RESOURCES

Thought leaders in information security, we conduct radical, world-changing research and deliver renowned presentations around the world.
Disclosures | ADVISORIES | April 14, 2015

Lenovo System Update Multiple Privilege Escalations

CVE-2015-2219 Local, least-privileged users can run commands as the SYSTEM user. CVE-2015-2233 Local and potentially remote attackers can bypass signature validation checks and replace trusted Lenovo applications with malicious applications. CVE-2015-2234 Local, unprivileged users can run commands as an administrative user.

Launch PDF
Sofiane Talmat & Michael Milvich
Disclosures | ADVISORIES | December 9, 2014

X Font Service Protocol Handling Issues in libXfont Library

Ilja van Sprundel, an IOActive security researcher, discovered several issues in the way the libXfont library handles the responses it receives from XFS servers. Mr. van Sprundel has worked with X.Org’s security team to analyze, confirm, and fix these issues. Most of these issues stem from libXfont trusting the font server to send valid protocol data and not verifying that the values will not overflow or cause other damage. This code is commonly called from the X server when an X Font Server is active in the font path, so…

Launch PDF
Ilja van Sprundel
Disclosures | ADVISORIES | November 1, 2014

Facebook Access Token Sent in Plaintext

Attackers can steal Facebook access tokens to impersonate Facebook users and perform malicious actions that include, but are not limited to, posting content on behalf of users and accessing friend lists.

Launch PDF
Ariel Sanchez
Disclosures | ADVISORIES | October 21, 2014

OpenBSD ≤ 5.5 Local Kernel Panic

A non-privileged use could cause a local Denial-of-Service (DoS) condition by triggering a kernel panic through a malformed ELF executable.

Launch PDF
Alejandro Hernandez
Disclosures | ADVISORIES | July 1, 2014

Belkin WeMo Home Automation Vulnerabilities

The WeMo devices connect to the Internet using the STUN/TURN protocol. This gives users remote control of the devices and allows them to perform firmware updates from anywhere in the world. A generated GUID is the primary source of access control. WeMo also uses a GPG-based, encrypted firmware distribution scheme to maintain device integrity during updates. Unfortunately, attackers can easily bypass most of these features due to the way they are currently implemented in the WeMo product line. The command for performing firmware updates is initiated over the Internet from…

Launch PDF
Mike Davis
Disclosures | ADVISORIES | July 1, 2014

Steam Client Creates World-writable Shell Script

While performing a routine world-writable file scan, one of IOActive’s consultants discovered that the Steam Client for Mac OS X creates world-writable shell scripts when installing games.

Launch PDF
Ilja van Sprundel
Disclosures | ADVISORIES | July 1, 2014

OleumTech Wireless Sensor Network Vulnerabilites

OleumTech has manufactured industrial wireless solutions for almost 15 years, providing visibility to disparate assets for major Oil & Gas producers for near real-time optimization decisions, resource deployment, and regulatory compliance. OleumTech also manufacturers industrial automation systems that represents the new paradigm of remote monitoring and control for industries, such as Oil & Gas, Refining, Petro-chemical, Utilities, and Water/Wastewater. In June 2013, IOActive Labs reported four critical vulnerabilities in OleumTech’s wireless sensor network to ICS-CERT. To date, IOActive Labs is not aware of any fixes released by OleumTech.

Launch PDF
Lucas Apa & Carlos Penagos

Commonalities in Vehicle Vulnerabilities

2022 Decade Examination Update | With the connected car now commonplace in the market, automotive cybersecurity has become the vanguard of importance as it relates to road user safety. IOActive has amassed over a decade of real-world vulnerability data illustrating the issues and potential solutions to cybersecurity threats today’s vehicles face.

This analysis is a major update and follow-up to the vehicle vulnerabilities report originally published in 2016 and updated in 2018. The goal of this 2022 update is to deliver current data and discuss how the state of automotive cybersecurity has progressed over the course of 10 years, making note of overall trends and their causes.

ACCESS THE REPORT


IOACTIVE CORPORATE OVERVIEW (PDF)IOACTIVE SERVICES OVERVIEW (PDF)


IOACTIVE ARCHIVED WEBINARS