Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

NSA: Russian Hackers Exploiting VPN Vulnerabilities – Patch Immediately

The U.S. government on Thursday warned that Russian APT operators are exploiting five known — and already patched — vulnerabilities in corporate VPN infrastructure products, insisting it is “critically important” to mitigate these issues immediately.

The U.S. government on Thursday warned that Russian APT operators are exploiting five known — and already patched — vulnerabilities in corporate VPN infrastructure products, insisting it is “critically important” to mitigate these issues immediately.

The urgent advisory was issued by the National Security Agency (NSA) to call attention to a quintet of CVEs that are being actively exploited by a threat actor affiliated with Russia’s foreign intelligence service (SVR).

According to the NSA, the five vulnerabilities should be prioritized for patching alongside the newest batch of Exchange Server updates released by Microsoft earlier this week.

Here are the five vulnerabilities that need immediate attention:

CVE-2018-13379 Fortinet FortiGate VPN 

CVE-2019-9670 Synacor Zimbra Collaboration Suite (advisory here)

CVE-2019-11510 Pulse Secure Pulse Connect Secure VPN

CVE-2019-19781 Citrix Application Delivery Controller and Gateway 

Advertisement. Scroll to continue reading.

CVE-2020-4006 VMware Workspace ONE Access

“Mitigation against these vulnerabilities is critically important as U.S. and allied networks are constantly scanned, targeted, and exploited by Russian state-sponsored cyber actors,” the NSA said.

The NSA’s decision to pinpoint the five old security flaws suggests that many organizations are slow to apply the available fixes, especially during the pandemic when work-from-home expanded the need for VPN technologies.

The advisory comes on the same day the U.S. government formally attributed the SolarWinds supply chain mega-hack to Russia’s SVP and announced expanded sanctions and the expulsion of diplomats.

“In addition to compromising the SolarWinds Orion software supply chain, recent SVR activities include targeting COVID-19 research facilities via WellMess malware and targeting networks through the VMware vulnerability disclosed by NSA,” the agency said.

The new advisory also includes additional tactics, techniques, and procedures being used by the threat actor.  

”[We] strongly encourage all cybersecurity stakeholders to check their networks for indicators of compromise related to all five vulnerabilities and the techniques detailed in the advisory and to urgently implement associated mitigations,” it added. 

In a separate but related announcement, the U.S. announced the expulsion of 10 Russian diplomats and sanctions against nearly three dozen people and companies as it moved to hold the Kremlin accountable for interference in last year’s presidential election and the hacking of federal agencies.

Related: CISA, FBI Warn of Attacks Targeting Fortinet FortiOS

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Tabitha Craig has been named the CISO of the Congressional Budget Office (CBO).

Life360 has appointed Vari Bindra, former Amazon cybersecurity lead, as Chief Information Security Officer.

Forcepoint has appointed Guy Shamilov as CISO, Bakshi Kohli as CTO and Naveen Palavalli as CPO and CMO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.