Malware Devil

Wednesday, June 30, 2021

Noname Security, JFrog Acquires Vdoo, Micro Segmentation, & AWS Buys Wickr – ESW #233

This week, In the Enterprise News, Atos launches thinkAI, AWS welcomes Wickr to the team, U.S. DoD approves two (ISC)² certifications as requirements for staff, JFrog to acquire Vdoo, & more!

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw233

The post Noname Security, JFrog Acquires Vdoo, Micro Segmentation, & AWS Buys Wickr – ESW #233 appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/noname-security-jfrog-acquires-vdoo-micro-segmentation-aws-buys-wickr-esw-233/?utm_source=rss&utm_medium=rss&utm_campaign=noname-security-jfrog-acquires-vdoo-micro-segmentation-aws-buys-wickr-esw-233

Why DAST – from Project Management Perspective – Suha Akyuz – ESW #233

More than 96% of software development projects fail across the globe because too many businesses rely on the legacy DevOps process which allows us to run security testing right before going to production. Using the legacy DevOps can lead to a downfall of the project management triangle (Budget, Scope, and Time). However, with more efficient use of dynamic application security testing tools (DAST) in every single stage/sprint, the legacy DevOps can be transformed into DevSecOps, in turn preventing our projects from failing.

This segment is sponsored by Netsparker.

Visit https://securityweekly.com/netsparker to learn more about them!

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw233

The post Why DAST – from Project Management Perspective – Suha Akyuz – ESW #233 appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/why-dast-from-project-management-perspective-suha-akyuz-esw-233/?utm_source=rss&utm_medium=rss&utm_campaign=why-dast-from-project-management-perspective-suha-akyuz-esw-233

Why MTTR is Bad for SecOps

Kerry Matre, senior director at Mandiant, discusses the appropriate metrics to use to measure SOC and analyst performance, and how MTTR leads to bad behavior.
Read More

The post Why MTTR is Bad for SecOps appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/why-mttr-is-bad-for-secops/?utm_source=rss&utm_medium=rss&utm_campaign=why-mttr-is-bad-for-secops

Zero-Day Used to Wipe My Book Live Devices

Threat actors may have been duking it out for control of the compromised devices, first using a 2018 RCE, then password-protecting a new vulnerability.
Read More

The post Zero-Day Used to Wipe My Book Live Devices appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/zero-day-used-to-wipe-my-book-live-devices/?utm_source=rss&utm_medium=rss&utm_campaign=zero-day-used-to-wipe-my-book-live-devices

PoC Exploit Circulating for Critical Windows Print Spooler Bug

The “PrintNightmare” bug may not be fully patched, some experts are warning, leaving the door open for widespread remote code execution attacks.
Read More

The post PoC Exploit Circulating for Critical Windows Print Spooler Bug appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/poc-exploit-circulating-for-critical-windows-print-spooler-bug/?utm_source=rss&utm_medium=rss&utm_campaign=poc-exploit-circulating-for-critical-windows-print-spooler-bug

SolarMarker Malware Stealing User Information Through PDFs

The hackers behind the malware called SolarMarker have begun using an innovative and unexpected means of distributing their poisoned code.

They’ve started publishing PDF documents filled with SEO (Search Engine Optimization) keywords in a bid to boost the visibility of malicious websites that pose as Google Drive, but in fact, are simply repositories for the malware itself.

A potential victim may get an email containing a PDF promising detailed information on attractive insurance rates or attractive credit card deals. Clicking on the links in the PDF will redirect the victim to a site designed to look like Google Drive, with instructions to download a different file on the drive. It is the act of clicking the file on the drive that dooms the user.

SEO is a tried and true marketing tactic used by legitimate business owners to drive traffic to their sites, co-opted, in this case, for a nefarious purpose. Unfortunately, it has proven to be a wildly effective thus far.

As to the malware itself, SolarMarker is a backdoor malware that steals login credentials and other data from web browsers. So it’s not harmful on its own, but it makes it easier for the hackers controlling it to introduce damaging malware down the road and/or steal a victim’s identity.

