Financial institutions should quickly address the “Shellshock” vulnerability by applying patches to their Bash software, the Federal Financial Institutions Examination Council recently advised in “State and Federal Regulators: Financial Institutions Should Move Quickly to Address Shellshock Vulnerability.”
Bash, or “Bourne-again Shell”—a common software tool found in most UNIX, Linux, and Mac OS X operating systems and which also may be installed on Windows servers—is used to execute a sequence of commands. The “Shellshock” vulnerability could allow an attacker to execute malicious code on Bash and gain control over a targeted system. The pervasive use of Bash and the potential for this vulnerability to be automated presents a material risk. (See this advisory from the federal U.S. Computer Emergency Readiness Team.)
Financial institutions and their service providers should assess the risk to their infrastructures and execute mitigation activities with appropriate urgency. Financial institutions should identify all servers, systems, and appliances that use the vulnerable versions of Bash and follow appropriate patch management practices.
Financial institutions relying on third-party service providers should ensure those providers are aware of the vulnerability and are taking appropriate mitigation action.
- Look Before You Leap: Key Considerations for Moving to a Digital-Only Model
- Disruptions Past, Present and Future Raise the Existential Question: “What Are Banks For?”
- What Banks Can Learn From the United Capital Acquisition
- What the Win-Win Partnership Between Apple and Goldman Sachs Means for Payments
- Reconciliations — DLT brings new solutions to solve an old problem