Comments
Meltdown, Spectre Likely Just Scratch the Surface of Microprocessor Vulnerabilities
Newest First  |  Oldest First  |  Threaded View
BrianN060
50%
50%
BrianN060,
User Rank: Ninja
1/10/2018 | 6:03:57 PM
Still just vulnerabilities
As bad as these out-of-sequence execution vulnerabilities are (and might prove to be), we saw more than enough monsterously bad cybersecurity breaches in 2017 - without the help of Meltdown, Spectre or any follow-on scenarios. 

We need something better than just chasing down vulnerabilities and patching, to approach any acceptable level of cybersecurity.  
PatrickH94102
50%
50%
PatrickH94102,
User Rank: Apprentice
1/9/2018 | 8:09:34 PM
Re: Another thing to consider
Yup BIOS updates have been a mostly ignored / de-prioritized security risk.  Some new security companies such as Eclypsium are working on BIOS integrity and version reporting & updating for enterprises.
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
1/9/2018 | 1:09:33 PM
Re: Another thing to consider
Fortunately most BIOS updates are now operating system - installable items.  I remember the dead, long dead days of Compaq Deskpro with 3.5" floppy disk updates and heaven forbid you interrupt the BIOS load --- dead machine if you do that.  
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
1/9/2018 | 10:49:36 AM
Re: Another thing to consider
Firmware updates are going to become a much bigger issue for IT and security folks now for more than just IoT devices. And servers obviously are a priority, so it's going to be interesting.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
1/9/2018 | 10:45:24 AM
Another thing to consider
BIOS - How many IT professionals regularly update the BIOS of their office systems?  My estimate is easy: never and knowing the threat landscape, there HAS to be vulnerabilities there as well. 


White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14492
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVE-2018-3770
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
CVE-2018-3771
PUBLISHED: 2018-07-20
An XSS in statics-server <= 0.0.9 can be used via injected iframe in the filename when statics-server displays directory index in the browser.
CVE-2018-5065
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
CVE-2018-5066
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.