Cybersecurity researchers have raised alarms about the risks faced by thousands of Prometheus servers, which are exposed to potential information leakage, denial-of-service (DoS), and remote code execution (RCE) attacks. A report from Aqua Security highlights that many Prometheus servers and exporters lack proper authentication, allowing attackers to easily access sensitive data such as credentials, API keys, and passwords. An alarming vulnerability lies in the exposed "/debug/pprof" endpoints, which provide insights into heap memory and CPU usage. These endpoints could be exploited in DoS attacks, causing servers to crash by overwhelming them with excessive resource consumption. With an estimated 296,000 publicly accessible Prometheus Node Exporter instances and 40,300 Prometheus servers, the threat surface is vast. The "/metrics" endpoint further exacerbates the issue, revealing critical internal information like subdomains, Docker registries, and API endpoints, which attackers can exploit for further attacks. Additionally, attackers can trigger CPU and memory-intensive profiling tasks that may crash the servers. Another risk comes from RepoJacking, where attackers exploit renamed or deleted GitHub repositories to introduce malicious exporters. Aqua Security discovered that eight exporters listed in Prometheus' official documentation were vulnerable to this attack, enabling remote code execution through cloned malicious exporters.
The Cybersecurity and Infrastructure Security Agency (CISA) has released an urgent alert about a critical zero-day vulnerability impacting widely used Cisco security solutions. Ide...
Allure Security has managed to attract significant funding, reported up to $10 million for Series A, and overall reports indicate that there is no decline in investment momentum fo...
Navia Benefit Solutions has disclosed a major data breach affecting approximately 2.7 million individuals, exposing sensitive personal and health-related information. As a benefits...