CISA Issues Warning to Patch Your Systems Against State-Sponsored Cyber Threats
A joint Cybersecurity Advisory (CSA) was issued by CISA, the FBI, and the NSA to warn organizations of threats posed by Russian state-sponsored cyber attack operations. The CSA is part of the organization’s mission to warn organizations and help the community reduce the risk posed by these threats. In addition, the advisory lists several CVEs for prioritized mitigation to increase organizational resiliency and reduce the risk of network compromise and business infrastructure degradation.
Of the 16 noted CVEs, only 4 were published within the last year, and several dating back to 2018 and 2019. Surprisingly, this is a rather “new” set of vulnerabilities compared to previous CSAs published. Although these are newer vulnerabilities than before, many organizations without strong automation and patch management solutions will find themselves unable to patch even years-old vulnerabilities, much less reach the critical 24/72 threshold for patching zero-day vulnerabilities (24-hour response) and critical vulnerabilities (72-hour response).
CISA Recommends Best Practices for Vulnerability Management
In its cybersecurity advisory, CISA provides some best practices to consider for patching and protecting corporate systems from a potential breach. Here’s a quick breakdown of those recommendations and what you can do to address them with an automated endpoint management platform like Automox:
- Be prepared
Confirm reporting processes and minimize personnel gaps in IT/OT security coverage. Create, maintain, and exercise a cyber incident response plan, resilience plan, and continuity of operations plan so that critical functions and operations can be kept running if technology systems are disrupted or need to be taken offline. - Enhance your organization’s cyber posture
Follow best practices for identity and access management, protective controls and architecture, and vulnerability and configuration management. - Increase organizational vigilance
Stay current on reporting on this threat. Subscribe to CISA’s mailing list and feeds to receive notifications when CISA releases information about a security topic or threat. - Keep systems and products updated and patched as soon as possible after patches are released
Automation is the only way to address the number of vulnerabilities patched each month. Most organizations take 102 days to patch systems, but with Automox you can confidently patch on day-0 of patch release, keeping your organization protected. Automation can ensure the next time the NSA releases a cybersecurity advisory like this you are already up to date and patched.
CISA also has a list of direct recommendations for vulnerability and configuration management:
- Update software
Prioritize patching known exploited vulnerabilities, especially those CVEs identified in this CSA, and then critical and high vulnerabilities that allow for remote code execution or denial-of-service on internet-facing equipment. - Use industry recommended antivirus programs
Set antivirus/antimalware programs to conduct regular scans of IT network assets using up-to-date signatures. - Implement rigorous configuration management programs
Ensure the programs can track and mitigate emerging threats. Review system configurations for misconfigurations and security weaknesses. - Disable all unnecessary ports and protocols
Review network security device logs and determine whether to shut off unnecessary ports and protocols. Monitor common ports and protocols for command and control activity.
You can read more about patch management best practices for modern workforces in a previous blog.
Vulnerabilities You Can Patch Now in Automox
Using Automox, you can immediately patch the Windows OS vulnerabilities highlighted in the NSA brief. These include:
- Found in Windows Exchange Server 2016 and 2019
CVSS: 9.8 - Critical
CVE-2021-26855 is a remote code execution vulnerability that exists in Microsoft Exchange. The vulnerability is part of an attack chain. The initial attack requires the ability to make an untrusted connection to Exchange server port 443. This can be protected against by restricting untrusted connections, or by setting up a VPN to separate the Exchange server from external access. Using this mitigation will only protect against the initial portion of the attack. Other portions of the chain can be triggered if an attacker already has access or can convince an administrator to open a malicious file.
- Found in Exim Simple Mail Transfer Protocol versions 4.87 to 4.91
CVSS: 9.8 - Critical
CVE-2019-10149 is an Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
- Found in Windows Exchange Server 2010, 2013, 2016 and 2019
CVSS: 7.8 - High
CVE-2021-26857 is a remote code execution vulnerability that exists in Microsoft Exchange. This CVE ID is unique from CVE-2019-0685, CVE-2019-0859. The vulnerability is part of an attack chain as with CVE 2021-26855.
- Found in Windows Exchange Server 2013, 2016 and 2019
CVSS: 7.8 - High
CVE-2021-26858 is a remote code execution vulnerability that exists in Microsoft Exchange. This CVE ID is unique from CVE-2019-0685, CVE-2019-0859. The vulnerability is part of an attack chain as with CVE 2021-26855.
- Found in Windows Exchange Server 2013, 2016 and 2019
CVSS: 7.8 - High
CVE-2021-27065 is a remote code execution vulnerability that exists in Microsoft Exchange. This CVE ID is unique from CVE-2019-0685, CVE-2019-0859. The vulnerability is part of an attack chain as with CVE 2021-26855.
We provides a 100% CloudNative IT Endpoint operations platform for modern organizations. As a comprehensive EndPointManagement Platform, it has advanced SoftwareManagement for PatchManagement, Adding, Removing, and Updating Software, Changing and Configure Settings along with PolicyManagement on any device or operating system located anywhere in the world and at any time. With the push of a button, ITAdministartors can fix CriticalVulnerabilities faster, slash cost and complexity, and win back hours in the day.If you want to know more kindly Click here