New vulnerabilities threaten another Solar Winds-style security disaster

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • PCHF IT Feeds
    PCHF Bot
    • Jan 2015
    • 54689

    #1

    New vulnerabilities threaten another Solar Winds-style security disaster

    Eight new vulnerabilities were recently discovered in the Open Automation Software (OAS) platform which, if leveraged, could have triggered another supply chain security disaster.

    According to Talos, Cisco’s cybersecurity arm, the flaws include two high-severity vulnerabilities - CVE-2022-26833 (severity score 9.4) and CVE-2022-26082 (severity score 9.1) - which could enable threat actors to change the configuration of the platform to create new security groups and run arbitrary code.

    Various other vulnerabilities discovered in the platform could also have been abused to send network requests, draw down directory listing, steal passwords and launch denial of service attacks.


    https://cdn.mos.cms.futurecdn.net/ybbmQ8p4Q999AkMWkW8HLm.jpg


    Share your thoughts on Cybersecurity and get a free copy of the Hacker’s Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/Ā£10.99.

    [HEADING=1]Vulnerabilities addressed[/HEADING]

    According to The Register, Cisco worked with OAS to address the vulnerabilities and issue patches.

    Speaking to the publication, VP of solutions architecture for Cerberus Sentinel, Chris Clements, described the flaws as ā€œamong the scariest cybersecurity threats today,ā€ mostly due to the fact that many major industrial enterprises use OAS.

    Among its users are Volvo, General Dynamics, or AES, which use it to facilitate the transfer of data within their IT environments. OAS is described as essential to these organizations’ Industrial Internet of Things (IIoT) efforts.

    ā€œAn attacker with the ability to disrupt or alter the function of those devices can inflict catastrophic damage on critical infrastructure facilities, but an attack can also be something that may not be immediately obvious,ā€ Clements commented.

    Read more
    The inside story of the infamous SolarWinds hack

    Exclusive: SolarWinds CEO calls for an end to ā€˜victim shaming’

    Lawsuit claims SolarWinds reportedly knew about cybersecurity issues before attack
    He likened the flaws with Stuxnet, a more than a decade-old worm that inflicted serious damage to the Iranian nuclear program. The worm was used to break certain components in nuclear facilities which, despite malfunctioning, reported back as operating normally.

    What’s more, the affected systems are so pivotal to these organizations that many postpone taking them offline for patching for years.

    ā€œIn some instances, air gaps can be a double-edged sword,ā€ Clements said. ā€œMalicious USB devices have been leveraged several times to spread malware on to air-gapped networks, and unless special considerations have been made to perform security patching on the isolated network, the malicious code often finds itself in an environment that’s ripe for exploitation.ā€

    [ul]
    [li]Shield your fleet against attack with the best endpoint protection services[/li][/ul]

    Via The Register

    Continue reading…
Working...