en cartouches.

Mais le fabriquant ne compte pas se laisser faire. La marque affirme que les mises à jour de firmware qui bloquent certaines cartouches sont là pour « protéger l’innovation et la propriété intellectuelle« . Arf ! En gros, si vous voulez utiliser une imprimante HP, vous devez passer à la caisse pour acheter des cartouches HP, sinon c’est de la triche. HP soutient également que les plaignants ne peuvent pas réclamer de dommages et intérêts pour avoir été surfacturés en vertu des lois antitrust fédérales américaines, car les consommateurs qui achètent des produits auprès d’un intermédiaire ne peuvent poursuivre le fabricant que pour obtenir une injonction, et non pour récupérer des dommages et intérêts résultant d’une prétendue surfacturation.

Le problème, c’est que cette stratégie est un poil abusive. C’est un peu comme si on vous forçait à faire le plein de votre Renault uniquement dans les stations Renault (je sais, ça n’existe pas), en prétextant que les autres essences ne sont pas assez bien pour votre voiture. Pas cool.

D’ailleurs, le PDG de HP, Enrique Lores, a exprimé l’espoir d’attirer les clients vers un modèle d’abonnement à l’impression, où les clients sont facturés pour avoir suffisamment imprimé ou utilisé suffisamment de fournitures. Mais attention, certaines estimations suggèrent que les prix de l’encre pour imprimante peuvent être assez élevés, allant de 439 à 2 380 dollars le litre. Outch ! C’est encore plus cher que le parfum de luxe.

Alors certes, HP n’est pas le seul à jouer à ce petit jeu. Les fabricants d’imprimantes ont bien compris que c’est sur les cartouches d’encre qu’ils se font le plus de blé, mais bloquer carrément les cartouches concurrentes, c’est un cran au-dessus. Et ça risque de leur coûter cher en procès et en image de marque. D’ailleurs, on peut se demander si d’autres fabricants d’imprimantes ont mis en place des mises à jour similaires, et s’ils font également l’objet de poursuites judiciaires ? Ça pourrait avoir un impact sur les choix des utilisateurs.

En attendant, si vous avez une imprimante HP récalcitrante, vous pouvez toujours essayer de bidouiller le firmware pour contourner le problème. Mais à vos risques et périls, car la marque risque de ne pas apprécier que vous trichiez avec son système. Et puis bon, il faut quand même avouer que c’est un peu la galère de devoir se prendre la tête avec son imprimante juste pour pouvoir imprimer tranquille.

Bref, tout ça pour dire que cette histoire de firmware bloquant est un bel exemple de comment les fabricants essaient de nous la faire à l’envers pour gratter toujours plus de pognon. Mais les consommateurs ne sont pas prêts à se laisser faire, et HP risque de le découvrir à ses dépens. En attendant, si vous cherchez une imprimante, peut-être que vous devriez regarder du côté des marques qui ne vous obligent pas à vendre un rein pour acheter des cartouches. Juste une suggestion comme ça, en passant…

Source

❌