{"id":2515,"date":"2010-04-03T11:25:16","date_gmt":"2010-04-03T15:25:16","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=2515"},"modified":"2022-12-30T12:47:25","modified_gmt":"2022-12-30T17:47:25","slug":"nics-latest-threat-to-pcs","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/nics-latest-threat-to-pcs\/","title":{"rendered":"NICs Latest Threat to PCs"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2517\" style=\"border: 0pt none; margin-left: 2px; margin-right: 2px;\" title=\"NICs Latest Threat to PCs\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/04\/malware-e1561857669926.jpg?resize=87%2C87&#038;ssl=1\" alt=\"NICs Latest Threat to PCs\" width=\"87\" height=\"87\" \/>The latest malware attack vector is the network interface card (NICs). According to a <a href=\"https:\/\/web.archive.org\/web\/20210712020001\/https:\/\/www.techsupportalert.com\/content\/next-generation-malware-attacks-pcs-firmware-hardware-devices.htm\" target=\"_blank\" rel=\"noopener noreferrer\">post<\/a> at <a href=\"http:\/\/www.techsupportalert.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gizmo\u2019s Freeware<\/a>, two separate presentations at the <a href=\"http:\/\/cansecwest.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> CanSecWest international security conference<\/a>\u00a0demonstrated exploits utilizing network cards. The article reports that both exploits focused on <a title=\"Broadcom\" href=\"http:\/\/www.broadcom.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Broadcom<\/a>\u00a0(<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AVGO\/\" target=\"_blank\" rel=\"noopener noreferrer\">AVGO<\/a>) NIC&#8217;s.<\/p>\n<p><a title=\"Broadcom\" href=\"http:\/\/www.broadcom.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-2518 size-medium alignright\" style=\"border: 0pt none; margin-left: 2px; margin-right: 2px;\" title=\"Broadcom_kogo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/04\/Broadcom_kogo-e1561857706791-150x80.jpg?resize=150%2C80&#038;ssl=1\" alt=\"\" width=\"150\" height=\"80\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/04\/Broadcom_kogo-e1561857706791.jpg?resize=150%2C80&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/04\/Broadcom_kogo-e1561857706791.jpg?resize=75%2C40&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/04\/Broadcom_kogo-e1561857706791.jpg?w=480&amp;ssl=1 480w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>The post reports that in at least one of the demo\u2019s the researcher used the Broadcom remote factory diagnostic mechanism to install custom firmware on the network card. The researcher used the compromised firmware to create a tunnel into the PC in such a way that packets sent via the tunnel were not visible to the system firewall. Using the network card\u2019s access to memory,\u00a0 the attacker could then run whatever code he wanted.<\/p>\n<h3>HP uses the vulnerable NICs in PCs<\/h3>\n<p><a title=\"HP\" href=\"http:\/\/www.hp.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">HP<\/a>\u00a0<a title=\"HP\" href=\"http:\/\/www.hp.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">(<\/a><a title=\"NYSE : HPQ\" href=\"https:\/\/finance.google.com\/finance?q=NYSE:HPQ\" target=\"_blank\" rel=\"noopener noreferrer\">HPQ<\/a><a title=\"HP\" href=\"http:\/\/www.hp.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">)<\/a> uses the vulnerable Broadcom NICs in many PCs. In response, the HP Software Security Response Team has released a Security Bulletin (<a href=\"https:\/\/www.cvedetails.com\/cve\/CVE-2010-0104\/\" target=\"_blank\" rel=\"noopener noreferrer\">Document ID: c02048471<\/a>) \u201cHP Small Form Factor or Microtower PC with Broadcom Integrated NIC Firmware, Remote Execution of Arbitrary Code.\u201d In the bulletin, HP says this information should be acted upon as soon as possible.<\/p>\n<p>H<a title=\"HP\" href=\"http:\/\/www.hp.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-2519 size-full alignright\" style=\"margin: 2px 0px; border: 0pt none;\" title=\"hp_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/04\/hp_logo-e1561857738355.jpg?resize=114%2C77&#038;ssl=1\" alt=\"\" width=\"114\" height=\"77\" \/><\/a>P has made softpaq <a title=\"FTP\" href=\"ftp:\/\/ftp.hp.com\/pub\/softpaq\/sp47501-48000\/sp47557.exe\" target=\"_blank\" rel=\"noopener noreferrer\">SP47557<\/a> available to resolve the vulnerability. In the bulletin, HP says the following models contain the Broadcom Integrated NIC firmware<\/p>\n<ul>\n<li>HP Compaq 6005<\/li>\n<li>HP Compaq dc5700<\/li>\n<li>HP Compaq dc5750<\/li>\n<li>HP Compaq dc5850<\/li>\n<li>HP Compaq dc7600<\/li>\n<li>HP Compaq dx7200<\/li>\n<li>HP rp3000 Point of Sale System<\/li>\n<li>HP rp5700 Desktop PC<\/li>\n<li>HP rp5700 Point of Sale System<\/li>\n<\/ul>\n<p><strong><em>Rb-<\/em><\/strong><\/p>\n<p><em>This is a new hole, not a new attack. The premise appears to be poor design. Why would a manufacturer leave \u201cthe remote factory diagnostic mechanism enabled.\u201d\u00a0 The article goes on to say that, \u201dby default, the remote factory diagnostic mechanism (ASFor Alert Standard Format 2.0) is normally turned off.\u201d That&#8217;s a good thing unless it&#8217;s not then you got troubles.<br \/>\n<\/em><\/p>\n<p><em>This technique would allow a very low-level attack that is not visible to traditional desktop security software. The network security devices would have to pick up the threat and not desktop security software. This also proves the case for good asset management, I can think of one client who has 80+ of the HP 5700\u2019s distributed at 80+ sites without a management tool such as <a title=\"Intel\" href=\"https:\/\/www.intel.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Intel&#8217;s<\/a> <a title=\"vPro\" href=\"https:\/\/web.archive.org\/web\/20110623144804\/http:\/\/www.intel.com\/technology\/vpro\/index.htm\" target=\"_blank\" rel=\"noopener noreferrer\">vPro<\/a> to push these low-level updates to PC\u2019s. There is no telling if these PCs will ever get patches unless <a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> adds it Windows Update.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers used a Broadcom remote factory diagnostic tool to install custom firmware on network cards. HP uses the vulnerable NICs in many PCs &#8211; Start patching<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3240,2843,169,168,904,170,4],"class_list":["post-2515","post","type-post","status-publish","format-standard","hentry","category-security","tag-3240","tag-avgo","tag-broadcom","tag-hp","tag-hpq","tag-nic","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=2515"}],"version-history":[{"count":7,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2515\/revisions"}],"predecessor-version":[{"id":128910,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2515\/revisions\/128910"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=2515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=2515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=2515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}