Description Preview
Overview
This vulnerability (CVE-2017-17023) is classified as CWE-345: Insufficient Verification of Data Authenticity. The issue affects the update mechanism in NCP Secure Entry Client 10.11 r32792 and its rebranded version, Sophos IPSec Client 11.04. When the client checks for updates, it uses unencrypted HTTP connections to retrieve update metadata, making it susceptible to interception. Furthermore, the client fails to validate whether the downloaded updates are properly signed before executing them. This combination allows attackers positioned between the client and update servers to inject malicious code that will be automatically executed with the same privileges as the VPN client, which typically runs with elevated permissions. Since VPN clients are often used to secure connections in untrusted networks, this vulnerability is particularly concerning as these are precisely the environments where MITM attacks are most feasible.
Remediation
Users should immediately update to NCP Secure Entry Client version 11.14 r42039 or later, which addresses this vulnerability. Sophos users should update to the corresponding patched version provided by Sophos. Until updates can be applied, organizations should consider the following mitigations:
- Disable automatic updates in the VPN client and manually update the software from trusted sources
- Implement network-level protections to prevent MITM attacks when possible
- Avoid using the vulnerable VPN client on untrusted networks
- Consider implementing application control policies to prevent the vulnerable components from connecting to the internet directly
References
- NCP Engineering VPN Client Download Page: https://www.ncp-e.com/en/resources/download-vpn-client/#c8680
- NCP Secure Entry Client Release Notes (Fixed Version): https://www.ncp-e.com/fileadmin/pdf/service_support/release_notes/NCP_Secure_Clients/NCP_Secure_Entry_Client/NCP_RN_Win_Secure_Entry_Client_11_14_r42039_en.pdf
- CWE-345: Insufficient Verification of Data Authenticity: https://cwe.mitre.org/data/definitions/345.html
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade