Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Data breach, but no security vulnerability?

Data breach, but no security vulnerability?

Scheduled Pinned Locked Moved The Lounge
comsecuritysalesquestionannouncement
18 Posts 10 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S Offline
    S Offline
    StatementTerminator
    wrote on last edited by
    #1

    I came across this article: Microsoft data breach exposes customers’ contact info, emails[^] And the following sentence caught my eye: "Redmond added that the leak was caused by the 'unintentional misconfiguration on an endpoint that is not in use across the Microsoft ecosystem' and not due to a security vulnerability." How is a misconfigured endpoint that exposes customer info not a security vulnerability? Someone explain it to me like I'm five :confused:

    Greg UtasG P C O OriginalGriffO 6 Replies Last reply
    0
    • S StatementTerminator

      I came across this article: Microsoft data breach exposes customers’ contact info, emails[^] And the following sentence caught my eye: "Redmond added that the leak was caused by the 'unintentional misconfiguration on an endpoint that is not in use across the Microsoft ecosystem' and not due to a security vulnerability." How is a misconfigured endpoint that exposes customer info not a security vulnerability? Someone explain it to me like I'm five :confused:

      Greg UtasG Offline
      Greg UtasG Offline
      Greg Utas
      wrote on last edited by
      #2

      Probably not a software vulnerability. So, for example, no password configured for accessing the endpoint. :-D

      Robust Services Core | Software Techniques for Lemmings | Articles
      The fox knows many things, but the hedgehog knows one big thing.

      <p><a href="https://github.com/GregUtas/robust-services-core/blob/master/README.md">Robust Services Core</a>
      <em>The fox knows many things, but the hedgehog knows one big thing.</em></p>

      S 1 Reply Last reply
      0
      • Greg UtasG Greg Utas

        Probably not a software vulnerability. So, for example, no password configured for accessing the endpoint. :-D

        Robust Services Core | Software Techniques for Lemmings | Articles
        The fox knows many things, but the hedgehog knows one big thing.

        S Offline
        S Offline
        StatementTerminator
        wrote on last edited by
        #3

        LOL yeah, but that's like saying "hey sorry that the cake I brought you got accidentally dusted with poison on the way over, but just so you know, the cake itself was perfectly safe to eat!"

        1 Reply Last reply
        0
        • S StatementTerminator

          I came across this article: Microsoft data breach exposes customers’ contact info, emails[^] And the following sentence caught my eye: "Redmond added that the leak was caused by the 'unintentional misconfiguration on an endpoint that is not in use across the Microsoft ecosystem' and not due to a security vulnerability." How is a misconfigured endpoint that exposes customer info not a security vulnerability? Someone explain it to me like I'm five :confused:

          P Offline
          P Offline
          PIEBALDconsult
          wrote on last edited by
          #4

          "Human error".

          S 1 Reply Last reply
          0
          • P PIEBALDconsult

            "Human error".

            S Offline
            S Offline
            StatementTerminator
            wrote on last edited by
            #5

            Is there any other kind?

            M 1 Reply Last reply
            0
            • S StatementTerminator

              I came across this article: Microsoft data breach exposes customers’ contact info, emails[^] And the following sentence caught my eye: "Redmond added that the leak was caused by the 'unintentional misconfiguration on an endpoint that is not in use across the Microsoft ecosystem' and not due to a security vulnerability." How is a misconfigured endpoint that exposes customer info not a security vulnerability? Someone explain it to me like I'm five :confused:

              C Offline
              C Offline
              CodeWomble
              wrote on last edited by
              #6

              Because customer info is a commodity. Company info is a security issue.

              1 Reply Last reply
              0
              • S StatementTerminator

                I came across this article: Microsoft data breach exposes customers’ contact info, emails[^] And the following sentence caught my eye: "Redmond added that the leak was caused by the 'unintentional misconfiguration on an endpoint that is not in use across the Microsoft ecosystem' and not due to a security vulnerability." How is a misconfigured endpoint that exposes customer info not a security vulnerability? Someone explain it to me like I'm five :confused:

                O Offline
                O Offline
                obermd
                wrote on last edited by
                #7

                [http://myorgbio.org/wp-content/uploads/2017/04/Cyber-security-Dave.jpg\](http://myorgbio.org/wp-content/uploads/2017/04/Cyber-security-Dave.jpg)

