It's been a bustling week for security. Let us revisit some of its highlights.
To kick things off, researchers at Bitdefender has discovered yet another speculative execution attack which could lead the patches for similar attacks like Spectre and Meltdown in vain. The attack, which is known as SWAPGS Attack, has been designated with CVE-2019-1125 could allow an attacker to gain access to sensitive user data such as usernames, passwords and encryption keys. It could affect all Windows systems having an Intel or AMD processor released since 2012. As stated by Microsoft, "To exploit this vulnerability, an attacker would have to log on to an affected system and runs a specially crafted application".While Microsoft has coordinated with Intel to address this vulnerability and have released patches for Windows 10 and Server versions, AMD does not believe that it is vulnerable to this attack as "AMD products are designed not to speculate on the new GS value following a speculative SWAPGS".
Microsoft Security Response Center has published an article on using IoT devices to penetrate an organisation. The post is based on the breach the company had to suffer earlier this year. In this particular attack, a VOIP phone, an office printer, and a video decoder was used to compromise the infrastructure and maintain persistent access to the network. Upon reviewing the incident in detail, they identified that two of those devices were using the default passwords and the other one was not having the latest security update applied. They have also given some valuable recommendations to aid the overall security of Enterprise IoT devices.
Kubernetes community has published an updated version of the security audit report of the platform in their Github repository. The extensive audit found 37 vulnerabilities and 5 of them are considered to be highly severe. The report also includes a hardening guide and it's worth checking out if you are using Kubernetes.