CVE-2024-54143

Published Dec 6, 2024

Last updated 6 days ago

Overview

Description
openwrt/asu is an image on demand server for OpenWrt based distributions. The request hashing mechanism truncates SHA-256 hashes to only 12 characters. This significantly reduces entropy, making it feasible for an attacker to generate collisions. By exploiting this, a previously built malicious image can be served in place of a legitimate one, allowing the attacker to "poison" the artifact cache and deliver compromised images to unsuspecting users. This can be combined with other attacks, such as a command injection in Imagebuilder that allows malicious users to inject arbitrary commands into the build process, resulting in the production of malicious firmware images signed with the legitimate build key. This has been patched with 920c8a1.
Source
security-advisories@github.com
NVD status
Received

Risk scores

CVSS 4.0

Type
Secondary
Base score
9.3
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Severity
CRITICAL

Weaknesses

security-advisories@github.com
CWE-328

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

1

  1. 🚨Alert🚨CVE-2024-54143: Critical Vulnerability in OpenWrt’s Attended SysUpgrade Server Allows for Firmware Poisoning 📊 1.7m+ Services are found on https://t.co/ysWb28BTvF yearly. 🔗Hunter Link: https://t.co/tRxcsKerHB 👇Query HUNTER:/product.name="OpenWrt(X-Wrt) Router" SHODAN:

    @HunterMapping

    11 Dec 2024

    2824 Impressions

    17 Retweets

    50 Likes

    12 Bookmarks

    0 Replies

    0 Quotes

  2. OpenWrt orders router firmware updates after supply chain attack scare: https://t.co/hZW8iYDy9k OpenWrt has urged users to upgrade their firmware following a reported supply chain attack risk. A command injection vulnerability in the attended sysupgrade server (CVE-2024-54143)…

    @securityRSS

    10 Dec 2024

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. OpenWrt项目团队于12月6日发布安全公告,披露了其固件升级存在严重安全漏洞(CVE-2024-54143)。该漏洞由日本Flatt Security公司安全研究员RyotaK发现并报告。… https://t.co/wCVYTWdQVJ

    @Nuwaempress

    10 Dec 2024

    28 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. ⚠️⚠️ CVE-2024-54143: Critical Vulnerability in OpenWrt’s Attended SysUpgrade Server Allows for Firmware Poisoning 🎯484k+ Results are found on the https://t.co/pb16tGYaKe nearly year. 🔗FOFA Link:https://t.co/DGTyN46gtr FOFA Query:app="OpenWrt" 🔖 Refer:… https://t.co/S5M94gr

    @fofabot

    10 Dec 2024

    1025 Impressions

    9 Retweets

    17 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 🚨🚨CVE-2024-54143 (CVSS: 9.3) : Openwrt/Asu Allows Build Artifact Poisoning Via Truncated SHA-256 Hash and Command Injection ⚠️This vulnerability could allow attackers to compromise the integrity of firmware updates delivered through its Attended SysUpgrade server. ZoomEye… htt

    @zoomeye_team

    10 Dec 2024

    437 Impressions

    2 Retweets

    2 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  6. OpenWrt固件升级服务器发现严重安全漏洞,官方已紧急修复,建议大家迅速升级 OpenWrt项目团队于12月6日发布安全公告,披露了其固件升级存在严重安全漏洞(CVE-2024-54143)。该漏洞由日本Flatt Security公司安全研究员RyotaK发现并报告。… https://t.co/of7DvBrm0C

    @srtg000bot

    10 Dec 2024

    44 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. shelling out in python via magical fairy dust "containers" isn't a great look - CVE-2024-54143 https://t.co/KwZJwwoZFq

    @nanovms

    9 Dec 2024

    242 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. Security Advisory 2024-12-06-1 - OpenWrt Attended SysUpgrade server: Build artifact poisoning via truncated SHA-256 hash and command injection (CVE-2024-54143) https://t.co/2j4QRkchUO

    @musashino_205

    7 Dec 2024

    231 Impressions

    2 Retweets

    2 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  9. CVE-2024-54143 OpenWrt Image Cache Poisoning Exploit via Hash Collision The openwrt/asu is an on-demand server for OpenWrt distributions. Its request hashing cuts SHA-256 hashes to 12 characters. This lowers secu... https://t.co/haRlMzagHV

    @VulmonFeeds

    6 Dec 2024

    14 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. CVE-2024-54143 openwrt/asu is an image on demand server for OpenWrt based distributions. The request hashing mechanism truncates SHA-256 hashes to only 12 characters. This significa… https://t.co/oMDU7MEbea

    @CVEnew

    6 Dec 2024

    274 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. [CVE-2024-54143: CRITICAL] Warning: Cybersecurity vulnerability in OpenWrt! Exploiting truncated SHA-256 hashes could allow attackers to serve compromised images to users. Patch available with 920c8a1.#cybersecurity,#vulnerability https://t.co/EUnPPr7keZ https://t.co/oOtmmLiwq5

    @CveFindCom

    6 Dec 2024

    42 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes