Weekly Infosec News Brief: 14-20 Dec

Major Vulnerability in Juniper Firewalls Found and Patched

Last Thursday it was revealed the Juniper's ScreenOS operating system, which runs Juniper's firewalls, had a section of "unauthorized code" added to it as far back as 2012. The added code allows an attacker to remotely gain administrative access to the firewall and to decrypt encrypted VPN traffic. The issue affects versions 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20, and a patch is currently available. Juniper states that they found the code during an internal code review and do not know how it got there.
http://arstechnica.com/security/2015/12/unauthorized-code-in-juniper-firewalls-decrypts-encrypted-vpn-traffic/
http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors/
http://forums.juniper.net/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554


Major Vulnerability in FireEye Devices Found and Patched

Google's "Project Zero" researchers uncovered a major flaw in the NX, EX, AX, FX series of FireEye products that could allow an attacker to take control of the devices merely by sending an email into the monitored network. The attack can succeed even if the email is never opened. The compromise of such a device, which generally is set up to passively monitor all traffic in and out of an organization's network, could enable an attacker to monitor all of an organization's Internet traffic. FireEye has a patch available; if you are an affected FireEye device, ensure you are on security release 427.334 or newer. Security devices and systems often have very broad access to a network, and security them properly is essential in order to ensure that your security system doesn't itself become the source of a breach.
http://arstechnica.com/security/2015/12/when-a-single-e-mail-gives-hackers-full-access-to-your-network/
https://www.fireeye.com/content/dam/fireeye-www/support/pdfs/fireeye-rce-vulnerability.pdf


MacKeeper Customer Database Found Exposed to the Internet with No Security

A security researcher last week announced that he had found a database server storing customer information regarding the MacKeeper software, including customer names, licenses, and hashed passwords. The database was stored using the MongoDB database software. The researcher notified the company before publicizing his discovery, and the security issue has been fixed. Subsequent research shows that tens of thousands of MongoDB servers are similarly exposed to the Internet with no authentication required for access. What does your organization do to ensure that systems that should not be accessible from the Internet are not?
http://www.eweek.com/security/mackeeper-leak-highlights-danger-of-misconfigured-databases.html
http://www.computerworld.com/article/3016216/security/over-680tb-of-data-exposed-in-mongodb-databases.html
https://mackeeper.com/blog/post/173-mackeeper-security-advisory


Former IBM Employee Charged With Stealing Valuable Source Code

Jiaqiang Xu, a 29-year-old former IBM software engineer, was charged in federal court on December 8 with stealing source code from his former employer and attempting to re-sell it. An undercover agent posing as an investor in a new data storage company interviewed Xu, and Xu allegedly offered to sell the source code for the new company's use in developing their own storage solutions. Beyond trust, what can your organization do to prevent insiders from abusing your proprietary data? Digital watermarking and seeding of valuable data is one strategy. Anchor can help you with this and other data-loss prevention requirements.
http://www.reuters.com/article/us-ibm-crime-china-idUSKBN0TR2X820151208#5tJgL8o1cKYssGdI.97


Mozilla Releases Firefox 43, Featuring Security Fixes and Enhancements

Last Tuesday the Mozilla Foundation released version 43 of their Firefox browser. The most notable new development is an improved Tracking Protection feature, intended to prevent many types of user tracking used by advertisers and web analytics tools. The new release also fixes sixteen security vulnerabilities, including three that are rated as "critical." The new release is also notable as the first time a native 64-bit version is available for Windows.
http://www.eweek.com/security/mozilla-ups-security-tracking-protection-in-firefox-43.html

Comments

Popular posts from this blog

Weekly Infosec News Brief: 14-20 March

Weekly Infosec News Brief 20-26 July

Weekly Infosec News Brief: 22-28 February