{"id":14984,"date":"2025-10-20T07:06:17","date_gmt":"2025-10-20T07:06:17","guid":{"rendered":"https:\/\/newestek.com\/?p=14984"},"modified":"2025-10-20T07:06:17","modified_gmt":"2025-10-20T07:06:17","slug":"network-security-devices-endanger-orgs-with-90s-era-flaws","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14984","title":{"rendered":"Network security devices endanger orgs with \u201990s era flaws"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Enterprises have long relied on firewalls, routers, VPN servers, and email gateways to protect their networks from attacks. Increasingly, however, these network edge devices are becoming security liabilities themselves.<\/p>\n<p>Every few weeks, another crisis plays out: Security teams scramble to patch and scan their network appliances for malware implants after another zero-day attack is newly reported. Vendors emphasize that sophisticated nation-state actors carry out these attacks, but critics question why the basic flaws being exploited \u2014 buffer overflows, command injections, SQL injections \u2014 remain prevalent in mission-critical codebases maintained by companies whose core business is cybersecurity.<\/p>\n<p>Attackers constantly evolve their techniques. Security engineering, inherently challenging, can\u2019t fix everything. All software products have vulnerabilities, even security tools. These would be valid responses if we were dealing with complex flaws, says <a href=\"https:\/\/www.linkedin.com\/in\/benjamin-harris-sg\/\">Benjamin Harris<\/a>, CEO of cybersecurity and penetration testing firm watchTowr. \u201cBut these are vulnerability classes from the 1990s, and security controls to prevent or identify them have existed for a long time. There is really no excuse.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"network-edge-devices-the-new-battleground\">Network edge devices: The new battleground<\/h2>\n<p>Google\u2019s Threat Intelligence Group <a href=\"https:\/\/www.csoonline.com\/article\/3973769\/enterprise-specific-zero-day-exploits-on-the-rise-google-warns.html\">tracked 75 exploited zero-day vulnerabilities in 2024<\/a>. Nearly one in three targeted network and security appliances, a strikingly high rate given the range of IT systems attackers could choose to exploit. That trend has continued this year, with similar numbers in the first 10 months of 2025, targeting vendors such as Citrix NetScaler, Ivanti, Fortinet, Palo Alto Networks, Cisco, SonicWall, and Juniper.<\/p>\n<p>Network edge devices are attractive targets because they are remotely accessible, fall outside endpoint protection monitoring, contain privileged credentials for lateral movement, and are not integrated into centralized logging solutions. Yet researchers have reported vulnerabilities in these systems for over a decade with little attacker interest beyond isolated incidents.<\/p>\n<p>That shifted over the past few years with a rapid surge in attacks, making compromised network edge devices one of the top initial access vectors into enterprise networks for state-affiliated cyberespionage groups and ransomware gangs.<\/p>\n<p>The COVID-19 pandemic contributed to this shift, as organizations rapidly expanded remote access capabilities by deploying more VPN gateways, firewalls, and secure web and email gateways to accommodate work-from-home mandates.<\/p>\n<p>The declining success rate of phishing is another factor. Once the top initial access vector, phishing has become less effective thanks to defense efforts over the past 10 years. For 2024, <a href=\"https:\/\/www.csoonline.com\/article\/3970097\/the-state-of-intrusions-stolen-credentials-and-perimeter-exploits-on-the-rise-as-phishing-wanes.html\">Mandiant reported that 33% of intrusions resulted from exploits<\/a>, 16% from stolen or weak credentials, and only 14% from phishing.<\/p>\n<p>\u201cAttackers are not trying to do the newest and greatest thing every single day,\u201d watchTowr\u2019s Harris explains. \u201cThey will do what works at scale. And we\u2019ve now just seen that phishing has become objectively too expensive or too unsuccessful at scale to justify the time investment in deploying mailing infrastructure, getting domains and sender protocols in place, finding ways to bypass EDR, AV, sandboxes, mail filters, etc. It is now easier to find a 1990s-tier vulnerability in a border device where EDR typically isn\u2019t deployed, exploit that, and then pivot from there.\u201d<\/p>\n<p>It\u2019s also possible that attack campaigns against network-edge devices are becoming more visible to security teams because they are looking into what\u2019s happening on these appliances more than they did in the past.<\/p>\n<p>\u201cTen years ago, I was professionally doing exploit development for these types of routers,\u201d <a href=\"https:\/\/www.linkedin.com\/in\/jacob-baines-1490a7189\/\">Jacob Baines<\/a>, CTO and head of research at vulnerability intelligence company VulnCheck, tells CSO. \u201cI know there were many groups that were interested in it, but the security industry itself was more interested in desktop endpoints. And I think the industry has gotten better at protecting those types of endpoints. They\u2019ve gotten better at protecting against phishing, so this is the next area that we\u2019re trying to improve upon. So, there are a lot more eyes on it from the security field, but not necessarily attackers. I think they\u2019ve always been there.\u201d<\/p>\n<h3 class=\"wp-block-heading\" id=\"2024-networking-and-security-device-zero-day-flaws\">2024 networking and security device zero-day flaws<\/h3>\n<figure class=\"wp-block-table\">\n<div class=\"overflow-table-wrapper\">\n<table class=\"has-fixed-layout\">\n<tbody>\n<tr>\n<td><strong>Product<\/strong><\/td>\n<td><strong>CVE<\/strong><\/td>\n<td><strong>Flaw type<\/strong><\/td>\n<td><strong>CVSS<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Check Point Quantum Security Gateways and CloudGuard Network Security<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-24919\">CVE-2024-24919<\/a><\/td>\n<td>Path traversal leading to information disclosure<\/td>\n<td>8.6 (High)<\/td>\n<\/tr>\n<tr>\n<td>Cisco Adaptive Security Appliance<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-20359\">CVE-2024-20359<\/a><\/td>\n<td>Arbitrary code execution<\/td>\n<td>6.6 (Medium)<\/td>\n<\/tr>\n<tr>\n<td>Cisco Adaptive Security Appliance<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-20353\">CVE-2024-20353<\/a><\/td>\n<td>Denial of service<\/td>\n<td>8.6 (High)<\/td>\n<\/tr>\n<tr>\n<td>Cisco Adaptive Security Appliance \u00a0<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-20481\">CVE-2024-20481<\/a><\/td>\n<td>Remote Access VPN denial of service<\/td>\n<td>5.8 (Medium)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/2512990\/cisco-patches-actively-exploited-zero-day-flaw-in-nexus-switches.html\">Cisco NX-OS switches<\/a><\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-20399\">CVE-2024-20399<\/a><\/td>\n<td>CLI command injection<\/td>\n<td>6.0 (Medium)<\/td>\n<\/tr>\n<tr>\n<td>Fortinet FortiManager<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-47575\">CVE-2024-47575<\/a><\/td>\n<td>Missing authentication leading to full system compromise<\/td>\n<td>9.8 (Critical)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/2073837\/exploit-available-for-critical-flaw-in-forticlient-server.html\">Fortinet FortiOS SSL VPN<\/a><\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-21762\">CVE-2024-21762<\/a><\/td>\n<td>Arbitrary code execution<\/td>\n<td>9.6 (Critical)<\/td>\n<\/tr>\n<tr>\n<td>Ivanti Cloud Services Appliance<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-8963\">CVE-2024-8963<\/a><\/td>\n<td>Path traversal leading to remote code execution<\/td>\n<td>9.4 (Critical)<\/td>\n<\/tr>\n<tr>\n<td>Ivanti Cloud Services Appliance<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-9381\">CVE-2024-9381<\/a><\/td>\n<td>Path traversal chained with CVE-2024-8963<\/td>\n<td>7.2 (High)<\/td>\n<\/tr>\n<tr>\n<td>Ivanti Cloud Services Appliance \u00a0<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-9379\">CVE-2024-9379<\/a><\/td>\n<td>SQL injection leading to application takeover chained with CVE-2024-8963<\/td>\n<td>6.5 (Medium)<\/td>\n<\/tr>\n<tr>\n<td>Ivanti Cloud Services Appliance \u00a0<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-9380\">CVE-2024-9380<\/a><\/td>\n<td>OS command injection chained with CVE-2024-8963<\/td>\n<td>7.2 (High)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/1303522\/us-government-agencies-ordered-to-take-ivanti-vpn-product-offline.html\">Ivanti Connect Secure<\/a> \u00a0<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-21893\">CVE-2024-21893<\/a><\/td>\n<td>Server-side request forgery<\/td>\n<td>8.2 (High)<\/td>\n<\/tr>\n<tr>\n<td>NetScaler ADC and NetScaler Gateway \u00a0<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-6548\">CVE-2023-6548<\/a><\/td>\n<td>Code injection<\/td>\n<td>5.5 (Medium)<\/td>\n<\/tr>\n<tr>\n<td>NetScaler ADC and NetScaler Gateway<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-6549\">CVE-2023-6549<\/a><\/td>\n<td>Buffer overflow<\/td>\n<td>8.2 (High)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/2094204\/more-attacks-target-recently-patched-critical-flaw-in-palo-alto-networks-firewalls.html\">Palo Alto Networks PAN-OS<\/a><\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-3400\">CVE-2024-3400<\/a><\/td>\n<td>Command injection<\/td>\n<td>10.0 (Critical)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/3609132\/palo-alto-networks-zero-day-firewall-flaws-caused-by-basic-dev-mistakes.html\">Palo Alto Networks PAN-OS<\/a><\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-0012\">CVE-2024-0012<\/a><\/td>\n<td>Improper authentication chained with CVE-2024-9474, command injection<\/td>\n<td>9.3 (Critical)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/3604173\/volt-typhoon-returns-with-fresh-botnet-attacks-on-critical-us-infrastructure.html\">Versa Networks Director<\/a> \u00a0<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-39717\">CVE-2024-39717<\/a><\/td>\n<td>Arbitrary file upload and execution<\/td>\n<td>6.6 (Medium)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/figure>\n<h2 class=\"wp-block-heading\" id=\"basic-flaws-persist-in-network-device-codebases\">Basic flaws persist in network device codebases<\/h2>\n<p>Harris of watchTowr doesn\u2019t want to minimize the engineering effort it takes to build a secure system. But he feels many of the vulnerabilities discovered in the past two years should have been caught with automatic code analysis tools or code reviews, given how basic they have been.<\/p>\n<p>Some VPN flaws were \u201ctrivial to the point of embarrassing for the vendor,\u201d he says, while even the complex ones should have been caught by any organization seriously investing in product security.<\/p>\n<p>Still, despite the basic nature of some of these vulnerabilities, most do not directly allow an attacker to execute arbitrary code or commands on the underlying OS with root privileges. Instead, attackers often must find and chain together vulnerabilities across multiple components, requiring them to understand how those components interact and identify a path to remote code execution.<\/p>\n<p>\u201cI wouldn\u2019t necessarily call them complex exploit chains, but I think it\u2019s a little unfair to call them simple as well,\u201d VulnCheck\u2019s Baines says. \u201cSomething like a Cisco ASA router or a PAN-OS system are very complicated systems. It takes a lot of knowledge of those systems to be able to write code in them and identify bugs.\u201d<\/p>\n<p><a href=\"https:\/\/bishopfox.com\/authors\/caleb-gross\">Caleb Gross<\/a>, director of capability development at offensive security firm Bishop Fox, also notes the reverse-engineering skill required to find these bugs, as firmware images for these devices aren\u2019t readily available, like open-source applications, and their file systems are often encrypted. Even after decryption, researchers or attackers must then learn how various components communicate.<\/p>\n<p>\u201cIdentifying a command injection that is looking for a command string being passed to a system in some C or C++ code is not a terribly difficult thing to find,\u201d Gross says. \u201cBut I think the trouble is understanding a really complicated appliance like these security network appliances. It\u2019s not just like a single web application and that\u2019s it.\u201d<\/p>\n<p>This can also make it difficult for product developers themselves to understand the risks of a feature they add on one component if they don\u2019t have a full understanding of the entire product architecture. In large product organizations, it\u2019s not unusual for different development teams to handle different codebases for different parts of one product\u2019s system.