Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Security Flaws in Perforce Servers Risk Sensitive Data

Security Flaws in Perforce Servers Risk Sensitive Data

Posted on April 21, 2026 By CWS

An investigation into Perforce P4 servers by a security expert has revealed numerous instances of misconfiguration, leading to potential data breaches. These servers, crucial for large-scale industries like AAA gaming and semiconductor design, present significant risks when improperly secured.

Research Unveils Security Weaknesses

In the spring of 2025, Australian security researcher Morgan Robertson conducted an analysis that identified 6,122 Perforce servers accessible via the internet. Alarmingly, 72% of these servers allowed unauthenticated read-only access to source code, a vulnerability created by a default-enabled remote user account. Additionally, 21% of the instances had accounts with no password, allowing direct read-write access.

Particularly concerning was Robertson’s discovery that 4% of these servers had an unprotected ‘superuser’ account, which could lead to complete system takeover through command injection. The research also pointed out that most servers inadvertently exposed user enumeration and server information.

Vulnerable Organizations at Risk

The unprotected servers were traced back to a diverse range of organizations, including AAA and indie game developers, universities, and manufacturers. Affected sectors also included interactive media firms, crypto projects, and more. Notably, some servers belonged to major entities such as a regional defense contractor and several medical technology providers.

These servers contained sensitive information like client data, internal projects, and product schematics. Robertson emphasized that these figures only represent publicly exposed infrastructure, noting that many internal networks might share similar vulnerabilities.

Perforce’s Response and Mitigation Efforts

Upon being informed of these vulnerabilities last year, Perforce responded swiftly by disabling the default remote user and updating their security documentation. The company highlighted the importance of proper configuration and maintenance to ensure the security of their system, which is trusted by numerous high-security organizations.

Perforce acknowledged that any server left in a permissive state could create security risks over time, stressing the need for proactive protection against potential attackers.

In addition to notifying Perforce, Robertson reached out to over 60 affected organizations to alert them to these exposures, underscoring the critical need for immediate action to secure their data.

Related: Vulnerabilities in Cisco, Kentico, Zimbra Exploited

Security Week News Tags:AAA gaming, Cybersecurity, data exposure, Morgan Robertson, Perforce, security research, semiconductor design, server security, version control

Post navigation

Previous Post: NGate Malware Exploits HandyPay App in Brazil for NFC Data Theft
Next Post: Gentlemen RaaS Targets Multiple OS with Advanced Ransomware

Related Posts

Stryker Hit by Major Cyberattack Linked to Iran Stryker Hit by Major Cyberattack Linked to Iran Security Week News
Malicious Chrome Extensions Compromise User Data Malicious Chrome Extensions Compromise User Data Security Week News
‘Highest Ever’ Severity Score Assigned by Microsoft to ASP.NET Core Vulnerability ‘Highest Ever’ Severity Score Assigned by Microsoft to ASP.NET Core Vulnerability Security Week News
Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit Security Week News
Microsoft to Update Windows Secure Boot in 2026 Microsoft to Update Windows Secure Boot in 2026 Security Week News
High-Severity Vulnerabilities Patched in VMware Aria Operations, NSX, vCenter  High-Severity Vulnerabilities Patched in VMware Aria Operations, NSX, vCenter  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious Crypto Apps Target iOS Users on App Store
  • Negotiator Admits Role in 2023 BlackCat Ransomware Scandal
  • CISA Urges Immediate Action on Cisco SD-WAN Vulnerabilities
  • US Cybersecurity Worker Admits Role in Ransomware Scams
  • Google Fixes Antigravity IDE Vulnerability Allowing Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious Crypto Apps Target iOS Users on App Store
  • Negotiator Admits Role in 2023 BlackCat Ransomware Scandal
  • CISA Urges Immediate Action on Cisco SD-WAN Vulnerabilities
  • US Cybersecurity Worker Admits Role in Ransomware Scams
  • Google Fixes Antigravity IDE Vulnerability Allowing Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark