## Updated at UTC 2024-10-22T21:22:44.716491

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2024-9537 9.8 0.10% 16 0 2024-10-22T17:33:23.837000 ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability invo
CVE-2024-9674 5.4 0.05% 4 0 2024-10-22T14:02:50.473000 The Debrandify · Remove or Replace WordPress Branding plugin for WordPress is vu
CVE-2024-9425 5.4 0.07% 4 0 2024-10-22T13:55:04.537000 The Advanced Category and Custom Taxonomy Image plugin for WordPress is vulnerab
CVE-2024-8625 7.2 0.04% 4 0 2024-10-21T21:31:52 The TS Poll WordPress plugin before 2.4.0 does not sanitize and escape a parame
CVE-2024-7994 7.8 0.06% 2 0 2024-10-21T18:35:55.397000 A maliciously crafted RFA file, when parsed through Autodesk Revit, can force a
CVE-2024-9593 8.3 0.05% 6 1 2024-10-21T17:10:22.857000 The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to
CVE-2024-8305 6.5 0.04% 4 0 2024-10-21T15:32:39 prepareUnique index may cause secondaries to crash due to incorrect enforcement
CVE-2024-6519 8.3 0.04% 4 0 2024-10-21T15:32:39 A use-after-free vulnerability was found in the QEMU LSI53C895A SCSI Host Bus Ad
CVE-2024-9897 6.4 0.07% 4 0 2024-10-19T12:30:39 The StreamWeasels Twitch Integration plugin for WordPress is vulnerable to Store
CVE-2024-9889 4.3 0.04% 4 0 2024-10-19T09:30:53 The ElementInvader Addons for Elementor plugin for WordPress is vulnerable to Se
CVE-2023-6243 4.3 0.05% 4 0 2024-10-19T09:30:48 The EventON PRO - WordPress Virtual Event Calendar Plugin plugin for WordPress i
CVE-2024-9219 6.1 0.05% 4 0 2024-10-19T06:30:39 The WordPress Social Share Buttons plugin for WordPress is vulnerable to Reflect
CVE-2024-37404 9.1 0.04% 2 0 2024-10-19T00:32:04 Improper Input Validation in the admin portal of Ivanti Connect Secure before 22
CVE-2024-7316 5.9 0.04% 2 0 2024-10-18T12:52:33.507000 Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi E
CVE-2024-7755 8.2 0.04% 4 0 2024-10-18T12:52:33.507000 The EWON FLEXY 202 transmits credentials using a weak encoding method base64. An
CVE-2024-40711 9.8 96.76% 22 1 2024-10-18T12:51:11.257000 A deserialization of untrusted data vulnerability with a malicious payload can a
CVE-2024-4739 5.3 0.04% 4 0 2024-10-18T09:31:27 The lack of access restriction to a resource from unauthorized users makes MXsec
CVE-2024-4740 5.3 0.05% 4 0 2024-10-18T09:31:27 MXsecurity software versions v1.1.0 and prior are vulnerable because of the use
CVE-2024-9594 6.3 0.04% 6 0 2024-10-17T20:28:43 A security issue was discovered in the Kubernetes Image Builder versions <= v0.1
CVE-2024-9486 9.8 0.04% 6 0 2024-10-17T20:28:18 A security issue was discovered in the Kubernetes Image Builder versions <= v0.1
CVE-2024-45731 8.1 0.05% 7 0 2024-10-17T15:32:17 In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-p
CVE-2024-45738 4.9 0.05% 1 0 2024-10-17T15:32:16 In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potent
CVE-2024-45739 4.9 0.05% 1 0 2024-10-17T15:32:16 In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potent
CVE-2024-21250 8.1 0.05% 2 0 2024-10-17T15:31:09 Vulnerability in the Oracle Process Manufacturing Product Development product of
CVE-2024-21216 9.8 0.15% 1 0 2024-10-17T15:31:09 Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
CVE-2024-45713 5.1 0.04% 1 0 2024-10-17T12:31:10 SolarWinds Kiwi CatTools is susceptible to a sensitive data disclosure vulnerabi
CVE-2024-9466 6.5 0.05% 2 1 2024-10-17T06:31:37 A cleartext storage of sensitive information vulnerability in Palo Alto Networks
CVE-2024-9465 9.1 73.86% 3 2 template 2024-10-17T06:30:32 An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauth
CVE-2024-9473 7.8 0.04% 1 0 2024-10-17T06:30:32 A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app
CVE-2024-9464 6.5 0.05% 2 1 2024-10-17T06:30:32 An OS command injection vulnerability in Palo Alto Networks Expedition allows an
CVE-2024-7993 7.8 0.05% 2 0 2024-10-17T00:32:47 A maliciously crafted PDF file, when parsed through Autodesk Revit, can force an
CVE-2024-43532 8.8 0.05% 2 0 2024-10-16T21:51:34.370000 Remote Registry Service Elevation of Privilege Vulnerability
CVE-2024-10004 9.1 0.04% 2 0 2024-10-16T21:32:16 Opening an external link to an HTTP website when Firefox iOS was previously clos
CVE-2024-20461 6.0 0.04% 3 0 2024-10-16T18:31:58 A vulnerability in the CLI&nbsp;of Cisco ATA 190 Series Analog Telephone Adapter
CVE-2024-45071 5.5 0.04% 2 0 2024-10-16T18:31:58 IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to stored cross-site
CVE-2024-45072 5.5 0.05% 2 0 2024-10-16T18:31:58 IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an XML External En
CVE-2024-20463 5.4 0.04% 3 0 2024-10-16T18:31:58 A vulnerability in the web-based management interface of Cisco ATA 190 Series An
CVE-2024-38814 8.8 0.05% 5 0 2024-10-16T18:31:58 An authenticated SQL injection vulnerability in VMware HCX was privately reporte
CVE-2024-20512 6.1 0.04% 3 0 2024-10-16T18:31:58 A vulnerability in the web-based management interface of Cisco Unified Contact C
CVE-2024-20462 5.5 0.04% 3 0 2024-10-16T18:31:53 A vulnerability in the web-based management interface of Cisco ATA 190 Series Mu
CVE-2024-20421 7.1 0.04% 3 0 2024-10-16T18:31:53 A vulnerability in the web-based management interface of Cisco ATA 190 Series An
CVE-2024-20458 8.2 0.04% 5 0 2024-10-16T18:31:53 A vulnerability in the web-based management interface of Cisco ATA 190 Series An
CVE-2024-20459 6.5 0.04% 3 0 2024-10-16T18:31:53 A vulnerability in the web-based management interface of Cisco ATA 190 Multiplat
CVE-2024-49265 6.5 0.04% 2 1 2024-10-16T18:31:53 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2024-20460 6.1 0.04% 3 1 2024-10-16T18:31:47 A vulnerability in the web-based management interface of Cisco ATA 190 Series An
CVE-2024-20280 6.3 0.04% 3 1 2024-10-16T18:31:46 A vulnerability in the backup feature of Cisco UCS Central Software could allow
CVE-2024-20420 5.4 0.04% 3 1 2024-10-16T18:31:46 A vulnerability in the web-based management interface of Cisco ATA 190 Series An
CVE-2024-29155 4.3 0.04% 2 1 2024-10-16T18:31:44 On Microchip RN4870 devices, when more than one consecutive PairReqNoInputNoOutp
CVE-2024-21258 5.3 0.05% 2 0 2024-10-16T18:31:40 Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (c
CVE-2024-21259 7.6 0.05% 2 0 2024-10-16T18:31:40 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2024-21260 7.5 0.05% 2 0 2024-10-16T18:31:40 Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
CVE-2024-8977 8.1 0.07% 1 0 2024-10-16T17:10:13.220000 An issue has been discovered in GitLab EE affecting all versions starting from 1
CVE-2024-6530 5.4 0.04% 1 0 2024-10-16T16:53:08.487000 A cross-site scripting issue has been discovered in GitLab affecting all version
CVE-2024-9893 9.8 0.06% 4 0 2024-10-16T16:38:14.557000 The Nextend Social Login Pro plugin for WordPress is vulnerable to authenticatio
CVE-2024-45844 7.2 0.04% 4 1 2024-10-16T15:32:19 BIG-IP monitor functionality may allow an attacker to bypass access control rest
CVE-2024-47139 6.8 0.04% 1 0 2024-10-16T15:32:19 A stored cross-site scripting (XSS) vulnerability exists in an undisclosed page
CVE-2024-9680 9.8 0.32% 41 1 2024-10-16T15:07:36.123000 An attacker was able to achieve code execution in the content process by exploit
CVE-2024-28987 9.1 96.02% 17 1 2024-10-16T13:05:08.363000 The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credentia
CVE-2024-45711 7.5 0.05% 1 0 2024-10-16T09:30:39 SolarWinds Serv-U is vulnerable to a directory traversal vulnerability where r
CVE-2024-9061 7.3 0.05% 2 1 2024-10-16T09:30:38 The The WP Popup Builder – Popup Forms and Marketing Lead Generation plugin for
CVE-2024-45715 7.0 0.04% 1 0 2024-10-16T09:30:38 The SolarWinds Platform was susceptible to a Cross-Site Scripting vulnerability
CVE-2024-45710 7.8 0.04% 1 0 2024-10-16T09:30:38 SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local
CVE-2024-45714 4.8 0.05% 1 0 2024-10-16T09:30:38 Application is vulnerable to Cross Site Scripting (XSS) an authenticated attacke
CVE-2024-30088 7.0 0.42% 11 6 2024-10-16T01:00:01.723000 Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-38204 7.5 0.09% 3 0 2024-10-16T00:31:04 Improper Access Control in Imagine Cup allows an authorized attacker to elevate
CVE-2024-38139 8.7 0.05% 3 0 2024-10-16T00:31:03 Improper authentication in Microsoft Dataverse allows an authorized attacker to
CVE-2024-38190 8.6 0.09% 3 0 2024-10-16T00:31:03 Missing authorization in Power Platform allows an unauthenticated attacker to vi
CVE-2024-45085 5.9 0.05% 2 0 2024-10-16T00:31:03 IBM WebSphere Application Server 8.5 is vulnerable to a denial of service, under
CVE-2024-21265 8.1 0.05% 2 0 2024-10-16T00:30:58 Vulnerability in the Oracle Site Hub product of Oracle E-Business Suite (compone
CVE-2024-21266 8.1 0.05% 2 0 2024-10-16T00:30:58 Vulnerability in the Oracle Advanced Pricing product of Oracle E-Business Suite
CVE-2024-9796 5.9 0.11% 2 1 2024-10-15T21:31:40 The WP-Advanced-Search WordPress plugin before 3.3.9.2 does not sanitize and esc
CVE-2024-31955 4.9 0.04% 2 0 2024-10-15T21:30:47 An issue was discovered in Samsung eMMC with KLMAG2GE4A and KLM8G1WEMB firmware.
CVE-2024-21255 8.8 0.05% 2 0 2024-10-15T21:30:46 Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleS
CVE-2024-21257 3.0 0.04% 2 0 2024-10-15T21:30:46 Vulnerability in the Oracle Hyperion BI+ product of Oracle Hyperion (component:
CVE-2024-21251 3.1 0.04% 2 0 2024-10-15T21:30:46 Vulnerability in the Java VM component of Oracle Database Server. Supported ver
CVE-2024-21261 4.9 0.04% 2 0 2024-10-15T21:30:46 Vulnerability in Oracle Application Express (component: General). Supported ver
CVE-2024-47874 None 0.04% 1 0 2024-10-15T19:56:07 ### Summary Starlette treats `multipart/form-data` parts without a `filename` as
CVE-2024-47824 None 0.04% 1 0 2024-10-15T19:56:06 ### Impact matrix-react-sdk before 3.102.0 allows a malicious homeserver to pot
CVE-2024-9471 4.7 0.04% 1 0 2024-10-15T18:30:50 A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks P
CVE-2024-9469 5.5 0.04% 1 0 2024-10-15T18:30:49 A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent
CVE-2024-42640 9.8 0.04% 4 1 2024-10-15T17:35:04.623000 angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote c
CVE-2024-9467 6.1 0.05% 1 0 2024-10-15T15:30:46 A reflected XSS vulnerability in Palo Alto Networks Expedition enables execution
CVE-2024-9463 7.5 91.34% 3 0 template 2024-10-15T15:30:45 An OS command injection vulnerability in Palo Alto Networks Expedition allows an
CVE-2024-8048 7.8 0.05% 2 0 2024-10-15T14:56:24.687000 In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code ex
CVE-2024-8014 8.8 0.05% 2 0 2024-10-15T14:54:09.580000 In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code ex
CVE-2024-45315 0 0.07% 1 0 2024-10-15T12:58:51.050000 The Improper link resolution before file access ('Link Following') vulnerability
CVE-2024-45734 4.3 0.04% 1 0 2024-10-14T18:30:37 In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user tha
CVE-2024-45741 5.4 0.04% 1 0 2024-10-14T18:30:37 In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform ve
CVE-2024-45735 4.3 0.04% 1 0 2024-10-14T18:30:37 In Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Secure Gateway v
CVE-2024-45740 5.4 0.04% 1 0 2024-10-14T18:30:37 In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform ve
CVE-2024-45736 6.5 0.04% 1 0 2024-10-14T18:30:32 In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Pla
CVE-2024-45732 7.1 0.05% 1 0 2024-10-14T18:30:32 In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and S
CVE-2024-45733 8.8 0.05% 1 0 2024-10-14T18:30:32 In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privilege
CVE-2024-45737 4.3 0.04% 1 0 2024-10-14T18:30:31 In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Pla
CVE-2024-9936 None 0.04% 1 0 2024-10-14T15:30:54 When manipulating the selection node cache, an attacker may have been able to ca
CVE-2024-9821 8.8 0.05% 2 1 2024-10-12T03:30:47 The Bot for Telegram on WooCommerce plugin for WordPress is vulnerable to sensit
CVE-2024-45316 7.8 0.07% 1 0 2024-10-12T00:31:53 The Improper link resolution before file access ('Link Following') vulnerability
CVE-2024-9707 9.8 0.06% 2 1 2024-10-11T15:30:45 The Hunk Companion plugin for WordPress is vulnerable to unauthorized plugin ins
CVE-2024-9234 9.8 0.04% 2 1 template 2024-10-11T15:30:44 The GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block
CVE-2024-9164 9.6 0.04% 2 0 2024-10-11T15:30:44 An issue was discovered in GitLab EE affecting all versions starting from 12.5 p
CVE-2024-45317 None 0.04% 1 0 2024-10-11T15:30:44 A Server-Side Request Forgery (SSRF) vulnerability in SMA1000 appliance firmware
CVE-2024-5005 4.3 0.04% 1 0 2024-10-11T15:30:44 An issue has been discovered discovered in GitLab EE/CE affecting all versions s
CVE-2024-8970 8.2 0.04% 1 0 2024-10-11T15:30:44 An issue was discovered in GitLab CE/EE affecting all versions starting from 11.
CVE-2024-9312 7.6 0.04% 1 0 2024-10-11T02:30:30 CVE description: Authd, through version 0.3.6, did not sufficiently randomize u
CVE-2024-9487 None 0.04% 1 0 2024-10-11T00:31:40 An improper verification of cryptographic signature vulnerability was identified
CVE-2024-9380 7.2 4.64% 7 0 2024-10-10T18:32:16 An OS command injection vulnerability in the admin web console of Ivanti CSA bef
CVE-2024-9596 3.7 0.05% 1 0 2024-10-10T12:31:19 An issue has been discovered in GitLab EE affecting all versions starting from 1
CVE-2024-9623 4.9 0.05% 1 0 2024-10-10T12:31:19 An issue was discovered in GitLab CE/EE affecting all versions starting from 8.1
CVE-2024-45519 10.0 76.66% 1 3 template 2024-10-10T00:32:08 The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9
CVE-2024-38815 4.3 0.04% 1 0 2024-10-09T21:31:14 VMware NSX contains a content spoofing vulnerability.  An unauthenticated malic
CVE-2024-38818 6.7 0.04% 1 0 2024-10-09T21:31:14 VMware NSX contains a local privilege escalation vulnerability.  An authenticat
CVE-2024-38817 6.7 0.04% 1 0 2024-10-09T21:31:14 Mware NSX contains a command injection vulnerability.  A malicious actor with a
CVE-2024-9468 None 0.04% 1 0 2024-10-09T18:31:50 A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows a
CVE-2024-9470 None 0.04% 1 0 2024-10-09T18:31:50 A vulnerability in Cortex XSOAR allows the disclosure of incident data to users
CVE-2024-8015 9.1 0.05% 2 0 2024-10-09T15:32:28 In Progress Telerik Report Server versions prior to 2024 Q3 (10.2.24.924), a rem
CVE-2024-43047 7.8 0.06% 4 0 2024-10-09T14:39:06.540000 Memory corruption while maintaining memory maps of HLOS memory.
CVE-2024-43601 7.1 0.04% 1 0 2024-10-08T18:33:29 Visual Studio Code for Linux Remote Code Execution Vulnerability
CVE-2024-9379 6.5 0.76% 6 0 2024-10-08T18:33:24 SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows
CVE-2024-20659 7.1 0.05% 2 0 2024-10-08T18:33:24 Windows Hyper-V Security Feature Bypass Vulnerability
CVE-2024-9381 7.2 0.05% 7 0 2024-10-08T18:33:23 Path traversal in Ivanti CSA before version 5.0.2 allows a remote authenticated
CVE-2024-9441 9.8 0.04% 1 2 2024-10-04T13:50:43.727000 The Linear eMerge e3-Series through version 1.00-07 is vulnerable to an OS comma
CVE-2024-44193 8.4 0.04% 1 1 2024-10-03T21:32:08 A logic issue was addressed with improved restrictions. This issue is fixed in i
CVE-2024-38813 7.5 0.09% 4 0 2024-10-02T15:31:39 The vCenter Server contains a privilege escalation vulnerability. A malicious ac
CVE-2024-38812 9.8 0.09% 15 0 2024-10-02T15:30:37 The vCenter Server contains a heap-overflow vulnerability in the implementation
CVE-2024-44133 5.5 0.04% 11 0 2024-09-24T18:31:24 This issue was addressed by removing the vulnerable code. This issue is fixed in
CVE-2024-8260 6.1 0.04% 2 0 2024-09-20T22:06:12 A SMB force-authentication vulnerability exists in all versions of OPA for Windo
CVE-2024-7254 0 0.04% 3 0 2024-09-20T12:30:17.483000 Any project that parses untrusted Protocol Buffers data containing an arbitrary
CVE-2024-8698 7.7 0.90% 1 1 template 2024-09-19T21:34:31 A flaw exists in the SAML signature validation method within the Keycloak XMLSig
CVE-2024-8963 9.4 30.99% 2 0 2024-09-19T18:30:58 Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenti
CVE-2024-45409 10.0 16.41% 4 1 2024-09-16T15:29:27 Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature
CVE-2024-8529 10.0 0.09% 2 1 2024-09-12T09:31:27 The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL
CVE-2024-8190 7.2 15.12% 2 2 2024-09-10T21:31:40 An OS command injection vulnerability in Ivanti Cloud Services Appliance version
CVE-2024-43965 8.2 0.09% 2 1 2024-08-29T18:31:42 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2019-7256 9.8 97.25% 1 0 template 2024-08-13T19:20:23.200000 Linear eMerge E3-Series devices allow Command Injections.
CVE-2024-38178 7.5 1.32% 7 0 2024-08-13T18:31:21 Scripting Engine Memory Corruption Vulnerability
CVE-2024-21147 7.4 0.09% 1 0 2024-08-13T03:32:22 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente
CVE-2024-38200 7.5 0.56% 1 1 2024-08-12T15:30:50 Microsoft Office Spoofing Vulnerability
CVE-2024-5910 None 0.90% 1 0 2024-08-09T05:01:56 Missing authentication for a critical function in Palo Alto Networks Expedition
CVE-2024-6197 7.5 0.07% 1 0 2024-08-01T15:33:14 libcurl's ASN1 parser has this utf8asn1str() function used for parsing an ASN.1
CVE-2024-7135 6.5 0.10% 2 1 2024-07-31T12:31:48 The Tainacan plugin for WordPress is vulnerable to unauthorized access of data d
CVE-2024-38094 7.2 0.09% 2 0 2024-07-09T18:31:01 Microsoft SharePoint Remote Code Execution Vulnerability
CVE-2024-37383 6.1 0.04% 2 0 2024-07-03T18:44:17 Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate
CVE-2024-29824 9.6 36.33% 1 3 template 2024-07-03T18:43:59 An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5
CVE-2024-30052 4.7 0.06% 1 1 2024-07-02T14:20:55.230000 Visual Studio Remote Code Execution Vulnerability
CVE-2024-4577 9.8 96.32% 1 53 2024-06-21T21:35:02 In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, wh
CVE-2024-4367 None 0.04% 1 10 2024-06-10T20:18:19 ### Impact If pdf.js is used to load a malicious PDF, and PDF.js is configured w
CVE-2024-35219 8.3 0.04% 2 0 2024-05-28T15:47:59 ### Impact Attackers can exploit the vulnerability to read and delete files and
CVE-2020-1472 5.5 52.41% 1 1 2024-05-23T17:56:29.137000 An elevation of privilege vulnerability exists when an attacker establishes a vu
CVE-2024-29131 6.5 0.04% 1 0 2024-05-02T18:47:15 This Out-of-bounds Write vulnerability in Apache Commons Configuration affects A
CVE-2023-2868 9.4 7.88% 1 4 2024-04-04T05:46:09 A remote command injection vulnerability exists in the Barracuda Email Security
CVE-2023-7028 10.0 95.76% 1 14 template 2024-03-14T05:02:56 An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 pr
CVE-2024-23113 9.8 1.84% 10 5 2024-02-15T15:30:37 A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0
CVE-1999-0113 0 1.58% 2 0 2024-02-13T17:55:39.687000 Some implementations of rlogin allow root access if given a -froot parameter.
CVE-2022-24785 7.5 0.33% 1 0 2023-11-29T22:04:56 ### Impact This vulnerability impacts npm (server) users of moment.js, especiall
CVE-2022-31129 7.5 0.76% 1 0 2023-11-29T22:02:29 ### Impact * using string-to-date parsing in moment (more specifically rfc2822
CVE-2022-31197 7.1 0.12% 1 0 2023-10-30T13:06:31 ### Impact _What kind of vulnerability is it? Who is impacted?_ The PGJDBC impl
CVE-2022-41128 8.8 56.24% 1 0 2023-05-28T05:01:06 Windows Scripting Languages Remote Code Execution Vulnerability. This CVE ID is
CVE-2022-40684 9.8 97.37% 1 1 template 2023-03-27T18:30:24 An authentication bypass using an alternate path or channel [CWE-288] in Fortine
CVE-2017-11882 7.8 97.44% 1 34 2023-02-01T05:03:36 Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Micr
CVE-2020-1380 7.5 20.70% 1 0 2023-01-29T05:03:44 A remote code execution vulnerability exists in the way that the scripting engin
CVE-2022-26134 9.8 97.40% 2 75 template 2023-01-27T05:03:24 In affected versions of Confluence Server and Data Center, an OGNL injection vul
CVE-2017-5715 5.6 97.52% 2 20 2021-08-16T09:15:06.987000 Systems with microprocessors utilizing speculative execution and indirect branch
CVE-2024-9050 0 0.00% 2 0 N/A
CVE-2021-41277 0 95.15% 2 13 template N/A
CVE-2024-38819 0 0.00% 1 0 N/A
CVE-2024-28988 0 0.00% 1 0 N/A
CVE-2024-24919 0 94.03% 1 53 template N/A
CVE-2024-9631 0 0.00% 1 0 N/A
CVE-2024-9427 0 0.00% 1 0 N/A
CVE-2024-47176 0 0.06% 1 13 N/A

