Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Security Flaws in Perforce Servers Risk Sensitive Data

Security Flaws in Perforce Servers Risk Sensitive Data

Posted on April 21, 2026 By CWS

An investigation into Perforce P4 servers by a security expert has revealed numerous instances of misconfiguration, leading to potential data breaches. These servers, crucial for large-scale industries like AAA gaming and semiconductor design, present significant risks when improperly secured.

Research Unveils Security Weaknesses

In the spring of 2025, Australian security researcher Morgan Robertson conducted an analysis that identified 6,122 Perforce servers accessible via the internet. Alarmingly, 72% of these servers allowed unauthenticated read-only access to source code, a vulnerability created by a default-enabled remote user account. Additionally, 21% of the instances had accounts with no password, allowing direct read-write access.

Particularly concerning was Robertson’s discovery that 4% of these servers had an unprotected ‘superuser’ account, which could lead to complete system takeover through command injection. The research also pointed out that most servers inadvertently exposed user enumeration and server information.

Vulnerable Organizations at Risk

The unprotected servers were traced back to a diverse range of organizations, including AAA and indie game developers, universities, and manufacturers. Affected sectors also included interactive media firms, crypto projects, and more. Notably, some servers belonged to major entities such as a regional defense contractor and several medical technology providers.

These servers contained sensitive information like client data, internal projects, and product schematics. Robertson emphasized that these figures only represent publicly exposed infrastructure, noting that many internal networks might share similar vulnerabilities.

Perforce’s Response and Mitigation Efforts

Upon being informed of these vulnerabilities last year, Perforce responded swiftly by disabling the default remote user and updating their security documentation. The company highlighted the importance of proper configuration and maintenance to ensure the security of their system, which is trusted by numerous high-security organizations.

Perforce acknowledged that any server left in a permissive state could create security risks over time, stressing the need for proactive protection against potential attackers.

In addition to notifying Perforce, Robertson reached out to over 60 affected organizations to alert them to these exposures, underscoring the critical need for immediate action to secure their data.

Related: Vulnerabilities in Cisco, Kentico, Zimbra Exploited

Security Week News Tags:AAA gaming, Cybersecurity, data exposure, Morgan Robertson, Perforce, security research, semiconductor design, server security, version control

Post navigation

Previous Post: NGate Malware Exploits HandyPay App in Brazil for NFC Data Theft
Next Post: Gentlemen RaaS Targets Multiple OS with Advanced Ransomware

Related Posts

Chinese APT Hacking Routers to Build Espionage Infrastructure Chinese APT Hacking Routers to Build Espionage Infrastructure Security Week News
German Authorities Identify REvil Ransomware Chief German Authorities Identify REvil Ransomware Chief Security Week News
US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles Security Week News
SquareX and Perplexity Quarrel Over Alleged Comet Browser Vulnerability SquareX and Perplexity Quarrel Over Alleged Comet Browser Vulnerability Security Week News
Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking Security Week News
Chinese APT Exploits Unpatched Windows Flaw in Recent Attacks Chinese APT Exploits Unpatched Windows Flaw in Recent Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Phishing Alert: GitHub Notifications Misused by Hackers
  • Progress Releases Vital Patches for MOVEit and LoadMaster
  • Boosting MTTR: Key Strategies of Advanced SOCs
  • Gentlemen RaaS Targets Multiple OS with Advanced Ransomware
  • Security Flaws in Perforce Servers Risk Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Phishing Alert: GitHub Notifications Misused by Hackers
  • Progress Releases Vital Patches for MOVEit and LoadMaster
  • Boosting MTTR: Key Strategies of Advanced SOCs
  • Gentlemen RaaS Targets Multiple OS with Advanced Ransomware
  • Security Flaws in Perforce Servers Risk Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark