• Language chooser
    • USA (English)
    • France (Français)

Realtek SDK Attack

Released: Mar 21, 2023


High Severity

Attack Type


Multiple issues in Realtek SDK causing supply chain risks

FortiGuard Labs continue to see Realtek SDK vulnerabilities being exploited in the wild with over 10,000+ average IPS detections per month to deploy and distribute Denial-of-service botnet malware such as new Hinata Botnet, RedGoBot, GooberBot and Marai based Botnet. Learn More »

Common Vulnerabilities and Exposures

CVE-2014-8361
CVE-2021-35394

Background

Realtek chipsets are found in many devices including, Communications Network devices, Computer Peripherals, Multimedia chips used across the industry. Two critical vulnerabilities which are actively exploited by the attackers are Realtek Jungle SDK CVE-2021-35394 which affects the 'MP Daemon' and 'UDPServer' by multiple memory corruption flaws and a relatively older vulnerability CVE-2014-8361 which affects the Realtek SDK's "miniigd" SOAP service. At least 65 vendors are affected by the critical vulnerabilities that enable unauthenticated attackers to fully compromise the target device and execute arbitrary code. Affected devices range from network devices such as residential gateways, routers, Wi-Fi repeaters, IP cameras to smart lightning gateways and connected toys. Some of the affected vendors includes, D-Link, LG, Belkin, Zyxel, Asus, Netgear etc.

Latest Development

Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.


April 24, 2015: Realtek SDK miniigd RCE (CVE-2014-8361) advisory was released as 0 day. https://www.zerodayinitiative.com/advisories/ZDI-15-155/
August 15, 2021: Realtek releases security advisory for Realtek Jungle SDK Remote Code Execution Vulnerability and provided fix for CVE-2021-35394
December 10, 2021: CISA adds Realtek Jungle SDK Remote Code Execution Vulnerability (CVE-2021-35394) to its known exploited vulnerability catalog


March 20, 2023: FortiGuard Labs researchers observe high exploitation attempts of Realtek vulnerabilities CVE-2021-35394 and CVE-2014-8361 and continued ongoing attacks.

Fortinet customers remain protected by IPS signature protections and Anti-malware detections throughout the security fabric. It is recommended that users apply patches to vulnerable devices impacted by Realtek SDK flaws.

FortiGuard Cybersecurity Framework

Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.


PROTECT
  • AV

  • AV (Pre-filter)

  • Behavior Detection

  • IPS

DETECT
  • IOC

  • Outbreak Detection

  • Threat Hunting

RESPOND
  • Assisted Response Services

  • Automated Response

RECOVER
  • InfoSec Services

IDENTIFY
  • Attack Surface Monitoring (Inside & Outside)

Threat Intelligence

Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.


Loading ...

Indicators of compromise Indicators of compromise
IOC Indicator List
Indicator Type Status
185.159.82.110 ip Active
77.246.157.180 ip Active
45.61.188.184 ip Active
37.0.11.132 ip Active
daef5417dd163c2d2600382a484b36f594378d909ce54e5... file Active
98fc6b2cbd04362dc10a5445c00c23c2a2cb39d24d91bea... file Active
2bfca0726b9109ab675e6bdbe0fb81e80fbf7ee6af2f129... file Active
171961046ee6d18424cf466ad7e01096aecf48ed602d872... file Active
1ce6590f632d1b37c77feefe60ef632c315357ddde632c0... file Active
0018e361be72a44b7b38bbecfede8d571418e56d4d62a8e... file Active
555ae4193c53af15bdcd82d534ed5f13fcc96c16c59b9e8... file Active
9bdb7d4778261bb34df931b41d32ee9188d0c7a7e10d4d6... file Active
924b6aec8aa5935e27673ee96d43dd0d1b60f044383b558... file Active
45.137.23.190 ip Active
103.145.13.25 ip Active
103.145.13.80 ip Active
185.222.59.5 ip Active
http://45.61.188.184/f.sh url Active
198.98.52.213 ip Active
209.141.51.43 ip Active
45.137.21.166 ip Active
45.95.55.24 ip Active
37.44.238.217 ip Active
149.5.173.33 ip Active
141.98.6.249 ip Active
37.44.238.148 ip Active
195.133.81.29 ip Active
20.249.89.181 ip Active
45.61.184.118 ip Active
45.61.184.133 ip Active
45.61.188.148 ip Active
3.235.28.168 ip Active
185.44.81.62 ip Active
147.182.132.144 ip Active
45.125.236.14 ip Active
69.67.150.36 ip Active
37.139.129.11 ip Active
37.139.129.11:80 ip Active
199.195.251.190 ip Active
45.95.55.218 ip Active
176.97.210.147 ip Active
http://176.97.210.135/assailant.mpsl url Active
ff8a1abcd4fa94ffc0f1f43a92f816e6bd08272ec54d748... file Active
163.123.143.226 ip Active
172.81.41.196 ip Active
78.135.85.70 ip Active
205.185.126.88 ip Active
163.123.143.200 ip Active
46.249.32.181 ip Active
141.98.6.249:80 ip Active
97878c28d915e2b56e7c06436d209a9198eb0c50bdfb1fd... file Active
edec8e8d4c2ec0c489e4c5dbb89994c223f29e8d4470825... file Active
3f8b5887ae0ef8b51845bf0f2996c4f9891cdc0724b7d0c... file Active
28d6dce95ffb8186ac8c611dee0681cca028bbf93365e4f... file Active
1a70ceb57768d3e027e307abd09548f151a8d6da72532f1... file Active
2ef3040947c9d51317e103457a6613ac9297cb610b3691e... file Active
e1d3adcb85298a08973b7ae6702cc4830d20ebde98e2eac... file Active
38.22.109.7 ip Active
185.216.71.157 ip Active
103.149.137.192 ip Active
135.148.104.21 ip Active
135.148.104.21:80 ip Active
103.149.137.124 ip Active
195.178.120.183 ip Active
103.207.38.165 ip Active
103.149.137.138 ip Active
45.13.227.115 ip Active
173.247.227.70 ip Active
5.253.246.67 ip Active
173.247.227.66 ip Active
2.58.113.79 ip Active
http://141.98.6.249/billy.sh url Active
2.58.113.79:80 ip Active
185.122.204.30 ip Active
37.44.238.178 ip Active
45.95.55.185 ip Active
37.44.238.144 ip Active
45.95.55.189 ip Active
45.95.55.188 ip Active
http://37.44.238.178/d/xd.mpsl url Active
http://45.140.141.205/bins/sora.mpsl url Active
198.98.56.129 ip Active
68.191.23.134 ip Active
57d39a6a88093c9e1fbc1626105d714be92680bdf666279... file Active
5967a4889b54b97adbb6b949ffd590fa416599326eb3432... file Active
http://zero.sudolite.ml/zero.sh url Active
sudolite.ml domain Inactive
198.98.56.129:13 ip Active
http://198.98.56.129/trc/TRC.mpsl url Active
79.137.202.177 ip Active
broilerchickensrs.boats domain Inactive
167.235.128.151 ip Active
5.188.230.231 ip Active
185.246.221.220 ip Active
185.112.83.254 ip Active
185.112.83.254:80 ip Active
mictobozo.duckdns.org domain Active
156.236.16.237 ip Active
156.236.16.237:80 ip Active
47.87.230.236 ip Active
Indicators of compromise Indicators of compromise
IOC Threat Activity

Last 30 days

Chg

Avg 0