Application Security

8/29/2017
08:16 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Shellshock Still in the Crosshairs

Spike in scans for the flaw spotted en masse in Q2.

Old bugs die hard: the three-year-old Shellshock vulnerability was the most commonly targeted security hole in the second quarter of 2017, according to security firm eSentire.

The GNU Bash Remote Code Execution flaw, aka Shellshock (CVE-2014-6271), accounted for 40% of the top eight flaws targeted in Q2, according to new data from eSentire gathered from some 1,500 of its network and host sensors installed in 600 customer sites.

Viktors Engelbrehts, director of threat intelligence at eSentire, says the exposed systems his firm spotted being probed for the flaw are mainly public-facing Web servers.

The critical flaw in Linux and Unix operating systems, as well as Mac OS X, was first discovered in September of 2014, and continues to be left unpatched in many organizations.

That makes it a lucrative target for attackers. Engelbrehts theorizes that the Shellshock-probing activity spotted by his firm likely is the handiwork of state-sponsored attackers gathering intel on vulnerable systems, given the automated, wide range of the scope of the scans.

"Those scanners are fingerprinting" systems on the Internet, he says of eSentire's findings. "Not all of these events necessarily lead to further incidents. But if these assets are vulnerable and the bad guys know about it, they can launch devastating attacks" on widespread systems, he says.

State-sponsored actors such as those out of China are among the types of threat actors conducting such scans for intel they could use in mass attacks, he says.

"We suspect it's mostly Linux, and some Mac [systems] affected," he says.

eSentire also spotted attackers scanning for servers with the Apache Struts CVE-2017-5638 remote code flaw, the Windows CVE-2012-0152 Remote Desktop Protocol bug, and the Windows RDP remote administration flaw (CVE-2001-0540).

Shellshock/Bash is a shell widely used in versions of Linux and Unix, and when exploited, it allows an attacker to run malicious code remotely on a targeted system.

Why does it remain unpatched in so many servers? "I suspect that a lot of organizations are applying compensating controls instead of mitigating the root cause," he says. They're beefing up IDS/IPS systems and blocking signatures, but leaving the hole unpatched, he says.

Shellshock is an especially popular flaw to target mainly because it's so easy to exploit, notes Theresa Payton, CEO of Fortalice Solutions. Payton says her firm mostly finds it unpatched in printers, appliances, and voice systems.

The decision not to patch a server typically has to do with downtime trumping risk. "Patches break things," Payton says, noting that that's why organizations with high uptime requirements sometimes shy away from applying some patches. "But patching strategically is vitally important. You shouldn't use the excuse that it will break things."

Even large organizations can be hit unawares by an attacker gathering intel. Payton's firm has seen this firsthand in penetration-test engagements: "You would be amazed at how many Fortune 100s where we were able to do a vulnerability scan undetected. Their radars didn't pick up that we were scanning their systems," she says.

eSentire's Engelbrehts, meanwhile, says the attackers behind the recent wave of mass Shellshock scans appear to have an automated infrastructure in place to search for these types of flaws en masse.

"It's indiscriminate," he says. "They are clearly using weaknesses as an information-gathering point at massive scale. What scares me most is the volume is really scary" and could be used to wage widespread attacks across multiple organizations and industries, according to Engelbrehts.

Related Content:

Learn from the industry’s most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Click for more info and to register.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Cybersecurity's 'Broken' Hiring Process
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/11/2017
How Systematic Lying Can Improve Your Security
Lance Cottrell, Chief Scientist, Ntrepid,  10/11/2017
Ransomware Grabs Headlines but BEC May Be a Bigger Threat
Marc Wilczek, Digital Strategist & CIO Advisor,  10/12/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.