Vulnerabilities in Pulse Connect Secure VPN software have reportedly been exploited by attackers, some believed linked to China, to compromise networks. Credit: Undefined Undefined / Getty Images Organizations using Pulse Secure’s mobile VPN should patch vulnerabilities reportedly being exploited in the wild, possibly by a “Chinese espionage actor”. The patch–available here–is considered important enough that the Cybersecurity and Infrastructure Security Agency (CISA) gave federal agencies a deadline of April 23 to apply them. CISA’s guidance states that federal users of Pulse Connect Secure VPNs must use the company’s free utility to ascertain whether their devices are vulnerable. If the vulnerability is found, affected government Pulse Secure software and appliances have to be immediately isolated from the network and a full report has to be made. In addition to the vulnerability detection tool, Pulse Secure has issued a replacement XML configuration file, which prevents the exploits from functioning when placed on affected devices. “Organizations should examine available forensic evidence to determine if an attacker compromised user credentials,” wrote FireEye cybersecurity subsidiary Mandiant in a blog post. “[Pulse Secure parent company] Ivanti highly recommends resetting all passwords in the environment and reviewing the configuration to ensure no service accounts can be used to authenticate to the vulnerability.” Pulse Secure recommends using its online Pulse Connect Secure Integrity Assurance tool to determine whether Pulse Connect Secure software has been compromised. The known exploits force the SSL VPN authentication system to reveal credentials and trick it into producing “successful login” results when checking those credentials, according to Mandiant. Several exploit techniques have been used, but the results have been the same—compromised VPN appliances and remotely executed attack code. The vulnerabilities are partially based on three known issues that were patched over the past two years, according to Pulse Secure’s own blog post on the matter. A newer flaw can allow an attacker to bypass two-factor authentication on the Pulse Secure Connect gateway and execute remote code. An exploit of that vulnerability has apparently been used by multiple groups to target U.S. defense and industrial networks. There are twelve separate families of malware attacking Pulse Secure VPNs, and multiple actors are likely using the exploit in the wild at least one of which appears to be linked to the Chinese government, said Mandiant. The APT5 group, described as a “Chinese espionage actor” in the blog post, has persistently targeted U.S. aerospace and defense companies over a period of several years, and has attacked networking and software companies in order to accomplish that end. Related content news Cisco research highlights network complexity, security challenges Cisco’s 2024 Global Networking Trends Report finds IT leaders are besieged by rising cybersecurity risks, workload types, and distributed infrastructures. By Michael Cooney May 22, 2024 6 mins Network Security Cloud Computing Networking news AWS clarifies Nvidia chip order: Upgrade, not halt AWS will use Nvidia’s new Blackwell GPUs for Project Ceiba instead of Nvidia’s Grace Hopper chips that were earlier planned. By Gyana Swain May 22, 2024 3 mins Amazon Web Services news SolarWinds debuts AI framework in its service desk product SolarWinds AI will first be put to use in its service desk solution to improve service agent workflows and reduce the time it takes to resolve tickets. By Denise Dubie May 21, 2024 4 mins Network Management Software Network Monitoring news Broadcom launches 400G Ethernet adapters The highly scalable, low-power 400G PCIe Gen 5.0 Ethernet adapters are designed for AI in the data center. By Andy Patrizio May 21, 2024 3 mins CPUs and Processors Networking PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe