Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Worm Illuminates Potential NAS Nightmare
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
9/17/2014 | 10:48:46 AM
Re: NAS, SAN or DAS
It always comes back to encryption, doesn't it? If the data stored in the NAS were locked down with encryption, it would be worthless to the data thief. But unfortunately, encryption just isn't standard procedure today in many cases. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/16/2014 | 6:36:48 PM
Re: sigh ..aka researchers are creating more harm than good
I partially agree but if there is vulnerability it would be exploited at one point, it would always be better knowing about it and taking preventive actions.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/16/2014 | 6:34:54 PM
Re: NAS vulns
I would agree at the sane time if storage and router is vulnerable that simply means whole network is vulnerable. We may need to check and consider in a wider perspective.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/16/2014 | 6:32:52 PM
NAS, SAN or DAS
If they found vulnerability in NAS one should assume the sabe security flows in SAN and DAS. No system is security-proof. Unless data is encrypted at rest I would consider the storage unsecure and start from them.
Kelly Jackson Higgins
0%
100%
Kelly Jackson Higgins,
User Rank: Strategist
9/16/2014 | 9:30:55 AM
NAS vulns
Holcomb has found that NAS devices are more vulnerable than Soho routers--that should be a wakeup call since he found some 56 vulns in routers and expects to find even more in NASes. Not to mention they hold potentially valuable info.

 
geektechTX
0%
100%
geektechTX,
User Rank: Guru
9/16/2014 | 6:29:46 AM
sigh ..aka researchers are creating more harm than good
like to know who is funding these research to create viruses to attack NAS ..i am wore out as geek and tech after 15 years of cleannig machines , fake AV's and all kinds of malware peoople choose to click or install without realizing it is virus ..i almost became researcher aka virus creator and progammer i had training when i was 16-18 but i said No to recuiter and start my 2 companies didnt come back to progamming until recently ..and been dealing with anonymous members nearly taking everything i had and fighting back to regain my footing now the member was harrarssing me is scared of me ..yet Bloomberg TV/West refused my offers to expose this anon i had deal with too much losses and too many close calls with dealth at hospitals ..i am stil trying to get my story out int the public but someone keeps trying to shut me up and make my ass poor again lucky i am in politics now i got plenty of lawyer friends that will want to hear my story help me put the group into default and crying hackers because they turned on the wrong geek was prepared for war ..AIM high like Air Force ..! 


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.