[<prev] [next>] [day] [month] [year] [list]
Message-ID: <d206574e-e95c-225a-9043-f58b0e786a3b@vulnerability-lab.com>
Date: Thu, 3 Dec 2020 13:48:29 +0100
From: Vulnerability Lab <research@...nerability-lab.com>
To: fulldisclosure@...lists.org
Subject: [FD] Bundeswehr VDPBw 50+ reported vulnerabilities
Department: Bundeswehr - CIR
Title: Over 50 reported weaknesses - a first conclusion on the
VDPBwVulnerability Disclosure Policy of the Bundeswehr
---
Date: 2020-12-03
Location: Bonn (Germany)
Reading Time: 5 min
---
Over 50 reported weaknesses - a first conclusion on the
VDPBwVulnerability Disclosure Policy of the Bundeswehr
At the end of October, the Bundeswehr called on IT security researchers
to actively inform the Bundeswehr of weak points in their IT systems -
with success. After seven weeks, the Chief Information Security Officer
of the German Armed Forces (CISOBwChief Information Security Officer),
Major General Jürgen Setzer, draws an initial positive conclusion.
Picture:
https://www.bundeswehr.de/resource/image/4842446/landscape_ratio16x9/800/450/3d229851c128e18c92868b2b4d071a0/Ne/ciso-juergen-setzer-erklaert-den-soldaten-was.jpg
With the Chief Information Security Officer of the Bundeswehr, Major
General Jürgen Setzer, there is overall responsibility for cyber
security in the Bundeswehr.
(c) Bundeswehr / Martina Pump
General, around seven weeks have now passed since the Bundeswehr's
Vulnerability Disclosure Policy was launched. What is your first conclusion?
On October 22nd, we launched the Bundeswehr's Vulnerability Disclosure
Policy (VDPBwVulnerability Disclosure Policy of the Bundeswehr) and
called on us to actively point out weaknesses in the Bundeswehr's IT
systems. Since then, over 20 IT security researchers have participated
and submitted numerous reports regarding possible vulnerabilities. We
initially assessed these reports to determine whether they were any
weaknesses within the meaning of the Bundeswehr's VDPBwVulnerability
Disclosure Policy. If this is the case, we will act immediately. We have
already fixed some weaknesses, others, more complex ones, are still
being worked on.
Our big thanks and respect go to all IT security researchers who
contribute to making the IT systems of the Bundeswehr more secure. We
show this publicly with the individual entry and the attribution on our
thank you page.
Can you tell us which weak points in the Bundeswehr IT information
technology are involved here?
Yes, the majority of these are cross-site scripting weaknesses and
configuration errors in our websites in the Bundeswehr. But the IT
security researchers also showed us SQL injections and remote code
execution options. With the help of the reporters and their detailed
documentation, we have already been able to close them.
When it comes to breaking new ground, there is certainly also criticism
of the path taken. What does it look like?
https://www.bundeswehr.de/resource/image/4842442/landscape_ratio16x9/800/450/ad8225d86ba5d50462a5a03ddf9d8b0a/nO/laptop-it-sicherheit.jpg
The Bundeswehr actively calls on IT security researchers to report
weaknesses in their IT systems.
(c) Bundeswehr / Stefan Uj
First of all, I can say that most of the feedback from professionals,
other authorities and companies is positive. But of course there was
also criticism. We are also very happy to accept constructive criticism.
For example, the lack of financial incentives was criticized by many.
Here, however, surprisingly for us, our guidelines for action were
confused with a bug bounty, even by specialist media and experts, which
we have expressly not advertised.
We do not shy away from the controversial discourse with the public.
Even before the Bundeswehr's VDPBwVulnerability Disclosure Policy was
published, we took findings on vulnerability reports from IT security
researchers, such as @secuninj, @ meme82 or the @vuln_lab, very
seriously. There has already been a constructive and good cooperation in
this area in the past. There were also discussions with Dr. Sven Herpig
from the New Responsibility Foundation or Manuel Atug from the AG
KRITISKritische Infrastrukturen are helpful. This communication is very
important. It leads to transparency and a better mutual understanding.
But some are already criticizing the fact that the Bundeswehr does not
comply with the law. In particular, it concerns § 303a StGB. Are you
bowing the right here?
Understandably, the development of such a guideline does not happen
overnight. Several lawyers from the Bundeswehr have checked our policy
for suitability and adjusted it. We were able to develop a practicable
solution for the Bundeswehr as an authority. In a nutshell, we allow IT
security researchers to look for weak points in our systems. This also
eliminates the criminal liability.
