Vulnerabilities

6K

Solutions

8K

Contributors

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.

Share tech news, updates, or what's on your mind.

Sign up to Post

We've just installed a new next-gen firewall and I need some assistance getting some communication between two of the interfaces.
It's a Watchguard T35 and we have our WAN on Eth0, LAN1 on Eth1, and LAN2 on Eth2.
Our WAN has a static IP, but we have /27 block of public IP's routed (at the ISP level) to our WAN for use by public facing servers.

I have that part of it working OK.  Servers connected to the LAN2 all have their static IP assignment and IP checks on the internet show the correct IPs.  This interface in the Watchguard is set as "Optional".

LAN1, is our private LAN and is set as "Trust".  Internet traffic and NAT/port forwarding is all working OK, but I cannot seem to get access to LAN2 from LAN1 devices.

I've created a firewall policy with "ANY" for the packet filtering and have set both 192.168.1.0/24 and 203.xx.xx.0/27 in both the To and From boxes.  The rule is set to allow and enabled.
But I cannot browse (using the IP or UNC name) or access any of the LAN2 resources from LAN1.  Nor can LAN2 access any of the LAN1 resources.

I'm new to Watchguard and thought I might ask here for any things I may have overlooked before lodging a support ticket with Watchguard support.
0
Become a CompTIA Certified Healthcare IT Tech
LVL 12
Become a CompTIA Certified Healthcare IT Tech

This course will help prep you to earn the CompTIA Healthcare IT Technician certification showing that you have the knowledge and skills needed to succeed in installing, managing, and troubleshooting IT systems in medical and clinical settings.

I am installing WatchGuard SSL Vpn software which is using Open VPN software and it has TAP network driver but I can't install it unattended. Does anybody know how to install OpenVPN un-attended including TAP-Windows adapter?
0
I have a watchguard M270, the customer has a hosted server they connect to via ipsec. What policy could I enable to allow the ipsec vpn outbound.
0
Our security team  ran an external VM scan on DMZ and had some vulnerabilities.

i have 1 question:

SSL/TLS server supports TLSv1.0  vulnerability ( 38628) does not provide much info for windows server 2008 (R2) servers.
we looked at this article .  https://blog.qualys.com/ssllabs/2014/12/08/poodle-bites-tls

we are not sure if this is a legitimate vulnerability or false positive.

solution is to opnessl but we do not have it installed.

could you please let me know with some more information to see if this protocol (TLSv1.0) needs to be disabled or we can disregard.

there is 1 article i searched - https://blogs.msdn.microsoft.com/friis/2016/0725/disabling-tls-1-0-on-your-windows-2008-r2-server-just-because-you-still-have-one

above links list instructions to disable 1.0 and enable 1.1 and 1.2

i need to compile the list , can you provide any thoughts of the top  link above, how should i make changes ??
0
I need to use Nexpose for scanning and we have a base license.  I sent a couple of emails to the company for assistance, but no response since last week.  Anyone familiar with this product that can assist?  I'm trying to scan our DMZ network for potential issues.

This will be an internal scan of the DMZ.
0
Hi Experts.

I'm setting up iptables for a system so I want to ask if there is any rule/module that can prevent SQL Injection on iptables.

Thanks for reading this.
0
I need to tool like threadfix to tracking vulnerability in complex environments
0
Dear Experts

We have hosted web based application which runs on linux, apache, mysql and php. data security is top most priority, we have installed ssl certificate and also deployed two factor authentication, when used the online ssl checker by going to https://ssltools.digicert.com/checker/views/checkInstallation.jsp  after the scan following shows up

1. Vulnerabilities checked
Heartbleed, Poodle (TLS), Poodle (SSLv3), FREAK, BEAST, CRIME, DROWN
Non-critical issues found
BEAST
Not mitigated server-side BEAST.

2. Secure Renegotiation: Enabled
Downgrade attack prevention:Enabled
Next Protocol Negotiation: Not Enabled
Session resumption (caching): Enabled
Session resumption (tickets): Enabled
Strict Transport Security (HSTS):Not Enabled
SSL/TLS compression:Not Enabled
Heartbeat (extension):Enabled
RC4:Not Enabled
OCSP stapling:Not Enabled

---------
Please help me to understand on above 1 and 2  and let me know the steps correct as per the best practice. thank you.
0
What is the easiest and most effective way to get rid of the Trojan.JS.Dropper.E?
1
Vulnerabilities, POODLE & SMB

Had a pen test done which highlighted issues with the above.

Looked at: https://www.troyhunt.com/everything-you-need-to-know-about/ & https://www.7elements.co.uk/resources/guidance/securing-server-message-block-smb-null-session-enumeration/

Unsure if realistically need sorting or not.

Thanks
0
Do You Have a Trusted Wireless Environment?
Do You Have a Trusted Wireless Environment?

A Trusted Wireless Environment is a framework for building a complete Wi-Fi network that is fast, easy to manage, and secure.

I have a user who is using the Watchguard VPN client software. They have been using it on Windows 10 Pro (v 1709) for 6 months without issue. The UAC prompt suddenly started appearing this morning when they try to run the software. No updates for Windows or the software have been installed. I have 60 other users that are using it without this problem also. I am at a loss as to why this would suddenly start needing elevated privileges to run. Does anyone know why this would happen or how to fix it? I am not going to disable user account control or give them admin rights.
0
Q1:
What's the criteria / justifications for installing a WAF?
We were asked why there's a need & justify.

