Vulnerabilities – INDIA NEWS https://www.indiavpn.org News Blog Tue, 09 Apr 2024 14:26:07 +0000 en-US hourly 1 https://wordpress.org/?v=6.7 Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access https://www.indiavpn.org/2024/04/09/researchers-discover-lg-smart-tv-vulnerabilities-allowing-root-access/ https://www.indiavpn.org/2024/04/09/researchers-discover-lg-smart-tv-vulnerabilities-allowing-root-access/#respond Tue, 09 Apr 2024 14:26:07 +0000 https://www.indiavpn.org/2024/04/09/researchers-discover-lg-smart-tv-vulnerabilities-allowing-root-access/ [ad_1]

Apr 09, 2024NewsroomVulnerability / IoT Security

LG Smart TV Vulnerabilities

Multiple security vulnerabilities have been disclosed in LG webOS running on its smart televisions that could be exploited to bypass authorization and gain root access on the devices.

The findings come from Romanian cybersecurity firm Bitdefender, which discovered and reported the flaws in November 2023. The issues were fixed by LG as part of updates released on March 22, 2024.

The vulnerabilities are tracked from CVE-2023-6317 through CVE-2023-6320 and impact the following versions of webOS –

  • webOS 4.9.7 – 5.30.40 running on LG43UM7000PLA
  • webOS 5.5.0 – 04.50.51 running on OLED55CXPUA
  • webOS 6.3.3-442 (kisscurl-kinglake) – 03.36.50 running on OLED48C1PUB
  • webOS 7.3.1-43 (mullet-mebin) – 03.33.85 running on OLED55A23LA
Cybersecurity

A brief description of the shortcomings is as follows –

  • CVE-2023-6317 – A vulnerability that allows an attacker to bypass PIN verification and add a privileged user profile to the TV set without requiring user interaction
  • CVE-2023-6318 – A vulnerability that allows the attacker to elevate their privileges and gain root access to take control of the device
  • CVE-2023-6319 – A vulnerability that allows operating system command injection by manipulating a library named asm responsible for showing music lyrics
  • CVE-2023-6320 – A vulnerability that allows for the injection of authenticated commands by manipulating the com.webos.service.connectionmanager/tv/setVlanStaticAddress API endpoint

Successful exploitation of the flaws could allow a threat actor to gain elevated permissions to the device, which, in turn, can be chained with CVE-2023-6318 and CVE-2023-6319 to obtain root access, or with CVE-2023-6320 to run arbitrary commands as the dbus user.

LG Smart TV Vulnerabilities

“Although the vulnerable service is intended for LAN access only, Shodan, the search engine for Internet-connected devices, identified over 91,000 devices that expose this service to the Internet,” Bitdefender said. A majority of the devices are located in South Korea, Hong Kong, the U.S., Sweden, Finland, and Latvia.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/04/09/researchers-discover-lg-smart-tv-vulnerabilities-allowing-root-access/feed/ 0
Microsoft’s March Updates Fix 61 Vulnerabilities, Including Critical Hyper-V Flaws https://www.indiavpn.org/2024/03/13/microsofts-march-updates-fix-61-vulnerabilities-including-critical-hyper-v-flaws/ https://www.indiavpn.org/2024/03/13/microsofts-march-updates-fix-61-vulnerabilities-including-critical-hyper-v-flaws/#respond Wed, 13 Mar 2024 06:15:15 +0000 https://www.indiavpn.org/2024/03/13/microsofts-march-updates-fix-61-vulnerabilities-including-critical-hyper-v-flaws/ [ad_1]

Mar 13, 2024NewsroomPatch Tuesday / Software Update

Microsoft Updates

Microsoft on Tuesday released its monthly security update, addressing 61 different security flaws spanning its software, including two critical issues impacting Windows Hyper-V that could lead to denial-of-service (DoS) and remote code execution.

Of the 61 vulnerabilities, two are rated Critical, 58 are rated Important, and one is rated Low in severity. None of the flaws are listed as publicly known or under active attack at the time of the release, but six of them have been tagged with an “Exploitation More Likely” assessment.

The fixes are in addition to 17 security flaws that have been patched in the company’s Chromium-based Edge browser since the release of the February 2024 Patch Tuesday updates.

Topping the list of critical shortcomings are CVE-2024-21407 and CVE-2024-21408, which affect Hyper-V and could result in remote code execution and a DoS condition, respectively.

Microsoft’s update also addresses privilege escalation flaws in the Azure Kubernetes Service Confidential Container (CVE-2024-21400, CVSS score: 9.0), Windows Composite Image File System (CVE-2024-26170, CVSS score: 7.8), and Authenticator (CVE-2024-21390, CVSS score: 7.1).

Cybersecurity

Successful exploitation of CVE-2024-21390 requires the attacker to have a local presence on the device either via malware or a malicious application already installed via some other means. It also necessitates that the victim closes and re-opens the Authenticator app.

“Exploitation of this vulnerability could allow an attacker to gain access to multi-factor authentication codes for the victim’s accounts, as well as modify or delete accounts in the authenticator app but not prevent the app from launching or running,” Microsoft said in an advisory.

“While exploitation of this flaw is considered less likely, we know that attackers are keen to find ways to bypass multi-factor authentication,” Satnam Narang, senior staff research engineer at Tenable, said in a statement shared with The Hacker News.

“Having access to a target device is bad enough as they can monitor keystrokes, steal data and redirect users to phishing websites, but if the goal is to remain stealth, they could maintain this access and steal multi-factor authentication codes in order to login to sensitive accounts, steal data or hijack the accounts altogether by changing passwords and replacing the multi-factor authentication device, effectively locking the user out of their accounts.”

Another vulnerability of note is a privilege escalation bug in the Print Spooler component (CVE-2024-21433, CVSS score: 7.0) that could permit an attacker to obtain SYSTEM privileges but only upon winning a race condition.

The update also plugs a remote code execution flaw in Exchange Server (CVE-2024-26198, CVSS score: 8.8) that an unauthenticated threat actor could abuse by placing a specially crafted file onto an online directory and tricking a victim into opening it, resulting in the execution of malicious DLL files.

The vulnerability with the highest CVSS rating is CVE-2024-21334 (CVSS score: 9.8), which concerns a case of remote code execution affecting the Open Management Infrastructure (OMI).

“A remote unauthenticated attacker could access the OMI instance from the Internet and send specially crafted requests to trigger a use-after-free vulnerability,” Redmond said.

Cybersecurity

“The first quarter of Patch Tuesday in 2024 has been quieter compared to the last four years,” Narang said. “On average, there were 237 CVEs patched in the first quarter from 2020 through 2023. In the first quarter of 2024, Microsoft only patched 181 CVEs. The average number of CVEs patched in March over the last four years was 86.”

Software Patches from Other Vendors

In addition to Microsoft, security updates have also been released by other vendors over the past few weeks to rectify several vulnerabilities, including —

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/03/13/microsofts-march-updates-fix-61-vulnerabilities-including-critical-hyper-v-flaws/feed/ 0
Five Eyes Agencies Warn of Active Exploitation of Ivanti Gateway Vulnerabilities https://www.indiavpn.org/2024/03/01/five-eyes-agencies-warn-of-active-exploitation-of-ivanti-gateway-vulnerabilities/ https://www.indiavpn.org/2024/03/01/five-eyes-agencies-warn-of-active-exploitation-of-ivanti-gateway-vulnerabilities/#respond Fri, 01 Mar 2024 08:23:19 +0000 https://www.indiavpn.org/2024/03/01/five-eyes-agencies-warn-of-active-exploitation-of-ivanti-gateway-vulnerabilities/ [ad_1]

Mar 01, 2024NewsroomRootkit / Threat Intelligence

Ivanti Connect Secure

The Five Eyes (FVEY) intelligence alliance has issued a new cybersecurity advisory warning of cyber threat actors exploiting known security flaws in Ivanti Connect Secure and Ivanti Policy Secure gateways, noting that the Integrity Checker Tool (ICT) can be deceived to provide a false sense of security.

“Ivanti ICT is not sufficient to detect compromise and that a cyber threat actor may be able to gain root-level persistence despite issuing factory resets,” the agencies said.

To date, Ivanti has disclosed five security vulnerabilities impacting its products since January 10, 2024, out of which four have come under active exploitation by multiple threat actors to deploy malware –

  • CVE-2023-46805 (CVSS score: 8.2) – Authentication bypass vulnerability in web component
  • CVE-2024-21887 (CVSS score: 9.1) – Command injection vulnerability in web component
  • CVE-2024-21888 (CVSS score: 8.8) – Privilege escalation vulnerability in web component
  • CVE-2024-21893 (CVSS score: 8.2) – SSRF vulnerability in the SAML component
  • CVE-2024-22024 (CVSS score: 8.3) – XXE vulnerability in the SAML component

Mandiant, in an analysis published this week, described how an encrypted version of malware known as BUSHWALK is placed in a directory excluded by ICT in /data/runtime/cockpit/diskAnalysis.

Cybersecurity

The directory exclusions were also previously highlighted by Eclypsium this month, stating the tool skips a dozen directories from being scanned, thus allowing an attacker to leave behind backdoors in one of these paths and still pass the integrity check.

“The safest course of action for network defenders is to assume a sophisticated threat actor may deploy rootkit level persistence on a device that has been reset and lay dormant for an arbitrary amount of time,” agencies from Australia, Canada, New Zealand, the U.K., and the U.S. said.

Ivanti Gateway Vulnerabilities

They also urged organizations to “consider the significant risk of adversary access to, and persistence on, Ivanti Connect Secure and Ivanti Policy Secure gateways when determining whether to continue operating these devices in an enterprise environment.”

Ivanti, in response to the advisory, said it’s not aware of any instances of successful threat actor persistence following the implementation of security updates and factory resets. It’s also releasing a new version of ICT that it said “provides additional visibility into a customer’s appliance and all files that are present on the system.”

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/03/01/five-eyes-agencies-warn-of-active-exploitation-of-ivanti-gateway-vulnerabilities/feed/ 0
New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers https://www.indiavpn.org/2024/02/21/new-wi-fi-vulnerabilities-expose-android-and-linux-devices-to-hackers/ https://www.indiavpn.org/2024/02/21/new-wi-fi-vulnerabilities-expose-android-and-linux-devices-to-hackers/#respond Wed, 21 Feb 2024 17:36:35 +0000 https://www.indiavpn.org/2024/02/21/new-wi-fi-vulnerabilities-expose-android-and-linux-devices-to-hackers/ [ad_1]

Feb 21, 2024NewsroomNetwork Security / Vulnerability

New Wi-Fi Vulnerabilities

Cybersecurity researchers have identified two authentication bypass flaws in open-source Wi-Fi software found in Android, Linux, and ChromeOS devices that could trick users into joining a malicious clone of a legitimate network or allow an attacker to join a trusted network without a password.

The vulnerabilities, tracked as CVE-2023-52160 and CVE-2023-52161, have been discovered following a security evaluation of wpa_supplicant and Intel’s iNet Wireless Daemon (IWD), respectively.

The flaws “allow attackers to trick victims into connecting to malicious clones of trusted networks and intercept their traffic, and join otherwise secure networks without needing the password,” Top10VPN said in a new research conducted in collaboration with Mathy Vanhoef, who has previously uncovered Wi-Fi attacks like KRACK, DragonBlood, and TunnelCrack.

Cybersecurity

CVE-2023-52161, in particular, permits an adversary to gain unauthorized access to a protected Wi-Fi network, exposing existing users and devices to potential attacks such as malware infections, data theft, and business email compromise (BEC). It impacts IWD versions 2.12 and lower.

On the other hand, CVE-2023-52160 affects wpa_supplicant versions 2.10 and prior. It’s also the more pressing of the two flaws owing to the fact that it’s the default software used in Android devices to handle login requests to wireless networks.

New Wi-Fi Vulnerabilities

That said, it only impacts Wi-Fi clients that aren’t properly configured to verify the certificate of the authentication server. CVE-2023-52161, however, affects any network that uses a Linux device as a wireless access point (WAP).

Successful exploitation of CVE-2023-52160 banks on the prerequisite that the attacker is in possession of the SSID of a Wi-Fi network to which the victim has previously connected. It also requires the threat actor to be in physical proximity to the victim.

“One possible such scenario might be where an attacker walks around a company’s building scanning for networks before targeting an employee leaving the office,” the researchers said.

Cybersecurity

Major Linux distributions such as Debian (1, 2), Red Hat (1), SUSE (1, 2), and Ubuntu (1, 2) have released advisories for the two flaws. The wpa_supplicant issue has also been addressed in ChromeOS from versions 118 and later, but fixes for Android are yet to be made available.

“In the meantime, it’s critical, therefore, that Android users manually configure the CA certificate of any saved enterprise networks to prevent the attack,” Top10VPN said.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/02/21/new-wi-fi-vulnerabilities-expose-android-and-linux-devices-to-hackers/feed/ 0
New Research Exposes Major SaaS Vulnerabilities https://www.indiavpn.org/2024/02/15/new-research-exposes-major-saas-vulnerabilities/ https://www.indiavpn.org/2024/02/15/new-research-exposes-major-saas-vulnerabilities/#respond Thu, 15 Feb 2024 14:43:46 +0000 https://www.indiavpn.org/2024/02/15/new-research-exposes-major-saas-vulnerabilities/ [ad_1]

Feb 15, 2024The Hacker NewsSaaS Security / Risk Management

Major SaaS Vulnerabilities

With many of the highly publicized 2023 cyber attacks revolving around one or more SaaS applications, SaaS has become a cause for genuine concern in many boardroom discussions. More so than ever, considering that GenAI applications are, in fact, SaaS applications.

Wing Security (Wing), a SaaS security company, conducted an analysis of 493 SaaS-using companies in Q4 of 2023. Their study reveals how companies use SaaS today, and the wide variety of threats that result from that usage. This unique analysis provides rare and important insights into the breadth and depth of SaaS-related risks, but also provides practical tips to mitigate them and ensure SaaS can be widely used without compromising security posture.

The TL;DR Version Of SaaS Security

2023 brought some now infamous examples of malicious players leveraging or directly targeting SaaS, including the North Korean group UNC4899, 0ktapus ransomware group, and Russian Midnight Blizzard APT, which targeted well-known organizations such as JumpCloud, MGM Resorts, and Microsoft (respectively), and probably many others that often go unannounced.

The first insight from this research cements the concept that SaaS is the new supply chain, providing an almost intuitive framework to the importance of securing SaaS usage. These applications are clearly an integral part of the modern organization’s set of tools and vendors. That said, long gone are the days when every 3rd party with access to company data had to go through security or IT approval. Even in the most rigorous companies, when a diligent employee needs a quick and efficient solution, they’ll look it up and use it to get their jobs’ done faster and better. Again, think of the widespread use of GenAI, and the picture is clear.

As such, any organization concerned about the security of its supply chain must adopt SaaS security measures. According to the MITRE ATT&CK technique ‘Trusted Relationships’ (T1199), a supply chain attack occurs when an attacker targets a vendor to exploit it as a means to infiltrate a broader network of companies. By entrusting sensitive data to external SaaS vendors, organizations subject themselves to supply chain risks that reach beyond immediate security concerns.

Four Common SaaS Risks

There are various reasons and ways in which SaaS is being targeted. The good news is that most of the risks can be significantly mitigated when monitored and controlled. Basic SaaS security capabilities are even free, suited for organizations that are just beginning to develop their SaaS security posture or need to compare it to their current solution.

1) Shadow SaaS

The first problem with SaaS usage is the fact that it often goes completely unnoticed: The number of applications used by organizations is typically 250% larger than what a basic and often-used query of the workspace reveals.

Amongst the companies analyzed:

  • 41% of applications were used by only one individual, resulting in a very long tail of unsanctioned applications.
  • 1 out of 5 users were utilizing applications not used by anyone else within their organization, creating security and resource strains.
  • 63% of single-user applications were not even accessed within a 3-month period, begging the question – why keep them connected to company data?
  • 96.7% of organizations used at least one application that had a security incident in the previous year, solidifying the continuous risk and need for proper mitigation.

2) MFA Bypassing

Wing’s research indicates a trend where users opt to use a username/password to access the services they need, bypassing the security measures in place (see image 1).

Major SaaS Vulnerabilities
Image 1: From Wing Security’s research, bypassing MFA.

3) Forgotten tokens

Users grant the applications they need tokens; this is necessary for the SaaS applications to serve their purpose. The problem is that these tokens are often forgotten about after a few or just one use. Wing’s research revealed a large presence of unused tokens over a period of 3 months, creating an unnecessarily large attack surface for many customers (Image 2).

4) The new risk of Shadow AI

In the beginning of 2023, security teams primarily concentrated on a select few renowned services offering access to AI-based models. However, as the year progressed, thousands of conventional SaaS applications adopted AI models. The research shows that 99.7% of companies were using applications with integrated AI capabilities.

Organizations were required to agree to updated terms and conditions permitting these applications to utilize and refine their models using the organizations’ most confidential data. Often, these revised terms and conditions slipped under the radar, along with the usage of AI itself.

There are different ways in which AI applications may use your data for their training models. This can come in the form of learning your data, storing your data and even having a human manually go over your data to improve the AI model. According to Wing, this capability is often configurable and totally avoidable, provided it is not overlooked.

Solving SaaS Security Challenges In 2024

The report ends on a positive note, listing 8 ways in which companies can mitigate the growing threat of the SaaS supply chain. Including:

  1. Ongoing shadow IT discovery and management.
  2. Prioritize the remediation of SaaS misconfigurations
  3. Optimize anomaly detection with predefined frameworks, automate when possible.
  4. Discover and monitor all AI-using SaaS applications, and constantly monitor your SaaS for updates in their T&C pertaining to AI usage.

For the full list of findings, tips on ensuring safe SaaS usage and a 2024 SaaS security forecast, download the full report here.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/02/15/new-research-exposes-major-saas-vulnerabilities/feed/ 0
New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities https://www.indiavpn.org/2024/02/01/new-malware-emerges-in-attacks-exploiting-ivanti-vpn-vulnerabilities/ https://www.indiavpn.org/2024/02/01/new-malware-emerges-in-attacks-exploiting-ivanti-vpn-vulnerabilities/#respond Thu, 01 Feb 2024 08:08:00 +0000 https://www.indiavpn.org/2024/02/01/new-malware-emerges-in-attacks-exploiting-ivanti-vpn-vulnerabilities/ [ad_1]

Feb 01, 2024NewsroomNetwork Security / Malware

Ivanti VPN Vulnerabilities

Google-owned Mandiant said it identified new malware employed by a China-nexus espionage threat actor known as UNC5221 and other threat groups during post-exploitation activity targeting Ivanti Connect Secure VPN and Policy Secure devices.

This includes custom web shells such as BUSHWALK, CHAINLINE, FRAMESTING, and a variant of LIGHTWIRE.

“CHAINLINE is a Python web shell backdoor that is embedded in a Ivanti Connect Secure Python package that enables arbitrary command execution,” the company said, attributing it to UNC5221, adding it also detected multiple new versions of WARPWIRE, a JavaScript-based credential stealer.

The infection chains entail a successful exploitation of CVE-2023-46805 and CVE-2024-21887, which allow an unauthenticated threat actor to execute arbitrary commands on the Ivanti appliance with elevated privileges.

Cybersecurity

The flaws have been abused as zero-days since early December 2023. Germany’s Federal Office for Information Security (BSI) said it’s aware of “multiple compromised systems” in the country.

BUSHWALK, written in Perl and deployed by circumventing the Ivanti-issued mitigations in highly-targeted attacks, is embedded into a legitimate Connect Secure file named “querymanifest.cgi” and offers the ability to read or write to files to a server.

On the other hand, FRAMESTING is a Python web shell embedded in an Ivanti Connect Secure Python package (located in the following path “/home/venv3/lib/python3.6/site-packages/cav-0.1-py3.6.egg/cav/api/resources/category.py”) that enables arbitrary command execution.

Mandiant’s analysis of the ZIPLINE passive backdoor has also uncovered its use of “extensive functionality to ensure the authentication of its custom protocol used to establish command-and-control (C2).”

Furthermore, the attacks are characterized by the use of open-source utilities like Impacket, CrackMapExec, iodine, and Enum4linux to support post-exploitation activity on Ivanti CS appliances, including network reconnaissance, lateral movement, and data exfiltration within victim environments.

Cybersecurity

Ivanti has since disclosed two more security flaws, CVE-2024-21888 and CVE-2024-21893, the latter of which has come under active exploitation targeting a “limited number of customers.” The company has also released the first round of fixes to address the four vulnerabilities.

UNC5221 is said to target a wide range of industries that are of strategic interest to China, with its infrastructure and tooling overlapping with past intrusions linked to China-based espionage actors.

“Linux-based tools identified in incident response investigations use code from multiple Chinese-language Github repositories,” Mandiant said. “UNC5221 has largely leveraged TTPs associated with zero-day exploitation of edge infrastructure by suspected PRC nexus actors.”

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/02/01/new-malware-emerges-in-attacks-exploiting-ivanti-vpn-vulnerabilities/feed/ 0
Top Security Posture Vulnerabilities Revealed https://www.indiavpn.org/2024/01/30/top-security-posture-vulnerabilities-revealed/ https://www.indiavpn.org/2024/01/30/top-security-posture-vulnerabilities-revealed/#respond Tue, 30 Jan 2024 11:35:06 +0000 https://www.indiavpn.org/2024/01/30/top-security-posture-vulnerabilities-revealed/ [ad_1]

Top Security Posture

Each New Year introduces a new set of challenges and opportunities for strengthening our cybersecurity posture. It’s the nature of the field – the speed at which malicious actors carry out advanced persistent threats brings a constant, evolving battle for cyber resilience. The excitement in cybersecurity lies in this continuous adaptation and learning, always staying one step ahead of potential threats.

As practitioners in an industry that operates around-the-clock, this hypervigilance becomes second nature. We are always in a constant state of readiness, anticipating the next move, adapting strategies, and counteracting threats. However, it remains just as crucial to have our fingers on the pulse of the most common vulnerabilities impacting security postures right now. Why? Knowing these weak points is not just about defense; it’s about ensuring robust, uninterrupted business continuity in an environment where risks are always around the corner.

The Importance of Regularly Assessing Your Security Posture

The journey to build a cyber resilient security posture begins with identifying existing vulnerabilities; however, when asked about their vulnerability visibility, less than half of cybersecurity professionals claim to have high (35%) or complete visibility (11%). At best, more than half of organizations (51%) have only moderate visibility into their vulnerabilities.[1]

Regular assessments are one of the primary ways you can evaluate your organization’s security posture and gain the visibility you need to understand where risks are. These assessments comprehensively review your organization’s cybersecurity practices and infrastructure and can range in scope and frequency depending on your organization’s needs and the maturity of your risk program.

Security Maturity and Your Testing Frequency

  • Immature or No Risk Strategy: Assessments are not conducted on an ongoing frequency or are conducted on an ad-hoc basis.
  • Emerging or Ad-Hoc Risk Strategy: Assessments are conducted with some frequency, typically quarterly or monthly.
  • Mature or Set Strategy: Assessments are conducted on an ongoing basis, usually monthly.
  • Advanced Strategy: Regularly assessments are engrained in the overall risk program and take place on a monthly or weekly basis depending on the type of test.
Top Security Posture

Suggested Testing Frequency by Common Framework

  • NIST CSF: The National Institute of Standards and Technology (NIST) guidelines vary from quarterly to monthly scans, based on the specific guidelines of the governing framework.
  • PCI DSS: The Payment Card Industry Data Security Standard (PCI DSS) mandates quarterly scans.
  • HIPAA: The Health Information Protection Accountability Act (HIPAA) does not require specific scanning intervals but emphasizes the importance of a well-defined assessment strategy.

Types of Regular Assessments

  • Vulnerability Scans
  • Penetration Tests
  • Breach and Ransomware Simulations
  • Security Reputation Scans
  • Business Impact Analyses
  • Security Posture Assessment

Conducting assessments routinely enables your organization to preemptively identify potential security threats and vulnerabilities, much like preventive health check-ups for your organization’s cybersecurity.

ArmorPoint has recently released a security maturity self-assessment. Take the 15-question quiz to determine the gaps in your security posture.

The Top 6 Vulnerabilities

Now, let’s explore the vulnerabilities commonly found during these regular security posture assessments and their potential impact on your organization’s security integrity.

Vulnerability Management Program Gaps

A structured vulnerability management program is the cornerstone of proactive cybersecurity for your organization. It serves as your organization’s radar for promptly identifying and addressing security weaknesses. Organizations that lack such a program expose themselves to significant risks such as increased exposure to known vulnerabilities, inefficient patch management, and the reduced ability to prioritize critical vulnerabilities.

Deficiencies in Detection and Monitoring

Inadequate detection systems can leave your organization blind to ongoing threats, allowing attackers to operate undetected for extended periods. Without adequate detection systems, such as advanced Intrusion Detection Systems (IDS) or Security Information and Event Management (SIEM) solutions, there is a risk of delayed or missed threat detection, increased dwell time for attackers, and a higher potential for data exfiltration. To improve this aspect, it’s crucial to introduce advanced monitoring tools and strategies. Deploying state-of-the-art threat detection and response technologies, utilizing behavior analytics for anomaly detection, and conducting threat-hunting exercises are some of the key approaches to enhance detection capabilities.

The absence of such measures delays the identification of threats and hampers the ability to respond effectively in a timely manner. Implementing a strong, well-rounded detection and monitoring system is essential for maintaining a robust defense against evolving cyber threats. This includes continuously updating and refining detection methodologies to stay ahead of the latest attack vectors and techniques used by cybercriminals.

Lack of Policies and Procedures

Organizations need formalized cybersecurity policies and procedures to effectively manage security risks. Without these in place, there are numerous consequences, including inconsistent security practices across departments, weakened incident response capabilities, difficulty in ensuring compliance with regulations, and greater exposure to legal, regulatory, financial, and reputational consequences. Crafting and implementing comprehensive security policies involves developing and documenting these policies clearly, ensuring they are communicated effectively to all employees, and educating them on the importance of compliance.

Regular reviews, updates, and adaptations of these policies are necessary to keep pace with the evolving cyber threat landscape. This also ensures that the organization’s cybersecurity measures remain relevant and effective. In addition, having a set of well-defined procedures helps in standardizing responses to security incidents, which aids in minimizing the impact and speeding up recovery times in the event of a breach.

Inadequate Testing Practices

Regular testing of security systems and incident response plans is vital for identifying weaknesses and ensuring preparedness for real-world attacks. This includes conducting regular penetration testing to uncover vulnerabilities, creating, practicing, and fine-tuning incident response plans, and engaging in third-party security assessments. The importance of regular testing cannot be overstated, as it not only helps in identifying vulnerabilities before attackers do but also assesses the effectiveness of existing security controls.

Additionally, regular testing ensures a swift and effective response to incidents, mitigating potential damage proactively. This practice is crucial in maintaining an updated and resilient cybersecurity posture, capable of defending against the latest security threats. Engaging with third-party experts for assessments brings an external perspective, often uncovering blind spots that internal teams might miss.

Training and Cyber Awareness

Insufficiently trained staff can inadvertently introduce vulnerabilities and make an organization more susceptible to attacks. The issue of insufficient training leads to misconfigurations, human errors, and failure to recognize and respond to threats, thus reducing the effectiveness of security controls. To address this, approaches for security awareness training are crucial. Providing ongoing cybersecurity training, encouraging professional development and certifications, and fostering a culture of security awareness are key measures.

These training initiatives help ensure that staff at all levels are equipped to identify and respond to security threats effectively. By keeping the workforce informed and vigilant, organizations can significantly reduce the risk of breaches caused by human error. This proactive approach to staff training is a critical component of a comprehensive cybersecurity strategy.

Framework Adoption and Implementation

Selecting and adhering to a cybersecurity framework is crucial for organizations looking to establish a structured approach to security. The necessity of frameworks lies in providing a clear roadmap for security, ensuring alignment with industry best practices, and facilitating compliance with regulations. The advised process for framework selection involves assessing your organization’s specific needs and risk tolerance, choosing a suitable framework (e.g., NIST Cybersecurity Framework), and customizing it to fit the organization’s unique requirements.

Framework adoption and implementation provide a structured and methodical approach to managing cybersecurity risks. They also offer guidelines for setting up robust security measures and protocols, thus enhancing the overall security posture of an organization. Customizing the chosen framework ensures that it aligns perfectly with the organization’s specific security needs, industry standards, and regulatory requirements.

Risk Appetite and Understanding

Understanding your organization’s risk appetite and integrating it into your cybersecurity strategy is essential for effective risk management. Determining the level of risk your organization is willing to accept varies from one organization to another and influences decision-making and resource allocation. This understanding of risk appetite is crucial in aligning cybersecurity efforts with the organization’s risk tolerance and prioritizing security measures based on risk assessments.

Risk informs strategy, and maintaining continuous vigilance is necessary to monitor evolving risks and adapt security strategies accordingly. This approach ensures that cybersecurity measures are not only reactive but proactive, anticipating potential threats and mitigating them before they materialize. By understanding and managing risk effectively, organizations can build a resilient and robust cybersecurity posture tailored to their specific needs and risk tolerance levels.

Mitigating Identified Vulnerabilities

Now that we’ve thoroughly examined these common vulnerabilities, it’s crucial to understand how to prioritize their resolution based on severity and potential impact. The first step is to gain more visibility into your organization’s vulnerabilities. Once identified, you can prioritize these vulnerabilities effectively to mitigate them. To mitigate these risks, it’s suggested to implement an industry-accepted framework such as NIST CSF, CIS, or SANS. These frameworks guide organizations in establishing robust cybersecurity practices and involves assessing current security measures against the framework’s standards, developing and implementing appropriate policies, and ensuring regular staff training for awareness. Continuous monitoring and improvement are key, as it allows for the timely identification and rectification of security gaps and vulnerabilities.

Take a proactive step towards strengthening your security posture. Collaborate with seasoned cybersecurity experts who can help identify and address your organization’s specific security gaps. Request a complimentary Cybersecurity Workshop from ArmorPoint today.

Cybersecurity is not a one-time effort; it’s an ongoing commitment to protecting your organization’s assets and reputation. By addressing these common vulnerabilities revealed in security posture assessments and staying vigilant, you can strengthen your security posture and reduce the risk of falling victim to cyberattacks.

Download a Cybersecurity Checklist to find out what gaps you have in your security posture.

1 https://www.tripwire.com/state-of-security/insight-vulnerability-management-report


Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/01/30/top-security-posture-vulnerabilities-revealed/feed/ 0
52% of Serious Vulnerabilities We Find are Related to Windows 10 https://www.indiavpn.org/2024/01/22/52-of-serious-vulnerabilities-we-find-are-related-to-windows-10/ https://www.indiavpn.org/2024/01/22/52-of-serious-vulnerabilities-we-find-are-related-to-windows-10/#respond Mon, 22 Jan 2024 14:07:44 +0000 https://www.indiavpn.org/2024/01/22/52-of-serious-vulnerabilities-we-find-are-related-to-windows-10/ [ad_1]

We analyzed 2,5 million vulnerabilities we discovered in our customer’s assets. This is what we found.

Digging into the data

The dataset we analyze here is representative of a subset of clients that subscribe to our vulnerability scanning services. Assets scanned include those reachable across the Internet, as well as those present on internal networks. The data includes findings for network equipment, desktops, web servers, database servers, and even the odd document printer or scanning device.

The number of organizations in this dataset is smaller (3 less) than the previous dataset used in last year’s Security Navigator 2023 and some organizations were replaced by new additions. With the change of organizations comes a different mix of assets, which leaves comparing the previous results akin to comparing apples to oranges (we might be biased), but it’s still worth noting similar patterns where possible.

This year, we revisit the menacing vulnerability theme with an eye on the ever-present and lingering tail of unresolved system weaknesses. The waves of newly discovered serious issues are just for our attention with existing unresolved issues, seeming like a hydra that keeps on growing new snaking heads as soon as you dispatch others.

Assessing whether a system is adequately protected is a challenge that requires skill and expertise and can take a lot of time. But we want to learn of any weaknesses beforehand rather than having to deal with the fallout of an unplanned “free pentest” by a random Cy-X group.

Security Navigator 2024 is Here – Download Now#

The newly released Security Navigator 2024 offers critical insights into current digital threats, documenting 129,395 incidents and 25,076 confirmed breaches. More than just a report, it serves as a guide to navigating a safer digital landscape.

What’s Inside?#

  • 📈 In-Depth Analysis: Explore trends, attack patterns, and predictions. Learn from case studies in CyberSOC and Pentesting.
  • 🔮 Future-Ready: Equip yourself with our security predictions and research summary.
  • 👁 Real-Time Data: From Dark Net surveillance to industry-specific statistics.

Stay one step ahead in cybersecurity. Your essential guide awaits!

🔗 Get Your Copy Now

Vulnerability Scanning Findings by Severity

Examining the severity rating share per unique Finding we see that the bulk of unique Findings, 79%, are classified as ‘High’ or ‘Medium’. However, it is also worth noting that half, 50.4%, of unique Findings are considered ‘Critical’ or ‘High.’

The average number of ‘Critical’ or ‘High’ Findings has decreased by 52.17% and 43.83%, respectively, compared to our previously published results. An improvement can also be observed for Findings with severity ratings ‘Medium’ and ‘Low’ being down 29.92% and 28.76%. As this report uses a slightly different sample of clients to last year, a YoY comparison has limited value, but we see evidence that clients are responding well to the findings we report, resulting in an overall improvement.

The majority of Findings (78%) rated ‘Critical’ or ‘High’ are 30 days or younger (when looking at a 120-day window). Conversely, 18% of all findings rated ‘Critical’ or ‘High’ are 150-days or older. From a prioritization perspective, ‘Critical’ or ‘High’ real findings seem to be dealt with swiftly, but some residual still accumulates over time. We see, therefore, that unresolved Findings continue to grow older. Indeed, ~35% of all unique CVEs are from findings 120 days or older.

The chart above shows the long tail of unresolved real findings. Note the first remarkable long tail peak around 660 days and the second one at 1380 days (3 years and 10 months).

A window of opportunity

The high average numbers of ‘Critical’ and ‘High’ findings are largely influenced by assets running Microsoft Windows or Microsoft Windows Server operating systems. Assets running operating systems other than Microsoft, such as Linux-based OS, are present, but these are reported proportionally far less.

We should note, however, that the ‘Critical’ or ‘High’ findings associated with assets running Windows are not necessarily vulnerabilities in the operating system but can also be related to applications running on the asset.

It is perhaps understandable that unsupported Microsoft Windows and Windows Server versions are prominent here, but it is surprising to find more recent versions of these operating systems with severities rated as ‘Critical’ or ‘High’.

Industry perspective

We are using NAICS for our industry classification. The results here only consider Findings based on scans of hosts rather than services such as web applications. The average unique real Finding per unique asset is 31.74 across all organizations, denoted by the dashed horizontal line in the chart below.

Our clients in the Construction industry appear to be performing exceptionally well compared to clients in other industries, with an average of 12.12 Findings per Asset. At the opposite end of the spectrum, we have the Mining, Quarrying, and Oil and Gas industries, where we report an average of 76.25 unique findings per asset. Clients in Public Administration surprised us by outperforming Finance and Insurance with an average of 35.3 Findings per Asset, compared with 43.27, despite the larger number of Assets. Of course, these values are derived from the set of clients present in our sample and may not represent the universal reality.

When comparing the average severity per unique asset per Industry, we see a mixed picture. We can ignore Health Care and Social Assistance and Information, with a relatively small unique asset count, that results in averages that are disproportionate in relation to other Industries.

Our overall Industry average for Severity rating High is 21.93 and Mining, Quarrying and Oil and Gas Extraction have more than double that average.

Similarly, Finance and Insurance with Accommodation and Food Services also overshot the overall average by 10.2 and 3.4 findings per unique asset, respectively. The same three Industries exceeded the overall average for findings rated Critical, with Accommodation and Food Servers doing so by almost a factor of 3.

Vulnerability is getting old

As we revisit the menacing vulnerability theme this year, we once again look suspiciously at the ever-present and lingering tale of unresolved system weaknesses that are just getting older. We assessed over 2.5m vulnerability findings that we reported to our clients and over 1,500 reports from our professional ethical hackers to understand the current state of security vulnerabilities and consider their role and effectiveness as a tool for prioritization.

The bulk of unique Findings reported by our scanning teams – 79% – are classified as ‘High’ or ‘Medium,’ and 18% of all serious findings are 150 days or older. Though these are generally dealt with more swiftly than others, some residuals still accumulate over time. While most findings we identify are resolved after 90 days, 35% of all findings we report persist for 120 days or longer. And way too many are never addressed at all.

Our scanning results illuminate the persistent problem of unpatched vulnerabilities. Meanwhile, our Ethical Hacking teams more frequently encounter newer applications and systems built on contemporary platforms, frameworks, and languages.

The role of the Ethical Hacker is to conduct Penetration Tests – to emulate a malicious attacker and assess a system, application, device, or even people for vulnerabilities that could be used to gain access or deny access to IT resources.

Penetration Testing is generally considered a component of Vulnerability Management but could also be seen as a form of Threat Intelligence that businesses should leverage as part of their proactive defense strategy.

17.67% of findings our Ethical Hackers reported were rated as ‘Serious’, but, on a brighter note, hackers must work harder today to discover them than they had to in the past.

This is just an excerpt of the analysis. More details on our analysis of vulnerabilities and Pentesting (as well as a ton of other interesting research topics like VERIS categorization of the incidents handled in our CyberSOCs, Cyber Extortion statistics and an analysis of Hacktivism) can be found in the Security Navigator. Just fill in the form and get your download. It’s worth it!

Note: This informative piece has been expertly crafted and generously shared by Charl van der Walt, Head of the Security Research Center, Orange Cyberdefense.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/01/22/52-of-serious-vulnerabilities-we-find-are-related-to-windows-10/feed/ 0
Urgent: GitLab Releases Patch for Critical Vulnerabilities https://www.indiavpn.org/2024/01/12/urgent-gitlab-releases-patch-for-critical-vulnerabilities/ https://www.indiavpn.org/2024/01/12/urgent-gitlab-releases-patch-for-critical-vulnerabilities/#respond Fri, 12 Jan 2024 19:03:34 +0000 https://www.indiavpn.org/2024/01/12/urgent-gitlab-releases-patch-for-critical-vulnerabilities/ [ad_1]

Jan 12, 2024NewsroomDevSecOps / Software security

Gitlab Vulnerabilities

GitLab has released security updates to address two critical vulnerabilities, including one that could be exploited to take over accounts without requiring any user interaction.

Tracked as CVE-2023-7028, the flaw has been awarded the maximum severity of 10.0 on the CVSS scoring system and could facilitate account takeover by sending password reset emails to an unverified email address.

The DevSecOps platform said the vulnerability is the result of a bug in the email verification process, which allowed users to reset their password through a secondary email address.

Cybersecurity

It affects all self-managed instances of GitLab Community Edition (CE) and Enterprise Edition (EE) using the below versions –

  • 16.1 prior to 16.1.6
  • 16.2 prior to 16.2.9
  • 16.3 prior to 16.3.7
  • 16.4 prior to 16.4.5
  • 16.5 prior to 16.5.6
  • 16.6 prior to 16.6.4
  • 16.7 prior to 16.7.2

GitLab said it addressed the issue in GitLab versions 16.5.6, 16.6.4, and 16.7.2, in addition to backporting the fix to versions 16.1.6, 16.2.9, 16.3.7, and 16.4.5. The company further noted the bug was introduced in 16.1.0 on May 1, 2023.

Cybersecurity

“Within these versions, all authentication mechanisms are impacted,” GitLab said. “Additionally, users who have two-factor authentication enabled are vulnerable to password reset but not account takeover as their second authentication factor is required to login.”

Also patched by GitLab as part of the latest update is another critical flaw (CVE-2023-5356, CVSS score: 9.6), which permits a user to abuse Slack/Mattermost integrations to execute slash commands as another user.

To mitigate any potential threats, it’s advised to upgrade the instances to a patched version as soon as possible and enable 2FA, if not already, particularly for users with elevated privileges.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/01/12/urgent-gitlab-releases-patch-for-critical-vulnerabilities/feed/ 0
CISA Flags 6 Vulnerabilities – Apple, Apache, Adobe , D-Link, Joomla Under Attack https://www.indiavpn.org/2024/01/10/cisa-flags-6-vulnerabilities-apple-apache-adobe-d-link-joomla-under-attack/ https://www.indiavpn.org/2024/01/10/cisa-flags-6-vulnerabilities-apple-apache-adobe-d-link-joomla-under-attack/#respond Wed, 10 Jan 2024 08:18:39 +0000 https://www.indiavpn.org/2024/01/10/cisa-flags-6-vulnerabilities-apple-apache-adobe-d-link-joomla-under-attack/ [ad_1]

Jan 10, 2024NewsroomPatch Management / Threat Intelligence

CISA Flags 6 Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

This includes CVE-2023-27524 (CVSS score: 8.9), a high-severity vulnerability impacting the Apache Superset open-source data visualization software that could enable remote code execution. It was fixed in version 2.1.

Details of the issue first came to light in April 2023, with Horizon3.ai’s Naveen Sunkavally describing it as a “dangerous default configuration in Apache Superset that allows an unauthenticated attacker to gain remote code execution, harvest credentials, and compromise data.”

Cybersecurity

It’s currently not known how the vulnerability is being exploited in the wild. Also added by CISA are five other flaws –

  • CVE-2023-38203 (CVSS score: 9.8) – Adobe ColdFusion Deserialization of Untrusted Data Vulnerability
  • CVE-2023-29300 (CVSS score: 9.8) – Adobe ColdFusion Deserialization of Untrusted Data Vulnerability
  • CVE-2023-41990 (CVSS score: 7.8) – Apple Multiple Products Code Execution Vulnerability
  • CVE-2016-20017 (CVSS score: 9.8) – D-Link DSL-2750B Devices Command Injection Vulnerability
  • CVE-2023-23752 (CVSS score: 5.3) – Joomla! Improper Access Control Vulnerability

It’s worth noting that CVE-2023-41990, patched by Apple in iOS 15.7.8 and iOS 16.3, was used by unknown actors as part of Operation Triangulation spyware attacks to achieve remote code execution when processing a specially crafted iMessage PDF attachment.

Federal Civilian Executive Branch (FCEB) agencies have been recommended to apply fixes for the aforementioned bugs by January 29, 2024, to secure their networks against active threats.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/01/10/cisa-flags-6-vulnerabilities-apple-apache-adobe-d-link-joomla-under-attack/feed/ 0