Kaseya Patches for Flaws Exploited in Widespread Ransomware Attack

Florida-based software vendor on Sunday rolled out software updates to address critical in its Virtual System Administrator (VSA) software that was used as a jumping off point to target as many as 1,500 businesses across the globe as part of a widespread supply-chain .

Following the incident, the company had urged on-premise VSA customers to shut down their servers until a patch was available. Now, almost 10 days later the firm has shipped VSA version 9.5.7a (9.5.7.2994) with fixes for three new

  • CVE-2021-30116 Industryflaw
  • CVE-2021-30119 – Cross-site scripting vulnerability
  • CVE-2021-30120 – Two-factor authentication bypass

The security issues are part of a total of seven vulnerabilities that were discovered and reported to Kaseya by the Dutch Institute for Vulnerability Disclosure (DIVD) earlier in April, of which four other weaknesses were remediated in previous releases —

  • CVE-2021-30117 Industry(Fixed in VSA 9.5.6)
  • CVE-2021-30118 Industry(Fixed in VSA 9.5.5)
  • CVE-2021-30121 Industry(Fixed in VSA 9.5.6)
  • CVE-2021-30201 Industry(Fixed in VSA 9.5.6)

Besides fixes for the aforementioned shortcomings, the latest version also addresses three other flaws, including a bug that exposed weak password hashes in certain API responses to brute-force attacks as well as a separate vulnerability that could allow the unauthorized upload of files to the VSA server.

For additional security, Kaseya is recommending limiting access to the VSA Web GUI to local IP addresses by blocking port 443 inbound on your internet firewall.

Kaseya is also warning its customers that installing the patch would force all users to mandatorily change their passwords post login to meet new password requirements, adding that select features have been replaced with improved alternatives and that the “release introduces some functional defects that will be corrected in a future release.”

Besides the roll out of the patch for on-premises versions of its VSA remote monitoring and management software, the company has also instantiated the reinstatement of its VSA SaaS infrastructure. “The restoration of services is progressing according to plan, with 60% of our SaaS customers live and servers coming online for the rest of our customers in the coming hours,” Kaseya said in a rolling advisory.

The latest development comes days after Kaseya warned that spammers are capitalizing on the ongoing ransomware crisis to send out fake email notifications that appear to be Kaseya updates, only to infect customers with Cobalt Strike payloads to gain backdoor access to the systems and deliver next-stage malware.

Kaseya has said multiple flaws were chained together in what it called a “sophisticated cyberattack”, but it’s believed that a combination of CVE-2021-30116, CVE-2021-30119, and CVE-2021-30120 was used to carry out the intrusions. REvil, a prolific ransomware gang based in Russia, has claimed responsibility for the incident.

The use of trusted partners like software makers or service providers like Kaseya to identify and compromise new downstream victims, often called a supply-chain attack, and pair it with file-encrypting ransomware infections has also made it one of the largest and most significant such attacks to date.

Interestingly, Bloomberg on Saturday reported that five former Kaseya employees had flagged the company about “glaring” security holes in its software between 2017 and 2020, but their concerns were brushed off.

“Among the most glaring problems was software underpinned by outdated code, the use of weak encryption and passwords in Kaseya’s products and servers, a failure to adhere to basic cybersecurity practices such as regularly patching software and a focus on sales at the expense of other priorities,” the report said.

The Kaseya attack marks the third time that ransomware affiliates have abused Kaseya products as a vector to deploy ransomware.

You might also like More from author

Comments are closed.