Kaseya patches platform vulnerability

Powered by SC Magazine
 

Customers receive automatic patch.

Kaseya has patched a hole in its managed service offering disclosed at the Kiwicon event over the weekend.

The company worked quickly to fix the hole and had a patch ready hours after being notified by SC about the then zero-day flaw.

Kiwicon 6 coverage

An automatic hotfix capability in the platform meant users who had the default updating service active would be protected.

"Each system checks for new hotfixes every 24 hours. So our partners don't have to do anything except enable it," President Mark Sutherland told SC.

In the demonstration, the security researcher created an administrator account on Kaseya by injecting malicious script into a registry key used by the Kaseya user agent. This was accepted by the Managed Service Provider due to a now patched vulnerability in which it failed to properly validate its database.

The researcher confirmed to Kaseya that the hole was patched.

Copyright © SC Magazine, Australia


Kaseya patches platform vulnerability
 
 
 
Top Stories
Westpac interim CIO resigns
Group CIO yet to be appointed.
 
Five emerging technologies that will transform financial services
[Blog post] Far out ideas that aren't far off.
 
Earning the right to innovate
Breaking down the barriers to innovation is a long, but rewarding process, says Bank of Queensland Group CIO, Julie Bale.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  27%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  23%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 924

Vote