Unauthorized Access Detection for Network Device Firmware WEB Pages
Abstract
:1. Introduction
- We define a framework, WEBUAD, to detect unauthorized access for network device firmware WEB pages. This framework allows us to identify sensitive pages in network device firmware and further discover their security issues;
- We propose an automated approach to detect WEB unauthorized access. Specifically, we utilize a depth-first search algorithm to search for unauthorized access URL pages and a similar-match algorithm to identify sensitive pages in target devices;
- We design and implement the prototype system of WEBUAD, which is capable of detecting and verifying unauthorized access to WEB pages on both firmware emulation and real devices. WEBUAD discovered a total of 13 0-day vulnerabilities, of which 2 were found on two real devices from two vendors, while the remaining 11 were exposed on 190 simulated firmware devices from seven vendors;
- The source code of WEBUAD is available on Github for further research. https://github.com/mwpeng2021/WEBUAD [5].
2. Related Work
3. Background and Challenges
3.1. Background
3.2. Challenges
4. System Design
5. Evaluation
5.1. Prototype Implementation
- Firmware Directory and File Name Extraction. We search all directories, filenames, and more information in extracted firmware and combine them together, generating a “login-page” and “potential-visit” page set. Specifically, we utilize Binwalk to extract firmware information and employ FirmAE to simulate the dynamic experimental environment;
- Device Login-Page Acquisition and HTTP Redirection Acquisition. We use a depth-first algorithm to find all redirection HTTP links of a device “login-page” to detect whether unauthorized access exists or not.
- “Protected” and “Non-Existent” Page Acquisition and Unauthorized Access Detection. We use “Protected” and “Non-Existent” pages to generate the baseline, and then we use a similarity–matching algorithm to visit and calculate the similarity of each page. Then, comparing it to the baseline, we can detect unauthorized access on the device’s concealed WEB page.
5.2. Experimental Settings
5.3. Research Questions
5.4. Experimental Evaluation
5.5. Discussions
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Riad, K.; Huang, T.; Ke, L. A dynamic and hierarchical access control for IoT in multi-authority cloud storage. J. Netw. Comput. Appl. 2020, 160, 102633. [Google Scholar] [CrossRef]
- Costin, A.; Zarras, A.; Francillon, A. Automated dynamic firmware analysis at scale: A case study on embedded web interfaces. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, Xi’an, China, 30 May–3 June 2016; pp. 437–448. [Google Scholar]
- Top 10 Web Application Security Risks. Available online: https://owasp.org/www-project-top-ten/ (accessed on 5 May 2023).
- Wright, C.; Moeglein, W.A.; Bagchi, S.; Kulkarni, M.; Clements, A.A. Challenges in Firmware Re-Hosting, Emulation, and Analysis. ACM Comput. Surv. 2020, 54, 5. [Google Scholar] [CrossRef]
- WEBUAD. WEB Unauthorized Access Detection Tool. Available online: https://github.com/mwpeng2021/WEBUAD (accessed on 5 May 2023).
- Bellard, F. QEMU, a fast and portable dynamic translator. In Proceedings of the Annual Conference on USENIX Annual Technical Conference, Anaheim, CA, USA, 10–15 April 2005; USENIX Association: Berkeley, CA, USA, 2005; pp. 41–47. [Google Scholar]
- Panda, P.R. Systemic: A modeling platform supporting multiple design abstractions. In Proceedings of the 14th International Symposium on Systems Synthesis, Montrél, QC, Canada, 30 September–3 October 2001. [Google Scholar]
- Chen, D.D.; Woo, M.; Brumley, D.; Egele, M. Towards automated dynamic analysis for linux-based embedded firmware. In Proceedings of the 23rd Annual Network and Distributed System Security Symposium, San Diego, CA, USA, 7 February–3 March 2023. [Google Scholar]
- Costin, A.; Zaddach, J.; Francillon, A.; Balzarotti, D. A Large-Scale Analysis of the Security of Embedded Firmwares. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, 20–22 August 2014; USENIX Association: San Diego, CA, USA, 2014; pp. 95–110. Available online: https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/costin (accessed on 18 June 2023).
- Shah, S. The ARM-X Firmware Emulation Framework. Available online: https://github.com/therealsaumil/emux (accessed on 11 April 2023).
- Kim, M.; Kim, D.; Kim, E.; Kim, S.; Jang, Y.; Kim, Y. FirmAE: Towards large-scale emulation of iot firmware for dynamic analysis. In Proceedings of the Annual Computer Security Applications Conference, Virtual, 7–11 September 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 733–745. [Google Scholar]
- Gustafson, E.; Muench, M.; Spensky, C.; Redini, N.; Machiry, A.; Fratantonio, Y.; Balzarotti, D.; Francillon, A.; Choe, Y.R.; Kruegel, C.; et al. Toward the analysis of embedded firmware through automated rehosting. In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses, Beijing, China, 23–25 September 2019. [Google Scholar]
- Zaddach, J.; Bruno, L.; Francillon, A.; Balzarotti, D. AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems’ Firmwares. In Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA, 23–26 February 2014; pp. 1–16. [Google Scholar]
- Muench, M.; Nisi, D.; Francillon, A.; Balzarotti, D. Avatar²: A Multi-target Orchestration Platform. Proc. Workshop Binary Anal. 2018, 18, 1–11. [Google Scholar]
- Kammerstetter, M.; Platzer, C.; Kastner, W. Prospect: Peripheral proxying supported embedded code testing. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, Kyoto, Japan, 4–6 June 2014; ACM: New York, NY, USA, 2014; pp. 329–340. [Google Scholar] [CrossRef]
- Zhou, W.; Computer, N.; Intrusion, N.; Symposium, U.S. Automatic Firmware Emulation through Invalidity-guided Knowledge Inference. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Vancouver, BC, Canada, 11–13 August 2021. [Google Scholar]
- Cao, C.; Guan, L.; Ming, J.; Liu, P. Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation. In Proceedings of the Annual Computer Security Applications Conference, Virtual, 7–11 September 2020; Association for Computing Machinery: New York, NY, USA, 2020. [Google Scholar]
- Johnson, E.; Diego, S.; Bland, M.; Zhu, Y.; Mason, J.; Champaign, U.; Checkoway, S.; College, O.; Savage, S.; Diego, S.; et al. Jetset: Targeted Firmware Rehosting for Embedded Systems. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Vancouver, BC, Canada, 11–13 August 2021. [Google Scholar]
- A Binary Framework Based on Symbolic Execution and Analog Execution, Angr. Available online: https://angr.slack.com (accessed on 12 July 2023).
- Chipounov, V.; Kuznetsov, V.; Candea, G. S2E: A platform for in-vivo multi- path analysis of software systems. Acm Sigplan Notices 2011, 46, 265–278. [Google Scholar] [CrossRef]
- Clements, A.A.; Sandia National Laboratories; Gustafson, E.; UC Santa Barbara; Sandia National Laboratories; Scharnowski, T.; Ruhr-Universität Bochum; Grosen, P.; UC Santa Barbara; Fritz, D.; et al. HALucinator: Firmware re-hosting through abstraction layer emulation. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), Santa Clara, CA, USA, 14–16 August 2019. [Google Scholar]
- Chen, J.; Diao, W.; Zhao, Q.; Zuo, C.; Lin, Z.; Wang, X.; Lau, W.C.; Sun, M.; Yang, R.; Zhang, K. IoTFuzzer: Discovering memory corruptions in iot through app-based fuzzing. In Proceedings of the Network and Distributed System Security Symposium (NDSS’18), San Diego, CA, USA, 18–21 February 2018. [Google Scholar]
- Wang, D.; Zhang, X.; Chen, T.; Li, J. Discovering vulnerabilities in COTS IoT devices through blackbox fuzzing web management interface. Secur. Commun. Netw. 2019, 2019, 1–19. [Google Scholar] [CrossRef]
- Khandait, P.; Hubballi, N.; Mazumdar, B. IoTHunter: IoT network traffic classification using device specific keywords. IET Netw. 2020, 10, 59–75. [Google Scholar] [CrossRef]
- Xie, W.; Chen, J.; Wang, Z.; Feng, C.; Wang, E.; Gao, Y.; Wang, B.; Lu, K. Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT Devices. In Proceedings of the ACM Web Conference 2022 (WWW ’22), Lyon, France, 25–29 April 2022; ACM: New York, NY, USA, 2022. [Google Scholar] [CrossRef]
- FirmAE issue, Make Some Changes in Firmae.Config can Make FirmAE Faster when Facing a Firmware Image Cannot Be Emulated. Available online: https://github.com/pr0v3rbs/FirmAE/issues/56 (accessed on 9 June 2023).
- Binwalk. Firmware Analysis Tool. Available online: https://github.com/ReFirmLabs/binwalk (accessed on 2 February 2023).
ID | Vulnerabilities |
---|---|
A01 | 2021-Broken Access Control |
A02 | 2021-Cryptographic Failures |
A03 | 2021-Injection |
A04 | 2021-Insecure Design |
A05 | 2021-Security Misconfiguration |
A06 | 2021-Vulnerable and Outdated Components |
A07 | 2021-Identification and Authentication Failures |
A08 | 2021-Software and Data Integrity Failures |
A09 | 2021-Security Logging and Monitoring Failures |
A10 | 2021-Server-Side Request Forgery |
Vendor | Device | Type | CNVD Number |
---|---|---|---|
X | X1 | unauthorized access, information leakage, command execution | CNVD-2022-73093 CNVD-2022-77987 |
X2 | |||
X3 | |||
X4 | |||
X5 | |||
Y | Y1 | unauthorized access | CNVD-2022-73098 |
Y2 | |||
Z | Z1 | information leakage | CNVD-2022-73410 |
Vendor | Device | Type | CNVD Number |
---|---|---|---|
NETGEAR | R6400v2 | Unauthorized access | CNVD-2022-69489 |
R8000 | Unauthorized access | CNVD-2022-89524 | |
WNR2000 | Unauthorized access | CNVD-2023-02802 | |
WNR1000 | |||
WN2000RPT | |||
EDIMAX | HP5101WN | Information leakage | CNVD-2022-91483 |
BR6228GNS | |||
BR6428NS | |||
BR6479GN | |||
EW7416APN_v2 | |||
D-Link | DIR815 | Information leakage | CNVD-2022-69655 |
ASUS | RT-AC53 | Unauthorized access Information leakage | CNVD-2022-69516 CNVD-2022-70391 CNVD-2022-82283 |
DSL-N55U | |||
RT-AC66U | |||
RT-AC88U | |||
RT-AC1200G+ | |||
RT-N11P | |||
RT-N12+ | |||
RT-N12E | |||
RT-N12VP | |||
RT-N66U | |||
RT-AC68U | Unauthorized access | CNVD-2023-02734 |
Program Name | Device Name | Sensitive Pages | Time(s) | CNVD Number |
---|---|---|---|---|
WEBUAD | R6400v2 | 14 | 4 | CNVD-2022-69489 |
Program Name | Potentially Accessible Pages | Device-Accessible Pages | Sensitive Pages | Time(s) |
---|---|---|---|---|
IoTScope | 177,498 | 176,375 | 290 | 22,978 |
WEBUAD | 11,923 | 3301 | 1 | 32 |
Program Name | Potentially Accessible Pages | Device-Accessible Pages | Sensitive Pages | Time(s) |
---|---|---|---|---|
IoTScope | 97,125 | 48,948 | 35 | 5734 |
WEBUAD | 11,277 | 8059 | 6 | 227 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Peng, M.; Wei, Q.; Ma, R.; Geng, Y.; Yang, Y.; Zhang, S.; Zhang, Y. Unauthorized Access Detection for Network Device Firmware WEB Pages. Electronics 2023, 12, 3674. https://doi.org/10.3390/electronics12173674
Peng M, Wei Q, Ma R, Geng Y, Yang Y, Zhang S, Zhang Y. Unauthorized Access Detection for Network Device Firmware WEB Pages. Electronics. 2023; 12(17):3674. https://doi.org/10.3390/electronics12173674
Chicago/Turabian StylePeng, Minwei, Qiang Wei, Rongkuan Ma, Yangyang Geng, Yahui Yang, Shichao Zhang, and Yali Zhang. 2023. "Unauthorized Access Detection for Network Device Firmware WEB Pages" Electronics 12, no. 17: 3674. https://doi.org/10.3390/electronics12173674
APA StylePeng, M., Wei, Q., Ma, R., Geng, Y., Yang, Y., Zhang, S., & Zhang, Y. (2023). Unauthorized Access Detection for Network Device Firmware WEB Pages. Electronics, 12(17), 3674. https://doi.org/10.3390/electronics12173674