CVE-2024-9537
(9.8 CRITICAL)

EPSS: 0.10%

updated 2024-10-22T17:33:23.837000

16 posts

ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x.

RedPacketSecurity@mastodon.social at 2024-10-19T09:11:12.000Z ##

CVE Alert: CVE-2024-9537 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9537

##

RedPacketSecurity@mastodon.social at 2024-10-19T09:11:12.000Z ##

CVE Alert: CVE-2024-9537 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9537

##

RedPacketSecurity@mastodon.social at 2024-10-19T09:11:12.000Z ##

CVE Alert: CVE-2024-9537 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9537

##

RedPacketSecurity@mastodon.social at 2024-10-19T09:11:12.000Z ##

CVE Alert: CVE-2024-9537 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9537

##

AAKL at 2024-10-22T15:38:50.773Z ##

adds new entries to the KEV catalogue:

- ScienceLogic SL1 Unspecified Vulnerability CVE-2024-9537 cve.org/CVERecord?id=CVE-2024-

- Industrial Control Systems Advisory cisa.gov/news-events/alerts/20 @cisacyber

##

jos1264@social.skynetcloud.site at 2024-10-22T06:15:04.000Z ##

CVE-2024-9537: CISA Warns of Unpatched ScienceLogic SL1 Exploit in Active Use thecyberexpress.com/cve-2024-9 #CybersecurityandInfrastructureSecurityAgency #knownexploitedvulnerabilities #ScienceLogicSL1vulnerability #VulnerabilityManagement #TheCyberExpressNews #Vulnerabilities #ScienceLogicSL1 #TheCyberExpress #FirewallDaily #KEVCatalog #CyberNews #CISA

##

cisakevtracker@mastodon.social at 2024-10-21T15:00:58.000Z ##

CVE ID: CVE-2024-9537
Vendor: ScienceLogic
Product: SL1
Date Added: 2024-10-21
Vulnerability: ScienceLogic SL1 Unspecified Vulnerability
Notes: support.sciencelogic.com/s/art ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2024-10-21T15:00:38.505Z ##

has added one entry to the KEV catalogue:

- ScienceLogic SL1 Unspecified Vulnerability CVE-2024-9537 cve.org/CVERecord?id=CVE-2024- @cisacyber

##

GossiTheDog@cyberplace.social at 2024-10-19T17:41:19.000Z ##

Aside from having one of the worst vulnerability disclosure processes from any vendor, ScienceLogic also now has a CVE allocated by... CISA.

Maybe they can make legal threats to the USG this time... or hire some security people. cve.org/CVERecord?id=CVE-2024-

##

GossiTheDog@cyberplace.social at 2024-10-19T00:04:59.000Z ##

A CVE has been allocated for the ScienceLogic ‘third party application’ zero day that lead to the Rackspace breach. CVE-2024-9537

Patches have been made available finally.

The articles for it are all behind a paywall on ScienceLogic portal.

The vulnerability description is an “unspecified vulnerability”.

Friday night dump.

#Rackspace #threatintel #ScienceLogic

##

AAKL@infosec.exchange at 2024-10-22T15:38:50.000Z ##

#CISA adds new entries to the KEV catalogue:

- ScienceLogic SL1 Unspecified Vulnerability CVE-2024-9537 cve.org/CVERecord?id=CVE-2024-

- Industrial Control Systems Advisory cisa.gov/news-events/alerts/20 @cisacyber #cybersecurity #Infosec

##

jos1264@social.skynetcloud.site at 2024-10-22T06:15:04.000Z ##

CVE-2024-9537: CISA Warns of Unpatched ScienceLogic SL1 Exploit in Active Use thecyberexpress.com/cve-2024-9 #CybersecurityandInfrastructureSecurityAgency #knownexploitedvulnerabilities #ScienceLogicSL1vulnerability #VulnerabilityManagement #TheCyberExpressNews #Vulnerabilities #ScienceLogicSL1 #TheCyberExpress #FirewallDaily #KEVCatalog #CyberNews #CISA

##

cisakevtracker@mastodon.social at 2024-10-21T15:00:58.000Z ##

CVE ID: CVE-2024-9537
Vendor: ScienceLogic
Product: SL1
Date Added: 2024-10-21
Vulnerability: ScienceLogic SL1 Unspecified Vulnerability
Notes: support.sciencelogic.com/s/art ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2024-10-21T15:00:38.000Z ##

#CISA has added one entry to the KEV catalogue:

- ScienceLogic SL1 Unspecified Vulnerability CVE-2024-9537 cve.org/CVERecord?id=CVE-2024- @cisacyber #cybersecurity #Infosec

##

GossiTheDog@cyberplace.social at 2024-10-19T17:41:19.000Z ##

Aside from having one of the worst vulnerability disclosure processes from any vendor, ScienceLogic also now has a CVE allocated by... CISA.

Maybe they can make legal threats to the USG this time... or hire some security people. cve.org/CVERecord?id=CVE-2024-

##

GossiTheDog@cyberplace.social at 2024-10-19T00:04:59.000Z ##

A CVE has been allocated for the ScienceLogic ‘third party application’ zero day that lead to the Rackspace breach. CVE-2024-9537

Patches have been made available finally.

The articles for it are all behind a paywall on ScienceLogic portal.

The vulnerability description is an “unspecified vulnerability”.

Friday night dump.

