Advertisement






WORM.WIN32.BUSAN.K / Insecure Communication Protocol

CVE Category Price Severity
CVE-XXXX-XXXX CWE-XX $1000 High
Author Risk Exploitation Type Date
Unknown High Remote 2021-04-25
CPE
cpe:cpe:/a:exploitalert:worm-win32-busan-k-insecure-communication-protocol
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021040137

Below is a copy:

WORM.WIN32.BUSAN.K / Insecure Communication Protocol
Discovery / credits: Malvuln - malvuln.com (c) 2021
Original source: https://malvuln.com/advisory/bcad7aa6cb6cb9d94377cd88acbca1c9.txt
Contact: [email protected]
Media: twitter.com/malvuln

Threat: Worm.Win32.Busan.k
Vulnerability: Insecure Communication Protocol
Description: Busan.k launches a windows cmd console on the infected host so that it can send and receive messages back and forth over TCP port 2121. The worm uses unencrypted plaintext socket communication allowing anyone who can sniff network traffic to read any communications sent or retrieved. This can disclose sensitive information to third-party well positioned attackers.
Type: PE32
MD5: bcad7aa6cb6cb9d94377cd88acbca1c9
Vuln ID: MVID-2021-0185
Dropped files: 
Disclosure: 04/23/2021


Exploit/PoC:
E.g. Wireshark to sniff communications.

1824.610339192.168.88.130192.168.88.128TCP6856103  2121 [PSH, ACK] Seq=1 Ack=1 Win=8212 Len=14
0000   00 XX XX XX XX XX 00 XX XX XX XX XX 08 00 45 00  ..).....)R....E.
0010   00 36 cc 00 40 00 80 06 00 00 c0 a8 58 82 c0 a8  [email protected]...
0020   58 80 db 27 08 49 3c 1a 3c 74 fc c1 08 dd 50 18  X..'.I<.<t....P.
0030   20 14 32 7c 00 00 70 61 73 73 77 64 20 61 62 63   .2|..passwd abc
0040   31 32 33 0a                                      123.

0000   00 XX XX XX XX XX 00 XX XX XX XX XX 08 00 45 00  ..)R....).....E.
0010   00 34 1e c4 40 00 80 06 a9 ac c0 a8 58 80 c0 a8  [email protected]...
0020   58 82 08 49 db 27 fc c1 08 dd 3c 1a 3c 82 50 18  X..I.'....<.<.P.
0030   08 05 50 dc 00 00 49 20 68 61 74 65 20 79 6f 75  ..P...I hate you
0040   0d 0a                                            ..

0000   00 XX XX XX XX XX 00 XX XX XX XX XX 08 00 45 00  ..).....)R....E.
0010   00 38 cc 02 40 00 80 06 00 00 c0 a8 58 82 c0 a8  [email protected]...
0020   58 80 db 27 08 49 3c 1a 3c 82 fc c1 08 e9 50 18  X..'.I<.<.....P.
0030   20 14 32 7e 00 00 49 20 68 61 74 65 20 79 6f 75   .2~..I hate you
0040   20 74 6f 6f 21 0a                                 too!.


Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum