Some Enterprise VPN Apps Store Authentication/Session Cookies Insecurely

At least four Virtual Private Network (VPN) applications sold or made available to enterprise customers share security flaws, warns the Carnegie Mellon University CERT Coordination Center (CERT/CC) and the Department of Homeland Security’s Computer Emergency Response Center (US-CERT). From a report: VPN apps from Cisco, F5 Networks, Palo Alto Networks, and Pulse Secure are impacted, CERT/CC analyst Madison Oliver said in a security alert published earlier today, echoed by the DHS’ US-CERT. All four have been confirmed to store authentication and/or session cookies in an non-encrypted form inside a computer’s memory or log files saved on disk.

Read more of this story at Slashdot.



Source: Slashdot – Some Enterprise VPN Apps Store Authentication/Session Cookies Insecurely