Cybersecurity

Army: Log-off flaw creates no risk of outside hacks

padlocked keyboard

The Army's deputy of cybersecurity said last week that the service's systems are vulnerable to hacks when verified users are logging off, Buzzfeed reported. That story came just days after the same news site revealed that two anonymous sources had identified the same flaw.

Now, however, the Army is saying that the flaw exposes its networks only to people who have physical access to the machines.

"There are instances where the logoff process does not immediately complete upon removal of the [Common Access Code card]," Roy Lundgren, director of the Army Cyber Directorate, told Buzzfeed. "This occurs when the system is running logoff scripts and shutting down applications. The period of time that a system can be accessed following CAC removal before system logoff completes is normally not sufficient to gain unauthorized access."

An Army public affairs officer told FCW on Sept. 5 that even though there are situations where computers do not completely log off upon removal of the CAC, that vulnerability cannot be exploited remotely.

"The risk of the type of compromise alleged in the article is considered to be low," Army Public Affairs Officer Margaret McBride said in an email. "Only those with physical access to an Army computer could take advantage; an outside hack is not possible via this methodology."

"The Army is analyzing the alleged flaw in the logoff procedure," she added said. "Once the architecture issues are understood and the likelihood of occurrence is fully determined, the Army will design appropriate mitigation, such as technical solutions, revised user procedures and policy enforcement."

About the Author

Reid Davenport is an FCW editorial fellow. Connect with him on Twitter: @ReidDavenport.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Fri, Sep 6, 2013 Ray

Don't depend on the CAC removal, make it so you have to manually log off and that problem will not occur. Oh, sorry, gov workers are too dumb to know how to log off.

Must make it complicated to do tasks that involving CACing between several CAC devices, sometimes needing three folks to do the job of one due to auto logoff (or in our case, locking the computer, we are not so paranoid here as to log you off.....yet)

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group