Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Recently, Nation-state attackers targeted vulnerable VPN servers. Vulnerabilities in VPNs of renowned global brands were exploited in these campaigns. The vulnerabilities continue to be exploited by Advanced Persistent Threat groups on a mass scale.
CVE-2019-11510
In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability. This includes access to databases that the VPN server uses to track sessions, cleartext credentials, and NTLM hashes.
It should be noted that 2FA will not prevent an attacker from hijacking a valid authenticated session. Moreover, credentials stored on these databases must immediately be changed as the attackers are actively leveraging credentials to attempt to connect to other resources that may not require 2FA.
Read more on ‘How VPNs can be exploited by attackers’.
Pulse Secure
Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1
8.3 before 8.3R7.1
9.0 before 9.0R3.4