Multiple vulnerabilities have been identified in the TP-Link Omada system, a software-defined networking solution widely used by small to medium-sized businesses.
These vulnerabilities, if exploited, could allow attackers to execute remote code, leading to severe security breaches.
The affected devices include wireless access points, routers, switches, VPN devices, and hardware controllers for the Omada software.
Identified Vulnerabilities
Twelve unique vulnerabilities were identified and reported to the vendor following our responsible disclosure policy.
Talos ID | CVE(s) |
TALOS-2023-1888 | CVE-2023-49906–CVE-2023-49913 |
TALOS-2023-1864 | CVE-2023-48724 |
TALOS-2023-1862 | CVE-2023-49133–CVE-2023-49134 |
TALOS-2023-1861 | CVE-2023-49074 |
TALOS-2023-1859 | CVE-2023-47618 |
TALOS-2023-1858 | CVE-2023-47617 |
TALOS-2023-1857 | CVE-2023-46683 |
TALOS-2023-1856 | CVE-2023-42664 |
TALOS-2023-1855 | CVE-2023-47167 |
TALOS-2023-1854 | CVE-2023-47209 |
TALOS-2023-1853 | CVE-2023-36498 |
TALOS-2023-1850 | CVE-2023-43482 |
Cisco Talos researchers have identified twelve unique vulnerabilities in the TP-Link Omada system.
These vulnerabilities were reported to the vendor following a responsible disclosure policy. The affected devices include:
Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan
The vulnerabilities are categorized as follows:
The TP-Link Device Debug Protocol (TDDP) is available on many devices and is exposed for 15 minutes of a device’s runtime. This service allows remote servicing without manual activation.
During this time, various functions on the device are exposed, which can be exploited by attackers.
Example Code Snippet:
struct tddp_header {
uint8_t version;
uint8_t type;
uint8_t code;
uint8_t direction;
uint32_t pay_len;
uint16_t pkt_id;
uint8_t sub_type;
uint8_t reserved;
uint8_t digest[0x10];
};
Payload Construction:
Python
digest_req = b''
digest_req += struct.pack('B', self.version)
digest_req += struct.pack('B', self.type)
digest_req += struct.pack('B', self.code)
digest_req += struct.pack('B', self.direction)
digest_req += struct.pack('>L', self.pkt_len)
digest_req += struct.pack('>H', self.pkt_id)
digest_req += struct.pack('B', self.sub_type)
digest_req += struct.pack('B', self.reserved)
digest_req += b'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
digest_req += self.payload
digest = hashlib.md5(digest_req).digest()
The TDDP service can factory reset the device through a single ENC_CMD_OPT request, passing a subtype code of 0x49 via the payload field.
This causes the device to reset its configuration to the factory default and act abnormally until the next power cycle.
The TDDP service can also indirectly obtain root access on specific devices through the enableTestMode command.
This command causes the device to execute a shell script from a predefined address, allowing an attacker to execute any command as the root user.
The discovery of these vulnerabilities highlights the importance of regular security assessments and timely patching of network devices.
TP-Link has been notified and has released patches to address these issues.
Users are strongly advised to update their devices to the latest firmware to mitigate potential risks.
Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free
Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due to…
Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost savings.…
Security awareness has become a critical component of organizational defense strategies, particularly as companies adopt…
Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking" (WTH),…
The global regulatory landscape for cybersecurity is undergoing a seismic shift, with the European Union’s…
A sophisticated new malware suite targeting macOS, dubbed "PasivRobber," has been discovered by security researchers.…