Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk //

Compliance

Cisco Pays $8.6M in First False Claims Suit for Vulnerabilities in Security Product

A security consultant reported vulnerabilities in Cisco's Video Surveillance Manager in 2009 - but the company ignored the issues and fired the consultant.

Cisco Systems agreed on July 31 to pay $8.6 million to settle litigation that the enterprise-technology giant violated the US False Claims Act for years when it failed to patch vulnerabilities in its family of video-surveillance products while continuing to sell the devices and software to the US government.

The whistleblower lawsuit, brought by law firm Constantine Cannon LLP, alleged that Cisco violated the US act when it sold vulnerable video-surveillance systems to federal agencies, state governments, and the District of Columbia. The lawsuit originated from issues in Cisco's Video Surveillance Manager that were reported in 2009 by a security consultant, James Glenn, while working for a Cisco partner. After initially listening to Glenn, the company fired him and continued selling the product, the lawsuit maintained.

"Cisco markets the product as particularly suited for government customers, and knows that the product is routinely sold to government customers, even though Cisco knows that these critical security flaws render the product largely ineligible for purchase by government entities," the court filing states.

The settlement is part of a trend of companies having to increasingly pay fines for their lapses in cybersecurity. In July, a UK regulator notified British Airways that the airline will face a $229 million fine for a 2018 data breach, the largest fine to date under the European Union's General Data Protection Regulation (GDPR).

For security companies, the settlement should be seen as a warning that they could be held liable for vulnerabilities in their products if the issues are not handled in a timely manner.

"The False Claims Act exists to protect the government from being sold products that fail to comply with their standards and specifications," says Anne Hartman, a partner at Constantine Cannon. "That part is not novel, but with regard to the cybersecurity standards, this is the first time that the government has recovered money on that theory."

Because the vulnerable product exposed government agencies to greater cyber-risk, the lawyers brought the whistleblower lawsuit under the US False Claims Act in federal court in the Western District of New York. Under the settlement, which is not a court ruling, Cisco agreed to partially refund the government. The $8.6 million penalty includes 20% paid to Glenn for his role in reporting the issue to the government.

"It will inspire other people to step forward and speak up when they have inside information about vulnerabilities and breaches," says Mary Inman, a partner at Constantine Cannon. "We are now in an era when we are increasingly reliant on tech companies, and we need — more than ever — the voices of whistleblowers like James." 

While Cisco accepted responsibility for the vulnerable product, the company partially blamed the issue on changing perceptions of the acceptability of vulnerable software.

"We intend to stay ahead of what the world is willing to accept," said Mark Chandler, chief legal officer for Cisco, in a blog post published by the company. "Nothing illustrates better the way standards are changing than our engagement in resolving a dispute involving video security software products sold by us in Cisco's fiscal years 2008 through 2013. In short, what seemed reasonable at one point no longer meets the needs of our stakeholders today."

The fine is a relatively modest sum to pay to shut down an 8-year-old lawsuit. Cisco underscored that "the total sales at issue were well under one one-hundredth of one percent of Cisco's total sales."

Glenn, the consultant who brought the lawsuit, argues that companies need to be ready to work with anyone who reports a vulnerability in order to make their products better.

"Companies often see security researchers as troublemakers and disrupters, but the only way [that is true is] if their objectives are not the same as the researchers — to find these problems and get them fixed," he says.

In 2013, Cisco published information on three vulnerabilities that would allow an attacker to gain access to the video information and "create, modify and remove camera feeds, archives, logs and users." The vulnerabilities are the same as those originally reported in 2009, Glenn says.

Related Content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

 

 

 

 

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32693
PUBLISHED: 2021-06-17
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. A vulnerability related to firewall authentication is in Symfony starting with version 5.3.0 and prior to 5.3.2. When an application defines multiple firewalls, the token authenticated by one of the fir...
CVE-2021-32424
PUBLISHED: 2021-06-17
In TrendNet TW100-S4W1CA 2.3.32, due to a lack of proper session controls, a threat actor could make unauthorized changes to an affected router via a specially crafted web page. If an authenticated user were to interact with a malicious web page it could allow for a complete takeover of the router.
CVE-2021-32426
PUBLISHED: 2021-06-17
In TrendNet TW100-S4W1CA 2.3.32, it is possible to inject arbitrary JavaScript into the router's web interface via the "echo" command.
CVE-2021-32694
PUBLISHED: 2021-06-17
Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.15.1, a malicious application on the same device is possible to crash the Nextcloud Android Client due to an uncaught exception. The vulnerability is patched in version 3.15.1.
CVE-2021-32695
PUBLISHED: 2021-06-17
Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.16.1, a malicious app on the same device could have gotten access to the shared preferences of the Nextcloud Android application. This required user-interaction as a victim had to initiate the sharing flow and choose t...