214
submitted 10 months ago by L4s@lemmy.world to c/technology@lemmy.world

Xfinity waited 13 days to patch critical Citrix Bleed 0-day. Now it’s paying the price::Data for almost 36 million customers now in the hands of unknown hackers.

all 23 comments
sorted by: hot top controversial new old
[-] anlumo@lemmy.world 69 points 10 months ago

The customers are paying the price, not them.

[-] jet@hackertalks.com 47 points 10 months ago* (last edited 10 months ago)

Their a last Mile Telco Monopoly. They're not paying the price for anything. Nobody does business with Comcast who has a choice. All of their customers are captured.

[-] NOT_RICK@lemmy.world 7 points 10 months ago

Yup, I’m one of those people. I call Verizon every six months asking if they service my location yet.

[-] ipkpjersi@lemmy.ml 34 points 10 months ago

It's not paying the price lol they won't be held accountable and they know that, it's the customers paying the price. These headlines are so stupid nothing but ragebait garbage.

[-] MummifiedClient5000@feddit.dk 14 points 10 months ago

The representative declined to say why company admins didn't patch sooner.

In the corporate world, staying quiet and doing nothing is often safer for your ass than doing something that could cause downtime (such as emergency patching).

[-] Kyrgizion@lemmy.world 8 points 10 months ago

Sooo glad my employer moved away from Citrix in favor of Parallels years ago. Dealing with the Citrix client was a nightmare of epic proportions. Imagine the shitstorm with our clients if something like this were to happen to us.

[-] autotldr@lemmings.world 7 points 10 months ago

This is the best summary I could come up with:


Comcast waited 13 days to patch its network against a high-severity vulnerability, a lapse that allowed hackers to make off with password data and other sensitive information belonging to 36 million Xfinity customers.

Exploits disclose session tokens, which the hardware assigns to devices that have already successfully provided login credentials.

The name Citrix Bleed is an allusion to Heartbleed, a different critical information disclosure zero-day that turned the Internet on its head in 2014.

That vulnerability, which resided in the OpenSSL code library, came under mass exploitation and allowed the pilfering of passwords, encryption keys, banking credentials, and all kinds of other sensitive information.

A sweep of the most active ransomware sites didn’t turn up any claims of responsibility for the hack of the Comcast network.

Comcast is requiring Xfinity customers to reset their passwords to protect against the possibility that attackers can crack the stolen hashes.


The original article contains 436 words, the summary contains 147 words. Saved 66%. I'm a bot and I'm open source!

[-] LemmyIsFantastic@lemmy.world 6 points 10 months ago

Oh fuck THIRTEEN WHOLE DAYS? That really ain't that bad. 30 days for a you'd from CVE is quicker than industry standard.

[-] Joker@discuss.tchncs.de 1 points 10 months ago

In all fairness, 13 days is a fairly quick turnaround for patching in the enterprise. The breach was only 6 days after disclosure. They were almost certainly in the planning stages already when this happened.

I used to be the head of IT in a large organization that worked with clients in highly regulated sectors. They all performed regular audits of our security posture. Across the board, they expected a 30 day patch policy. For high profile vulnerabilities like this one, they would often send an alert and expected imminent action within a commercially reasonable time frame. We would get it done anywhere from 24 hours to days later depending on the situation and whether there were complications. It was usually easy for us because we were patching every device and application on the network every couple weeks anyway. A hotfix is much easier to deploy when everything is up to date already and there are no prerequisite service packs. We knew we were much faster than most and it took a lot of work to get there. Thirteen days is a little slow for a 0-day by our standards but nowhere near unreasonable.

The reality is many enterprises don't patch at all or don't do it completely. They may patch servers but not workstations. They may patch the OS but not the applications. It's common to find EOL software in critical areas. A friend of mine did some work for a railroad company that had XP machines controlling the track switches. There are typically glaring holes throughout the company when it comes to security. Most breaches go unreported.

Look, I hate Comcast as much as anyone. They suck. But taking 13 days to patch isn't unreasonable. Instead, people should be asking why there weren't other security layers in place to mitigate the vulnerability.

this post was submitted on 20 Dec 2023
214 points (98.2% liked)

Technology

59038 readers
3023 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS