Comprehensive software reviews to make better IT decisions
Apple iOS and iPadOS VPN Bypass Vulnerability
A vulnerability has been discovered in Apple iOS and iPadOS where VPN (virtual private networking) can be bypassed, thereby not securing all traffic within the secure VPN tunnel.
Normally, when a VPN tunnel is established, the VPN software closes existing connections and re-establishes them within the secure VPN tunnel. In the VPN component of Apple iOS 13.3.1, it has been confirmed that existing connections are not properly closed, leading to data traffic that is not as secure as expected.
This vulnerability was first discovered by the Swiss company ProtonVPN. It has since been validated that the vulnerability exists in iOS versions 13.3.1 and the latest 13.4. iPadOS is similarly affected by this vulnerability.
ProtonVPN utilized WireShark’s packet sniffer to verify the vulnerability in the data packets sent and received by the iOS device.
Source: "VPN bypass vulnerability in Apple iOS," ProtonVPN, March 2020
ProtonVPN provided users a method to mitigate the risk; activating and deactivating Airplane Mode once a VPN connection has been established.This will disconnect all existing connections (both secured within the VPN tunnel and outside the tunnel), and then reconnect them properly within the secure VPN tunnel.
As iOS devices have established a foothold in business use, the danger of data leakage becomes greater if these devices have been secured by the organization’s VPN service. That said, mobile devices still tend to be considered insecure, and as such, IT departments continue to emphasize the importance of appropriate mobile device security standards to their organizations’ employee bases.
Apple’s iPad Pro devices, which run iPadOS, may be of concern as many organizations leverage iPad Pros as laptop replacements for mobile computing. As a result, it is likely that sensitive or confidential work regularly takes place on these devices, in contrast with the type of work conducted on iOS devices.
Until Apple addresses this vulnerability, we recommend users follow the mitigation actions provided by ProtonVPN.
Want to Know More?
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
Google has identified “unsafe” code in the Chromium web browser engine. This flaw introduces a potential vulnerability that effects Google Chrome, as well as all Chromium-based web browsers.
More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers. Trust and peace of mind are the core tenets of what they are selling and solutions like Acronis Cyber Protect Cloud can provide the platform upon which to deliver on those promises.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.