Security

CSO

CISA says 'no more' to decades-old directory traversal bugs

Recent attacks on healthcare thrust infosec agency into alert mode


CISA is calling on the software industry to stamp out directory traversal vulnerabilities following recent high-profile exploits of the 20-year-old class of bugs.

As part of its long-running series of alerts that promote secure-by-design practices in software, the US cybersecurity agency bemoaned the fact these vulnerabilities exist, despite approaches to eliminate them being established for over two decades.

Directory traversals see users manipulating inputs to gain access to data, sometimes with read and write privileges. Successful exploits can lead to the theft of sensitive data and the wider compromise of systems, CISA said.

"Directory traversal exploits succeed because technology manufacturers fail to treat user-supplied content as potentially malicious, hence failing to adequately protect their customers."

CISA cited the recent maximum-severity vulnerability in ConnectWise's ScreenConnect remote access software (CVE-2024-1708), which researchers described as "embarrassingly easy to exploit."

Another example referenced in the alert was a similar path traversal flaw affecting Cisco AppDynamics Controller (CVE-2024-20345), which flew a little under the radar with a modest 6.5 "medium" severity score back in March.

Despite only 55 of the total 1,104 vulnerabilities in CISA's Known Exploited Vulnerabilities (KEV) catalog being classed as directory traversals, the threat they present is heightened given the organizations they're targeting.

The security agency warned these vulnerabilities are being used in attacks on the software used by critical infrastructure organizations including the healthcare industry. The threat is especially acute given that this class of bug can also affect cloud services.

"Approaches to avoid directory traversal vulnerabilities are known, yet threat actors continue to exploit these vulnerabilities which have impacted the operation of critical services, including hospital and school operations," the alert [PDF] reads.

"CISA and the FBI urge software manufacturer executives to require their organizations to conduct formal testing to determine their products' susceptibility to directory traversal vulnerabilities."

CISA pointed to two "well-known and effective mitigations" to directory traversal vulnerabilities that should be implemented to prevent attacks on the nation's most critical institutions.

Eliminating directory traversal bugs is just one step towards achieving a truly secure-by-design approach to software. Previous alerts have focused on other areas such as eliminating default passwords, like the UK recently did, and the elimination of SQL injection vulnerabilities.

The agency, along with the other Five Eyes powers, has also long called for an end to the use of memory-unsafe languages, suggesting developers move away from old reliables such as C and C++ to more inherently secure alternatives. ®

Send us news
13 Comments

Check your IP cameras: There's a new Mirai botnet on the rise

Also, US offering $2.5M for Belarusian hacker, Backpage kingpins jailed, additional MOVEit victims, and more

Tired of airport security queues? SQL inject yourself into the cockpit, claim researchers

Infosec hounds say they spotted vulnerability during routine travel in the US

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

White House’s new fix for cyber job gaps: Serve the nation in infosec

Now do your patriotic duty and fill one of those 500k open roles, please?

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

Multiple flaws in Microsoft macOS apps unpatched despite potential risks

Windows giant tells Cisco Talos it isn't fixing them

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

Homeland security hopes to scuttle maritime cyber-threats with port infosec testbed

Supply chains, 13M jobs and $649B a year at risk, so Uncle Sam is fighting back - with a request for info

Deadline looms: Google Workspace mandates OAuth by September 30

27 days to get your users' third-party apps on Google’s sign-in

AMD reverses course: Ryzen 3000 CPUs will get SinkClose patch after all

Still no love for 1000- or 2000-series

RansomHub-linked EDR-killing malware spotted in the wild

Also: Your external-facing NetSuite sites need a review; five popular malware varieties for Q2, and more

Ransomware batters critical industries, but takedowns hint at relief

Whether attack slowdown continues downward trend is the million dollar question that security researchers can't answer