Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Unsecured Perforce Servers Expose Sensitive Data From Major Orgs
    Cybersecurity

    Unsecured Perforce Servers Expose Sensitive Data From Major Orgs

    adminBy adminApril 22, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Perforce security
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A researcher has analyzed internet-facing Perforce P4 servers and found that many are still misconfigured, exposing highly sensitive information. 

    Perforce P4 (formerly Helix Core) is a centralized version control platform built to handle the massive data requirements of industries like AAA gaming and semiconductor design. While P4 serves an important role, it can be valuable for threat actors if left unprotected. 

    Australian security researcher Morgan Robertson conducted an analysis of internet-exposed Perforce servers in the spring of 2025 and found 6,122 instances. 

    Of these servers, 72% provided unauthenticated read-only access to source code via a remote user account that had been enabled by default. In addition, 21% of the instances had at least one account with no password set, enabling direct read-write access.

    Robertson also found at the time that 4% of servers had an unprotected ‘superuser’ account, enabling complete system compromise via command injection. 

    The researcher also discovered that a vast majority of the systems allowed user enumeration and exposed server information by default. 

    Advertisement. Scroll to continue reading.

    Robertson said some of the unprotected systems belonged to AAA and indie game developers, universities, animation studios, interactive media firms, crypto projects, and manufacturers. 

    The researcher made his findings public on Tuesday, telling SecurityWeek that of the 6,122 public servers initially discovered, 2,826 are still active at their original IP addresses. 

    Of these, 1,525, representing roughly 54%, still allow unauthenticated read-only access to source code via a remote user account. In addition, 501 instances, or 17% of the active servers, still allow completely unauthenticated user enumeration.

    Robertson told SecurityWeek that some of the affected servers appear to belong to major organizations, including a regional defense contractor, several medical technology providers, a North American law enforcement software vendor, an international industrial automation firm, a North American commercial EV startup, an Asian retail POS and ERP software vendor, and a banking software maker.

    The servers associated with these companies exposed highly sensitive information, including client information, internal projects, personal information, credentials, source code, and product schematics.

    The researcher noted that the numbers he shared reflect only publicly exposed infrastructure. 

    “A significant number of Perforce servers sit strictly on internal networks but are deployed with the exact same insecure defaults,” Robertson explained. “This means any bad actor, insider threat, or red team that gains a foothold on a corporate network likely has a direct path to access critical IP or escalate privileges via these systems.”

    Perforce was notified of the findings roughly one year ago and quickly took action, disabling the remote user by default and updating its documentation to enhance security. 

    “P4 is trusted by some of the world’s most security-conscious teams to manage and safeguard their most valuable IP: source code and binary assets. However, like any advanced system, its effectiveness relies heavily on proper configuration and maintenance,” Perforce said in a May 2025 blog post. 

    It added, “Any server left in a permissive state can create lapses in security hygiene over time, and lead to significant risks. And like any server connected to the internet, you should assume your P4 server will eventually be tested by an attacker.”

    In addition to notifying Perforce, Robertson has reached out to more than 60 of the affected organizations to warn them about the exposure.

    Related: Cursor AI Vulnerability Exposed Developer Devices

    Related: Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities

    data Expose major Orgs Perforce Sensitive Servers Unsecured
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleLatest Rufus update debloats and installs Windows 11 silently
    Next Article SUSE bets automated migration can break VMware’s grip on virtualization
    admin
    • Website

    Related Posts

    Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

    April 22, 2026

    CISA confirms exploitation of 3 more Cisco networking device vulnerabilities

    April 22, 2026

    New Lotus data wiper used against Venezuelan energy, utility firms

    April 22, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Someone turned an ESP32 T-LoRa Pager into a portable music machine, and you can too

    April 22, 2026

    Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

    April 22, 2026

    Google Adds New Tasked-Based Search Features

    April 22, 2026

    Grab this Samsung Galaxy S25 clear case for just $5

    April 22, 2026
    Categories
    • Blogging (66)
    • Cybersecurity (1,440)
    • Privacy & Online Earning (176)
    • SEO & Digital Marketing (875)
    • Tech Tools & Mobile / Apps (1,727)
    • WiFi / Internet & Networking (238)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Someone turned an ESP32 T-LoRa Pager into a portable music machine, and you can too

    April 22, 2026

    Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

    April 22, 2026

    Google Adds New Tasked-Based Search Features

    April 22, 2026
    Most Popular
    • Someone turned an ESP32 T-LoRa Pager into a portable music machine, and you can too
    • Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023
    • Google Adds New Tasked-Based Search Features
    • Grab this Samsung Galaxy S25 clear case for just $5
    • CISA confirms exploitation of 3 more Cisco networking device vulnerabilities
    • Massive Motorola Razr 2026 leak leaves nothing to the imagination
    • New Lotus data wiper used against Venezuelan energy, utility firms
    • The hidden ‘bland tax’ that could erase your brand from AI search
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.