{"id":102117,"date":"2019-08-31T11:28:03","date_gmt":"2019-08-31T15:28:03","guid":{"rendered":"http:\/\/rbach.net\/index.php\/"},"modified":"2022-10-22T12:02:26","modified_gmt":"2022-10-22T16:02:26","slug":"are-your-vpns-virtual-pwnd-networks","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/are-your-vpns-virtual-pwnd-networks\/","title":{"rendered":"Are Your VPNs &#8211; Virtual Pwnd Networks"},"content":{"rendered":"<p><strong>Updated October 21, 2019<\/strong> &#8211; The U.S. and U.K. spy agencies have issued separate cybersecurity advisories on 10\/21\/2019 urging users to patch and mitigate the VPN holes discussed below. The <a href=\"https:\/\/www.nsa.gov\" target=\"_blank\" rel=\"noopener noreferrer\">NSA<\/a> <a href=\"https:\/\/media.defense.gov\/2019\/Oct\/07\/2002191601\/-1\/-1\/0\/CSA-MITIGATING-RECENT-VPN-VULNERABILITIES.PDF\" target=\"_blank\" rel=\"noopener noreferrer\">advisory<\/a> (PDF) warns that &#8220;multiple nation-states advanced persistent threat (APT) actors have weaponized&#8221; the flaws. The U.K.&#8217;s National Cyber Security Centre (<a href=\"https:\/\/www.ncsc.gov.uk\" target=\"_blank\" rel=\"noopener noreferrer\">NCSC<\/a>) advisory is <a href=\"https:\/\/www.ncsc.gov.uk\/news\/alert-vpn-vulnerabilities\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p style=\"text-align: center;\">&#8212;<\/p>\n<p><strong>Updated September 29, 2019 &#8211; <\/strong><a href=\"https:\/\/safebreach.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SafeBreach Labs<\/a>\u00a0<a href=\"https:\/\/web.archive.org\/web\/20210115210641\/https:\/\/safebreach.com\/Post\/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145\">discovered<\/a>\u00a0a vulnerability in <a href=\"https:\/\/web.archive.org\/web\/20240822195508\/https:\/\/www.forcepoint.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Forcepoint\u2019s<\/strong><\/a><strong> VPN client software<\/strong>. The flaw will give attackers unfettered access to its users\u2019 Windows computers.<\/p>\n<p>In its\u00a0<a href=\"https:\/\/web.archive.org\/web\/20210412031203\/https:\/\/support.forcepoint.com\/KBArticle?id=000017525\" target=\"_blank\" rel=\"noopener noreferrer\">article detailing the bug<\/a>, Forcepoint explained The flaw enables an <strong>attacker<\/strong> to insert their own executable which will run with <strong>administrative privileges<\/strong>, giving the attackers administrative access to the system. Forcepoint gave the bug a CVE number of\u00a0<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-6145\" target=\"_blank\" rel=\"noopener noreferrer\">2019-6145<\/a> and a base severity score of 6.7. According to a\u00a0 Forcepoint <a href=\"https:\/\/web.archive.org\/web\/20210412031203\/https:\/\/support.forcepoint.com\/KBArticle?id=000017525\">knowledge base article<\/a>, the flaw is patched in version 6.6.1 of the Forcepoint VPN Client for Windows.<\/p>\n<p style=\"text-align: center;\">&#8212;<\/p>\n<p><strong>Updated September 10, 2019 &#8211;\u00a0<\/strong> <a href=\"https:\/\/www.zdnet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>ZDNet<\/em><\/a> is <a href=\"https:\/\/www.zdnet.com\/article\/a-chinese-apt-is-now-going-after-pulse-secure-and-fortinet-vpn-servers\/\" target=\"_blank\" rel=\"noopener noreferrer\">reporting<\/a> that the <strong>Chinese state-sponsored hacker group APT5<\/strong> is <strong>targeting<\/strong> enterprise VPN servers from <strong>Fortinet and Pulse Secure<\/strong> since the security flaws discussed below became public knowledge last month. <a href=\"https:\/\/www.fireeye.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">FireEye<\/a> <a href=\"https:\/\/web.archive.org\/web\/20221225114633\/https:\/\/www.fireeye.com\/content\/dam\/fireeye-www\/current-threats\/pdfs\/rpt-southeast-asia-threat-landscape.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> (PDF) that APT5 has been active since 2007 and has targeted multiple industries.<\/p>\n<p>APT5 was reportedly one of the first to start scanning the internet and then later attempt to exploit vulnerabilities in the Fortinet and Pulse Secure VPN servers. The attackers sought to steal files storing password information or VPN session data from the affected products. These files would have allowed attackers to take over vulnerable devices.<\/p>\n<p style=\"text-align: center;\">&#8212;<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20210415085957\/https:\/\/erpfm.com\/remote-working-with-erp\/\" target=\"_blank\" rel=\"networks pwnd virtual noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-102343\" title=\"Are Your VPNs - Virtual Pwnd Networks\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/remote_work-e1567220279659-143x150.jpg?resize=110%2C116&#038;ssl=1\" alt=\"Are Your VPNs - Virtual Pwnd Networks\" width=\"110\" height=\"116\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/remote_work-e1567220279659.jpg?resize=143%2C150&amp;ssl=1 143w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/remote_work-e1567220279659.jpg?resize=71%2C75&amp;ssl=1 71w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/remote_work-e1567220279659.jpg?resize=768%2C808&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/remote_work-e1567220279659.jpg?resize=973%2C1024&amp;ssl=1 973w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/remote_work-e1567220279659.jpg?w=1482&amp;ssl=1 1482w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>Everybody loves their <a href=\"https:\/\/web.archive.org\/web\/20210903022620\/https:\/\/searchnetworking.techtarget.com\/definition\/virtual-private-network\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>virtual private networks<\/strong><\/a>. SSL VPNs provide a convenient way for business users to connect to corporate networks while out of the office. A recent <a href=\"https:\/\/www.flexjobs.com\/blog\/post\/survey-flexible-work-job-choices\/\" target=\"_blank\" rel=\"noopener noreferrer\">study<\/a> by <a href=\"https:\/\/www.flexjobs.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">FlexJobs<\/a> found 30% of workers have left a job because it did not offer <strong>flexible work options like remote work<\/strong>. Further, the report said, that 80% of staff would be more loyal to their employers if they had flexible work options and 52% of workers have tried to <strong>negotiate flexible work arrangements<\/strong> with their employer.<\/p>\n<h3><strong><a href=\"https:\/\/web.archive.org\/web\/20230513010636\/https:\/\/www.thebeijinger.com\/blog\/2017\/07\/11\/will-your-vpn-really-be-blocked-february-chinas-tech-experts-call-bs-recent-firewall\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102345\" title=\"Great firewall of China\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/great-firewall-of-china.jpg?resize=134%2C100&#038;ssl=1\" alt=\"Great firewall of China\" width=\"134\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/great-firewall-of-china.jpg?resize=150%2C112&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/great-firewall-of-china.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/great-firewall-of-china.jpg?w=640&amp;ssl=1 640w\" sizes=\"auto, (max-width: 134px) 100vw, 134px\" \/><\/a><\/strong>Hackers love VPNs too<\/h3>\n<p>Last month <a href=\"https:\/\/vpnpro.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>VPNpro<\/em><\/a> <a href=\"https:\/\/vpnpro.com\/blog\/hidden-vpn-owners-unveiled-97-vpns-23-companies\/\" target=\"_blank\" rel=\"noopener noreferrer\">found<\/a> that the majority of <strong>VPN services have close ties to China<\/strong>. <em><a href=\"https:\/\/www.csoonline.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSO Online<\/a><\/em> <a href=\"https:\/\/www.csoonline.com\/article\/3335480\/china-owns-half-of-all-vpn-services.html\" target=\"_blank\" rel=\"noopener noreferrer\">points out<\/a> that if you are running a VPN that is developed and owned in China, then there is a serious chance that your <strong>information is not as private<\/strong> as you think. Every technology company that operates within China, including ISPs, are required to comply with any <strong>Chinese governmental request for data<\/strong>. <strong>That includes your data<\/strong>. The Chinese government has a long and well-documented history of <strong>hacking, favoring, and helping local businesses at the expense of foreign companies.<\/strong><\/p>\n<p><em>VPNpro<\/em> also <a href=\"https:\/\/www.top10vpn.com\/free-vpn-app-investigation\/\" target=\"_blank\" rel=\"noopener noreferrer\">found<\/a> that some Chinese firms own different VPNs split among <strong>different subsidiaries<\/strong>. For example, the Chinese company Innovative Connecting owns three separate businesses that produce VPN apps: <a href=\"https:\/\/web.archive.org\/web\/20190908100945\/https:\/\/play.google.com\/store\/apps\/developer?id=Autumn+Breeze+2018&amp;hl=en_GB\">Autumn Breeze 2018<\/a>, Lemon Cove, and All Connected. In total, Innovative Connecting produces 10 seemingly unconnected VPN products, the study shows.<\/p>\n<h3><strong><a href=\"https:\/\/medium.com\/@vishal_alt\/alts-security-blog-tcp-session-hijacking-ae5a8c6cd90f\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-102364\" title=\"VPN attacks\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/vpn_attack-1.png?resize=270%2C173&#038;ssl=1\" alt=\"VPN attacks\" width=\"270\" height=\"173\" \/><\/a><\/strong>China is not the only concern<\/h3>\n<p><em>VPNpro<\/em> also found that seven of the top VPN services are owned by Gaditek, based in Pakistan. This means the <strong>Pakistani government<\/strong> can legally access any data without a warrant and data can also be freely handed over to foreign institutions, according to <em>VPNpro<\/em>.<\/p>\n<p><em>VPNpro<\/em> identified a further four companies: Super VPN &amp; Free Proxy, Giga Studios, Sarah Hawken, and Fifa VPN, which together own 10 VPN services \u2013 where the parent company, and therefore the <strong>company of origin, is completely hidden<\/strong>.<\/p>\n<p><strong>If that is not scary enough<\/strong> &#8211; There are new reports that attackers are now targeting the devices used to attach VPNs to the network. <em><a href=\"https:\/\/www.helpnetsecurity.com\" target=\"_blank\" rel=\"noopener noreferrer\">Help Net Security<\/a><\/em> <a href=\"https:\/\/www.helpnetsecurity.com\/2019\/08\/26\/vulnerable-fortigate-pulse-secure-ssl-vpn\/\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that <strong>attackers are exploiting known flaws in Pulse Connect Secure SSL VPN and Fortigate SSL VPN<\/strong> installations.<\/p>\n<h3>Flaws VPN installations<\/h3>\n<p>These attacks could allow attackers to steal passwords and gain <strong>full, remote access to an organization&#8217;s networks<\/strong>. Attackers have been targeting two vulnerabilities:<\/p>\n<ul>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11510\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-11510<\/a>, an arbitrary file reading vulnerability in Pulse Connect Secure<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-13379\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-13379<\/a>, a path traversal flaw in the FortiOS SSL VPN web portal.<\/li>\n<\/ul>\n<p>Researchers <a href=\"https:\/\/twitter.com\/mehqq_\" target=\"_blank\" rel=\"noopener noreferrer\">Meh Chang<\/a> and <a href=\"https:\/\/twitter.com\/orange_8361\" target=\"_blank\" rel=\"noopener noreferrer\">Orange Tsai<\/a> at Taipei City, Taiwan-based consultancy <a href=\"https:\/\/twitter.com\/d3vc0r3\" target=\"_blank\" rel=\"noopener noreferrer\">Devcore<\/a> reported the flaws to Fortinet on Dec. 11, 2018, and to Pulse Secure on March 22, 2019.<\/p>\n<p>In an August 9, 2019 blog post the Devcore researchers <a href=\"https:\/\/devco.re\/blog\/2019\/08\/09\/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn\/\" target=\"_blank\" rel=\"noopener noreferrer\">recapped their Black Hat 2019 demonstration<\/a>. Tsai <a href=\"https:\/\/techcrunch.com\/2019\/07\/23\/corporate-vpn-flaws-risk\/\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <em><a href=\"https:\/\/techcrunch.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">TechCrunch<\/a><\/em> in an email, \u201c<em>The SSL VPN is the most convenient way to connect to corporate networks &#8230; it\u2019s also the shortest path to compromi<\/em><em>s<\/em><em>e their intranet.<\/em>\u201d<\/p>\n<h3>Pulse Secure VPNs<\/h3>\n<p><a href=\"https:\/\/www.pulsesecure.net\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102386 size-thumbnail\" title=\"Pulse Secure logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pulse_secure_logo-1.png?resize=75%2C75&#038;ssl=1\" alt=\"Pulse Secure logo\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pulse_secure_logo-1.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pulse_secure_logo-1.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pulse_secure_logo-1.png?w=180&amp;ssl=1 180w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a><a href=\"https:\/\/www.privco.com\/company\/pulse-secure_private_stock_annual_report_financials\/\" target=\"_blank\" rel=\"noopener noreferrer\">Privately held<\/a> California-based <a href=\"https:\/\/www.pulsesecure.net\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Pulse Secure<\/strong><\/a> released an <a href=\"https:\/\/web.archive.org\/web\/20230328165217\/https:\/\/kb.pulsesecure.net\/articles\/Pulse_Security_Advisories\/SA44101\" target=\"_blank\" rel=\"noopener noreferrer\">update on <strong>April 24, 2019<\/strong><\/a>, to <strong>address these flaws<\/strong> and urged customers to upgrade all affected products &#8220;<em><strong>as soon as possible<\/strong>.<\/em>&#8221; The vendor warned that aside from patching, no workaround would protect systems, &#8220;<em>Multiple vulnerabilities were discovered and have been resolved in Pulse Connect Secure (PCS) and Pulse Policy Secure (PPS).<\/em>&#8221;<\/p>\n<p>Cyber threat intelligence firm <a href=\"https:\/\/web.archive.org\/web\/20230227110449\/https:\/\/badpackets.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bad Packets<\/a> has <a href=\"https:\/\/twitter.com\/bad_packets\/status\/1164954059226284032\">warned<\/a> about activity aimed at vulnerable <a href=\"https:\/\/www.pulsesecure.net\/products\/pulse-connect-secure\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pulse Connect Secure endpoints<\/a>. So far they have found <strong>nearly 15,000 Pulse Secure VPN endpoints vulnerable<\/strong> to CVE-2019-11510 across all sectors of the U.S. This includes:<\/p>\n<ul>\n<li>U.S. military networks,<\/li>\n<li>Hospitals,<\/li>\n<li>Electric utilities,<\/li>\n<li>Financial institutions, and<\/li>\n<li>Fortune 500 companies.<\/li>\n<\/ul>\n<h3>Fortinet VPNs<\/h3>\n<p><a href=\"https:\/\/www.fortinet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102342 size-thumbnail\" title=\"Fortinet logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fortinet_logo-e1567219933315-75x54.png?resize=75%2C54&#038;ssl=1\" alt=\"Fortinet logo\" width=\"75\" height=\"54\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fortinet_logo-e1567219933315.png?resize=75%2C54&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fortinet_logo-e1567219933315.png?resize=150%2C108&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fortinet_logo-e1567219933315.png?w=390&amp;ssl=1 390w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a><\/p>\n<p><strong><a href=\"https:\/\/www.fortinet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Fortinet<\/a> <\/strong>(<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-FTNT\/\" target=\"_blank\" rel=\"noopener noreferrer\">FTNT<\/a>) released a <a href=\"https:\/\/fortiguard.com\/psirt\/FG-IR-18-384\" target=\"_blank\" rel=\"noopener noreferrer\">security advisory<\/a> on <strong>May 24, 2019, t<\/strong><strong>o address these flaws<\/strong> and urged customers to update their firmware to <strong>safeguard themselves<\/strong>. In a <a href=\"https:\/\/twitter.com\/codewhitesec\/status\/1145967317672714240\" target=\"_blank\" rel=\"noopener noreferrer\">blog post<\/a>, the Devcore researchers wrote about the flaws they&#8217;d found in Fortinet devices, &#8220;<em>In the login page, we found a special parameter called magic. Once the parameter meets a hardcoded string, we can modify any user&#8217;s password.&#8221;<\/em><\/p>\n<p>Independent British security researcher <a href=\"https:\/\/web.archive.org\/web\/20211114045543\/https:\/\/opensecurity.global\/forums\/topic\/184-pulse-secure-ssl-vpn-vulnerability-being-exploited-in-wild\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kevin Beaumont<\/a> <a href=\"https:\/\/www.bankinfosecurity.com\/hackers-hit-unpatched-pulse-secure-fortinet-ssl-vpns-a-12958\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <a href=\"https:\/\/www.bankinfosecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>BankInfoSecurity<\/em><\/a> he was tracking attacks against Fortigate servers. Beaumont reported seeing &#8220;<em>the Fortigate SSL VPN backdoor <strong>being used in the wild<\/strong><\/em>&#8221; against one of his honeypots.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>ZDNet<\/em><\/a> <a href=\"https:\/\/www.zdnet.com\/article\/hackers-mount-attacks-on-webmin-servers-pulse-secure-and-fortinet-vpns\/\" target=\"_blank\" rel=\"noopener noreferrer\">claims<\/a> the number of <strong>vulnerable FortiGate VPNs<\/strong> is believed to be in the<strong> hundreds of thousands,<\/strong> although we don&#8217;t have an exact stat about the number of unpatched systems that are still vulnerable to attacks.<\/p>\n<p><em><strong>rb-<\/strong><\/em><\/p>\n<p><em>This isn&#8217;t the first time that serious flaws have been found and patched in enterprise-grade networking gear. <\/em><em>In 2016 researchers found a <a href=\"https:\/\/www.helpnetsecurity.com\/2016\/01\/13\/fortinet-says-backdoor-found-in-fortios-is-a-management-authentication-issue\/\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerability<\/a> in Fortinet&#8217;s FortiGate OS &#8211; that functioned as an SSH backdoor and researchers found an <a href=\"https:\/\/www.bankinfosecurity.com\/juniper-firmware-new-crypto-flaw-found-a-8790\" target=\"_blank\" rel=\"noopener noreferrer\">authentication bypass flaw<\/a> in <a title=\"Juniper\" href=\"http:\/\/www.juniper.net\/us\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Juniper Networks<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-JNPR\/\" target=\"_blank\" rel=\"noopener noreferrer\">JNPR<\/a>) ScreenOS firmware.