Gaining Access to Toyotas Supplier Network Through Vulnerability

A security researcher, Eaton Zveare, identified a major security flaw in Toyota's Global Supplier Preparation Information Management System (GSPIMS) web portal. This portal provides Toyota employees and suppliers with access to ongoing projects, surveys, information on purchases, and more. The issue was related to the implementation of JWT authentication, which allowed anyone with a valid email address to gain access to any account. JWT is a session token that is usually generated when logging in to a website and is used to authenticate the user to secure sections of the website or APIs. Zveare discovered that GSPIMS had a function that would generate a JWT based on the provided email address, without requiring a password. He used this to access the GSPIMS and discovered an account with system administrator privileges. This account gave him access to all the information on the portal, including details on over 14,000 user accounts, control over roles each account could have, and classified documents. The system admin also had the option to log in as any of the 14,000 users, which is why the JWT generating function was implemented. However, this also created a backdoor into the network. An attacker with system admin access could have exfiltrated data, tampered with or deleted it, and used the corporate email and roles of all 14,000 user accounts to target them in phishing attacks. Zveare reported the vulnerability to Toyota on November 3, 2022.

This Cyber News was published on www.securityweek.com. Publication date: Tue, 07 Feb 2023 15:23:03 +0000


Cyber News related to Gaining Access to Toyotas Supplier Network Through Vulnerability

