With the heightened awareness around the Coronavirus (COVID-19), we would like to share how Systems Engineering has prepared to handle potential upcoming challenges, as well as how you should be thinking through your approach. Over the years, we have worked with a number of our clients to develop Business Continuity Plans, applying critical thinking to how they would handle a pandemic scenario. These organizations are generally going to be better prepared to handle the uncertain path ahead.
On Jan, 14, 2020, Microsoft retired the popular Windows 7 operating system (OS). For businesses who have not upgraded to a supported version of Windows, Microsoft allows them to purchase extended support via Windows 7 Extended Security Updates (ESU). With this service, businesses will continue to receive security updates at an extra cost.
Systems Engineering is aware of wide-spread internet service provider outages affecting clients. Ticket volumes and metrics suggest these outages are impacting a large area of the northeast. Systems Engineering is operating under our standard business and after-hours coverage plans and is prepared to help clients through our routine service delivery models.
Recently, Cisco released a series of ‘High Severity’ vulnerabilities that relate to the Cisco Discovery Protocol (CDP), which is Cisco’s proprietary mechanism used by their devices to broadcast identities to one another across private/secured networks. For example, accessories such as VOIP Phones will use CDP to determine which VLAN the switch is using for voice traffic.
Yesterday Microsoft announced and delivered a fix for a serious vulnerability in Windows 10 cryptography function (CVE-2020-0601). The NSA had previously discovered and notified Microsoft to develop a solution. Microsoft also stated that they had seen no exploit of this vulnerability to date. The vulnerability would allow an attacker to disguise their malicious software as a valid and certified piece of code; thereby spoofing the Windows 10 PC or Windows Server 2019 into thinking it is legitimate code that can be trusted and therefore executed.
Citrix recently published a critical security bulletin (CVE-2019-19781) advising users of a vulnerability in the Citrix Application Delivery Controller (ADC) device formerly known as NetScaler ADC, Citrix Gateway, and NetScaler Gateway. If exploited, it can allow an unauthenticated attacker to execute code on the appliance that can lead to possibly compromising a critical perimeter security component. Many organizations rely on these devices as load balancers to control access from the outside to internal Citrix Servers and to terminate SSL VPNs.
Cisco recently released a collection of 10 security advisories against Cisco's Adaptive Security Appliance (ASA), Firepower Threat Defense (FTD), and Firepower Management Center (FMC) software. The collection includes a few high-risk vulnerabilities that affect File Transfer Protocol (FTP) Inspection, Session Initiated Protocol (SIP) inspection that could lead to a denial-of-service condition. Importantly, Cisco is not aware of any public exploitation of the vulnerabilities.
Systems Engineering is aware of the vulnerability affecting customers with Fortinet Firewalls who are using an SSL VPN (Secure Sockets Layers Virtual Private Network) to connect to their offices remotely. This vulnerability utilizes an improper limitation of a pathname to a restricted directory ("path traversal") in multiple Fortinet OS versions under the SSL VPN web portal.
Today at approximately 11:30am EST, users of Microsoft Office 365 began to experience delays and/or the nondelivery of external emails.
https://www.syseng.com/it-consulting-services/se-policyadvisor/Here at Systems Engineering (SE), we continue to see businesses impacted by ransomware; this creates a disruption to business and in some cases, a data breach.