Security specialists have unearthed three fresh PHP vulnerabilities that could have serious consequences for organizations and consumers worldwide.

Yannay Livneh, a member of the exploit research team at Check Point, said in a blog post that his group spent several months analyzing the potential for PHP vulnerabilities in web programming language PHP 7. Through this research, the security team discovered previously unknown vulnerabilities that cybercriminals could have used to spread malware and steal data.

Livneh’s team reported the findings to PHP, and the organization’s security team produced vulnerability fixes. IT security managers must now ensure their business’s web servers are running the latest version of PHP 7.

What Is PHP 7, and Why Is It Being Targeted?

PHP 7 is the latest release of Hypertext Preprocessor, a widely used open-source web programming language. Estimates suggest the language runs more than 80 percent of websites on the internet. In comparison to its predecessors, PHP 7 offers a range of benefits, including higher performance and improved functionality. Progression to the new version of the development language continues at pace. Recent research from tools producer Zend suggested only 14 percent of users have no plans to move to PHP 7, according to CIO.

However, Livneh suggested that PHP 7 also presents a new avenue of attack for cybercriminals, who can use the opportunity to discover vulnerabilities.

How Could the PHP Vulnerabilities Create Problems?

The first two vulnerabilities would give cybercriminals the opportunity to control a website and create mayhem, such as spreading malware or stealing customer data. The third vulnerability would create a denial-of-service (DoS) attack that exhausts memory and shuts the website down.

The good news is that there is no indication that these new vulnerabilities have already been exploited, Livneh told SC Magazine. The even better news for IT managers is that patches for the PHP vulnerabilities have already been issued. The Check Point research team reported the three vulnerabilities back in August and September. PHP security specialists provided updated versions of the programming language in mid-October and at the start of December.

Why Did These Concerns Emerge, and Is PHP 7 Business-Ready?

Livneh and his research team focused their analysis on what is known as the “unserialize mechanism,” which is an area that was heavily exploited by cybercriminals in PHP 5. While the same mechanism was again the root of the concern, the vulnerability in PHP 7 was different in form to that in PHP 5.

The exploit associated with PHP 5 allowed hackers to attack high-profile platforms and websites, including those built on Drupal. The patches to PHP 7 should provide a sense of calm for security managers, although it should be noted that some reticence to adopt the new version of the programming language remains.

The Zend research discovered that a range of factors dissuade PHP 7 laggards from migrating, including incompatibility with custom code (31 percent), deficiency in terms of support (17 percent) and scarcity of extensions (11 percent).

More from

Bridging the 3.4 Million Workforce Gap in Cybersecurity

As new cybersecurity threats continue to loom, the industry is running short of workers to face them. The 2022 (ISC)2 Cybersecurity Workforce Study identified a 3.4 million worldwide cybersecurity worker gap; the total existing workforce is estimated at 4.7 million. Yet despite adding workers this past year, that gap continued to widen.Nearly 12,000 participants in that study felt that additional staff would have a hugely positive impact on their ability to perform their duties. More hires would boost proper risk…

The Evolution of Antivirus Software to Face Modern Threats

Over the years, endpoint security has evolved from primitive antivirus software to more sophisticated next-generation platforms employing advanced technology and better endpoint detection and response.  Because of the increased threat that modern cyberattacks pose, experts are exploring more elegant ways of keeping data safe from threats.Signature-Based Antivirus SoftwareSignature-based detection is the use of footprints to identify malware. All programs, applications, software and files have a digital footprint. Buried within their code, these digital footprints or signatures are unique to the respective…

How Do Threat Hunters Keep Organizations Safe?

Neil Wyler started his job amid an ongoing cyberattack. As a threat hunter, he helped his client discover that millions of records had been stolen over four months. Even though his client used sophisticated tools, its threat-hunting technology did not detect the attack because the transactions looked normal. But with Wyler’s expertise, he was able to realize that data was leaving the environment as well as entering the system. His efforts saved the company from suffering even more damage and…

The White House on Quantum Encryption and IoT Labels

A recent White House Fact Sheet outlined the current and future U.S. cybersecurity priorities. While most of the topics covered were in line with expectations, others drew more attention. The emphasis on critical infrastructure protection is clearly a top national priority. However, the plan is to create a labeling system for IoT devices, identifying the ones with the highest cybersecurity standards. Few expected that news. The topic of quantum-resistant encryption reveals that such concerns may become a reality sooner than…