TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

CVE-2022-41924 – tailscaled can be used to remotely execute code on Windows

755 pointsby ghuntleyover 2 years ago

27 comments

ghuntleyover 2 years ago
Technical write up by the security researcher at <a href="https:&#x2F;&#x2F;emily.id.au&#x2F;tailscale" rel="nofollow">https:&#x2F;&#x2F;emily.id.au&#x2F;tailscale</a><p>ps. she&#x27;s looking an employer rn &#x2F;&#x2F; hire her!
评论 #33696568 未加载
评论 #33700453 未加载
评论 #33698724 未加载
评论 #33696944 未加载
评论 #33697434 未加载
评论 #33707060 未加载
评论 #33702705 未加载
评论 #33697502 未加载
评论 #33696658 未加载
freedinosaurover 2 years ago
&gt; In theory, there is no path for a malicious Tailscale control plane to remotely execute code on your machine, unless you happen to run network services that are designed to allow it, like an SSH server with Tailscale-backed authentication.<p>Now I feel less crazy for not using Tailscale SSH for similar reasons.<p>I&#x27;d like to see a security evaluation of Tailscale, on a per feature basis.<p>I&#x27;d like to see tailscaled run with far fewer privileges.<p>Is there a Tailscale alternative that just does Wireguard + NAT traversal and doesn&#x27;t try to do key management?
评论 #33698744 未加载
评论 #33700860 未加载
评论 #33700494 未加载
评论 #33700732 未加载
评论 #33704634 未加载
评论 #33698534 未加载
评论 #33703729 未加载
评论 #33760417 未加载
评论 #33705098 未加载
meiboover 2 years ago
Do they have enough logs to reach out to people that were affected? As far as vulnerabilities go, this set is one is one of the worst ones I&#x27;ve seen this decade, and they seem rather straightforward.<p>Would be nice to get a blog post from them that goes a bit into impact, not just a report that tells you to update. It&#x27;s nice that they responded quickly, but I feel like this shouldn&#x27;t have happened in the first place for a network security company and it makes the Windows client feel like a bit of an afterthought. Looks like they have a PR open to switch it to named pipes, I hope that is properly reviewed by someone that knows Windows APIs before it&#x27;s merged.
评论 #33696239 未加载
评论 #33696332 未加载
评论 #33696235 未加载
评论 #33699319 未加载
评论 #33696676 未加载
semi-extrinsicover 2 years ago
Super interesting article, and TIL Firefox does not implement PNA (Private Network Access).<p>Does anyone know why? It seems like an obviously good thing to have.<p><a href="https:&#x2F;&#x2F;wicg.github.io&#x2F;private-network-access&#x2F;" rel="nofollow">https:&#x2F;&#x2F;wicg.github.io&#x2F;private-network-access&#x2F;</a>
评论 #33698412 未加载
评论 #33699521 未加载
评论 #33699588 未加载
评论 #33698260 未加载
cesarbover 2 years ago
&gt; If you run non-HTTPS web services on your Tailnet, and those services are unauthenticated or rely on Tailscale for authentication, implement an allowlist of expected HTTP Host headers to prevent malicious Javascript from accessing these services.<p>In my opinion, this should be done not only for non-HTTPS services, but for all services: the &quot;default&quot; virtual host (used where there is no Host header, or when it has an unexpected value) should have nothing except a static 4xx error page. This not only avoids DNS rebinding attacks, but also avoids automated attacks in which the attacker doesn&#x27;t know the correct hostname for the service (mostly automated scans for vulnerable PHP scripts and similar).
评论 #33697401 未加载
ev1over 2 years ago
The biggest shock to me here is &quot;aarch64 Windows doesn&#x27;t have calc.exe&quot;
amlutoover 2 years ago
I don&#x27;t see a writeup of how this was fixed. Merely checking the Host header is insufficient -- the vulnerability would still be wide open to anyone who can open TCP sockets to localhost.<p>Windows has APIs (named pipes, DCOM (eww) and such) that allow authenticated local access to services. Unixes have unix sockets.
评论 #33696580 未加载
评论 #33696360 未加载
评论 #33696718 未加载
snake_plisskenover 2 years ago
The concept of DNS rebinding and DNS records pointing to a private&#x2F;localhost IP address is particularly interesting and I remember when I first came across it in the wild. It&#x27;s not exactly re-binding in the classic attack sense described in the article: some US sportsbooks make you download a geolocation service that verifies your location in order to place bets. The sportsbook&#x27;s front end communicates with it through a DNS record pointing back to 127.0.0.1, and opens up a WebSocket to talk to the service. I imagine the WebSocket is used to bypass the same-origin policy but perhaps someone more knowledgeable can speak to that.
jakedataover 2 years ago
The client app is not indicating that 1.32.3 for Windows is available yet but the download link on the site has been updated.<p>Tailscale client downloads are extremely slow at the moment, so I suggest you distribute one copy manually around your tailnet rather than bogging down their servers even more.
评论 #33696109 未加载
评论 #33696271 未加载
cassianolealover 2 years ago
To potentially save you a click:<p><pre><code> Who is affected? All Windows clients prior to version v1.32.3 are affected.</code></pre>
0xbadcafebeeover 2 years ago
I really appreciate the Superfluous GraphViz.
评论 #33697206 未加载
mrjinover 2 years ago
Amazing. Was about to sign up but gave up after reading their T&amp;C.
looover 2 years ago
Heads up that I had to update through the UI twice - first brought me from 1.30.x 1.32.2, then second to 1.32.3.
zvrbaover 2 years ago
So, lazy developers using loopback device instead of platform-specific named pipes on windows.
say_it_as_it_isover 2 years ago
I&#x27;ve read the description several times and find it hard to follow:<p>..an attacker-controlled website visited by the node..rebinds DNS for the peer API to an attacker-controlled DNS server making peer API requests in the client, including accessing the node’s Tailscale environment variables
erosenbe0over 2 years ago
I enjoyed the explanation very much. Even though I don&#x27;t use mesh VPNs (yet), the architectural discussion of the vulnerability entailed numerous useful bits of background on browser and network infrastructure. Commendable work!
radicaldreamerover 2 years ago
They should immediately blacklist the affected client versions.
chaz6over 2 years ago
There does not appear to be a setting available to prevent known vulnerable clients from connecting to your tailnet.
a-dubover 2 years ago
i might be mistaken but i think there was something else weird about the windows loopback interface. i can&#x27;t remember what it was, but something like binding the loopback interface would bind on all interfaces by default maybe?
arc-in-spaceover 2 years ago
I... didn&#x27;t get an email? Very cool to find out by looking at hn
评论 #33698630 未加载
tailspin2019over 2 years ago
&gt; The speed and quality of Tailscale&#x27;s response to our report is unlike any vendor interaction I have experienced, and suggests a deep commitment to keeping their customers safe.<p>I have mixed feelings here as a Tailscale customer.<p>Yes a quick response is great, but this actual security issue is <i>pretty terrible</i> IMHO.<p>Anything other than an immediate response would have been akin to lighting their company on fire and walking away.
评论 #33696315 未加载
评论 #33697450 未加载
评论 #33696269 未加载
评论 #33698469 未加载
评论 #33696567 未加载
amlutoover 2 years ago
&gt; We can ask Tailscale to open a path on an SMB share. Windows being Windows, it will send your username (and a hash of your login password) to this server, unprompted, despite having no reason to consider the server trustworthy.<p>Wow, I used to think Linux security was miles ahead of Windows security <i>more than 20 years ago</i> because of insanity like this. Fast forward 20 years. NTLMv2 is common, so cracking a password actually requires guessing the entire password instead of just 8 characters. But password guesses are much cheaper, so we haven’t gained much.<p>Microsoft, how long will it take you to fix this <i>for real</i>? Opening a URL or UNC path should not, without an opt-in, authenticate at all. If configured to authenticate, it should prove, zero-knowledge, to the server that the supplied password (e.g. the logged-in user password) matches the server’s expected password. No further information should be leaked.
评论 #33704690 未加载
评论 #33701740 未加载
saghmover 2 years ago
I&#x27;m not sure I&#x27;ve ever seen a detailed technical writeup of a vulnerability before that started with such clear and concise instructions on the exact steps needed to defend against it at the start of the article before. In particular, making clear the priority of what to patch is excellent. If I&#x27;m a user of a product where a bug was found, I&#x27;m definitely interested in learning about what the bug was, how it was discovered, and whether I should be worried about other bugs in the future, but the absolute first thing I want is to do whatever I can to make sure I&#x27;m not affected by it. Listing what to patch and&#x2F;or change in code might be more &quot;boring&quot; than the narrative of how the bug was found, and it might spoil the surprise, but I think sometimes we focus so much on the fun of the process of finding the bugs or revel in the cleverness of an attack (and those things are fun!) that we forget that the real point to it is to make our stuff safer. There&#x27;s plenty of time for fun, but make sure you patch things first!
评论 #33697984 未加载
评论 #33697804 未加载
评论 #33697292 未加载
评论 #33698218 未加载
ferbivoreover 2 years ago
Releasing a patch and a detailed write-up on the same day seems like a bit of an unfortunate choice, especially for a WTF!! vulnerability like this. In software that doesn&#x27;t auto-update, no less...
评论 #33696990 未加载
评论 #33696330 未加载
评论 #33697297 未加载
评论 #33697155 未加载
ruudaover 2 years ago
&gt; If you visit my website, I am granted the honour and the privilege of executing arbitrary Javascript on your computer. &gt; &gt; This is a pretty bad idea<p>This is why I disable javascript by default, but I suspect that on this page it&#x27;s needed to fix the theme or something, because the text is light grey on a white background, and all monospace sections are completely illegible.<p>Edit: I don&#x27;t mean to hate on the author, the content of the article is really interesting!
评论 #33696864 未加载
评论 #33696869 未加载
评论 #33696910 未加载
nix23over 2 years ago
Was just a matter of time...and much more will come.
评论 #33697711 未加载
adam_arthurover 2 years ago
Does this mean we won’t get spammed with tailscale articles every day now?
评论 #33697391 未加载