Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4590 SYMSA1500-Symantec ICSP Unauthorized Access 10 December 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Symantec Industrial Control System Protection Publisher: Symantec Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-18380 Original Bulletin: http://support.symantec.com/us/en/article.SYMSA1500.html - --------------------------BEGIN INCLUDED TEXT-------------------- Symantec ICSP Unauthorized Access SYMSA1500 Last Updated December 09, 2019 Initial Publication Date December 04, 2019 Copy Article Title/URL Feedback Subscribe o Status: Closed o Severity: High o CVSS Base Score: 8.8 Summary Affected Products +------------------------------------------------------------+ |Industrial Control System Protection (ICSP) | +--------------+-------------------+-------------------------+ |CVE |Affected Version(s)|Remediation | +--------------+-------------------+-------------------------+ |CVE-2019-18380|ICSP 6.x.x |Upgrade to ICSP 6.1.1.123| +--------------+-------------------+-------------------------+ Issues +-----------------------------------------------------------------------------+ |CVE-2019-18380 | +------------+----------------------------------------------------------------+ |Severity/ |High / 8.8 AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | |CVSSv3: | | +------------+----------------------------------------------------------------+ |References: |Security Focus: BID 111115 / NVD: CVE-2019-18380 | | | | |Impact: |Unauthorized Access | +------------+----------------------------------------------------------------+ | |Symantec Industrial Control System Protection (ICSP), prior to | |Description:|6.1.1.123, may be susceptible to an unauthorized access issue | | |that could potentially allow a threat actor to create or modify | | |application user accounts without proper authentication. | +------------+----------------------------------------------------------------+ Mitigation An update of the Industrial Control System Protection (ICSP), version 6.1.1.123 , has been released which addresses this issue. The latest Industrial Control System Protection (ICSP) releases and patches are available to customers through normal support channels or via auto-update with an internet connection. Currently, there is no evidence of any attempts at this exploit in the wild. Symantec recommends the following measures to reduce risk of attack: o Restrict access to administrative or management systems to authorized privileged users. o Restrict remote access to trusted/authorized systems only. o Run under the principle of least privilege, where possible, to limit the impact of potential exploit. o Keep all operating systems and applications current with vendor patches. o Follow a multi-layered approach to security. At a minimum, run both firewall and anti-malware applications to provide multiple points of detection and protection for both inbound and outbound threats. o Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in the detection of attacks or malicious activity related to the exploitation of latent vulnerabilities. Acknowledgements o CVE-2019-18380: Tyler Holland <tyler.holland@hornecyber.com> - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXe7OJmaOgq3Tt24GAQgVsBAAmo16Bd2cAiDLTGBrTThBRo1sb4WaJq/q tG5K5clgJUUILyKHQVelPT9akl9Po/MgXXvjh3AIXsux14ihxL2/MaBCJYLzD+5D cLynzxL3ZLd6qrFCYyNBJ/rVWIyG9H5cH/42+a12ODKs3QipY1D+n21x7OqPKGUX eIsguG+ksV/TckPZyVJ/eprBaIXVg3jsCoePLcRiJYFFw2KtKRAJIJfQJLY6yjOH fIG4FyS7cRgyO607iGpLgtkTs4B/bwPZfcqX/gaRYxQ8wf1lzMjV4It9evHR0f71 m0QiGOqOm/wFqgXBvoC/Oj5nw94o5x5umItRA20RTF0d6Ek+S6C5ty7ax6kzn4T5 UDhUe6Mnc1N2t9m6Rs0vG6lt/6LKJujy+7BP7TKllHWuJIHVOw4b7sFEkmyGqdQB shdfZH2RmVd/q6ZEAvhqYuZVLmjRWGcLsQIyOL/eUEFNuPCI5g49+JCBFx0ohGjp apovLDcP4lM2uYWjtJc9vC9Ce2El5RBiLT8Ub7FYcFZwQ6gOBbtYvw0Aqce9VHze YpK9258fIkudHlhWvpY/9xsDf2SIB0MvUY6B+u3C5hkiO7oUCiRktVexM52rL2Qr xt9wVrAWmPwJ6DNB8Rwk0xHp+hlZT2MFxHFiXlINGlCQOzkyMoEaadhIlHehaSw+ YKdYirVkh9M= =5KpY -----END PGP SIGNATURE-----