U.S. markets open in 3 hours 22 minutes
  • S&P Futures

    4,417.00
    -21.00 (-0.47%)
     
  • Dow Futures

    34,519.00
    -125.00 (-0.36%)
     
  • Nasdaq Futures

    15,212.75
    -90.75 (-0.59%)
     
  • Russell 2000 Futures

    2,242.30
    -12.90 (-0.57%)
     
  • Crude Oil

    73.35
    +0.05 (+0.07%)
     
  • Gold

    1,754.20
    +4.40 (+0.25%)
     
  • Silver

    22.58
    -0.06 (-0.25%)
     
  • EUR/USD

    1.1736
    -0.0011 (-0.09%)
     
  • 10-Yr Bond

    1.4100
    0.0000 (0.00%)
     
  • Vix

    19.93
    -0.94 (-4.50%)
     
  • GBP/USD

    1.3702
    -0.0018 (-0.13%)
     
  • USD/JPY

    110.3900
    +0.0890 (+0.08%)
     
  • BTC-USD

    42,405.70
    -1,709.36 (-3.87%)
     
  • CMC Crypto 200

    1,046.87
    -62.06 (-5.60%)
     
  • FTSE 100

    7,052.45
    -25.90 (-0.37%)
     
  • Nikkei 225

    30,248.81
    +609.41 (+2.06%)
     

GRIMM Private Vulnerability Disclosure Program Reveals Beagle Software’s ClockWatch Enterprise Vulnerability

·2 min read

ARLINGTON, Va., July 07, 2021--(BUSINESS WIRE)--GRIMM, a forward-looking cybersecurity organization led by industry experts, today announced they performed dedicated vulnerability research against Beagle Software’s ClockWatch Enterprise time synchronization software and discovered a vulnerability in the software’s remote administration feature. This research stems from GRIMM’s Private Vulnerability Disclosure (PVD) Program where research targets are selected based on extensive threat modeling and our team’s deep background in reverse engineering and vulnerability research.

"We discovered a remote code execution (RCE) vulnerability in Beagle Software’s ClockWatch Enterprise time synchronization software," said Adam Nichols, Principal of Software Security, GRIMM. "The impact of this vulnerability is that it could allow an unauthenticated, network attacker to escalate privileges (SYSTEM), install malware, or move laterally through a network with 100% reliability and no visual indicators of compromise."

To mitigate these risks, GRIMM recommends that system administrators block traffic on the target port (TCP/1001) on both host and network firewalls so that only traffic from the designated ClockWatch Enterprise host is allowed. Additionally, GRIMM recommends that organizations pay close attention to "remote administration" features when performing due diligence during procurement.

This bug is significant because any host with this software installed is exploitable by any attacker that can reach the service’s listening port. Additionally, it is expected that the vast majority of installations of this software are running as Windows services, which means that exploitation results in SYSTEM level privileges. Since this is enterprise-grade software, the expectation is that enterprise environments are where most of this software is installed.

This software is used in the Finance, Government, Industrial, Medical, Transportation, Education and Energy sectors, where a complete takeover of machines could have significant consequences. It's very important to mitigate this vulnerability quickly.

After being informed of the vulnerability Beagle Software removed the product from their website, marking it as being discontinued. It is not clear how many organizations are still using this software.

The security research is done entirely by GRIMM’s internal PVD team. The GRIMM PVD team has decades of experience in the most sensitive environments. Because GRIMM has a strong commitment to partnership, the PVD program welcomes requests to look into specific software or hardware. GRIMM is able to offer this service to a limited, trusted clientele to ensure that the program is used appropriately while the team works with the vendors for patches.

For more information, contact pvd@grimm-co.com.

About GRIMM
GRIMM is a forward-thinking cybersecurity organization led by industry experts. The company’s practice demonstrates the impact of security risks and provides the technical solutions to address top risks. GRIMM’s expertise is built on operational experience solving advanced cybersecurity problems. For more, go to www.grimm-co.com.

View source version on businesswire.com: https://www.businesswire.com/news/home/20210707005170/en/

Contacts

Dan Chmielewski
Madison Alexander PR
714-832-8716
949-231-2965
dchm@madsionalexanderpr.com