Malware Devil

Monday, March 15, 2021

CEO of Encrypted Chat Platform Indicted for Aiding Organised Criminals

The U.S. Department of Justice (DoJ) on Friday announced an indictment against Jean-Francois Eap, the CEO of encrypted messaging company Sky Global, and an associate for wilfully participating in a criminal enterprise to help international drug traffickers avoid law enforcement.

Eap (also known as “888888”) and Thomas Herdman, a former high-level distributor of Sky Global devices, have been charged with a conspiracy to violate the federal Racketeer Influenced and Corrupt Organizations Act (RICO), according to warrants issued for their arrests.

“The indictment alleges that Sky Global generated hundreds of millions of dollars providing a service that allowed criminal networks around the world to hide their international drug trafficking activity from law enforcement,” Acting U.S. Attorney Randy Grossman said in the announcement. “This groundbreaking investigation should send a serious message to companies who think they can aid criminals in their unlawful activities.”

Specifically, the indictment alleges that the company “knowingly and intentionally” sold its encrypted communications devices to criminal organizations involved in the transnational importation and distribution of narcotics, used digital currencies such as Bitcoin to conduct illegal transactions on the firm’s website, and protect its customers’ anonymity, and obstructed investigations of drug trafficking by “remotely delet[ing] evidence of such activities.”

A Wave of Law Enforcement Action

The development comes on the heels of a coordinated exercise called “Operation Argus” and “Operation A-Limit,” in which law enforcement agencies from Belgium, France, and the Netherlands announced major interventions against the messaging platform to disrupt the illegal use of encrypted communications by large-scale organized crime groups (OCGs).

By successfully breaking the encryption protections of Sky ECC in mid-February, authorities said they were able to decipher over half a billion messages and gain “invaluable insights into hundreds of millions of messages exchanged between criminals,” culminating in a series of nearly 275 raids and the arrest of 91 suspects, besides seizing 17 tonnes of cocaine and EUR1.2 million.

The Belgian Federal Police and the Dutch National Police said the encrypted message traffic was read “live” for a period of about three weeks, forestalling “dozens of planned serious violent crimes, including kidnappings, liquidations and shootings.”

“This has resulted in the collection of crucial information on over a hundred of planned large-scale criminal operations, preventing potential life threatening situations and possible victims,” Europol noted.

Sky ECC is said to have surged in popularity following a similar takedown of Encrochat last July by French and Dutch investigators, with many criminal gangs shifting to the service to carry out criminal acts. Sky, like Encrochat’s EncroPhone, is part of the encrypted phone industry, in which iPhone, Google Pixel, and Blackberry handsets are altered by incorporating tamper-resistant hardware and OS-level protections capable of resisting (lawful) attempts to gain access to their contents.

Sold for either a three or six months subscription at $185/month, the phones also integrate their own encrypted messaging applications with support for self-destructing chats, in addition to disabling features like camera outside of the app, microphone, calling, Bluetooth, NFC, biometrics, GPS sensors, and app store access that could potentially compromise security.

Worldwide, there are an estimated 170,000 Sky ECC custom-made phones in service, Europol said, adding around three million messages are being exchanged each day on a global scale. Sky ECC is operated from the U.S. and Canada while making use of computer servers based in Europe. Around a quarter of its active users are located in Belgium and the Netherlands.

Sky ECC Denies Involvement

Denying that it’s a “platform of choice for criminals,” Sky ECC contested its involvement in the operations and said that its platform remains secure and that none of the authorized devices had been hacked, instead pointing fingers at an impostor reseller (named “SKYECC.EU”) that had no connection to the company.

“SKY ECC authorized distributors in Belgium and the Netherlands brought to our attention that a fake phishing application falsely branded as SKY ECC was illegally created, modified and side-loaded onto unsecure devices, and security features of authorized SKY ECC phones were eliminated in these bogus devices which were then sold through unauthorized channels,” the company said.

The company has also claimed it had not been contacted by any investigative authority, nor it cooperated with the parties involved with the fake phishing application.

Responding to the DoJ’s indictment, Eap said, “the unfounded allegations of involvement in criminal activity by me and our company are entirely false,” adding, “In the coming days, my efforts will be focused on clearing my name of these allegations.”

Sky Global’s technology “was not created to prevent the police from monitoring criminal organizations; it exists to prevent anyone from monitoring and spying on the global community,” he added.

News of Sky ECC’s dismantlement also follows a similar crackdown on providers of encrypted communications, including Ennetcom and Phantom Secure, over the past five years.

Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.

Read More

The post CEO of Encrypted Chat Platform Indicted for Aiding Organised Criminals appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/ceo-of-encrypted-chat-platform-indicted-for-aiding-organised-criminals/?utm_source=rss&utm_medium=rss&utm_campaign=ceo-of-encrypted-chat-platform-indicted-for-aiding-organised-criminals

Naked Security Live – HAFNIUM explained in plain English

Latest episode – watch now!
Read More

The post Naked Security Live – HAFNIUM explained in plain English appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/naked-security-live-hafnium-explained-in-plain-english/?utm_source=rss&utm_medium=rss&utm_campaign=naked-security-live-hafnium-explained-in-plain-english

Reverse Engineering: A Security Researcher’s Toolkit

Craig Young, Principal Security Researcher at Tripwire, unpacks the modern security researcher’s toolkit to reverse engineer complex designs. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://www.youtube.com/playlist?list=PLgTfY3TXF9YKE9pUKp57pGSTaapTLpvC3 Tim Erlin: Welcome everyone to the Tripwire Cybersecurity Podcast. I’m Tim Erlin, vice-president of product management and strategy at Tripwire. Today, I am joined by one of our security researchers, Craig Young. […]… Read More

The post Reverse Engineering: A Security Researcher’s Toolkit appeared first on The State of Security.

The post Reverse Engineering: A Security Researcher’s Toolkit appeared first on Security Boulevard.

Read More

The post Reverse Engineering: A Security Researcher’s Toolkit appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/reverse-engineering-a-security-researchers-toolkit/?utm_source=rss&utm_medium=rss&utm_campaign=reverse-engineering-a-security-researchers-toolkit

Unlock a New Level of Security at Secure Coding Virtual Summit

Secure Coding - cybersecurity - security - DevSecOps -Threat Modeling - AppSec - Application security

A lot of cyberattacks can be prevented by developers who have the right security tools and training. The challenge is that most do not have a full understanding of security best practices. At Secure Coding Virtual Summit, industry-leading AppSec and DevSecOps practitioners, analysts and visionaries will come together to share practical tips and provide guidance..

The post Unlock a New Level of Security at Secure Coding Virtual Summit appeared first on Security Boulevard.

Read More

The post Unlock a New Level of Security at Secure Coding Virtual Summit appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/unlock-a-new-level-of-security-at-secure-coding-virtual-summit/?utm_source=rss&utm_medium=rss&utm_campaign=unlock-a-new-level-of-security-at-secure-coding-virtual-summit

RPA’s Impact on Governance, Risk Management and Compliance

risk Exabeam

Intelligent automation (IA) is transforming the way organizations operate everything from finance to operations and human resources. Basic robotic process automation (RPA), or advanced process developments such as artificial intelligence (AI), can unlock the potential to do things faster, better and at a lower cost. These technologies are fairly easy to deploy and deliver quick..

The post RPA’s Impact on Governance, Risk Management and Compliance appeared first on Security Boulevard.

Read More

The post RPA’s Impact on Governance, Risk Management and Compliance appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/rpas-impact-on-governance-risk-management-and-compliance/?utm_source=rss&utm_medium=rss&utm_campaign=rpas-impact-on-governance-risk-management-and-compliance

Verkada Surveillance Hack, Breach Highlights IoT Risks

Verkada AI surveillance

Building security vendor Verkada Inc. reported a breach of customer surveillance data to the U.S. Federal Bureau of Investigation (FBI), the company said in a statement. News of the Verkada breach broke Tuesday, along with the release of photos and videos from a number of the approximately 150,000 connected cameras. The affected businesses included such..

The post Verkada Surveillance Hack, Breach Highlights IoT Risks appeared first on Security Boulevard.

Read More

The post Verkada Surveillance Hack, Breach Highlights IoT Risks appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/verkada-surveillance-hack-breach-highlights-iot-risks/?utm_source=rss&utm_medium=rss&utm_campaign=verkada-surveillance-hack-breach-highlights-iot-risks

Encryption Backdoor Debate, Microsoft Exchange Attacks, Airline Supplier Data Breach

Why is federal law enforcement (still) asking Congress for encryption backdoors? Attacks on Microsoft Exchange servers seem to have gotten worse, details on an airline supplier data breach, and the real reason Kevin hasn’t replaced his Chewbacca mannequin with Darth Vader! ** Links mentioned on the show ** The FBI Should Stop Attacking Encryption and […]

The post Encryption Backdoor Debate, Microsoft Exchange Attacks, Airline Supplier Data Breach appeared first on The Shared Security Show.

The post Encryption Backdoor Debate, Microsoft Exchange Attacks, Airline Supplier Data Breach appeared first on Security Boulevard.

Read More

The post Encryption Backdoor Debate, Microsoft Exchange Attacks, Airline Supplier Data Breach appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/encryption-backdoor-debate-microsoft-exchange-attacks-airline-supplier-data-breach/?utm_source=rss&utm_medium=rss&utm_campaign=encryption-backdoor-debate-microsoft-exchange-attacks-airline-supplier-data-breach

What Does the HIPAA Safe Harbor Bill Mean for Your Practice?

Getting incentives for the best security practices is a win-win for all healthcare-related entities. For one, you are getting incentives, and secondly, you are making sure that you have a rock-solid defense in terms of security.  Many organizations find that the rules and regulations that HIPAA entails are too extensive and overwhelming, however. What’s more, […]… Read More

The post What Does the HIPAA Safe Harbor Bill Mean for Your Practice? appeared first on The State of Security.

The post What Does the HIPAA Safe Harbor Bill Mean for Your Practice? appeared first on Security Boulevard.

Read More

The post What Does the HIPAA Safe Harbor Bill Mean for Your Practice? appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/what-does-the-hipaa-safe-harbor-bill-mean-for-your-practice/?utm_source=rss&utm_medium=rss&utm_campaign=what-does-the-hipaa-safe-harbor-bill-mean-for-your-practice

ESB-2021.0906 – ALERT [Win][UNIX/Linux] Google Chrome: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0906
                    Google Chrome Stable Channel Update
                               15 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Google Chrome
Publisher:         Google
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-21193 CVE-2021-21192 CVE-2021-21191

Original Bulletin: 
   https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html

Comment: Google reports that an exploit for CVE-2021-21193 exists in the wild.

- --------------------------BEGIN INCLUDED TEXT--------------------

Stable Channel Update for Desktop

Friday, March 12, 2021

The Stable channel has been updated to 89.0.4389.90 for Windows, Mac and  
Linux which will roll out over the coming days/weeks.

A full list of changes in this build is available in the log. Interested
in switching release channels?  Find out how here. If you find a new issue,
please let us know by filing a bug. The community help forum is also a great 
place to reach out for help or learn about common issues.


Security Fixes and Rewards

Note: Access to bug details and links may be kept restricted until a majority
of users are updated with a fix. We will also retain restrictions if the bug
exists in a third party library that other projects similarly depend on, but 
haven't yet fixed.


This update includes 5 security fixes. Below, we highlight fixes that were  
contributed by external researchers. Please see the Chrome Security Page  
for more information.


[$500][1167357] High CVE-2021-21191: Use after free in WebRTC. Reported by  
raven (@raid_akame)  on 2021-01-15

[$TBD][1181387] High CVE-2021-21192: Heap buffer overflow in tab groups.
Reported by Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research 
on 2021-02-23

[$TBD][1186287] High CVE-2021-21193: Use after free in Blink. Reported by
Anonymous on 2021-03-09


We would also like to thank all security researchers that worked with us  
during the development cycle to prevent security bugs from ever reaching  
the stable channel.
Google is aware of reports that an exploit for CVE-2021-21193 exists in the  
wild.


As usual, our ongoing internal security work was responsible for a wide  
range of fixes:[1187298] Various fixes from internal audits, fuzzing and  
other initiatives


Many of our security bugs are detected using AddressSanitizer,  
MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity,  
libFuzzer, or AFL.


Prudhvikumar Bommana
Google Chrome

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=3SuF
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0906 – ALERT [Win][UNIX/Linux] Google Chrome: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/esb-2021-0906-alert-winunix-linux-google-chrome-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0906-alert-winunix-linux-google-chrome-multiple-vulnerabilities

ISC Stormcast For Monday, March 15th, 2021 https://isc.sans.edu/podcastdetail.html?id=7412, (Mon, Mar 15th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Monday, March 15th, 2021 https://isc.sans.edu/podcastdetail.html?id=7412, (Mon, Mar 15th) appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/isc-stormcast-for-monday-march-15th-2021-https-isc-sans-edu-podcastdetail-htmlid7412-mon-mar-15th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-monday-march-15th-2021-https-isc-sans-edu-podcastdetail-htmlid7412-mon-mar-15th

ESB-2020.0435.6 – UPDATE [Win] BIG-IP Edge Client for Windows: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2020.0435.6
        BIG-IP Edge Client for Windows vulnerability CVE-2020-5855
                               15 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           BIG-IP Edge Client for Windows
Publisher:         F5 Networks
Operating System:  Windows
Impact/Access:     Denial of Service        -- Console/Physical
                   Access Confidential Data -- Console/Physical
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-5855  

Original Bulletin: 
   https://support.f5.com/csp/article/K55102004

Revision History:  March     15 2021: Issue with vendor update and fixes introduced
                   November  19 2020: Vendor added fixes introduced
                   September 18 2020: Vendor updated advisory
                   September  4 2020: Vendor updated product matrix
                   March      4 2020: Additional versions known vulnerable 
                   February   6 2020: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

K55102004: BIG-IP Edge Client for Windows vulnerability CVE-2020-5855

Original Publication Date: 06 Feb, 2020
Latest   Publication Date: 12 Mar, 2021

Security Advisory Description

When the Windows Logon Integration feature is configured for BIG-IP Edge
Client, unauthorized users who have physical access to an authorized user's
machine can get shell access under unprivileged user. (CVE-2020-5855)

Impact

Attackers may be able to bypass authentication to gain unauthorized access to
internal resources or compromise the availability of the resources.

Security Advisory Status

F5 Product Development has assigned ID 842717 (BIG-IP) to this vulnerability.

To determine if your product and version have been evaluated for this
vulnerability, refer to the Applies to (see versions) box. To determine if your
release is known to be vulnerable, the components or features that are affected
by the vulnerability, and for information about releases, point releases, or
hotfixes that address the vulnerability, refer to the following table. For more
information about security advisory versioning, refer to K51812227:
Understanding Security Advisory versioning.

+-------------------+------+----------+----------+----------+------+----------+
|                   |      |Versions  |Fixes     |          |CVSSv3|Vulnerable|
|Product            |Branch|known to  |introduced|Severity  |score^|component |
|                   |      |be        |in        |          |1     |or feature|
|                   |      |vulnerable|          |          |      |          |
+-------------------+------+----------+----------+----------+------+----------+
|                   |16.x  |16.0.0 -  |16.0.1.1  |          |      |          |
|                   |      |16.0.1^2  |          |          |      |          |
|                   +------+----------+----------+          |      |          |
|                   |15.x  |15.0.0 -  |15.1.2    |          |      |          |
|                   |      |15.1.1^2  |          |          |      |          |
|                   +------+----------+----------+          |      |          |
|                   |14.x  |14.1.0 -  |14.1.3.1  |          |      |          |
|                   |      |14.1.2^2  |          |          |      |Edge      |
|BIG-IP (APM)       +------+----------+----------+Medium    |4.3   |Client for|
|                   |13.x  |13.1.0 -  |13.1.3.5  |          |      |Windows   |
|                   |      |13.1.3^2  |          |          |      |          |
|                   +------+----------+----------+          |      |          |
|                   |12.x  |12.1.0 -  |12.1.5.3* |          |      |          |
|                   |      |12.1.5    |          |          |      |          |
|                   +------+----------+----------+          |      |          |
|                   |11.x  |11.5.2 -  |None      |          |      |          |
|                   |      |11.6.5^3  |          |          |      |          |
+-------------------+------+----------+----------+----------+------+----------+
|                   |      |          |7.2.1     |          |      |Edge      |
|BIG-IP (APM        |7.x   |7.1.9     |7.1.9.7   |Medium    |4.3   |Client for|
|Clients)           |      |7.1.5 -   |7.1.8.4   |          |      |Windows   |
|                   |      |7.1.8     |          |          |      |          |
+-------------------+------+----------+----------+----------+------+----------+
|                   |15.x  |None      |Not       |          |      |          |
|                   |      |          |applicable|          |      |          |
|                   +------+----------+----------+          |      |          |
|                   |14.x  |None      |Not       |          |      |          |
|BIG-IP (LTM, AAM,  |      |          |applicable|          |      |          |
|AFM, Analytics,    +------+----------+----------+          |      |          |
|ASM, DNS, FPS, GTM,|13.x  |None      |Not       |Not       |None  |None      |
|Link Controller,   |      |          |applicable|vulnerable|      |          |
|PEM)               +------+----------+----------+          |      |          |
|                   |12.x  |None      |Not       |          |      |          |
|                   |      |          |applicable|          |      |          |
|                   +------+----------+----------+          |      |          |
|                   |11.x  |None      |Not       |          |      |          |
|                   |      |          |applicable|          |      |          |
+-------------------+------+----------+----------+----------+------+----------+
|Enterprise Manager |3.x   |None      |Not       |Not       |None  |None      |
|                   |      |          |applicable|vulnerable|      |          |
+-------------------+------+----------+----------+----------+------+----------+
|                   |7.x   |None      |Not       |          |      |          |
|                   |      |          |applicable|          |      |          |
|                   +------+----------+----------+          |      |          |
|BIG-IQ Centralized |6.x   |None      |Not       |Not       |None  |None      |
|Management         |      |          |applicable|vulnerable|      |          |
|                   +------+----------+----------+          |      |          |
|                   |5.x   |None      |Not       |          |      |          |
|                   |      |          |applicable|          |      |          |
+-------------------+------+----------+----------+----------+------+----------+
|Traffix SDC        |5.x   |None      |Not       |Not       |None  |None      |
|                   |      |          |applicable|vulnerable|      |          |
+-------------------+------+----------+----------+----------+------+----------+

^*An issue with the bigd process has been discovered in version 12.1.5.3. For
more information, refer to K50524736: Bigd process memory leak after updating
to BIG-IP 12.1.5.3.

^1The CVSSv3 score link takes you to a resource outside of AskF5, and it is
possible that the document may be removed without our knowledge.

^2In BIG-IP APM 13.1.0 and later, you can update the APM Clients components
independently from BIG-IP software.  For more information, refer to K52547540:
Updating the BIG-IP Edge Client for the BIG-IP APM system. To address this
vulnerability in BIG-IP 13.1.0 and later, download and install an APM Clients
version listed in the Fixes introduced in column and redeploy to end users.

^3F5 will not develop a fix for vulnerable products that do not already have a
fixed version listed in this article, and will not update this table with
subsequent vulnerable releases in the associated branches. F5 recommends that
you update to more recent, non-vulnerable versions whenever feasible. For more
information, refer to K4602: Overview of the F5 security vulnerability response
policy.

Recommended Actions

If you are running a version listed in the Versions known to be vulnerable
column, you can eliminate this vulnerability by upgrading to a version listed
in the Fixes introduced in column. If the table lists only an older version
than what you are currently running, or does not list a non-vulnerable version,
then no upgrade candidate currently exists.

Mitigation

To mitigate this vulnerability, you can configure the following Windows
registry entries on the client machine connecting to the BIG-IP APM system to
disallow several Internet Explorer keyboard short cuts. To do so, perform the
following procedure:

For more information about configuring registry entries, refer to the Using the
Registry documentation on the Microsoft Docs website.

Note: This link takes you to a resource outside of AskF5, and it is possible
that the document may be removed without our knowledge.

Impact of action: Performing the following procedure should not have a negative
impact on your client system.

 1. Log in to the Windows client machine.
 2. To open the Registry Editor, select and hold (or right-click) Start 
    and select Run.
 3. For Open, enter regedit, then select OK.
 4. Edit the registry entries as follows:

    Windows Registry Editor Version 5.00

    [HKEY_CURRENT_USERSoftwarePoliciesMicrosoftInternet Explorer
    Restrictions]
    "NoFileOpen"=dword:00000001
    "NoFileNew"=dword:00000001
    "NoOpeninNewWnd"=dword:00000001

 5. Save the entries and exit the Registry Editor.

Acknowledgements

F5 would like to acknowledge Michael Molho of e-Xpert Solutions SA for bringing
this issue to our attention and for following the highest standards of
coordinated disclosure.

