Stories
Slash Boxes
Comments

SoylentNews is people

Submission Preview

Link to Story

Multiple VPNs subject to compromise

Accepted submission by RandomFactor at 2019-04-13 17:20:57 from the good luck, I'm behind 7 vpns dept.
Security

CERT Vulnerability Note VU#192371 [cert.org] released this week describes a vulnerability due to insecure Cookie or Authentication Token storage (in memory or log files) of several common VPNs. The vulnerability allows attackers able to either access an endpoint, or exfiltrate data from it, to replay sessions bypassing other authentication methods, thus gaining access to any resources the user can access through the VPN session.

Vulnerable vendors include

    CISCO - "will incorporate this feedback into discussions for future design improvements of the Cisco AnyConnect VPN Solution"
    F5 Networks, Inc - fixed it in version 12.1.3 and 13.1.0 and onwards
    Palo Alto Networks - fixed in GlobalProtect Agent 4.1.1 and later for Windows, and GlobalProtect Agent 4.1.11 and later for macOS.
    Pulse Secure - no statement yet

Known unaffected VPN vendors

    Check Point Software Technologies
    LANCOM Systems GMBH
    pfSense

(Information is not yet available on an additional 230 vendors)


Original Submission