Dangerous Flaws Found in Cisco, Microsoft, Citrix, and IBM Remote Work Access and Perimeter Devices
August 04, 2020SAN FRANCISCO – August 4, 2020 – RiskIQ, the global leader in attack surface management, today released its Vulnerability Landscape report, a high-level view of critical vulnerabilities in 12 widely used remote access and perimeter devices. The findings show that the rapidly increasing adoption of these devices amid the COVID-19 pandemic is expanding digital attack surfaces outside the corporate firewall at incredible speed—and introducing a range of critical, rapidly proliferating vulnerabilities. Cybercriminals and nation-states are already taking advantage of these security flaws, including those in F5 Networks' BIG-IP product and Cisco's IOS XE devices, to attack organizations.
Recently, organizations have had to scramble to patch dangerous security flaws in dozens of remote access and perimeter devices. Already, there have been 18 high-to-critical vulnerabilities in these systems in 2020. The devices covered in the report include Palo Alto Global Protect, F5 BIG-IP, IBM WebSphere Application Server, Oracle WebLogic, Microsoft Remote Desktop Gateway, Citrix NetScaler Gateway, Citrix ADC, Cisco ASA & Firepower, Oracle iPlanet Web Server, and more.
The report taps the company's Internet Intelligence Graph, a global network that absorbs internet data to map the billions of relationships between IP-connected devices worldwide. Researchers deployed this telemetry to find the total number of these 12 potentially vulnerable devices online across the world that RiskIQ systems observed between June 1, 2020, and today.
The total amount of potential vulnerabilities in the findings include:
- Palo Alto Global Protect - 61,869
- F5 Big-IP - 967,437
- IBM WebSphere Application Server - 7,496
- Oracle WebLogic - 14,563
- Microsoft Remote Desktop Gateway - 42,826
- Citrix NetScaler Gateway - 86,773
- Citrix ADC - 7,970
- Cisco ASA & Firepower - 1,982
- Oracle iPlanet Web Server 7.0 - 2,848
- SAP NetWeaver - 2,629
- Zoho Desktop Central - 1,988
- Citrix ShareFile - 2,766
"This data in this report gives us a unique glimpse of the new reality facing the enterprise in the post-COVID world, which is that network controls are coming up dangerously short," said Lou Manousos, RiskIQ’s CEO. "These IP-connected assets aren't in the purview of most security controls, and dangerous flaws like those found in Cisco, Microsoft, Citrix, and IBM products will continue to be incredibly common."
Both the US and Australian governments have advised companies to immediately address these critical vulnerabilities, with US Cyber Command recommending that organizations patch both the F5 and PAN-OS vulnerabilities. Both the United States National Security Agency (NSA) and Australian Signals Directorate (ASD) have warned state-sponsored actors that leverage a broad swath of vulnerabilities to deploy web shell malware on vulnerable devices. By doing so, they gain a foothold into target organizations' networks.
Access the full report here: http://riskiq.com/resources/research/vulnerable-remote-access/
RiskIQ is a leader in digital attack surface management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social and mobile exposures. Trusted by thousands of security analysts, security teams, and CISO’s, RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk, and take action to protect the business, brand, and customers. Based in San Francisco, the company is backed by Summit Partners, Battery Ventures, Georgian Partners, and MassMutual Ventures.
© 2020 RiskIQ, Inc. All rights reserved. RiskIQ is a registered trademark of RiskIQ, Inc. in the United States and other countries. All other trademarks contained herein are the property of their respective owners.
Front Lines Media