Highlight an existing memory-based exploit and how RunSafe would prevent it from working.

In this video, we explore how RunSafe Security prevents memory-based exploits, focusing on CVE-2020-8597. This vulnerability in the Point-to-Point Protocol Daemon (PPPD) affects multiple versions and is common in various embedded Linux distributions. Discover how RunSafe provides security for your systems, effectively mitigating these critical threats.

Understanding and Mitigating Memory-Based Exploits with RunSafe

CVE-2020-8597 is a critical buffer overflow vulnerability found in the Point-to-Point Protocol Daemon (PPPD), affecting versions 2.4.2 to 2.4.8. This exploit is especially dangerous due to the widespread use of PPPD in many embedded Linux distributions, including Debian and Ubuntu. Despite the seemingly small range of affected versions, this vulnerability poses a significant threat because the software is a stable stack that doesn’t receive frequent updates. Consequently, it has been around for 17 years, embedding itself in numerous systems.

PPPD’s vulnerability is a classic buffer overflow, allowing attackers to execute arbitrary code and take control of the system. The severity of this exploit is underscored by its CVSS V3 score of 9.8, classifying it as critical. Notably, the vulnerability affects not just a few software versions but also over 19 vendors, including Siemens, Wind River Linux, Sierra Wireless, OpenWRT, and even Android.

What makes this exploit particularly dangerous is its simplicity. Some Linux-based builds, like Yocto and Wind River, lack basic protections such as compiling with position-independent code, making exploitation straightforward. Reliable working exploits for this vulnerability are readily available online, posing a significant risk to unprotected systems.

RunSafe addresses these critical vulnerabilities by removing the attacker’s ability to execute return-oriented programming (ROP) gadgets. This method ensures that even if a buffer overflow exists, the attacker cannot run arbitrary code in the process space. By deploying RunSafe’s solutions, vulnerabilities like CVE-2020-8597 are effectively mitigated.

How RunSafe Protects VxWorks Systems from URGENT/11 Exploits

How RunSafe Protects VxWorks Systems from URGENT/11 Exploits

Stopping URGENT/11 Attacks with RunSafe Protect In this demo, we show how RunSafe Protect defends VxWorks-based embedded systems from URGENT/11 memory safety exploits. You’ll see a vulnerable system challenged by a simulated attack and then observe how RunSafe’s...

read more
RunSafe Security in 2 Minutes: Protecting Critical Software

RunSafe Security in 2 Minutes: Protecting Critical Software

Inside RunSafe: A Quick Look at Our Mission, Platform, and Impact RunSafe Security is dedicated to protecting the world’s most critical software across defense, infrastructure, automotive, and medical systems. In this video, you’ll see how our platform delivers a...

read more