You are here

Cybersecurity

NSA Releases Updated Guidance on Side-Channel Vulnerabilities

The National Security Agency (NSA) has released a Cybersecurity Advisory providing updated guidance for addressing side-channel vulnerabilities that affect Intel, AMD, ARM, and IBM processors. Side-channel vulnerabilities exploit weaknesses in speculative execution to leak information, potentially allowing for account permission protocols, virtualization boundaries, and protected memory regions to be bypassed. Spectre and Meltdown, which were disclosed in January 2018, are an example of this kind of vulnerability.

Schneider Electric EVLink Parking (ICSA-19-031-01)

The NCCIC has published an advisory on use of hard-coded credentials, code injection, sql injection vulnerabilities in Schneider Electric EVLink Parking. Versions 3.2.0-12_v1 and prior are affected. Successful exploitation of these vulnerabilities could allow an attacker to stop the device and prevent charging, execute arbitrary commands, and access the web interface with full privileges. Schneider Electric recommends users setup a firewall to restrict remote access to the charging stations by unauthorized users.

"Operation Manic Menagerie" Uncovers "Extensive Compromise" of Australian Web Hosting Providers

The Australian Cyber Security Centre (ACSC) has just released a report of its technical findings and mitigation advice related to the extensive compromise of at least eight Australian web hosting providers, which it discovered through “Operation Manic Menagerie.” The compromises of these providers may have facilitated compromises of their customers’ websites. The goal of this campaign was financial gain: websites running on compromised servers were modified to insert advertising and to support search engine optimization for other websites.

New Free Self-Assessment for CIS Controls

The Center for Internet Security (CIS), which operates the Multi-State Information Sharing and Analysis Center (MS-ISAC), has launched a free assessment tool to enable security practitioners to track and prioritize their implementation of the CIS Controls. Results from the CIS Controls Self-Assessment Tool (CIS CSAT) can be exported per department or organizational unit, or enterprises can take a more holistic view of the entire organization’s security. With cross-mappings to additional security frameworks, users can also track alignment between other best practices and the CIS Controls.

AVEVA Wonderware System Platform (ICSA-19-029-03) – Products Used in the Water and Wastewater and Energy Sectors

The NCCIC has published an advisory on an insufficiently protected credentials vulnerability in AVEVA Wonderware System Platform. Update 2 and prior are affected. This vulnerability could allow unauthorized access to the credentials for the ArchestrA Network User Account. AVEVA recommends users using Wonderware System Platform 2017 Update 2 and prior should upgrade to System Platform 2017 Update 3 as soon as possible. The NCCIC also advises on a series of mitigating measures for this vulnerability.

Yokogawa License Manager Service (ICSA-19-029-01) – Products Used in the Energy Sector

The NCCIC has published an advisory on an unrestricted upload of files with dangerous type vulnerability in Yokogawa License Manager Service. Numerous products and versions of these products are affected. Successful exploitation of this vulnerability could allow an attacker to remotely upload files, allowing execution of arbitrary code. Yokogawa recommends users of affected devices and versions update to the latest available release. The NCCIC also advises on a series of mitigating measures for this vulnerability.

Pages

Subscribe to Cybersecurity