Friday, June 6, 2025
Advertise with us
Support us
Write for us
No Result
View All Result
claws
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
No Result
View All Result
CLAWS
No Result
View All Result
Home Articles

 A new R language vulnerability exposes risks in supply chain threat dynamics

Govind NelikabyGovind Nelika
May 13, 2024
in Articles, CLAWS Focus
A A
0
Post Views: 28

Introduction

R is a popular programming language utilised for statistical computing and dynamics and is a preferred choice for statistical methodology concerning a wide range of statistical and graphical techniques. However, on 29th April 2024, AI application security company Hidden Layer identified a zero-day vulnerability in the R programming package. The Hidden Layer researchers Kasimir Schulz and Kieran Evans report identified the vulnerability in loading RDS (R Data Serialization) files or R packages, which is exploited when RDS files are deserialised/decompressed. The vulnerability allows malicious code to be injected and executed when the file is deserliased. The vulnerability has been tracked as CVE-2024-27322 by the National Vulnerability Database (U.S Government), boasting a base score of 8.8, indicating a “High” severity level.

The significance of this vulnerability extends far beyond its immediate impact on R users. It suggests a potential for a sophisticated supply chain attack, indicating that the vulnerability could be exploited through various methods. These methods include:

  • Social Engineering & overwriting R packages: The RDX files or R utilise the lazy loading method, a technique where the actual loading of data or code is deferred until needed. Threat actors would focus on attacking R packages and inject code which would execute when the package is utilised. Once the R package is loaded, the arbitrary code will run and infect the system. The malicious entity can always employ social engineering tactics to trick users into downloading and utilising these files or sharing them on social media handles for further reach.
  • Targeting Research Groups: R & D groups can be targeted primarily as most organisations at certain levels utilise R for data mapping and plotting graphs and figures, but these same researchers would undoubtedly act as a supply chain, becoming the weakest link in the chain and opening their systems and networks for further exploitation.

 

Implications for Military & Government

This vulnerability poses a significant threat to the civilian, military, and governmental sectors, which rely heavily on R for data analysis, modelling, and predictive analytics. The potential for attackers to compromise these analytical processes is alarming, as it could lead to erroneous conclusions or predictions that could undermine strategic decision-making. Moreover, R’s integration into operational systems for real-time data analysis or decision-making processes amplifies the severity of this vulnerability. Unauthorized access or control over these operational systems could threaten security and public safety. Furthermore, attackers exploiting this vulnerability could leverage the compromised systems as a launchpad for additional cyber-attacks, further escalating the risk landscape.

 

The only workaround before the released patch was to run RDS/RDX files in sandboxes and containers to prevent code execution on the underlying system. The isolated sandbox would be able to mitigate the matter, and all systems, as per the alert of CERT Coordination Center (CERT/CC) under DARPA, should update to R Core Version 4.4.0, which address the flaw by restricting promises in the serialisation stream.

Conclusion

In the rapidly evolving cybersecurity landscape, the significance of proactive security measures in software development and deployment cannot be overstated. This underscores the critical need for continuous vigilance, rigorous testing, regular updates, and adherence to secure coding practices to mitigate emerging threats effectively. Regular security audits of R-based applications and the implementation of secure data serialisation practices are paramount in identifying and addressing potential vulnerabilities.

The widespread adoption of R packages and repositories, such as CRAN, introduces potential avenues for supply chain attacks. Consequently, it becomes imperative to scrutinise packages being uploaded to these repositories more closely. However, it’s essential to recognise that vulnerabilities cannot solely be attributed to the core ecosystem of R; instead, they require collective responsibility from all users employing R. Staying informed about the latest packages and actively managing and mitigating the risks associated with vulnerabilities falls on the shoulders of every user leveraging R.

The discovery of a new security vulnerability in the R programming language, CVE-2024-27322, exemplifies the real-world risks posed by supply chain attacks. This vulnerability exploits promise objects and lazy evaluation in R, allowing the creation of malicious RDS (R Data Serialization) files that execute arbitrary code upon loading and referencing. The serialisation and deserialisation processes, crucial for saving and loading R packages, are particularly vulnerable to this exploit, highlighting the urgent need for enhanced security measures.

In conclusion, the cybersecurity challenges faced by the R ecosystem underscore the importance of a multifaceted approach to security. This includes the development of secure coding practices, regular security audits, and the active participation of all R users in staying informed about potential vulnerabilities and taking steps to mitigate risks. As the R programming language continues to gain popularity across various sectors, including finance, healthcare, and research, the responsibility to safeguard against supply chain attacks and other cybersecurity threats becomes increasingly critical.

Tags: CyberCyber VerticalGovind NelikaMulti Domain Studies
Previous Post

Terror Allegations Against UNRWA: Key Developments Concerning Investigations and Implications

Next Post

Mine Warfare: A Vital Tool for India’s Deterrence Strategy Along the Northern Border

Govind Nelika

Govind Nelika

Govind Nelika is the Researcher / Web Manager/ Outreach Coordinator at the Centre for Land Warfare Studies (CLAWS). He is an alumnus of Pondicherry Central University with a degree in Political Science complemented by a certification in Data Sciences from IBM. His research approach is multidisciplinary in nature, and his focus area at CLAWS is on emerging challenges and trends in the fields of Cybersecurity, OSINT, and the evolving landscape of Strategic Technology, synergized with Generative AI and LLM. In recognition of his contributions, he was awarded the Chief of Army Staff (COAS) Commendation Card on Army Day 2025 for his work with CLAWS. He can be reached at [email protected]

Next Post

Mine Warfare: A Vital Tool for India’s Deterrence Strategy Along the Northern Border

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Support Us Donate Now

Web Updates

List of Shortlisted Officers / Candidates: PhD Batch – 7

Field Marshal Manekshaw Essay Competiton 2025

Guidelines to Publish with CLAWS

Summer Internship Capsule 2025

Application Form – Study Mtrl for DSSC 2025

[NEW] Application Form for membership for PROMEX (PART B or D)

  • Trending
  • Comments
  • Latest

Summer Internship Capsule 2025

April 8, 2025
Pahalgam Response: Why India Must Fight Smart?

Pahalgam Response: Why India Must Fight Smart?

May 2, 2025
Results | Field Marshal Manekshaw Essay Competition – 2024

Results | Field Marshal Manekshaw Essay Competition – 2024

April 2, 2025
Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

May 21, 2025

Front Organisations: The Valley’s Homegrown ‘Resistance’ or Pakistan’s Evolving Terrorism Tactics?

2
RISING TENSIONS IN KATHUA

RISING TENSIONS IN KATHUA

1
The Art of Negotitations Three Day Capsule Course | 07th – 09th May

The Art of Negotitations Three Day Capsule Course | 07th – 09th May

1
Condolences, Condemnations and Silence: India’s neighborhood reacts to Pahalgam (South East Asia)

Condolences, Condemnations and Silence: India’s neighborhood reacts to Pahalgam (South East Asia)

1
Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

June 4, 2025
Echoes Across the Line: PoJK post Op Sindoor

Echoes Across the Line: PoJK post Op Sindoor

June 2, 2025
Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

May 31, 2025
Military Diplomacy or Strategic Coercion? China’s Defence Engagement with Pakistan: Consequences for India

Military Diplomacy or Strategic Coercion? China’s Defence Engagement with Pakistan: Consequences for India

May 31, 2025

Popular Stories

  • Summer Internship Capsule 2025

    0 shares
    Share 0 Tweet 0
  • Pahalgam Response: Why India Must Fight Smart?

    0 shares
    Share 0 Tweet 0
  • Results | Field Marshal Manekshaw Essay Competition – 2024

    0 shares
    Share 0 Tweet 0
  • Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

    0 shares
    Share 0 Tweet 0
  • Field Marshal Manekshaw Essay Competiton 2025

    0 shares
    Share 0 Tweet 0

About us

CLAWS

The Centre for Land Warfare Studies (CLAWS), New Delhi, India is an independent think tank on strategic studies and land warfare. The mandate of CLAWS covers national security issues, conventional military operations and sub-conventional warfare.

Follow Us

Browse by Category

  • Articles
  • Autumn 2019
  • Autumn 2020
  • Books
  • CLAWS Focus
  • CLAWS Journal
  • Essay
  • Events
  • External Publications
  • FMMEC
  • Intern Articles
  • Issue Briefs
  • Jottings by Director General Emiritus
  • Manekshaw Papers
  • Newsletter
  • Round Tables
  • Scholar Warrior
  • Seminars
  • Uncategorized
  • Web Updates
  • Winter 2019
  • YouTube Podcast

Recent News

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

June 4, 2025
Echoes Across the Line: PoJK post Op Sindoor

Echoes Across the Line: PoJK post Op Sindoor

June 2, 2025
  • Site Map
  • Tenders
  • Advertise With Us
  • Terms of use
  • Privacy Policy
  • Other Think Tanks

© 2008-2024 Centre for Land Warfare Studies (CLAWS).

No Result
View All Result
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact

© 2008-2024 Centre for Land Warfare Studies (CLAWS).