VulnerabilitiesHIGH

Malwarebytes VPN - Third-Party Audit Reveals Vulnerabilities

Featured image for Malwarebytes VPN - Third-Party Audit Reveals Vulnerabilities
MWMalwarebytes Labs
MalwarebytesVPNX41 D-SecCVSSAzireVPN
🎯

Basically, Malwarebytes had experts check their VPN for security problems.

Quick Summary

Malwarebytes Privacy VPN completed a third-party audit revealing critical vulnerabilities. The company is addressing these issues to enhance user security and privacy. Trust in your VPN provider is essential, and Malwarebytes is committed to transparency.

What Happened

Malwarebytes has recently completed its first third-party audit of the Malwarebytes Privacy VPN and AzireVPN infrastructure. This audit is crucial for verifying the security measures and privacy promises made by VPN providers. Conducted by the penetration testing firm X41 D-Sec, the audit aimed to uncover any vulnerabilities that could compromise user privacy.

Audit Findings

The audit revealed a total of six vulnerabilities categorized by severity:

  • 2 Critical
  • 0 High
  • 2 Medium
  • 2 Low

The critical vulnerabilities were particularly concerning, with one receiving a CVSS score of 9.4 and the other a score of 9.3. These scores indicate a high level of risk, necessitating immediate attention.

Details of Critical Issues

The first critical issue involved the server setup process. Malwarebytes' servers download a Debian image to install the operating system. However, the audit found that the checksum for this image was not properly validated, allowing potential attackers to deliver a modified version of the software.

The second critical issue related to the Preboot Execution Environment (PXE) used during server boot-up. This process lacked cryptographic signatures, making it susceptible to Man in the Middle attacks. Although significant physical access would be required for such an attack, the risk remains serious.

What’s Being Done

Malwarebytes has already addressed one critical vulnerability and is actively working on fixing the remaining critical issue, along with other identified vulnerabilities. The company emphasizes its commitment to user privacy and transparency, stating that it does not log user activity and tightly controls access to its systems.

Industry Implications

This audit highlights the importance of third-party evaluations in the VPN industry. Many VPN providers do not undergo such scrutiny, leaving users unaware of potential vulnerabilities. With 77% of Android VPNs reportedly having significant flaws, Malwarebytes aims to set a standard for transparency and accountability.

Conclusion

The results of this audit are a step forward for Malwarebytes and its users. By openly sharing the findings and actively addressing vulnerabilities, the company reinforces its commitment to user privacy. As the VPN landscape continues to evolve, regular audits will play a crucial role in ensuring the security and trustworthiness of these services.

🔒 Pro insight: The critical vulnerabilities identified underscore the necessity for continuous security assessments in VPN services to maintain user trust.

Original article from

MWMalwarebytes Labs
Read Full Article

Related Pings

HIGHVulnerabilities

Apple Patches DarkSword - Protects iOS 18 Users

Apple has patched a critical vulnerability in iOS 18, known as DarkSword. This update protects users from severe threats. Organizations can now enhance their mobile security.

Dark Reading·
CRITICALVulnerabilities

F5 BIG-IP APM Vulnerability - 14,000 Devices Exposed Online

A critical RCE vulnerability in F5's BIG-IP APM has exposed over 14,000 devices online. This flaw poses serious risks to enterprise networks. Immediate patching is essential to secure these systems from exploitation.

Cyber Security News·
HIGHVulnerabilities

Google Patches Fourth Chrome Zero-Day Vulnerability

Google has patched a serious zero-day vulnerability in Chrome, the fourth this year. Users are at risk of exploitation if they don't update their browsers. Immediate action is necessary to ensure safety.

CSO Online·
HIGHVulnerabilities

Claude Code Vulnerability - Exploit Risks Revealed

A serious vulnerability in Claude Code has been uncovered, allowing potential exploits through command sequences. Anthropic has a fix ready, but it's not yet in use. Users should exercise caution to protect sensitive data.

CSO Online·
HIGHVulnerabilities

Post-Deployment Vulnerability Detection - Rethinking Strategies

A new approach to vulnerability detection is needed post-deployment. Many organizations overlook risks from newly disclosed CVEs, leaving systems exposed. Rethinking strategies can enhance security.

OpenSSF Blog·
HIGHVulnerabilities

Progress ShareFile Vulnerabilities - Unauthenticated Exfiltration Risk

Two critical vulnerabilities in Progress ShareFile have been found, allowing unauthorized access to sensitive files. Organizations using this software are at risk of data breaches. Immediate patching is crucial to secure data and prevent exploitation.

SC Media·