Supplemental Information

o K40131499: Configuring Dialup Entry/Windows Logon Integration
  o K41942608: Overview of Security Advisory articles
  o K4602: Overview of the F5 security vulnerability response policy
  o K4918: Overview of the F5 critical issue hotfix policy
  o K9502: BIG-IP hotfix and point release matrix
  o K13123: Managing BIG-IP product hotfixes (11.x - 16.x)
  o K167: Downloading software and firmware from F5
  o K9970: Subscribing to email notifications regarding F5 products
  o K9957: Creating a custom RSS feed to view new and updated documents

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ovFL
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.0435.6 – UPDATE [Win] BIG-IP Edge Client for Windows: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/esb-2020-0435-6-update-win-big-ip-edge-client-for-windows-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-0435-6-update-win-big-ip-edge-client-for-windows-multiple-vulnerabilities

ESB-2021.0905 – [Debian] mupdf: Denial of service – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0905
                          mupdf regression update
                               15 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           mupdf
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-26519  

Reference:         ESB-2021.0884
                   ESB-2020.4140

Original Bulletin: 
   https://www.debian.org/lts/security/2021/dla-2589-2

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-2589-2              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
March 14, 2021                              https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------

Package        : mupdf
Version        : 1.9a+ds1-4+deb9u7

DLA 2589-1 incorrectly fixed CVE-2020-26519 and also induced
regression where opening a PDF document resulted in a
SIGFPE crash, a floating point exception.

For Debian 9 stretch, this problem has been fixed in version
1.9a+ds1-4+deb9u7.

We recommend that you upgrade your mupdf packages.

For the detailed security status of mupdf please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mupdf

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmBOOgkACgkQgj6WdgbD
S5ZZiRAAnmEtwrckSzAqcBy6IBAIQ6aLZYTvBTD2+OelMwD9kVFdJkJN6B91ftlS
v1DJTp+sF2PVUO4y2Mpst/cNP6VgCFFpx3XyepJwYOQR6PQ2ULirZ87BjL5aVdaM
Hkvwryfv0ZliQ9ts8iDV+6lXmMm42RFJXa1GkzcDxH7dgXHxntqX/wJP0ec3AIjd
C0zW+ImgNa6lypgvSAwidM36EnxaRXMkVK7HtN9Riz0qW4g8rSriEWfjluPiRdQ+
pb4CbaUZ0ErhjI+bA8EahyhUd/NnGRCB59nzZlhLY8HeByNvaIJUEZ8VPCM2Vduj
xvVzgsErZ9YyHKuO8jVSD55BgoN3eL3hn8RYmRMmKcyLTEQNNUerUDLIhuvQ7kvE
SJ65a1ijthXRMsDqTVVKvRvhnehttTVosq738aXiC+Q0G8WEO9OrKrCbCwsfji2+
TH5IZnUgsQ+N3bG1u1A4RTxvL5j63AnIeJOau+vwP956hvCc57A0LPTOqD/D2SyQ
36gVz9tV7yQ6ndkgjHjZO6umJMR+IoIFi1F1OUAGHWRlHNfdSn1plAtky72zC7Kj
e6ZFOqcsaMrVlqrOzRvHZow22DkjFIJl0MKWwoCFg6anM0Oh50OzUQkvz08UUj1O
XlrRvRHKmKVSED2A6+sJeQzeal/ub+e2NC/NvK/uK7+kKc//t1c=
=YqcF
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Br3Z
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0905 – [Debian] mupdf: Denial of service – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/esb-2021-0905-debian-mupdf-denial-of-service-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0905-debian-mupdf-denial-of-service-existing-account

ESB-2021.0904 – [SUSE] stunnel: Unauthorised access – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0904
                        Security update for stunnel
                               15 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           stunnel
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Unauthorised Access -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-20230  

Reference:         ESB-2021.0662

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20210772-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for stunnel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0772-1
Rating:            important
References:        #1177580 #1182529
Cross-References:  CVE-2021-20230
Affected Products:
                   SUSE Linux Enterprise Module for Server Applications 15-SP2
______________________________________________________________________________

An update that solves one vulnerability and has one errata is now available.

Description:

This update for stunnel fixes the following issues:

  o Security fix: [bsc#1177580, bsc#1182529, CVE-2021-20230] * "redirect"
    option does not properly handle "verifyChain = yes"

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Server Applications 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP2-2021-772=1

Package List:

  o SUSE Linux Enterprise Module for Server Applications 15-SP2 (aarch64
    ppc64le s390x x86_64):
       stunnel-5.57-3.11.1
       stunnel-debuginfo-5.57-3.11.1
       stunnel-debugsource-5.57-3.11.1


References:

  o https://www.suse.com/security/cve/CVE-2021-20230.html
  o https://bugzilla.suse.com/1177580
  o https://bugzilla.suse.com/1182529

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=H1UQ
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0904 – [SUSE] stunnel: Unauthorised access – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/esb-2021-0904-suse-stunnel-unauthorised-access-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0904-suse-stunnel-unauthorised-access-remote-unauthenticated

ESB-2021.0872.2 – UPDATED ALERT [Appliance] BIG-IP Products: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2021.0872.2
                Advanced WAF/ASM - Multple Vulnerabilities
                               15 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           BIG-IP Products
Publisher:         F5 Networks
Operating System:  Network Appliance
Impact/Access:     Root Compromise                 -- Remote/Unauthenticated      
                   Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Create Arbitrary Files          -- Existing Account            
                   Denial of Service               -- Remote/Unauthenticated      
                   Cross-site Scripting            -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-23001 CVE-2021-22993 CVE-2021-22992
                   CVE-2021-22990 CVE-2021-22989 CVE-2021-22988
                   CVE-2021-22987 CVE-2021-22986 

Original Bulletin: 
   https://support.f5.com/csp/article/K45056101
   https://support.f5.com/csp/article/K52510511
   https://support.f5.com/csp/article/K55237223
   https://support.f5.com/csp/article/K06440657

Comment: This bulletin contains four (4) F5 Networks security advisories.

Revision History:  March 15 2021: Added multiple BIG-IP Products for K52510511
                   March 11 2021: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

K45056101: Advanced WAF/ASM TMUI authenticated remote command execution
vulnerability CVE-2021-22990

Original Publication Date: 11 Mar, 2021

Security Advisory Description

On systems with Advanced WAF or BIG-IP ASM provisioned, the Traffic Management
User Interface (TMUI), also referred to as the Configuration utility, has an
authenticated remote command execution vulnerability in undisclosed pages. (
CVE-2021-22990)

Note: For systems running in Appliance mode, refer to K56142644 Appliance Mode
Advanced WAF/ASM TMUI authenticated remote command execution vulnerability
CVE-2021-22989.

Impact

This vulnerability allows highly privileged authenticated users with the roles
Administrator, Resource Administrator, or Application Security Administrator
with network access to the Configuration utility, through the BIG-IP management
port or self IP addresses, to execute arbitrary system commands, create and
delete files, or disable services. This vulnerability can only be exploited
through the control plane and cannot be exploited through the data plane.
Exploitation can lead to complete system compromise.

Note: If you believe your system may have been compromised, refer to K11438344:
Considerations and guidance when you suspect a security compromise on a BIG-IP
system.

Security Advisory Status

F5 Product Development has assigned ID 953729 (BIG-IP) to this vulnerability.

To determine if your product and version have been evaluated for this
vulnerability, refer to the Applies to (see versions) box. To determine if your
release is known to be vulnerable, the components or features that are affected
by the vulnerability, and for information about releases, point releases, or
hotfixes that address the vulnerability, refer to the following table. For more
information about security advisory versioning, refer to K51812227:
Understanding security advisory versioning.

+-------------+------+-------------+----------+----------+------+-------------+
|             |      |Versions     |Fixes     |          |CVSSv3|Vulnerable   |
|Product      |Branch|known to be  |introduced|Severity  |score^|component or |
|             |      |vulnerable   |in        |          |1     |feature      |
+-------------+------+-------------+----------+----------+------+-------------+
|             |16.x  |16.0.0 -     |16.0.1.1  |          |      |             |
|             |      |16.0.1       |          |          |      |             |
|             +------+-------------+----------+          |      |             |
|             |15.x  |15.1.0 -     |15.1.2.1  |          |      |             |
|             |      |15.1.2       |          |          |      |             |
|             +------+-------------+----------+          |      |             |
|             |14.x  |14.1.0 -     |14.1.4    |          |      |             |
|BIG-IP       |      |14.1.3       |          |          |      |TMUI/        |
|(Advanced WAF+------+-------------+----------+Medium    |6.6   |Configuration|
|and ASM)     |13.x  |13.1.0 -     |13.1.3.6  |          |      |utility      |
|             |      |13.1.3       |          |          |      |             |
|             +------+-------------+----------+          |      |             |
|             |12.x  |12.1.0 -     |12.1.5.3  |          |      |             |
|             |      |12.1.5       |          |          |      |             |
|             +------+-------------+----------+          |      |             |
|             |11.x  |11.6.1 -     |11.6.5.3  |          |      |             |
|             |      |11.6.5       |          |          |      |             |
+-------------+------+-------------+----------+----------+------+-------------+
|             |8.x   |None         |Not       |          |      |             |
|             |      |             |applicable|          |      |             |
|BIG-IQ       +------+-------------+----------+          |      |             |
|Centralized  |7.x   |None         |Not       |Not       |None  |None         |
|Management   |      |             |applicable|vulnerable|      |             |
|             +------+-------------+----------+          |      |             |
|             |6.x   |None         |Not       |          |      |             |
|             |      |             |applicable|          |      |             |
+-------------+------+-------------+----------+----------+------+-------------+
|F5OS         |1.x   |None         |Not       |Not       |None  |None         |
|             |      |             |applicable|vulnerable|      |             |
+-------------+------+-------------+----------+----------+------+-------------+
|Traffix SDC  |5.x   |None         |Not       |Not       |None  |None         |
|             |      |             |applicable|vulnerable|      |             |
+-------------+------+-------------+----------+----------+------+-------------+

^1The CVSSv3 score link takes you to a resource outside of AskF5, and it is
possible that the document may be removed without our knowledge.

Recommended Actions

If you are running a version listed in the Versions known to be vulnerable
column, you can eliminate this vulnerability by installing a version listed in
the Fixes introduced in column. If the table does not list a fixed version for
your software branch, then no update candidate currently exists for that branch
and F5 recommends upgrading to a version with the fix (refer to the table).

If the Fixes introduced in column lists a version prior to the one you are
running, in the same branch, then your version should have the fix. Refer to 
K51812227: Understanding security advisory versioning.

If you are using public cloud marketplaces (AWS, Azure, GCP, or Alibaba) to
deploy BIG-IP Virtual Edition (VE), F5 recommends that you install the latest
releases of BIG-IP versions listed in the Fixes introduced in column, subject
to their availability on those marketplaces. For more information, refer to the
following articles:

  o BIG-IP VE Supported Platforms
  o K84205182: BIG-IP upgrade guide | Chapter 1: Guide contents

Mitigation

As this attack is conducted by legitimate, authenticated users, there is no
viable mitigation while still allowing the user access to the Configuration
utility. The only mitigation is to remove access for any users who are not
completely trusted.

Until it is possible to install a fixed version, you can use the following
sections as temporary mitigations. These mitigations restrict access to the
Configuration utility to only trusted networks or devices, thereby limiting the
attack surface.

  o Block Configuration utility access through self IP addresses
  o Block Configuration utility access through the management interface

Block Configuration utility access through self IP addresses

You can block all access to the Configuration utility of your BIG-IP system
using self IP addresses. To do so, you can change the Port Lockdown setting to
Allow None for each self IP address on the system. If you must open any ports,
you should use the Allow Custom option, taking care to disallow access to the
Configuration utility. By default, the Configuration utility listens on TCP
port 443. Alternatively, you can configure a custom port.

Note: Performing this action prevents all access to the Configuration utility
and iControl REST using the self IP address. These changes may also impact
other services, including breaking high availability (HA) configurations.

Before you make changes to the configuration of your self-IP addresses, F5
strongly recommends that you refer to the following articles:

  o K17333: Overview of port lockdown behavior (12.x - 16.x)
  o K13092: Overview of securing access to the BIG-IP system
  o K31003634: The Configuration utility of the Single-NIC BIG-IP Virtual
    Edition now defaults to TCP port 8443
  o K51358480: The single-NIC BIG-IP VE may erroneously revert to the default
    management httpd port after a configuration reload

Block Configuration utility access through the management interface

To mitigate this vulnerability for affected F5 products, you should restrict
management access only to trusted users and devices to F5 products over a
secure network. For more information about securing access to BIG-IP systems,
refer to the following articles:

  o K13309: Restricting access to the Configuration utility by source IP
    address (11.x - 16.x)
  o K13092: Overview of securing access to the BIG-IP system
  o K46122561: Restricting access to the management interface using network
    firewall rules

Supplemental Information

o K02566623: Overview of F5 critical vulnerabilities (March 2021)
  o K04532512: Frequently asked questions for CVE-2021-22986, CVE-2021-22987,
    CVE-2021-22988, CVE-2021-22989, and CVE-2021-22990
  o K41942608: Overview of security advisory articles
  o K4602: Overview of the F5 security vulnerability response policy
  o K4918: Overview of the F5 critical issue hotfix policy
  o K9502: BIG-IP hotfix and point release matrix
  o K13123: Managing BIG-IP product hotfixes (11.x - 16.x)
  o K48955220: Installing an OPSWAT Endpoint Security update on BIG-IP APM
    systems (11.4.x and later)
  o K167: Downloading software and firmware from F5
  o K9970: Subscribing to email notifications regarding F5 products
  o K9957: Creating a custom RSS feed to view new and updated documents

- ---------------------------------------------------------------------------------

K52510511: Advanced WAF/ASM buffer-overflow vulnerability CVE-2021-22992

Original Publication Date: 11 Mar, 2021
Latest   Publication Date: 13 Mar, 2021

Security Advisory Description

A malicious HTTP response to an Advanced WAF/ASM virtual server with Login Page
configured in its policy may trigger a buffer overflow, resulting in a DoS
attack. In certain situations, it may allow remote code execution (RCE),
leading to complete system compromise. (CVE-2021-22992)

Impact

A sophisticated attacker must have control over the back-end web servers (pool
members) or the ability to manipulate the server-side HTTP responses to the
virtual server to exploit this vulnerability. With this level of back-end
control, the attacker may cause the BIG-IP Advanced WAF/ASM system to
experience a denial-of-service (DoS). In the worst case, the attacker may
execute arbitrary code on the BIG-IP Advanced WAF/ASM system. This
vulnerability can only be exploited through the data plane and cannot be
exploited through the control plane. Exploitation can lead to complete system
compromise.

