CIS Logo
tagline: Confidence in the Connected World

Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution

MS-ISAC ADVISORY NUMBER:

2019-089

DATE(S) ISSUED:

09/04/2019

OVERVIEW:

Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

THREAT INTELLIGENCE:

There are currently no reports of these vulnerabilities being exploited in the wild.

SYSTEMS AFFECTED:

  • Firefox versions prior to 69
  • Firefox ESR versions prior to 68.1
  • Firefox ESR versions prior to 60.9

RISK:

Government:
  • Large and medium government entities: HIGH
  • Small government entities: MEDIUM
Businesses:
  • Large and medium business entities: HIGH
  • Small business entities: MEDIUM
Home Users:
LOW

TECHNICAL SUMMARY:

Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution. Details of the vulnerabilities are as follows:

  • Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder. Note: this issue only affects Firefox on Windows operating systems. (CVE-2019-11751)
  • If a wildcard ('*') is specified for the host in Content Security Policy (CSP) directives, any port or path restriction of the directive will be ignored, leading to CSP directives not being properly applied to content. (CVE-2019-11737)
  • An out-of-bounds read vulnerability exists in the Skia graphics library, allowing for the possible leaking of data from memory. (CVE-2019-5849)
  • Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. (CVE-2019-11743)
  • WebRTC in Firefox will honor persisted permissions given to sites for access to microphone and camera resources even when in a third-party context. In light of recent high profile vulnerabilities in other software, a decision was made to no longer persist these permissions. This avoids the possibility of trusted WebRTC resources being invisibly embedded in web content and abusing permissions previously given by users. Users will now be prompted for permissions on each use. (CVE-2019-11748)
  • Bug showed evidence of memory corruption and is presumed that with enough effort that some of these could be exploited to run arbitrary code (CVE-2019-11735)
  • The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected. (CVE-2019-11736)
  • If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. (CVE-2019-11738)
  • A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. (CVE-2019-11746)
  • Some HTML elements, such as and <textarea>, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. (CVE-2019-11744)</li><li>The "Forget about this site" feature in the History pane is intended to remove all saved user data that indicates a user has visited a site. This includes removing any HTTP Strict Transport Security (HSTS) settings received from sites that use it. Due to a bug, sites on the pre-load list also have their HSTS setting removed. On the next visit to that site if the user specifies an http: URL rather than secure https: they will not be protected by the pre-loaded HSTS setting. After that visit the site's HSTS setting will be restored. (CVE-2019-11747)</li><li>The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. (CVE-2019-11753)</li><li>Bug showed evidence of memory corruption and is presumed that with enough effort that some of these could be exploited to run arbitrary code. (CVE-2019-11740)</li><li>A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users. (CVE-2019-11749)</li><li>Bug showed evidence of memory corruption and is presumed that with enough effort that some of these could be exploited to run arbitrary code. (CVE-2019-11734)</li><li>A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a <canvas> element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. (CVE-2019-11742)</li><li>Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. (CVE-2019-9812)</li><li>It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. (CVE-2019-11752)</li><li>A compromised sandboxed content process can perform a Universal Cross-site Scripting (UXSS) attack on content from any site it can cause to be loaded in the same process. Because addons.mozilla.org and accounts.firefox.com have close ties to the Firefox product, malicious manipulation of these sites within the browser can potentially be used to modify a user's Firefox configuration. These two sites will now be isolated into their own process and not allowed to be loaded in a standard content process. (CVE-2019-11741)</li><li>A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. (CVE-2019-11750)</li></ul><p>Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the usergrep an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.</p> </p> <h4>RECOMMENDATIONS:</h4> <p> <p>We recommend the following actions be taken:</p> <ul> <li>Apply appropriate updates provided by Mozilla to vulnerable systems, immediately after appropriate testing.</li> <li>Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.</li> <li>Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.</li> <li>Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from un-trusted sources.</li> <li>Apply the Principle of Least Privilege to all systems and services.</li> </ul> </p> <h4>REFERENCES:</h4> <div class="reference-list"> <h5>Mozilla:</h5> <a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/" target="_blank">https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/</a> <a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-26/" target="_blank">https://www.mozilla.org/en-US/security/advisories/mfsa2019-26/</a> <a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-27/" target="_blank">https://www.mozilla.org/en-US/security/advisories/mfsa2019-27/</a> </div> <div class="reference-list"> <h5>CVE:</h5> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9812" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9812</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11734" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11734</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11735" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11735</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11736" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11736</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11737" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11737</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11738" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11738</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11740" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11740</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11741" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11741</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11742" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11742</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11743" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11743</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11744" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11744</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11746" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11746</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11747" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11747</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11748" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11748</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11749" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11749</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11750" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11750</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11751" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11751</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11752" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11752</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11753" target="_blank">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11753</a> </div> <!-- left column content end --> </div> <!-- EOF: LEFT COLUMN --> <!--<div style="font-size: 0.85em; color: gray">* NOTICE: Temporary disable read content from WP and generate it dynamically from API</div>--> <!-- RIGHT COLUMN --> <div class="col-lg-3 col-md-4 col-sm-12 template-sidebar"> <div class="template-sidebar-content"> <h4>Get Email Updates When Cyber Threats Like This Arise</h4> <a href="https://learn.cisecurity.org/ms-isac-subscription" class="btn btn-sm btn-sidebar green-background"> <img src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/arrow-right-white.png" alt="Arrow"> Subscribe to Advisories </a> <h3 style="font-family:Open Sans Regular;font-size:30px;" >Related Resources</h3><br> <a href="https://www.cisecurity.org/controls/"> <img src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/CIS_Controls__RGB.png" style="width:57%"> </a> <!-- INSERT LINE BREAK IF SMALLER SCREEN --> <span class="visible-sm visible-xs"><br></span> <a href="https://www.cisecurity.org/controls/continuous-vulnerability-assessment-and-remediation" class="btn btn-sm btn-sidebar btn-sidebar-cta" style=""> <img src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/arrow-right-white.png" alt="Arrow"> CIS Control 3: Continuous Vulnerability Assessment and Remediation </a> <br><br> <a href="https://www.cisecurity.org/cis-benchmarks/"> <img src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/CIS_Benchmarks_RGB_TM.png" style="width:70%"> </a> <!-- INSERT LINE BREAK IF SMALLER SCREEN --> <span class="visible-sm visible-xs"><br></span> <a href="https://www.cisecurity.org/benchmark/mozilla_firefox" class="btn btn-sm btn-sidebar btn-sidebar-cta" > <img src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/arrow-right-white.png" alt="Arrow"> <span>Mozilla Firefox</span> </a> </div> </div> <!-- EOF RIGHT COLUMN --> </div> </div> <div class="row info"> <div class="col-lg-12 col-md-12 col-sm-12 col-xs-12"> <div class="col-lg-12 col-md-12 col-sm-12 col-xs-12" style="background: #e5f3f9"> <div class="vertical-divider"></div> <div class="col-lg-4 col-lg-offset-1 col-md-6 col-md-offset-1 col-sm-6 col-sm-offset-1 col-xs-12 info-hub-title"> <h4>Information Hub : <span>Advisories</span> </h4> </div> <div class="col-lg-3 col-lg-offset-4 col-md-3 col-md-offset-2 col-sm-3 col-sm-offset-2 see-all-advisories"> <a href="https://www.cisecurity.org/resources/advisory" class="subscribe-links green-color">See All Advisories <img src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/arrow-right.png" alt="Arrow" /></a> </div> <div class="vertical-divider-small hidden-xs"></div> <div class="col-lg-12 col-md-12 col-sm-12 col-xs-12"><div class="col-lg-12 col-md-12 col-sm-12"><hr style="border: 1px solid white"></div></div> <div class="vertical-divider-small"></div> <div class="col-lg-12 col-md-12 col-sm-12 col-xs-12"> <div style='display:none' name='vardump_div'>CONTROL: 1 --- ADVISORY CONTROL: 0</div> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-12"> <hr class="hr-darkyellow"> <img src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/webinar.png" class="middle" alt="Pencil" /> <span class="text-blue paragraph-title medium-paragraph">Webinar</span> <span class="text-blue">•</span> <span class="text-blue paragraph-text medium-paragraph">19 Sep 2019</span> <div><a href="https://www.cisecurity.org/webinar/2019-national-cybersecurity-awareness-month/" class="text-blog-post popular-title medium-title medium-paragraph">2019 National Cybersecurity Awareness Month</a></div> </div> <div style='display:none' name='vardump_div'>CONTROL: 2 --- ADVISORY CONTROL: 0</div> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-12"> <hr class="hr-danger"> <img src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/advisory.png" class="middle" alt="Pencil" /> <span class="text-blue paragraph-title medium-paragraph">Advisory</span> <span class="text-blue">•</span> <span class="text-blue paragraph-text medium-paragraph">19 Sep 2019</span> <div><a href="https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution_2019-095/" class="text-blog-post popular-title medium-title medium-paragraph">Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution</a></div> </div> <div style='display:none' name='vardump_div'>CONTROL: 3 --- ADVISORY CONTROL: 0</div> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-12"> <hr class="hr-warning"> <img src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/white-paper.png" class="middle" alt="Pencil" /> <span class="text-blue paragraph-title medium-paragraph">White paper</span> <span class="text-blue">•</span> <span class="text-blue paragraph-text medium-paragraph">18 Sep 2019</span> <div><a href="https://www.cisecurity.org/white-papers/security-primer-icedid/" class="text-blog-post popular-title medium-title medium-paragraph">Security Primer – IcedID</a></div> </div> <div style='display:none' name='vardump_div'>CONTROL: 4 --- ADVISORY CONTROL: 0</div> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-12"> <hr class="hr-purple"> <img src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/media-mention.png" class="middle" alt="Pencil" /> <span class="text-blue paragraph-title medium-paragraph">Media mention</span> <span class="text-blue">•</span> <span class="text-blue paragraph-text medium-paragraph">18 Sep 2019</span> <div><a href="https://www.cisecurity.org/media-mention/local-cybersecurity-experts-weigh-in-on-recent-data-breach/" class="text-blog-post popular-title medium-title medium-paragraph">Local Cybersecurity Experts Weigh in on Recent Data Breach</a></div> </div> </div> <div class="vertical-divider"></div> </div> </div> </div> <!