Security Advisory – Firmware extraction and Hardware SSL Pinning Bypass

TitleSecurity Advisory – Firmware extraction and Hardware SSL Pinning Bypass
Release Date8/10/2024
AbstractAn attacker can extract the firmware and can analyze the firmware to further exploit other vulnerabilities such as
• Decrypt TLS communication of device and cloud.
• Extract secrets to clone the device.
cveid:CVE-2024-7206
Affected ProductZigbee Bridge Pro
Affected Version2.0.0 and before
ImpactAttackers can use this vulnerability to decrypt the interaction information between the device and the service, analyze the behavior of the device, and obtain the private information of the hardware, so as to further attack the device, such as cloning the device.
Technical DetailsExploitation Preconditions:
1、Disassemble the device.
2、Connect the device to the pc through the serial port.

Technical Details:
After the attacker connects the device, the firmware can be exported through the tool. By analyzing the firmware binary content, the attacker can modify the firmware content to replace the certificate with the one signed by the attacker. The firmware is then repackaged and written to the device, enabling man-in-the-middle hijacking and obtaining the encrypted content of the interaction between the device and the server.
ResolutionUpgrade to firmware 2.1.0 and above

This website use cookies to ensure you get the best experience on our website.