Appgate SDP

Appgate SDP Overview

Learn how the industry’s most comprehensive universal ZTNA solution strengthens security and transforms your network with the flexibility, extensibility and integration advantages of direct-routed architecture.

How Appgate SDP Works

Find out about the inner-workings of the most flexible and adaptable Zero Trust Network Access solution available today.

Zero Trust Platform
Integrations and Tech Partners
Appgate SDP for Developers
Use Cases for Securing:
Risk-Based Authentication
Learn how Risk-Based Authentication provides a frictionless, intelligent and data-informed approach to user authentication.
Strong Authentication
Find out how you can provide secure, frictionless access with the right multi-factor authentication method.
Transaction Monitoring
Explore the tools you can use to intelligently identify and prevent online fraud.
Behavioral Biometrics Service
Learn how behavioral analysis and machine learning stop fraudulent online web activity in real-time.
Secure Consumer Access for:
Digital Threat Protection
Discover how you can gain unparalleled threat visibility and the risk management tools that enable early identification and elimination of potential attacks.
Key Features
Take a deep dive into the features and tools contained within our industry-leading Digital Threat Protection (DTP) solution.

Chris ScheelsApril 23, 2021

Is the Latest Pulse Secure Exploit the Writing on the Wall for VPNs?

New Pulse Secure zero-day exploit for CVE-2021-22893 used in the wild by nation-state threat actors to attack government, defense and finance sectors.

The pulse of VPN technology is weak and close to flatlining. This week we learned of yet another critical VPN exploit in the wild, another nation-state threat actor systematically attacking vulnerable VPNs. It’s like déjà vu. Or Groundhog Day. Or a bad dream that we can't seem to wake up from. This latest VPN exploit news doesn't bode well for traditional VPNs, no matter how you slice it. Isn’t it ironic that one of the malware families is actually called SlowPulse and another PulseCheck?

Honestly, it brings to mind the often misattributed Einstein quote:

“Insanity is doing the same thing over and over again and expecting different results.”

Why do organizations keep using a 23-year-old-plus connectivity technology to secure enterprise remote access? This week Pulse Secure is in the news, but over the last few years you could insert any VPN provider in its place.

Security professionals should resist the urge to search the web for VPN exploits or critical VPN vulnerabilities, because it’s the stuff that nightmares are made of … yet the evidence is overwhelming. Appgate has been educating the community on the critical design flaws of this multi-decades-old technology. We are on a mission to eradicate the use of VPNs, telling anyone who will listen why it’s time to replace the VPN. It’s not the vendors fault per se … it’s the fact that all VPNs are based on the same initial design flaw: they all require an open internet facing port that is just waiting to be attacked.

If you were to build a new remote access solution today, you would never design it with an open, exposed internet port. ZTNA solutions were designed with that in mind. There are different ways to go about cloaking ports with single packet authorization (SPA) being a proven, tried-and-true method.

“VPNs are antiquated and while they may have some value for an immediate 'fix' they need to go away,” said Chase Cunningham, also known as Dr. Zero Trust. “They are vulnerability aggregators and are a prime target for exploitation. Moving away from them empowers users and makes security more digestible for everyone while simultaneously improving command and control of the security infrastructure.”

Reportedly, the recent attacks impact U.S. and European organizations in defense, government and financial sectors. There are many great articles about the details of the hack, but it’s still too early to know the depth and breadth of it. The bottom line is there is yet another example of a compromised VPN that puts government and enterprise at risk.

The Cybersecurity and Infrastructure Security Agency (CISA) has issued another alert (aa21-11-a) related to the latest Pulse Secure VPN vulnerability. The CISA alert strongly urges any organization using Pulse Secure devices to take immediate action to determine the integrity of the system.

This latest VPN attack is very similar to another recent well publicized critical Pulse Secure VPN exploit. To summarize from our August 2020 DEFCON1 blog about CVE-2019-11150, details of that attack were:

  • A critical, remotely exploitable VPN vulnerability
  • An open listening VPN port
  • Stolen credentials

Even though a patch for CVE-2019-11510 has existed for over a year, unpatched systems are still under attack today, along with two other more recent vulnerabilities CVE-2020-82 and CVE-2020-8260, according to the SecurityWeek article.

What’s Next?

Unfortunately, there are still conversations where someone states: "My VPN is secure." The truth is that VPNs are not fit for purpose in today’s world of hybrid IT and persistent cyber attackers.

Imagine a world where you have no discoverable public-facing infrastructure for an attacker to exploit. This is what Zero Trust network access (ZTNA) brings … a new alternative to VPN. Attackers will find no exposed ports during their reconnaissance. And as we like to say, "you can't attack what you can’t see."

We look forward to a day when the security community can take a collective sigh of relief and say, "Rest in peace, VPN." We invite you to join the movement to switch from VPN to ZTNA and help #killthevpn.

Additional Resources

Receive News and Updates From Appgate