SANS NewsBites

Linux Distributions Releasing Patches for 12-Year-Old Polkit Vulnerability; Water Sector Added to US ICS Cybersecurity Initiative; OMB's Zero-Trust Architecture Strategy

January 28, 2022  |  Volume XXIV - Issue #08

Top of the News


2022-01-26

12 Year-Old Bug in Polkit Allows for Privilege Elevation

Researchers from Qualys identified a flaw in Polkit’s pkexec dating back to 2009. The memory-corruption vulnerability, dubbed PwnKit, allows a user with access to a vulnerable machine to elevate to root privileges. Discovered in November, tracked as CVE-2021-4034, patches have been released. Polkit, previously known as PolicyKit manages privileges in most Unix/Linux distributions, managing access to privileged processes from unmanaged processes.

Editor's Note

Patches should be available for all major Linux distributions, and the patch does not require a reboot. Privilege escalation vulnerabilities are often assigned a lower urgency. But this vulnerability is easy to exploit, and some of the exploits publicly available will not leave a mark in your logs.

Johannes Ullrich
Johannes Ullrich

Updates to Polkit have been released for RedHat/CentOS and other Linux distributions and are available through you regular repositories. IF you cannot patch, remove the set UID root permission from pkexec. (e.g., chmod 755 /bin/pkexec). Exploitation can be detected by looking for log entries, see the Qualys blog for examples; however, it is possible to exploit the flaw without leaving any traces in system logs.

Lee Neely
Lee Neely

Unix/Linux escalation of privilege vulnerabilities linger around for a significant amount of time since they are “only” privilege escalation and lower CVSSv3 score. Make the effort to get your systems patched for this vulnerability that is trivially exploited.

Jorge Orchilles
Jorge Orchilles

This bug is fascinating to me for several reasons. First, it indicates to researchers that other SUID binaries may have a similar issue, so I suspect we may see more of these. Second, this bug is dead simple to exploit. Almost all the POC's available were written based on the initial writeup. It also does not deal with any type of ASLR or memory corruption bug in this exploit, so this universally works everywhere regardless of kernel or distribution version. Patch it now.

Moses Frost
Moses Frost

2022-01-27

Water Sector Now Included in US ICS Cybersecurity Initiative

The Biden-Harris Administration is expanding the Industrial Control System (ICS) Cybersecurity Initiative to the country’s water sector. The 100-day Industrial Control Systems Cybersecurity Initiative - Water and Wastewater Sector Action Plan is a collaborative effort between the Environmental Protection Agency (EPA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Water Sector Coordinating Council (WSCC).

Editor's Note

The water sector consists of thousands of businesses, many very small with little budget, making cyber improvements a challenge. Even so, the CISA is offering free vulnerability scans and technical assessments to help bridge the gap. These will be particularly helpful where services were outsourced or expertise is lacking to verify systems are appropriately secured.

Lee Neely
Lee Neely

The announcement acknowledges that the Water and Wastewater Sector is intensely local – very similar to election systems in the number and variety of local agencies providing water and sewage services. While past compromises in this section definitely in need of security attention, the same approaches and solutions that work for large scale electrical grids and energy systems will not work here.

John Pescatore
John Pescatore

Water is infrastructure and needs to be protected as such. However, it is not vulnerable to the kind of cascading failures that the power grid is. While there may be back-up and load sharing agreements, their invocation is not automatic.

William Hugh Murray
William Hugh Murray

2022-02-26

OMB Releases Zero-Trust Architecture Strategy

The US Office of Management and Budget (OMB) has published a federal zero-trust architecture strategy. The strategy requires federal agencies “to meet specific cybersecurity standards and objectives by the end of Fiscal Year (FY) 2024.” The requirements include the use of strong multi-factor authentication; the “creat[ion of] reliable asset inventories through participation in CISA’s Continuous Diagnostics and Mitigation (CDM) program;” and “audit[ing] access to any data encrypted at rest in commercial cloud infrastructure.”

Editor's Note

At core, the driver to zero trust is that our legacy model of a hardened perimeter with (many) defined entry and exit points is not sufficient to prevent attack by modern adversaries. The executive order (EO 14028) required agencies to have a zero-trust implementation plan. This memo adds a requirement for agencies to build upon those plans within 60 days, as well as identify a zero-trust strategy implementation within 30 days of the memo. The memo has broad impact, not only in authentication, but also requiring more substantive application testing, DNS encryption, encryption of internal HTTP connections, comprehensive data protection and more. This memo provides a good set of security measures to consider regardless of public or private sector.

Lee Neely
Lee Neely

As your architecture moves from traditional on-prem to cloud and zero-trust, be sure your defenses and detections evolve as well. If you can't detect password spraying and identity abuse, you may not any better off. Also: multi-factor authentication for all the things!

Christopher Elgee
Christopher Elgee

Non-federal agencies should review and apply similar guidance to meet the bar set by OMB.

Jorge Orchilles
Jorge Orchilles

I always think about definitions when I read headlines like this. Many will argue MFA alone is not Zero Trust. Do we know which Zero Trust Architecture definition we are going with today?

Moses Frost
Moses Frost

We need system-to-system and process-to-process isolation, and least privilege access control and we need them now, not two years from now. Setting a target of 2024 is the equivalent of granting a license to accept the risk (e.g., that a covert backdoor anyplace in the organization puts the entire organization at risk) until then.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2022-01-27

NCSC’s Scanning Made Easy Project to Share NMAP Scripts

The UK’s National Cyber Security Centre and the Industry 100 have jointly launched the Scanning Made Easy (SME) project to help system owners and administrators find vulnerabilities in their networks. The project will release NMAP Scripting Engine scripts created by i100 partners and other cybersecurity experts.

Editor's Note

Practitioner's note: after downloading new NSE scripts (usually to /usr/share/nmap/scripts/ or C:\Program Files (x86)\Nmap\scripts\), be sure to run "nmap --script-updatedb" as an elevated user. This updates Nmap's local script database so that next time you run something like " nmap -iL hosts.txt --script 'vuln' ", the appropriate new script will run.

Christopher Elgee
Christopher Elgee

The Nmap Scripting Engine is one of the most powerful and potentially underused free security tools available. Engaging the security community to crowdsource the development could be exactly what is needed to draw more interest and development effort to this underused tool. The latest version has around 600 scripts; however, only a little over 100 of those check for specific vulnerabilities. Some of the vulnerabilities are over 20 years old, and the newest CVE specifically mentioned in current NSEs is CVE-2018-15442. Of the current 344 CVEs listed in CISA’s Known Exploited Vulnerabilities Catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog), current NSE scripts only identify 2: CVE-2017-0143 (smb-vuln-ms17-010.nse) and 2017-5638 (http-vuln-cve2017-5638.nse). Both are nearly 5 years old. That’s a big gap and NCSC’s project should provide a valuable resource for little to no cost. The US could do similar with a project focused on detecting the CVEs in the Known Exploited Vulnerabilities Catalog.

Jon Gorenflo
Jon Gorenflo

This is going to be a useful library to help your scanning be more comprehensive. Even so, be sure to review each script to understand how it checks for vulnerabilities, if the check is intrusive (they are designed not to be), why it may have false positives as well as false negatives.

Lee Neely
Lee Neely

There are very few vulnerability scanners that are free. NMAP with their NSE scripts is one of the best options. I look forward to this project.

Jorge Orchilles
Jorge Orchilles

2022-01-27

Google Drops FLoC for Topics API

Google is scrapping the Federated Learning of Cohorts (FLoC) Privacy Sandbox Initiative proposal and replacing it with the Topics API. In a blog post, Google notes that “Topics was informed by our learning and widespread community feedback from our earlier FLoC trials.” Google initially floated FLoC to replace third-party cookies in Chrome.

Editor's Note

Monetizing content via ads requires ads to be relevant to the user. Google is struggling hard to come up with a solution that will be accepted by users. This is not a technical problem. Companies like Google and Facebook lost user trust and no technical solution will get it back.

Johannes Ullrich
Johannes Ullrich

While privacy concerns effectively killed FLoC, the Topics API is still intended to provide tailored advertising based on your browsing habits. Their claim is “advertisers will only receive topics they have observed from other sites.” A user visits a site, browser infers topics of interest from browser history, a site with ads is visited, the topics of interest are relayed to the AdTech platform (via API), which then selects the ads to display. E.g., if you visit a lot of Football sites, advertising would be from Football related advertisers. The question is do we want revised/targeted tracking, are would no tracking (non-targeted) be preferred.

Lee Neely
Lee Neely

If the goal here is to provide less tracking of users and more privacy or anonymity of browsing, we cannot in good faith expect it to come from a company whose business model depends on this data. There are probably more impartial organizations that allow for "comments" that can design a more workable model. Although my snark meter will just remark that we will likely see tracking code in NFTs in the future, so buckle up.

Moses Frost
Moses Frost

2022-01-26

Let’s Encrypt Certificate Revocation

Let’s Encrypt will revoke roughly 2 million certificates due to irregularities in its implementation of the TLS-ALPN-01 validation method. Let’s Encrypt plans to start the revocation process at 16:00 UTC on Friday, January 28. The organization estimated that less than one percent of active certificates are affected.

Editor's Note

The biggest issue with certificate revocations is knowing that somewhere in your organization they are being used. Site owners with impacted certs will get email, but not all those sites are even known by IT or IT security. This is probably a low impact event, but good to use as justification for improvement certificate management capabilities.

John Pescatore
John Pescatore

With a 90-day expiration and the automation of certificate rollout, this one will be one to watch. With 2 million websites, it would be good to know who did or did not get affected by this. If there was an outage, how long did it last? Unfortunately, this type of data is seldom easy to come by because there may not be any reporting, and outages may happen with no one talking about it. However, with Certification Transparency Reporting, we could ultimately figure out who was impacted and how quickly they rolled out new certificates. Maybe a good project for a research study.

Moses Frost
Moses Frost

If your certificate is revoked, your nightly run of certbot (or other ACME client) will get you an updated certificate. Avoid the temptation to run it repeatedly/rapidly so as not to DOS the Let’s Encrypt service.

Lee Neely
Lee Neely

2022-01-27

DeadBolt Ransomware Targets QNAP NAS Devices

QNAP is urging customers to take steps to protect their network-attached storage (NAS) devices from the DeadBolt ransomware. In a statement, the company writes, “QNAP urges all QNAP NAS users to follow the security setting instructions below to ensure the security of QNAP NAS and routers, and immediately update QTS to the latest available version.” The DeadBolt ransomware began targeting Internet-connected QNAP NAS devices on January 25.

Editor's Note

The cost of a cloud hosted file service is going to be less than rebuilding your NAS if compromised with DeadBolt or other ransomware. If you’re still exposing your NAS to the Internet, make sure to disable remote system administration, make sure your router is not port forwarding the NAS admin services to the Internet and disable the UPnP Port Forwarding on your device. Make sure you’ve updated to the latest firmware. Make sure you have multiple disconnected backups of your NAS.

Lee Neely
Lee Neely

I first ran into a ransomware gang that hit a Windows Server through exposed RDP and quickly pivoted to encrypting a Synology NAS. The prevalence of this type of gear in small businesses or Prosumer (Pro-Consumer) makes these types of attacks both easy and destructive. Most of the gear is not configured with strong passwords or authentication mechanisms, and the management interfaces are generally on the same network as the standard workstation equipment. I am surprised we do not see more of this.

Moses Frost
Moses Frost

2022-01-26

Apple Updates

Apple has released updates for iOS, iPadOS, WatchOS, tvOS, and macOS. The updates include a fix for the Safari data leak issue that was disclosed earlier this month. The updates also address a memory corruption issue in the IOMobileFrameBuffer kernel extension that is being actively exploited.

Editor's Note

Two vulnerabilities have already been made public or are being exploited ahead of the release of the patch. For others, additional details were released shortly after the patches were released. Update by this weekend. But note that there are some issues, for example with Dropbox, as you are applying this update. Apple Music, which is a full rewrite for MacOS, may also require you to log out and log in again to re-authorize your system.

