Critical Vulnerability In Nintendo 3DS Console Could Allow MiTM Attacks

A researcher discovered a highly critical vulnerability affecting the Nintendo 3DS console. Exploiting this bug could allow an adversary to MiTM attacks against gamers. The researcher won a hefty $12K+ bounty for reporting this bug.

Nintendo 3DS Vulnerability

Reportedly, a security researcher discovered a critical security flaw affecting the now-discontinued Nintendo 3DS handheld gaming console.

The vulnerability resided in the Nintendo 3DS handling of digital certificates. Specifically, due to improper certificate validation, it became possible for an adversary to spoof certificates and perform man-in-the-middle MiTM attacks.

As described in the bug report,

The SSL system module does not properly validate the x509 certificates when establishing an SSL/TLS connection. Actually, the SSL system module does not check the signatures when validating a certificate chain, allowing anyone to forge fake certificates and perform MitM attacks or spoof trusted servers.

Exploiting this flaw could result in dangerous consequences as an adversary could spoof any server to trick the target gamer. This includes spoofing eShop servers and extract user information, spoof connection to game servers, or simply perform MiTM for spying on communications and stealing data.

This vulnerability affected all Nintendo 3DS consoles with firmware version 11.13 or below. It received a critical severity rating with a score of 9-10.

$12K Bounty Awarded

After discovered the vulnerability in June 2020, the researcher reported the matter to Nintendo via their HackerOne bug bounty program.

Consequently, Nintendo worked on a patch to address the bug. Eventually, they deployed the patch with the release of Nintendo 3DS firmware version 11.14, as the researcher told The Daily Swig.

So, users of Nintendo 3DS must ensure updating their devices with the latest firmware version to stay protected.

Besides patching the bug, Nintendo also awarded the researcher with a hefty bounty of $12,168.

The researcher has named this exploit “SSLoth” about which, he has shared the technical details on GitHub here.

Related posts

Google Cloud To Implement MFA as a Mandatory Feature

Opera Browser Vulnerability Could Allow Exploits Via Browser Extensions

Hard-Coded Credentials Vulnerability Found In Kubernetes Image Builder