STE WILLIAMS

UK privacy watchdog threatens British Airways with 747-sized fine for massive personal data blurt

The UK Information Commissioner’s Office has warned BA it faces a whopping £183.39m following the theft of million customer records from its website and mobile app servers.

The record-breaking fine – more or less the lower end of the price of one of the 747-400s in BA’s fleet – under European General Data Protection Regulation (GDPR), represents 1.5 per cent of BA’s world-wide revenue in 2017.

Information Commissioner Elizabeth Denham said: “People’s personal data is just that – personal. When an organisation fails to protect it from loss, damage or theft it is more than an inconvenience. That’s why the law is clear – when you are entrusted with personal data you must look after it. Those that don’t will face scrutiny from my office to check they have taken appropriate steps to protect fundamental privacy rights.”

The breach hit almost 500,000 people. The ICO statement reveals the breach is believed to have started in June 2018, previous statements from BA said it began in late August. The data watchdog described the attack as diverting user traffic from BA’s site to a fraudulent site.

ICO investigators found a variety of information was compromised including log-in details, card numbers, names, addresses and travel information.

Sophisticated card skimming group Magecart, which also hit Ticketmaster, was blamed for the data slurp. The group is believed to have exploited third party scripts, possibly modified JavaScript, running on BA’s site to gain access to the airline’s payment system.

Such scripts are often used to support marketing and data tracking functions or running external ads.

British Airways website

British Airways: If you’re feeling left out of our 380,000 passenger hack, then you may be one of another 185,000 victims

READ MORE

The Reg revealed that BA parent company IAG was in talks with staff to outsource cyber security to IBM just before the hack was carried out.

The ICO acted as lead investigator but liaised with several other European Union regulators. It said BA cooperated with its investigation and had now made security improvements to its site.

BA and the other regulators now have 28 days to make representations to reduce the fine.

In response, the airline said it was disappointed in the fine because it cooperated fully and had found no evidence that the stolen cards were used. It said it would make representations and appeal the decision.

The ICO statement is here. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/08/ico_threatens_ba_with_huge_fine_for_huge_data_loss/

Broadcom Moves Forward on Symantec Acquisition

Reports indicate a deal could be made by mid-July as Broadcom secures financing for the purchase.

Broadcom has reportedly taken steps toward its acquisition of Symantec with newly secured lending commitments and identification of areas for cost savings, according to Bloomberg.

The all-cash transaction, which could be finalized as early as mid-July if progress continues, values Symantec at $22 billion, including debt, sources say. Broadcom has allegedly secured financing from several banks and foresees synergy potential of $1.5 billion. This would be its second big investment in software; Broadcom bought CA Technologies for $18 billion in 2018.

Broadcom is not the only company interested in the security company, the report points out. Former Symantec CEO Greg Clark has partnered with Permira Holdings and Advent International to attempt a buyout; so far, the team hasn’t been able to offer a competing price.

Read more details here.

 

 

 

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

 

 

 

 

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/broadcom-moves-forward-on-symantec-acquisition/d/d-id/1335162?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

New Year’s eve gaming DDoSer lulz himself into a 27-month sentence

Back in 2014, an entity calling itself @DerpTrolling was one of a bunch of squabbling steamrollers that just about pancaked the gaming world with multiple distributed denial-of-service (DDoS) attacks before, during and after New Year’s Eve.

At the time, @DerpTrolling called itself a group of hackers and, in a chat with the YouTube gaming channel #DramaAlert, said that he/she/they simply attacked sites based on requests from people who tweeted suggested targets.

In other words, it was all just a game, and it was all for the lulz.

In November 2018, one of the “gang” of hackers – possibly the only one – behind the @DerpTrolling moniker got busted. Austin Thompson, a 23-year-old from the US state of Utah, pleaded guilty on 6 November 2018 in a San Diego Federal court to knowingly causing damage to third-party computers.

There’s no lulzing now: on Tuesday, Thompson was sentenced in federal court to 27 months in prison for carrying out a series of DDoSes against multiple victims between 2013 and 2014.

He was also ordered to pay $95,000 in restitution to one of the victims, Daybreak Games, formerly Sony Online Entertainment.

As is typical in online gaming, this was a tit-for-tat battle. Another Twitter user who claimed responsibility for attacking the digital gaming service Steam, @chFtheCat, said in one tweet that the reason she/he/they “hit Steam off” is because @DerpTrolling hit off servers for the Electronic Arts (EA) game service Origin.

The gaming servers that were knocked offline included World of Tanks, RuneScape, Battlefield 3 and 4, EverQuest and EverQuest2, Club Penguin, Fifa Soccer 13 and 14, League of Legends, Minecraft, the Sony Playstation Network, EA, and even North Korea’s state-run news agency, kcna.kp.

According to the plea agreement, @DerpTrolling mainly launched the attacks at online gaming companies and servers. Thompson typically used the Twitter account @DerpTrolling to announce that an attack was coming and then posted “scalps” (screenshots or other photos showing that victims’ servers had been taken down) after the attack. The attacks took down game servers and related computers around the world, often for hours at a time, causing what the plea agreement estimated was at least $95,000 in damages.

Thompson, now free on bond, has been ordered to surrender to authorities on 23 August 2019 to begin his sentence.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/XAqynNqP6so/

ISPs call Mozilla ‘Internet Villain’ for promoting DNS privacy

The UK Internet Service Providers Association (ISPA) has provocatively shortlisted Mozilla for the sort of award that, on the face of it at least, no tech company should be keen to win – ‘2019’s Internet Villain’.

Mozilla’s claim to infamy? From ISPA’s point of view, it’s Firefox’s imminent inclusion of DNS over HTTPS (DoH) – a technology many experts endorse as the biggest jump for internet privacy since the expansion of HTTPS itself.

The problem, according to the ISPA press release, is that the arrival of this technology in the Firefox browser used by millions will make it possible to:

Bypass UK filtering obligations and parental controls, undermining internet safety standards in the UK.

The point of DoH (and the related DNS over TLS, or DoT) is to encrypt DNS requests, which makes it impossible, or at least very difficult, for entities such as ISPs or governments to monitor which websites people are visiting. And because the DNS requests are sent inside encrypted HTTPS requests they’re also indistinguishable from other web traffic, so they can’t be blocked without blocking all web traffic.

To privacy enthusiasts, this is good because neither ISPs nor governments have any business knowing which domains users happen to frequent.

For ISPs, by contrast, DoH hands them several headaches, including how to fulfil their legal obligation in the UK to store a year’s worth of each subscriber’s internet visits in case the government wants to study them later for evidence of criminal activity.

Years in the making, this is a collision foretold. One side (Mozilla and Cloudflare, the latter providing the DoH resolution that supports the whole endeavor) thinks that internet privacy is an immutable principle that demands a technical solution, the other (governments, police and at least one anti-child abuse campaign group) think that privacy carries risks that must always be qualified through intervention.

Privacy conundrum

The arguments against DoH are technically involved but focus on one central objection.

For ISPs to block undesirable websites (child abuse, terrorism, copyright infringement, etc) they must filter traffic using a  domain blacklist. Anything that successfully hides the domains people are visiting makes that approach redundant.

However, as has been pointed out, this layer of filtering can already be bypassed by visiting domains ISPs haven’t added to their blacklists, including ones hosted on the dark web that are only accessible using a browser like Tor.

Then there’s the small problem of VPNs, which not only hide DNS from surveillance but can also hide the user’s geolocation, with the result that they are also a simple way to beat the UK’s forthcoming and contentious law requiring age verification for anyone visiting a porn site (which DoH itself has no effect on, despite claims to the contrary).

The direction of travel is unmistakable – the ways for web users to hide their web habits are growing in number and becoming more affordable, including by using simpler domain shielding tools such as Cloudflare’s 1.1.1.1 app (which will soon be bundled into a full VPN called Warp) or Google’s equivalent, Intra.

DoH inside Firefox, then, is simply a technology that turns this kind of privacy into something anyone can access without having to do anything.

The danger in the publicity-seeking approach chosen by ISPA is it ends up becoming a victim of the ‘Streisand effect’ – by complaining about it, ISPA may be encouraging the very thing it’s setting out to deter.

The reverse effect applies to Mozilla, which, privately, may not be too upset at being called out for implementing DoH, a technology it has not only strongly advocated but which has powerful backing of the Internet Engineering Task Force (IETF) in the form of RFC 8484.

Arguably, spying on which domains people visit was always an easy fix to impress politicians that dodged a lot of messier but more effective ways to track bad people in a targeted way.

If the ISPA and its members want to find a way out of this hole, they could do worse than invest time explaining the new realities to disappointed, frustrated lawmakers.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/pm2AHkwoYNg/

Privacy and security risks as Sign In with Apple tweaks Open ID protocol

To many, it sounded like a good idea when Apple announced its Sign In with Apple service at WWDC 2019 last month: a privacy-focused login feature that will let macOS Catalina and iOS 13 users sign into third-party apps and websites using their Apple IDs.

It’s a service that’s designed to rival those of the data-gobbling behemoths, Google, Twitter and Facebook, each of which have their own no-no-how-about-you-sign-in-with-ME authentication services. All of these services allow you to use your ID for a quick, one-click sign up or sign on, no password required, as long as you’re signed into whatever tech bigwig’s service that you’re using.

But on 27 June 2019, Apple’s implementation of a sign-in service that doesn’t send personal information to app and website developers was critiqued by the OpenID Foundation (OIDF), the standard-setting organization behind the OpenID open standard and decentralized authentication protocol. The non-profit organization includes tech heavyweights such as Google, Microsoft, PayPal, and others.

The OIDF published an open letter to Apple software chief Craig Federighi, lauding the company for having “largely adopted” OpenID Connect into Sign In with Apple. OpenID Connect is a standardized protocol used by many existing sign-in platforms that lets developers authenticate users across websites and apps without them having to use separate passwords.

However, things are not all hunky dory with Apple’s implementation of OpenID Connect, according to Nat Sakimura, OpenID Foundation Chairman. From his letter:

The current set of differences between OpenID Connect and Sign In with Apple reduces the places where users can use Sign In with Apple and exposes them to greater security and privacy risks. It also places an unnecessary burden on developers of both OpenID Connect and Sign In with Apple.

Parting of the ways

The OIDF published this list of ways in which Sign In with Apple differs from OpenID Connect and what security and/or privacy risks those deviations entail.

For example, Apple’s tweaks to OpenID means that the protocol can’t thwart Cross Site Request Forgery (CSRF) attacks.

We saw an example of what that could lead to in February when a researcher discovered that Facebook had a CSRF flaw that could have allowed an attacker to hijack accounts in multiple ways. As we said at the time, CSRF flaws enable attackers to trick users into making unintended actions on websites they may be logged into but aren’t using (imagine clicking a link on a malicious website and it triggering a bank transfer at the bank website you forgot to log out of).

Another one of Apple’s spec violations enables attackers to pull off code injection attacks. This type of vulnerability can prove disastrous: for example, it allows computer worms to propagate.

Apple’s deviations from OpenID protocol could also lead to privacy problems, given that users’ ID Token and Authorization Code – and, hence, personal data – could potentially leak… personal data that could be used for a code insertion attack, the OpenID Foundation says.

Which is ironic, given that Sign In with Apple is supposed to present a privacy-conscious alternative to the services offered by Facebook and Google. The whole idea behind Sign In with Apple is to make signing in – and signing up – to websites as simple as possible, without having to provide any personal information.

Those are just some of Apple’s spec violations, but there’s an even longer list of “peculiarities” in Sign In with Apple, Sakimura wrote – weirdnesses that include, for example, forcing developers to read through the Apple docs to find out about endpoints, scopes, signing algorithms, authentication methods and more, since Apple apparently didn’t publish a Discovery document at its OpenID configuration page.

Cut a developer some slack, would ya?

The OIDF asked Apple to fix the situation by doing these things:

  1. Address the gaps between Sign In with Apple and OpenID Connect based on the feedback.
  2. Use the OpenID Connect Self Certification Test Suite to improve the interoperability and security of Sign In with Apple.
  3. Publicly state that Sign In with Apple is compatible and interoperable with widely-available OpenID Connect Relying Party software.
  4. Join the OpenID Foundation.

From the letter:

By closing the current gaps, Apple would be interoperable with widely available OpenID Connect Relying Party software.

Apple’s updated Human Interface Guidelines are also asking app developers to place its authentication feature above other rival third-party sign-in options wherever they appear.

Apple hadn’t responded to the OIDF’s letter as of Friday.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/aa_DjpM2IM0/

UK data regulator threatens British Airways with 747-sized fine for massive personal data blurt

The UK Information Commissioner’s Office has warned BA it faces a whopping £183.39m following the theft of million customer records from its website and mobile app servers.

The record-breaking fine – more or less the lower end of the price of one of the 747-400s in BA’s fleet – under European General Data Protection Regulation (GDPR), represents 1.5 per cent of BA’s world-wide revenue in 2017.

Information Commissioner Elizabeth Denham said: “People’s personal data is just that – personal. When an organisation fails to protect it from loss, damage or theft it is more than an inconvenience. That’s why the law is clear – when you are entrusted with personal data you must look after it. Those that don’t will face scrutiny from my office to check they have taken appropriate steps to protect fundamental privacy rights.”

The breach hit almost 500,000 people. The ICO statement reveals the breach is believed to have started in June 2018, previous statements from BA said it began in late August. The data watchdog described the attack as diverting user traffic from BA’s site to a fraudulent site.

ICO investigators found a variety of information was compromised including log-in details, card numbers, names, addresses and travel information.

Sophisticated card skimming group Magecart, which also hit Ticketmaster, was blamed for the data slurp. The group is believed to have exploited third party scripts, possibly modified JavaScript, running on BA’s site to gain access to the airline’s payment system.

Such scripts are often used to support marketing and data tracking functions or running external ads.

British Airways website

British Airways: If you’re feeling left out of our 380,000 passenger hack, then you may be one of another 185,000 victims

READ MORE

The Reg revealed that BA parent company IAG was in talks with staff to outsource cyber security to IBM just before the hack was carried out.

The ICO acted as lead investigator but liaised with several other European Union regulators. It said BA cooperated with its investigation and had now made security improvements to its site.

BA and the other regulators now have 28 days to make representations to reduce the fine.

In response, the airline said it was disappointed in the fine because it cooperated fully and had found no evidence that the stolen cards were used. It said it would make representations and appeal the decision.

The ICO statement is here. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/08/ico_threatens_ba_with_huge_fine_for_huge_data_loss/

Medway Council reforms eforms to stop blurting out residents’ details

Medway council in Kent has corked a hole in its website that spat out residents’ names, mailing addresses, phone numbers and email addresses after a Reg reader got in touch to complain.

The breach appeared courtesy of some of Medway Council’s electronic forms.

The council’s eforms were conceived during a collaboration of several bodies across Kent – the Kent Channel Migration Project – which looked at “ways to encourage more use of digital technologies within high-volume local government services.”

But according to this cached report (PDF), the launch was held back due to some “very clear flaws” – although they were in “usability and design” rather than, say, insecure object reference bugs or other security issues.

In April, the council announced on its Facebook page that eforms were going to be made “easier” for residents to use.

El Reg understands that at least a subset of these were configured with enumerable parameters and – by the looks of things – even allowed visitors write access. By changing a few digits in a URL on the relevant subdomain, our reader was able to access strangers’ personal data and we were easily able to reproduce the problem last week.

hollywood sign from behind

Kent council plans giant ‘Hollywood’ erection

READ MORE

Council devs, who we understand maintain the forms, were very responsive, fixing the eforms config problem within two days of The Reg alerting them to the issue.

A Medway Council spokesperson said: “We immediately removed the potentially affected forms from our website when we became aware of the potential issue. We have carried out an initial review of the matter and have found that just one form was affected in certain circumstances. We have provided an initial report to the Information Commissioner’s Office. We have also taken action to fully resolve the technical issue with the form to avoid this happening again. We take all steps to ensure personal data is protected.”

Independent security researcher Paul Moore told The Reg: “The fact this bug made it to production demonstrates that developers may not have a sound understanding of secure development practices and also brings into question their QA/security testing procedures; this type of so-called low-hanging fruit bug should be identified with the most rudimentary of tests. However, with council budgets squeezed almost to the point of bankruptcy, it’s hardly surprising.”

It’s not the council’s first time at the data protection rodeo. Just two years ago, in 2017, the local authority was rapped for not complying with an order by the Information Commissioner’s Office to keep on track with its data protection training (PDF), which itself was given during a 2015 audit. That same year, privacy watchdog Big Brother Watch found eight breaches of the Data Protection Act had taken place over the previous three years.

The council has since complied with the order, the ICO confirmed to The Reg.

rochester castle

Local residents review the council.

Back in 2014, the council said its Twitter feed had been taken over by an individual or individuals calling themselves the “citizens of Medway” – announcing, among other things, that council tax had been cancelled.

It is not known how many residents actually used the electronic forms, but El Reg saw many of them.

The Medway Council area – which encompasses Rochester, Chatham, and Gillingham – is home to about 277,616 people, according to the most recent figures from the Office of National Statistics. Points of interest include the Chatham naval dockyard and the Norman Rochester castle; part of it was insanely torn down in the late 1870s to make way for municipal gardens, but it is mostly well-preserved. Megalith hunters should also note there are not one, not two, but six early Neolithic long barrows in the area, the most impressive of which is “Kit’s Coty House” in Aylesford, which sports three large uprights and a massive capstone, with a smaller burial chamber nearby topped with a pile of toppled sarsens.

If you fancy doing something a little closer to the 21st century’s Noughties – rather than the c 4000BC-3000BC noughties – Craig David will be performing at Rochester Castle this week.

In the immortal words of David: “She asked me for the time… I said it’d cost her name. A six-digit number and a date with me the ICO tomorrow at nine…”

The Reg responsibly disclosed the data leak to Medway Council and the ICO last week and waited until it was fixed to publish this story. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/08/medway_data_breach/

7 Hot Cybersecurity Trends to Be Highlighted at Black Hat

Just some of the research and ideas worth checking out at this year’s ‘security summer camp.’PreviousNext

Image Source: Adobe Stock (stokkete)

Image Source: Adobe Stock (stokkete)

Black Hat USA is fast approaching. With the full conference schedule online, now is the time for security pros to dive in and plan out their paths to exploring a wide range of learning opportunities. As with years past, the conference will feature sessions about new zero-day vulnerabilities, research that stretches the bounds of what’s breakable in emerging technology, and new methods of defending systems in the ever-evolving tech world.

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full BioPreviousNext

Article source: https://www.darkreading.com/7-hot-cybersecurity-trends-to-be-highlighted-at-black-hat/d/d-id/1335152?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Fibaro flummoxed, Georgia courts held for ransom, and more

Between the plentiful beverages and copious amounts of meat, pretty much everyone in the US is hung over from Independence Day in one form or another, so let’s jump right into the security news.

When is a backup not a backup? When it’s for hacked Fibaro smarthome gear

The popular Fibaro smart-home system holds a cocktail of security holes that together let bad guys take complete control.

Kaspersky’s research team says combination of authorization bypass, remote code execution, and SQL injection flaws would allow an attacker to modify the cloud backups for a given Fibaro Home Center in such a way that, when installed, would allow for remote control of the entire smart home system.

Using a Kaspersky colleague as a willing participant, Cheremushkin’s team said they were able to modify and re-upload a backup of the firmware. From there, the mark could be sent an email or other alert telling them to restore from a backup, loading the poisoned code.

“One of the main tasks of the device we investigated is to integrate all smart things so that the home owner could manage them from Home Center itself,” Kaspersky ICS CERT team member Pavel Cheremushkin explained.

“A ‘smart thing’ here can be not just a light bulb or kettle, but vital safety equipment: for example, alarms, window/door/gate opening and closing mechanisms, surveillance cameras, heating/air conditioning systems, etc.”

Fortunately, Kaspersky and Fibaro say the vulnerabilities have since been patched with no reports of attacks in the wild.

OceanLotus smells a RatSnif

Blackberry Cylance researchers say an hacking operation known as OceanLotus has rolled out a nasty new series of attack tools.

Known as RatSnif, the new kit is actually a series of remote access trojans that the OceanLotus crew is using to break into networks and steal data from targets in the Asia region.

“Blackberry Cylance threat researchers have analyzed the Ratsnif trojans, which offer a veritable swiss-army knife of network attack techniques,” the researchers say.

“The trojans, under active development since 2016, combine capabilities like packet sniffing, gateway/device ARP poisoning, DNS poisoning, HTTP injection, and MAC spoofing.”

