Tuesday, February 4, 2025

Grow Your Business and Join MarketWorld Marketplace and Create Your Own Store front

HomeCyberSecurityNetwork security tool defects are endemic, eroding enterprise defense

Network security tool defects are endemic, eroding enterprise defense

Threat hunters and defenders started 2025 in the opening scenes of a bad sequel. In the early weeks of January, federal cyber authorities and researchers once again warned that attackers were exploiting a zero-day vulnerability in Ivanti Connect Secure

The critical unauthenticated stack-based buffer overflow vulnerability, CVE-2025-0282, was exploited and later discovered almost exactly one year after a threat group exploited a pair of separate zero-daysCVE-2023-46805 and CVE-2024-21887 — in the same Ivanti product.

The outbreak of new software defects in the same product from the same vendor would be less nerve-wracking if it wasn’t so frequent, furthering an unstable environment for enterprises. Exploited vulnerabilities in the network devices and services organizations rely on for defense facilitate intrusions they are designed to prevent.

Security gear and services running at the perimeter of enterprise networks — from firewalls and VPNs to routers — are a common and persistent intrusion point for cyberattacks. 

During the last two years, financially-motivated and nation-state linked attackers widely exploited vulnerabilities in network edge devices sold by Barracuda, Cisco, Citrix, Fortinet, Ivanti, Juniper, Palo Alto Networks, and SonicWall, among others.

Network security tool exploits have ensnared organizations across sectors, from government agencies to some of the most valuable publicly-traded companies in the world, including Boeing and Comcast.

The Cybersecurity and Infrastructure Security Agency was among those hit by the early 2024 spree of zero-day exploits in Ivanti Connect Secure, the remote access VPN the agency used at the time of the attack.

“It’s easy to feel fatigue from the constant stream of vulnerabilities, but this kind of initial access vulnerability in network devices is particularly dangerous due to the severe post-exploitation consequences,” said Himaja Motheram, security researcher at Censys.

Contradictions abound in network security devices

Organizations buy and deploy firewalls and VPNs to improve their defenses and prevent intrusions. The unintended aftermath wrought by those purchases and deployments contradicts the very purpose of what customers are trying to achieve with network security gear.

When malicious hackers exploit vulnerabilities in edge devices, it’s not the vendors that get hit — it’s their customers.


“It’s easy to feel fatigue from the constant stream of vulnerabilities, but this kind of initial access vulnerability in network devices is particularly dangerous due to the severe post-exploitation consequences.”

Himaja Motheram

Security researcher at Censys


Remote-access tools such as self-managed VPNs were the primary intrusion point for ransomware attacks in 2023, accounting for 3 in 5 attacks, according to research from cybersecurity insurance firm At-Bay.

Enterprises that don’t consider network edge devices a potential risk are leaving their networks exposed. Stronger vulnerability management programs can help organizations avoid exploits, but there’s little they can do to defend against actively exploited zero days or vulnerabilities that are publicly disclosed but not yet fixed by the vendor.

“If it’s not something in your face all day, it’s so easy to forget about,” said Kyle Hanslovan, CEO at Huntress, a managed EDR vendor.

Attackers view network security gear as a prime target for multiple reasons. They provide capabilities, including highly privileged access and control, that align with attackers’ objectives, said John Dwyer, director of security research at Binary Defense.

“We don’t consider them with the same scrutiny as we do any other asset on our network, and I think that that’s a misconception,” Dwyer said. “At the end of the day, security tools have more benefits than negatives, but every asset on your network is an attack vector.”

Firewall sales account for nearly half of all revenue in the network security market, said Mauricio Sanchez, senior director of enterprise security and networking research at Dell’Oro Group.


“At the end of the day, security tools have more benefits than negatives, but every asset on your network is an attack vector.”

John Dwyer

Director of security research at Binary Defense


Palo Alto Networks has a commanding lead in the firewall segment, closing the second quarter of 2024 with a 29% share of the market, research from Dell’Oro Group and Gartner shows. The next closest competitors in the firewall segment include Fortinet, Cisco and Check Point Software Technologies.

Attackers actively exploited vulnerabilities in each of these vendors’ firewalls or VPNs during the last year, according to the Cybersecurity and Infrastructure Security Agency’s known exploited vulnerabilities catalog.


Source link

Bookmark (0)
Please login to bookmark Close
RELATED ARTICLES
- Advertisment -spot_img

Most Popular

Sponsored Business

- Advertisment -spot_img