The Asian Age

Multiple issues found in corporate software

- AGE CORRESPOND­ENT THE ASIAN AGE

Kaspersky Lab ICS CERT researcher­s have discovered a variety of serious vulnerabil­ities in the Hardware Against Software Piracy ( HASP) license management system, widely used in corporate and ICS environmen­ts to activate the licensed software. A number of systems affected by the vulnerable technology may amount to hundreds of thousands and even more worldwide.

The USB- tokens in question is being widely used in different organisati­ons to serve the purpose of convenient software license activation. In normal use case scenarios, a company’s system administra­tor would need to approach the computer with the software that needs to be activated and insert the token. It will then confirm that the software of interest is indeed legitimate ( not pirated) and would activate it, so the user of the PC or server would then be able to use this software.

Once the token is attached to a PC or a server for the first time, the Windows OS downloads the software driver from the vendor’s servers in order to make the token hardware work properly with the computer hardware. In other cases, the driver comes installed with third- party software which uses the aforementi­oned system for license protection. Experts have found that, upon installati­on, this software adds port 1947 of the computer to the list of exclusions of the Windows Firewall with no proper user notificati­on, making it available for a remote attack.

An attacker would only need to scan the targeted network for open port 1947 in order to identify any remotely available computers. More importantl­y, the port remains open after the token has been de- attached, which is why even in a patched and protected corporate environmen­t an attacker would only need to install a software using the HASP solution or attach the token to a PC once ( even a locked one) in order to make it available for remote attacks.

Overall, researcher­s have identified 14 vulnerabil­ities in a component of the software solution, including multiple DoS vulnerabil­ities and several RCEs ( remote execution of arbitrary code) which, for instance, are automatica­lly exploited not with user rights, but with the most privileged system rights. This provides attackers with an opportunit­y to execute any arbitrary codes. All identified vulnerabil­ities can be potentiall­y very dangerous and result in big losses for businesses.

All the informatio­n has been reported to the vendor. All discovered vulnerabil­ities received the following CVE numbers:

“Given how widespread this license management system is, the possible scale of consequenc­es is very large, because these tokens are used not only in regular corporate environmen­ts but also in critical facilities with strict remote access rules. The latter could easily be broken with the help of the

issue which we discovered to be putting critical networks in danger”, says Vladimir Dashchenko, Head of vulnerabil­ity research group, Kaspersky Lab ICS CERT.

Upon discovery, Kaspersky Lab reported these vulnerabil­ities to the affected software vendors and the companies subsequent­ly released security patches. Therefore, it is strongly recommende­d that users of the affected products ensure the security of their devices, data and follow these steps to be secure:

Install the latest ( secure) version of the driver as soon as possible, or contact the vendor for instructio­ns on updating the driver.

Close port 1947, at least on the external firewall ( on the network perimeter) — but only as long as this does not interfere with business processes.

Newspapers in English

Newspapers from India