- Meet BEC
- Technology Services
- Professional Services
- Our Clients
- Tools & Resources
- Contact Us
Could Potentially Be More Dangerous Than the Infamous Heartbleed!
A major vulnerability, CVE-2014-6271, has been spreading rapidly and impacting a wide range of businesses. CVE-2014-6271, also known as “shellshock,” impacts “bash” software, which is used in most business computers. According to some researchers, shellshock could potentially be more dangerous than heartbleed, the open/SSL bug that had most business owners in a state of panic about their security a few months ago!
So how does the shellshock vulnerability work? Well, the vulnerability allows attackers to inject their own malicious code into bash, a command line interface that connects users to Unix-based systems. Once the attacker injects malicious code into bash, they’re able to:
While bash was written over 30 years ago, it’s transformed into one of the most widely used utilities in the business environment. In fact, OS X, Linux, Windows, and Android often run bash. In addition, web servers commonly run bash as well; which means the vulnerability puts a lot of businesses at risk.
Chances Are, Most of Your Systems Are Running Bash – Don’t Forget to Apply the Latest Security Patches & Bug Fixes on All of Your Workstations!
When it comes to vulnerabilities like shellshock, it’s fundamental to ensure you’re applying the latest security patches and bug fixes on all of your workstations; otherwise, you’re open to malware and viruses infecting your network. Aside from applying the latest security patches and bug fixes, what can be done to stay protected? Here’s a few ideas:
According to Robert Graham, a Security Researcher, “While the known systems, like your web server, are patched, unknown systems remain unpatched. We saw that with the heartbleed bug, six months later, hundreds of thousands of systems remain vulnerable.”
He continued, “These systems are rarely things like web servers, but are more often things like Internet-enabled cameras. Internet-of-things devices, like video cameras, are especially vulnerable because a lot of their software is built from web-enabled bash scripts.”
Feeling concerned about shellshock? To learn more, or to schedule a no-obligation security assessment, give us a call at (504) 282-2236 or send us an email at email@example.com. BEC Technology Consultants is here to help you minimize the risk of an attack or infection.
Need The Absolute Best Information Systems Support In New Orleans?Dial (504) 282-2236