Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

10/8/2019
07:00 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

UK Spy Agency Warns About VPN Hacking

Advanced persistent threat actors linked to the Chinese government are attacking enterprise VPN servers from Fortinet, Palo Alto Networks and Pulse Secure.

Advanced persistent threat (APT) actors linked to the Chinese government are attacking enterprise VPN servers from Fortinet, Palo Alto Networks and Pulse Secure according to the UK's National Cyber Security Centre (NCSC).

They say that the activity is ongoing, and targets both UK and international organizations. Affected sectors were found to include government, military, academic, business and healthcare.

The APTs have been targeting several vulnerabilities, including CVE-2019-11510 and CVE-2019-11539 (affecting Pulse Secure products), CVE-2018-13379, CVE-2018-13382 and CVE-2018-13383 (affecting Fortinet products), and CVE-2019-1579 (affecting Palo Alto Networks).

Orange Tsai and Meh Chang of the research team at security consulting firm DEVCORE first identified the vulnerabilities this summer.

They described it as, "The bug is very straightforward. It is just a simple format string vulnerability with no authentication required! The sslmgr is the SSL gateway handling the SSL handshake between the server and clients. The daemon is exposed by the Nginx reverse proxy and can be touched via the path /sslmgr. During the parameter extraction, the daemon searches the string scep-profile-name and pass its value as the snprintf format to fill in the buffer. That leads to the format string attack. You can just crash the service with %n!" Palo Alto Networks GlobalProtect, Fortinet FortiGate (FortiOS), and Pulse Secure's Pulse Connect Secure (PCS) and Pulse Policy Secure (PPS) ended up being affected. The vendors released software patches for their users, even though they were not aware of any real-world use of the vulnerabilities at the time.

But, in September, Microsoft's Threat Intelligence Center tweeted that it had observed attacks using these vulnerabilities since July. It identified the threat actors as APT5. This group has been active since 2007 concentrating on telecommunications and technology companies in Asia.

No threat actor was directly named by the NCSC advisory.\r\nBasic mitigation of the problem is outlined, however. NCSC says to (1) patch and (2) "Reset authentication credentials associated with affected VPNs and accounts connecting through them."

The advisory also says that, "The NCSC strongly recommends that organizations previously targeted by APT actors, or which have detected successful exploitation of their VPNs" carry out some additional steps.

VPN: "Check all configuration options for unauthorised changes. This includes the SSH authorized_keys file, new iptables rules and commands set to run on connecting clients."

Log analysis and monitoring: "Review and continue to monitor logs for the VPN, network traffic and services users connect to through the VPN such as email. Check for connections from uncommon IP addresses, particularly those with successful logins or large data lengths returned."

2FA: "Where possible, enable two-factor authentication for the VPN to defend against password replay attacks."

The advisory shows that threats may be discovered and then exploited by threat actors after a time period. Even a patch from the vendor does not absolve the user from applying that patch throughout the possibly targeted system.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.