SANS NewsBites

Patching Exchange Server Flaw Worth Effort of Authenticating; Microsoft Vulnerability Tuesday Includes Patches for Two Flaws Under Active Exploit; Patch Citrix ADCs and Gateways to Prevent Showstopper Denial of Service Attacks

November 12, 2021  |  Volume XXIII - Issue #89

Top of the News


2021-11-11

Alan Paller, Cyber Security Industry Titan and SANS Institute Founder, Passes Away

It is with deep sadness that we announce that SANS founder and the originator of NewsBites Alan Paller passed away on November 9. The SANS press release on his passing is at https://www.sans.org/press/announcements/alan-paller-cyber-security-industry-titan-and-sans-institute-founder-passes-away/

For those of us who worked with Alan, his driving force was a vision that never wavered: security could only be improved by raising the quality of security operations by increasing and professionalizing the skill levels of security teams and managers. We often say security success is a mixture of people, process, and technology – Alan reminded us that those people need to have deep, hands-on skills to create and run impactful security processes as well as to select and develop effective security technologies, tools, and products.

Alan’s commitment to that vision over the years helped keep SANS focused on having the best security instructors developing the most effective courses and always measuring success of every SANS course or conference by making sure it met his number one criterion: the student or attendee must be able to go back to work afterward and do something new and better – not just be able to talk about new and better security. Equally important, Alan instilled in SANS the idea that if SANS stayed focused on helping the security community “fight the good fight,” success would always follow. Alan championed and dedicated SANS resources to increasing essential security hygiene, security team diversity, and growing the number of people joining the cybersecurity profession long before any profit was possible from those efforts.

On a personal level, if you were part of an effort with Alan that was fighting the good security fight and were lucky enough to have Alan introduce you at a conference or meeting, his lavish praise was legendary and inspiring. The security community is a better place for Alan’s tireless efforts over the past 30+ years. At SANS we already miss him intensely and we will work hard to continue to live up to his guiding vision.


2021-11-10

Microsoft Fixes Zero-Day Exchange Server Flaw

Microsoft has fixed vulnerabilities in on-premises Exchange Server 2013, 2016, and 2019. One of the flaws, a post-authentication vulnerability, has been exploited in “limited targeted attacks.” Microsoft is urging users to apply the updates immediately. The fixes were released as part of Microsoft’s Patch Tuesday.

Editor's Note

Unlike some of the other Exchange server flaws, this one requires authentication. But you probably still want to apply the Outlook 365 patch and move your email to the cloud if you are sick of patching Exchange.

Johannes Ullrich
Johannes Ullrich

2021-11-11

Microsoft Patch Tuesday

Microsoft’s Patch Tuesday for November 2021 includes fixes for at least 55 security issues in its products. Two of the flaws are being actively exploited and four vulnerabilities were disclosed before Tuesday. Microsoft has acknowledged that the updates may cause authentication issues on Domain Controller running Windows Server.

Editor's Note

55 patches is a big number, but in the spirit of Thanksgiving we can be thankful that November 2021’s patch load is lower than October’s 71. When you look at how often Google patches Android and Chrome and Apple updates iOS, it is pretty clear modern software will always have ongoing streams of vulnerabilities that require rapid patching with minimal disruption. Microsoft has been urging customers to patch faster by moving to a “cloud cadence” of faster patch eval and push out, but Microsoft’s monthly vulnerability Tuesday (vs. more frequent and timely patch releases) is also a limiting factor.

John Pescatore
John Pescatore

It is worth noting that the number of vulnerabilities patched by MS per month has dropped from the high tens to the low tens over the last year.

William Hugh Murray
William Hugh Murray

2021-11-10

Citrix Patches Critical Flaw Affecting ADC and Gateway

Citrix has fixed two vulnerabilities. The first is a critical uncontrolled resource consumption issue affecting its Application Delivery Controller (ADC) and Gateway products; the vulnerability could be exploited to crash networks without authentication. The second is a low-severity uncontrolled resource consumption issue affecting ADC, Gateway, and the Citrix SD-WAN WANOP Edition appliance; the flaw could be exploited to cause temporary disruption of the Management GUI, Nitro API and RPC communication.

Editor's Note

This is "just" a denial of service vulnerability. But these devices are usually responsible for all traffic in/out a network, and a DoS could be quite devastating. In addition to patching: Double check your IR playbooks to see how you would deal with your Citrix ADC being down. Do you have out-of-band remote access? If you do: How is this access monitored and secured? Who has credentials?

Johannes Ullrich
Johannes Ullrich

The Rest of the Week's News


2021-11-12

US Secure Equipment Act Signed Into Law

US President Joe Biden has signed The Secure Equipment Act into law, closing what one FCC Commissioner has called “the Huawei loophole.” According to a White House statement, the law “requires the Federal Communications Commission to adopt rules clarifying that it will no longer review or approve any authorization application for equipment that poses an unacceptable risk to national security.” Small and medium-sized companies wanting to replace Huawei and ZTE equipment can request reimbursement from the FCC.

Editor's Note

While banning telecoms equipment that “poses an unacceptable risk to national security” sounds like a good thing, the list of those risky products is short (Huawei, ZTE, Hytera and Hangzhou Hikvision) and there don’t seem to be any defined criteria for how a product is determined to be an unacceptable risk, or how it would be removed from the list. Banning government purchase of unsecure products is a good thing – if it is done in a transparent way that drives suppliers to higher levels of security.

John Pescatore
John Pescatore

2021-11-11

Legislation Would Establish Rules for Financial Services Ransomware Response

US legislators have introduced a bill that would establish ransomware response rules for financial institutions. If the Ransomware and Financial Stability Act passes, financial institutions suffering ransomware attacks would be required to inform the Director of the Treasury Department's Financial Crimes Enforcement Network (FinCEN) about the details of the attack, including demanded ransom. The bill would also require financial institutions to obtain a Ransomware Payment Authorization prior to paying any ransomware demand over $100,000.

Editor's Note

Limiting the payout (without special approval) to $100,000 is a very interesting move. I’d like to think it would be at least somewhat successful in reducing the ransomware demands. Beyond lowering payments, I have a hard time believing this bill will help “ deter, deny, and track down hackers.” A $100k payout is still solid motivation.

Tim Medin
Tim Medin

2021-11-11

Queensland Water Supply Server Breached for Nine Months

According to a recent annual financial audit report, hackers had access to a server belonging to a Queensland (Australia) water supplier for nine months, from August 2020 through May 2021. SunWater operates dams, pumping stations, and pipelines. The audit report includes information from the examination of six Queensland water sector entities.

Editor's Note

As we measure incident response time, we should also measure our red team engagements with time metrics: time to meet objective, time to detect TTPs, time to respond, time to communicate to stakeholders, etc. We must improve these response times to limit impact to businesses.

Jorge Orchilles
Jorge Orchilles

This scenario isn’t special other than it is critical infrastructure. Too often attackers are on the internal network and aren’t detected for months. I’d be very interested to learn how the breach was ultimately detected and use that as a lesson for other orgs. Unfortunately, I’d bet that the detection was by a third party.

Tim Medin
Tim Medin

2021-11-11

Google Researchers Detected Watering Hole Attacks Targeting Apple Devices

Google’s Threat Analysis Group (TAG) detected watering hole attacks targeting visitors to several Hong Kong websites. “The watering hole served an XNU privilege escalation vulnerability (CVE-2021-30869) unpatched in macOS Catalina, which led to the installation of a previously unreported backdoor.” Apple released a fix for the issue in September.

Editor's Note

According to Google TAG, this campaign targeted both iOS and macOS users, with a small number of exploit attempts delivered. This is a multi-exploit toolchain designed to gain privileged, remote access on vulnerable devices. We used to call this "sophisticated", but it's probably time to adjust our thinking since these complex exploit chains are increasingly common.

Joshua Wright
Joshua Wright

2021-11-12

Palo Alto Networks Fixes Zero-Day in PAN-OS 8.1

Palo Alto Networks has patched a critical buffer overflow vulnerability in its firewalls that use the GlobalProtect Portal VPN. The flaw affects PAN-OS versions 8.1.17 and older. Researchers detected the vulnerability in November 2020 but did not notify Palo Alto Networks in September.

Editor's Note

You are only affected by this flaw if the VPN functionality is enabled.

Johannes Ullrich
Johannes Ullrich

This news has been a cause for debate around penetration testing companies stockpiling 0days to use against their customers and not disclosing vulnerabilities to the vendor. A gentle reminder that any offensive security assessment is about providing business value. Some organizations may require 0days while other organizations function under assumed breach.

Jorge Orchilles
Jorge Orchilles

2021-11-10

Former Broadcom Engineer Charged With Theft of Trade Secrets

A US federal grand jury has indicted former Broadcom engineer Peter Kisang Kim on multiple charges of theft of trade secrets. Kim worked at Broadcom for more than 20 years. He allegedly stole trade secrets; the purloined information was stored in non-public document repositories that were restricted to employees working on specific projects or within specific suborganizations. Kim allegedly took the data with him when he started working for a Chinese company.

Editor's Note

Insider threats are often left as a lower priority focus in many organizations. Defenders should baseline what “normal” activity is so that they can detect and respond to “abnormal” behavior. This applies to a malicious insider as well as a compromised internal user.

Jorge Orchilles
Jorge Orchilles

Internet Storm Center Tech Corner