deepwatch is currently tracking and responding to multiple advisories stating that Pulse Secure VPN appliances are being exploited by both a zero day exploit in conjunction with other, older exploits. According to external intelligence sources, these attacks appear to be primarily targeting defense, government, and financial organizations.
What Can You Do?
deepwatch recommends following Secure Pulse’s advisory to:
- Implement Pulse Secure’s provided workaround for the zero day vulnerability (CVE-2021-22893 can be mitigated by importing the Workaround-2104.xml file)
- Run the Pulse Connect Secure (PCS) Integrity Assurance to check the integrity of the Pulse Connect Secure appliance’s file system
- At your network perimeter, block the following URI paths known to be leveraged in these attacks:
In May, a security patch is expected to be released as a final mitigation for the zero day vulnerability currently being exploited.
What is deepwatch Doing?
- Managed Detection & Response team is reviewing customers who are currently sending Pulse Secure VPN logs to Splunk
- deepwatch is performing a 90 day look back of associated URI Indicators of Compromise (IOCs) across the customer base to identify potential targets
- Vulnerability Management will be researching the presence of both the zero-day vulnerability and Pulse Secure VPN in customer environments. As detections for this vulnerability were just released by both Tenable (Plugin ID 148847) and Qualys (QID 38838) this week, any given environment would require a new scan to validate the presence of the vulnerability. Thus we will be both checking for whether the VPN exists, as well as if the vulnerability has shown up in any customer environments to date. If found in the environment, we recommend following workarounds provided by Pulse Secure in their advisory mentioned above.
Per CISA’s advisory, the following files have been observed providing webshell functionalities:
- MD5: 4d5b410e1756072a701dfd3722951907
- MD5: 9b526db005ee8075912ca6572d69a5d6
- MD5: f2beca612db26d771fe6ed7a87f48a5a
- MD5: ca0175d86049fa7c796ea06b413857a3
- MD5: 56e2a1566c7989612320f4ef1669e7d5
- MD5: 8c291ad2d50f3845788bc11b2f603b4a