Legal classification:
"By granting the appropriate consent to reveal the weak points within
the framework of the Bundeswehr's Vulnerability Disclosure Policy, the
elements of the offense" unauthorized "(Sections 202 a ff. StGB) or"
unlawful "(Section 303 a StGB) can be excluded. According to §§ 202 a
ff. StGB, suitable crime objects are only data that are not intended for
the perpetrator, that is, should not be available to him at the time of
the crime according to the will of the authorized person; however, if
the entitled person makes such a determination, the objective factual
situation is excluded.
In the context of a possible criminal liability according to §303 a
StGB, the consent of the person entitled has the effect of excluding the
offense, i.e. here too there would be no criminal liability."
Does that mean the Bundeswehr can now be hacked without the risk of
punishment?
No, that's not exactly what it means. If the IT security researchers
adhere to the guidelines of the VDPBwVulnerability Disclosure Policy of
the German Armed Forces, then the reporters do not have to fear
forwarding the matter to the law enforcement authorities. The Bundeswehr
does not hold a "Capture the Flag" event here, where everyone can try
out something. The Bundeswehr's VDPBwVulnerability Disclosure Policy
provides the legal framework for an orderly professional vulnerability
reporting to the Bundeswehr by third parties. And so it continues to
apply that if the IT security researcher is pursuing recognizable
criminal or intelligence intentions, the German investigative
authorities can prosecute them. The Bundeswehr can, however, express its
intention not to report facts that are within the possibilities and
limits of our VDP.
It is also repeatedly criticized that no scope was specified. What do
you mean with that?
From our point of view, the defined framework, the scope and the IT
systems concerned are clearly evident from the guidelines of the
VDPBwVulnerability Disclosure Policy of the Bundeswehr. The Bundeswehr's
VDPBwVulnerability Disclosure Policy speaks of weaknesses in the
Bundeswehr's IT systems and web applications. These IT systems and web
applications mean all IT systems connected and accessible via the
Internet. These are primarily the websites of the Bundeswehr and the
associated departments. A look at the respective imprint of the
appearances should be enough to determine the affiliation with the
Bundeswehr. Understandably, however, a weapon system or access to
confidential IT systems should not be possible per se via the public
Internet. In addition, physical access is required, which is not
permitted according to our policy. The general rule for IT security
researchers is to approach it with professional skills so that no damage
is caused. Excluded from the reports and remain punishable, as stated in
the Bundeswehr's VDPBwVulnerability Disclosure Policy, “non-qualified
vulnerabilities”.
Last but not least: One of the main criticisms that you have already
mentioned was and is the lack of bounty. Why is it "only" thanked with
an entry on the thank you page?
The Bundeswehr's VDPBwVulnerability Disclosure Policy is a Bundeswehr
guideline for reporting vulnerabilities from third parties and not a bug
bounty. We do not rely on financial incentives, but on the voluntary
commitment of security researchers, and with success. I would like to
express my thanks to all security researchers who have supported us so
far and in the future.
Mr. General, from your point of view, the Bundeswehr's
VDPBwVulnerability Disclosure Policy is a successful tool for making the
Bundeswehr's IT systems more secure. However, you will probably not rely
on that alone.
https://www.bundeswehr.de/resource/image/4842754/landscape_ratio16x9/800/450/1c3ddd75c55486e69ef933cb35ba2e94/Sm/bild-incident-response.jpg
The professionals at the Bundeswehr Cyber Security Center protect the
Bundeswehr's IT systems from attacks by setting up firewalls and
constantly monitoring the IT networks.
(c) Bundeswehr / Johann Flaum
Of course not. The application of the Bundeswehr's Vulnerability
Disclosure Policy is a very good and already successful addition.
However, it is only one pillar in addition to our own investigations in
order to obtain information on unknown vulnerabilities and security gaps
in our systems. To check the effectiveness of the technical and
organizational measures, we rely on safety inspections and audits. We
also continue to use weak point analyzes, penetration testing and red
teaming in a targeted manner. Only with this holistic approach will we
be able to make our IT systems more secure.
[by KdoCIR]
Reference:
https://www.bundeswehr.de/de/organisation/cyber-und-informationsraum/aktuelles/ueber-50-gemeldete-schwachstellen-ein-erstes-fazit-zur-vdpbw-4838328
Note:
The german original article has been translated from a public site of
the bundeswehr (bundeswehr.de) to an independent english version to
inform the international whitehat scene and public international
security business.
In case of questions, please directly request the press office of the
bundeswehr.
Reference: [Translation (EN)]
https://paste.0xfc.de/?e9c928a8dafe3a42#9sBA3FybSFWNqoHFgrmNEACi8Df54y1Kqxc6NVB76oi1
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists