Cisco Settlement Sees Whistleblower Vindicated

Cisco Settlement Sees Whistleblower Vindicated

A computer security expert who has won a trailblazing payout in a whistleblower lawsuit over critical security flaws he found in October 2008 in Cisco Systems video surveillance software thought his discovery would be a career-boosting milestone.

James Glenn imagined at the time that Cisco would credit him on its website. The software was, after all, used at major US international airports and multiple federal agencies with sensitive missions

“I mean, this was a pretty decent accomplishment,” Glenn said Thursday in a phone interview.

Instead, he was fired by the Cisco reseller in Denmark that employed him, which cited cost-cutting needs. And Cisco kept the flaws in its Video Surveillance Manager system quiet for five years.

Only Wednesday, when an $8.6 million settlement was announced and the lawsuit he filed in 2011 under the federal False Claims Act unsealed, was Glenn’s ordeal revealed — along with the potential peril posed by Cisco’s long silence.

The law lets whistleblowers report fraud and misconduct in federal contracting — for selling flawed products, essentially — and collect financial rewards when claims succeed. Glenn’s attorneys said his is the first cyber-security case successfully litigated under the FCA.

Cyber-security expert Chris Wysopal of Veracode said the case breaks new ground by making it clear that security vulnerabilities now fall into the flawed product category.

“This allows for a new type of bug bounty for security researchers if vendors drag their feet, continue selling their products to governments without notifying of the risk they know about and not fixing their flaws,” he said.

The exploit Glenn, 42, discovered would have given an attacker full administrative access to the software that managed video feeds, letting them be monitored from a single location, the lawsuit says. It could also potentially allow unauthorised access to sensitive connected systems.

That meant an intruder might have taken control of or bypassed physical security systems such as locks and fire alarms, which are regularly connected to camera systems.

“An unauthorised user could effectively shut down an entire airport by taking control of all security cameras and turning them off,” the suit says. Airports affected included Los Angeles International and Chicago’s Midway, it says.

“You could penetrate the entire system. And you could do that without any trace. And have complete backdoor access to the system whenever you wanted,” said Michael Ronickher, an attorney representing Glenn with the firm Constantine Cannon.

The software was also used by the Department of Defense Biometrics Task Force Headquarters, the US Secret Service, the Department of Homeland Security, the Army, the Navy, the Marine Corps, the National Aeronautics and Space Administration and the Federal Emergency Management Agency — as well as police stations, prisons, schools and by Amtrak at its stations, the lawsuit says.

“I feel vindicated, but not in the celebratory sense,” said Glenn, who gets 20 percent of the settlement payout, with the rest going to the federal government, 15 states and the District of Columbia.

“I think in terms of the punishment level for the other party maybe it’s not that significant,” he added.

Cisco issued a statement Wednesday saying it was “pleased to have resolved” the dispute and that “there was no allegation or evidence that any unauthorised access to customers’ video occurred” as a result of the product’s architecture. But it added that video feeds could “theoretically have been subject to hacking.”

Ronickher, Glenn’s lawyer, noted that the suit does not address all the international locations that bought the Cisco software, which he said include the Auckland airport, New Zealand’s largest.