GoSecure Blog
Forget Your Perimeter:
RCE in Pulse Connect Secure (CVE-2020-8218)
A vulnerability discovered by GoSecure on Pulse Secure Connect, an SSL VPN, allows an authenticated user to run arbitrary code remotely (RCE). The RCE requires to have admin privileges but can also be triggered by an unsuspecting victim simply clicking on a malicious link. Several other vulnerabilities of varying severities were also found and disclosed, however only the RCE was fixed as of version 9.1R8 and will therefore be the focus of this blog post. We will release the details of the remaining vulnerabilities in a later blog post.
Endpoint Visibility: Discrepancies in Defenders’ Perception and Pentesters’ Experience
As part of our research on Cybersecurity Perceptions Versus Reality, we developed a survey in collaboration with Serene-risc, a knowledge mobilization network in cybersecurity based in Canada, on the perceptions and practices of cybersecurity professionals. The survey aimed at understanding how defenders perceive specific security measures and whether these measures were implemented in their respective organizations. We then combined the survey results with our penetration testing experience to confront two perspectives: the defenders’ and the pentesters’, the latter standing as proxies for real attackers. This blog post summarizes the results related to endpoint visibility.
Asset Inventories: Stay Up to Date!
Having an asset inventory is a common security practice. Yet, keeping that inventory up to date seems to be less common. GoSecure penetration testers report encountering unmaintained asset inventories quite often, allowing them to exploit forgotten servers hosting known vulnerabilities. This blog post highlights findings related to asset inventory maintenance uncovered through our research on Cybersecurity Perceptions Versus Reality.
The Easy Way In: Products’ Features Vulnerable by Default!
As part of our research on Cybersecurity Perceptions Versus Reality, we developed a survey in collaboration with Serene-risc, a knowledge mobilization network in cybersecurity based in Canada, on the perceptions and practices of cybersecurity professionals. The survey aimed at understanding how defenders perceive specific security measures and whether these measures were implemented in their respective organizations. We then combined the survey results with our penetration testing experience to confront two perspectives: the defenders’ and the pentesters’, the latter standing as proxies for real attackers. This blog post summarizes the results related to products’ features enabled by default that could represent a security risk.
Patch Management: A Cybersecurity Priority Yet to be Fully Implemented
As part of our research on Cybersecurity Perceptions Versus Reality, we developed a survey in collaboration with Serene-risc, a knowledge mobilization network in cybersecurity based in Canada, on the perceptions and practices of cybersecurity professionals. The survey aimed at understanding how defenders perceive specific security measures and whether these measures were implemented in their respective organizations. We then combined the survey results with our penetration testing experience to confront two perspectives: the defenders’ and the pentesters’, the latter standing as proxies for real attackers. This blog post summarizes the results related to patch management.