{"id":18718,"date":"2022-04-08T10:45:12","date_gmt":"2022-04-08T18:45:12","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/04\/08\/news-12451\/"},"modified":"2022-04-08T10:45:12","modified_gmt":"2022-04-08T18:45:12","slug":"news-12451","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/04\/08\/news-12451\/","title":{"rendered":"WatchGuard Didn&#8217;t Explicitly Disclose a Flaw Exploited by Hackers"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/624f3d3668e4cf22b8a370ce\/master\/pass\/WatchGuard-Firewall-Malware-Security-157420668.png\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Fri, 08 Apr 2022 13:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/dan-goodin-ars-technica\">Dan Goodin, Ars Technica<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Security vendor WatchGuard<\/span> quietly fixed a critical vulnerability in a line of its firewall devices and didn\u2019t explicitly disclose the flaw until Wednesday, following revelations hackers from Russia\u2019s military apparatus <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/04\/fbi-accesses-us-servers-to-dismantle-botnet-malware-installed-by-russian-spies\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/04\/fbi-accesses-us-servers-to-dismantle-botnet-malware-installed-by-russian-spies\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/04\/fbi-accesses-us-servers-to-dismantle-botnet-malware-installed-by-russian-spies\/\" rel=\"nofollow noopener\" target=\"_blank\">exploited it en masse<\/a> to assemble a giant botnet. After law enforcement agencies warned the security vendor that a Russian hacking group had infected some of its firewalls, the company simply released a detection tool for customers.\u00a0<\/p>\n<p class=\"paywall\">This story originally appeared on <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/04\/watchguard-failed-to-disclose-critical-flaw-exploited-by-russian-hackers\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/04\/watchguard-failed-to-disclose-critical-flaw-exploited-by-russian-hackers\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/04\/watchguard-failed-to-disclose-critical-flaw-exploited-by-russian-hackers\/\" rel=\"nofollow noopener\" target=\"_blank\">Ars Technica<\/a>, a trusted source for technology news, tech policy analysis, reviews, and more. Ars is owned by WIRED&#x27;s parent company, Cond\u00e9 Nast.<\/p>\n<p class=\"paywall\">Law enforcement agencies in the US and UK on February 23 warned that members of <a href=\"https:\/\/www.wired.com\/story\/sandworm-kremlin-most-dangerous-hackers\/\">Sandworm<\/a>\u2014among the Russian government\u2019s most aggressive and elite hacker groups\u2014were <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/russias-most-cut-throat-hackers-infect-network-devices-with-new-botnet-malware\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/02\/russias-most-cut-throat-hackers-infect-network-devices-with-new-botnet-malware\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/russias-most-cut-throat-hackers-infect-network-devices-with-new-botnet-malware\/\" rel=\"nofollow noopener\" target=\"_blank\">infecting WatchGuard firewalls with malware<\/a> that made the firewalls part of a vast botnet. On the same day, WatchGuard released a <a data-offer-url=\"https:\/\/detection.watchguard.com\/Detector\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/detection.watchguard.com\/Detector&quot;}\" href=\"https:\/\/detection.watchguard.com\/Detector\" rel=\"nofollow noopener\" target=\"_blank\">software tool<\/a> and <a data-offer-url=\"https:\/\/detection.watchguard.com\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/detection.watchguard.com\/&quot;}\" href=\"https:\/\/detection.watchguard.com\/\" rel=\"nofollow noopener\" target=\"_blank\">instructions<\/a> for identifying and locking down infected devices. Among the instructions was to ensure appliances were running the latest version of the company\u2019s Fireware OS.<\/p>\n<p class=\"paywall\">In court documents unsealed on Wednesday, an FBI agent wrote that the WatchGuard firewalls hacked by Sandworm were \u201cvulnerable to an exploit that allows unauthorized remote access to the management panels of those devices.\u201d It wasn&#x27;t until after the court document was public that WatchGuard <a data-offer-url=\"https:\/\/techsearch.watchguard.com\/KB?type=Article&amp;SFDCID=kA16S000000SOCGSA4&amp;lang=en_US\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/techsearch.watchguard.com\/KB?type=Article&amp;SFDCID=kA16S000000SOCGSA4&amp;lang=en_US&quot;}\" href=\"https:\/\/techsearch.watchguard.com\/KB?type=Article&amp;SFDCID=kA16S000000SOCGSA4&amp;lang=en_US\" rel=\"nofollow noopener\" target=\"_blank\">published this FAQ<\/a>, which for the first time made reference to CVE-2022-23176, a vulnerability with a severity rating of 8.8 out of a possible 10.<\/p>\n<p class=\"paywall\">\u201cWatchGuard Firebox and XTM appliances allow a remote attacker with unprivileged credentials to access the system with a privileged management session via exposed management access,\u201d the description read. \u201cThis vulnerability impacts Fireware OS before 12.7.2_U1, 12.x before 12.1.3_U3, and 12.2.x through 12.5.x before 12.5.7_U3.\u201d<\/p>\n<p class=\"paywall\">The WatchGuard FAQ said that CVE-2022-23176 had been \u201cfully addressed by security fixes that started rolling out in software updates in May 2021.\u201d The FAQ went on to say that investigations by WatchGuard and outside security firm Mandiant \u201cdid not find evidence the threat actor exploited a different vulnerability.\u201d<\/p>\n<p class=\"paywall\">When WatchGuard released the May 2021 software updates, the company made only the most oblique of references to the vulnerability.<\/p>\n<p class=\"paywall\">\u201cThese releases also include fixes to resolve internally detected security issues,\u201d a <a data-offer-url=\"https:\/\/www.watchguard.com\/wgrd-blog\/new-fireware-update-releases\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.watchguard.com\/wgrd-blog\/new-fireware-update-releases&quot;}\" href=\"https:\/\/www.watchguard.com\/wgrd-blog\/new-fireware-update-releases\" rel=\"nofollow noopener\" target=\"_blank\">company post<\/a> stated. \u201cThese issues were found by our engineers and not actively found in the wild. For the sake of not guiding potential threat actors toward finding and exploiting these internally discovered issues, we are not sharing technical details about these flaws that they contained.\u201d<\/p>\n<p class=\"paywall\">According to Wednesday\u2019s FAQ, FBI agents informed WatchGuard in November that about 1 percent of the firewalls it had sold had been infected by <a href=\"https:\/\/www.wired.com\/story\/sandworm-cyclops-blink-hacking-tool\/\">Cyclops Blink<\/a>, a new strain of malware developed by Sandworm to replace a botnet the <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2018\/05\/fbi-seizes-server-russia-allegedly-used-to-infect-500000-consumer-routers\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2018\/05\/fbi-seizes-server-russia-allegedly-used-to-infect-500000-consumer-routers\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2018\/05\/fbi-seizes-server-russia-allegedly-used-to-infect-500000-consumer-routers\/\" rel=\"nofollow noopener\" target=\"_blank\">FBI dismantled in 2018<\/a>. Three months after learning of the infections from the FBI, WatchGuard published the detection tool and the accompanying 4-Step Diagnosis and Remediation Plan for infected devices. The company obtained the CVE-2022-23176 designation a day later, on February 24.<\/p>\n<p class=\"paywall\">Even after all of these steps, including obtaining the CVE, however, the company still didn&#x27;t explicitly disclose the critical vulnerability that had been fixed in the May 2021 software updates. Security professionals, many of whom have spent weeks working to rid the Internet of vulnerable devices, blasted WatchGuard for the failure to explicitly disclose.<\/p>\n<p class=\"paywall\">\u201cAs it turns out, threat actors *DID* find and exploit the issues,\u201d Will Dormann, a vulnerability analyst at CERT, wrote in a private message. He was referring to the WatchGuard explanation from May that the company was withholding technical details to prevent the security issues from being exploited. \u201cAnd without a CVE issued, more of their customers were exposed than needed to be.\u201d<\/p>\n<p class=\"paywall\">He continued: \u201cWatchGuard should have assigned a CVE when they released an update that fixed the vulnerability. They also had a second chance to assign a CVE when they were contacted by the FBI in November. But they waited for nearly 3 full months after the FBI notification (about 8 months total) before assigning a CVE. This behavior is harmful, and it put their customers at unnecessary risk.\u201d<\/p>\n<p class=\"paywall\">WatchGuard representatives didn\u2019t respond to repeated requests for clarification or comment.<\/p>\n<p class=\"paywall\"><em>This story originally appeared on<\/em> <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/04\/watchguard-failed-to-disclose-critical-flaw-exploited-by-russian-hackers\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/04\/watchguard-failed-to-disclose-critical-flaw-exploited-by-russian-hackers\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/04\/watchguard-failed-to-disclose-critical-flaw-exploited-by-russian-hackers\/\" rel=\"nofollow noopener\" target=\"_blank\"><em>Ars Technica<\/em><\/a><em>.<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/watchguard-didnt-disclose-vulnerability-cyclops-blink\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/624f3d3668e4cf22b8a370ce\/master\/pass\/WatchGuard-Firewall-Malware-Security-157420668.png\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Fri, 08 Apr 2022 13:00:00 +0000<\/strong><\/p>\n<p>The security vendor kept a critical vulnerability in its firewall appliances quiet even as it was under attack from a Russian hacking group.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-18718","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18718"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18718\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18718"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}