Monday, December 21, 2015

Bad actors race to exploit Juniper firewall vulnerability

Efforts afoot to reverse engineer the flaw and create commodity exploits

Now that Juniper has created a patch for its vulnerable firewall/VPN appliances, bad actors are setting to work reverse engineering the flaw so they can exploit devices that users don’t patch, and also make a profit by selling their exploits to others.

UPDATE: Wired reports a Dutch security firm claims it found the backdoor to ScreenOS within six hours of receiving the patch. Also, Reuters reports the Department of Homeland Security is investigating and CNN says the FBI is investigating as well.

“That’s what they do,” says John Pironti, president of IP Architects, who says he spent Friday responding to concerns about the compromised Juniper firewalls with his clients.

The pattern cyber criminals follow after vendors patch vulnerabilities is to compare the patched code to the unpatched code, figure out what the flawed code was and figure out how to use it to break into the device and the network it protects, Pironti says.

In this case Juniper says the flaw can be exploited to completely compromise a NetScreen firewall/VPN appliance via unauthorized remote administrator access via telnet or SSH, wipe out logs that would reveal the attack, and decrypt VPN traffic.

Once the reverse engineers do that, they’ll start trying out the exploit on whatever NetScreen devices they can locate in real-world networks hoping to find ones that aren’t patched, Pironti says. After that the exploits will go up for sale in underground markets and wend their way into open source penetration-testing platforms such as metasploit.

Inevitably some users fail to apply critical patches for years and years after they have been issued, he says. “It will be used for years,” he says. “This will not go away overnight.”

Since attackers can erase any trace they exploited a NetScreen appliance, IT security teams should start checking logs in the devices in line behind the firewall/VPNs. They should look for consistent and persistent traffic originating from unfamiliar and atypical IP address ranges that could represent the attackers moving inside the network once they’ve cracked the appliance, Pironti says. “See if they tried to get elsewhere,” he says.

Meanwhile, as of Friday, Juniper had yet to answer some key questions about the bad code.

In response to emails seeking more information, Juniper reiterated part of its initial announcement about the patches and provided a link to its formal advisory, but that’s it.

vulnerability?
Is there any way to find out if the vulnerability has been exploited in a particular device?

“I think that Juniper does owe us more information,” says Joel Snyder, senior partner in Opus One, a technology consultancy that has tested network firewalls for Network World. “In any case, I think that Juniper should be forthcoming with more information to let us know if they think that this was put in accidentally, on purpose, and by whom.”

It’s possible the bug was put there by a nation-state, he says, but “I would guess that it is just as likely that this is a human error and someone put something in ignorantly or for debugging that they forgot to take out.”

“People have been quick to say that this is linked to the NSA/InfoSec community in the [U.S. government], but I seriously doubt that. ... This was something IN the code, and it was introduced in the last few years after the product was REALLY mature.”

But the wording of the Juniper announcement – it pins the problem on “unauthorized code” – makes Pironti think it was an implant, software placed in the operating system intentionally to facilitate attacks. “Unauthorized code, to me, means an implant. It’s not like someone fat-fingered an entry.”


Monday, December 7, 2015

Windows 10 Mobile gets an end-of-life date, surrounded by mystery

Microsoft promises at least two years of “incremental” updates for its current smartphone operating system.

Microsoft has posted an end-of-life date for Windows 10 Mobile, though it raises more questions than it answers.

According to Microsoft’s support website, mainstream Windows 10 Mobile support will cease on January 9, 2018. However, the posting also says Microsoft will make extended support updates and security patches available for “a minimum of 24 months after the lifecycle start date” of November 16, 2015.

Stranger still, the support site originally listed an end date of January 8, 2019 when WinBeta discovered it last night, with Microsoft promising updates for “a minimum of 36 months.” Since then, the document has changed to reduce Windows 10 Mobile’s lifespan by one year.

It gets weirder. Although Microsoft has previously said that Microsoft alone would distribute Windows 10 Mobile updates, with wireless carriers playing just a supporting role, the support document suggests otherwise. “The distribution of these incremental updates may be controlled by the mobile operator or the phone manufacturer from which you purchased your phone, and installation will require that your phone have any prior updates,” it says. (Windows Insiders can always install preview builds without going through carriers, though this increases the risk of running into bugs.)

Microsoft’s support site doesn’t shed any light on what will happen after January 2018. We can only speculate that a more significant upgrade for Microsoft’s mobile operating system will arrive, assuming the whole effort hasn’t cratered by then.

Why this matters: Long-lasting hardware support has been a touchy issue for Windows Phones over the years. Windows Phone 7 was a clean break from the old Windows Mobile, and Microsoft famously abandoned Windows Phone 7 users (and the existing app ecosystem) when it moved to Windows Phone 8. With Windows 10 Mobile, Microsoft has repeatedly walked back its upgrade promises for existing phones, and today the only phone running the latest stable operating system are the brand-new Lumia 950 and Lumia 950 XL. With Microsoft’s support document leaving plenty of open questions, Windows phone fans could be reasonably skittish about their upgrade paths from here on.