{"id":7545,"date":"2021-05-04T20:32:49","date_gmt":"2021-05-05T03:32:49","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7545"},"modified":"2023-04-05T12:40:23","modified_gmt":"2023-04-05T19:40:23","slug":"nsa-validates-securins-warning-on-two-critical-vulnerabilities-1","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/nsa-validates-securins-warning-on-two-critical-vulnerabilities-1\/","title":{"rendered":"NSA Validates Securin\u2019s Warning on Two Critical Vulnerabilities"},"content":{"rendered":"
\n

In May 2020, Securin warned the industry of two critical vulnerabilities in Pulse Secure VPN<\/a> and Citrix\u2019s Remote Desktop solution<\/a> that could be used by Ransomware or APT groups.<\/p>\n<\/blockquote>\n

The digital response to the COVID-19 crisis has also created new security vulnerabilities. Attackers seek to exploit the gaps opened when remote employees use insecure devices and networks. Threat actors are using known attack techniques to exploit vulnerabilities in remote access services and VPN technologies.<\/p>\n

Organizations are realizing they have to fundamentally change the way they work. For security and risk management leaders, this means grappling with the best course of action to understand the latest attack techniques and assessing defenses against those types of attacks is critical to improving your cybersecurity posture of large-scale modern remote access.<\/p>\n

\n

One year after our warning, NSA, FBI and CISA validated the same.<\/a><\/p>\n<\/blockquote>\n

\"\"<\/p>\n

Last year Securin analyzed 44 and 25 vulnerabilities in Pulse Secure and Citrix respectively.\u00a0 We red flagged CVE-2019-11510 and CVE-2019-19781 attack vectors that might be used by attackers to compromise corporate networks.<\/p>\n

\"\"Our analysis was validated when these vulnerabilities started trending all through 2020 and in April 2021, CISA<\/a>, FBI and other Security agencies warned users that a Pulse Secure vulnerability was used by Russian <\/a>and\u00a0 China-linked attackers<\/a> to spy on the US Defense Industry.<\/p>\n

CVE-2019-19781 – Citrix vulnerability has become a pet favorite of attackers and is now associated with 11 ransomware strains and four APT groups (APT41, Fox Kitten, APT29, and Berserk Bear). This RCE exploit allows Directory Traversal that could allow an unauthenticated attacker to perform arbitrary code execution.<\/p>\n

Despite multiple warnings and advisories from security agencies and the vendor, Shodan results show 380 (Pulse Secure) and 627 (Citrix) assets all over the world are vulnerable to these weaknesses (if they are not patched already).<\/p>\n

Pulse Secure products vulnerable to CVE-2019-11510\u00a0<\/b><\/span><\/p>\n

\"\"<\/p>\n

Citrix products vulnerable to CVE-2019-19781<\/b><\/span><\/p>\n

\u00a0\"\"<\/p>\n

These vulnerabilities have become the favorite attack vectors of malicious agents to compromise and penetrate into networks. Though our warnings have been validated by NSA and other security agencies we wish organizations had prioritized these weaknesses for patching and stayed safe from attackers.<\/p>\n

Click here to download our Cyber Risk Reports<\/p>\n

Worried about cyber attacks? Are you sure there are no gaps in your security?
\nWe can help shrink your attack surface. Talk to us!<\/p>\n","protected":false},"excerpt":{"rendered":"

In May 2020, Securin warned the industry of two critical vulnerabilities in Pulse Secure VPN and Citrix\u2019s Remote Desktop solution that could be used by Ransomware or APT groups. One year after our warning, NSA, FBI and CISA validated the same.<\/p>\n","protected":false},"author":1,"featured_media":14339,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[82,80,123],"tags":[152,406,371,395,106,139],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/7545"}],"collection":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/comments?post=7545"}],"version-history":[{"count":7,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/7545\/revisions"}],"predecessor-version":[{"id":16236,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/7545\/revisions\/16236"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media\/14339"}],"wp:attachment":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media?parent=7545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/categories?post=7545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/tags?post=7545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}