logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
10th December 2020 by Cyber.Vision.Admin 0 Comments 925 Views
10th December 2020 by Cyber.Vision.Admin in Business Security

VMware vulnerability puts even more pressure on organizations relying on remote work

The National Security Agency (NSA) is warning that Russian state-sponsored hackers have been actively attacking a vulnerability in VMware products to steal data.

The ongoing VMware attacks take advantage of the security bug CVE-2020-4006, which is a command-injection flaw that allows attackers to execute commands on any OS running the vulnerable software.

The affected VMware products all relate to cloud infrastructure and identity management. They include VMware Workspace One Access, its predecessor, VMware Identity Manager, and VMware Cloud Foundation. VMware issued a security bulletin on Thursday with information on patches and workarounds that can be used to mitigate damage. And it’s not just VMware products that are under attack.

As if the pressure Covid19 is putting on organizations and employees who have shifted almost entirely to remote work wasn’t enough, a zero-click remote code execution (RCE) bug in Microsoft Teams desktop apps has likely allowed attackers to execute arbitrary code just by sending a simple chat message aimed at compromising a victim’s system. The exploit automatically executes when the message has been seen. No user interaction required. Once that happens, hackers have access to private chats, files, private keys, and even personal data outside of Teams.

Worse still, the RCE is cross-platform, which means it’s not only affecting MS Teams for Windows (v1.3.00.21759), but also Linux (v1.3.00.16851), macOS (v1.3.00.23764), and the web (teams.microsoft.com). It also has the potential to be made wormable, which means it can easily be passed from one user to other users, threatening an entire channel.

Vulnerability scans are key to keeping your organization protected

With so many employees working remotely, it can be hard to use traditional network monitoring tools to flag potentially suspicious behavior. But the NSA notes that vulnerabilities like the VMware bug present a unique challenge regardless, because the malicious activity happens in encrypted connections to the web interface that aren’t clearly distinguishable from legitimate logins. Finding them is like looking for a needle in a haystack and time is definitely of the essence.

The NSA recommends that organizations comb their server logs for “exit statements” that can indicate suspicious activity. They also added that it’s important to regularly monitor authentication logs for anomalous authentications, especially successful ones that use established trusts but come from unusual addresses or include unusual properties.

These vulnerabilities are text-book examples of why continuous and timely vulnerability management is essential for the security of your corporate IT infrastructure.

Without proper tooling to help you identify, prioritize and remediate vulnerabilities, it’s nearly impossible (or prohibitively expensive) to patch the constantly growing number of them.

We know a trick or two about handling vulnerabilities, so definitely check out F-Secure Radar if you need help with vulnerability management. And if you’re worried about detecting attackers that have managed to get into your systems by exploiting unpatched vulnerabilities, check out F-Secure Rapid Detection and Response.

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo