<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<p>Danke für den Hinweis!<br>
</p>
<p>Referenz bei Ubiquiti:<br>
<a class="moz-txt-link-freetext" href="https://community.ui.com/releases/Security-Advisory-Bulletin-018-018/cfa1566b-4bf8-427b-8cc7-8cffba3a93a4">https://community.ui.com/releases/Security-Advisory-Bulletin-018-018/cfa1566b-4bf8-427b-8cc7-8cffba3a93a4</a></p>
<p>Summary<br>
A vulnerability found in EdgeMAX EdgeRouter V2.0.9 and earlier
could allow a malicious actor to execute a man-in-the-middle
(MitM) attack during a firmware update. This vulnerability is
fixed in EdgeMAX EdgeRouter V2.0.9-hotfix.1 and later.<br>
</p>
<p>Link zum Firmware Update: Posted Tuesday, February 2nd, 2021
12:55 - also schon 4 Monate her, die meisten sollten mittlerweile
schon die neueste Firmware aktiv haben.<br>
<a class="moz-txt-link-freetext" href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-hotfix-1-security-update-2-0-9-hotfix-1/fff093d6-8a3b-4f3b-a68e-f8ac5d8dc9ef">https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-hotfix-1-security-update-2-0-9-hotfix-1/fff093d6-8a3b-4f3b-a68e-f8ac5d8dc9ef</a></p>
<p>Bugfixes<br>
[Security/DNS] - Fix dnspooq vulnerabilities in dnsmasq<br>
[Security/Upgrade] - Remove -k (aka --insecure) flag when
downloading firmware update via CLI with curl<br>
[SNMP] - Backport multiple snmpd memory leak fixes from upstream
(1st, 2nd and 3rd)<br>
[UNMS] - Fix memory leak in udapi-bridge process when UNMS is
enabled</p>
<p>Betrifft primär User die dnsmasq auf ihren EdgeRoutern verwenden.
Sollte dnsmasq nicht aktiv sein, ist man davon nicht betroffen.<br>
(Das heisst nicht, man sollte die Firmware nicht generell aktuell
halten. Nur als Hinweis dass es in Konfigurationen ohne dnsmasq,
wie es vmtl. die meisten sind in unserem Netz sind, weniger
dringlich ist.)</p>
<p>LG Christoph<br>
</p>
<div class="moz-cite-prefix">Am 20.05.2021 um 20:59 schrieb Stefan
Schultheis (home):<br>
</div>
<blockquote type="cite"
cite="mid:CAHanXmEotxEZjkUAHMHXuBMLq3aWvgoJPDzPqgyxNYkpVihRSw@mail.gmail.com">
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<div dir="auto">
<div dir="auto">Klingt, als sollten wir da rasch ein paar
Updates einspielen...</div>
<div dir="auto"><br>
</div>
<div dir="auto">∗∗∗ ZDI-21-601: Ubiquiti Networks EdgeOS
Improper Certificate Validation Remote Code Execution
Vulnerability ∗∗∗</div>
<div dir="auto">---------------------------------------------</div>
<div dir="auto">This vulnerability allows remote attackers to
execute arbitrary code on affected installations of Ubiquiti
Networks EdgeOS on EdgeRouter X, EdgeRouter Pro X SFP,
EdgeRouter 10X and EdgePoint 6-port routers. User interaction
is required to exploit this vulnerability in that an
administrator must perform a firmware update on the device.</div>
<div dir="auto">---------------------------------------------</div>
<div dir="auto"><a
href="http://www.zerodayinitiative.com/advisories/ZDI-21-601/"
target="_blank" rel="noreferrer" moz-do-not-send="true">http://www.zerodayinitiative.com/advisories/ZDI-21-601/</a></div>
<div dir="auto"><br>
</div>
<div dir="auto">LgS</div>
<div dir="auto"><br>
</div>
</div>
<br>
<fieldset class="mimeAttachmentHeader"></fieldset>
</blockquote>
</body>
</html>