Hacker drops zero-day, opens FireEye fire sale

Claims bugs fell on deaf ears

US security consultants Kristian Hermansen and Ron Perris have dropped a zero day remote file disclosure vulnerability affecting FireEye kit and say they have another three flaws for sale.

The vulnerability disclosure dropped on Exploit-DB Sunday claims the web server runs as root in some FireEye kit, among other security SNAFUs.

In a note Hermansen says he had attempted to report the vulnerabilities over the last 18 months to FireEye without success. "[This is] just one of many handfuls of FireEye / Mandiant zero day," Hermansen says.

[I have] been sitting on this for more than 18 months with no fix from those security experts at FireEye."

The hacker incorrectly claims FireEye lacks a security reporting mechanism when in fact it has a portal discoverable through a basic web search.

Hermansen demonstrated the burnt zero day by publishing the means by which users can trigger the vulnerability and access the /etc/passwd file.

FireEye said in a statement to Vulture South that it has reached out to Hermansen and urges other researchers to report through the security bug portal.

"This morning, FireEye learned of four potential security issues in our products from Kristian Hermansen’s public disclosure of them being available for purchase," it says

"We appreciate the efforts of security researchers like Kristian Hermansen and Ron Perris to find potential security issues and help us improve our products, but always encourage responsible disclosure."

Hermansen has previously reported holes in Apple kit and last year in the high profile Covered California Affordable Care Act website. ®

Updated to add

"Upon initial review of the limited information available in today’s public disclosure, we have found that the 'file disclosure' issue impacts a legacy version of the FireEye endpoint platform (referred to as 'HX')," a spokesperson for FireEye told El Reg on Tuesday.

"Recent updates have reduced the impact of this issue to customers running legacy versions of the product (HX 2.1.x and DMZ 2.1.x). However, in order to eliminate risk immediately, FireEye strongly recommends upgrading to the current release (version 2.6.x) of the HX product.

"For customers who remain on the legacy version, FireEye is actively working on a fix for the reported issue in the HX 2.1.x series and will update impacted customers through our official Customer Support channels."

Other stories you might like

  • Minimal, systemd-free Alpine Linux releases version 3.16
    A widespread distro that many of its users don't even know they have

    Version 3.16.0 of Alpine Linux is out – one of the most significant of the many lightweight distros.

    Version 3.16.0 is worth a look, especially if you want to broaden your skills.

    Alpine is interesting because it's not just another me-too distro. It bucks a lot of the trends in modern Linux, and while it's not the easiest to set up, it's a great deal easier to get it working than it was a few releases ago.

    Continue reading
  • Verizon: Ransomware sees biggest jump in five years
    We're only here for DBIRs

    The cybersecurity landscape continues to expand and evolve rapidly, fueled in large part by the cat-and-mouse game between miscreants trying to get into corporate IT environments and those hired by enterprises and security vendors to keep them out.

    Despite all that, Verizon's annual security breach report is again showing that there are constants in the field, including that ransomware continues to be a fast-growing threat and that the "human element" still plays a central role in most security breaches, whether it's through social engineering, bad decisions, or similar.

    According to the US carrier's 2022 Data Breach Investigations Report (DBIR) released this week [PDF], ransomware accounted for 25 percent of the observed security incidents that occurred between November 1, 2020, and October 31, 2021, and was present in 70 percent of all malware infections. Ransomware outbreaks increased 13 percent year-over-year, a larger increase than the previous five years combined.

    Continue reading
  • Slack-for-engineers Mattermost on open source and data sovereignty
    Control and access are becoming a hot button for orgs

    Interview "It's our data, it's our intellectual property. Being able to migrate it out those systems is near impossible... It was a real frustration for us."

    These were the words of communication and collaboration platform Mattermost's founder and CTO, Corey Hulen, speaking to The Register about open source, sovereignty and audio bridges.

    "Some of the history of Mattermost is exactly that problem," says Hulen of the issue of closed source software. "We were using proprietary tools – we were not a collaboration platform before, we were a games company before – [and] we were extremely frustrated because we couldn't get our intellectual property out of those systems..."

    Continue reading

Biting the hand that feeds IT © 1998–2022