7-11 Japan takes “always open” too far

An attempt by the Japanese branch of convenience store chain 7-11 to offer mobile payments took a disastrous turn this week thanks to a glaring security oversight.

Yahoo! News! Japan! reports that the 7Pay system, a smartphone payment app, was pulled just one day after its introduction because of a rash of account thefts and fraudulent charges.

The problem lied in the password reset system. The app allowed a user to armed with just an email address, date of birth, and phone number to not only reset a password, but have the reset message sent to a different email address without the owner getting any sort of notification.

As you might imagine, this lead to an almost immediate outbreak of thefts, as a bit of simple searching or social engineering would give an attacker everything they needed to hijack an account and then use it to purchase items at 7-11 stores.

Maryland reports government database breach

The US state of Maryland says it has lost personally identifiable information on some 78,000 people who were enrolled in two of its unemployment assistance programs.

The Department of Labor said that earlier this year it believed some of its records had been exposed and called in the state’s IT service. This lead to the revelation that one of the department’s databases had been left accessible to the open internet.

“The LWIS files impacted were from 2009, 2010, and 2014. These files possibly contained first names, last names, social security numbers, dates of birth, city or county of residence, graduation dates and record numbers,” the DOL said.

“The files impacted on the unemployment insurance service database were from 2013 and possibly contained first names, last names, and social security numbers.”

So far, the DOL says it has found no indications of a compromise.

Georgia court system latest ransomware victim

Yet another local government has reported having its systems compromised by ransomware.

The state of Georgia has confirmed that part of the online records system for the state courts was taken offline after some of its systems were infected with ransomware. This, in turn, lead to servers being unplugged in order to quarantine them from the malware.

The state said that no personally identifiable information was being stored on any of the affected systems and all of the documents on this particular service were all publicly available.

Speaking of ransomware…

Lake City IT boss fired for ransomware payment

Last week, word broke that the town of Lake City, FL, had opted to pay out a ransomware demand in order to get their data back. It turns out that decision is going to cost at least one person their job.

Local news reports that the mayor of the city has made the decision to terminate one employee who (presumably) was behind the decision to cough up the requested Bitcoin ransom rather than opt to wipe and restore the locked machines.

Android App making bogus purchases

An Android app with around 100 million installs was caught serving up ads and making fraudulent purchases.

Researchers with Upstream said that the 4shared file sharing app has been background code to silently generate false clicks for ad fraud and small purchases without user consent or notification. The fraudulent activity was traced to a component made by a third-party affiliate and has been offline since April. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/06/fibaro_flummoxed_georgia_courts_held_for_ransom_and_more/

Cisco delivers Patch Tuesday warmup with bundle of 18 bug fixes

Cisco has delivered a bundle of 17 security updates to address 18-CVE-listed vulnerabilities in its networking and communications gear.

Switchzilla has classified 10 of the fixed bugs as high security issues, with exploits leading to everything from command and code execution to denial of service- a particularly serious problem for networking gear. There are no critical vulnerabilities to fix this time around, so breath easier US admins who may be off for the Traitor’s Day Brexit 1776 Independence Day weekend.

Among the more prominent bugs include a denial of service flaw in Web Security Appliance caused by sending a malformed certificate and a DLL preloading code execution vulnerability in Jabber.

Cisco’s Small Business switches were patched for two high-rated flaws, one allowing for denial of service from HTTP requests and another and the second a memory corruption flaw from the handling of SSL certificates.

Switchzilla also addressed a security bypass vulnerability in the Nexus 9000 switches and both a command injection and arbitrary read/write flaw in the NFV Infrastructure software.

The medium level of fixes includes a patch for two CVE-listed vulnerabilities in the Firepower Management Center, both potentially allowing for cross-site scripting bugs and a denial of service error in the IOS XR border gateway protocol.

Cisco’s IP phone- both the 7800 and 8800 series, were found to contain a denial of service flaw that would let an attacker prevent the phones from registering by sending them malformed SIP payloads, and the email security appliance was patched for a pair of filter bypass vulnerabilities.

Admins would be well advised to set aside time to check and install any needed Cisco packages before Tuesday, when Microsoft, SAP, and Adobe are all scheduled to drop their own monthly updates for July. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/05/cisco_patch_fix/