Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Sunday April 14 2019, @12:33PM   Printer-friendly
from the good-luck,-I'm-behind-7-vpns dept.

CERT Vulnerability Note VU#192371 released this week describes a vulnerability due to insecure Cookie or Authentication Token storage (in memory or log files) of several common VPNs. The vulnerability allows attackers able to either access an endpoint, or exfiltrate data from it, to replay sessions bypassing other authentication methods, thus gaining access to any resources the user can access through the VPN session.

Vulnerable vendors include

    CISCO - "will incorporate this feedback into discussions for future design improvements of the Cisco AnyConnect VPN Solution"
    F5 Networks, Inc - fixed it in version 12.1.3 and 13.1.0 and onwards
    Palo Alto Networks - fixed in GlobalProtect Agent 4.1.1 and later for Windows, and GlobalProtect Agent 4.1.11 and later for macOS.
    Pulse Secure - no statement yet

Known unaffected VPN vendors

    Check Point Software Technologies
    LANCOM Systems GMBH
    pfSense

(Information is not yet available on an additional 230 vendors)


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by arslan on Sunday April 14 2019, @10:38PM

    by arslan (3462) on Sunday April 14 2019, @10:38PM (#829506)

    Reading the linked CERT vuln. I quote:

    If an attacker has persistent access to a VPN user's endpoint or exfiltrates the cookie using other methods

    If I have access to the endpoint, any VPN is moot. If I can exfiltrate secrets from the endpoint, cookies or keys, any VPN is moot.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2