If you’ve missed WaterISAC’s prior posts (listed below) on the exploitation of critical vulnerabilities and importance of patching VPN devices, you’re in luck! The NSA and CISA released a cybersecurity information sheet Selecting and Hardening Standards-based Remote Access VPN Solutions to address the potential security risks associated with using Virtual Private Networks (VPNs).
With all of the exploitation of old and newly discovered vulnerabilities impacting VPN devices, it’s critical for members to address the VPN solutions within their environments – often that means patching. Threat actors (including ransomware groups) are actively exploiting flaws from 2017 through 2021 because organizations are not applying available patches in a timely fashion. For hardening standards and selecting the right VPN for your environment, visit CISA.
References:
- https://www.waterisac.org/portal/ransomware-resilience-%E2%80%93-deferred-patching-could-result-ransomware-attack
- https://www.waterisac.org/portal/critical-ssl-vpn-vulnerabilities-across-multiple-products-%E2%80%93-please-patch-%E2%80%98em-if-you-got-%E2%80%98em
- https://www.waterisac.org/portal/pulse-connect-secure-pcs-ssl-vpn-vulnerability-exploitation-activity-updated-july-22-2021
- https://us-cert.cisa.gov/ncas/current-activity/2021/09/28/cisa-and-nsa-release-guidance-selecting-and-hardening-vpns
- https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/2791320/nsa-cisa-release-guidance-on-selecting-and-hardening-remote-access-vpns/