Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:15 PM

Internet Scan Shows Decline in Insecure Network Services

While telnet, rsync, and SMB, exposure surprisingly have dropped, proper patching and encryption adoption remain weak worldwide.

A comprehensive study of Internet-connected devices conducted over nearly four weeks in late March and early April shows that organizations surprisingly have become better about not exposing the most insecure services to the Internet.

Rapid7 today released a massive 165-page report on the state of security on the Net that found easy-to-exploit protocols — such as server message block (SMB), file transfer protocol (FTP), and telnet — have declined anywhere from 2% to 16%, despite the move to remote work after the start of the coronavirus pandemic, according to Rapid7's National/Industry/Cloud Exposure Report (NICER). Given that Asia and Europe were firmly in lockdowns and the United States had just started entering its own lockdown, the researchers expected a lot more chaos.

The Internet's security situation has definitely improved, says Tod Beardsley, director of research for Rapid7. "We saw a fairly large drop in SMB and telnet, our favorite vulnerable punching bags — things that you should never, ever, ever put on the Internet," he says. "So, at least structurally, on a protocol and service basis, the Internet seems to be going in the right direction, which was surprising to us."

But a great deal of security problems continue to be apparent, Rapid7 found. Most organizations continue to delay patches, with 3.6 million SSH servers apparently running software version that are between 5- and 14-years old, the report found. More websites continue to offer the insecure HTTP protocol, rather than enforcing encrypted connections. 

For most protocols, millions of servers are running vulnerable versions of software or configured to allow the use of no encryption. Often, the infrastructure seems to be left vulnerable through neglect, the report stated. More than 3 million databases allow unencrypted queries, while nearly 3 million networking devices  — such as routers and switches — accept unencrypted telnet connections.

"The internet is not an automatic money- and culture-generating machine," the report stated. "It depends on the heroic efforts of thousands and thousands of professionals who are committed to its well-being, even in the face of daily attacks from a wide array of technically savvy criminals and spies."

The report also measured every country and industry based on the relative security of their Internet endpoints. Using a measure of vulnerable attack-surface area consisting of the number of Internet addresses, vulnerable software at those addresses, and the total number of vulnerabilities found in a specific device, Rapid7 created a measure of relative vulnerability for each country and industry. 

The United States and China sit at the top of the chart, which is unsurprising, given that the two countries own a great deal of Internet address space.

"With more endpoints, you have more chances to fail, because you have more patches you have to keep up with," Beardsley says

Rapid7 also graded each industry for its relative security posture, by combining the number of endpoints exposed with the number of vulnerabilities detected per endpoint. The aerospace and auto-parts manufacturing industries made top marks for security, while telecommunications, financial services, and healthcare sat at the bottom of the grading chart.  

The majority of instances of insecure protocols occurred in vulnerable versions of the Apache Web server, which for many organizations may represent an embedded server on a network appliance or other device. More than 80% of these vulnerable devices were more the three years old, Rapid7 says. 

The company argued that well-informed policy makers could help companies better secure their systems by issuing guidance on insecure protocols, share threat information about known weak protocols with other countries, and study how such protocols can affect national economies. 

"Overall, what we are finding is that businesses are slowly going in the right direction," Beardsley says. "The distribution is pretty lumpy, some countries are doing things better than other countries. There is work to be done here."

Related Content




Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for details on conference information and to register.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/13/2020
Where Are the 'Great Exits' in the Data Security Market?
Dave Cole, Cofounder and CEO, Open Raven,  10/13/2020
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-19
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and settin...
PUBLISHED: 2020-10-19
On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administr...
PUBLISHED: 2020-10-19
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malic...
PUBLISHED: 2020-10-19
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malic...
PUBLISHED: 2020-10-19
A flaw was found in Infinispan version 10, where it permits local access to controls via both REST and HotRod APIs. This flaw allows a user authenticated to the local machine to perform all operations on the caches, including the creation, update, deletion, and shutdown of the entire server.