Flaws in Winston Privacy Devices Can Expose Networks to Remote Attacks


Researchers say they’ve uncovered a collection of doubtless severe vulnerabilities in units made by on-line privateness agency Winston Privateness. The seller has launched patches which might be mechanically being despatched to units.

Winston Privateness gives a hardware-based service designed to spice up on-line privateness and safety. The corporate says it may possibly block on-line surveillance, speed up looking, and block advertisements and trackers, and it additionally advertises its providers as a substitute for conventional VPNs.

A marketing consultant at offensive safety testing firm Bishop Fox and an unbiased researcher found a complete of 9 vulnerabilities within the system offered by Winston Privateness to clients. Lots of the flaws have been assigned a severity ranking of vital or excessive.

The forms of safety holes recognized within the system embody command injection, cross-site request forgery (CSRF), improper entry management, insecure cross-origin useful resource sharing (CORS), default credentials, inadequate authorization controls, and undocumented SSH providers.

They are often exploited for arbitrary code execution, privilege escalation, altering system settings and launching DoS assaults.

Chris Davis, the Bishop Fox researcher credited for locating the vulnerabilities, informed SecurityWeek that an attacker may exploit a few of these weaknesses to hack a Winston Privateness system remotely from the web by convincing the focused consumer to entry a malicious webpage.

“Alternatively, if an attacker was on the native space community, an unauthenticated API request would additionally compromise the system,” Davis defined.

Justin Paglierani, the unbiased researcher credited for locating the vulnerabilities, defined that profitable exploitation of the failings may give an attacker root entry to a tool.

“In some configurations, this may enable an unauthenticated attacker direct entry to your inner community, bypassing NAT, firewalls, and so forth,” Paglierani mentioned by way of e mail. “In different configurations, it could enable an attacker to intercept any unencrypted visitors passing by means of the system.”

The vulnerabilities have been reported to Winston Privateness in July they usually have been patched final week with the discharge of model 1.5.8. Firmware updates containing the patches are mechanically despatched to units and customers don’t must take any motion.

Bishop Fox has revealed an advisory with technical particulars for every of the recognized vulnerabilities.

Associated: Excessive Danger Vulnerabilities Addressed in Massive Monitoring Material

Associated: Probably Critical Vulnerability Present in Well-liked WYSIWYG editor TinyMCE

view counter

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He labored as a highschool IT trainer for 2 years earlier than beginning a profession in journalism as Softpedia’s safety information reporter. Eduard holds a bachelor’s diploma in industrial informatics and a grasp’s diploma in laptop strategies utilized in Electrical engineering

Earlier Columns by Eduard Kovacs:

You May Also Like