Note: If you believe your system may have been compromised, refer to K11438344:
Considerations and guidance when you suspect a security compromise on a BIG-IP
system.

Security Advisory Status

F5 Product Development has assigned ID 975233 (BIG-IP) to this vulnerability.

To determine if your product and version have been evaluated for this
vulnerability, refer to the Applies to (see versions) box. To determine if your
release is known to be vulnerable, the components or features that are affected
by the vulnerability, and for information about releases, point releases, or
hotfixes that address the vulnerability, refer to the following table. For more
information about security advisory versioning, refer to K51812227:
Understanding security advisory versioning.

+-------------------+------+----------+----------+----------+------+----------+
|                   |      |Versions  |Fixes     |          |CVSSv3|Vulnerable|
|Product            |Branch|known to  |introduced|Severity  |score^|component |
|                   |      |be        |in        |          |1     |or feature|
|                   |      |vulnerable|          |          |      |          |
+-------------------+------+----------+----------+----------+------+----------+
|                   |16.x  |16.0.0 -  |16.0.1.1  |          |      |          |
|                   |      |16.0.1    |          |          |      |          |
|                   +------+----------+----------+          |      |          |
|                   |15.x  |15.1.0 -  |15.1.2.1  |          |      |          |
|                   |      |15.1.2    |          |          |      |          |
|                   +------+----------+----------+          |      |          |
|                   |14.x  |14.1.0 -  |14.1.4    |          |      |          |
|BIG-IP (Advanced   |      |14.1.3    |          |          |      |ASM       |
|WAF and ASM)       +------+----------+----------+Critical  |9.0   |virtual   |
|                   |13.x  |13.1.0 -  |13.1.3.6  |          |      |server    |
|                   |      |13.1.3    |          |          |      |          |
|                   +------+----------+----------+          |      |          |
|                   |12.x  |12.1.0 -  |12.1.5.3* |          |      |          |
|                   |      |12.1.5    |          |          |      |          |
|                   +------+----------+----------+          |      |          |
|                   |11.x  |11.6.1 -  |11.6.5.3  |          |      |          |
|                   |      |11.6.5    |          |          |      |          |
+-------------------+------+----------+----------+----------+------+----------+
|                   |16.x  |None      |Not       |          |      |          |
|                   |      |          |applicable|          |      |          |
|                   +------+----------+----------+          |      |          |
|                   |15.x  |None      |Not       |          |      |          |
|                   |      |          |applicable|          |      |          |
|BIG-IP (LTM, AAM,  +------+----------+----------+          |      |          |
|AFM, Analytics,    |14.x  |None      |Not       |          |      |          |
|APM, DDHD, DNS,    |      |          |applicable|Not       |      |          |
|FPS, GTM, Link     +------+----------+----------+vulnerable|None  |None      |
|Controller, PEM,   |13.x  |None      |Not       |          |      |          |
|SSLO)              |      |          |applicable|          |      |          |
|                   +------+----------+----------+          |      |          |
|                   |12.x  |None      |Not       |          |      |          |
|                   |      |          |applicable|          |      |          |
|                   +------+----------+----------+          |      |          |
|                   |11.x  |None      |Not       |          |      |          |
|                   |      |          |applicable|          |      |          |
+-------------------+------+----------+----------+----------+------+----------+
|                   |8.x   |None      |Not       |          |      |          |
|                   |      |          |applicable|          |      |          |
|                   +------+----------+----------+          |      |          |
|BIG-IQ Centralized |7.x   |None      |Not       |Not       |None  |None      |
|Management         |      |          |applicable|vulnerable|      |          |
|                   +------+----------+----------+          |      |          |
|                   |6.x   |None      |Not       |          |      |          |
|                   |      |          |applicable|          |      |          |
+-------------------+------+----------+----------+----------+------+----------+
|F5OS               |1.x   |None      |Not       |Not       |None  |None      |
|                   |      |          |applicable|vulnerable|      |          |
+-------------------+------+----------+----------+----------+------+----------+
|Traffix SDC        |5.x   |None      |Not       |Not       |None  |None      |
|                   |      |          |applicable|vulnerable|      |          |
+-------------------+------+----------+----------+----------+------+----------+

*An issue with the bigd process has been discovered in version 12.1.5.3. For
more information, refer to K50524736: Bigd process memory leak after updating
to BIG-IP 12.1.5.3.

The CVSSv3 score link takes you to a resource outside of AskF5, and it is
possible that the document may be removed without our knowledge.

Recommended Actions

If you are running a version listed in the Versions known to be vulnerable
column, you can eliminate this vulnerability by installing a version listed in
the Fixes introduced in column. If the table does not list a fixed version for
your software branch, then no update candidate currently exists for that branch
and F5 recommends upgrading to a version with the fix (refer to the table).

If the Fixes introduced in column lists a version prior to the one you are
running, in the same branch, then your version should have the fix.  Refer to 
K51812227: Understanding security advisory versioning.

If you are using public cloud marketplaces (AWS, Azure, GCP, or Alibaba) to
deploy BIG-IP Virtual Edition (VE), F5 recommends that you install the latest
releases of BIG-IP versions listed in the Fixes introduced in column, subject
to their availability on those marketplaces. For more information, refer to the
following articles:

  o BIG-IP VE Supported Platforms
  o K84205182: BIG-IP upgrade guide | Chapter 1: Guide contents

Mitigation

  o Mitigate malicious connections using an iRule
  o Modify Login Page configuration
  o Harden pool members
  o Remove Login Pages

Mitigate malicious connections using an iRule

To mitigate this vulnerability, you can associate the following iRule with the
affected virtual servers. The iRule examines the response from the server and
returns a 502 error for vulnerable responses. To use the iRule mitigation,
perform the following procedure:

Impact of workaround: The following mitigation may add additional resource load
on the system, depending on the specific environment. F5 recommends that you
test any such changes during a maintenance window and consider the possible
impact on your environment.

