The mastermind that orchestrated the SolarWinds cyber attack may finally have a name. On Thursday, April 15th, the White House officially announced that the Russian Foreign Intelligence Service (SVR) - also known as APT 29, Cozy Bear, and The Dukes - was responsible for the campaign that exploited the SolarWinds Orion platform.
But the attacks are not over yet.
A joint advisory from the U.S. National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI) warns that SVR is still exploiting 5 vulnerabilities.
These attacks are harvesting authentication credentials to further comprise United States government networks.
Here are the 5 vulnerabilities currently being targeted by SVR:
Necessary patches should be installed for each of the above vulnerabilities immediately. For more detail on each vulnerability and patch download instructions, read on.
The Pulse Secure vulnerability is the most critical vulnerability in this list. The vulnerability affects Pulse Secure VPN appliances. Once exploited, threat actors can access arbitrary files from the targeted VPN server.
CVE-2019-11510 affects the Pulse Secure VPN.
All users of Pulse Secure VPN must download corresponding patches from the Pulse Secure Download Center.
This vulnerability has been exploited by threat actors in the past. This is a path traversal vulnerability in Fortinet’s FortiGate SSL VPN.
CVE-2018-13379 could be readily exploited by sending a specific request containing a path traversal sequence to a vulnerable Fortigate SSL VPN. This will allow threat actors to download and read files from the targeted device.
The following FortiGate firewall versions are impacted by CVE-2018-11379
For mitigation instructions, refer to this FortiGuard Labs article.
A patch for CVE-2018-13379 can be download from Fortguard here.
CVE-2019-9670 is an XML External Entity injection (XXE) vulnerability in the Synacor Zimbra Collaboration Suite mailbox component. Once exploited, threat actors can view application server filestream files and interact with any back-end systems the targeted software has access to.
CVE-2019-9670 impacts Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10.
Patches for CVE-2019-9670 can be downloaded for the following affected Zimbra versions:
CVE-2019-19781 is a directory traversal vulnerability for the Citrix Application Discovery Controller and Citrix Gateway. It was first discovered on December 17, 2019. Once exploited, an attacker can establish remote accesses to write a file to a location on the targeted disk.
Refer to this CISA post for CVE-2019-19781 detection instructions.
The following products are impacted by CVE-2019-19781:
For mitigation steps, refer to this Citrix Knowledge Base article.
Patches for different Citrix product versions can be downloaded via the following links:
CVE-2020-4006 is a VMware command injection vulnerability. To exploit this vulnerability, network access to the administrator configure port (usually 8443) is required, alongside a valid password for the admin account.
Once exploited, an attacker can inject commands with unrestricted privileges on the targeted operating system.
The following products are impacted by CVE-2020-4006:
Patches for affected VMware products can be downloaded from the VMware knowledge base.
UpGuard integrates a data leak detection engine with Third-Party Risk management, to create the world’s leading attack surface monitoring solution.
Test the security of your website, CLICK HERE to receive your instant security score now!