Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

3/12/2018
08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

DHS Has Some Serious Security Failures, Report Finds

From running outdated versions of Windows, to not having effective backup, the US Department of Homeland Security has some serious security failings, according to a new report.

The US Department of Homeland Security (DHS) has serious cybersecurity problems, according to a recent report by the agency's watchdog -- the Office of Inspector General (OIG).

The OIG's investigation came after an executive order on cybersecurity was signed last May, which mandated that federal agencies audit their systems for vulnerabilities. This order was seen as a direct response to the numerous breaches that the US government has suffered over the past several years. (See US Government Leads World in Data Breaches .)

In its audit, the OIG tested DHS's ability to identify, protect, detect, respond to and recover from cybersecurity issues.

In the report, the OIG found that DHS was using unsupported operating systems in routine work, and the agency also had not installed key security patches designed to protect against "critical" and "high-risk" vulnerabilities. Additionally, it did not monitor the software licenses for unclassified systems.

As an example, inspectors found the department using unsupported Windows 2003 Server software in systems that were in use at DHS headquarters, the Coast Guard and the Secret Service.

The Federal Emergency Management Agency (FEMA) was found to use unsupported Windows 7 in some of its workstations.

Microsoft Windows 8.1 and Windows 7 workstations were found to be vulnerable to the WannaCry exploit, and had not been patched. Patches for Adobe Flash were also not installed.

In Windows 2008 and 2012 operating systems, some patches that dated to 2013 had not been applied. Java, Internet Explorer, and Sidebar applications had not been patched either.

Overall, investigators found 64 vulnerable systems -- 48 unclassified and 16 national security -- on the department's network lacked the "authority to operate," according to the report. Worryingly, more than a dozen of these were storing highly sensitive classified information. Complete information about these systems was not maintained by the departments operating them to remediate security weaknesses in a timely manner.

The report did not specify which particular federal agencies where operating the vulnerable classified systems. However, it did note that FEMA had 15 unclassified systems that lost their authority to operate.


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth-annual Big Communications Event. There's still time to register and communications service providers get in free!

The investigation did find that DHS had met the OIG's standards to respond to security attacks, but did not meet those that were involved in its ability to recover from these types of attacks.

In recovery efforts, OIG found that contingency plans for DHS IT systems were never tested. It also found that proper procedures for handling sensitive data had not been developed. Additionally, the investigation found no alternative data center was available to carry on if a distributed denial of service (DDoS) attack had been implemented.

In the report, DHS noted that it concurred with the OIG's findings, and made a pledge to resolve them by September.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17452
PUBLISHED: 2020-08-09
flatCore before 1.5.7 allows upload and execution of a .php file by an admin.
CVE-2020-17451
PUBLISHED: 2020-08-09
flatCore before 1.5.7 allows XSS by an admin via the acp/acp.php?tn=pages&sub=edit&editpage=1 page_linkname, page_title, page_content, or page_extracontent parameter, or the acp/acp.php?tn=system&sub=sys_pref prefs_pagename, prefs_pagetitle, or prefs_pagesubtitle parameter.
CVE-2020-17447
PUBLISHED: 2020-08-09
MyBB before 1.8.24 allows XSS because the visual editor mishandles [align], [size], [quote], and [font] in MyCode.
CVE-2020-16248
PUBLISHED: 2020-08-09
** DISPUTED ** Prometheus Blackbox Exporter through 0.17.0 allows /probe?target= SSRF. NOTE: follow-on discussion suggests that this might plausibly be interpreted as both intended functionality and also a vulnerability.
CVE-2020-15820
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, the markdown parser could disclose hidden file existence.