-- THE FOOTER CONTENT HAS BEEN MOVED to /partials/footer_common.php - same content as footer-ei-isac.php --> <div class="row" id="about-us"> <div class="col-lg-12 col-md-12 col-sm-12 col-xs-12 center-xs learn-more"> <div class="col-lg-12 col-md-12 col-sm-12 bg-blue"> <div class="vertical-divider-small"></div> <div class="col-lg-2 col-lg-offset-1 col-md-2 col-sm-2 col-sm-offset-1 col-xs-12"> <ul class="footer-list"> <li><a href="https://www.cisecurity.org/about-us" class="text-lightgrey popular-title small">About us</a></li> <li><a href="https://www.cisecurity.org/about-us/leadership" class="text-lightgrey small">Leadership</a></li> <li><a href="https://www.cisecurity.org/about-us/board" class="text-lightgrey small">Board</a></li> <li><a href="https://careers-cisecurity.icims.com" class="text-lightgrey small">Jobs</a></li> <li><a href="https://www.cisecurity.org/about-us/media/" class="text-lightgrey small">Media</a></li> <li><a href="https://www.cisecurity.org/testimonials" class="text-lightgrey small">Testimonials</a></li> <li><a href="https://www.cisecurity.org/event-calendar" class="text-lightgrey small">Events</a></li> <li><a href="https://learn.cisecurity.org/contact-us" class="text-lightgrey small">Contact</a></li> <!-- <li><a href="https://www.cisecurity.org/about-us/contact" class="text-lightgrey small">Contact</a></li> --> </ul> </div> <div class="col-lg-3 col-md-3 col-sm-2 col-xs-12"> <ul class="footer-list"> <li><a href="https://www.cisecurity.org/cybersecurity-tools/" class="text-lightgrey popular-title small">Programs & Memberships</a></li> <li><a href="https://www.cisecurity.org/communities/" class="text-lightgrey small">CIS Communities</a></li> <li><a href="/cis-benchmarks/" class="text-lightgrey small">CIS Benchmarks™</a></li> <li><a href="https://www.cisecurity.org/controls/" class="text-lightgrey small">CIS Controls<sup>®</sup></a></li> <li><a href="https://www.cisecurity.org/cis-securesuite/" class="text-lightgrey small">CIS SecureSuite<sup>®</sup></a></li> <li><a href="https://www.cisecurity.org/ms-isac/" class="text-lightgrey small">MS-ISAC<sup>®</sup></a></li> <li><a href="https://www.cisecurity.org/ei-isac/" class="text-lightgrey small">EI-ISAC<sup>®</sup></a></li> </ul> </div> <!--<div class="col-lg-2 col-md-2 col-sm-4 col-xs-12"> <ul class="footer-list"> <li><a href="https://www.cisecurity.org/memberships/" class="text-lightgrey popular-title small">Memberships</a></li> <li><a href="https://www.cisecurity.org/memberships/ms-isac/" class="text-lightgrey small">MS-ISAC</a></li> <li><a href="https://www.cisecurity.org/memberships/cis-securesuite/" class="text-lightgrey small">CIS SecureSuite</a></li> </ul> </div>--> <div class="col-lg-2 col-md-2 col-sm-2 col-xs-12"> <ul class="footer-list"> <li><a href="https://www.cisecurity.org/cybersecurity-tools/" class="text-lightgrey popular-title small">Tools</a></li> <li><a href="https://learn.cisecurity.org/cis-cat-landing-page" class="text-lightgrey small">CIS-CAT<sup>®</sup>Lite</a></li> <li><a href="https://www.cisecurity.org/tools/cis-cat-pro/" class="text-lightgrey small">CIS-CAT<sup>®</sup>Pro</a></li> <li><a href="https://workbench.cisecurity.org" target="_blank" class="text-lightgrey small">CIS WorkBench</a></li> <li><a href="https://learn.cisecurity.org/cis-ram" target="_blank" class="text-lightgrey small">CIS RAM</a></li> <li><a href="https://csat.cisecurity.org/accounts/login/" target="_blank" class="text-lightgrey small">CIS CSAT</a></li> </ul> </div> <div class="col-lg-2 col-md-2 col-sm-2 col-xs-12"> <ul class="footer-list"> <li><a href="https://www.cisecurity.org/services" class="text-lightgrey popular-title small">Services</a></li> <li><a href="https://www.cisecurity.org/services/hardened-virtual-images/" class="text-lightgrey small">CIS Hardened Images<sup>®</sup></a></li> <li><a href="https://www.cisecurity.org/services/security-assessment-consulting/" class="text-lightgrey small">Consulting</a></li> <li><a href="/services/albert/" class="text-lightgrey small">Network Monitoring – Albert</a></li> <li><a href="https://www.cisecurity.org/services/cis-cybermarket/" class="text-lightgrey small">CIS CyberMarket<sup>®</sup></a></li> <li><a href="https://www.cisecurity.org/services/seminars/" class="text-lightgrey small">Seminars</a></li> </ul> </div> <div class="col-lg-2 col-md-2 col-sm-2 col-xs-12"> <ul class="footer-list"> <li><a href="https://www.cisecurity.org/resources/" class="text-lightgrey popular-title small">Resources</a></li> <li><a href="https://www.cisecurity.org/resources/?type=post" class="text-lightgrey small">Blog</a></li> <!--<li><a href="https://www.cisecurity.org/case-studies/" class="text-lightgrey small">Case Studies</a></li> --> <li><a href="https://www.cisecurity.org/resources/?type=case-study" class="text-lightgrey small">Case Studies</a></li> <li><a href="https://www.cisecurity.org/resources/?type=newsletter" class="text-lightgrey small">Newsletters</a></li> <li><a href="https://www.youtube.com/user/TheCISecurity" target="_blank" class="text-lightgrey small">Videos</a></li> <li><a href="https://www.cisecurity.org/resources/?type=webinar" class="text-lightgrey small">Webinars</a></li> <li><a href="https://www.cisecurity.org/resources/?type=white-papers" class="text-lightgrey small">Whitepapers</a></li> <li><a href="http://www.uscyberchallenge.org" target="_blank" class="text-lightgrey small external-link">US Cyber Challenge</a></li> <li><a href="https://www.cybercompex.org/" target="_blank" class="text-lightgrey small external-link">CyberCompEx</a></li> <li><a href="https://www.cisecurity.org/elections-resources/" class="text-lightgrey small external-link">Elections Resources</a></li> </ul> </div> <div class="vertical-divider"></div> <div class="col-lg-11 col-lg-offset-1 col-md-11 col-md-offset-1 col-sm-11 col-sm-offset-1"> <a href="https://www.facebook.com/CenterforIntSec/" class="middle padding-r-15"><img style="max-width:36px;" src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/facebook.svg" alt="Facebook"></a> <a href="https://twitter.com/CISecurity/" class="middle padding-r-15"><img style="max-width:36px;" src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/twitter.svg" alt="Twitter"></a> <a href="https://www.linkedin.com/company/the-center-for-internet-security/" class="middle padding-r-15"><img style="max-width:36px;" src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/linkedin.svg" alt="LinkedIn"></a> <a href="https://www.youtube.com/user/TheCISecurity/" class="middle padding-r-15"><img style="max-width:36px;" src="https://www.cisecurity.org/wp-content/themes/cis/assets/images/youtube.svg" alt="Youtube"></a> </div> <div class="vertical-divider"></div> <div class="col-lg-2 col-lg-offset-1 col-md-2 col-xs-12 text-lightgrey small">Copyright © 2019 </div> <div class="col-lg-3 col-md-3 popular-title col-xs-12 text-lightgrey small">Center for Internet Security®</div> <div class="col-lg-2 col-md-2 col-xs-12"><a href="https://www.cisecurity.org/privacy-policy/" class="text-lightgrey small" style="text-decoration: underline">Privacy Policy</a></div> <div class="vertical-divider-small"></div> </div> </div> </div><!--END - FOOTER CONTENT HAS BEEN MOVED --> </div> </div> <script> var elementPosition = $('#navbar').offset(); $(window).scroll(function(){ if($(window).width()<992){ if($(window).scrollTop() > elementPosition.top){ $('#navbar').addClass('navbar-fixed-top'); } else { $('#navbar').removeClass('navbar-fixed-top'); } } }); $(window).on('resize', function(){ var win = $(this); //this = window if (win.width() >= 992) { $('#navbar').removeClass('navbar-fixed-top'); } }); </script> <script src="https://www.cisecurity.org/wp-content/cache/minify/13d7d.js"></script> <!-- Start of HubSpot Embed Code <script type="text/javascript" id="hs-script-loader" async defer src="//js.hs-scripts.com/2101505.js"></script>--> <!-- End of HubSpot Embed Code --> </body> </html> <!-- Performance optimized by W3 Total Cache. Learn more: https://www.w3-edge.com/products/ Object Caching 0/0 objects using memcached Page Caching using memcached (SSL caching disabled) Minified using memcached Served from: www.cisecurity.org @ 2019-09-21 02:44:33 by W3 Total Cache -->