380° <g...@biscuolo.net> writes:

[...]

> Sapete quante notizie o ricerche si possono confezionare grazie a Shodan
> in merito a quanti dispositivi server, router e "IoT" connessi a
> internet sono vulnerabili a qualche "attacco NON zero-day" (di cui è
> disponibile la "patch")?

E la cosa che mi fa scompisciare dalle risate è che:

--8<---------------cut here---------------start------------->8---

Using Shodan with respect to a device the user does not own is a felony
crime under the laws of some states in the United States even if no
damage is done to the device or system.

--8<---------------cut here---------------end--------------->8---
via: https://en.wikipedia.org/wiki/Shodan_(website)

Sono sicuro che sia illegale, illegale da codice penale, anche in altri
stati non ancora documentati su Wikipedia. :-D

In galera! B-)

> Beh se non lo sapevate, *sapetelo*:
> https://duckduckgo.com/?q=shodan+discovered+vulnerable+devices&ia=web

Tipo, per citare gli ultimi:

1. «Over 90,000 LG Smart TVs may be exposed to remote attacks» (9 Aprile 2024)
https://www.bleepingcomputer.com/news/security/over-90-000-lg-smart-tvs-may-be-exposed-to-remote-attacks/

--8<---------------cut here---------------start------------->8---

CVE-2023-6318 is an elevation of privilege vulnerability that allows
attackers to gain root access following the initial unauthorized access
provided by CVE-2023-6317.

[...] Bitdefender reported its findings to LG on November 1, 2023, but
it took the vendor until March 22, 2024, to release the related security
updates.

[...] Though TVs are less critical in terms of security, the severity of
remote command execution remains potentially significant [...]

--8<---------------cut here---------------end--------------->8---

Ricordo che è molto probabile che tutte le TV "smart" abbiano un
microfono, alcune hanno pure una telecamera integrata.

2. «Critical takeover vulnerabilities in 92,000 D-Link devices under
active exploitation» (8 Aprile 2024)
https://arstechnica.com/security/2024/04/hackers-actively-exploit-critical-remote-takeover-vulnerabilities-in-d-link-devices/

--8<---------------cut here---------------start------------->8---

Hackers are actively exploiting a pair of recently discovered
vulnerabilities to remotely commandeer network-attached storage devices
manufactured by D-Link, researchers said Monday.

Roughly 92,000 devices are vulnerable to the remote takeover exploits
[...]

The first, tracked as CVE-2024-3272 and carrying a severity rating of
9.8 out of 10, is a backdoor account enabled by credentials hardcoded
into the firmware. The second is a command-injection flaw tracked as
CVE-2024-3273 and has a severity rating of 7.3. It can be remotely
activated with a simple HTTP GET request.

--8<---------------cut here---------------end--------------->8---

Lasciate che ve lo ripeta: "backdoor account enabled by credentials
hardcoded into the firmware".  Chiaro?!?

Capite perché la *presunta* distinzione tra software e firmware mi
infastidisce, ci sono "esperti del settore" che ancora la /predicano/.


...insomma, business as _usual_, no?


Loving, 380°

-- 
380° (Giovanni Biscuolo public alter ego)

«Noi, incompetenti come siamo,
 non abbiamo alcun titolo per suggerire alcunché»

Disinformation flourishes because many people care deeply about injustice
but very few check the facts.  Ask me about <https://stallmansupport.org>.

Attachment: signature.asc
Description: PGP signature

_______________________________________________
nexa mailing list
nexa@server-nexa.polito.it
https://server-nexa.polito.it/cgi-bin/mailman/listinfo/nexa

Reply via email to