CVE-2024-7490: Urgent Warning for IoT Devices Using Microchip ASF, No Patch Available
The latest vulnerability disclosure identifies a significant security flaw in the Microchip Advanced Software Framework (ASF), specifically within its tinydhcp server implementation. This vulnerability, designated CVE-2024-7490, exposes IoT devices using the ASF to severe risks, including remote code execution (RCE), with a CVSS score of 9.5, indicating its critical nature.
The tinydhcp server, a vital component of ASF’s DHCP functionality, has been found to suffer from a stack-based overflow vulnerability. This flaw results from improper input validation, which allows an attacker to send a specially crafted DHCP request, triggering a buffer overflow that can ultimately enable arbitrary code execution.
The affected software, ASF 3.52.0.2574, and all prior versions are vulnerable, presenting an immediate concern for IoT devices relying on this framework. Since the vendor no longer supports ASF, no patch is currently available. The CERT Coordination Center (CERT/CC) has issued an advisory highlighting the seriousness of the CVE-2024-7490 flaw, especially considering its widespread use in IoT devices.
ASF’s tinydhcp implementation has become embedded in numerous IoT ecosystems. The issue is particularly concerning because the affected code is found in publicly available examples across various repositories, including GitHub, meaning forks of the original project are also at risk.
Given the nature of IoT deployments, where devices often operate in uncontrolled or insecure networks, this vulnerability’s potential impact is vast. Attackers can exploit the flaw by sending a single malicious DHCP Request packet to a multicast address, leading to an overflow that crashes the system or enables remote execution of malicious code. Devices in industrial control systems, smart home environments, and other critical infrastructure could be compromised, resulting in both data breaches and service disruptions.
The Internet of Things (IoT) has rapidly become a cornerstone of modern infrastructure. From smart homes to connected medical devices, the reliance on secure communication protocols like DHCP is critical. The fact that this vulnerability resides in a protocol that facilitates device network communication heightens its severity. Unlike traditional devices, many IoT devices are often left unpatched for extended periods, increasing the attack surface for bad actors.
Further complicating matters is the fragmented nature of the IoT ecosystem, where devices often rely on outdated or unsupported software frameworks like ASF. In this case, since Microchip has ceased support for the ASF platform, developers and device manufacturers are left without an official patch or fix, compounding the risk.
The CERT/CC advisory on this vulnerability notes that there is no immediate practical solution aside from replacing the vulnerable tinydhcp implementation with an alternative service. As of now, no official patches have been released for the affected ASF versions. The recommendation for developers and device manufacturers is to migrate away from tinydhcp and explore more secure alternatives that are actively supported.