Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/27/2006
09:30 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Demons Lurk in Management Software

Systems management software may be the weakest link in the enterprise, according to researchers from Matasano Security

You know that management agent software that sits on nearly every server and workstation in your network? It may be the most dangerous software in your enterprise.

Researchers from Matasano Security have discovered holes in systems management software that allow it to be used for mass attacks within the network, either via an infected central management server that would take control of thousands of machines running its agent component, or via an infected client machine that could poison the management server. Matasano researchers will report their findings on these vulnerabilities at the upcoming Black Hat USA conference next month in Las Vegas.

Tom Ptacek, a researcher for Matasano, a security consulting firm, says during the past few months he and his colleagues discovered disturbing vulnerabilities in systems management software while testing out their thesis that non-Internet applications are ripe for attack. Ptacek wouldn't name any specific management products that fell prey to his firm's staged attacks, but he says they included major systems management vendors that handle things like patch management. This represents a $2 billion to $3 billion market, he says.

The researchers were able to crack the encryption algorithms around vendor-specific protocols and use their homegrown agents and "evil" management systems to see how much damage they could do. One glaring problem: The management server was sure to "call" the agent system to check on its software update status, Ptacek says, so it was easy for an infected agent to spread its poison to the server. Then the management server becomes a stepping stone to controlling all other machines, either by installing rootkits on them or grabbing sensitive information.

"We worry about an attacker seizing machines and owning them perpetually," says Ptacek, who was careful not to give away too much detail before management vendors get a chance to issue patches. "What they could do with access to thousands of machines is pretty scary."

These types of attacks so far haven't registered on the radar screen. And Matasano has been keeping management vendors apprised of the problems they found. "We don't know of anyone using these specific vulnerabilities," says Window Snyder, CTO of Matasano. "But this type of attack is so obvious it must have occurred."

And there's no telling what the overall impact would be of such an attack, Snyder says. But she's sure it would definitely be more widespread than an Internet-borne attack on a DMZ.

So just how serious is this systems management agent threat? "A seven on a one to 10 scale," says Richard Stiennon, chief research analyst for IT-Harvest. Stiennon says security management consoles could be next on the list.

Enterprises today are disciplined about patching and updating their operating systems and other software, says Danny McPherson, chief research officer for Arbor Networks. "But how vulnerable are the platforms that patch them?"

The threat to internal applications has been largely ignored to date, with security technology mostly focused on the perimeter. The bottom line is it's tough to build secure software applications, Ptacek says. But it seems to be slowly getting some much-needed attention -- startup V.i. Laboratories, which launched today, is honing in on application security. (See Startup Locks Down Apps.) And just last week, IBM announced tools for building security around applications.

Matasano researchers, meanwhile, had been probing various internal applications over the past year for vulnerabilities. They found the first big hole in an iSCSI storage appliance, which researchers were able to easily penetrate and grab its data without even having the password, Ptacek says. But systems management software had more far-reaching security risks.

With internal VPNs and wireless blurring the lines of the internal network, the inside is more susceptible than ever, says Arbor Networks' McPherson. "The target is more the inside" now, he says, so companies have to know their network- and host-level vulnerabilities.

"We don't want to wait until we're relying on the security of software to prevent attackers from wreaking havoc on enterprises," says Ptacek. "Right now, internal applications are not secure enough to withstand an internal attack. So it's time to take a very serious look."

— Kelly Jackson Higgins, Senior Editor, Dark Reading

Companies mentioned in this article:

  • Arbor Networks Inc.
  • Black Hat Inc.
  • Matasano Security LLC
  • V.i. Laboratories Inc.

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    News
    Inside the Ransomware Campaigns Targeting Exchange Servers
    Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
    Commentary
    Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
    Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-21392
    PUBLISHED: 2021-04-12
    Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 requests to user provided domains were not restricted to external IP addresses when transitional IPv6 addre...
    CVE-2021-21393
    PUBLISHED: 2021-04-12
    Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 Synapse is missing input validation of some parameters on the endpoints used to confirm third-party identif...
    CVE-2021-29429
    PUBLISHED: 2021-04-12
    In Gradle before version 7.0, files created with open permissions in the system temporary directory can allow an attacker to access information downloaded by Gradle. Some builds could be vulnerable to a local information disclosure. Remote files accessed through TextResourceFactory are downloaded in...
    CVE-2021-21394
    PUBLISHED: 2021-04-12
    Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 Synapse is missing input validation of some parameters on the endpoints used to confirm third-party identif...
    CVE-2021-22497
    PUBLISHED: 2021-04-12
    Advanced Authentication versions prior to 6.3 SP4 have a potential broken authentication due to improper session management issue.