SANS NewsBites

Fluent Bit Puts Cloud at Risk; SEC Breach Reporting Update; Unpatchable D-Link Flaws Exploited

May 21, 2024  |  Volume XXVI - Issue #40

Top of the News


2024-05-20

Fluent Bit Vulnerability

A memory corruption vulnerability in the Fluent Bit logging utility could be exploited to create denial-of-service conditions, allow information disclosure, and possibly allow remote code execution according to a report from Tenable. Fluent Bity has been downloaded billions of times. The vulnerability affects versions 2.0.7 through 3.0.3, and has been fixed in Fluent Bit version 3.0.4.

Editor's Note

Ask any cloud service providers in use if they use Fluent Bit and are they on the latest version and if they can assure you that use of an older version did not lead to compromise.

John Pescatore
John Pescatore

If you're using Fluent Bit, make sure you've updated to 3.0.4. The harder question will be asking your cloud providers if they are and which version is in place. If you're referencing a provided SBOM, make sure that it is both current and that you're checking the Vulnerability-Exploitability eXchange (VEX) data for applicability of vulnerabilities.

Lee Neely
Lee Neely

This goes back to things like SBOM and Cloud Providers. If your cloud provider is using this and patches it, you will never technically know about it unless you have these libraries exposed to you. Then again, how do you know they fully patched it?

Moses Frost
Moses Frost

2024-05-20

SEC's Financial Institution Breach Reporting Regulation Amendment

On May 15, 2024, the US Securities and Exchange Commission (SEC) has adopted changes to their Regulation S-P, which requires financial organizations to adopt written policies and procedures that address administrative, technical, and physical safeguards for the protection of customer records and information. The amendments require certain financial institutions to report breaches within 30 days of detection.

Editor's Note

Expeditious reporting may not be on your radar when you're focused on detection and reducing dwell times. Make sure that you're partnering with folks like your CFO who are tracking SEC requirements so you can work together to meet them.

Lee Neely
Lee Neely

2024-05-19

CISA Adds D-Link Flaws to Known Exploited Vulnerabilities CatalogCISA Adds D-Link Flaws to Known Exploited Vulnerabilities Catalog

The US Cybersecurity and Infrastructure Security Agency (CISA) has added a pair of vulnerabilities affecting end-of-life D-Link routers to their Known Exploited Vulnerabilities (KEV) catalog. One of the flaws (CVE-2014-100005) is a cross-site request forgery issue affecting D-Link DIR-600 routers; the other (CVE-2021-40655) in an information disclosure issue affecting D-Link DIR-605 routers. The vulnerabilities have been exploited in the wild. CISA advises that the vulnerable equipment be retired or replaced.

Editor's Note

There is no patch for these vulnerabilities. Yet another reminder to track the "End of Life" of devices. Some recent approaches to "device safety" labeling to consider adding an expiration date to indicate how long a particular device will be supported. Most consumers will likely be surprised how short this time is, and maybe some expired devices are still rotting on store shelves waiting to be sold to unsuspecting consumers.

Johannes Ullrich
Johannes Ullrich

At the user level, the solution to this problem is simply to replace the device. The improvement in performance and function will more than likely cover the cost of the upgrade; risk reduction will come as lagniappe. At the community level, many, not to say most, of these devices will never be replaced and may be co-opted into bot-nets. We should consider legislation that would allow ISPs to coerce their customers to upgrade.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2024-05-20

Foxit PDF Design Flaw Can be Exploited to Deliver Malware

Researchers at Check Point have detected a design flaw in the Foxit PDF Reader that can be exploited to deliver malware. The flaw is being actively exploited by multiple threat actors to deliver a range of malware including Agent Tesla, AsyncRAT, DCRat, and XWorm. The issue does not affect Adobe Acrobat Reader.

Editor's Note

A lot of attention has been paid to flaws in Adobe's PDF products like Acrobat. However, Foxit's solutions had very similar flaws, and they are exploited just like the bigger competitor's flaws.

Johannes Ullrich
Johannes Ullrich

Foxit positions themselves as more affordable drop-in replacement for Acrobat. This attack relies on social engineering, prompting the user to enable/allow behavior which may seem innocuous, but in totality allows for the malware to be installed and executed. The root cause is in how Foxit is designed rather than a coding error. Even so, educating users on how to handle the unexpected prompts for privilege or command execution, similar to your existing social engineering preventative training, are your current best mitigations.

Lee Neely
Lee Neely

The 2024 Verizon Data Breach Investigations Report highlighted that over two-thirds of breaches analyzed included a non-malicious human element. This vulnerability does just that: it takes advantage of human nature to routinely accept the default option for pop-up windows. Take a moment to think before clicking.

Curtis Dukes
Curtis Dukes

2024-05-20

EPA Enforcement Alert for Community Water Systems

A US Environmental Protection Agency (EPA) Enforcement Alert provides information for community water systems (CWSs) to help them comply with Safe Drinking Water Act (SDWA) Section 1433, which requires most CWSs to conduct Risk and Resilience Assessments (RRAs), develop Emergency Response Plans (ERPs) and certify their completion to EPA. According to the Enforcement Alert, 70 percent of CWSs EPA has inspected since September 2023 did not meet all of the SDWA Section 1433 requirements.

Editor's Note

In my experience, community water systems are often small, running on systems which are enough to get the job done, and don't have the resources for in-depth security assessments. While the 1433 section only applies to systems with over 3300 users, it's still a good idea to have your arms around where your risks are and what you can do to keep from being a victim. Regardless of size, leverage the Water ISAC resources below. Membership is based on customer base, starting at $105/year, and even has a 60-day trial so you can see if it is a fit. Given that critical infrastructure like this is a constant target, opting out or ignoring your security posture really isn't an option.

Lee Neely
Lee Neely

The alert highlights two things that make it difficult for communities to comply: 1) lack of technical skills to conduct the cyber portion of the RRA; and 2) resources to implement the findings from the cybersecurity assessment. Both are solvable but require funds at the federal level and likely technical support at the state or local level.

Curtis Dukes
Curtis Dukes

While many of these systems use the some of the same software and share any vulnerability, unlike the power grid, one cannot be used as an attack vector against others. While any compromise will be serious, consequences will remain local.

William Hugh Murray
William Hugh Murray

2024-05-18

MediSecure Discloses Ransomware Attack

Australian digital prescription services company MediSecure has disclosed a ransomware attack that compromised patient data through November 2023. Once MediSecure became aware of the incident, they took their website offline. The incident appears to have originated through a third-party vendor. MediSecure was one of two companies that provided digital prescription services through Australia's public digital health network until last November.

Editor's Note

Of note here is that MediSecure's contract with Australia's health network was awarded to another provider last May, and the transition completed in November. It appears customer data was still available in their systems. The call to action is to review how your data is protected when services are transitioned to a new provider, what is their disposition process, to include any third party services they leverage. All that should be in writing and validated on a regular basis.

Lee Neely
Lee Neely

This one is a good reminder to have information removal/deletion/transfer clauses in all subcontractor/service provider contacts so that sensitive information is not stored at losing incumbent vendors any longer than necessary to support full turnover to new service providers.

John Pescatore
John Pescatore

Although specifics on the attack are not available, it does reinforce the need for regular risk reviews of third-party vendors. Often there is reliance on a vendorÕs cybersecurity process and that must be taken into consideration as part of your information security program. Use this attack as an opportunity to revisit and update your third-party risk management program.

Curtis Dukes
Curtis Dukes

2024-05-20

WebTPA Breach Affects More than 2.4 Million People

Texas-based WebTPA Employer Services says that a cybersecurity incident has compromised personal information of more than 2.4 million individuals. WebTPA is a third-party administrator for health insurance and benefits plans. WebTPA discovered the incident in late December. The compromised data include contact information, dates of birth, insurance information and Social Security numbers.

Editor's Note

The investigation showed the data was exfiltrated in April 2023, but the attack was not discovered until December, and customer notifications just started this April. While healthcare breaches continue to be a challenge, indications are that there will be numerous lawsuits designed to force the industry to raise the bar on protecting healthcare data. Don't wait for the lawsuit to make sure your house is in order, leverage your ISAC or CISA resources to make sure that you're on top of things, don't wait for that demand to report to the board or comment to the media on your incident.

Lee Neely
Lee Neely

2024-05-19

American Radio Relay League Suffers Cyberattack

The American Radio Relay League (ARRL) has disclosed a cybersecurity incident that affected some of their services, including the Logbook of The World¨ and the ARRL Learning Center. (ARRL is the National Association for Amateur Radio.) The organization does not store payment card information and does not collect Social Security numbers. Their membership database contains publicly available information, including names, addresses, call signs, and email preferences.

Editor's Note

As a ham radio operator (K3TN) this one hit home! The ARRL hasn't put out much information, but many systems remain unavailable a full week after the incident. This will be a good case study for the IT and IT security problems small/medium-sized non-profit organizations face with small IT staffs. Pressures to meet demands for new services often consume staff and budget that are needed to assure reliability and security (today's buzzword is 'resiliency') of existing crown jewel services. Another common problem: CEOs and Boards need to have it driven home that security through obscurity ('Who would attack us??') doesn't exist on the internet any more than it exists in Tornado Alley.

John Pescatore
John Pescatore

ARRL is saying they don't believe the member database is affected. And while the information is public, much is available from the FCC, that database represents an authoritative connection of that information to the member. If you're an ARRL member, be on the watch for phishing emails leveraging your information.

Lee Neely
Lee Neely

The ARRL is the communication system of last resort in the event of a "Black Sky" event and may be required to coordinate a cold start of the grid. However, it is highly resilient, and this application is not a single point of failure.

William Hugh Murray
William Hugh Murray

2024-05-17

Pew Research: Digital Decay

According to a report from the Pew Research Center, 25 percent of web pages that existed between 2013 and 2023 were not accessible as of October 2023. Most of the instances of what Pew researchers are calling digital decay, are due to pages being removed from websites that are still functioning. The study looked at government and news websites and social media posts. Local government websites had the highest incidence of broken links.

Editor's Note

This is an interesting observation. If you own a site, you control the lifecycle and have the say on what is left vs archived/deleted. The question is what is the obligation to sites referencing that content? How far should sites go to maintain continuity/pointers to the most current versions? This is something you should discuss and document at your shop. Having a consistent approach which is written down is more important than the decision you make. Give consideration to publishing that on your site.

Lee Neely
Lee Neely

Do we need to archive the internet? If so, who is doing it, and how is that being funded? For those that have never investigated this, there are groups out there backing up and archiving pages on the internet and large data sources and some of them have funding, but many don't. Is it digital decay or totally lost knowledge pools? I would argue that this type of Internet historian, librarian, archivist, or even archeologist may be a job title over our lifetime. Probably dedicated to preserving pages although that webpage that was created using GeoCities with the big warning sign may be the target. Or maybe it is.

Moses Frost
Moses Frost

Internet Storm Center Tech Corner

Another PDF Streams Example: Extracting JPEGs

https://isc.sans.edu/diary/Another+PDF+Streams+Example+Extracting+JPEGs/30924

Analyzing MSG Files

https://isc.sans.edu/diary/Analyzing+MSG+Files/30940

Linguistic Lumberjack: Fluent Bit Vulnerability CVE-2024-4323

https://www.tenable.com/blog/linguistic-lumberjack-attacking-cloud-services-via-logging-endpoints-fluent-bit-cve-2024-4323

Fortinet FortiSIEM Command Injection Deep-Dive CVE-2023-23992

https://www.horizon3.ai/attack-research/cve-2023-34992-fortinet-fortisiem-command-injection-deep-dive/

Git Vulnerability CVE-2024-32002 PoC

https://amalmurali.me/posts/git-rce/

Google Chrome CVE-2024-4947 PoC

https://buptsb.github.io/blog/post/CVE-2024-4947-%20v8%20incorrect%20AccessInfo%20for%20module%20namespace%20object%20causes%20Maglev%20type%20confusion.html

QNAP QTS QNAPping At the Wheel

https://labs.watchtowr.com/qnap-qts-qnapping-at-the-wheel-cve-2024-27130-and-friends/

May 2024 Security Update Problems with Windows 2019

https://learn.microsoft.com/en-us/windows/release-health/status-windows-10-1809-and-windows-server-2019#3299msgdesc

D-Link Vulnerabilities Exploited

https://www.cisa.gov/news-events/alerts/2024/05/16/cisa-adds-three-known-exploited-vulnerabilities-catalog

Ivanti PoC Exploit CVE 2024-22026

https://www.redlinecybersecurity.com/blog/exploiting-cve-2024-22026-rooting-ivanti-epmm-mobileiron-core