<\/em><\/p>\n<p><em><a href=\"http:\/\/hiringtips.employeetestingcenter.com\/why-did-you-leave-your-job\/lady-and-bullhorn\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102373 size-medium\" title=\"Patch your systems\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/patching-e1567269975765-150x99.jpg?resize=150%2C99&#038;ssl=1\" alt=\"Patch your systems\" width=\"150\" height=\"99\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/patching-e1567269975765.jpg?resize=150%2C99&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/patching-e1567269975765.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/patching-e1567269975765.jpg?resize=768%2C509&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/patching-e1567269975765.jpg?resize=1024%2C679&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/patching-e1567269975765.jpg?w=1092&amp;ssl=1 1092w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/patching-e1567269975765.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>In April 2019, <a href=\"https:\/\/www.dhs.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. Homeland Security<\/a> <a href=\"https:\/\/www.us-cert.gov\/ncas\/current-activity\/2019\/04\/12\/Vulnerability-Multiple-VPN-Applications\" target=\"_blank\" rel=\"noopener noreferrer\">issued a warning<\/a> about vulnerabilities in many major corporate VPN applications. The VPN apps from \u2014 <a href=\"http:\/\/www.cisco.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-CSCO\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSCO<\/a>), <a href=\"https:\/\/www.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Palo Alto Networks<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-PANW\/\" target=\"_blank\" rel=\"noopener noreferrer\">PANW<\/a>), Pulse Secure, and <a href=\"https:\/\/www.f5.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">F5 Networks<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-FFIV\/\" target=\"_blank\" rel=\"noopener noreferrer\">FFIV<\/a>)\u2014 improperly store authentication tokens and session cookies on a user\u2019s computer. <\/em><\/p>\n<p><em>Obviously, there is no time to waste: firms should update their vulnerable Pulse Connect Secure SSL VPN and Fortigate SSL VPN installations as soon as possible.<\/em><\/p>\n<p><em>Security researcher Kevin Beaumont told BankInfoSecurity:<br \/>\n<\/em><\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>Lots of companies have the basics around patching Windows and Linux down, as they have vulnerability management platforms and agents &#8230; Those don&#8217;t extend to FortiOS and Pulse Secure. So they just don&#8217;t patch as they never see [vulnerabilities].<\/em><\/p>\n<p><em>Maybe firms should get their VPN devices on a regular update schedule before they become Virtual Pwnd Networks.<\/em><\/p>\n<h6>Related Posts<\/h6>\n<ul>\n<li><a href=\"https:\/\/www.globenewswire.com\/news-release\/2019\/04\/02\/1795257\/0\/en\/Fortinet-Advances-to-2-in-Firewall-UTM-and-VPN-Revenue-According-to-Leading-Analyst-Firm.html\" target=\"_blank\" rel=\"noopener noreferrer\">Fortinet Advances to #2 in Firewall, UTM and VPN Revenue According to Leading Analyst Firm<\/a> (<a href=\"https:\/\/www.globenewswire.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">GlobeNewswire <\/a>)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>VPN make it easy to work remotely but attackers are exploiting recent flaws to gain secret access to corporate networks with Virtual Pwnd Networks<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3161,35,3338,153,626,2934,688,2540,3337,4,2448],"class_list":["post-102117","post","type-post","status-publish","format-standard","hentry","category-security","tag-3161","tag-china","tag-f5-networks","tag-fortinet","tag-ftnt","tag-juniper-networks","tag-palo-alto-networks","tag-patching","tag-pulse-secure","tag-security","tag-vpn"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/102117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=102117"}],"version-history":[{"count":17,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/102117\/revisions"}],"predecessor-version":[{"id":132138,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/102117\/revisions\/132138"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=102117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=102117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=102117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}