February 22, 2018
January 31, 2018
The bSecure team would like to provide an update on our planned migration to the new firewall services in the Data Center.
Data Center Firewall Administrator Training
As previously announced, we will be holding two on-campus training sessions for Data Center Firewall Administrators. Both sessions are identical, so you only need to attend one. The Dates for these one day sessions will be:
January 19, 2018
The Internal Revenue Service has reported a big spike in phishing and malware incidents during the 2016 and 2017 tax seasons.
January 12, 2018
The bSecure project team would like to provide the Campus IT community, and especially administrators of existing firewall services, with an update on the planned migration to the new service, and information on what to expect next.
January 5, 2018
Summary
A team of security researchers disclosed several software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from many types of computing devices with many different vendors’ processors and operating systems.
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. [1]
December 4, 2017
The Network Operations and Services team and the Information Security and Policy group are implementing bSecure, a new firewall and information security service for campus. This service will replace the existing Cisco ASA-based Data Center and Campus Departmental Firewall services.
November 29, 2017
October 18, 2017
October 17, 2017
Researchers have discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. This includes everything from computers, tablets, phones, home wireless routers and any device that supports WPA2 over Wi-Fi.
While details are still emerging, not all vendors have released patches as of yet. So, in some cases, there will be little users can do until patches are released. An attacker needs to be in range of an access-point to leverage this attack.
September 6, 2017
Summary
A critical vulnerability has been discovered in the Apache Struts web application framework for Java web applications. A remote code execution attack is possible when using the Apache Struts REST plugin with XStream handler to deserialise XML requests. [1]
Impact
Attackers can execute arbitrary code remotely by exploiting this vulnerability.
July 17, 2017
The bSecure team invites you to join us for a series of Town Hall events this month. All are welcome and existing Campus firewall customers are strongly encouraged to attend.
What?
The purpose of these Town Hall events is to introduce Campus to the bSecure project and its team. Topics will include:
June 14, 2017
Summary
A remote code execution vulnerability exists when Windows Search handles objects in memory. This can be exploited by an attacker sending a specially crafted SMB message to the Windows Search service. [4]
Due to recent nation-state activity and the elevated risk of potential cyber attacks, Microsoft has released security updates for older unsupported versions of Windows for this issue as well as other high-severity fixes in the June patch release. [1]
June 1, 2017
bSecure is the new initiative from the Network Operations & Services and Information Security & Policy teams to replace legacy firewalls and VPN, and provide proactive security technologies to Campus.
You can access all bSecure project information at http://bsecure.berkeley.edu or https://security.berkeley.edu/projects/bsecure.
May 25, 2017
Summary
The samba team has released a patch for a Remote Code Execution bug that affects all versions between 3.5.0 and 4.6.3/4.5.9/4.4.13. This vulnerability will allow a malicious attacker to upload a library to a writable share then cause the server to execute that library. [1] Patches are available from the samba.org. [2]
Impact
May 3, 2017
April 13, 2017
April 1, 2017
March 9, 2017
Summary
A critical vulnerability has been discovered and released in the Apache Struts 2 framework. Patches are available from Apache. [1]
Impact
This vulnerability allows for unauthenticated, remote code execution on the server. Further, there are at least two known public exploits for this vulnerability [2] and ISP has already started to see scanning and exploit attempts against campus systems.
February 3, 2017
Summary
WordPress has fixed several critical flaws in its content management system, addressing cross-site scripting and sql injection bugs, along with a severe privilege escalation / content injection vulnerability. [1]