Johannes Ullrich
Johannes Ullrich

The iOS and iPadOS updates may feel benign as they only address 10 CVEs. The kicker is they include a fix to the CVE-2022-22587 zero day which is being actively exploited. Push the updates to your devices now. These updates are essentially monthly now, consider configuring your MDM to always push updates to your managed devices as they are released, along with user notification to reduce exposure windows.

Lee Neely
Lee Neely

2022-01-26

Kentucky Hospital Cyber Incident

Taylor Regional Hospital in Kentucky has experienced a cyber incident that resulted in significant disruption. All hospital systems, including its phone system, are down; the facility is operating under electronic health record (EHR) downtime procedures.

Editor's Note

Before your local hospital has a cyber incident, verify options to use a different facility, both from a feasibility and insurance perspective. Also be prepared to have documentation on current medications and medical conditions much as you would on a first time visit to a doctor, even if you’re going to an impacted facility, as they may not have the back-end health care/history records.

Lee Neely
Lee Neely

I worked in healthcare for almost a decade back in the early 2000s. It was tough to justify endpoint security, segmentation, and other security items because the threat model was poorly defined. Specifically, after "worms" stopped being so prevalent, taking down systems. If patient safety or patient care isn't a factor, it isn't a priority in many places. Compliance and privacy are generally the more significant mover of the budget. It has taken almost another decade, but Ransomware has finally turned what was a hard sell into practically a requirement. Expect to see more focus in healthcare as more and more systems become Ransomware targets.

Moses Frost
Moses Frost

2022-01-27

Ransomware Hits Electronics Company in Taiwan

Taiwanese company Delta Electronics was hit with ransomware attack that was detected on January 18. Delta is a contractor for Apple, Tesla, HP, and Dell. Delta says the attack affected only non-critical systems and that operations were not significantly disrupted. The company’s main website is still offline as of Thursday, January 27.

Editor's Note

Delta claims to be the largest supplier of switching power supplies. The Conti ransomware operators claim to have encrypted 1500 servers and 12,000 computers out of the approximately 65,000 devices on Delta’s network. Take that sort of impact to your next disaster exercise and see how you would recover from that sort of impact, then make sure you have leveraged logical and physical separation techniques to manage lateral movement.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

Local Privilege Escalation Vulnerability in Polkit's pkexec (CVE-2021-4034)

https://isc.sans.edu/forums/diary/Local+privilege+escalation+vulnerability+in+polkits+pkexec+CVE20214034/28272/


Emotet Stops Using 0.0.0.0 in Spambot Traffic

https://isc.sans.edu/forums/diary/Emotet+Stops+Using+0000+in+Spambot+Traffic/28270/


Over 20 Thousand Servers Have Their iLO Interfaces exposed to the Internet

https://isc.sans.edu/forums/diary/Over+20+thousand+servers+have+their+iLO+interfaces+exposed+to+the+internet+many+with+outdated+and+vulnerable+versions+of+FW/28276/


Technical Analysis of CVE-2022-22583

https://perception-point.io/technical-analysis-of-cve-2022-22583-bypassing-macos-system-integrity-protection/

https://isc.sans.edu/forums/diary/Apple+Patches+Everything/28280/


Apple Patches and Exploits

https://support.apple.com/en-us/HT201222

https://www.ryanpickren.com/safari-uxss


DazzleSpy Malware

https://www.welivesecurity.com/2022/01/25/watering-hole-deploys-new-macos-malware-dazzlespy-asia/


Little Snitch Firewall Bypass

https://rhinosecuritylabs.com/network-security/bypassing-little-snitch-firewall/


Let's Encrypt Fixes Problems and Revokes Certificates

https://community.letsencrypt.org/t/changes-to-tls-alpn-01-challenge-validation/170427


VMWare Warns of Log4j Exploitation

https://www.vmware.com/security/advisories/VMSA-2021-0028.html

https://www.cynet.com/attack-techniques-hands-on/threats-looming-over-the-horizon/


Geoffrey Parker: Building an Intelligent, Automated Tiered Phishing System

https://www.sans.edu/cyber-research/building-an-intelligent-automated-tiered-phishing-system-matching-the-message-level-to-user-ability/