#Rackspace #threatintel #ScienceLogic

##

CVE-2024-9674
(5.4 MEDIUM)

EPSS: 0.05%

updated 2024-10-22T14:02:50.473000

4 posts

The Debrandify · Remove or Replace WordPress Branding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever

CVE-2024-9425
(5.4 MEDIUM)

EPSS: 0.07%

updated 2024-10-22T13:55:04.537000

4 posts

The Advanced Category and Custom Taxonomy Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ad_tax_image shortcode in all versions up to, and including, 1.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary w

CVE-2024-8625
(7.2 HIGH)

EPSS: 0.04%

updated 2024-10-21T21:31:52

4 posts

The TS Poll WordPress plugin before 2.4.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks

CVE-2024-7994
(7.8 HIGH)

EPSS: 0.06%

updated 2024-10-21T18:35:55.397000

2 posts

A maliciously crafted RFA file, when parsed through Autodesk Revit, can force a Stack-Based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

CVE-2024-9593
(8.3 HIGH)

EPSS: 0.05%

updated 2024-10-21T17:10:22.857000

6 posts

The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. This allows unauthenticated attackers to execute code on the server. The invoked function's parameters cannot be specified.

1 repos

https://github.com/RandomRobbieBF/CVE-2024-9593

CVE-2024-8305
(6.5 MEDIUM)

EPSS: 0.04%

updated 2024-10-21T15:32:39

4 posts

prepareUnique index may cause secondaries to crash due to incorrect enforcement of index constraints on secondaries, where in extreme cases may cause multiple secondaries crashing leading to no primaries. This issue affects MongoDB Server v6.0 versions prior to 6.0.17, MongoDB Server v7.0 versions prior to 7.0.13 and MongoDB Server v7.3 versions prior to 7.3.4

CVE-2024-6519
(8.3 HIGH)

EPSS: 0.04%

updated 2024-10-21T15:32:39

4 posts

A use-after-free vulnerability was found in the QEMU LSI53C895A SCSI Host Bus Adapter emulation. This issue can lead to a crash or VM escape.

CVE-2024-9897
(6.4 MEDIUM)

EPSS: 0.07%

updated 2024-10-19T12:30:39

4 posts

The StreamWeasels Twitch Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's sw-twitch-embed shortcode in all versions up to, and including, 1.8.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scrip

CVE-2024-9889
(4.3 MEDIUM)

EPSS: 0.04%

updated 2024-10-19T09:30:53

4 posts

The ElementInvader Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.9 via the Page Loader widget. This makes it possible for authenticated attackers, with contributor-level access and above, to view private/draft/password protected posts, pages, and Elementor templates that they should not have access to.

CVE-2023-6243
(4.3 MEDIUM)

EPSS: 0.05%

updated 2024-10-19T09:30:48

4 posts

The EventON PRO - WordPress Virtual Event Calendar Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.6.8. This is due to missing or incorrect nonce validation on the admin_test_email function. This makes it possible for unauthenticated attackers to send test emails to arbitrary email addresses via a forged request granted they can trick

CVE-2024-9219
(6.1 MEDIUM)

EPSS: 0.05%

updated 2024-10-19T06:30:39

4 posts

The WordPress Social Share Buttons plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.19. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as c

CVE-2024-37404
(9.1 CRITICAL)

EPSS: 0.04%

updated 2024-10-19T00:32:04

2 posts

Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution.

screaminggoat@infosec.exchange at 2024-10-09T18:48:41.000Z ##

@cR0w did you see the AmberWolf blog? infosec.exchange/@screaminggoa

Ivanti sat on the Connect Secure vulnerability CVE-2024-37404 for 90 days, then silently patched it.

##

screaminggoat@infosec.exchange at 2024-10-09T16:28:06.000Z ##

AmberWolf: Ivanti Connect Secure - Authenticated RCE via OpenSSL CRLF Injection (CVE-2024-37404)
Reference: CVE-2024-37404 (9.1 critical, disclosed 08 October 2024 by Ivanti) Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution.

Never heard of AmberWolf before this, and they don't mess around: They are the vulnerability reporters and they drop a same-day proof of concept for CVE-2024-37404. In bird culture, that would normally be considered a dick move. In their defense though, look at the timeline: Ivanti sat on the vulnerability for over 90 days, and then admitted that they silently patched it in ICS 22.7R2.1 after AmberWolf threatened to publish vulnerability details back on 16 September 2024. They agreed on a coordinated disclosure date of October's Patch Tuesday (8th).

So Ivanti Connect Secure versions prior to 22.7R2.1 and 22.7R2.2, and Ivanti Policy Secure versions prior to 22.7R1.1, contain a "Carriage Return Line Feed" (CRLF) injection vulnerability which could be exploited by an authenticated administrator to execute arbitrary code with root privileges. It is fixed by updating to ICS version 22.7R2.1, 22.7R2.2, or Ivanti Policy Secure 22.7R1.1. Their proof of concept is a POST request containing a CRLF and OpenSSL payload resulting in a reverse shell running under the root user.

Hilariously, they also confirm Eclypsium's findings that the Ivanti Connect Secure appliance is based on the 11 year old Linux CentOS 6.4.

#ivanti #vulnerability #CVE_2024_37404 #cve #proofofconcept #vulnerabilityanalysis #crlf

##

CVE-2024-7316
(5.9 MEDIUM)

EPSS: 0.04%

updated 2024-10-18T12:52:33.507000

2 posts

Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric CNC Series allows a remote unauthenticated attacker to cause Denial of Service (DoS) condition on the product by sending specially crafted packets to TCP port 683, causing an emergency stop.

CVE-2024-7755
(8.2 HIGH)

EPSS: 0.04%

updated 2024-10-18T12:52:33.507000

4 posts

The EWON FLEXY 202 transmits credentials using a weak encoding method base64. An attacker who is present in the network can sniff the traffic and decode the credentials.

CVE-2024-40711
(9.8 CRITICAL)

EPSS: 96.76%

updated 2024-10-18T12:51:11.257000

22 posts

A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).

1 repos

#search_error

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

Critical Veeam Vulnerability CVE-2024-40711 Exploited by Ransomware Groups thecyberexpress.com/critical-v #remotecodeexecution #TheCyberExpressNews #Backup&Replication #Veeamvulnerability #Vulnerabilities #TheCyberExpress #FirewallDaily #Fogransomware #CVE202440711 #CyberNews #akira

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

Critical Veeam Vulnerability CVE-2024-40711 Exploited by Ransomware Groups thecyberexpress.com/critical-v #remotecodeexecution #TheCyberExpressNews #Backup&Replication #Veeamvulnerability #Vulnerabilities #TheCyberExpress #FirewallDaily #Fogransomware #CVE202440711 #CyberNews #akira

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

Critical Veeam Vulnerability CVE-2024-40711 Exploited by Ransomware Groups thecyberexpress.com/critical-v #remotecodeexecution #TheCyberExpressNews #Backup&Replication #Veeamvulnerability #Vulnerabilities #TheCyberExpress #FirewallDaily #Fogransomware #CVE202440711 #CyberNews #akira

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

Critical Veeam Vulnerability CVE-2024-40711 Exploited by Ransomware Groups thecyberexpress.com/critical-v #remotecodeexecution #TheCyberExpressNews #Backup&Replication #Veeamvulnerability #Vulnerabilities #TheCyberExpress #FirewallDaily #Fogransomware #CVE202440711 #CyberNews #akira

##

oversecurity@mastodon.social at 2024-10-18T14:40:04.000Z ##

CISA confirms Veeam vulnerability is being used in ransomware attacks

CISA added CVE-2024-40711 to its Known Exploited Vulnerabilities database and specified that the bug in Veeam software products is being used to...

🔗️ [Therecord] link.is.it/n7tqri

##

patchnow24x7 at 2024-10-18T04:38:38.297Z ##

Update: CISA has added CVE-2024-40711: Veeam Backup and Replication Deserialization Vulnerability to its 'Known Exploited Vulnerabilities' catalog.
Link: cisa.gov/known-exploited-vulne

##

jos1264@social.skynetcloud.site at 2024-10-17T19:55:02.000Z ##

Veeam Backup and Replication Deserialization Vulnerability (CVE-2024-40711) fortiguard.fortinet.com/threat

##

thepacketrat at 2024-10-17T19:20:42.841Z ##

Unpatched Veeam and VPNs leveraged in recent ransomware attacks.

Veeam CVE-2024-40711 combined with vulnerable VPNs and remote access gateways equals ransomware attacks against a wide variety of organizations with limited IT resources.

thepacketrat.com/2024/10/17/un

##

oversecurity@mastodon.social at 2024-10-18T14:40:04.000Z ##

CISA confirms Veeam vulnerability is being used in ransomware attacks

CISA added CVE-2024-40711 to its Known Exploited Vulnerabilities database and specified that the bug in Veeam software products is being used to...

🔗️ [Therecord] link.is.it/n7tqri

##

jos1264@social.skynetcloud.site at 2024-10-17T19:55:02.000Z ##

Veeam Backup and Replication Deserialization Vulnerability (CVE-2024-40711) fortiguard.fortinet.com/threat

##

thepacketrat@infosec.exchange at 2024-10-17T19:20:42.000Z ##

Unpatched Veeam and VPNs leveraged in recent ransomware attacks.

Veeam CVE-2024-40711 combined with vulnerable VPNs and remote access gateways equals ransomware attacks against a wide variety of organizations with limited IT resources.

thepacketrat.com/2024/10/17/un

##

AAKL@infosec.exchange at 2024-10-17T15:32:39.000Z ##

#CISA has updated the KEV catalogue:

- CVE-2024-40711: #Veeam Backup and Replication Deserialization Vulnerability cve.org/CVERecord?id=CVE-2024-

- Seven Industrial Control Systems Advisories cisa.gov/news-events/alerts/20 @cisacyber #cybersecurity #infosec

##

cisakevtracker@mastodon.social at 2024-10-17T15:00:39.000Z ##

CVE ID: CVE-2024-40711
Vendor: Veeam
Product: Backup & Replication
Date Added: 2024-10-17
Vulnerability: Veeam Backup and Replication Deserialization Vulnerability
Notes: veeam.com/kb4649 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

rhudaur@flipboard.com at 2024-10-17T14:37:18.000Z ##

Critical Veeam Vulnerability CVE-2024-40711 Exploited by Ransomware Groups
thecyberexpress.com/critical-v

Posted into Cybersecurity Today @cybersecurity-today-rhudaur

##

screaminggoat@infosec.exchange at 2024-10-17T14:35:06.000Z ##

CISA: CISA Adds One Known Exploited Vulnerability to Catalog
Hot off the press! CVE-2024-40711 (9.8 critical, disclosed 04 September 2024 by Veeam, has Proof of Concept and vulnerability details) Veeam Backup and Replication Deserialization Vulnerability

On 10 October 2024, @SophosXOps warned that Akira and Fog ransomware attacks were leveraging CVE-2024-40711 .

cc: @neurovagrant @ntkramer @iagox86

#CISA #KEV #CISAKEV #CVE_2024_40711 #veeam #vulnerability #cve #eitw #activeexploitation #ransomware #threatintel #infosec #cybersecurity #cyberthreatintelligence #CTI

##

oversecurity@mastodon.social at 2024-10-16T15:50:04.000Z ##

Critical Vulnerability in Veeam Products Exploited by Ransomware Gangs

CVE-2024-40711 in Veeam Backup & Replication, with a CVSS score of 9.8, is being exploited for ransomware attacks. Veeam issued a patch in version...

🔗️ [Cyble] link.is.it/5zqsxh

##

jbhall56@infosec.exchange at 2024-10-14T11:51:39.000Z ##

Cybersecurity vendor Sophos said it has been tracking a series of attacks in the past month leveraging compromised VPN credentials and CVE-2024-40711 to create a local account and deploy the ransomware. thehackernews.com/2024/10/crit

##

benzogaga33@mamot.fr at 2024-10-11T09:40:02.000Z ##

Cette faille critique dans Veeam Backup & Replication est exploitée par les ransomwares Akira et Fog ! it-connect.fr/faille-critique- #ActuCybersécurité

##

screaminggoat@infosec.exchange at 2024-10-10T19:47:23.000Z ##

@codewhitesec @frycos I'm sure you've already seen @SinSinology's assessment of CVE-2024-40711, particularly where he noted both the deserialization of untrusted data, but also an improper authentication bug that Veeam silently patched? labs.watchtowr.com/veeam-backu

##

screaminggoat@infosec.exchange at 2024-10-10T19:15:20.000Z ##

@SophosXOps warns that ransomware actors are leveraging compromised credentials (VPN gateways without multifactor authentication enabled) and a Veeam vulnerability CVE-2024-40711 to create an account and attempt to deploy ransomware. infosec.exchange/@SophosXOps/1 Indicators in 4 cases overlap with earlier Akira and Fog ransomware attacks.

Reference: CVE-2024-40711 (9.8 critical, disclosed 04 September 2024 by Veeam, has Proof of Concept and vulnerability details) Veeam Backup & Replication Remote Code Execution Vulnerability (deserialization of untrusted data)

#fogransomware #akira #ransomware #CVE_2024_40711 #veeam #vulnerability #eitw #activeexploitation #threatintel #infosec #cybersecurity #cyberthreatintelligence #cti

##

screaminggoat@infosec.exchange at 2024-10-10T18:46:36.000Z ##

Hey @frycos @codewhitesec doesn't CVE-2024-40711 look familiar to you? Strange coincidence that I spot it in your public vulnerabilities list, and @SophosXOps warns of its exploitation minutes later.

##

SophosXOps@infosec.exchange at 2024-10-10T18:34:29.000Z ##

Sophos X-Ops MDR and Incident Response are tracking a series of attacks in the past month leveraging compromised credentials and a known vulnerability in Veeam (CVE-2024-40711) to create an account and attempt to deploy ransomware.

In one case, attackers dropped Fog ransomware. Another attack in the same timeframe attempted to deploy Akira ransomware. Indicators in all 4 cases overlap with earlier Akira and Fog ransomware attacks.

In each of the cases, attackers initially accessed targets using compromised VPN gateways without multifactor authentication enabled. Some of these VPNs were running unsupported software versions.

Each time, the attackers exploited VEEAM on the URI /trigger on port 8000, triggering the Veeam.Backup.MountService.exe to spawn net.exe. The exploit creates a local account, "point," adding it to the local Administrators and Remote Desktop Users groups.

In the Fog ransomware incident, the attacker deployed it to an unprotected Hyper-V server, then used the utility rclone to exfiltrate data. Sophos endpoint protection and MDR prevented ransomware deployments in the other cases.

These cases underline the importance of patching known vulnerabilities, updating/replacing out-of-support VPNs, and using multifactor authentication to control remote access. Sophos X-Ops continues to track this threat behavior.

##

CVE-2024-4739
(5.3 MEDIUM)

EPSS: 0.04%

updated 2024-10-18T09:31:27

4 posts

The lack of access restriction to a resource from unauthorized users makes MXsecurity software versions v1.1.0 and prior vulnerable. By acquiring a valid authenticator, an attacker can pose as an authorized user and successfully access the resource.

CVE-2024-4740
(5.3 MEDIUM)

EPSS: 0.05%

updated 2024-10-18T09:31:27

4 posts

MXsecurity software versions v1.1.0 and prior are vulnerable because of the use of hard-coded credentials. This vulnerability could allow an attacker to tamper with sensitive data.

CVE-2024-9594
(6.3 MEDIUM)

EPSS: 0.04%

updated 2024-10-17T20:28:43

6 posts

A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build process. Kubernetes clusters are only affected if their nodes use VM images crea

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-9594 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9594

##

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-9594 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9594

##

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-9594 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9594

##

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-9594 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9594

##

patchnow24x7@infosec.exchange at 2024-10-16T08:34:03.000Z ##

CVE-2024-9486 :: CVSS Score 9.8
Kubernetes Image Builder vulnerability may allow root level of access to Virtual Machines.. #PatchNOW

Advisory:
discuss.kubernetes.io/t/securi

github.com/kubernetes/kubernet

#Kubernetes
#Linux
#ComputerSecurity
#hacked
#Cyberattack
#infosec
#informationsecurity
#CyberSecurityAwareness
#DataBreach
#cybersecurity

##

ChrisShort@hachyderm.io at 2024-10-15T12:04:08.000Z ##

CVE-2024-9594 #SuggestedRead #devopsish github.com/kubernetes/kubernet

##

CVE-2024-9486
(9.8 CRITICAL)

EPSS: 0.04%

updated 2024-10-17T20:28:18

6 posts

A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process. Virtual machine images built using the Proxmox provider do not disable these default credentials, and nodes using the resulting images may be accessible via these default credentials. The credentials can be used to gain root access. Kubernetes cl

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-9486 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9486

##

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-9486 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9486

##

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-9486 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9486

##

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-9486 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9486

##

patchnow24x7@infosec.exchange at 2024-10-16T08:34:03.000Z ##

CVE-2024-9486 :: CVSS Score 9.8
Kubernetes Image Builder vulnerability may allow root level of access to Virtual Machines.. #PatchNOW

Advisory:
discuss.kubernetes.io/t/securi

github.com/kubernetes/kubernet

#Kubernetes
#Linux
#ComputerSecurity
#hacked
#Cyberattack
#infosec
#informationsecurity
#CyberSecurityAwareness
#DataBreach
#cybersecurity

##

ChrisShort@hachyderm.io at 2024-10-15T16:21:08.000Z ##

CVE-2024-9486 #SuggestedRead #devopsish github.com/kubernetes/kubernet

##

CVE-2024-45731
(8.1 HIGH)

EPSS: 0.05%

updated 2024-10-17T15:32:17

7 posts

In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive.

jos1264@social.skynetcloud.site at 2024-10-22T12:45:02.000Z ##

Splunk’s Recent Security Advisory: Addressing Vulnerabilities in Splunk Enterprise thecyberexpress.com/splunk-vul #vulnerabilitiesinSplunk #SplunkVulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202445731 #CyberNews

##

jos1264@social.skynetcloud.site at 2024-10-22T12:45:02.000Z ##

Splunk’s Recent Security Advisory: Addressing Vulnerabilities in Splunk Enterprise thecyberexpress.com/splunk-vul #vulnerabilitiesinSplunk #SplunkVulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202445731 #CyberNews

##

jos1264@social.skynetcloud.site at 2024-10-22T12:45:02.000Z ##

Splunk’s Recent Security Advisory: Addressing Vulnerabilities in Splunk Enterprise thecyberexpress.com/splunk-vul #vulnerabilitiesinSplunk #SplunkVulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202445731 #CyberNews

##

jos1264@social.skynetcloud.site at 2024-10-22T12:45:02.000Z ##

Splunk’s Recent Security Advisory: Addressing Vulnerabilities in Splunk Enterprise thecyberexpress.com/splunk-vul #vulnerabilitiesinSplunk #SplunkVulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202445731 #CyberNews

##

RedPacketSecurity@mastodon.social at 2024-10-15T14:35:18.000Z ##

CVE Alert: CVE-2024-45731 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_45731

##

RedPacketSecurity@mastodon.social at 2024-10-15T14:35:18.000Z ##

CVE Alert: CVE-2024-45731 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_45731

##

screaminggoat@infosec.exchange at 2024-10-14T17:09:02.000Z ##

Splunk Quarterly Update: Oh lord I forgot that Splunk does this.

  • SVD-2024-1001 CVE-2024-45731 (8.0 high) Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
  • SVD-2024-1002 CVE-2024-45732 (7.1 high) Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app
  • SVD-2024-1003 CVE-2024-45733 (8.8 high) Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
  • SVD-2024-1004 CVE-2024-45734 (4.3 medium) Low Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
  • SVD-2024-1005 CVE-2024-45735 (4.3 medium) Improper Access Control for low-privileged user in Splunk Secure Gateway App
  • SVD-2024-1006 CVE-2024-45736 (6.5 medium) Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
  • SVD-2024-1007 CVE-2024-45737 (4.3 medium) Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)
  • SVD-2024-1008 CVE-2024-45738 (4.9 medium) Sensitive information disclosure in REST_Calls logging channel
  • SVD-2024-1009 CVE-2024-45739 (4.9 medium) Sensitive information disclosure in AdminManager logging channel
  • SVD-2024-1010 CVE-2024-45740 (5.4 medium) Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise
  • SVD-2024-1011 CVE-2024-45741 (5.4 medium) Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise
  • SVD-2024-1012 (Muliple CVEs) Third-Party Package Updates in Splunk Enterprise - October 2024

No mention of exploitation, I haven't checked the third party package CVEs individually though.

#splunk #vulnerability #cve

##

CVE-2024-45738
(4.9 MEDIUM)

EPSS: 0.05%

updated 2024-10-17T15:32:16

1 posts

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes sensitive HTTP parameters to the `_internal` index. This exposure could happen if you configure the Splunk Enterprise `REST_Calls` log channel at the DEBUG logging level.

screaminggoat@infosec.exchange at 2024-10-14T17:09:02.000Z ##

Splunk Quarterly Update: Oh lord I forgot that Splunk does this.

  • SVD-2024-1001 CVE-2024-45731 (8.0 high) Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
  • SVD-2024-1002 CVE-2024-45732 (7.1 high) Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app
  • SVD-2024-1003 CVE-2024-45733 (8.8 high) Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
  • SVD-2024-1004 CVE-2024-45734 (4.3 medium) Low Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
  • SVD-2024-1005 CVE-2024-45735 (4.3 medium) Improper Access Control for low-privileged user in Splunk Secure Gateway App
  • SVD-2024-1006 CVE-2024-45736 (6.5 medium) Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
  • SVD-2024-1007 CVE-2024-45737 (4.3 medium) Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)
  • SVD-2024-1008 CVE-2024-45738 (4.9 medium) Sensitive information disclosure in REST_Calls logging channel
  • SVD-2024-1009 CVE-2024-45739 (4.9 medium) Sensitive information disclosure in AdminManager logging channel
  • SVD-2024-1010 CVE-2024-45740 (5.4 medium) Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise
  • SVD-2024-1011 CVE-2024-45741 (5.4 medium) Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise
  • SVD-2024-1012 (Muliple CVEs) Third-Party Package Updates in Splunk Enterprise - October 2024

No mention of exploitation, I haven't checked the third party package CVEs individually though.

#splunk #vulnerability #cve

##

CVE-2024-45739
(4.9 MEDIUM)

EPSS: 0.05%

updated 2024-10-17T15:32:16

1 posts

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level.

screaminggoat@infosec.exchange at 2024-10-14T17:09:02.000Z ##

Splunk Quarterly Update: Oh lord I forgot that Splunk does this.

