Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

TSA Breach Exposes PDF File Risk

Simply blacking out information in a Portable Document Format file won't keep data from prying eyes.

Employees at the Transportation Security Administration inadvertently exposed classified information about the agency's security procedures because, apparently, they don't know how PDF documents work.

What's not clear is how many other government departments, legal agencies, healthcare providers, and other organizations that deal with sensitive information are unaware that a quirk in Adobe's Portable Document Format can leave data open to prying eyes.

TSA officials posted what they thought was a redacted version of the TSA's airport security operating manual on a Web site used by private contractors looking for government work. The problem: the officials didn't actually delete sensitive parts of the document—they just blacked them out using a graphics tool.

That method left the underlying words intact, and they were exposed when readers cut and pasted pages from the document, "Screening Management Standard Operating Procedures," into a new file. The vulnerability isn't technically a bug in Adobe's product, but its existence shows how those handling secure information should be fully trained in the software they're using.

The end result of the foul-up was that highly sensitive information about TSA screening methods, interviewing procedures, X-ray machines and other terrorist prevention tools became easily available to millions of people on the Web.

Department of Homeland Security Secretary Janet Napolitano on Wednesday promised Senate Judiciary Committee members that her department would launch a full probe of the incident and take unspecified actions against those involved.

At the same time, Napolitano said the breach did not put the flying public at risk because the manual was outdated and many of the procedures it outlines have changed since its publication last year.

Some lawmakers, however, were not convinced. U.S. Senator Susan Collins (R-Me), the ranking member of the Senate Homeland Security Committee, called the incident "shocking" and "reckless."

"I intend to ask DHS how this security breach could have happened, what specific actions will be taken to prevent this type of reckless dissemination from ever occurring again, and how it will remedy the damage that has already been done," said Collins, in a statement.

InformationWeek's Dark Reading and Black Hat come together for their first-ever complimentary virtual event, which will explore the most dangerous threats of the next 10 years -- and what you can do today to protect your enterprise from them. It happens Wednesday, Dec. 9. Find out more and register.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14318
PUBLISHED: 2020-12-03
A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.
CVE-2020-2320
PUBLISHED: 2020-12-03
Jenkins Plugin Installation Manager Tool 2.1.3 and earlier does not verify plugin downloads.
CVE-2020-2321
PUBLISHED: 2020-12-03
A cross-site request forgery (CSRF) vulnerability in Jenkins Shelve Project Plugin 3.0 and earlier allows attackers to shelve, unshelve, or delete a project.
CVE-2020-2322
PUBLISHED: 2020-12-03
Jenkins Chaos Monkey Plugin 0.3 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to generate load and to generate memory leaks.
CVE-2020-2323
PUBLISHED: 2020-12-03
Jenkins Chaos Monkey Plugin 0.4 and earlier does not perform permission checks in an HTTP endpoint, allowing attackers with Overall/Read permission to access the Chaos Monkey page and to see the history of actions.