Enhancing Your Software Security Resilience

This month, we tackle the latest security alerts, summarize the NCSC 2024 Annual Review, and discuss how we fixed security issues that were sidelining a major multinational healthcare company.

 

Welcome to Origina’s Monthly Software Security Update.

Below are links to the latest and updated Vulnerability Advisories available through the Origina Vulnerability Advisory Portal.

The Vulnerability Advisory Portal is a vital resource, offering unlimited access to proactive mitigation advisories, even when OEM patches or fixes are unavailable. You’ll also find hardening guides and publications with regularly updated information on secure configurations and regulations.

We deliver up-to-date threat intelligence and mitigation strategies for vulnerabilities, regardless of the product version or third-party components involved.

Key benefits include:

  • Protecting your software investments
  • Extending the lifespan of your software
  • Maximizing value

Ask Origina how we can assist with new functionalities, policy compliance, or regulatory needs — from MFA integration to advanced cryptographic implementation.

Recent Security Alerts

Common Vulnerabilities and Exposures (CVE) ID
(Click on ID to open in Origina VA Portal)
Security Alert
Common Vulnerability Scoring System (CVSS) Score
Affected Products
IBM Security Appliance is vulnerable to hard-coded credentials.
9.4
IBM Security Verify Access Appliance 10.0.0 through 10.0.8
IBM Workload Scheduler is vulnerable to Local Privilege Escalation.
7.8
IBM Workload Scheduler Distributed 9.2, 9.3, 9.4, and 9.5
Tivoli Workload Scheduler is vulnerable to Local Privilege Escalation.
7.8
IBM Workload Scheduler 8.6, 9.1, 9.2, 9.3, and 9.4
IBM App Connect Enterprise Certified Containers are vulnerable to code injection.
9.8
formidable v3.1.4
IBM WebSphere server is vulnerable to cross-site scripting.
5.5
IBM WebSphere Application Server 8.5 and 9.0
IBM WebSphere Application Server is vulnerable to cross-site scripting.
4.8
IBM WebSphere Application Server 8.5 and 9.0
IBM Db2 is vulnerable to remote code execution.
9.8
FasterXML jackson-databind 2.x before 2.9.10.4
IBM Cognos Analytics is vulnerable to cross-site scripting.
5.4
IBM Cognos Analytics 11.1.7, 11.2.4, and 12.0.0
IBM Cognos Analytics is vulnerable to an external entity injection (XXE).
9.1
IBM Cognos Analytics 11.0 and 11.1
IBM Cognos Analytics is vulnerable to cross-site scripting.
6.1
IBM Cognos Analytics 11.1.7, 11.2.4, and 12.0.0

Security is at the heart of everything we do. Our focus goes beyond addressing individual risks and vulnerabilities. If you’re facing a software security, risk, or regulatory challenge and need expert guidance, we’re here to help. Reach out to your Customer Success Manager or submit a request through the Origina Self-Service Portal.

 

Boosting Cyber Resilience: Key Takeaways from the NCSC 2024 Annual Review

In an era of growing cyber complexity and threat, the U.K.’s National Cyber Security Centre (NCSC) has published its 2024 Annual Review, which underscores the urgency for collaborative cyber defense strategies. The report highlights a significant rise in incidents, with the NCSC responding to 542 cyber events over the past year, which was more than double the previous year. Of these, 89 were nationally significant, and 12 were classified as severe, marking a threefold increase in high-impact threats.

Key initiatives this year include efforts to defend democratic processes, particularly during elections, and bolster overall cyber resilience against hostile state actors and cybercriminals.

The report also calls attention to the growing misuse of AI in malicious cyber activities and urges organizations to adapt their defenses to these evolving risks. Additionally, the NCSC evaluated its CyberFirst program to gauge its societal impact and hosted its inaugural CyberFirst Hackathon to engage the next generation of cybersecurity talent.

The NCSC’s findings emphasize the necessity of proactive measures to bridge the widening gap between threats and defenses. These insights are not just vital for national security but provide a roadmap for global enterprises seeking to enhance their own cybersecurity frameworks.

For more details, visit the NCSC website or review their 2024 Annual Report.

 

Securing Docker Infrastructure for Enterprise Resilience

Recently, Origina Security Services worked closely with a large multinational healthcare company to address significant vulnerabilities in its Docker Engine runc and BuildKit, which were affecting its IBM Cognos Performance Management system. The customer was using Docker version 19.3, which was vulnerable to multiple security risks and required an upgrade to mitigate the issue.

The challenge: The team needed to resolve these vulnerabilities without disrupting the company’s operations, while also balancing the need for security with budgetary constraints. With multiple servers running outdated Docker versions, the urgency to upgrade and implement the necessary security measures was clear.

Our approach: Origina’s team collaborated with the healthcare company to devise a tailored solution. After evaluating the situation, we recommended upgrading Docker to version 25.0.2 or later, along with installing the necessary Docker components and considering the option of switching to Linux to avoid Docker-related security issues altogether.

Our team also proposed having the customer set up a test server for a controlled implementation to ensure the security measures would be effective without causing system disruptions. To further assess the impact, we requested that they run two Docker commands to gather additional information about their current environment.

The outcome: The healthcare company’s team accepted the recommendations and agreed to proceed with an Origina Meet-the-Expert session for the first server migration. This allowed them to begin resolving the vulnerabilities in a manageable way, with plans to migrate the remaining servers in two to three days. Our collaboration helped them mitigate the security risks while ensuring minimal disruption to their operations.

Origina goes beyond standard support to provide tailored, proactive security solutions. By combining technical expertise with a deep understanding of our customers’ needs, we were able to address a critical security vulnerability and ensure the company’s Docker infrastructure is now secure and up-to-date.

 

The Human Side of Cyber Resilience

Resilience is not only about technology but also about people. A case in point is the 2020 SolarWinds attack, where insider threats and a lack of employee training contributed to the breach’s widespread impact.

Organizations that empower their employees through comprehensive security training, phishing simulations, and an understanding of their roles in incident response demonstrate significantly enhanced resilience.

Origina advocates for a holistic approach to software security, integrating human factors into technical support strategies. Through customer workshops and tailored employee training initiatives, we help clients foster a culture of security awareness. Resilience begins with people, and Origina ensures its customers have the tools and knowledge to make their workforce a robust line of defense against cyber threats.

As these threats evolve, so, too, must the strategies to combat them.

Adaptability isn’t just about reacting to today’s challenges but also anticipating and preparing for future risks. For instance, ransomware attacks targeting critical infrastructure have surged in recent years, which underscores the need for forward-thinking security strategies.

Organizations aiming to enhance their adaptability often incorporate predictive threat intelligence and scenario-based planning into their programs. These initiatives help teams identify trends and vulnerabilities early, keeping them a step ahead. Take the example of a healthcare provider that bolstered its adaptability by deploying AI-driven anomaly detection systems. This proactive approach enabled them to detect and neutralize an attack before sensitive patient data was jeopardized.

Looking ahead, adaptability must be ingrained within every organization, encompassing its people, processes, and technologies. Businesses can initiate this transformation by fostering a culture of continuous improvement, routinely testing their defenses, and collaborating with partners offering actionable insights into emerging threats. A strong adaptability framework does more than protect. It empowers organizations to evolve and thrive in an ever-changing threat landscape.

FOR THE LATEST TECHNOLOGY TIPS SUBSCRIBE TO OUR NEWSLETTER - THE UPTIME

Gain insight into industry-only news, access to webinars, tips and tricks, blog posts, podcasts, and guides, surrounding topics like cybersecurity, reducing software support and maintenance costs and much more, all delivered to your inbox each month.

LEARN MORE