Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x

Vulnerabilities

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hello all,

What are the pros and cons for enabling mixed content?
If we enable that, Does that impact anything.
Are there any vulnerabilities?

Thanks
0
Put Machine Learning to Work--Protect Your Clients
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Subject of the week | Considering the recent Equifax breach, what are your top personal security tips?

Use different passwords for different sites! If someone gets a hold of your email/password combination, they'll just try it on every site. So a single breach can turn into a bunch of compromised accounts.
2
Hi,
I'm in the process of setting up SSO for users so we can control our internet access. We only want domain users to access internet and none domain users such (visitors) need to be blocked.

I have read a couple of articles but am still a little unsure which method to use, so here I am asking experts for guidance. I would also appreciate if someone can write step-by-step setup guide or an article that I can follow with some screen prints?

Please also point out any "gotcha"

This article says that "Event Log Monitor” has to be installed on all domain controllers, but later its talks about pushing out SSO client to machines which is also used for authentication, so am a bit confused if this is needed or not? Please clarify
http://www.skype4badmin.com/watchguard-sso-part-1/


and then this video also talks about "Exchange Monitor" for authentication.. do I need all of these options or will one suffice?
https://www.youtube.com/watch?v=qw8e85hXVcg

much appreciated!

Thanks
0
My colleague has managed to configure one of the PC as Super-Agent ie
other PCs could get the McaFee AV signature updates from it or

Q1:
is this a 'push' update ie from Super Agent, it pushes to the slave PCs
or it's a pull ie Slave PCs pull signature updates from it?

Q2:
How do we configure the slave PC portion (screen by screen will be good)?
0
CyberNewsRundown.jpg
Cyber News Rundown: Edition 9/15/17

German Voting Software Raises Concerns

With German elections only a couple weeks away, researchers have been working to determine how secure the voting systems really are. Per a recent study, the software being used contains multiple vulnerabilities that could lead to devastating results if the election is compromised. Meanwhile, the software creator maintains there is nothing wrong with the system and any tampering would only lead to confusion, rather than truly affecting the vote’s outcome.

Upgraded Android OS Slows Tide of Overlay Attacks

While overlay attacks are nothing new to Android™ users, the Toast window is a surprisingly fresh take on this technique. Google has already patched the issue being exploited, but many users unintentionally fell victim and gave permissions to a malicious app using the Toast window overlay on a legitimate page to spoof the users input. This type of attack can range from simply installing an annoying piece of malware on the device, all the way up to locking the device down and demanding a ransom.
1
Hi,

Can anyone please tell me step by step how to stop a Watchguard XTM25 from blocking downloads of EXE files from a server hosted website (so need to add an exception as an IP address) .

Many thanks

Adam
0
I need to look at a website. It is not a pentest itself. Just a vulnerability scan. What tools could I use to generate a complete report?
I also need to generate a less technical report.
0
Gain valuable virtualization processes skills that allow you the ability to store data, prevent vulnerabilities, and replicate environments for fast deployment. Enroll in September’s Course of the Month today!
0
Need more best practices & governance on mobile codes (eg: Flash player,
Pdf reader, JavaScript, Java Applets, ActiveX) as we have a few cases of
malicious codes being run when opening Pdf & 1 case of ransomware:

a) attachmt 1 is a screen of IE setting: mostly what to set in IE to stop ActiveX
    & to set to  Med-High (guess this is also to mitigate against ActiveX ?)

b) I wud say patch the various Adobe products (we use Adobe Flash &
     Shockwave) within 1 week upon release of patches ?

c) attachmt 2 has some suggestions on ActiveX & Java only: not much

d) Does AV mitigate against mobile codes vulnerabilities?  If so, keep
    AV signatures updated   is another mitigation

e) I'm sure IPS (NIDS & HIPS) have signatures for mobile codes but in
    McAfee's case, by default, they are rolled out in Detect & not Block
    mode?  Should they be in Block mode?

f) any other best practices & governances for mobile code?
IEmedhigh_ActiveXctrls.jpg
SANS_malicious-mobile-code-security-.pdf
0
Hey Experts,

We are looking at Qualys as an external (for now) and internal (in the future) vulnerability scanner.  I have used Qualys in the past and have overall been pretty happy with the results.

In order to do some due diligence however, I wanted to take a look at their competitors just to see what else is out there.  Price is not a driving factor here.  I just want to make sure we get the best solution moving forward.

Has anyone used and can recommend any other vendors?

Thanks
0
Concerto's Cloud Advisory Services
LVL 4
Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

https://www.bleepingcomputer.com/news/security/apple-releases-critical-security-updates-for-ios-macos-and-other-core-products/

Referring to above link, does it mean iOS prior to Ver 10.2.1 is not affected or versions after 10.2.1 is affected?

Last query:
does Apple releases vulnerabilities quarterly, 6-monthly or yearly & where can we find this information?
0
Can a Realistic High Power Video audio tape eraser zap or at least corrupt  a hard drive and a backup tape?
0
Referring to above Struts vulnerability, would an encrypted DB have helped
prevent this data leak/loss?  

Does this Equifax & AXA dl come about by issuing an sql command?

There could be other unknown vulnerabilities yet to be discovered so
wud DB encryption had helped?
0
I know very little about watchguards (or really most complex firewalls).  I have 2 watchguards in location A and location B.  looking at the policies on the main office's watchguard, I have 16 rules.  wonder which are needed?  

This is an XTM21 (old unit, right?)

it takes a few seconds to go from screen to screen / get the list of firewall policies, etc. 'retrieving data' on screen for 9 seconds... there's 16 policies in the list.  Is that a long time for pages to load?

a) do you just replace watchguards after x years because they are old?
b) do you reboot them on a schedule? How often? every week? month? year?

This watchguard is set up for:Exchange on the SBS server on the LAN, General surfing from inside the office, VPN to the other location and phones being able to connect to the exchange server from outside.

How many rules should those take?

Looking at the policies, I think this is what are set up. I inherited this network so may be unneeded / defaults that came with the box?
FTP OUTboundSMTP (192.168.2.3 to Any external)
GeneralProxy (From HTTP-proxy to ANY  Trusted)
SMTPtoMailSrv (From ANY to 75.127.x.x->192.168.2.3)
HTTPtoMAILSrv (From ANY to 75.127.x.x->192.168.2.3)
POP3toMailsrv (From ANY to 75.127.x.x->192.168.2.3)
IMAPtoMailsrv (From ANY to 75.127.x.x->192.168.2.3)
HTTPStoMailsrv (From ANY to 75.127.x.x->192.168.2.3)
RDPtoMAILsrv (From ANY to 75.127.x.x->192.168.2.3)
Voicecom mail system (From ANY to 75.127.x.x->192.168.2.3)
Watchguard …
0
Hi
I have to enable TLS 1.0, 1.1 and 1.2 in Internet Explorer on my laptop before a VPN can connect? how can I change this settings so I don't have to enable these in IE?

Thanks
0
Hi,

What firewall equipment is recommended for a small of 1 server (rackmount) with  15 windows 10 pro workstation?

Also what antivirus-spam-ransomware software best fit this type of scenario?
0
Hello,

I am looking for a patch management solution that has the following features:

1. Works with Windows Operating systems
2. Works with Linux operating Systems (e.g. UBUNTU, CentOS)
3. Works with 3rd party applications (a good example would be JAVA)
4. Works in the cloud
5. Preferably Agentless
6. Can detect new nodes that are added (on the fly) to the network infrastructure and patch as necessary (according to patch management rules configured)

