Health-ISAC Vulnerability Bulletin
Date April 17, 2020
Event: Continued Threat Actor Exploitation Post Pulse Secure VPN Patching
Summary:
On April 16, 2020, DHS Cybersecurity and Infrastructure Security Agency
(CISA) published an Activity Alert “Continued threat actor exploitation post
Pulse Secure VPN patching”, AA20-107A. The Alert provides an update to CISA
Alert AA20-010A: Continued Exploitation of Pulse Secure VPN Vulnerability,
which advised organizations to immediately patch CVE-2019-11510-an arbitrary
file reading vulnerability affecting Pulse Secure virtual private network
(VPN) appliances. CISA is providing this update to alert enterprises that
threat actors who successfully exploited CVE-2019-11510 and stole a Pulse
VPN credential will still be able to access-and move laterally through-that
organization’s network even after they patched this vulnerability if the
organization did not change those stolen credentials.
Health-ISAC shared a Threat Bulletin on August 21, 2019, that referenced how
the DEVCORE cybersecurity research team demonstrated exposure to critical
vulnerabilities in each of three popular enterprise VPN services, due to
their common use of exposed SSL certificates and processes. The
demonstration was presented originally at the 2019 Blackhat and DEF CON
conferences in Las Vegas, NV, (August 7, and August 9, 2019).
Analysis:
The CISA Activity Alert (AA20-107A) provides new detection methods for this
activity, including a CISA-developed tool that helps network administrators
search for indicators of compromise (IOCs) associated with exploitation of
CVE-2019-11510. The alert also provides mitigations for victim organizations
to recover from attacks resulting from CVE-2019-11510. CISA encourages
network administrators to remain aware of the ramifications of exploitation
of CVE-2019-11510 and to apply the detection measures and mitigations
provided in this report to secure networks against these attacks.
CISA has conducted multiple incident response engagements at U.S. Government
and commercial entities where malicious cyber threat actors have exploited
CVE-2019-11510-an arbitrary file reading vulnerability affecting Pulse
Secure VPN appliances-to gain access to victim networks. Although Pulse
Secure released patches for CVE-2019-11510 in April 2019,[2] CISA has
observed incidents where compromised Active Directory credentials were used
months after the victim organization patched their VPN appliance.
Please see the attached US-CERT link
< https://www.us-cert.gov/ncas/alerts/aa20-107a AA20-107A and original
documentation that will provide more in-depth analysis:
– Health-ISAC Threat Bulletin on August 21, 2019
– CISA Activity Alert < https://www.us-cert.gov/ncas/alerts/aa20-107a
– Technical Details
– Cyber Threat Actor Behavior in Victim Network Environments
– IOC Detection Tool
– Mitigations
– and more…
– Indicators of Compromise
– Link for STIX and TAXII – For a downloadable copy of IOCs, see
< https://www.us-cert.gov/sites/default/files/publications/AA20-107A_IOCs(WHI
Recommendations:
CISA strongly urges organizations that have not yet done so to upgrade their
Pulse Secure VPN to the corresponding patches for CVE-2019-11510. If-after
applying the detection measures in this alert- organizations detect evidence
of CVE-2019-11510 exploitation, CISA recommends changing passwords for all
Active Directory accounts, including administrators and services accounts.
CISA also recommends organizations to:
– Look for unauthorized applications and scheduled tasks in their
environment.
– Remove any remote access programs not approved by the organization.
– Remove any remote access trojans.
– Carefully inspect scheduled tasks for scripts or executables that
may allow an attacker to connect to an environment.
If organizations find evidence of malicious, suspicious, or anomalous
activity or files, they should consider reimaging the workstation or server
and redeploying back into the environment. CISA recommends performing checks
to ensure the infection is gone even if the workstation or host has been
reimaged.
Health-ISAC recommends members maintain an offsite backup of critical data
to protect against loss of integrity or availability of data in the event of
a breach due to one the CVEs above being exploited. Please review the Health
Industry Cybersecurity Practices (HICP): Managing Threats and Protecting
Patients publication for additional best practices available
< here.
References:
US-CERT – Continued Threat Actor Exploitation Post Pulse Secure VPN Patching
https://www.us-cert.gov/ncas/alerts/aa20-107a>
https://www.us-cert.gov/ncas/alerts/aa20-107a
Health-ISAC Threat Bulletin on August 21, 2019
– Link to Document https://h-isac.org/health-isac-threat-bulletin-8-21-19/
Pulse Secure Advisory SA44101
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101;
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
Twitter. @XMPPwocky. (2019, August 23). Your least favorite construct
<https://twitter.com/XMPPwocky/status/1164874297690611713/photo/1;
https://twitter.com/XMPPwocky/status/1164874297690611713/photo/1
OpenSecurity Forums. Public vulnerability discussion. (2019, August 23).
<https://opensecurity.global/forums/topic/184-pulse-secure-ssl-vpn-vulnerabi
lity-being-exploited-in-wild/?do=findComment&comment=848;
https://opensecurity.global/forums/topic/184-pulse-secure-ssl-vpn-vulnerabil
ity-being-exploited-in-wild/?do=findComment&comment=848
GitHub. BishopFox / pwn-pulse.
<https://github.com/BishopFox/pwn-pulse/blob/master/pwn-pulse.sh>
https://github.com/BishopFox/pwn-pulse/blob/master/pwn-pulse.sh
File disclosure in Pulse Secure SSL VPN (Metasploit)
https://www.exploit-db.com/exploits/47297>
https://www.exploit-db.com/exploits/47297
Twitter. @alyssa_herra
https://twitter.com/alyssa_herrera_/status/1164089995193225216?s=11;
https://twitter.com/alyssa_herrera_/status/1164089995193225216?s=11
OpenSecurity Forums. Public vulnerability discussion. (2019, August 23).
https://opensecurity.global/forums/topic/184-pulse-secure-ssl-vpn-vulnerabi
lity-being-exploited-in-wild/?do=findComment&comment=848;
https://opensecurity.global/forums/topic/184-pulse-secure-ssl-vpn-vulnerabil
ity-being-exploited-in-wild/?do=findComment&comment=848
OpenSecurity Forums. Public vulnerability discussion. (2019, August 31).
https://opensecurity.global/forums/topic/184-pulse-secure-ssl-vpn-vulnerabi
lity-being-exploited-in-wild/?tab=comments#comment-887;
https://opensecurity.global/forums/topic/184-pulse-secure-ssl-vpn-vulnerabil
ity-being-exploited-in-wild/?tab=comments#comment-887
- Related Resources & News
- Leveraging ISO 81001-5-1 Amid Medical Device Procurement
- Mitigating risk as healthcare supply chain attacks prevail
- Enhancing Cybersecurity in Rural Hospitals
- Health-ISAC Hacking Healthcare 11-15-2024
- Cyber Incident Response: Playbook for Medical Product Makers
- Feds Warn of Godzilla Webshell Threats to Health Sector
- Trump’s Return: Impact on Health Sector Cyber, HIPAA Regs
- Health-ISAC Hacking Healthcare 11-7-2024
- Protecting the Healthcare Supply Chain Against Russian Ransomware Attacks
- All hospitals should be concerned about cyberattacks. Here’s why