Thursday, January 2, 2025
HomeNetwork SecurityNCSC Warns that APT Hacker Groups Exploiting Vulnerabilities in Popular Enterprise VPN

NCSC Warns that APT Hacker Groups Exploiting Vulnerabilities in Popular Enterprise VPN

Published on

SIEM as a Service

APT groups exploiting vulnerabilities in popular enterprise VPN products to retrieve arbitrary files that include login credentials, change configuration settings, or connect to further internal infrastructure.

According to the National Cyber Security Centre (NCSC) research, threat actors actively attacking the UK and International organizations. The vulnerability affecting following VPN products Pulse secure, Palo Alto and Fortinet.

Enterprise VPN Vulnerabilities

The vulnerabilities exist in the VPN allows an unauthenticated attacker to retrieve the arbitrary files, including the one that contains login credentials.

- Advertisement - SIEM as a Service

By having the login credentials attackers can get connected with the VPN network and change the network configuration or further penetrate the network. Attackers can also escalate privilege and also can execute secondary arbitrary code to gain toot access.

The following are the highest-impact vulnerabilities exploited by the APT groups.

Pulse Connect Secure:

Fortinet:

  • CVE-2018-13379: Pre-auth arbitrary file reading
  • CVE-2018-13382: Allows an unauthenticated attacker to change the password
  • of an SSL VPN web portal user.
  • CVE-2018-13383: Post-auth heap overflow. This allows an attacker to gain a shell running on the router.

Palo Alto:

The attack targets several industry sectors including government, military, academic, business and healthcare.

Pulse Secure, Palo Alto and Fortinet already released patches to fix these vulnerabilities. Users are recommended to apply patches and reset authentication credentials that associated with the VPN.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

PoC Exploit Released For Critical Windows LDAP RCE Vulnerability

The CVE-2024-49112 vulnerability in Windows LDAP allows remote code execution on unpatched Domain Controllers,...

New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings

PLAYFULGHOST, a Gh0st RAT variant, leverages distinct traffic patterns and encryption, which spread via...

Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA

The Tycoon 2FA platform is a Phishing-as-a-Service (PhaaS) tool that enables cybercriminals to easily...

Windows 11 BitLocker Encryption Bypassed to Extract Full Volume Encryption Keys

A cybersecurity researcher has demonstrated a method to bypass BitLocker encryption on Windows 11...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Trend Micro Apex One Vulnerabilities Let Escalate Privilege

Trend Micro has addressed six high-severity vulnerabilities in its Apex One and Apex One as a Service product,...

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on...

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed...