Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint Security

12/12/2019
09:25 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Hardware Is the New Attack Surface – Forrester

Attackers have already begun to breach security at the BIOS level, according to a new report on BIOS security from Forrester Consulting.

Attackers have already begun to breach security at the BIOS level, according to a new report on BIOS securityfrom Forrester Consulting that was commissioned by Dell.

In this study, Forrester conducted an online survey of 307 enterprises in the US, Canada, the UK, France and Germany. Survey participants included decision makers in IT, security and risk/compliance roles at companies with more than 500 employees.

The report found that nearly two thirds (63%) of companies have experienced a "data compromise or breach within the past 12 months due to an exploited vulnerability in hardware- or silicon-level security." Of the 307 firms surveyed, 47% experienced at least two hardware-level attacks in the last 12 months.

Despite the fact that nearly two thirds of organizations recognize they have a moderate to extremely high level of exposure to threats affecting the hardware supply chain, just 59% have implemented a hardware supply chain security strategy.

While the majority of organizations reported hardware and endpoint security measures were their top security priorities in the coming year, when they were asked specifically about hardware-level defenses and supply chain protections there was little to point to as being part of an ongoing program. Perhaps for this reason, respondents said that they weren't properly prepared to address vulnerabilities at hardware levels.

The study also looked at security perceptions. Seven out of ten firms identified silicon-level security as very or critically important to overcoming potential and actual security challenges. Although 60% of firms see BIOS and firmware exploits as being "very" or "extremely" concerning, only half of the surveyed firms feel the same for silicon-level vulnerabilities, even though both levels of hardware problems could have equally catastrophic effects.

But changes are coming. The study says that firms have pledged to embrace more security practices in the coming months and that many have already begun adopting and investing in supply chain validation initiatives: 47% are implementing them now and 30% of the firms plan to implement them in the next 12 months.

Those firms that have invested in hardware-level security have high hopes for it, and some positive results to show. Organizations report growth in their enterprise's overall security (55%), reduced expenses to their hardware (39%), increased business continuity (44%), and expedited digital transformation (42%) as being a result of these increased measures.

Yet, only 28% of firms said that they were "satisfied" with the device security practices their vendors in the supply chain provided at the silicon level. Over half see security at the silicon level and throughout the supply chain as a standard in service from vendors (55% and 58%, respectively).

Organizations are showing through studies like this one that they are expecting their vendors to provide them a more complete validation of hardware than has been provided in the past. They are aware of the threats that can affect them via this vector, and want to be protected.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3166
PUBLISHED: 2021-01-18
An issue was discovered on ASUS DSL-N14U-B1 1.1.2.3_805 devices. An attacker can upload arbitrary file content as a firmware update when the filename Settings_DSL-N14U-B1.trx is used. Once this file is loaded, shutdown measures on a wide range of services are triggered as if it were a real update, r...
CVE-2020-29446
PUBLISHED: 2021-01-18
Affected versions of Atlassian Fisheye & Crucible allow remote attackers to browse local files via an Insecure Direct Object References (IDOR) vulnerability in the WEB-INF directory. The affected versions are before version 4.8.5.
CVE-2020-15864
PUBLISHED: 2021-01-17
An issue was discovered in Quali CloudShell 9.3. An XSS vulnerability in the login page allows an attacker to craft a URL, with a constructor.constructor substring in the username field, that executes a payload when the user visits the /Account/Login page.
CVE-2021-3113
PUBLISHED: 2021-01-17
Netsia SEBA+ through 0.16.1 build 70-e669dcd7 allows remote attackers to discover session cookies via a direct /session/list/allActiveSession request. For example, the attacker can discover the admin's cookie if the admin account happens to be logged in when the allActiveSession request occurs, and ...
CVE-2020-25533
PUBLISHED: 2021-01-15
An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...