Credit reference agencies faulted for poor patching

Hold our beers, Equifax


Updated Experian and Annual Credit Report.com – an organization set up by Equifax, Experian and Transunion to meet US consumer finance regulations – left themselves exposed to a serious vulnerability in Apache Struts earlier this year.

The security shortcoming raises important questions following the disclosure of a mega-breach at Equifax last week that affected data on 143 million Americans and an as-yet unknown number of Canadians and Brits. Equifax only said that an unspecified web application vulnerability gave hackers access to its systems between mid May and late July, when the breach was detected.

A vulnerability in Apache Struts, patched in March, quickly gave rise to the public release of an exploit. That’s a worst-case scenario and ought to have prompted urgent security triage. Left unresolved, the issue create a means for hackers to remotely run code on the web server and access files, potentially (and probably) bypassing all security controls. No authentication would be required.

UK security researcher Kevin Beaumont repeatedly warned about the problem at the time. He wasn’t alone. For example, Xss.cx notified organizations that they were vulnerable, issuing public screenshots of the insides of servers – including of user files, config files, debug logs, etc – to underline its warning.

The screenshots (Experian example here) were only possible because the organizations concerned were unpatched, at least at the time and for a few days afterwards.

Systems affected included servers run by Experian and Annual Credit Report, which is managed by CGI Report.

Screenshots of the insides of these servers have been posted online, so unauthorized access on some level was possible. Whether customer information was actually compromised through that route is a troubling but unanswered question.

“All of this raises serious questions,” Beaumont concludes in a blog post laying out the timeline of the issue. “When were these servers patched? What information was accessed? If consumer information was accessed, have they been notified?”

This blog post talks about how an issue in Apache Struts that arose in March was handled, but it still raises topical questions and concerns about the patching practices at credit reference agencies. We’ve flagged up the blog post to both Experian and CGI Report and invited comment. ®

Bootnote

All the above relates to the handling of a critical Apache Struts vulnerability released in March and not a similarly serious problem addressed earlier this month. The flaw exploited by hackers to break into Equifax remains unknown at the time of writing, despite speculation about various causes (both Apache Struts and SQL injection have been suggested as plausible).

Updated on 18 September to add: The credit reference agency admitted it does use Apache Struts, the tech at the centre of security concerns, but said this was only on a "somewhat limited basis" in various web applications. These systems were patched "within days" of the discovery of a critical vulnerability in the enterprise application back in March, it said.

A spokesperson said: "We continuously review all our systems, including applications utilizing Apache Struts, and patch or remediate any vulnerabilities as necessary, including the vulnerability referenced by Equifax, CVE-2017-5638.

"We applied the patch to this vulnerability in our system within days of the March discovery. As a result, we were not exposed to exploits of this vulnerability."


Other stories you might like

  • DuckDuckGo tries to explain why its browsers won't block some Microsoft web trackers
    Meanwhile, Tails 5.0 users told to stop what they're doing over Firefox flaw

    DuckDuckGo promises privacy to users of its Android, iOS browsers, and macOS browsers – yet it allows certain data to flow from third-party websites to Microsoft-owned services.

    Security researcher Zach Edwards recently conducted an audit of DuckDuckGo's mobile browsers and found that, contrary to expectations, they do not block Meta's Workplace domain, for example, from sending information to Microsoft's Bing and LinkedIn domains.

    Specifically, DuckDuckGo's software didn't stop Microsoft's trackers on the Workplace page from blabbing information about the user to Bing and LinkedIn for tailored advertising purposes. Other trackers, such as Google's, are blocked.

    Continue reading
  • Despite 'key' partnership with AWS, Meta taps up Microsoft Azure for AI work
    Someone got Zuck'd

    Meta’s AI business unit set up shop in Microsoft Azure this week and announced a strategic partnership it says will advance PyTorch development on the public cloud.

    The deal [PDF] will see Mark Zuckerberg’s umbrella company deploy machine-learning workloads on thousands of Nvidia GPUs running in Azure. While a win for Microsoft, the partnership calls in to question just how strong Meta’s commitment to Amazon Web Services (AWS) really is.

    Back in those long-gone days of December, Meta named AWS as its “key long-term strategic cloud provider." As part of that, Meta promised that if it bought any companies that used AWS, it would continue to support their use of Amazon's cloud, rather than force them off into its own private datacenters. The pact also included a vow to expand Meta’s consumption of Amazon’s cloud-based compute, storage, database, and security services.

    Continue reading
  • Atos pushes out HPC cloud services based on Nimbix tech
    Moore's Law got you down? Throw everything at the problem! Quantum, AI, cloud...

    IT services biz Atos has introduced a suite of cloud-based high-performance computing (HPC) services, based around technology gained from its purchase of cloud provider Nimbix last year.

    The Nimbix Supercomputing Suite is described by Atos as a set of flexible and secure HPC solutions available as a service. It includes access to HPC, AI, and quantum computing resources, according to the services company.

    In addition to the existing Nimbix HPC products, the updated portfolio includes a new federated supercomputing-as-a-service platform and a dedicated bare-metal service based on Atos BullSequana supercomputer hardware.

    Continue reading

Biting the hand that feeds IT © 1998–2022