Financial institutions should quickly address the “Shellshock” vulnerability by applying patches to their Bash software, the Federal Financial Institutions Examination Council recently advised in “State and Federal Regulators: Financial Institutions Should Move Quickly to Address Shellshock Vulnerability.”
Bash, or “Bourne-again Shell”—a common software tool found in most UNIX, Linux, and Mac OS X operating systems and which also may be installed on Windows servers—is used to execute a sequence of commands. The “Shellshock” vulnerability could allow an attacker to execute malicious code on Bash and gain control over a targeted system. The pervasive use of Bash and the potential for this vulnerability to be automated presents a material risk. (See this advisory from the federal U.S. Computer Emergency Readiness Team.)
Financial institutions and their service providers should assess the risk to their infrastructures and execute mitigation activities with appropriate urgency. Financial institutions should identify all servers, systems, and appliances that use the vulnerable versions of Bash and follow appropriate patch management practices.
Financial institutions relying on third-party service providers should ensure those providers are aware of the vulnerability and are taking appropriate mitigation action.
- OCC Levies Third Major Fine This Month
- The Contrasting Fortunes of Citigroup and Morgan Stanley
- How COVID-19 and Tokenization Can Transform the Financial Sector
- 5 Examples of Cutting-edge Tools to Reinvent Your Mortgage Tech Stack
- More than regulation — how PSD2 will be a key driving force for an Open Banking future