Today, CISA and FBI are releasing their newest Secure by Design Alert in the series, Eliminating OS Command Injection Vulnerabilities, in response to recent well-publicized threat actor campaigns that exploited OS command injection defects in network edge devices (CVE-2024-20399CVE-2024-3400CVE-2024-21887) to target and compromise users. These vulnerabilities allowed unauthenticated malicious actors to remotely execute code on network edge devices.

OS command injection vulnerabilities have long been preventable by clearly separating user input from the contents of a command. Despite this finding, OS command injection vulnerabilities—many of which result from CWE-78—are still a prevalent class of vulnerability.

CISA and FBI urge CEOs and other business leaders at technology manufacturers to request their technical leaders analyze past occurrences of this class of defect and develop a plan to eliminate them in the future. For more on how to champion Secure by Design principles, visit our webpage. To join with the 150+ other companies who have signed our Secure by Design pledge, visit here.

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore More

Report: Manufacturing bears the brunt of industrial ransomware

February 20, 2024 0 Comments 0 tags

Manufacturing continues to be the industrial sector hardest hit by ransomware, according to a new report by industrial cybersecurity firm Dragos. The firm’s year-in-review reported more than 900 ransomware incidents

ONCD report: ‘Fundamental transformation’ in cyber, tech drove 2023 risks

May 7, 2024 0 Comments 0 tags

Malicious hackers are exploiting emerging technologies that rapidly connect people, posing advanced cyber risks in a world where the digital and physical are increasingly interwoven, according to a report Tuesday

LockBit Leader aka LockBitSupp Identity Revealed

May 7, 2024 0 Comments 0 tags

Russian national Dmitry Yuryevich Khoroshev is behind the LockBitSupp persona, law enforcement revealed