Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/12/2021
03:55 PM
50%
50%

Vulnerable Protocols Leave Firms Open to Further Compromises

Companies may no longer have Internet-facing file servers or weakly secured Web servers, but attackers that get by the perimeter have a wide-open landscape of vulnerability.

Nearly nine out of every 10 companies have devices that use outdated protocols, such as Microsoft's Server Message Block version 1 for sharing files, giving attackers that breach the network perimeter an easy avenue to extend a compromise, according to a new report by network security firm ExtraHop. 

Microsoft's SMBv1 protocol, developed in the 1980s and deprecated in 2013, continues to be detected in 88% of environments, with almost a third of organizations showing signs of at least 100 devices still using the protocol, the report states. Another protocol, the NT LAN Manager version 1, which is used to pass credentials without exposing passwords, is present in more than half of all environments, including 19% that appear to have at least 100 devices using the protocol.

Related Content:

DNS Vulnerabilities Expose Millions of Internet-Connected Devices to Attack

Special Report: Assessing Cybersecurity Risk in Today's Enterprises

New From The Edge: Cybersecurity: What Is Truly Essential?

While the detection of older and deprecated protocols could be an artifact of some automated testing technologies or red-team activities, most of the companies likely have actual devices exposing vulnerable port to attackers, says Tedd Driggs, head of product at ExtraHop.

"Each of these systems, running something that is innately insecure or has been end-of-lifed, is an opportunity for an attacker to make that next pivot," he says. "So you can have a network that is cleanly segmented and laid out, but each of these [vulnerable processes] is a secret door between places that should not otherwise be interconnected."

The exposure of insecure protocols is a massive weakness that most companies have worked hard to eliminate — at least from Internet-facing systems. A recent scan of Internet-exposed ports, for example, found only eight companies out of the FTSE 350 exposed the SMB file-sharing protocol, nine companies exposed the Telnet protocol, and another nine companies exposed the Windows Remote Desktop Protocol (RDP), according to vulnerability management firm Rapid7's "2021 Industry Cyber-Exposure Report FTSE 350." 

However, businesses are not as careful about protocols on the inside of their networks, ExtraHop's security advisory states. Link-Local Multicast Name Resolution (LLMNR), a de facto standard for hostname-to-IP resolution that does not use the domain name system (DNS), is surprisingly common, with 46% of companies observing traffic from at least 100 devices. In addition, 81% of companies had credentials sent in plaintext via HTTP. 

Finally, two-thirds of companies had internal signs of SMBv1 traffic from 10 or more devices, ExtraHop's advisory states.

"Advanced threat actors are not looking for advanced technology—quite the opposite, they are looking for the weakest link in an enterprise, making outdated, fundamentally-insecure protocols especially compelling," ExtraHop stated in the advisory. "And yet, today, four years after [WannaCry and NotPetya], ExtraHop research found that SMBv1 is still surprisingly common in enterprise environments. Almost 90% had at least one device still running the protocol."

The advisory is based on data culled anonymously from customer networks. Because information is only connected to a token, ExtraHop does not have a way to verify whether the protocol traffic is indicative of devices communicating in the network, red-team exercises attempting to exploit the protocols, or malware inside the network attempting to further compromise systems. 

In 2017, two worms spread throughout networks using the weak SMBv1 protocol and, once inside, installed ransomware and data-wiping malware using exploit techniques, dubbed EternalBlue, leaked from the National Security Agency. The worms, WannaCry and NotPetya, infected companies, costing them billions of dollars in lost business and cleanup costs. 

Companies need to gain visibility into what types of protocols are running on the network, not just from on-premises gear but from cloud workloads, ExtraHop's Driggs says. Just as shadow IT devices caused problems a half decade ago, shadow cloud workloads may often not meet the security requirements enforced on authorized cloud infrastructure. 

"There is still a lot of stuff out there, but the question is how much do they know about? Awareness is the first step," Driggs says. "If you don't know that you have these weaknesses out there, then you won't know what you need to do."

In addition, segmenting the enterprise network and only allowing secure protocols to traverse segments can help prevent attackers from using older protocols to move laterally through a network. Despite decades of attacks, many companies choose retaining backward compatibility just in case, rather than cause potential downtime from enforcing too much security.

"SMBv1 has been deprecated for eight years," Driggs says. "At this point, you have to ask, 'What is a reasonable timeline before we can be done with it?"

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-37759
PUBLISHED: 2021-07-31
A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
CVE-2021-37760
PUBLISHED: 2021-07-31
A Session ID leak in the audit log in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
CVE-2020-26564
PUBLISHED: 2021-07-31
ObjectPlanet Opinio before 7.15 allows XXE attacks via three steps: modify a .css file to have <!ENTITY content, create a .xml file for a generic survey template (containing a link to this .css file), and import this .xml file at the survey/admin/folderSurvey.do?action=viewImportSurvey['importFil...
CVE-2020-26565
PUBLISHED: 2021-07-31
ObjectPlanet Opinio before 7.14 allows Expression Language Injection via the admin/permissionList.do from parameter. This can be used to retrieve possibly sensitive serverInfo data.
CVE-2020-26806
PUBLISHED: 2021-07-31
admin/file.do in ObjectPlanet Opinio before 7.15 allows Unrestricted File Upload of executable JSP files, resulting in remote code execution, because filePath can have directory traversal and fileContent can be valid JSP code.