SANS NewsBites

Critical VMware Vulnerability Requires Prioritized Patching; Turn On Auto Update in Chrome Browser; White House Cyber Advisor Wants Feds to Focus on Essential Security Hygiene and Skills

May 28, 2021  |  Volume XXIII - Issue #42

Top of the News


2021-05-26

VMware Updates Address Flaws in vSphere Client

VMware has released updates to address two vulnerabilities in its vSphere Client. The first is a critical severity “remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in.” The second is a moderate-severity “vulnerability in a vSphere authentication mechanism for the Virtual SAN Health Check, Site Recovery, vSphere Lifecycle Manager, and VMware Cloud Director Availability plug-ins.”

Editor's Note

Limit access to your vCenter infrastructure to authorized devices only, just as you would limit access to system consoles to prevent unauthorized attempts to “fiddle” with things. Note that the vulnerable Virtual SAN Health plugin is present even if you don’t have a VMware VSAN. The vulnerable plugins can be disabled by setting them to incompatible not disabled as a temporary mitigation; the long term fix is to rapidly apply the updates. There are three CVEs impacting five plugins. If you disable the plugins, they remain disabled after the patch until you explicitly re-enable them. Note that some third-party plugins may no longer function after the update as additional changes were made in vCenter Server to improve overall security.

Lee Neely
Lee Neely

Not only should you patch this flaw as soon as possible, but you should also double check that the vSphere console is not exposed to the Internet. Access should only be possible via a VPN or from a local management network. As a quick workaround: disable the vSAN client if you are not using it.

Johannes Ullrich
Johannes Ullrich

Here in Maryland the 17-year cicadas are coming out of the ground. When they last went underground in 2004, we were just recovering from the impact of Windows buffer overflow/input validation flaws being exploited in the Slammer/Blaster/Sasser and other attacks. Sad to see VMWare shipping software all these years later with those same well-known software development mistakes in such a mission critical product. Critical not just to patch your systems but to make sure your supply chain does so as well.

John Pescatore
John Pescatore

Input validation is difficult but necessary. Failure to do it properly is a continuing and widespread problem. It is aggravated by the fact that the developer cannot easily foresee the environment in which his code may run. It is simplified when the use of the input is tightly constrained, e.g., to a limited code set. Allowing special characters, especially in repetition or combination, which may trigger escape from processes down in the stack, is particularly dangerous. Anecdotal evidence suggests that input validation is not taught in training programs, or even in colleges and universities.

William Hugh Murray
William Hugh Murray

2021-05-26

Chrome 91

Google has released Chrome 91 to the stable desktop channel. The updated browser includes fixes for 32 security issues. At least eight of the flaws fixed are rated high severity; they include use after free vulnerabilities, a heap buffer overflow flaw and an out-of-bounds write flaw.

Editor's Note

Google Chrome has a reasonable robust auto-update. As you are reading this: Exit Google Chrome, start it up again, and check if you are up to date. It is a good idea to restart Google Chrome from time to time anyway, and it can help keep it up to date.

Johannes Ullrich
Johannes Ullrich

When I see use after free bugs, I flash back to teaching myself C; memory management requires discipline as well as tools to make sure that you didn’t miss anything. When deploying the update, watch for Chromium based browsers, Edge, Brave, etc. If you’re manually updating, check to make sure you’re all the way to version 91.0.4472.77.

Lee Neely
Lee Neely

2021-05-26

"Disappointment" with Federal Network Hygiene Drove Elements of US Cybersecurity Executive Order

Anne Neuberger, the White House deputy national security advisor for cyber and emerging technologies said the Solar Winds compromise impact that resulted in the recent Executive Order by President Biden pointed out the need for immediate and measurable improvements to security of federal systems and networks. She listed improved skills in Security Operation Centers, enabling and emphasizing more proactive threat hunting and the Government using its buying power to drive the demand for secure, tested software.

Editor's Note

The bad news is the US government is like an enormous ship and often inputs from the captain and top staff seem to get lost in the long and torturous path to the engines and rudder. The good news is that even small course corrections can have a huge impact and occasionally (like mandates to government agencies to move to DNSSEC and DMARC, or to buy only certified, testing cryptographic software) the government can actually lead private industry. There is an opportunity for that to happen here.

John Pescatore
John Pescatore

Agencies already have requirements to implement endpoint protections, continuous monitoring, ongoing validation of secure baselines, dynamic software to allow and deny capabilities with regular reporting to DHS through the CDM program. That program provided for first year licensing of products and an added year of maintenance. Where it falls short is the resources to implement are unfunded, licenses are difficult to obtain, and the new processes can create disruption to existing processes intended to keep systems within an acceptable level of risk. The new EO seeks to further raise the bar on federal systems, but success will require ongoing funding for staff at the agencies and sites which need to implement the new controls as well as training and hiring of SOC staff. Care must be taken not to assume all incidents can be monitored and responded to from a centralized control point.

Lee Neely
Lee Neely

“Secure software” and “supply chain” are related but separate problems. One has no reason to believe that SolarWinds' code was not tested or secure. The problem was that they distributed code that they did not even know was there. Caveat Emptor will not solve the supply chain problem, even when the buyer has the market power of the sovereign. Suppliers must be accountable for what they distribute.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2021-05-28

SolarWinds Threat Actors Targeting Government-Related eMail Accounts

In a blog post, Microsoft writes that the same threat actors believed to be responsible for the SolarWinds attack have targeted email accounts at government agencies, think tanks, NGOs, and consultancies in 24 countries. The attacks were launched after gaining access to USAID's Constant Contact email marketing services account.

Editor's Note

While we assume we’re largely ignoring email streams from services like Constant Contact, make sure that your users truly are looking at the legitimacy of messages and reporting/blocking them as needed as these services are an excellent way to craft a really convincing looking phish.

Lee Neely
Lee Neely

2021-05-28

DHS/TSA Issues Pipeline Security Directive

The US Department of Homeland Security’s (DHS’s) Transportation Security Agency (TSA) has issued a security directive to enhance pipeline security. The directive has three requirements: pipeline owners and operators must report cybersecurity incidents to the Cybersecurity and Infrastructure Security Agency (CISA) within 12 hours of detection; designate a cybersecurity coordinator who will be available to TSA and CISA 24/7; and conduct an assessment to check for compliance with TSA’s pipeline cybersecurity rules, develop remediation measures for detected gaps, and report them to TSA and CISA within 30 days. Failure to comply with the guidelines will result in fines. The directive is effective as of Friday, May 28, 2021.

Editor's Note

The requirement that the identified Cybersecurity Coordinator be a U.S. Citizen eligible for a security clearance sets the stage for CISA and DHS to communicate sensitive or classified threat intelligence data in the future. The challenge for operators is to designate more than one Cybersecurity Coordinator for depth of coverage, and make sure that all coordinators meet the requirements. If you’ve outsourced your monitoring and response capabilities, make sure the provider can meet the requirements before designating them. Develop supporting processes and templates for consistent reporting to CISA. Make sure external incident reporting doesn’t exclude internal awareness.

Lee Neely
Lee Neely

While pipelines are, at one level, transportation mechanisms, they are also part of the energy infrastructure. DHS should be asking whether TSA is the most appropriate regulator. Note that the Internet, the attack vector, is both unregulated and supranational.

William Hugh Murray
William Hugh Murray

Read more in

Document Cloud: Security Directive Pipeline-2021-01 (PDF)

DHS: DHS Announces New Cybersecurity Requirements for Critical Pipeline Owners and Operators

Washington Post: The Cybersecurity 202: DHS directive out today is ‘step one’ in securing pipelines against hacking

Cyberscoop: TSA cyber requirements would fine pipeline operators for lax security practices

SC Magazine: DHS issues cyber order to pipeline operators in first move to regulate critical infrastructure sectors

Bleeping Computer: US announces new security directive after critical pipeline hack

FCW: After Colonial attack, TSA issues new cyber regs for pipelines

The Hill: TSA formally directs pipeline companies to report cybersecurity incidents in wake of Colonial attack

CNET: Colonial Pipeline, post-hack: US issues new cybersecurity regulations


2021-05-26

GAO Official: Federal Agencies Must Take Steps to Protect Their Networks from Supply Chain Attack

In testimony before a US House subcommittee earlier this week, Vijay D’Souza, director of information technology and cybersecurity at the Government Accountability Office (GAO) said that federal agencies are struggling with supply chain security. Just six agencies have shared with GAO their plans to make security protocol changes following the SolarWinds Orion attack; none of the agencies has implemented all recommended changes.

Editor's Note

Some agencies are still stuck in the forensics/remediation stages of the Solar Winds events and haven’t come up for air yet. When you do, don’t forget to consider the impacts of open source code implemented in your own products. Sometimes the cost of analysis for weaknesses and remediating them exceeds the gains of using pre-written code. Think carefully before adopting a model to wait for bug fixes to come from the open source community as those may not only impact your time to deliver but also, themselves, introduce new issues. When planning/making changes in supply chain security, make sure your procurement and legal teams have a seat at the table.

Lee Neely
Lee Neely

Suppliers must be held accountable if they recklessly or negligently distribute malicious code.

William Hugh Murray
William Hugh Murray

2021-05-27

NASA OIG Report: Decentralized Approach to Cybersecurity Poses Risks

A report from NASA’s Office of Inspector General (OIG) “found that NASA’s ability to prevent, detect, and mitigate cyber-attacks is limited by a disorganized approach to Enterprise Architecture.” The report cited “a fragmented approach to IT, with numerous separate lines of authority” at the agency. OIG made several recommendations, including integrating Enterprise Architecture and Enterprise Security Architecture.

Editor's Note

NASA is a distributed agency with multiple data centers and locations with external partnerships and collaborations resulting in a very porous network. Even so, the process of establishing access to one of their systems and processing data is rigorous, with validation of the far end system and clear definitions of responsibilities, data protection, and incident reporting requirements. Security is further complicated by the mixture of institutional IT and mission-specific systems. While many business functions can be centralized, mission systems are unlikely to be, which means you need a distributed security team empowered to manage the risks for mission systems and assure conventional IT remains within the enterprise risk boundaries. This requires teamwork and open lines of communication.

Lee Neely
Lee Neely

To be meaningful, IT and security architectures must consider how business/mission and IT governance work. NASA is like many companies in private industry, with a dozen Centers (business units) that have CIOs and much local authority and lots of local use of contractors, insourcing and outsourcing. Too often in security I see “bring back the mainframe – that will solve the security problems” architectures that don’t match the business/mission needs or governance methods. Security processes need to support the way business is done, not try to effect organizational change to match old approaches to security.

John Pescatore
John Pescatore

The same could be said for just about every public, private, and non-profit organization in the world. This is not easy.

Lance Spitzner
Lance Spitzner

To quote Harry DeMaio, “security architecture is derivative of and subservient to the IT architecture.” As a security architect, one's first step is to ask for an expression of the IT architecture. In response, one is often met with a list of the materials used but with no description of how they were used or related to one another.

William Hugh Murray
William Hugh Murray

2021-05-27

Fujitsu Takes Down ProjectWEB Platform After Hackers Steal Government Data

Fujitsu has taken down its ProjectWEB collaboration and file-sharing platform after threat actors gained access to the system and stole data. The incident affected several Japanese government agencies and at least one airport. The incident was discovered on Monday, May 24; ProjectWEB was taken down the following day.


2021-05-26

Apostle Disk-Wiping Malware Pretends to be Ransomware

Researchers from SentinelOne have detected new disk-wiping malware that masquerades as ransomware. The malware, which has been dubbed Apostle, has been used against targets in Israel. The campaign has been active since at least December 2020.

Editor's Note

Those continuous differential backups you’ve implemented will also help you recover from a disk wipe attack. Be sure you know what is (and what is not) backed up when planning your recovery strategy. Note that this campaign is setting up persistent back doors and exfiltrating data, as well as using the victim’s VPN services, so make sure you’ve got plans to validate and secure your VPN as well as re-imaging systems where not necessarily wiped but have their webshells and IPsec Helper. Be prepared for data release ransom requests.

Lee Neely
Lee Neely

If one is vulnerable to breaches, the availability, integrity, reliability, and usefulness of one's data is at risk. Extortion may be the least of one's worries.

William Hugh Murray
William Hugh Murray

2021-05-26

Google Researchers Discover New “Half-Double” Rowhammer Attack Technique

Google researchers have discovered a new technique to exploit the Rowhammer vulnerability. Dynamic random access memory (DRAM) chips are getting smaller, and as a result, the Half-Double Rowhammer attack can flip bits not just in adjacent rows, but in rows father away.

Editor's Note

Decreasing feature size and hardware optimizations for performance will make it more and more difficult to defend against these attacks.

Johannes Ullrich
Johannes Ullrich

2021-05-25

FireEye: Threat Actors Using Simple Tools and Techniques to Target Operational Technology Systems

Researchers from FireEye’s Mandiant Threat Intelligence say they have observed an increase in threat actors targeting operational technology (OT) systems with rather unsophisticated tools and techniques. In most cases, these threat actors do not appear to be intent on causing specific physical results.

Editor's Note

The Colonial Pipeline ransomware-driven shutdown and the Oldsmar, FL water contamination attack are recent examples where simple vulnerabilities were exploited, pointing out a lack of even the first level of essential security controls. The TSA and DHS are pushing security regulations onto the pipeline industry; industries in other critical infrastructure verticals where years of “self-regulation” have not kept up with modern IT architectures and modern attacker techniques should expect to see regulatory action as well.

