API security, Data Security, Threat Intelligence, Patch/Configuration Management

DoS attacks, data compromise threaten over 330K Prometheus instances

Security breach, system hacked alert with red broken padlock icon showing unsecure data under cyberattack, vulnerable access, compromised password, virus infection, internet network with binary code

More than 330,000 internet-exposed Prometheus monitoring and alerting toolkit servers and exporters could be subjected to data exfiltration and denial-of-service attacks due to improper authentication and exposed "debug//pprof" endpoints, respectively, reports The Hacker News.

Aside from disrupting servers through a deluge of requests to "debug/pprof/heap" and other endpoints, attackers could also exploit Prometheus' "metrics" endpoint to obtain information from internal API endpoints, Docker registries, subdomains, and images that could be leveraged for reconnaissance efforts, according to an analysis from Aqua Security's Nautilus threat researchers. Additional findings revealed eight Prometheus exporters to be susceptible to repojacking intrusions. "Unsuspecting users following the documentation could unknowingly clone and deploy this malicious exporter, leading to remote code execution on their systems," said researchers, who urged the immediate implementation of sufficient authentication approaches and limited public access for Prometheus servers and exporters. Organizations have also been recommended to track endpoints and adopt repojacking mitigations.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds