Community discussions

MikroTik App
 
An5teifo
Frequent Visitor
Frequent Visitor
Topic Author
Posts: 89
Joined: Mon Dec 13, 2021 10:51 am
Location: Austria

xz Backdoor CVE-2024-3094

Tue Apr 02, 2024 9:14 am

Can someone confirm if MikroTik devices are vulnerable to the current SSH backdoor?
See here https://openssf.org/blog/2024/03/30/xz- ... 2024-3094/.

Althought the malware scans for .rpm or .deb packages in general it would be a good to know if MikroTiks SSH server relys on liblzma or not.
 
User avatar
Kanzler
Member Candidate
Member Candidate
Posts: 135
Joined: Wed Oct 05, 2022 6:55 pm
Location: Ukraine

Re: xz Backdoor CVE-2024-3094

Tue Apr 02, 2024 9:29 am

No, Mikrotik is not affected by this vulnerability.
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26825
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia
Contact:

Re: xz Backdoor CVE-2024-3094  [SOLVED]

Tue Apr 02, 2024 9:31 am

MikroTik software does not contain any of the vulnerable versions, but we are still doing a full audit and if anything changes, we will let everyone know.
Edit: this vulnerability has several other dependencies that would make it impossible to affect RouterOS, even if RouterOS did include the vulnerable xz version. So 100% not affected.
 
An5teifo
Frequent Visitor
Frequent Visitor
Topic Author
Posts: 89
Joined: Mon Dec 13, 2021 10:51 am
Location: Austria

Re: xz Backdoor CVE-2024-3094

Tue Apr 02, 2024 9:33 am

Great to hear.
Maybe this topic can be pinned somewhere for the next couple of days/weeks if someone else is raising this question?
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26825
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia
Contact:

Re: xz Backdoor CVE-2024-3094

Tue Apr 02, 2024 9:34 am

Done
 
User avatar
tangent
Forum Guru
Forum Guru
Posts: 1627
Joined: Thu Jul 01, 2021 3:15 pm
Contact:

Re: xz Backdoor CVE-2024-3094

Tue Apr 02, 2024 9:37 am

It beggars belief that this exploit could even in principle affect RouterOS. It's a an attack on the liblzma2 underlying the xz utility, and it only affects the patched version of sshd on systemd-based OSes like Debian, where they integrate with its notification system.

If any of that exists in RouterOS, any single other missing piece is enough to break the exploit. No xz, no systemd, no OpenSSH, no exploit.

That last is in significant doubt, if nothing else. RouterOS's SSH daemon identifies itself as "ROSSH", with unknown provenance, but if it were based on OpenSSH, then why did it take them so darn long to get Ed25519 support?
 
An5teifo
Frequent Visitor
Frequent Visitor
Topic Author
Posts: 89
Joined: Mon Dec 13, 2021 10:51 am
Location: Austria

Re: xz Backdoor CVE-2024-3094

Tue Apr 02, 2024 9:42 am

I also thought that RouterOS is not affected by this version but it makes sense if any CISO or other IT-related staff got the order to query if any product of MikroTik is vulnerable or not.

That's why it make sense from my point of view to highlight "we are not vulernable".
 
mada3k
Forum Veteran
Forum Veteran
Posts: 740
Joined: Mon Jul 13, 2015 10:53 am
Location: Sweden

Re: xz Backdoor CVE-2024-3094

Tue Apr 02, 2024 6:35 pm

I'm guessing ROSSH it's based on Dropbear
 
marekm
Member
Member
Posts: 411
Joined: Tue Feb 01, 2011 11:27 pm

Re: xz Backdoor CVE-2024-3094

Wed Apr 03, 2024 8:35 pm

While RouterOS may not be affected by this specific vulnerability, everyone should remember it's a dangerous supply chain attack - very well prepared over 2 years (by skilled and well funded professionals, probably secret services of some country, not just some random script kiddies) and only discovered because we were lucky this time and someone paid attention to little details (performance issues which most people might not even notice), the story (still being investigated and more things discovered) looks very interesting. There may be other vulnerabilities of similar kind as yet undiscovered, RouterOS too (just like a lot of other software we came to depend on) includes many software components, some of which could be maintained by overworked people who could fall victim to similar social engineering (accepting help from a rogue co-maintainer) as the original XZ maintainer. Good security practices are more important than ever, it's a never ending arms race.
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26825
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia
Contact:

Re: xz Backdoor CVE-2024-3094

Thu Apr 04, 2024 9:16 am

Well I hope everyone was inspired and did a double check on all Firewall rules, to make sure nothing can access the router from any untrusted network. If no packet can reach the router, even yet undiscovered vulnerabilities won't bother you.
 
nmt1900
Frequent Visitor
Frequent Visitor
Posts: 85
Joined: Wed Feb 01, 2017 12:36 am

Re: xz Backdoor CVE-2024-3094

Thu Apr 04, 2024 2:37 pm

One more common observation on that - if your device acts as VPN gateway then it is accessible from outside and that can pose its' own risks - recent sslvpn vulnerability in Fortigate devices can be a good example on that...
 
bratislav
Frequent Visitor
Frequent Visitor
Posts: 69
Joined: Mon May 05, 2014 10:36 am

Re: xz Backdoor CVE-2024-3094

Sat Apr 06, 2024 1:03 pm

Well I hope everyone was inspired and did a double check on all Firewall rules, to make sure nothing can access the router from any untrusted network. If no packet can reach the router, even yet undiscovered vulnerabilities won't bother you.
Unless malware connects to CC server which then takes control over the infected hosts in which case firewall is useless since connection is initiated from the LAN which is trusted...
 
bratislav
Frequent Visitor
Frequent Visitor
Posts: 69
Joined: Mon May 05, 2014 10:36 am

Re: xz Backdoor CVE-2024-3094

Sat Apr 06, 2024 1:11 pm

I'm guessing ROSSH it's based on Dropbear
Strictly speaking the attack is against systemd which is dependent on liblzma, regular upstream openssh (unpatched for systemd notify functionality) is not affected...
 
Guntis
MikroTik Support
MikroTik Support
Posts: 202
Joined: Fri Jul 20, 2018 1:40 pm

Re: xz Backdoor CVE-2024-3094

Mon Apr 08, 2024 3:03 pm

Our SSH is not based on 3rd party implementation.
 
ech1965
newbie
Posts: 37
Joined: Wed Mar 20, 2019 3:53 pm

Re: xz Backdoor CVE-2024-3094

Mon Apr 08, 2024 8:12 pm

Our SSH is not based on 3rd party implementation.
This is freaking ! Does that mean SSH server implementation is closed source developped in house ?
 
whatever
Member
Member
Posts: 362
Joined: Thu Jun 21, 2018 9:29 pm

Re: xz Backdoor CVE-2024-3094

Mon Apr 08, 2024 8:21 pm

That's scary. Doing security and crypto stuff from scratch is high risk, low reward.
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26825
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia
Contact:

Re: xz Backdoor CVE-2024-3094

Tue Apr 09, 2024 8:08 am

RouterOS is made since 1995, it's not like we started yesterday. A lot of RouterOS is made in-house.
 
User avatar
eworm
Forum Guru
Forum Guru
Posts: 1090
Joined: Wed Oct 22, 2014 9:23 am
Location: Oberhausen, Germany
Contact:

Re: xz Backdoor CVE-2024-3094

Tue Apr 09, 2024 8:25 am

The copyright notice says 1999 I think... 🙄
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26825
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia
Contact:

Re: xz Backdoor CVE-2024-3094

Tue Apr 09, 2024 8:25 am

RouterOS 2.0 was released then
 
bratislav
Frequent Visitor
Frequent Visitor
Posts: 69
Joined: Mon May 05, 2014 10:36 am

Re: xz Backdoor CVE-2024-3094

Tue Apr 09, 2024 11:01 am

Our SSH is not based on 3rd party implementation.
And more importantly in this particular case RouterOS doesn't use systemd as far I can tell, but does use xz (where malware is actually distributed) for npk archives so maybe you should check if what you are using is affected version...
 
infabo
Forum Guru
Forum Guru
Posts: 1370
Joined: Thu Nov 12, 2020 12:07 pm

Re: xz Backdoor CVE-2024-3094

Tue Apr 09, 2024 12:18 pm

systemd lol. Systemd alone is half a OS in the OS nowadays. And you can't put that new pest on a 16MB flash anyways :lol:
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26825
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia
Contact:

Re: xz Backdoor CVE-2024-3094

Tue Apr 09, 2024 3:01 pm

Our SSH is not based on 3rd party implementation.
And more importantly in this particular case RouterOS doesn't use systemd as far I can tell, but does use xz (where malware is actually distributed) for npk archives so maybe you should check if what you are using is affected version...
This comment is wrong. This malware DEPENDS on systemd and several other things. It does not function alone in xz.

- it only works on x86
- it relies on openssh service
- it relies on systemd patch for openssh
- there are further limitations I won't bother to list here
 
User avatar
tangent
Forum Guru
Forum Guru
Posts: 1627
Joined: Thu Jul 01, 2021 3:15 pm
Contact:

Re: xz Backdoor CVE-2024-3094

Tue Apr 09, 2024 6:10 pm

you can't put that new pest on a 16MB flash anyways :lol:

Turns out, you can, but that's about all you can get into that space:

$ rpm --queryformat='%6{SIZE:humaniec}  %{NAME}\n' -q systemd                      
   12M  systemd

I realize you're joking, but the on-topic point here for this thread is, "No, there is no systemd in RouterOS." Proof by reductio ad absurdum, given that some routeros-*.npk files are around 12 MiB already.
 
User avatar
andrewhi
just joined
Posts: 1
Joined: Thu Jan 04, 2024 3:10 am
Location: colombia

Re: xz Backdoor CVE-2024-3094

Thu Apr 11, 2024 6:02 am

I don't think it affects mikrotik equipment but be alert for any derivation, I share the link to the story xz Backdoor CVE-2024-3094
https://boehs.org/node/everything-i-kno ... z-backdoor

Who is online

Users browsing this forum: Bing [Bot], jaclaz and 77 guests