• chevron_right

      SolarWinds patches vulnerabilities that could allow full system control

      Dan Goodin · news.movim.eu / ArsTechnica · Thursday, 4 February, 2021 - 12:39

    SolarWinds patches vulnerabilities that could allow full system control

    Enlarge (credit: Getty Images)

    SolarWinds, the previously little-known company whose network-monitoring tool Orion was a primary vector for one of the most serious breaches in US history, has pushed out fixes for three severe vulnerabilities.

    Martin Rakhmanov, a researcher with Trustwave SpiderLabs, said in a blog post on Wednesday that he began analyzing SolarWinds products shortly after FireEye and Microsoft reported that hackers had taken control of SolarWinds’ software development system and used it to distribute backdoored updates to Orion customers . It didn’t take long for him to find three vulnerabilities, two in Orion and a third in a product known as the Serv-U FTP for Windows. There's no evidence any of the vulnerabilities have been exploited in the wild.

    The most serious flaw allows unprivileged users to remotely execute code that takes complete control of the underlying operating system. Tracked as CVE-2021-25274 the vulnerability stems from Orion’s use of the Microsoft Message Queue, a tool that has existed for more than 20 years but is no longer installed by default on Windows machines.

    Read 9 remaining paragraphs | Comments

    index?i=YusKrbdmhJM:mYw9k24pYzo:V_sGLiPBpWUindex?i=YusKrbdmhJM:mYw9k24pYzo:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA
    • chevron_right

      Default password in radiology devices leaves healthcare networks open to attack

      Dan Goodin · news.movim.eu / ArsTechnica · Tuesday, 8 December, 2020 - 17:00

    Photograph of a complicated, intimidating medical device.

    Enlarge (credit: GE Healthcare )

    Dozens of radiology products from GE Healthcare contain a critical vulnerability that threatens the networks of hospitals and other health providers that use the devices, officials from the US government and a private security firm said on Tuesday.

    The devices—used for CT scans, MRIs, X-Rays, mammograms, ultrasounds, and positron emission tomography—use a default password to receive regular maintenance. The passwords are available to anyone who knows where on the Internet to look. A lack of proper access restrictions allows the devices to connect to malicious servers rather than only those designated by GE Healthcare. Attackers can exploit these shortcomings by abusing the maintenance protocols to access the devices. From there, the attackers can execute malicious code or view or modify patient data stored on the device or the hospital or healthcare provider servers.

    Aggravating matters, customers can’t fix the vulnerability themselves. Instead, they must request that the GE Healthcare support team change the credentials. Customers who don’t make such a request will continue to rely on the default password. Eventually, the device manufacturer will provide patches and additional information.

    Read 5 remaining paragraphs | Comments

    index?i=EsLZw1IvVL0:o7ednpfGULU:V_sGLiPBpWUindex?i=EsLZw1IvVL0:o7ednpfGULU:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA
    • chevron_right

      New Windows exploit lets you instantly become admin. Have you patched?

      Dan Goodin · news.movim.eu / ArsTechnica · Monday, 14 September, 2020 - 23:20

    A casually dressed man smiles next to exposed computer components.

    Enlarge (credit: VGrigas (WMF) )

    Researchers have developed and published a proof-of-concept exploit for a recently patched Windows vulnerability that can allow access to an organization’s crown jewels—the Active Directory domain controllers that act as an all-powerful gatekeeper for all machines connected to a network.

    CVE-2020-1472, as the vulnerability is tracked, carries a critical severity rating from Microsoft as well as a maximum of 10 under the Common Vulnerability Scoring System. Exploits require that an attacker already have a foothold inside a targeted network, either as an unprivileged insider or through the compromise of a connected device.

    An “insane” bug with “huge impact”

    Such post-compromise exploits have become increasingly valuable to attackers pushing ransomware or espionage spyware. Tricking employees to click on malicious links and attachments in email is relatively easy. Using those compromised computers to pivot to more valuable resources can be much harder.

    Read 13 remaining paragraphs | Comments

    index?i=0Gl3tL6GoAw:yKsTI8E4aUk:V_sGLiPBpWUindex?i=0Gl3tL6GoAw:yKsTI8E4aUk:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA