{"id":10949,"date":"2023-08-01T13:58:27","date_gmt":"2023-08-01T12:58:27","guid":{"rendered":"https:\/\/pstqb.pt\/?p=10949"},"modified":"2024-08-06T12:40:33","modified_gmt":"2024-08-06T11:40:33","slug":"sites-governamentais-sob-ataque-apos-bug-da-ivanti","status":"publish","type":"post","link":"https:\/\/pstqb.pt\/en\/sites-governamentais-sob-ataque-apos-bug-da-ivanti\/","title":{"rendered":"Government Websites Under Attack After Ivanti Bug"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"10949\" class=\"elementor elementor-10949\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6e368fa elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no\" data-id=\"6e368fa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8b4cf3a\" data-id=\"8b4cf3a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24d535f wpr-stt-btn-align-fixed wpr-stt-btn-align-fixed-right elementor-widget elementor-widget-wpr-back-to-top\" data-id=\"24d535f\" data-element_type=\"widget\" data-widget_type=\"wpr-back-to-top.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"wpr-stt-wrapper\"><div class='wpr-stt-btn' data-settings='{&quot;animation&quot;:&quot;fade&quot;,&quot;animationOffset&quot;:&quot;0&quot;,&quot;animationDuration&quot;:&quot;200&quot;,&quot;fixed&quot;:&quot;fixed&quot;,&quot;scrolAnim&quot;:&quot;800&quot;}'><span class=\"wpr-stt-icon\"><i class=\"fas fa-chevron-up\"><\/i><\/span><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b122b8c elementor-widget elementor-widget-text-editor\" data-id=\"b122b8c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An attack on several Norwegian government ministries has forced US federal agencies to correct an error of <em>software<\/em> from Ivanti.<\/p><p>The error in question is a fault related to an authentication bypass in the <em>software<\/em> Ivanti's Endpoint Manager Mobile (EPMM) device management system, formerly known as MobileIron Core. The US company issued patches for this vulnerability, and the Norwegian government revealed that the flaw had been exploited in an attack that affected 12 of its ministries.<br \/>In this context, the US Cybersecurity and Infrastructure Security Agency (CISA) added this <em>bug<\/em> to its catalog of Known Exploited Vulnerabilities (KEV). In an alert issued, CISA stated that \"these types of vulnerabilities are frequent attack vectors for malicious cyber-actors and pose significant risks to the federal enterprise\".<\/p><p>Identified as CVE-2023-35078, the authentication bypass bug received the maximum possible CVSS rating of 10, with Ivanti warning its customers that it was essential for them to fix their software immediately. According to Ivanti, this <em>bug<\/em> allowed unauthorized access to the solution's restricted functionality or resources, allowing threat actors to \"potentially access users' personally identifiable information and make limited changes to the server\". CISA also learned that this error in <em>software <\/em>allowed unauthenticated access to specific API paths - \"An attacker with access to these API paths can access personally identifiable information (PII) such as names, phone numbers and other mobile device details for users on a vulnerable system.\"<\/p><p>The Norwegian authorities did not say whether the data had been exfiltrated during the attack on their ministries, however, they claim that the country's Data Protection Authority had been notified, which indicates that there may be concerns that the information was stolen: \"This vulnerability was unique and was first discovered here in Norway,\" said Sofie Nystr\u00f8m, Director General of Norway's National Security Authority. \"If we had published information about the vulnerability too early, it could have contributed to its abuse elsewhere in Norway and the rest of the world. The update is now widely available and it is prudent to announce what kind of vulnerability it is,\" she added.<\/p><p>The continuation of the original article via <em>SC Magazine <\/em>can be read\u00a0<a href=\"https:\/\/www.scmagazine.com\/news\/ivanti-bug-exploited-in-attack-on-norwegian-government\">here<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>An attack on several Norwegian government ministries has forced US federal agencies to fix an Ivanti software bug. The bug in question is a flaw related to an authentication bypass in Ivanti's Endpoint Manager Mobile (EPMM) device management software, formerly known as MobileIron Core. The US company has issued patches for this vulnerability, and the Norwegian government revealed that the flaw had been exploited in an attack that affected 12 of its ministries. In this context, the US Cybersecurity and Infrastructure Security Agency (CISA) has added this bug to its catalog of Known Exploited Vulnerabilities (KEV). In an alert issued, CISA stated that \"these types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise\". Identified as CVE-2023-35078, the authentication bypass bug received the maximum possible CVSS rating of 10, with Ivanti warning its customers that it was essential that they patch their software immediately. According to Ivanti, this bug allowed unauthorized access to the solution's restricted functionality or resources, allowing threat actors to \"potentially access users' personally identifiable information and make limited changes to the server\". CISA also learned that this software bug allowed unauthenticated access to specific API paths - \"An attacker with access to these API paths can access personally identifiable information (PII) such as names, phone numbers and other mobile device details for users on a vulnerable system.\" The Norwegian authorities did not say whether the data had been exfiltrated during the attack on their ministries, however they did say that the country's Data Protection Authority had been notified, which indicates that there may be concerns that the information has been stolen: \"This vulnerability was unique and was discovered for the first time here in Norway,\" said Sofie Nystr\u00f8m, Director General of Norway's National Security Authority. \"If we had published information about the vulnerability too early, it could have contributed to its abuse elsewhere in Norway and the rest of the world. The update is now widely available and it is prudent to announce what kind of vulnerability it is,\" she added. The continuation of the original article via SC Magazine can be read here.<\/p>","protected":false},"author":2,"featured_media":11073,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[31],"tags":[],"class_list":["post-10949","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-destaque"],"_links":{"self":[{"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/posts\/10949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/comments?post=10949"}],"version-history":[{"count":0,"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/posts\/10949\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/media\/11073"}],"wp:attachment":[{"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/media?parent=10949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/categories?post=10949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pstqb.pt\/en\/wp-json\/wp\/v2\/tags?post=10949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}