                N 1 Reply Last reply
                0
                • S StatementTerminator

                  I came across this article: Microsoft data breach exposes customers’ contact info, emails[^] And the following sentence caught my eye: "Redmond added that the leak was caused by the 'unintentional misconfiguration on an endpoint that is not in use across the Microsoft ecosystem' and not due to a security vulnerability." How is a misconfigured endpoint that exposes customer info not a security vulnerability? Someone explain it to me like I'm five :confused:

                  OriginalGriffO Offline
                  OriginalGriffO Offline
                  OriginalGriff
                  wrote on last edited by
                  #8

                  StatementTerminator wrote:

                  Someone explain it to me like I'm five

                  When a mommy computer and a daddy computer love each other very much ... :-D

                  "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt AntiTwitter: @DalekDave is now a follower!

                  "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
                  "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

                  O 1 Reply Last reply
                  0
                  • O obermd

                    [http://myorgbio.org/wp-content/uploads/2017/04/Cyber-security-Dave.jpg\](http://myorgbio.org/wp-content/uploads/2017/04/Cyber-security-Dave.jpg)

                    N Offline
                    N Offline
                    Nelek
                    wrote on last edited by
                    #9

                    :laugh: :laugh: :laugh: :laugh: The worst part is... I know (and have suffered in my flesh) a couple of Daves. :doh: :doh: :sigh: :sigh:

                    M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpful answers is nice, but saying thanks can be even nicer.

                    1 Reply Last reply
                    0
                    • S StatementTerminator

                      I came across this article: Microsoft data breach exposes customers’ contact info, emails[^] And the following sentence caught my eye: "Redmond added that the leak was caused by the 'unintentional misconfiguration on an endpoint that is not in use across the Microsoft ecosystem' and not due to a security vulnerability." How is a misconfigured endpoint that exposes customer info not a security vulnerability? Someone explain it to me like I'm five :confused:

                      N Offline
                      N Offline
                      Nelek
                      wrote on last edited by
                      #10

                      StatementTerminator wrote:

                      How is a misconfigured endpoint that exposes customer info not a security vulnerability? Someone explain it to me like I'm five

                      A data leak is not a security problem per se. If you leave the door of your house open is not the same as if someone breaks in... isn't it? The results are the same, but the insurances response or the punishment if they get caught is totally different.

                      M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpful answers is nice, but saying thanks can be even nicer.

                      S 1 Reply Last reply
                      0
                      • S StatementTerminator

                        Is there any other kind?

                        M Offline
                        M Offline
                        Marc Clifton
                        wrote on last edited by
                        #11

                        StatementTerminator wrote:

                        Is there any other kind?

                        That may not be true in the near future. Or even in the present, what with self-driving cars.

                        Latest Article:
                        Create a Digital Ocean Droplet for .NET Core Web API with a real SSL Certificate on a Domain

                        1 Reply Last reply
                        0
                        • N Nelek

                          StatementTerminator wrote:

                          How is a misconfigured endpoint that exposes customer info not a security vulnerability? Someone explain it to me like I'm five

                          A data leak is not a security problem per se. If you leave the door of your house open is not the same as if someone breaks in... isn't it? The results are the same, but the insurances response or the punishment if they get caught is totally different.

                          M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpful answers is nice, but saying thanks can be even nicer.

                          S Offline
                          S Offline
                          StatementTerminator
                          wrote on last edited by
                          #12

                          Yeah but if my data gets compromised I don't really care if it's a misconfiguration or a zero-day, the data got compromised. I get that MS is trying to point out that it wasn't due to some code vulnerability in their software, but I feel like there's some PR spin here in trying to minimize the fact that they failed to keep their customer data secure. Security is only as good as the weakest link, and a wide-open endpoint is a pretty weak link.

                          D N 2 Replies Last reply
                          0
                          • S StatementTerminator

                            Yeah but if my data gets compromised I don't really care if it's a misconfiguration or a zero-day, the data got compromised. I get that MS is trying to point out that it wasn't due to some code vulnerability in their software, but I feel like there's some PR spin here in trying to minimize the fact that they failed to keep their customer data secure. Security is only as good as the weakest link, and a wide-open endpoint is a pretty weak link.

                            D Offline
                            D Offline
                            dandy72
                            wrote on last edited by
                            #13

                            StatementTerminator wrote:

                            I feel like there's some PR spin here in trying to minimize the fact that they failed to keep their customer data secure. Security is only as good as the weakest link, and a wide-open endpoint is a pretty weak link.

                            Have you ever tried to use something that is so locked down, with barriers every step of the way, that you decided to open up everything just to get things to work, with the intent to figure out later how you were supposed to do things correctly in the first place and then lock things back down? And then that never gets done? I'm sure this happens all the time. Microsoft is rightfully pointing out here that they provide the infrastructure - it's up to the admins employed by their customers to use it correctly. The Linux fanbois say the same thing, Linux is super-secure if you do it correctly, but a misconfigured OS is still going to be as vulnerable as anything else. And now the bad analogy...how far should a chainsaw manufacturer go to ensure their customers don't do something completely stupid?

                            S 1 Reply Last reply
                            0
                            • D dandy72

                              StatementTerminator wrote:

                              I feel like there's some PR spin here in trying to minimize the fact that they failed to keep their customer data secure. Security is only as good as the weakest link, and a wide-open endpoint is a pretty weak link.

                              Have you ever tried to use something that is so locked down, with barriers every step of the way, that you decided to open up everything just to get things to work, with the intent to figure out later how you were supposed to do things correctly in the first place and then lock things back down? And then that never gets done? I'm sure this happens all the time. Microsoft is rightfully pointing out here that they provide the infrastructure - it's up to the admins employed by their customers to use it correctly. The Linux fanbois say the same thing, Linux is super-secure if you do it correctly, but a misconfigured OS is still going to be as vulnerable as anything else. And now the bad analogy...how far should a chainsaw manufacturer go to ensure their customers don't do something completely stupid?

                              S Offline
                              S Offline
                              StatementTerminator
                              wrote on last edited by
                              #14

                              So it was a client who did the misconfiguration? I was assuming it happened on the MS end.

                              D D 2 Replies Last reply
                              0
                              • S StatementTerminator

                                So it was a client who did the misconfiguration? I was assuming it happened on the MS end.

                                D Offline
                                D Offline
                                Dan Neely
                                wrote on last edited by
                                #15

                                MS application authors are customers of MS Azure's products.

                                Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason? Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful? --Zachris Topelius

                                1 Reply Last reply
                                0
                                • OriginalGriffO OriginalGriff

                                  StatementTerminator wrote:

                                  Someone explain it to me like I'm five

                                  When a mommy computer and a daddy computer love each other very much ... :-D

                                  "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt AntiTwitter: @DalekDave is now a follower!

                                  O Offline
                                  O Offline
                                  obermd
                                  wrote on last edited by
                                  #16

                                  We get mice.

                                  1 Reply Last reply
                                  0
                                  • S StatementTerminator

                                    Yeah but if my data gets compromised I don't really care if it's a misconfiguration or a zero-day, the data got compromised. I get that MS is trying to point out that it wasn't due to some code vulnerability in their software, but I feel like there's some PR spin here in trying to minimize the fact that they failed to keep their customer data secure. Security is only as good as the weakest link, and a wide-open endpoint is a pretty weak link.

                                    N Offline
                                    N Offline
                                    Nelek
                                    wrote on last edited by
                                    #17

                                    StatementTerminator wrote:

                                    I don't really care if it's a misconfiguration or a zero-day, the data got compromised.

                                    Your jewels, your electronic equipment, your art and other valuables in your house get stolen anyways... But it is still a big difference if you forgot to close your door, or someone forced it to break in.

                                    M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpful answers is nice, but saying thanks can be even nicer.

                                    1 Reply Last reply
                                    0
                                    • S StatementTerminator

                                      So it was a client who did the misconfiguration? I was assuming it happened on the MS end.

                                      D Offline
                                      D Offline
                                      dandy72
                                      wrote on last edited by
                                      #18

                                      I certainly don't know the details about this particular story, but if I sign up for Azure and build an app on top of it, but my app is so badly designed/configured someone finds a flaw and data leaks...the fault's with me, not Azure. I'd have no problem taking that blame.

                                      1 Reply Last reply
                                      0
                                      Reply
                                      • Reply as topic
                                      Log in to reply
                                      • Oldest to Newest
                                      • Newest to Oldest
                                      • Most Votes


                                      • Login

                                      • Don't have an account? Register

                                      • Login or register to search.
                                      • First post
                                        Last post
                                      0
                                      • Categories
                                      • Recent
                                      • Tags
                                      • Popular
                                      • World
                                      • Users
                                      • Groups