<\/p>\n<p>But Harris offers a counterargument: The product security team only has to recognize a code bug with potential security implications and fix it. They don\u2019t have to develop a working exploit, like an attacker does.<\/p>\n<p>\u201cIf you\u2019re a product security team, your job is not really exploitation, like getting a shell,\u201d he says. \u201cYour aim is to work out how many of these vulnerabilities that you identify are exploitable. Can you remove the low-hanging fruit \u2014 the things that are trivial that someone is going to find \u2014 and then you can invest your efforts in finding more and more complex things.\u201d<\/p>\n<p>Harris adds: \u201cIn our opinion, again, looking at what we\u2019ve seen the last 12 months, there\u2019s no evidence that those efforts being made by those vendors are having an effect.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"2025-networking-and-security-device-zero-day-flaws\">2025 networking and security device zero-day flaws<\/h2>\n<figure class=\"wp-block-table\">\n<div class=\"overflow-table-wrapper\">\n<table class=\"has-fixed-layout\">\n<tbody>\n<tr>\n<td><strong>Product<\/strong><\/td>\n<td><strong>CVE<\/strong><\/td>\n<td><strong>Flaw type<\/strong><\/td>\n<td><strong>CVSS<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/4063518\/patch-now-attacker-finds-another-zero-day-in-cisco-firewall-software.html\">Cisco Adaptive Security Appliance<\/a><\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-20362\">CVE-2025-20362<\/a><\/td>\n<td>Access restricted URL without authentication<\/td>\n<td>6.5 (Medium)<\/td>\n<\/tr>\n<tr>\n<td>Cisco IOS XE<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-20352\">CVE-2025-20352<\/a><\/td>\n<td>Denial of service<\/td>\n<td>7.7 (High)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/3802722\/fortinet-confirms-zero-day-flaw-used-in-attacks-against-its-firewalls.html\">Fortinet FortiOS and FortiProxy firewalls<\/a> and secure web gateways<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-55591\">CVE-2024-55591<\/a><\/td>\n<td>Authentication bypass<\/td>\n<td>9.6 (Critical)<\/td>\n<\/tr>\n<tr>\n<td>Fortinet <a href=\"https:\/\/www.csoonline.com\/article\/4040122\/fortinet-patches-critical-flaw-with-public-exploit-in-fortisiem.html\">FortiSIEM<\/a><\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-25256\">CVE-2025-25256<\/a><\/td>\n<td>OS command injection<\/td>\n<td>9.8 (Critical)<\/td>\n<\/tr>\n<tr>\n<td>Fortinet FortiVoice<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-32756\">CVE-2025-32756<\/a><\/td>\n<td>Stack-based buffer overflow<\/td>\n<td>9.6 (Critical)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/4071773\/gladinet-file-sharing-zero-day-brings-patched-flaw-back-from-the-dead.html\">Gladinet CentreStack<\/a><\/p>\n<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-11371\">CVE-2025-11371<\/a><\/td>\n<td>Local file inclusion flaw<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/3652369\/ivanti-warns-critical-rce-flaw-in-connect-secure-exploited-as-zero-day.html\">Ivanti Connect Secure SSL VPN appliances<\/a><\/p>\n<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-22457\">CVE-2025-22457<\/a><\/td>\n<td>Stack-based buffer overflow<\/td>\n<td>9.0 (Critical)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/3652369\/ivanti-warns-critical-rce-flaw-in-connect-secure-exploited-as-zero-day.html\">Ivanti Connect Secure SSL VPN appliances<\/a><\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-0282\">CVE-2025-0282<\/a><\/td>\n<td>Stack-based buffer overflow<\/td>\n<td>9.0 (Critical)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/3652369\/ivanti-warns-critical-rce-flaw-in-connect-secure-exploited-as-zero-day.html\">Ivanti Connect Secure SSL VPN appliances<\/a><\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-0283\">CVE-2025-0283<\/a><\/td>\n<td>Stack-based buffer overflow<\/td>\n<td>7.0 (High)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/3985912\/ivanti-patches-two-epmm-flaws-exploited-in-the-wild.html\">Ivanti Endpoint Manager Mobile<\/a> (formerly MobileIron Core)<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-4427\">CVE-2025-4427<\/a><\/td>\n<td>Authentication bypass<\/td>\n<td>5.3 (Medium)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/3985912\/ivanti-patches-two-epmm-flaws-exploited-in-the-wild.html\">Ivanti Endpoint Manager Mobile<\/a> (formerly MobileIron Core)<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-4428\">CVE-2025-4428<\/a><\/td>\n<td>Remote code execution<\/td>\n<td>7.2 (High)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/3844122\/chinese-cyberespionage-group-deploys-custom-backdoors-on-juniper-routers.html\">Juniper MX Series routers<\/a><\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-21590\">CVE-2025-21590<\/a><\/td>\n<td>Arbitrary code execution<\/td>\n<td>6.7 (Medium)<\/td>\n<\/tr>\n<tr>\n<td>Libraesva Email Security Gateway<\/p>\n<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-59689\">CVE-2025-59689<\/a><\/td>\n<td>Command injection<\/td>\n<td>6.1 (Medium)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/4047218\/attackers-exploiting-netscaler-adc-and-gateway-zero-day-flaw-citrix-warns.html\">NetScaler ADC<\/a><\/p>\n<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-7775\">CVE-2025-7775<\/a><\/td>\n<td>Memory overflow leading to remote code execution or denial of service<\/td>\n<td>9.2 (Critical)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/4038645\/citrix-netscaler-flaw-likely-has-global-impact.html\">NetScaler Gateway<\/a><\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-6543\">CVE-2025-6543<\/a><\/td>\n<td>Memory overflow vulnerability leading to unintended control flow and denial of service<\/td>\n<td>9.2 (Critical)<\/td>\n<\/tr>\n<tr>\n<td>Palo Alto Networks firewalls<\/p>\n<\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-0108\">CVE-2025-0108<\/a><\/td>\n<td>Authentication bypass<\/td>\n<td>8.8 (High)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.csoonline.com\/article\/3809593\/sonicwalls-secure-mobile-access-appliance-faces-zero-day-attacks.html\">SonicWall Secure Mobile Access<\/a><\/td>\n<td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-23006\">CVE-2025-23006<\/a><\/td>\n<td>Pre-authentication deserialization of untrusted data<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/figure>\n<h2 class=\"wp-block-heading\" id=\"security-debt-and-prioritization-challenges\">Security debt and prioritization challenges<\/h2>\n<p>Another problem? These appliances have a lot of legacy code, some that is 10 years or older. Plus, products and code bases inherited through acquisitions often means the developers who originally wrote the code might be long gone. For example, Ivanti, one of the <a href=\"https:\/\/www.csoonline.com\/article\/3954735\/ivanti-warns-customers-of-new-critical-flaw-exploited-in-the-wild.html\">more frequently targeted vendors<\/a> over the past two years, acquired Pulse Secure in 2020, and the Pulse Connect Secure SSL VPN has since become <a href=\"https:\/\/www.csoonline.com\/article\/3652369\/ivanti-warns-critical-rce-flaw-in-connect-secure-exploited-as-zero-day.html\">Ivanti Connect Secure<\/a>.<\/p>\n<p>According to <a href=\"https:\/\/www.veracode.com\/leadership\/chris-wysopal\/\">Chris Wysopal<\/a>, co-founder and chief security evangelist at application security testing company Veracode, tackling vulnerabilities in old code, known as security debt, is expensive and hard. And developers are more reluctant to fix certain issues, particularly those in C and C++ code, such as buffer and integer overflows, due to concern that they might break something they don\u2019t fully understand how it works.<\/p>\n<p>\u201cIf you have a modern process of application security testing and flaws are detected soon after code is written, the developer can go in and fix it,\u201d Wysopal says. \u201cBut when you\u2019re dealing with legacy code \u2014 we\u2019ve actually seen some C++ applications where you have literally thousands of overflow issues and the original developers are long gone \u2014 it\u2019s very difficult to get a new developer to look at it, and they don\u2019t really want to touch the code. They get to a point where it\u2019s like: Well, prove to me it\u2019s exploitable, because this is a critical old piece of code that no one understands and it\u2019s dangerous to touch it.\u201d<\/p>\n<p>As a result, some flaws require more proof of impact than others, and proving that a buffer overflow can result in arbitrary code execution is not straightforward; it requires also bypassing exploit mitigations on the OS, such as ASLR, which randomizes memory addresses. Command injection issues, on the other hand, are much easier to fix, according to Wysopal, even in old code bases. Then authorization bypasses usually require manual penetration testing to find.<\/p>\n<p>\u201cEach one of these flaw categories is a little different and this is why application security is hard,\u201d he says. \u201cBut these are all top 10 issues. Things that these organizations should have a plan to say, \u2018We\u2019re going to eliminate the top 10 classes of vulnerabilities in our product.\u2019 And it\u2019s frankly just expensive and hard to do when you have big legacy code bases.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"vendors-need-to-set-a-higher-standard-for-themselves\">Vendors need to set a higher standard for themselves<\/h2>\n<p>All researchers interviewed for this story agree that manufacturers of security appliances need to do a better job when it comes to their secure development lifecycle programs, internal application security testing, code reviews, and legacy code rewrites. Some, however, don\u2019t have much hope for things to change because financial incentives to do so are missing.<\/p>\n<p>Rewriting old code to be secure by design requires a lot of development time. Even fixing all the bugs that static and dynamic scanners find can incur budgetary challenges, resulting in the need to prioritize some over others.<\/p>\n<p>But security vendors need to be held to a higher standard because they sell products marketed to protect banks, government agencies, and critical infrastructure. They shouldn\u2019t become a liability for customers, or in Harris\u2019 words: \u201cAre we expecting APT [Advanced Persistent Threat] groups to be our internal QA teams?\u201d<\/p>\n<p>Wysopal pointed to <a href=\"https:\/\/www.cisa.gov\/secure-software-attestation-form\">the Secure Software Development Attestation Form<\/a> that the US Cybersecurity and Infrastructure Security Agency (CISA) launched last year and <a href=\"https:\/\/www.cisa.gov\/securebydesign\">its Secure by Design principles<\/a> as a step in the right direction. The CISA program <a href=\"https:\/\/www.csoonline.com\/article\/3971375\/secure-by-design-is-likely-dead-at-cisa-will-the-private-sector-make-good-on-its-pledge.html\">has seen some setbacks<\/a> with two of the program\u2019s architects and leaders, Lauren Zabierek and Bob Lord, leaving CISA in April amid staff and budget cuts. But it wouldn\u2019t be surprising if other governments enacted legislation in the future to force the market\u2019s hand. \u201cI would be shocked if there\u2019s not a conversation about regulation ongoing after the number of breaches we\u2019ve now seen across fairly critical industries due to vulnerabilities in appliances that are mission-critical repeatedly, and then the root cause being questionable,\u201d watchTowr\u2019s Harris says. \u201cIt\u2019s really now a race to see: Will enterprises vote with their wallets and their budgets, or will regulation come in first to help us begin to deal with this? But either way, something must change.\u201d<\/p>\n<aside class=\"sidebar\">\n<h3 id=\"vendor-efforts-to-stem-the-tide-on-network-edge-exploitation\">Vendor efforts to stem the tide on network edge exploitation<\/h3>\n<p>Vendors who responded to questions for this story all said they take secure development lifecycle practices seriously and are making investments in architectural changes, including rewriting legacy code. For example, Palo Alto Networks pointed to its implementation of <a href=\"https:\/\/www.redhat.com\/en\/topics\/linux\/what-is-selinux\">Security-Enhanced Linux<\/a> (SELinux) in full enforcement mode and <a href=\"https:\/\/www.redhat.com\/en\/blog\/how-use-linux-kernels-integrity-measurement-architecture\">Integrity Measurement Architecture (IMA)<\/a> in PAN-OS as examples of platform security hardening to mitigate entire classes of threats.<\/p>\n<p>Christopher Ganas, director of the Deep Product Security Research Team at Palo Alto\u2019s network security division, told CSO that his team has tripled in size and has no budgetary constraints or other barriers for evolving the code base of the 20-year-old PAN-OS into a more secure architecture.<\/p>\n<p>He noted that his team was created to investigate the root causes of bugs that tools and manual code reviews find and then to implement architectural changes to make exploitation of those flaws much harder. Often that means simplifying the architecture to make security boundaries \u2014 and the interactions between them \u2014 much clearer. That way, developers are better equipped to write secure code.<\/p>\n<p>\u201cWe have a very long history of responsibly processing, remediating, disclosing vulnerabilities, but ultimately with how the threat landscape evolved over the last few years, there is this absolute need for us to go deeper into our products and ultimately find and address all of these architectural issues,\u201d Ganas said. \u201cWe acknowledge the scale of exploitation across all vendors, but from our perspective, we fundamentally need to lead our industry and acknowledge that customers trust us with their security. We are offering them a security platform. We are ultimately protecting their network. We have to put ourselves to the highest standard of product security and operational excellence around these issues.\u201d<\/p>\n<p>Ivanti, whose security products were the target of multiple zero-day exploits by APT groups over the past two years, has also <a href=\"https:\/\/www.ivanti.com\/resources\/secure-by-design\/2024\">signed the CISA Secure by Design pledge<\/a> and <a href=\"https:\/\/www.ivanti.com\/blog\/from-legacy-to-security-ivanti-connect-secure\">is making architectural changes and tackling the technical debt<\/a> that has accumulated over decades.<\/p>\n<p>\u201cThe current threat landscape for edge devices is aggressive and sophisticated, and no company has been proven immune,\u201d an Ivanti spokesperson told CSO. \u201c[\u2026] Recognizing meaningful advances don\u2019t happen overnight, we committed to putting in the time and financial investment, including rearchitecting legacy products, embedding security throughout the development lifecycle, and anticipating potential adversary misuse across our planning process. We have not hesitated to touch older code as part of this effort.\u201d<\/p>\n<p>The Cloud Software Group, which owns NetScaler (aka Citrix NetScaler), has also signed <a href=\"https:\/\/www.citrix.com\/blogs\/2025\/04\/02\/citrixs-approach-to-secure-by-design\/\">the CISA Secure by Design pledge<\/a> and told CSO that it has embedded secure development methodologies throughout its engineering teams.<\/p>\n<p>\u201cAt Cloud Software Group, we take security seriously,\u201d the company said. \u201cWe have published our approach to security, including <a href=\"https:\/\/www.citrix.com\/content\/dam\/citrix\/en_us\/documents\/about\/cloud-software-group-secure-development-lifecycle-for-citrix-and-netscaler-products-and-services.pdf\">our secure development lifecycle (SDLC) process<\/a>. Our dedicated Product Security Team, which serves as the cornerstone of this commitment, regularly reviews process improvements and is responsible for a comprehensive set of proactive and reactive security activities throughout the product lifecycle.\u201d These include proactive vulnerability identification, implementation of strong security controls, driving secure development practices and product incident response management.\u201d <em>\u2014 LC<\/em><\/p>\n<\/aside>\n<p><em>For more insights into this topic <\/em><a href=\"https:\/\/www.cio.com\/podcast\/4068978\/why-hackers-are-now-targeting-vpns-and-routers-what-it-leaders-want-ep-12.html\"><em>watch our conversation on the Global Tech Tales podcast with Daniel dos Santos<\/em><\/a><em>, the head of research at cyber risk management firm Forescout Technologies.<\/em><\/p>\n<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Enterprises have long relied on firewalls, routers, VPN servers, and email gateways to protect their networks from attacks. Increasingly, however, these network edge devices are becoming security liabilities themselves. Every few weeks, another crisis plays out: Security teams scramble to patch and scan their network appliances for malware implants after another zero-day attack is newly reported. Vendors emphasize that sophisticated nation-state actors carry out these&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14984\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14984","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14984"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14984\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}