 1. Log in to the Configuration utility.
 2. Go to Local Traffic > iRules > iRule List.
 3. Select Create.
 4. Enter a name for the iRule.
 5. For Definition, add the following iRule code:

    # Mitigation for K52510511: Advanced WAF/ASM Buffer Overflow vulnerability
    CVE-2021-22992
    when RULE_INIT {
    # Set static::debug 1 to enable debug logging.
        set static::debug 0
        set static::max_length 4000
    }
    when HTTP_REQUEST {
        if {$static::debug}{
            set LogString "Client [IP::client_addr]:[TCP::client_port] ->
    [HTTP::host][HTTP::uri]"
    }
            set uri [string tolower [HTTP::uri]]
    }
    when HTTP_RESPONSE {
        set header_names [HTTP::header names]
        set combined_header_name [join $header_names ""]
        set combined_header_name_len [string length $combined_header_name]
        if {$static::debug}{
            log local0. "=================response======================"
            log local0. "$LogString (response)"
            log local0. "combined header names: $combined_header_name"
            foreach aHeader [HTTP::header names] {
            log local0. "$aHeader: [HTTP::header value $aHeader]"
    }
            log local0. "the length of the combined response header names:
    $combined_header_name_len"
            log local0. "============================================="
    }
        if { ( $combined_header_name_len > $static::max_length ) } {
            log local0. "In the response of '$uri', the length of the combined
    header names $combined_header_name_len exceeds the maximum value
    $static::max_length. See K52510511: Advanced WAF/ASM Buffer Overflow
    vulnerability CVE-2021-22992"
    HTTP::respond 502 content "
Bad Gateway
    
The server response is invalid. Please inform the administrator. Error: K52510511" } } 6. Select Finished. 7. Associate the iRule with the affected virtual servers. Modify Login Page configuration To mitigate this vulnerability, you may remove the configuration of both of the following settings from the Login Page configuration: o Expected validation header name and value o Not expected validation header name and value To do so, perform the following procedure: 1. Log in to the Configuration utility of the affected BIG-IP Advanced WAF/ASM system. 2. Go to Security > Application Security > Sessions and Logins > Login Pages List. 3. Select the security policy from the Current edited policy list. 4. Select the name of the Login URL from the Login Pages List. 5. Remove all configuration from both the settings. 6. Select Save to save the changes. 7. Select Apply Policy to apply the changes. 8. Select OK to confirm the operation. These two settings should remain empty until the affected BIG-IP Advanced WAF/ ASM system is updated to a version listed in the Fixes introduced in column. Important: You may need to configure alternative Login Page access validation criteria to continue using the Login Page without these set. Harden pool members To mitigate this vulnerability, you can harden your back-end web servers and network to prevent the malicious headers in the HTTP response to the login page from being sent to the BIG-IP Advanced WAF/ASM system. Other attacks against the server, such as CRLF Injection or HTTP Response Splitting, may also be used to manipulate the HTTP response. Use of HTTP protocol compliance can protect against these attacks, refer to K10280: Overview of BIG-IP ASM HTTP protocol compliance. Remove Login Pages Alternatively, you can delete any Login Page configured for a security policy and avoid using the Login Page feature until the affected BIG-IP Advanced WAF/ ASM system is upgraded to a version listed in the Fixes introduced in column. To delete a login page, perform the following procedure: 1. Login to the Configuration utility of the affected BIG-IP ASM system. 2. Go to Security > Application Security > Sessions and Logins > Login Pages List. 3. Select the security policy from the Current edited policy list. 4. Select the login page configuration you want to remove. 5. Select Delete. 6. Select OK to confirm the deletion. 7. Select Apply Policy to apply the changes. 8. Select OK to confirm the operation. Important: Login Page configuration may be critical to the function of the Brute Force Attack Prevention, Login Enforcement, and Session Tracking functions in a security policy. Review your security policy to see if any of these functions require the Login Page configuration before deleting it. Acknowledgements F5 acknowledges Felix Wilhelm of Google Project Zero for bringing this issue to our attention and following the highest standards of coordinated disclosure. Supplemental Information o K02566623: Overview of F5 critical vulnerabilities (March 2021) o K50963210: Frequently asked questions for CVE-2021-22992 o K41942608: Overview of security advisory articles o K4602: Overview of the F5 security vulnerability response policy o K4918: Overview of the F5 critical issue hotfix policy o K9502: BIG-IP hotfix and point release matrix o K13123: Managing BIG-IP product hotfixes (11.x - 16.x) o K15106: Managing BIG-IQ product hotfixes o K15113: BIG-IQ hotfix and point release matrix o K48955220: Installing an OPSWAT Endpoint Security update on BIG-IP APM systems (11.4.x and later) o K167: Downloading software and firmware from F5 o K9970: Subscribing to email notifications regarding F5 products o K9957: Creating a custom RSS feed to view new and updated documents - ------------------------------------------------------------------------------- K55237223: BIG-IP Advanced WAF and ASM XSS vulnerability CVE-2021-22993 Original Publication Date: 11 Mar, 2021 Security Advisory Description DOM-based XSS on DoS Profile properties page. (CVE-2021-22993) Impact An attacker can inject a malicious script into the BIG-IP Advanced WAF and ASM Configuration utility and trick users into executing malicious code. Security Advisory Status F5 Product Development has assigned ID 941449 (BIG-IP) to this vulnerability. To determine if your product and version have been evaluated for this vulnerability, refer to the Applies to (see versions) box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases, point releases, or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to K51812227: Understanding security advisory versioning. +-------------------+------+----------+----------+----------+------+----------+ | | |Versions |Fixes | |CVSSv3|Vulnerable| |Product |Branch|known to |introduced|Severity |score^|component | | | |be |in | |1 |or feature| | | |vulnerable| | | | | +-------------------+------+----------+----------+----------+------+----------+ | |16.x |16.0.0 - |16.0.1.1 | | | | | | |16.0.1 | | | | | | +------+----------+----------+ | | | | |15.x |15.1.0 - |15.1.2 | | | | | | |15.1.1 | | | | | | +------+----------+----------+ | | | | |14.x |14.1.0 - |14.1.3.1 | | |BIG-IP ASM| |BIG-IP (Advanced | |14.1.3 | | | |DoS | |WAF, ASM) +------+----------+----------+High |7.5 |Profile | | |13.x |13.1.0 - |13.1.3.6 | | |properties| | | |13.1.3 | | | |page | | +------+----------+----------+ | | | | |12.x |12.1.0 - |12.1.5.3 | | | | | | |12.1.5 | | | | | | +------+----------+----------+ | | | | |11.x |None |Not | | | | | | | |applicable| | | | +-------------------+------+----------+----------+----------+------+----------+ | |16.x |None |Not | | | | | | | |applicable| | | | | +------+----------+----------+ | | | | |15.x |None |Not | | | | | | | |applicable| | | | |BIG-IP (LTM, AAM, +------+----------+----------+ | | | |AFM, Analytics, |14.x |None |Not | | | | |APM, DDHD, DNS, | | |applicable|Not | | | |FPS, GTM, Link +------+----------+----------+vulnerable|None |None | |Controller, PEM, |13.x |None |Not | | | | |SSLO) | | |applicable| | | | | +------+----------+----------+ | | | | |12.x |None |Not | | | | | | | |applicable| | | | | +------+----------+----------+ | | | | |11.x |None |Not | | | | | | | |applicable| | | | +-------------------+------+----------+----------+----------+------+----------+ | |8.x |None |Not | | | | | | | |applicable| | | | | +------+----------+----------+ | | | |BIG-IQ Centralized |7.x |None |Not |Not |None |None | |Management | | |applicable|vulnerable| | | | +------+----------+----------+ | | | | |6.x |None |Not | | | | | | | |applicable| | | | +-------------------+------+----------+----------+----------+------+----------+ |Traffix SDC |5.x |None |Not |Not |None |None | | | | |applicable|vulnerable| | | +-------------------+------+----------+----------+----------+------+----------+ ^1The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge. Recommended Actions If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Fixes introduced in column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. Mitigation To mitigate this vulnerability, secure access to the BIG-IP Advanced WAF and ASM systems to ensure that the Configuration utility is accessible only by trusted users. To do so, refer to K13092: Overview of securing access to the BIG-IP system. Supplemental Information o K41942608: Overview of security advisory articles o K4602: Overview of the F5 security vulnerability response policy o K4918: Overview of the F5 critical issue hotfix policy o K9502: BIG-IP hotfix and point release matrix o K13123: Managing BIG-IP product hotfixes (11.x - 16.x) o K167: Downloading software and firmware from F5 o K9970: Subscribing to email notifications regarding F5 products o K9957: Creating a custom RSS feed to view new and updated documents - ---------------------------------------------------------------------------------- K06440657: BIG-IP ASM iControl REST vulnerability CVE-2021-23001 Original Publication Date: 11 Mar, 2021 Security Advisory Description The upload functionality in BIG-IP ASM allows an authenticated user to upload files to the BIG-IP system using a call to an undisclosed iControl REST endpoint. (CVE-2021-23001) Impact An unauthenticated malicious user can upload malicious files to use in future attacks, or simply upload large files to fill the BIG-IP system's disk space. Security Advisory Status F5 Product Development has assigned ID 935401 (BIG-IP) and to this vulnerability. To determine if your product and version have been evaluated for this vulnerability, refer to the Applies to (see versions) box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases, point releases, or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to K51812227: Understanding security advisory versioning. +-------------------+------+----------+----------+----------+------+----------+ | | |Versions |Fixes | |CVSSv3|Vulnerable| |Product |Branch|known to |introduced|Severity |score^|component | | | |be |in | |1 |or feature| | | |vulnerable| | | | | +-------------------+------+----------+----------+----------+------+----------+ | |16.x |16.0.0 - |16.0.1.1 | | | | | | |16.0.1 | | | | | | +------+----------+----------+ | | | | |15.x |15.0.0 - |15.1.2.1 | | | | | | |15.1.0 | | | | | | +------+----------+----------+ | | | | |14.x |14.1.0 - |14.1.4 | | |BIG-IP ASM| | | |14.1.2 | | | |file | |BIG-IP (ASM) +------+----------+----------+Medium |4.3 |transfer | | |13.x |13.1.0 - |13.1.3.6 | | |worker | | | |13.1.3 | | | | | | +------+----------+----------+ | | | | |12.x |12.1.0 - |12.1.5.3 | | | | | | |12.1.5 | | | | | | +------+----------+----------+ | | | | |11.x |11.6.1 - |11.6.5.3 | | | | | | |11.6.5 | | | | | +-------------------+------+----------+----------+----------+------+----------+ | |16.x |None |Not | | | | | | | |applicable| | | | | +------+----------+----------+ | | | | |15.x |None |Not | | | | | | | |applicable| | | | |BIG-IP (LTM, AAM, +------+----------+----------+ | | | |Advanced WAF, AFM, |14.x |None |Not | | | | |Analytics, APM, | | |applicable|Not | | | |DDHD, DNS, FPS, +------+----------+----------+vulnerable|None |None | |GTM, Link |13.x |None |Not | | | | |Controller, PEM, | | |applicable| | | | |SSLO) +------+----------+----------+ | | | | |12.x |None |Not | | | | | | | |applicable| | | | | +------+----------+----------+ | | | | |11.x |None |Not | | | | | | | |applicable| | | | +-------------------+------+----------+----------+----------+------+----------+ | |8.x |None |Not | | | | | | | |applicable| | | | | +------+----------+----------+ | | | |BIG-IQ Centralized |7.x |None |Not |Not |None |None | |Management | | |applicable|vulnerable| | | | +------+----------+----------+ | | | | |6.x |None |Not | | | | | | | |applicable| | | | +-------------------+------+----------+----------+----------+------+----------+ |Traffix SDC |5.x |None |Not |Not |None |None | | | | |applicable|vulnerable| | | +-------------------+------+----------+----------+----------+------+----------+ ^1The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge. Recommended Actions If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Fixes introduced in column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. Mitigation None Supplemental Information o K41942608: Overview of security advisory articles o K4602: Overview of the F5 security vulnerability response policy o K4918: Overview of the F5 critical issue hotfix policy o K9502: BIG-IP hotfix and point release matrix o K13123: Managing BIG-IP product hotfixes (11.x - 16.x) o K167: Downloading software and firmware from F5 o K9970: Subscribing to email notifications regarding F5 products o K9957: Creating a custom RSS feed to view new and updated documents - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYE7o1+NLKJtyKPYoAQhu/Q//eTIxpCaeyb+iPEX4GE93NodmplY8S/R2 1Ftag5Pe//xMxAnD8t+4qAeAQGZtR0gXDq1t2+l+rkQHHZdY6ev6XFLOEBF2B9QU wSzhmNFvky/nacdtYDKJ2z49m8HW0OyfakidrsCzhX+6eYPGgoGajJyLwt9tg5aX fdaHgM07e+5VfeCYBT7Clng5Oqy/z0oFHCfKQU6hj8vDGCZVBb2AAYDhUpRSIU6y 4bMktjNO3rrjXknftqvafYCAsdRkkCHV1uz82MlBz0q9MWzbtq3kJlpwCA3A7DmM Wm5gQcm+0LOWmnq+WAUzukmKajxAGwZFNyVGgNeZgbnUoK9nO4rSE6peNzKF+uZg sJCs3FQ8qRg69wDQDJBTbkQZKlhQdXpyh8CfB5QILpfKKpBBNjBzYFhQq5undFM7 uV3tmWezcpsxMrs+gql15Eam3exKIrgBb9amoJDyt8+TtxIVb5WGRc00J0c0YujR 1NxyXgjLZZu9DcEwyyfxYvKy3NisOTtAWj9ucBsIBf5L5wFwFe3QNjqopfj7ihow P4yRegAjhj1HLyClIOJhPwTwvI5t3de6fmBi3cXGYkuIaG8t6Uwop7lL9UIiHHbj N7SH/V+m8BsNgue66E22KT1UluKWyj3AYccy3zWvxJCGAEuCaTEhcBHvlOuaaaCp U29BqcYAB4U= =/1Wp -----END PGP SIGNATURE-----

Read More

The post ESB-2021.0872.2 – UPDATED ALERT [Appliance] BIG-IP Products: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/03/15/esb-2021-0872-2-updated-alert-appliance-big-ip-products-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0872-2-updated-alert-appliance-big-ip-products-multiple-vulnerabilities

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...