This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

CC3120: Support on Cyber security failures on CC3120 NWP

Part Number: CC3120
Other Parts Discussed in Thread: UNIFLASH,

We have an  embedded system with the CC3120 NWP is fully functional for webHMI communication (tried with multiple options)

Two serious flaws were discovered during the product's cyber security test (via wifi).

 

  1. Device is unable to manage a storm of packets - It was seen that after an IP flooding test, the device goes down and does not come back up.

device was responding to ICMP packets when it was flooded with IP packets at 5000kBps but after the test, the device went down permanently and did not

recover back up

 

2.After/during the BurpActive Scan, the web application was unresponsive.

It was discovered during the burp active scan that a web application was not responding, and a manual reboot was needed to restore it back to its original state. The request cannot be handled by the server at this time.

 

Project Related Details  & Device Environment details:

MCU : K61 from Freescale

RTOS : MQX 4.2

NWP : 3.10.0.5

WIFI Chip : CC3120

 

It is ok be in ideal state , but here a manual reboot is required to bring back the system which is totally unacceptable  based on the criticality of system.

Could you please give us some solution to tackle above issues ASAP.

  • Hi,

    Your  ServicePack is very old (3.10.0.5 from Jan 2019). At first step update to latest ServicePack (you can downland it from CC32xx SDK webpage) and maybe SDK too.

    With such old SerivcePack your device may to be affected by know CVEs (e.g.   vulnerability from FragAttack family, CVE-2021-21966, CVE-2021-22677, etc.).

    Jan

  • we now using the ServicePack  sp_3.16.0.1_2.0.0.0_2.2.0.7.bin even then the issue exist .

    With the latest version I should consider to resolve these  cyber security issues ? 

  • Hi,

    About vulnerabilities which I mentioned see TI PSIRT webpage. But SP 3.16 is still more than two years old (It is not a best idea produce new devices with such old SP).

    Hard to say what is gonging on according your first post. I think you will need to prepare more detail report including your test setup and NWP log (SWRU455 chapter 20). Because this behaviour may to be related to your host code (e.g. not properly handled return codes from sl_ API or asynchronous handlers). Please prepare that detail report and wait for answer from TI side. They will provide you way how securely send this information to them.

    Jan

  • Could you please provide the link for latest version of CC3120 wifi  NWP? we are using sp_3.16.0.1_2.0.0.0_2.2.0.7.bin 

    And once we order the module for production with which version it will come/ and how to update that version, is it with same uniflash tool?

  • Hi,

    Latest ServicePack for CC3120 you find inside CC32xx SDK (simplelink_cc32xx_sdk_6_10_00_05 / tools / cc32xx_tools / servicepack-cc3x20 ). Latest versions is 3.22 now (2022-05-12).

    It is likely that CC3120 will come with some older version of SP (depends on manufacturing date, supply chain, etc.). It it is your responsibility to update service pack during production. For update of ServicePack you can use Uniflash, Embedded programming, Ganag programming or programming from your host MCU. For more details see production line guide (guide is for CC3120 QFN but for CC3120MOD it works by similar way).

    Jan