Any suggestions would be greatly appreciated
0
Can anyone help trace MS KB for the above n it's patch
0
In Bluecoat proxy, there's about 38 categories that it blocks:
1.      Adult/Mature Content
2.      Chat (IM)/SMS
3.      Child Pornography
4.      Controlled Substances
5.      Dynamic DNS Host  
6.      Email
7.      Entertainment
8.      Extreme
9.      File Storage/Sharing    
10.      Gambling
11.      Games    
12.      Hacking    
13.      Internet Telephony    
14.      Malicious Outbound Data/Botnets
15.      Malicious Sources/Malnets
16.      Marijuana
17.      Media Sharing    
18.      Nudity
19.      Peer-to-Peer (P2P)
20.      Personal Sites
21.      Personals/Dating
22.      Phishing
23.      Piracy/Copyright Concerns
24.      Placeholders    
25.      Pornography
26.      Potentially Unwanted Software
27.      Proxy Avoidance    
28.      Remote Access Tools    
29.      Scam/Questionable/Illegal
30.      Sexual Expression  
31.      Social Networking    
32.      Software Downloads
33.      Spam
34.      Suspicious    
35.      Tobacco    
36.      Violence/Hate/Racism
37.      Weapons    
38.      Web Hosting


a) does Steganography come under any of the categories?
b) if not, can we request Bluecoat to add one or to park it under
     one of the above categories?
c) what's the industry practice to handle it?  Block it at email filtering
    device, Network IPS, proxy or ??   Googling around, shows "Traffic
    Warden" is used but if we don't want to invest in it, what can be done?
0
On Demand Webinar: Networking for the Cloud Era
LVL 10
On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Capture.JPG
Cyber News Rundown: Edition 8/25/17

The Cyber News Rundown brings you the latest happenings in cyber news weekly.
If you have any other questions, just ask!





UK NHS Database Exposes Over 1 Million Patient Records
During the past week, a breach was discovered in patient booking system SwiftQueue, which is widely used by several National Health Service (NHS) facilities. The database may have contained patient information for up to 1.2 million UK citizens, though the actual data has yet to be fully examined. Even worse, attackers now claim they have found additional SwiftQueue vulnerabilities and are in possession of all 11 million records stored by the company.

Booking Provider’s Data Found in Public Data Dump
Researchers recently discovered a large customer data dump in a publicly-facing Amazon S3 bucket. The data in question belongs to Groupize, a groups and meetings solution, and contains everything from customer interactions to full credit card information used to book hotels and other meeting spaces. Fortunately for anyone who has used the service, the data was properly secured within a week of the discovery.

Phishing Site Hosted on .fish Domain
1
We have a P4515 that is showing the vulnerability below. I could not find anything related online. Any help would be great.

HP printer
Description      Integer based SQL injection vulnerability in enableAS parameter to /hp/device/this.LCDispatcher?nav=hp.AutoSend
Confirmed      Yes
Severity Level      Critical
Severity      user file read access
Tutorial      SQL injection
Service      443:TCP
Technical Details      Normal Request:
POST /hp/device/this.LCDispatcher?nav=hp.AutoSend HTTP/1.0
Host: 10.91.2.62
User-Agent: Mozilla/5.0
Content-length: 447
Content-Type: application/x-www-form-urlencoded
Connection: Keep-Alive
Cookie: MFPSESSIONID=010044D3A0E5EAC6706FBFCDE3B6884CAD189BF8917D1CD7FFA22017072703064703C1
bar=yes,location=
0
Look out for this patch and be diligent in implementing it to the machine. Here is one vulnerability (CVE-2017-8620) that has high potential to be of parallel to the WannaCry and NotPetya vulnerabilities -- it is described as 'The Next WannaCry Vulnerability'. Finally, if patching is planned but delayed, Microsoft's recommended temporary mitigation against CVE-2017-8620 should be deployed: disable the WSearch facility within Windows.

http://www.securityweek.com/patching-against-next-wannacry-vulnerability-cve-2017-8620
2
 
LVL 8

Expert Comment

by:Senior IT System Engineer
So is this already distributed in the Windows update this month or not yet ?
0
 
LVL 64

Author Comment

by:btan
Yes I was released already.
0
We had to eliminate some vulnerabilities by disabling TLS 1.0. Ever since this happened RDP does not work when the clients try to RDP into the servers. I found KB3080079 for windows 7 and that worked okay but i cannot find the patch for windows 10. I would prefer not to change the RDP setting on the server if that is possible.

Thanks
0
We have an Idrac that is vulnerable to this. Have any of you guys updated to the latest FW and resolve this?
0
Are there any tutorials on removing the IP disclosure vulnerability from Server 2012?
0

Vulnerabilities

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.