John Pescatore
John Pescatore

The same could be said for almost any industry. In the vast majority of incidents, cyber attackers (especially criminals) are going to come in the easiest way possible. As several SANS Instructors have told me, cyber attackers do not get extra points or bonuses for using super advanced techniques; they are normal people just trying to get a job done. For the past four years, phishing and passwords have been the top two drivers of breaches in the VZ DBIR. Yes, there are some exceptionally advanced attacks (SolarWinds is a prime example) that have huge impact, but it is the fundamental TTPs that are driving most of today’s breaches.

Lance Spitzner
Lance Spitzner

2021-05-25

Trend Micro Issues Firmware Update to Address Vulnerabilities in Home Network Security Station

Cisco Talos discovered stack-based buffer overflow and hard-coded password vulnerabilities in Trend Micro’s Home Network Security Station. The flaws could be exploited to obtain elevated privileges and to create files, change file permissions, and upload data to an SFTP server. Trend Micro has released an update to address the vulnerabilities.

Editor's Note

Hard-coded passwords are sadly a standard "feature" in too many devices. Note that the password has been published. Particularly sad is that Trend Micro is selling this device to protect your network. One of the advertised features of this product is to protect you from "weak passwords".

Johannes Ullrich
Johannes Ullrich

Hard-coded passwords are tempting and solve fewer problems than they fix. Not throwing Trend Micro under the bus here; I’ve fallen into that trap. If you have the affected product, update it. If your home workers have these devices, make sure they are updating to help protect the integrity of those remote networks.

Lee Neely
Lee Neely

SOHO users of only one of these devices, may find it more convenient to update the device rather than the firmware.

William Hugh Murray
William Hugh Murray

2021-05-26

Update Available for Simple 301 Redirects by BetterLinks WordPress Plugin

The developer of the Simple 301 Redirects by BetterLinks plugin for WordPress have released an update to address several vulnerabilities, including one that could be exploited to redirect traffic to a malicious website. The plugin has been installed on more than 300,000 sites. Users are urged to update to Simple 301 Redirects by BetterLinks version 2.0.4, which was released on May 5.

Editor's Note

Make sure that your plugin is all the way to 2.0.4, released May 5; the April 15 patch didn’t fully address the problem. Verify it’s actually being used and uninstall it if not. Wordfence firewall rules were released April 8th and May 8th to the paid and free versions respectively.

Lee Neely
Lee Neely

WordPress plugins greatly and cheaply add value to WordPress. However, they are used "as is" with no representation of quality. They should be used only by design and intent, never by default, and must be scrupulously managed and maintained.

William Hugh Murray
William Hugh Murray

2021-05-27

FBI Flash Alert: APT Group Exploiting Fortinet Vulnerabilities

The FBI issued a flash alert on Thursday, May 27, warning that APT threat actors exploited vulnerabilities in “a Fortigate appliance to access a webserver hosting the domain for a U.S. municipal government.” The alert lists indicators of compromise, including new user accounts, certain executable files, and unrecognized scheduled tasks. It also lists suggested mitigations.

Internet Storm Center Tech Corner

Uncovering Shenanigans in an IP Address Block via Hurricane Electric's BGP Toolkit

https://isc.sans.edu/forums/diary/Uncovering+Shenanigans+in+an+IP+Address+Block+via+Hurricane+Electrics+BGP+Toolkit/27456/


A Survey of Bluetooth Vulnerabilities

https://isc.sans.edu/forums/diary/A+Survey+of+Bluetooth+Vulnerabilities+Trends/27460/


AV evasion with 64-bit Executables

https://isc.sans.edu/forums/diary/All+your+Base+arenearly+equal+when+it+comes+to+AV+evasion+but+64bit+executables+are+not/27466/


VMware Advisory

https://www.vmware.com/security/advisories/VMSA-2021-0010.html


Trend Micro Bugs

https://blog.talosintelligence.com/2021/05/vuln-spotlight-trend-i.html


Google Chrome Update

https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html


Attacks on PDF Certification

https://www.pdf-insecurity.org


nginx vulnerability

https://x41-dsec.de/lab/advisories/x41-2021-002-nginx-resolver-copy/


Unpatched WebKit Vulnerability in iOS/macOS

https://blog.theori.io/research/webkit-type-confusion/


VSCode Extension Vulnerabilities

https://snyk.io/blog/visual-studio-code-extension-security-vulnerabilities-deep-dive/


M1RACLES

https://m1racles.com