Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

10/8/2019
07:00 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

UK Spy Agency Warns About VPN Hacking

Advanced persistent threat actors linked to the Chinese government are attacking enterprise VPN servers from Fortinet, Palo Alto Networks and Pulse Secure.

Advanced persistent threat (APT) actors linked to the Chinese government are attacking enterprise VPN servers from Fortinet, Palo Alto Networks and Pulse Secure according to the UK's National Cyber Security Centre (NCSC).

They say that the activity is ongoing, and targets both UK and international organizations. Affected sectors were found to include government, military, academic, business and healthcare.

The APTs have been targeting several vulnerabilities, including CVE-2019-11510 and CVE-2019-11539 (affecting Pulse Secure products), CVE-2018-13379, CVE-2018-13382 and CVE-2018-13383 (affecting Fortinet products), and CVE-2019-1579 (affecting Palo Alto Networks).

Orange Tsai and Meh Chang of the research team at security consulting firm DEVCORE first identified the vulnerabilities this summer.

They described it as, "The bug is very straightforward. It is just a simple format string vulnerability with no authentication required! The sslmgr is the SSL gateway handling the SSL handshake between the server and clients. The daemon is exposed by the Nginx reverse proxy and can be touched via the path /sslmgr. During the parameter extraction, the daemon searches the string scep-profile-name and pass its value as the snprintf format to fill in the buffer. That leads to the format string attack. You can just crash the service with %n!" Palo Alto Networks GlobalProtect, Fortinet FortiGate (FortiOS), and Pulse Secure's Pulse Connect Secure (PCS) and Pulse Policy Secure (PPS) ended up being affected. The vendors released software patches for their users, even though they were not aware of any real-world use of the vulnerabilities at the time.

But, in September, Microsoft's Threat Intelligence Center tweeted that it had observed attacks using these vulnerabilities since July. It identified the threat actors as APT5. This group has been active since 2007 concentrating on telecommunications and technology companies in Asia.

No threat actor was directly named by the NCSC advisory.\r\nBasic mitigation of the problem is outlined, however. NCSC says to (1) patch and (2) "Reset authentication credentials associated with affected VPNs and accounts connecting through them."

The advisory also says that, "The NCSC strongly recommends that organizations previously targeted by APT actors, or which have detected successful exploitation of their VPNs" carry out some additional steps.

VPN: "Check all configuration options for unauthorised changes. This includes the SSH authorized_keys file, new iptables rules and commands set to run on connecting clients."

Log analysis and monitoring: "Review and continue to monitor logs for the VPN, network traffic and services users connect to through the VPN such as email. Check for connections from uncommon IP addresses, particularly those with successful logins or large data lengths returned."

2FA: "Where possible, enable two-factor authentication for the VPN to defend against password replay attacks."

The advisory shows that threats may be discovered and then exploited by threat actors after a time period. Even a patch from the vendor does not absolve the user from applying that patch throughout the possibly targeted system.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cloud Security Threats for 2021
Or Azarzar, CTO & Co-Founder of Lightspin,  12/3/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Assessing Cybersecurity Risk in Todays Enterprises
Assessing Cybersecurity Risk in Todays Enterprises
COVID-19 has created a new IT paradigm in the enterprise and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27772
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could po...
CVE-2020-27773
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to appli...
CVE-2020-28950
PUBLISHED: 2020-12-04
The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.
CVE-2020-27774
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but co...
CVE-2020-27775
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but c...