Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeCyber BalkansCensys discloses numerous vulnerable devices in federal organizations

Censys discloses numerous vulnerable devices in federal organizations

Published on

spot_img

Threat intelligence software vendor Censys recently conducted research that revealed hundreds of exposed devices on federal civilian executive branch organization networks. The findings are particularly concerning in light of CISA’s Binding Operational Directive (BOD) 23-02, which aims to reduce the attack surface created by insecure or misconfigured management interfaces on certain devices within these agencies.

The research conducted by Censys involved analyzing over 50 federal civilian executive branch (FCEB) organizations and suborganizations, encompassing more than 13,000 distinct hosts spread across over 100 autonomous systems associated with these entities. Additionally, over 1,300 FCEB hosts accessible via IPv4 addresses were examined.

During this analysis, researchers discovered hundreds of publicly exposed devices within the scope outlined in BOD 23-02. These exposed devices included managed file transfer products with major known vulnerabilities that have already been exploited, such as MoveIt Transfer and GoAnywhere MFT. Progess Software’s MoveIt Transfer and Fortra’s GoAnywhere MFT were among the products found to have exposed instances with major vulnerabilities.

Furthermore, Censys researchers uncovered exposed physical appliances, including Barracuda Networks’ Email Security Gateway (ESG). In fact, threat actors exploited a critical zero-day flaw that was disclosed last month, prompting Barracuda to advise vulnerable customers to replace their devices immediately.

It is worth noting that the post published by Censys did not provide details on whether the vulnerabilities in Barracuda ESG or MoveIt instances had been patched. When asked about the issue, Censys security researcher Himaja Motheram explained that patch details are not always visible to Censys’ passive scanners. However, she did mention that there has been a decrease in exposures for these vulnerabilities overall, which is an encouraging development.

Nevertheless, the presence of devices like Barracuda ESG and MoveIt within FCEB networks is cause for concern, especially considering the numerous data breaches suffered by government and industry organizations related to MoveIt. Motheram emphasized the importance of taking prompt action in response to these findings and implementing basic security measures, such as restricting access from the public internet and implementing strong passwords and other authentication mechanisms.

In addition to the aforementioned devices, Censys also identified exposed Adaptive Security Device Manager interfaces for Cisco devices, Nessus vulnerability scanning servers, more than 150 instances of end-of-life software, and over 10 hosts running HTTP services that exposed directory listings of file systems, which can lead to sensitive data leakage.

While some of these exposures may be intentional, Motheram believes that most of them are likely the result of misconfigured settings or a lack of risk awareness. While these findings do not warrant immediate panic, they do highlight a broader culture of inadequate security practices. Motheram expressed concerns that these exposures are just the tip of the iceberg and could indicate the presence of deeper and potentially more critical security issues. If any of these exposed devices have weaknesses like default login credentials or ties to known exploited vulnerabilities, they pose a serious threat.

The research conducted by Censys serves as a reminder of the importance of ensuring robust cybersecurity measures within federal organizations. With the increasing sophistication of cyber threats, it is crucial for these agencies to prioritize the implementation of strong security practices to protect sensitive data and mitigate the risks associated with exposed devices.

Source link

Latest articles

Measuring Cyber Risk Strategies for CFOs and Boards

In a recent interview conducted by Help Net Security, Mir Kashifuddin, Data Risk &...

Over $1 million stolen in cybercrime for Bar Harbor school construction project

BAR HARBOR, Maine (WMTW) - The Mount Desert Island Regional School System recently fell...

AWS SNS Utilized for Data Exfiltration and Phishing Attacks

Amazon Web Services’ Simple Notification Service (AWS SNS) has gained popularity as a reliable...

Federal Judges Halt Trump’s Plan to Mass Fire Federal Workers

In a surprising turn of events, a U.S. federal judge has issued a restraining...

More like this

Measuring Cyber Risk Strategies for CFOs and Boards

In a recent interview conducted by Help Net Security, Mir Kashifuddin, Data Risk &...

Over $1 million stolen in cybercrime for Bar Harbor school construction project

BAR HARBOR, Maine (WMTW) - The Mount Desert Island Regional School System recently fell...

AWS SNS Utilized for Data Exfiltration and Phishing Attacks

Amazon Web Services’ Simple Notification Service (AWS SNS) has gained popularity as a reliable...