BleedingBit Weaknesses Affect Millions of Wireless Access Points

Armis Labs has found two weaknesses in Texas Instruments’ Bluetooth Low Energy (BLE) chips that are used in wireless access points produced by Cisco, Meraki, and Aruba. The affected wireless access points are used by hundreds of thousands of companies all over the world.

Cisco, Meraki, and Aruba provide no less than 70% of business wireless access points, which places all of those companies at risk. It is not yet known precisely how many appliances are susceptible and have the BleedingBit susceptibilities, even though Armis Labs doubts millions of appliances might be affected.

If theBleedingBit weaknesses are abused, attackers would be able to take complete control of the access points without any requirement for verification. The access points could be deactivated, data could be interrupted, malware fitted, or the attackers might use the weaknesses to gain access to company systems served by the access points and access any appliance in the neighborhood of theAP.

TwoBleedingBit weaknesses have been found. CVE-2018-16986 lets memory corruption in the BLE stack, through which complete control of the AP might be gained. To abuse the weakness, an attacker would need to be within the limit of the AP and BLEwould need to be turned on. No knowledge of the appliance would be needed and there are no other preconditions to abuse the weakness.

An attacker would need to send particularly created packets to the AP containing code which is run in the next phase of the attack. The second phase involves sending an overflow packet to trigger a vital memory overflow which lets the attacker run the earlier sent code.

The weakness has been verified to affect Cisco Aironet Access Points 1800i, 1810, 1815i,1815m, 1815w, 4800 and the Cisco 1540 Aironet Series Outdoor Access Point. Meraki MR30H, MR33, MR42E, MR53E, and MR74 Access Points are also affected.

The second of the BleedingBit weaknesses – CVE-2018-7080 – is existing in the over-the-air firmware download (OAD) feature of Texas instruments’ chips utilized in ArubaSeries 300 Wi-Fi Access Points. The weakness is a development backdoor tool that has not been detached. If abused, the weakness would let a new and completely different variety of firmware to be fitted, letting the attacker gain complete control of the appliance.

Armis Labs says that abuse of the BleedingBit weaknesses would not be spotted by usual AV solutions and would be unlikely to raise any red flags. The attacker might move laterally between network parts, interrupt traffic, fit malware, interfere with operating systems, and hijack a wide variety of appliances unnoticed.

Cisco has already repaired its affected appliances, and Meraki has published help on how users can make modifications to BLE settings to avoid misuse of the weaknesses. Misuse of CVE-2018-7080 can be obstructed by deactivating OAD functionality.  Texas Instruments has now rectified the fault in BLE-STACK v2.2.2.