Network Protection: How to Secure a Network - Network security protects and monitors the links and the communications within the network using a combination of hardware, software, and enforced policies. Best practices for network security directly counter the major threats to the network with ...
6 months ago Esecurityplanet.com
Why Use a VLAN? Unveiling the Benefits of Virtual LANs in Network Security - Virtual Local Area Networks, or VLANs, serve as a critical computing technology designed for effective network traffic management. How VLANs function within a network environment revolves around effectively managing and directing network traffic. ...
11 months ago Securityboulevard.com
Gaining Access to Toyotas Supplier Network Through Vulnerability - A security researcher, Eaton Zveare, identified a major security flaw in Toyota's Global Supplier Preparation Information Management System (GSPIMS) web portal. This portal provides Toyota employees and suppliers with access to ongoing projects, ...
1 year ago Securityweek.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
Assessing and mitigating cybersecurity risks lurking in your supply chain - Most involve the supply of software and digital services, or at least are reliant in some way on online interactions. SMBs in particular may not proactively be looking, or have the resources, to manage security in their supply chains. Blindly ...
10 months ago Welivesecurity.com
School Wi-Fi Security Guidelines - When choosing a strong Wi-Fi password for your school network, it is crucial to follow proper guidelines to ensure maximum security. School network security heavily relies on robust Wi-Fi encryption and effective wireless network protection measures. ...
11 months ago Securityzap.com
Top 19 Network Security Threats + Defenses for Each - Network security threats are technological risks that weaken the defenses of an enterprise network, endangering proprietary data, critical applications, and the entire IT infrastructure. There are seven major categories of network security issues ...
10 months ago Esecurityplanet.com
Investigator Gains Unauthorized Access to Toyota Supplier Database Containing Data on 14000 Associates - Toyota's Global Supplier Preparation Information Management System (GSPIMS) was recently breached by a security researcher who responsibly reported the issue to the company. GSPIMS is a web application that allows employees and suppliers to remotely ...
1 year ago Bleepingcomputer.com
Correct bad network behavior to bolster application experience - Legacy hardware-based applications existed happily in isolation, untethered from a network. Today, even the software running from personal hard drives relies on other applications across the network to perform. Many modern apps run off a remote ...
11 months ago Helpnetsecurity.com
10 Best Network as a Service for MSSP Providers - Network as a Service for Managed Security Service Providers offers a revolutionary way to provide networking and security services to clients. Network security leaders such as Perimeter81 offer Managed Service Provider partners a powerful, scalable, ...
9 months ago Cybersecuritynews.com
Jumpstart your studies for ENNA with Network Assurance Prep - It's no secret that today's networks span across a vast, decentralized web of services, where anything can-and will-happen to your data. When your network's not under your direct control, it's hard to see issues. Not knowing what's going on in and ...
6 months ago Feedpress.me
Wireless Network Security: Safeguarding Your Digital Haven - As the ubiquity of wireless networks grows, so does the need for proper security measures to protect home networks from malicious attacks. Ensuring secure connections and maintaining a safe online environment requires a comprehensive understanding of ...
11 months ago Securityzap.com
5 ways to secure identity and access for 2024 - 1 This increase is due in part to the rise of generative AI and large language models, which bring new opportunities and challenges for security professionals while affecting what we must do to secure access effectively. Learn how unified multicloud ...
10 months ago Microsoft.com
A Symphony of Network Success: Simplify, Secure, and Scale with Cisco SD-WAN Enhancements - Your network is like an orchestra, where each element assumes the role of a unique instrument-computers, devices, applications, security measures, remote connections. Cisco SD-WAN empowers both enterprise IT teams and managed service providers to ...
10 months ago Feedpress.me
The Future of Modern Networks Is Automated Threat Intelligence. - Every new device added to the network, be it an employee home laptop, an IoT sensor, a machine vision camera, or a cloud-based server, brings a new security threat to the company. All of these changes are making network security a critical defense ...
11 months ago Cyberdefensemagazine.com
Vulnerability Summary for the Week of February 12, 2024 - Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise ...
9 months ago Cisa.gov
CVE-2022-22542 - S/4HANA Supplier Factsheet exposes the private address and bank details of an Employee Business Partner with Supplier Role, AND Enterprise Search for Customer, Supplier and Business Partner objects exposes the private address fields of Employee ...
2 years ago
What Is Dynamic Host Configuration Protocol (DHCP)? - DHCP, or Dynamic Host Configuration Protocol, is a network protocol that allows devices on a network to be automatically assigned an IP address. DHCP is used extensively in both home and enterprise networks, as it simplifies the process of ...
1 year ago Heimdalsecurity.com
How to Set Up a VLAN in 12 Steps: Creation & Configuration - Each VLAN configuration process will look a little different, depending on the specifications you bring to the table, and some of these steps - particularly steps five through eight - may be completed simultaneously, in a slightly different order, or ...
11 months ago Esecurityplanet.com
Lookback Analysis in ERP Audit - This article explores the interdependence between lookback analysis and access governance and how it can transform modern ERP audits. From a Segregation of Duties perspective, Lookback Analysis is a critical tool in ensuring control effectiveness and ...
6 months ago Securityboulevard.com
#StopRansomware: ALPHV Blackcat - The Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency are releasing this joint CSA to disseminate known IOCs and TTPs associated with the ALPHV Blackcat ransomware as a service identified through FBI ...
11 months ago Cisa.gov
UK Councils Warn of Data Breach After Attack on Medical Supplier - Multiple UK councils have warned that citizens' personal data may have been breached following a ransomware attack on a medical equipment supplier. Nottingham Rehab Supplies Healthcare, which supplies health and care equipment numerous local ...
6 months ago Infosecurity-magazine.com
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours - In late December 2022, we observed threat actors exploiting a publicly exposed Remote Desktop Protocol host, leading to data exfiltration and the deployment of Trigona ransomware. On Christmas Eve, within just three hours of gaining initial access, ...
10 months ago Thedfirreport.com
What is an advanced persistent threat? - An advanced persistent threat is a prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period. APT attacks are initiated to steal highly sensitive data rather than cause damage to ...
11 months ago Techtarget.com
The Real Deal About ZTNA and Zero Trust Access - For the last several years, zero trust network access has become the common term to describe this type of approach for securing remote users as they access private applications. Zero trust network access is based on the logical security philosophy of ...
9 months ago Feedpress.me

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)