Monday, April 28, 2025
HomeComputer SecurityHalf a Billion Enterprise IoT Devices are Vulnerable to DNS Rebinding Attack...

Half a Billion Enterprise IoT Devices are Vulnerable to DNS Rebinding Attack – A Remote Network Control Attack

Published on

SIEM as a Service

Follow Us on Google News

A new researcher revealed that Half a Billion home and enterprise based devices IoT Devices are vulnerable to DNS Rebinding Attack including IP phones, printers, networking equipment, and cameras.

DNS Rebinding Attack taking advantage of the outdated web browsers that allow to redirect victims to the malicious domain and compromise the network where it uses the network firewall web browser as a proxy to communicate with vulnerable local network devices.

The old report that referred in last week revealed that just million of Devices are vulnerable to this DNS Rebinding Attack but this new research uncovered the issue impacts hundreds of millions of IoT inside of the many of enterprise network.

- Advertisement - Google News

This new flaw impacts a lot of enterprise network which leads to an attacker to perform data exfiltration and take-over for a Mirai-like attack.

The same Security firm was discovered one of the highly critical Bluetooth based BlueBorne vulnerability in last year.

Almost All IoT Device Model’s are Vulnerable

Based on the investigation result, almost major enterprises are open to DNS rebinding attacks including commonly used IoT devices inside of the enterprise environments also vulnerable.

Based on the above statistics, At least one 1 vulnerable IoT devices are used by all the enterprise network, so almost every enterprise IoT infrastructure is vulnerable to DNS Rebinding Attack.

The printer is one of the least managed IoT devices in most of the enterprise typically deploy printers with default settings which could be one the main loophole for an attacker to compromise the target and exfiltrates information by downloading documents scanned, stored, or cached on the printer.

Armis research team revealed that, the estimated number of vulnerable devices worldwide in the enterprise – nearly half a billion(496 million) devices.

Enterprise networks should use best IDS, IPS protection system to keep their network safe and secure from IoT based attacks.

How does this DNS Rebinding Attack Works

1. Initially, this attack started via Phishing email that used to compromise users and takes him or her to a malicious site which contains malicious Javascript to run on the victims local browser.

In this case, attackers using an obfuscation technique to avoid detection by a firewall, network security solution, or even endpoint protection

2. Scan the local network to detect the presence of a particular type of IoT device which can accomplish by DNS rebinding and JavaScript and the malicious command will scan the local IP address and send back to the malicious website.

3. The malicious website sends an appropriate set of commands to the end user’s browser — for example, commands to log into the HTTP web server of a security camera on the internal network.

4. Using DNS rebinding Browser can able to sends those commands directly to the IP address owned IoT device inside of the targeted organization.

5. Establish an outbound connection to a C&C server, directly from the compromised IoT/unmanaged device since the firewall typically considers outbound connections to be safe.

Mitigation:

Placing a web-application firewall can filter out the malicious Backdoor shell access and isolate the browser based attacks.

Implement the highly recommended Imperva Incapsula backdoor shell protection to avoid attacker control the vulnerable device remotely.

Protect your web applications from vulnerabilities with Worlds best WAF solutions.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

New iOS Vulnerability Could Brick iPhones with Just One Line of Code

A security researcher has uncovered a critical vulnerability in iOS, Apple's flagship mobile operating...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...