Menu
Google researchers find remote execution bug in FireEye appliances

Google researchers find remote execution bug in FireEye appliances

FireEye has patched the problem, which could allow full network access

Google researchers found a software flaw in several models of FireEye's security appliances that they say could give a cyberattacker full access to a company's network.

It's not unheard of to find security flaws in security software, but the latest discovery highlights once again how no technology is immune to such problems.

FireEye issued a statement on Tuesday saying it had issued a patch for the flaw, which affects its NX, EX, FX and AX Series appliances. The appliances passively monitor network traffic and pluck out suspicious files for study away from the live network.

The products have full access to a network, which means if attackers got a foothold in one, they could monitor and tamper with traffic or insert spying code.

The vulnerability is within a module that analyzes Java archive (JAR) files, FireEye said.

A successful attack could be triggered merely by sending someone an email or getting the person to click a link, wrote Tavis Ormandy of Google's Project Zero, who found the issue with Natalie Silvanovich. It's a "nightmare scenario," he wrote.

"This would mean an attacker would only have to send an email to a user to gain access to a persistent network tap -- the recipient wouldn’t even have to read the email, just receiving it would be enough," Ormandy wrote.

Once access has been gained to the FireEye appliance, it would be possible to load a rootkit, move around to other networks or install a self-propagating worm, Ormandy wrote.

Project Zero nicknamed the vulnerability "666." FireEye was notified on Friday and issued a temporary fix over the weekend and then a permanent one on Monday, according to its statement.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags securityFireEye

Featured

Slideshows

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
​What are the top 10 tech trends for New Zealand in 2017?

​What are the top 10 tech trends for New Zealand in 2017?

Digital Transformation (DX) has been a critical topic for business over the last few years and IDC is now predicting a step change as DX reaches macroeconomic levels. By 2020 a DX economy will emerge and it will become the core of what New Zealand industries focus on. From the board level through to the C-Suite, Kiwi organisations must be prepared to think and act digital when the DX economy emerges in 2017.

​What are the top 10 tech trends for New Zealand in 2017?
Show Comments