WSUS Vulnerable to Man-in-the-Middle Attack

Many small businesses and organizations use Microsoft's WSUS (Windows Server Update Services) to deliver updates to PCs throughout the organization. This service was introduced in 2005 as an improvement upon the older SUS (Software Update Service) product, which debuted 2002. Corporate IT can run its own server to distribute Microsoft updates inside the network, and can use Group Policy to point all the organizational PCs to download updates from there instead of directly from Microsoft. This allows IT to determine which updates are installed and when, allowing for testing and validation prior to patch deployment. While WSUS does not make for a complete organizational patch management solution, it meets many organizations' biggest needs at an attractive price (free).

Like anything else in a corporate network, however, WSUS can become a liability if not configured securely. In fact, given that it is trusted to distribute software for installation throughout the network, an insecure WSUS service can lead to a massive security failure. In a presentation at Black Hat in Las Vegas, Paul Stone and Alex Chapman of Context Information Security in the UK showed how an attacker could cause a WSUS server to distribute a malicious file.

This attack is made for more difficult if the WSUS server is set up to use SSL in fetching update information. This is not the default, but is not a very difficult feature to set up. Organizations using WSUS are urged to configure SSL in their WSUS deployments if they are not already using it. Microsoft provides detailed instructions for doing so here: https://technet.microsoft.com/library/hh852346.aspxf=255&MSPPError=-2147217396#bkmk_3_5_ConfigSSL

Comments

Popular posts from this blog

Weekly Infosec News Brief: 14-20 March

Weekly Infosec News Brief 20-26 July

Weekly Infosec News Brief: 22-28 February