Page 79 - Cyber Defense eMagazine August 2024
P. 79

exploitation.  Notable examples  include EternalBlue  and regreSSHion,  which  have caused  widespread
            concern due to their pre-auth nature.

            Vulnerabilities  that  require  no  user  interaction,  known  as  "zero-click"  (0-click)  vulnerabilities,  are
            particularly dangerous. These vulnerabilities can be exploited without the victim doing anything, such as
            clicking a link or opening a file. Zero-click  vulnerabilities  are often contrasted  with "one-click"  or "multi-
            click"  vulnerabilities,  which  require  some  degree  of  user  interaction.  The  FORCEDENTRY  exploit  for
            Apple iOS devices is a prime example of a 0-click vulnerability.

            The ease with which a vulnerability can be exploited is another crucial factor. While having a public exploit
            available significantly increases the danger, other factors also play a role. Modern exploits often consist
            of multiple smaller vulnerabilities chained together, referred to as "primitives." This complexity can make
            exploitation a challenging "cat and mouse" game between attackers and defenders. Some vulnerabilities
            rely on rare conditions to trigger, known as statistical exploits. This can lead to Denial of Service (DoS)
            attacks if the exploit fails, or make exploitation inherently difficult and unreliable.

            The  impact  of  an  RCE  vulnerability  is  also  influenced  by  the  popularity  of  the  affected  software.  A
            vulnerability in widely used software like Windows or OpenSSH is inherently more critical than one in a
            little-known  application.  For  instance,  the  EternalBlue  vulnerability  in Windows  had  a massive  impact
            because of Windows' ubiquity.

            How easy it is to patch vulnerability also affects its criticality. Some vulnerabilities can be patched with a
            simple  update, while  others  might require  significant  changes  to infrastructure  or even  new hardware.
            The RowHammer vulnerability, for example, highlighted the difficulties in patching certain hardware-level
            vulnerabilities. Additionally, vulnerabilities that are exploitable in the default configuration of an application
            are particularly dangerous, as they affect a broader base of installations. Many users and organizations
            do not change default configurations,  making these vulnerabilities more likely to be exploited.

            EternalBlue is one of the most infamous RCE vulnerabilities,  affecting Windows SMB functionality in its
            default configuration. The availability of a public exploit made millions of Windows machines vulnerable,
            leading  to  widespread  exploitation  and  significant  impact  on organizations  worldwide.  Several  factors
            contributed to its severity: it required only network communication  with a Windows machine, making it a
            0-click, pre-auth vulnerability.  The Shadow Brokers leak included a functioning  exploit, lowering the bar
            for  attackers.  Windows'  widespread  use  amplified  the  vulnerability's  impact,  and  patching  legacy
            Windows systems proved challenging, exacerbating the vulnerability's  effects.

            The regreSSHion vulnerability, discovered in OpenSSH, is another significant pre-auth RCE. Despite its
            alarming  nature,  a  deeper  analysis  reveals  mitigating  factors.  OpenSSH  is  widely  used,  making  any
            vulnerability  in  it  potentially  impactful.  regreSSHion  is  a  0-click,  pre-auth  vulnerability  that  affects  the
            default configuration.  However, the underlying issue is a race condition, a statistical  vulnerability that is
            hard to exploit reliably. The best-known exploit requires continuous  attempts over several hours and is
            prone to detection by security tools. While a proof-of-concept  was quickly available, no fully functioning
            exploit has been released, and existing ones are highly complex and environment-dependent.










            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          79
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   74   75   76   77   78   79   80   81   82   83   84