SANS NewsBites

Before Disposal, Double Check Sanitization of Anything With a Network Interface; Require Vendors to Assure Secure Implementation of UEFI and Secure Boot; Another Top Exploited Vulnerabilities List Highlights Need to Patch Faster

August 4, 2023  |  Volume XXV - Issue #61

Top of the News


2023-08-01

Manually Reset Canon Inkjet Printers’ WiFi Before Discarding

Canon says that some data stored in the memory of some of its inkjet printers might not be removed by a factory reset. Canon urges customers to manually reset its inkjet printers’ wifi settings before handing off the devices, whether that be to sell, to have repaired, or to discard.

Editor's Note

Reading the instructions, it appears the trick is that you need to reset the printer twice. Leaking a WiFi password may not be a huge deal to most users of these consumer level printers, but manufacturers need to do better in making reset procedures easy and reliable.

Johannes Ullrich
Johannes Ullrich

Make sure that you have sanitization processes for all devices with storage. In this case, Canon has you re-enable WiFi after resetting settings one time, then reset them again. Some devices, such as copiers, may have hidden storage you need to physically remove to sanitize. Don't forget to check for other things like originals or output quietly forgotten.

Lee Neely
Lee Neely

This one by itself is not a major risk, but a good reminder to pass on to home workers and to trigger a review of your organizations process for disposal of anything with a WiFi interface – don’t forget to check equipment used in the shipping office, reception desk, etc.

John Pescatore
John Pescatore

2023-08-03

CISA: Shore Up UEFI Security

In a blog post, the US Cybersecurity and Infrastructure Security Agency (CISA) urges the cyber industry to strengthen Unified Extensible Firmware Interface (UEFI) security. “In particular, UEFI secure boot developers haven’t all implemented public key infrastructure (PKI) practices that enable patch distribution (the Linux ecosystem implements it well).” The blog post also offers suggestions for improving UEFI security.


2023-08-03

Five Eyes: 2022’s Top Vulnerabilities

Cybersecurity agencies in the US, the UK, Canada, Australia, and New Zealand have jointly published a list of the 12 most exploited vulnerabilities in 2022. At the top of that list is the Fortinet FortiOS and FortiProxy SSL VPN credential exposure vulnerability, followed by three Microsoft Exchange Proxy Shell vulnerabilities that can be exploited to attain remote code execution, security feature bypass, and privilege elevation. The document “encourage[s] vendors, designers, developers, and end-user organizations to implement the recommendations found within the Mitigations section of [the] advisory.”

The Rest of the Week's News


2023-08-03

Ivanti Discloses Another Vulnerability

Ivanti has disclosed a third vulnerability (CVE-2023-35082) in its Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core, in less than two weeks. The critical authentication bypass vulnerability could be exploited “to allow unauthorized users to access restricted functionality or resources of the application without proper authentication.” The US Cybersecurity and Infrastructure Security Agency (CISA) and the Norwegian National Cyber Security Centre (NCSC-NO) have released a joint advisory warning of active exploitation of the two earlier disclosed vulnerabilities (CVE-2023-35078 and CVE-2023-35081). According to the advisory, threat actors have been exploiting CVE-2023-35078 since at least April 2023.

Editor's Note

Luckily, Ivanti appears to start copying the attackers and is reviewing its code for vulnerabilities now. This vulnerability was addressed before it was exploited in the wild.

Johannes Ullrich
Johannes Ullrich

The vulnerability (CVE-2023-35082, CVSS 10.0) affects MobileIron Core 11.2 and below. Version 11.2 has been out of support since March 15, 2022, and was resolved in version 11.3. There will be no fix for 11.2 or below, upgrade to a supported, patched version, e.g. 11.10.

Lee Neely
Lee Neely

2023-08-03

Google Threat Horizons Report August 2023

Google has published its August 2023 Treat Horizons report, which “provides decision-makers with strategic intelligence about threats to cloud enterprise users, along with cloud-specific research … [and] delivers recommendations from Google’s intelligence and security teams.” Among the report’s findings: 60 percent of the cloud compromise factors in Q1 2023 as observed by Google Cloud’s incident response teams involved credentials issues. The report also notes that threat actors are using a technique called versioning to bypass the Google Play Store’s malware detection.


2023-08-03

Citrix Servers Compromised

According to the most recent data from the Shadowserver Foundation, more than 500 Citrix Netscaler ADC and Gateway servers have been compromised via a critical unauthenticated remote code execution vulnerability (CVE-2023-3519). Citrix released fixes for the vulnerability in mid-July.


2023-08-03

Serco Discloses MOVEit-Related Data Breach

US government contractor Serco, Inc. has disclosed that a third-party vendor’s MOVEit managed file transfer server was breached and data were stolen. The incident affects more than 10,000 people. The data were taken from the MOVEit server of CBIZ, Serco’s benefits administration provider. Serco was made aware of the incident on June 30, 2023.


2023-08-02

Mozilla Releases Updates for Firefox and Thunderbird

Mozilla has released updates for Firefox and Thunderbird to address a total of 14 security issues. Users are encouraged to update to Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 or newer.


2023-08-03

Hawaiian Observatory Suspends Operations After Cyberattack

A US national astronomical observatory in Hawaii has suspended operations following a cyberattack. The National Science Foundation’s National Optical-Infrared Astronomy Research Laboratory (NOIRLab) on Mauna Kea on Hawaii’s big island says that while the NOIRLab website is online, they have shut down the Gemini Observatory computer systems. Both the Gemini North telescope in Hawaii and the Gemini South telescope in Chile will be closed while the incident is investigated.

Internet Storm Center Tech Corner

DNS Over HTTPS Summary

https://isc.sans.edu/diary/Summary+of+DNS+over+HTTPS+requests+against+our+honeypots/30084

Zeek and Defender Endpoint

https://isc.sans.edu/diary/Zeek+and+Defender+Endpoint/30088

From small LNK to large malicious BAT file with zero VT score

https://isc.sans.edu/diary/From+small+LNK+to+large+malicious+BAT+file+with+zero+VT+score/30094

Social Engineering via Microsoft Teams

https://www.microsoft.com/en-us/security/blog/2023/08/02/midnight-blizzard-conducts-targeted-social-engineering-over-microsoft-teams/

Automating the Search for LOLBAS

https://pentera.io/resources/whitepapers/the-lolbas-odyssey-finding-new-lolbas-and-how-you-can-too/

Sneaky Versioning Used to Bypass Scanners

https://thehackernews.com/2023/08/malicious-apps-use-sneaky-versioning.html

Aruba Patches

https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-010.txt

Mitel Patches

https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0008

New Ivanti MobileIron Core Vulnerability

https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older?language=en_US

Salesforce Phishing

https://labs.guard.io/phishforce-vulnerability-uncovered-in-salesforces-email-services-exploited-for-phishing-32024ad4b5fa

Abusing the Amazon Web Services SSM Agent as a Remote Access Trojan

https://www.mitiga.io/blog/abusing-the-amazon-web-services-ssm-agent-as-a-remote-access-trojan

Malware Infects Airgapped Networks

https://usa.kaspersky.com/about/press-releases/2023_kaspersky-uncovers-malware-for-targeted-data-exfiltration-from-air-gapped-environments

Google Deleting Inactive Accounts

https://support.google.com/accounts/answer/12418290

Google AMP Service Used for Phishing

https://cofense.com/blog/google-amp-the-newest-of-evasive-phishing-tactic/