Sunday, February 9, 2025
HomeCVE/vulnerabilityGoAhead Servers Vulnerability Affected Hundreds of Thousands of IoT Devices

GoAhead Servers Vulnerability Affected Hundreds of Thousands of IoT Devices

Published on

SIEM as a Service

Follow Us on Google News

A critical vulnerability discovered in GoAhead Servers with versions running below 3.6.5 allows an attacker can exploit a remote code in GoAhead web Servers which affect thousands of IoT Devices.

GoAhead world’s most popular embedded Web Servers that are deployed in millions of devices including printers, IP phones, networking devices and many more.

Among a list of its clients, some of the famous ones are Avaya, Siemens, Canon, IBM, D-Links, Kodak, HP.

The vulnerability can be tracked using CVE-2017-17562 and exits in the “CGI handler” function in all versions prior to 3.6.5.

Based on the Elttam report, The vulnerability is a result of Initialising the environment of forked CGI scripts using untrusted HTTP request parameters, and will affect all user’s who have CGI support enabled with dynamically linked executables (CGI scripts). This behavior, when combined with the glibc dynamic linker, can be abused for remote code execution using special variables such as LD_PRELOAD”.

This vulnerability provides the ability to the remote attacker to send malicious HTTP CGI request that can POST payload in the request and the exploitation could lead to an arbitrary code execution on the server.

Shodan search reveals a large number of devices (approx. more than 500,000) employing GoAhead server. So, as per now, a number of these could be vulnerable.

A patch has been released regarding the vulnerability and all the users have been advised to upgrade to GoAhead 3.6.5 if dynamically linked CGI programs are being used on Linux Machines.

Also Read: Hackers who created Dangerous Mirai IoT Botnet Plead Guilty

Elttam has also released POC that could be used to check if your GoAhead Servers version is prone to attack and to ensure security against the attack. The test scripts by Elttam can be found here.

With a large number of devices affected by this vulnerability, this seems to be a big trouble as a large pool of affected devices is now prone to malicious attackers.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows

A critical zero-day vulnerability has been discovered in Microsoft Sysinternals tools, posing a serious security threat...

7-Zip 0-Day Flaw Added to CISA’s List of Actively Exploited Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical 0-day vulnerability...

Logsign Vulnerability Allows Remote Attackers to Bypass Authentication

A critical security vulnerability has been identified and disclosed in the Logsign Unified SecOps...