viralamo

Menu
  • Technology
  • Science
  • Money
  • Culturs
  • Trending
  • Video

Subscribe To Our Website To Receive The Last Stories

Join Us Now For Free
Home
Technology
WatchGuard failed to explicitly disclose critical flaw exploited by Russian hackers
Technology

WatchGuard failed to explicitly disclose critical flaw exploited by Russian hackers

07/04/2022

The letters WTF in a giant speech bubble.

Security vendor WatchGuard quietly fixed a critical vulnerability in a line of its firewall devices and didn’t explicitly disclose the flaw until Wednesday, following revelations hackers from Russia’s military apparatus exploited it en masse to assemble a massive botnet.

Law enforcement agencies in the US and UK on February 23 warned that members of Sandworm—among the Russian government’s most aggressive and elite hacker groups—were infecting WatchGuard firewalls with malware that made the firewalls part of a vast botnet. On the same day, WatchGuard released a software tool and instructions for identifying and locking down infected devices. Among the instructions was ensuring appliances were running the latest version of the company’s Fireware OS.

Putting customers at unnecessary risk

In court documents unsealed on Wednesday, an FBI agent wrote that the WatchGuard firewalls hacked by Sandworm were “vulnerable to an exploit that allows unauthorized remote access to the management panels of those devices.” It wasn’t until after the court document was public that WatchGuard published this FAQ, which for the first time made reference to CVE-2022-23176, a vulnerability with a severity rating of 8.8 out of a possible 10.

“WatchGuard Firebox and XTM appliances allow a remote attacker with unprivileged credentials to access the system with a privileged management session via exposed management access,” the description read. “This vulnerability impacts Fireware OS before 12.7.2_U1, 12.x before 12.1.3_U3, and 12.2.x through 12.5.x before 12.5.7_U3.”

The WatchGuard FAQ said that CVE-2022-23176 had been “fully addressed by security fixes that started rolling out in software updates in May 2021.” The FAQ went on to say that investigations by WatchGuard and outside security firm Mandiant “did not find evidence the threat actor exploited a different vulnerability.”

Advertisement

When WatchGuard released the May 2021 software updates, the company made only the most oblique of references to the vulnerability.

“These releases also include fixes to resolve internally detected security issues,” a company post stated. “These issues were found by our engineers and not actively found in the wild. For the sake of not guiding potential threat actors toward finding and exploiting these internally discovered issues, we are not sharing technical details about these flaws that they contained.”

According to Wednesday’s FAQ, FBI agents informed WatchGuard in November that about 1 percent of the firewalls it had sold had been infected by Cyclops Blink, a new strain of malware developed by Sandworm to replace a botnet the FBI dismantled in 2018. Three months after learning of the infections from the FBI, WatchGuard published the detection tool and the accompanying 4-Step Diagnosis and Remediation Plan for infected devices. The company obtained the CVE-2022-23176 designation a day later, on February 24.

Even after all of these steps, including obtaining the CVE, however, the company still didn’t explicitly disclose the critical vulnerability that had been fixed in the May 2021 software updates. Security professionals, many of whom have spent weeks working to rid the Internet of vulnerable devices, blasted WatchGuard for the failure to explicitly disclose.

“As it turns out, threat actors *DID* find and exploit the issues,” Will Dormann, a vulnerability analyst at CERT, said in a private message. He was referring to the WatchGuard explanation from May that the company was withholding technical details to prevent the security issues from being exploited. “And without a CVE issued, more of their customers were exposed than needed to be.”

He continued:

WatchGuard should have assigned a CVE when they released an update that fixed the vulnerability. They also had a second chance to assign a CVE when they were contacted by the FBI in November. But they waited for nearly 3 full months after the FBI notification (about 8 months total) before assigning a CVE. This behavior is harmful, and it put their customers at unnecessary risk.

WatchGuard representatives didn’t respond to repeated requests for clarification or comment.

Source link

Share
Tweet
Pinterest
Linkedin
Stumble
Google+
Email
Prev Article
Next Article

Related Articles

Q&A with Ludia: How top developers are balancing IAP+IAA
This article is part of a Gaming Insights series paid …

Q&A with Ludia: How top developers are balancing IAP+IAA

2020 will be a big year for online childcare — here are 7 startups to watch
TechCrunch ist Teil von Verizon Media. Klicken Sie auf ‘Ich …

Talkspace threatened to sue a security researcher over bug report

Leave a Reply Cancel reply

Find us on Facebook

Related Posts

  • Here’s how 2020’s smartphone cameras will improve in photos, videos, and 3D
    Here’s how 2020’s smartphone cameras will improve …
    09/12/2019
  • Hackers steal Mimecast certificate used to encrypt customers’ M365 traffic
    Hackers steal Mimecast certificate used to encrypt …
    13/01/2021
  • TechCrunch’s Favorite Things of 2019
    CES was a snoozefest
    12/01/2020
  • Windows 7: “I’m not dead yet!”
    Windows 7: “I’m not dead yet!”
    14/01/2020
  • Fast & Furious: Crossroads lives video games a quarter-mile at a time
    Technology is anthropology
    26/01/2020

Popular Posts

  • Omnipotent BMCs from QCT remain vulnerable to critical Pantsdown threat
    Omnipotent BMCs from QCT remain vulnerable to …
    26/05/2022 0
  • Russia wages “relentless and destructive” cyberattacks to bolster Ukraine invasion
    Russia wages “relentless and destructive” cyberattacks to …
    27/04/2022 0
  • 10 of the Most Random Reality Shows …
    28/04/2022 0
  • 10 More Modern Conveniences That Met with …
    28/04/2022 0
  • One of the most powerful DDoSes ever targets cryptocurrency platform
    One of the most powerful DDoSes ever …
    28/04/2022 0

viralamo

Pages

  • Contact Us
  • Privacy Policy
Copyright © 2022 viralamo
Theme by MyThemeShop.com

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Refresh