-
Remote Mouse App 0 day 취약점 발견보안 2021. 5. 10. 19:53반응형
모바일 기기를 마우스로 사용하게 해주는 앱에 취약점이 발견되었다
play.google.com/store/apps/details?id=com.hungrybolo.remotemouseandroid&hl=ko&gl=US
Remote Mouse - Google Play 앱
휴대폰이나 태블릿을 무선 마우스와 키보드로 사용할 수 있어요
play.google.com
apps.apple.com/kr/app/remote-mouse/id385894596
Remote Mouse
Remote Mouse™를 이용하면 iPhone이나 iPad로 컴퓨터를 원격 조정할 수 있습니다. Remote Mouse가 무선 마우스와 키보드, 터치패드의 기능을 그대로 구현하면서 Media Remote, Application Switcher, Web Browsing Remo
apps.apple.com
Mouse Trap
Six CVEs including a 0-click RCE on the latest version of RemoteMouse giving you full access to someone’s computer at the logged-on user’s privilege level.
axelp.io
CVE-2021-27569:
An issue was discovered in Emote Remote Mouse through 3.015. Attackers can maximize or minimize the window of a running process by sending the process name in a crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27570:An issue was discovered in Emote Remote Mouse through 3.015. Attackers can close any running process by sending the process name in a specially crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27571:An issue was discovered in Emote Remote Mouse through 3.015. Attackers can retrieve recently used and running applications, their icons, and their file paths. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27572:An issue was discovered in Emote Remote Mouse through 3.015. Authentication Bypass can occur via Packet Replay. Remote unauthenticated users can execute arbitrary code via crafted UDP packets even when passwords are set.
CVE-2021-27573:An issue was discovered in Emote Remote Mouse through 3.015. Remote unauthenticated users can execute arbitrary code via crafted UDP packets with no prior authorization or authentication.
CVE-2021-27574:An issue was discovered in Emote Remote Mouse through 3.015. It uses cleartext HTTP to check, and request, updates. Thus, attackers can machine-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings.
결국 0 day 취약점을 이용하여
실행중인 프로세서의 창 최대화, 최소화, 종료, 경로, 아이콘 정보를 수집할 수 있고
결정적으로 임의의 코드를 실행하고 악성바이너리 다운을 위한 중간자 공격이 가능하다는 것이다
빨리 업데이트가 제공되길 바라며 그전에는 사용하는 것을 자제해 주시길
반응형'보안' 카테고리의 다른 글
아이폰 wifi 버그(disable wifi) (0) 2021.06.21 웹페이지 인증을 믿으면 안되는 이유(크롬 개발자 모드 편집) (0) 2021.06.06 Shodan 검색 키워드 및 예제 (0) 2021.04.26 Facebook 개인정보 유출, 확인, 대응 (0) 2021.04.09 iOS 14.4.2 업데이트 (0) 2021.03.27