share_log

Popular Browsers Chrome, Safari, And Firefox Fall Prey To Major 18-Year-Old Security Hole That Allows Hackers To Infiltrate Firewalls: Report

Popular Browsers Chrome, Safari, And Firefox Fall Prey To Major 18-Year-Old Security Hole That Allows Hackers To Infiltrate Firewalls: Report

流行瀏覽器 Chrome、Safari 和 Firefox 落入重大18年安防漏洞之手,允許黑客滲透防火牆:報告
Benzinga ·  04:26

A significant security loophole has been exploited in major browsers, including Apple Inc.'s (NASDAQ:AAPL) Safari, Alphabet Inc.'s (NASDAQ:GOOG) (NASDAQ:GOOGL) Google Chrome, and Mozilla's Firefox. This vulnerability, present for nearly two decades, has allowed hackers to infiltrate private networks, even those protected by firewalls.

包括蘋果公司(NASDAQ:AAPL)的Safari、Alphabet公司(NASDAQ:GOOG)(NASDAQ:GOOGL)的Google Chrome和Mozilla的Firefox等主流瀏覽器都存在一個嚴重的安防-半導體漏洞。這個漏洞已經存在了近20年之久,使黑客能夠滲透私有網絡,即使是由防火牆保護的網絡也無法倖免。

What Happened: The issue stems from the way these browsers process queries to a 0.0.0.0 IP address. These queries are redirected to other IP addresses, including "localhost," a server typically used for testing code in a private setting, reported Forbes.

事件起因:這些瀏覽器處理到0.0.0.0 IP地址的請求的方式存在安全漏洞。據《福布斯》報道,這些請求將被重定向到其他IP地址,包括「localhost」,這是一個通常用於在私有環境中測試代碼的服務器。

Israeli cybersecurity startup Oligo discovered that hackers have been exploiting this vulnerability to gain access to private data. The attack, known as a "0.0.0.0-day" attack, involves luring the target into visiting a seemingly innocuous website that sends a malicious request to access files via 0.0.0.0.

以色列網絡安全初創公司Oligo發現黑客一直在利用這個漏洞來獲取私人數據。這種襲擊被稱爲「0.0.0.0-day」攻擊,它涉及到引誘目標訪問一個看起來無害的網站,該網站通過0.0.0.0發送惡意請求以訪問文件。

"Developer code and internal messaging are good examples of some of the info that can be accessed right away," stated Avi Lumelsky, an AI security researcher at Oligo.

Oligo的人工智能安全研究員阿維·盧梅爾斯基表示:「開發人員代碼和內部消息是可以立即訪問的一些信息的良好示例。」

"But more importantly, exploiting 0.0.0.0-day can let the attacker access the internal private network of the victim, opening a wide range of attack vectors," added Lumelsky.

盧梅爾斯基補充說:「更重要的是,利用0.0.0.0-day可以讓攻擊者訪問受害者的內部私有網絡,打開了廣泛的攻擊向量。」

Apple has confirmed to Forbes that it plans to block all attempts by websites to access 0.0.0.0 in the macOS 15 Sequoia beta. Google's Chromium and Chrome security teams are also considering a similar move, according to online posts, the report noted.

蘋果已經向《福布斯》確認,它計劃在macOS 15 Sequoia beta中阻止所有網站訪問0.0.0.0。根據在線文章,《福布斯》報道稱,Google的Chromium和Chrome安全團隊也正在考慮類似的舉措。

Subscribe to the Benzinga Tech Trends newsletter to get all the latest tech developments delivered to your inbox.

訂閱Benzinga Tech Trends電子報,獲取最新技術動態。

On the other hand, Mozilla has not yet introduced a solution in Firefox, citing concerns that blocking 0.0.0.0 could disrupt servers that use the address as a substitute for localhost.

另一方面,Mozilla尚未在Firefox中引入解決方案,稱擔心阻止0.0.0.0可能會影響使用該地址作爲localhost替代品的服務器。

Apple, Google, and Mozilla did not immediately respond to Benzinga's request for comments.

蘋果、Google和Mozilla未立即回覆本文章記者的置評請求。

Notably, Microsoft Corp.'s (NASDAQ:MSFT) Windows systems are immune to this attack as the tech giant has blocked 0.0.0.0 on its operating system.

值得注意的是,微軟公司(NASDAQ:MSFT)的Windows系統對這種攻擊是免疫的,因爲這家技術巨頭已經在其操作系統上阻止了0.0.0.0。

The researchers are scheduled to present their findings at the DEF CON conference in Las Vegas this weekend.

安全研究人員計劃在本週末在拉斯維加斯召開的DEF CON會議上介紹他們的發現。

Why It Matters: The IP address 0.0.0.0 is a non-routable IPv4 address with several uses, primarily as a default or placeholder address.

這個IP地址0.0.0.0是一個不可路由的IPv4地址,有多種用途,主要作爲默認地址或佔位符地址。

The Internet Engineering Task Force defines the IP address 0.0.0.0 as a reserved, special-purpose address for "this host, this network," according to TechTarget.

根據TechTarget的說法,互聯網工程任務組定義IP地址0.0.0.0爲「本主機,本網絡」保留的專用地址。

Despite its valid address syntax, a client device using it as a source IP address cannot communicate on a network. This makes exploiting this address by hackers a significant concern, as it allows them to breach private networks undetected.

儘管這是一個有效的地址語法,但使用它作爲源IP地址的客戶端設備無法在網絡上通信。這使得黑客利用這個地址成爲一個重大的問題,因爲它可以讓他們不被發現地侵犯私有網絡。

Check out more of Benzinga's Consumer Tech coverage by following this link.

請點擊此鏈接查看更多有關Benzinga的消費科技報道。

  • Why Tim Cook Should Be Worried About Google's Recent Antitrust Case Loss
  • 爲什麼tim cook應該擔心谷歌最近的反壟斷案敗訴

Disclaimer: This content was partially produced with the help of AI tools and was reviewed and published by Benzinga editors.

免責聲明:本內容部分使用人工智能工具生成,並經Benzinga編輯審核發佈。

Photo courtesy: Unsplash

圖片來源:Unsplash

声明:本內容僅用作提供資訊及教育之目的,不構成對任何特定投資或投資策略的推薦或認可。 更多信息
    搶先評論