Crowdstrike was the first company to sound the alarm when researchers at the company first discovered the unusual marketing campaign for the malware. Note that thus far, at least, SolarMarker’s makers seem to have focused the bulk of their attention on North America.

PDFs have been used for a very long time to deliver malicious payloads, but the unusual methodology used here makes this attack noteworthy. Be on your guard against any PDFs you or your staff receive from unknown, un-trusted sources. Clicking links embedded in those files may net you much more than you bargained for, and not in a good way.

Used with permission from Article Aggregator

Read More

The post SolarMarker Malware Stealing User Information Through PDFs appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/solarmarker-malware-stealing-user-information-through-pdfs/?utm_source=rss&utm_medium=rss&utm_campaign=solarmarker-malware-stealing-user-information-through-pdfs

Menlo Security Poll Finds Resistance to Ransom Demands

A poll of 8,571 individuals conducted on Twitter by Menlo Security suggests business and IT leaders are becoming more inclined to accept financial losses rather than cave to ransomware demands. A full 79% of respondents said they would not pay ransom to regain access to their data. Among those that would pay, however, two in..

The post Menlo Security Poll Finds Resistance to Ransom Demands appeared first on Security Boulevard.

Read More

The post Menlo Security Poll Finds Resistance to Ransom Demands appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/menlo-security-poll-finds-resistance-to-ransom-demands/?utm_source=rss&utm_medium=rss&utm_campaign=menlo-security-poll-finds-resistance-to-ransom-demands

Vulnerabilities in Microsoft Print Spooler (CERT-EU Security Advisory 2021-033)

On the 8th or June 2021, Microsoft as part of the Patch Tuesday release has issues updates that addressed multiple vulnerabilities including the Windows Print Spooler Remote Code Execution Vulnerability CVE-2021-1675 with CVSS score 7.8. This vulnerability was initially rated as a low-importance elevation-of-privilege vulnerability, but on the 21th of June Microsoft reviewed the issue and labeled it as a remote code execution flaw.
Proof-of-concept exploit code for the CVE-2021-1675 flaw has been published online, the flaw impacts the Windows Print Spooler service and could be exploited to compromise Windows systems. Moreover, because normally the Spooler service is enabled by default, it is highly recommended to apply the patches as soon as possible.
Read More

The post Vulnerabilities in Microsoft Print Spooler (CERT-EU Security Advisory 2021-033) appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/vulnerabilities-in-microsoft-print-spooler-cert-eu-security-advisory-2021-033/?utm_source=rss&utm_medium=rss&utm_campaign=vulnerabilities-in-microsoft-print-spooler-cert-eu-security-advisory-2021-033

🔴 LIVE: Enterprise Security Weekly #233

This week, in our first segment, we welcome Suha Akyuz, Application Security Manager of Invicti Security, to discuss “Why DAST, from Project Management Perspective”! Then, we jump straight into the Enterprise News! Finally, we close out the show with two pre-recorded interviews from RSA featuring Mario Vuksan, CEO & Co-Founder of ReversingLabs, & Rickard Carlsson, Co-founder & CEO of Detectify!

→Full Show Notes: https://www.securityweekly.com/esw233

→Join the Security Weekly Discord Server: https://discord.gg/pqSwWm4
→Visit our website: https://www.securityweekly.com
→Follow us on Twitter: https://www.twitter.com/securityweekly

The post 🔴 LIVE: Enterprise Security Weekly #233 appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/%f0%9f%94%b4-live-enterprise-security-weekly-233/?utm_source=rss&utm_medium=rss&utm_campaign=%25f0%259f%2594%25b4-live-enterprise-security-weekly-233

CVE-2021-1675: Incomplete Patch and Leaked RCE Exploit, (Wed, Jun 30th)

[preliminary. please let us know if we missed something or made any mistakes]

As part of Microsoft’s June patch Tuesday, Microsoft released a patch for CVE-2021-1675. At the time, the vulnerability was considered a privilege escalation vulnerability. Microsoft considered exploitation “less likely” [1].

On June 21st, Microsoft modified the description of the vulnerability upgrading it to a remote code execution vulnerability. Earlier this week, an RCE exploit was posted to GitHub. While the exploit code was quickly removed, it had already been forked multiple times and can still easily be found on GitHub.

Further, it appears that the patch released by Microsoft on June 6th was incomplete. This exploit will work on fully patched systems, according to multiple reports. But remote exploitation requires normal user credentials [2].

A successful attack will leave the attacker with SYSTEM privileges.

What should you do:

Patch systems that need to run the printer spool service.
Disable the printer spool service where possible. You only need it on systems that share printers. You do not need it on clients that only print to shared printers.
Block port 445/TCP and 135/TCP at your perimeter. (that is a good idea anyway)

What we do not know for sure:

The effectiveness of the June patch is disputed. Some say that it may prevent the PoC from working, but there is evidence that it does not fully patch the vulnerability.
Are there any exploit scenarios that do not require valid user credentials?
Some reports indicate issues with printing after applying the June patch.

[1] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675
[2] https://twitter.com/gentilkiwi/status/1410066827590447108?s=21


Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post CVE-2021-1675: Incomplete Patch and Leaked RCE Exploit, (Wed, Jun 30th) appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/cve-2021-1675-incomplete-patch-and-leaked-rce-exploit-wed-jun-30th/?utm_source=rss&utm_medium=rss&utm_campaign=cve-2021-1675-incomplete-patch-and-leaked-rce-exploit-wed-jun-30th

Colombian police arrest Gozi malware suspect after 8 years at large

Safe at home, apparently, but not so safe overseas.
Read More

The post Colombian police arrest Gozi malware suspect after 8 years at large appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/colombian-police-arrest-gozi-malware-suspect-after-8-years-at-large/?utm_source=rss&utm_medium=rss&utm_campaign=colombian-police-arrest-gozi-malware-suspect-after-8-years-at-large

Feds Told to Better Manage Facial Recognition, Amid Privacy Concerns

A GAO report finds government agencies are using the technology regularly in criminal investigations and to identify travelers, but need stricter management to protect people’s privacy and avoid inaccurate identification
Read More

The post Feds Told to Better Manage Facial Recognition, Amid Privacy Concerns appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/feds-told-to-better-manage-facial-recognition-amid-privacy-concerns/?utm_source=rss&utm_medium=rss&utm_campaign=feds-told-to-better-manage-facial-recognition-amid-privacy-concerns

Police warn of WhatsApp scams in time for Social Media Day

Happy Social Media Day! Make it a day to review whether your social media security really is up to scratch.
Read More

The post Police warn of WhatsApp scams in time for Social Media Day appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/police-warn-of-whatsapp-scams-in-time-for-social-media-day/?utm_source=rss&utm_medium=rss&utm_campaign=police-warn-of-whatsapp-scams-in-time-for-social-media-day

REvil’s Linux Version Targets VMware ESXi Virtual Machines

Organizations running ESXi environments that thought they had somehow escaped the attention of REvil ransomware operators are in for a rude awakening – the ransomware-as-a-service’s repertoire now includes a Linux version aimed squarely at VMware ESXi virtual machines, according to researchers at MalwareHunterTeam. Vitali Kremez at Advanced Intel examined the findings and tweeted some of..

The post REvil’s Linux Version Targets VMware ESXi Virtual Machines appeared first on Security Boulevard.

Read More

The post REvil’s Linux Version Targets VMware ESXi Virtual Machines appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/revils-linux-version-targets-vmware-esxi-virtual-machines/?utm_source=rss&utm_medium=rss&utm_campaign=revils-linux-version-targets-vmware-esxi-virtual-machines

Demystifying SSD Security

You left your laptop in a taxi or it was confiscated at a customs checkpoint. How do you ensure your personal or corporate data is safe? There are a number of best practices to follow. SSD Best Practices Step 1: Shut down your device in public spaces when you are not using it. Resume time..

The post Demystifying SSD Security appeared first on Security Boulevard.

Read More

The post Demystifying SSD Security appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/demystifying-ssd-security/?utm_source=rss&utm_medium=rss&utm_campaign=demystifying-ssd-security

A New Approach to Tackling Cybersecurity Threats

Last month, the FBI warned that ransomware attacks, like the one on the Colonial Pipeline, are a growing problem. From attacks on the Miami-Dade School District to Apple’s $50 million ransomware mess, the agency is investigating growing instances of cybercriminals wreaking havoc and confusion by holding vital services, citizen’s private information, and critical data hostage..

The post A New Approach to Tackling Cybersecurity Threats appeared first on Security Boulevard.

Read More

The post A New Approach to Tackling Cybersecurity Threats appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/a-new-approach-to-tackling-cybersecurity-threats/?utm_source=rss&utm_medium=rss&utm_campaign=a-new-approach-to-tackling-cybersecurity-threats

Data Breaches Rise as Organizations Shift to the Cloud

As more and more organizations make the move into public clouds, a corresponding rise in cloud data breaches has followed, according to an IDC survey of 200 security decision-makers in the U.S. The survey found nearly all (98%) of the companies surveyed had experienced at least one cloud data breach in the past 18 months,..

The post Data Breaches Rise as Organizations Shift to the Cloud appeared first on Security Boulevard.

Read More

The post Data Breaches Rise as Organizations Shift to the Cloud appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/data-breaches-rise-as-organizations-shift-to-the-cloud/?utm_source=rss&utm_medium=rss&utm_campaign=data-breaches-rise-as-organizations-shift-to-the-cloud

ISC Stormcast For Wednesday, June 30th, 2021 https://isc.sans.edu/podcastdetail.html?id=7564, (Wed, Jun 30th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Wednesday, June 30th, 2021 https://isc.sans.edu/podcastdetail.html?id=7564, (Wed, Jun 30th) appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/isc-stormcast-for-wednesday-june-30th-2021-https-isc-sans-edu-podcastdetail-htmlid7564-wed-jun-30th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-wednesday-june-30th-2021-https-isc-sans-edu-podcastdetail-htmlid7564-wed-jun-30th

ESB-2021.2285 – [Win][Linux] Exacq Technologies exacqVision Enterprise Manager: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2285
Advisory (icsa-21-180-02) Exacq Technologies exacqVision Enterprise Manager
30 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: Exacq Technologies exacqVision Enterprise Manager
Publisher: ICS-CERT
Operating System: Linux variants
Windows
Impact/Access: Cross-site Scripting — Existing Account
Reduced Security — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-27658

Original Bulletin:
https://us-cert.cisa.gov/ics/advisories/icsa-21-180-02

– ————————–BEGIN INCLUDED TEXT——————–

ICS Advisory (ICSA-21-180-02)

Exacq Technologies exacqVision Enterprise Manager

Original release date: June 29, 2021

Legal Notice

All information products included in https://us-cert.cisa.gov/ics are provided
“as is” for informational purposes only. The Department of Homeland Security
(DHS) does not provide any warranties of any kind regarding any information
contained within. DHS does not endorse any commercial product or service,
referenced in this product or otherwise. Further dissemination of this product
is governed by the Traffic Light Protocol (TLP) marking in the header. For more
information about TLP, see https://us-cert.cisa.gov/tlp/ .

1. EXECUTIVE SUMMARY

o CVSS v3 4.3
o ATTENTION: Exploitable remotely/low attack complexity
o Vendor: Exacq Technologies, Inc., a subsidiary of Johnson Controls Inc.
o Equipment: exacqVision Enterprise Manager
o Vulnerability: Cross-site Scripting

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker to send
malicious requests on behalf of the victim.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of Exacq Technologies exacqVision Enterprise Manager
software are affected:

o exacqVision Enterprise Manager: Version 20.12 and prior

3.2 VULNERABILITY OVERVIEW

3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (‘CROSS-SITE
SCRIPTING’) CWE-79

The software does not sufficiently validate, filter, escape, and/or encode
user-controllable input before it is placed in output used as a web page, which
is served to other users. This may allow an attacker to send malicious requests
on behalf of the victim.

CVE-2021-27658 has been assigned to this vulnerability. A CVSS v3 base score of
4.3 has been calculated; the CVSS vector string is ( AV:N/AC:L/PR:L/UI:N/S:U/
C:N/I:L/A:N ).

3.3 BACKGROUND

o CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
o COUNTRIES/AREAS DEPLOYED: Worldwide
o COMPANY HEADQUARTERS LOCATION: Ireland

3.4 RESEARCHER

Milan Kyselica and Roman Stevanak reported this vulnerability to Johnson
Controls, Inc.

4. MITIGATIONS

Johnson Controls recommends upgrading all previous versions of exacqVision
Enterprise Manager to v21.03

For more detailed mitigation instructions, please see Johnson Controls Product
Security Advisory JCI-PSA-2021-08 v1

Additional security notices and product security guidance can be found at the
Johnson Controls ICS Product Security page .

CISA recommends users take defensive measures to minimize the risk of
exploitation of this vulnerability. Specifically, users should:

o Minimize network exposure for all control system devices and/or systems,
and ensure that they are not accessible from the Internet .
o Locate control system networks and remote devices behind firewalls, and
isolate them from the business network.
o When remote access is required, use secure methods, such as Virtual Private
Networks (VPNs), recognizing VPNs may have vulnerabilities and should be
updated to the most current version available. Also recognize VPN is only
as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk
assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices
on the ICS webpage on us-cert.cisa.gov . Several recommended practices are
available for reading and download, including Improving Industrial Control
Systems Cybersecurity with Defense-in-Depth Strategies .

Additional mitigation guidance and recommended practices are publicly available
on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper,
ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation
Strategies .

Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to CISA for tracking
and correlation against other incidents.

No known public exploits specifically target this vulnerability.

For any questions related to this report, please contact the CISA at:

Email: CISAservicedesk@cisa.dhs.gov
Toll Free: 1-888-282-0870

CISA continuously strives to improve its products and services. You can help by
choosing one of the links below to provide feedback about this product.

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=kAdR
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2285 – [Win][Linux] Exacq Technologies exacqVision Enterprise Manager: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/esb-2021-2285-winlinux-exacq-technologies-exacqvision-enterprise-manager-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2285-winlinux-exacq-technologies-exacqvision-enterprise-manager-multiple-vulnerabilities

ESB-2021.2281 – [Win] AVEVA System Platform: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2281
Advisory (icsa-21-180-05) AVEVA System Platform
30 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: AVEVA System Platform
Publisher: ICS-CERT
Operating System: Windows
Impact/Access: Execute Arbitrary Code/Commands — Existing Account
Denial of Service — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-33010 CVE-2021-33008

Original Bulletin:
https://us-cert.cisa.gov/ics/advisories/icsa-21-180-05

– ————————–BEGIN INCLUDED TEXT——————–

ICS Advisory (ICSA-21-180-05)

AVEVA System Platform

Original release date: June 29, 2021

Legal Notice

All information products included in https://us-cert.cisa.gov/ics are provided
“as is” for informational purposes only. The Department of Homeland Security
(DHS) does not provide any warranties of any kind regarding any information
contained within. DHS does not endorse any commercial product or service,
referenced in this product or otherwise. Further dissemination of this product
is governed by the Traffic Light Protocol (TLP) marking in the header. For more
information about TLP, see https://us-cert.cisa.gov/tlp/ .

1. EXECUTIVE SUMMARY

o CVSS v3 8.8
o ATTENTION: Exploitable from adjacent network/low attack complexity
o Vendor: AVEVA Software, LLC
o Equipment: System Platform
o Vulnerabilities: Missing Authentication for Critical Function, Uncaught
Exception

2. RISK EVALUATION

Successful exploitation of these vulnerabilities, if exploited and chained
together, could allow a malicious entity to achieve arbitrary code execution
with system privileges or cause a denial-of-service condition.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

o AVEVA reports the vulnerability affects AVEVA System Platform versions 2017
through 2020 R2 P01 (inclusive)

3.2 VULNERABILITY OVERVIEW

3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306

The software does not perform any authentication for functionality that
requires a provable user identity.

CVE-2021-33008 has been assigned to this vulnerability. A CVSS v3 base score of
8.0 has been calculated; the CVSS vector string is ( AV:A/AC:L/PR:L/UI:N/S:U/
C:H/I:H/A:H ).

3.2.2 UNCAUGHT EXCEPTION CWE-248

An exception is thrown from a function, but it is not caught, which may cause a
denial-of-service condition.

CVE-2021-33010 has been assigned to this vulnerability. A CVSS v3 base score of
6.5 has been calculated; the CVSS vector string is ( AV:N/AC:L/PR:N/UI:N/S:U/
C:N/I:N/A:H ).

3.3 BACKGROUND

o CRITICAL INFRASTRUCTURE SECTORS: Chemical, Critical Manufacturing, Energy,
Food and Agriculture, and Water and Wastewater Systems
o COUNTRIES/AREAS DEPLOYED: Worldwide
o COMPANY HEADQUARTERS LOCATION: United Kingdom

3.4 RESEARCHER

Sharon Brizinov of Claroty reported these vulnerabilities to AVEVA.

4. MITIGATIONS

AVEVA recommends organizations evaluate the impact of these vulnerabilities
based on their operational environment, architecture, and product
implementation.

AutoBuild service is intended to be used only on the GR Node of System Platform
during configuration. If the AutoBuild service is enabled on any Runtime nodes,
it should be disabled. Furthermore, if the AutoBuild functionality is not used
on the GR Node, the AutoBuild service can be disabled on the GR Node as an
alternative mitigation that does not require patching.

AVEVA recommends users who need to continually use the AutoBuild functionality
and cannot disable it in System Platform Versions 2017 through 2020 R2 P01
(inclusive) are affected by the vulnerabilities and should first upgrade to one
of the System Platform versions listed below, then apply the corresponding
security update:

o System Platform 2020 R2 P01, 2020 R2, 2020: Apply AVEVA Communication
Drivers Pack 2020 R2.1
o System Platform 2017 U3 SP1 P01:

1. First apply AVEVA Communication Drivers Pack 2020 R2 AVEVA notes that
Activated Licensing is required to apply AVEVA Communication Drivers Pack
2020 R2 on top of System Platform 2017 U3 SP1 P01. For information on AVEVA
license compatibility, please contact AVEVA Customer Support
2. Then apply AVEVA Communication Drivers Pack 2020 R2.1

Please see AVEVA’s security bulletin AVEVA-2021-002 for more information.

CISA recommends users take defensive measures to minimize the risk of
exploitation of these vulnerabilities. Specifically, users should:

o Minimize network exposure for all control system devices and/or systems,
and ensure that they are not accessible from the Internet .
o Locate control system networks and remote devices behind firewalls, and
isolate them from the business network.
o When remote access is required, use secure methods, such as Virtual Private
Networks (VPNs), recognizing VPNs may have vulnerabilities and should be
updated to the most current version available. Also recognize VPN is only
as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk
assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices
on the ICS webpage on us-cert.cisa.gov . Several recommended practices are
available for reading and download, including Improving Industrial Control
Systems Cybersecurity with Defense-in-Depth Strategies .

Additional mitigation guidance and recommended practices are publicly available
on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper,
ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation
Strategies .

Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to CISA for tracking
and correlation against other incidents.

No known public exploits specifically target these vulnerabilities.

For any questions related to this report, please contact the CISA at:

Email: CISAservicedesk@cisa.dhs.gov
Toll Free: 1-888-282-0870

CISA continuously strives to improve its products and services. You can help by
choosing one of the links below to provide feedback about this product.

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=oduq
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2281 – [Win] AVEVA System Platform: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/esb-2021-2281-win-aveva-system-platform-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2281-win-aveva-system-platform-multiple-vulnerabilities

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...