Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Botnet Targets Critical Vulnerability in Grandstream Appliance

The Hoaxcalls botnet is actively targeting a recently patched SQL injection vulnerability in Grandstream UCM6200 series devices, security researchers warn.

The Hoaxcalls botnet is actively targeting a recently patched SQL injection vulnerability in Grandstream UCM6200 series devices, security researchers warn.

Tracked as CVE-2020-5722 and rated critical severity (with a CVSS3.1 score of 9.8), the vulnerability exists in the HTTP interface of the impacted IP PBX appliance.

The security flaw, described as an unauthenticated remote SQL injection that can be exploited via a crafted HTTP request, allows an attacker to execute shell commands as root (versions prior to 1.0.19.20) or inject HTML code in password recovery emails (versions prior to 1.0.20.17).

A ‘Forgot Password’ feature in the UCM6200 series’ web interface accepts a username as input and looks up the username in a SQLite database. By providing a specific string of code as username, an attacker can perform SQL injection to create a reverse shell for remote code execution, or introduce arbitrary HTML code into the password recovery email sent to a user, explains Tenable, whose researchers found the vulnerability.

For more than a week, the Hoaxcalls botnet has been targeting the vulnerability to ensnare affcted devices and abuse them for distributed denial of service (DDoS) attacks. The botnet is also targeting Draytek Vigor routers to infect them via another critical vulnerability (CVE-2020-8515), Palo Alto Networks security researchers warn.

“Both CVE-2020-8515 and CVE-2020-5722 have a critical rating due to their trivial-to-exploit nature. Once exploited, the attacker can execute arbitrary commands on the vulnerable device. It’s not surprising that the threat actors collect these exploits into their arsenals and start wreaking havoc in the Internet of Things (IoT) realm,” Palo Alto Networks says.

Built on the Gafgyt/Bashlite malware family codebase, Hoaxcalls can launch a variety of DDoS attacks, based on commands received from the command and control (C&C) server. Hoaxcalls propagates itself by targeting vulnerabilities in the Grandstream and DrayTek devices.

Although both of these vulnerabilities have been patched, attacks targeting them continue, most likely abusing the slow pace at which users apply the available fixes. Grandstream fully addressed the SQL injection in version 1.0.20.17 of their software, while DrayTek included a fix in version 1.5.1.

Advertisement. Scroll to continue reading.

Related: Potent ‘dark_nexus’ IoT Botnet Emerges

Related: Microsoft Cracks Infrastructure of Infamous Necurs Botnet

Related: New ‘Gucci’ IoT Botnet Targets Europe

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...