Hi all,
my SOC has opened an incident because it appears that the credentials entered in an SSH connector are exposed in the logs.
Here is a screenshot of the connector:
These are the notes from my SOC:
Due to the use of an improper credential masking method in a command line, the credentials for the account listed below have been exposed.
Security Risk
-
The SFTP username and password were passed in cleartext on the command line, exposing them to local command history and anyone with access to the machine.
-
The full command including credentials was ingested by logging/SIEM systems, making the credentials visible to all users with access to those logs.
-
This exposure could allow unauthorized SFTP access to the associated system or data.
Does anyone know why the password is exposed in the logs and whether there is a solution to this issue?
Thank you
Claudio
