<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Interxect Services Limited</title>
	<atom:link href="https://www.interxect.com/tag/appliances/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.interxect.com</link>
	<description>Helping You Use Information Technology Productively</description>
	<lastBuildDate>Sat, 13 Jul 2013 00:19:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.interxect.com/main/wp-content/uploads/2019/08/cropped-site_icon-32x32.png</url>
	<title>Interxect Services Limited</title>
	<link>https://www.interxect.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">113413426</site>	<item>
		<title>Ensure that you secure those security appliances or you may find yourself becoming a victim of irony</title>
		<link>https://www.interxect.com/ensure-that-you-secure-those-security-appliances/</link>
					<comments>https://www.interxect.com/ensure-that-you-secure-those-security-appliances/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Sat, 08 Jun 2013 14:00:20 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[appliances]]></category>
		<category><![CDATA[Information technology]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=709</guid>

					<description><![CDATA[Beware of hidden risks. Your network may be under threat from the very things that you are hoping will protect it. ]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="size-post-image wp-image-711 alignleft" alt="Firewall appliance" src="https://www.interxect.com/main/wp-content/uploads/2013/06/Fotolia_20600496_XS-250x200.jpg" width="250" height="200" />When IT departments work at securing their environment, they set about installing firewalls, implementing email gateways and web filtering, securing their computers and servers, and some go the extra distance to secure their networking equipment, such as routers and switches. At the end, they feel pretty secure, but there may be a threat hidden in the very products that they hope may protect them – the security appliances.</p>
<p><span id="more-709"></span>A recent <a title="Hacking Appliances: Ironic exploits in security products" href="http://www.nccgroup.com/media/231320/hacking_appliances_whitepaper_ben_williams_1.1.pdf" target="_blank">report by NCC Group</a> found that many security appliances such as email gateways, firewalls, web content filters, terminal services, unified threat management (UTM) systems and other appliances were filled with vulnerabilities.</p>
<p>The report highlighted products from Sophos, Citrix, Pfsense, Symantec and Trend Micro showing that many had vulnerabilities such as:</p>
<ul>
<li>Cross-Site Scripting (XSS)</li>
<li>SSH or WebUI susceptible to brute-force attacks</li>
<li>Unpatched operating systems</li>
<li>Privilege Escalation</li>
<li>Command-Injection via the WebUI</li>
</ul>
<p>Many users may feel that because these are security appliances that they must be inherently secure, but the report clearly shows that this is not the case.</p>
<p>Security appliances are not just a cause of concern, many other services now come in an appliance form-factor. Services such as IP Telephony PBXs, environmental management and network management come as appliances that you just drop and configure within your network. Also consider the many network devices that have mini operating systems within them such as environmental monitors, network printers or security systems. All of these are applications that need to be managed and secured.</p>
<p>While the risk that those vulnerabilities may be exploited by outside attackers may be small, simply because an appliance or device is not directly connected to the Internet does not mean that it is not at risk and that you should not make all attempts to secure it. Attacks can originate from the inside of the network, or in the case where a user PC may be compromised, allow a way for the attacker to gain even more control of your network.</p>
<p>To reduce the risks of these appliances and devices consider implementing the following:</p>
<ul>
<li>Change the non-default usernames and passwords on all appliances and devices. Use a strong password.</li>
<li>Avoid exposing the management interfaces of these appliances and devices to the internet or other unprotected networks.</li>
<li>Consider placing the management interfaces in a protected network behind a firewall within your internal network.</li>
<li>Keep the operating systems and firmware of the appliances and devices updated.</li>
<li>Ensure that logging is enabled on all the devices, and if possible, set up alerts to be sent for any login attempt.</li>
<li>Disable unnecessary or insecure services on appliances such as telnet, http and ftp. Use encrypted protocols such as SSH, SFTP and HTTPS.</li>
</ul>
<p>Here&#8217;s to a more secure future.</p>
<p>Original article: <a href="https://www.interxect.com/ensure-that-you-secure-those-security-appliances/" rel="bookmark" title="Permanent link to 'Ensure that you secure those security appliances <small class="subtitle">or you may find yourself becoming a victim of irony</small>'">Ensure that you secure those security appliances <small class="subtitle">or you may find yourself becoming a victim of irony</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/ensure-that-you-secure-those-security-appliances/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">709</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced 
Database Caching 2/46 queries in 0.045 seconds using Disk

Served from: www.interxect.com @ 2025-06-12 08:08:29 by W3 Total Cache
-->