Q2:
So if we have a web server that is served to the public/Internet,
that's when we need one or even if there's applications server
such as java app servers (eg: Weblogic, Glassfish, JBoss), it's
applicable as well?

Q3:
Or as long as there's "Web application servers", WAF is
applicable & what's a "Web application servers"

Q4:
It's basically to circumvent applications vulnerabilities (eg: those
listed by OWASP)?  

Q5:
If applications are already coded strictly according to Secure
Coding (XSS, injection, CSRF, inputs validation, ...), do we still
need a WAF?  I've heard WAF protects against DDoS as well
but the ISP we hosted our web services already offerred
DDoS protection
0
Trade off - web cache poisoning
Web cache has been one of the performance options but though it serves well in enhancing the user experience, it can also inadvertently act as a point for attacks if it is not secured to reduce the exposure. Read on to find out the hidden threats in web cache.
2
LVL 20

Expert Comment

by:Andrew Leniart
Comment Utility
Bernard, this is excellent information written in a way that even a layman to the topic has a chance to understand. Please keep them coming.

Endorsed!
1
Laptop was stolen from Starbucks.  Is there a way to track the whereabouts of the laptop?  It's not an apple machine.
0
https://www.cscollege.gov.sg/programmes/Pages/Display%20Programme.aspx?ePID=pe8r29gaqc5voaoitct59bdi3m

Referring to the above, I've been googling for IM8 (Instruction Manual 8 for ICT)
to download but can't locate one.  Anyone knows where to download a copy
without attending the training?  A slightly outdated (say 2 yr old) copy is fine.
0
I need some documentation on the SANS 20.  Preferably something that is not too long, but gets to the point.
0
The NEO Coolcam's webcam bypasses the login and multiple remote code execution vulnerabilities bases on stack overflow and data analysis report.
0
Last night in a meeting we were informed that wp2 is no longer secure that a new method for   vracking WPA/WPA2 Passwords on 802.11 networks has been recently discovered.  

Any EE aware of this? How can we protect our WiFi routers against this new threat?
1
Can someone please share the process for downloading and upgrading IOS on Cisco devices.  Is there a video I can refer to or documentation?
0
Challenges in Government Cyber Security
Challenges in Government Cyber Security

Has cyber security been a challenge in your government organization? Are you looking to improve your government's network security? Learn more about how to improve your government organization's security by viewing our on-demand webinar!

Is there a checklist for CEH for our environment.  At my company, we're trying to have a base knowledge for preventing hackers and such, but we need a checklist to go through.  Lastly, I keep receiving a form of social engineering by receiving phone calls and having the user provide remote asses to machines or asking security related questions to our users.  How do we prevent this from occurring?
0
Dear EE,

Some thing very strange happens.
One of our client reported vulnerabilities of office as below.

•             Microsoft Office and Microsoft Office Services and Web Apps Security Update June 2018
•             Microsoft Office and Microsoft Office Services and Web Apps Security Update May 2018

We scan our servers (after installing same MS Office version) only match MS OFFICE, through NESSUS tool and we did not found any above vulnerability.

Can you please help us to confirm HOW can we reproduce above two vulnerabilities.

Thanks.
0
I had this question after viewing Watchguard Firewall xFlow Configuration.
0
A hacker penetrated my cPanel and modified files and code on my site.
 
I have a log report from hosting service provider. It goes like this:
 
.....frontend/paper_lantern/filemanager/upload-ajax.html?file=megla.txt&fileop=&dir=%2Fhome%2Fmyaccount%2Fmydomain.com&dirop=&charset=&file_charset=&baseurl=&basedir=" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.59 Safari/537.36" "s" "-" 2083
 
(I replaced only the account name and site name with generic ones)
 
My cPanel password is very strong (100%), it's long and beside letters and numbers it contains special many characters; I've changed it a few times. It is not possible that one can hack it easily.
 
It already happened 3 times and each time the system suspends my account automatically for a number of hours, before it's restored by the support staff.
 
I suspect that the attack is done by a former developer who I know was a hacker and we didn't part on exactly friendly terms. He knows the structure of my site and I have a static IP which he also knows.
 
If possible, I would like to know some details about how to protect my site from further similar hacking, penetrations, injections, etc.
 
Thanks.
0
https://www.straitstimes.com/singapore/method-of-attack-showed-high-level-of-sophistication

Refer to above Singhealth data breach incident.

Q1:
What mitigations could have been put in place to prevent / mitigate it in the 1st place?

Q2:
Will Database Activity Monitoring (eg: Imperva with its granular ACL) help or Privilege
Access Management besides dedicating/isolating PCs for general purpose/servers access?

Assume they're running MS SQL on Windows servers
0
Q1:
I recalled Cyberark ever presented a product that  could alert when sysadmins run or access a privileged (or one that we can programme to be alerted) tool or activity : what's the name of this product?

Q2:
Does this product make use of PSM video recording of the sysadmin's session access & perform OCR on the video (to get the text)?

Q3:
Can latest version of Cyberark DNA scan for Cisco network devices privileged accounts?
0

Vulnerabilities

6K

Solutions

8K

Contributors

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.