  • SVD-2024-1001 CVE-2024-45731 (8.0 high) Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
  • SVD-2024-1002 CVE-2024-45732 (7.1 high) Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app
  • SVD-2024-1003 CVE-2024-45733 (8.8 high) Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
  • SVD-2024-1004 CVE-2024-45734 (4.3 medium) Low Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
  • SVD-2024-1005 CVE-2024-45735 (4.3 medium) Improper Access Control for low-privileged user in Splunk Secure Gateway App
  • SVD-2024-1006 CVE-2024-45736 (6.5 medium) Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
  • SVD-2024-1007 CVE-2024-45737 (4.3 medium) Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)
  • SVD-2024-1008 CVE-2024-45738 (4.9 medium) Sensitive information disclosure in REST_Calls logging channel
  • SVD-2024-1009 CVE-2024-45739 (4.9 medium) Sensitive information disclosure in AdminManager logging channel
  • SVD-2024-1010 CVE-2024-45740 (5.4 medium) Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise
  • SVD-2024-1011 CVE-2024-45741 (5.4 medium) Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise
  • SVD-2024-1012 (Muliple CVEs) Third-Party Package Updates in Splunk Enterprise - October 2024

No mention of exploitation, I haven't checked the third party package CVEs individually though.

#splunk #vulnerability #cve

##

CVE-2024-21250
(8.1 HIGH)

EPSS: 0.05%

updated 2024-10-17T15:31:09

2 posts

Vulnerability in the Oracle Process Manufacturing Product Development product of Oracle E-Business Suite (component: Quality Manager Specification). Supported versions that are affected are 12.2.13-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Process Manufacturing Product Development. Successful attacks of this vulnera

CVE-2024-21216
(9.8 CRITICAL)

EPSS: 0.15%

updated 2024-10-17T15:31:09

1 posts

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVS

CVE-2024-45713
(5.1 MEDIUM)

EPSS: 0.04%

updated 2024-10-17T12:31:10

1 posts

SolarWinds Kiwi CatTools is susceptible to a sensitive data disclosure vulnerability when a non-default setting has been enabled for troubleshooting purposes.

screaminggoat@infosec.exchange at 2024-10-16T18:55:16.000Z ##

SolarWinds multiple security advisories: SolarWinds Security Vulnerabilities

  • CVE-2024-28988 (9.8 critical) SolarWinds Web Help Desk Java Deserialization Remote Code Execution Vulnerability
  • CVE-2024-45713 (5.1 medium) SolarWinds Kiwi CatTools Sensitive Information Disclosure Vulnerability
  • CVE-2024-45714 (5.7 medium) Serv-U Stored XSS Vulnerability
  • CVE-2024-45711 (7.5 high) Serv-U FTP Service Directory Traversal Remote Code Execution Vulnerability
  • CVE-2024-45710 (7.8 high) SolarWinds Platform Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
  • CVE-2024-45715 (7.1 high) SolarWinds Platform Edit Function Cross-Site Scripting Vulnerability

No mention of exploitation.

#Solarwinds #vulnerability #cve

##

CVE-2024-9466
(6.5 MEDIUM)

EPSS: 0.05%

updated 2024-10-17T06:31:37

2 posts

A cleartext storage of sensitive information vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to reveal firewall usernames, passwords, and API keys generated using those credentials.

1 repos

https://github.com/holypryx/CVE-2024-9466

screaminggoat@infosec.exchange at 2024-10-09T16:55:59.000Z ##

Palo Alto Networks security advisory: PAN-SA-2024-0010 Expedition: Multiple Vulnerabilities Lead to Firewall Admin Account Takeover
See parent toot above for Horizon3 vulnerability details.

  • CVE-2024-9463 (9.9 critical) Palo Alto Networks Expedition OS command injection vulnerability
  • CVE-2024-9464 (9.3 critical) Palo Alto Networks Expedition OS command injection vulnerability
  • CVE-2024-9465 (9.2 critical) Palo Alto Networks Expedition SQL injection vulnerability
  • CVE-2024-9466 (8.2 high) Palo Alto Networks Expedition cleartext storage of sensitive information vulnerability
  • CVE-2024-9467 (7.0 high) Palo Alto Networks Expedition reflected XSS vulnerability

Palo Alto Networks is not aware of any malicious exploitation of these issues.

#paloaltonetworks #expedition #vulnerability #CVE

##

screaminggoat@infosec.exchange at 2024-10-09T16:51:28.000Z ##

Horizon3: Palo Alto Expedition: From N-Day to Full Compromise
References:

Daaaaaaaamn @hacks_zach, Zach Hanley at it again with the Palo Alto Networks vulnerabilities. In trying to find CVE2-2024-5910 in Expedition (a configuration migration tool from a supported vendor to Palo Alto Networks PAN-OS), he found CVE-2024-9464, CVE-2024-9465 and CVE-2024-9466. It appears that CVE-2024-9465 (unauth SQL injection) leads to leaking credentials via "users" and "devices" tables which contain password hashes and device API keys. This is the CVE-2024-9466.

#paloaltonetworks #expedition #vulnerability #CVE #vulnerabilityanalysis

##

CVE-2024-9465
(9.1 CRITICAL)

EPSS: 73.86%

updated 2024-10-17T06:30:32

3 posts

An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.

Nuclei template

2 repos

https://github.com/mustafaakalin/CVE-2024-9465

https://github.com/horizon3ai/CVE-2024-9465

hrbrmstr@mastodon.social at 2024-10-13T20:09:33.000Z ##

@Viss @mttaggart dinna worry, lads. Palo Alto’s less-than-one-year-old Precision AI™ will keep their customers safe from this past week's SQL injection (a 20+ year old weakness category) vulnerability (CVE-2024-9465) in their own widely-used products. 100%. Guaranteed¹.

¹THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.

##

screaminggoat@infosec.exchange at 2024-10-09T16:55:59.000Z ##

Palo Alto Networks security advisory: PAN-SA-2024-0010 Expedition: Multiple Vulnerabilities Lead to Firewall Admin Account Takeover
See parent toot above for Horizon3 vulnerability details.

  • CVE-2024-9463 (9.9 critical) Palo Alto Networks Expedition OS command injection vulnerability
  • CVE-2024-9464 (9.3 critical) Palo Alto Networks Expedition OS command injection vulnerability
  • CVE-2024-9465 (9.2 critical) Palo Alto Networks Expedition SQL injection vulnerability
  • CVE-2024-9466 (8.2 high) Palo Alto Networks Expedition cleartext storage of sensitive information vulnerability
  • CVE-2024-9467 (7.0 high) Palo Alto Networks Expedition reflected XSS vulnerability

Palo Alto Networks is not aware of any malicious exploitation of these issues.

#paloaltonetworks #expedition #vulnerability #CVE

##

screaminggoat@infosec.exchange at 2024-10-09T16:51:28.000Z ##

Horizon3: Palo Alto Expedition: From N-Day to Full Compromise
References:

Daaaaaaaamn @hacks_zach, Zach Hanley at it again with the Palo Alto Networks vulnerabilities. In trying to find CVE2-2024-5910 in Expedition (a configuration migration tool from a supported vendor to Palo Alto Networks PAN-OS), he found CVE-2024-9464, CVE-2024-9465 and CVE-2024-9466. It appears that CVE-2024-9465 (unauth SQL injection) leads to leaking credentials via "users" and "devices" tables which contain password hashes and device API keys. This is the CVE-2024-9466.

#paloaltonetworks #expedition #vulnerability #CVE #vulnerabilityanalysis

##

CVE-2024-9473
(7.8 HIGH)

EPSS: 0.04%

updated 2024-10-17T06:30:32

1 posts

A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect.

screaminggoat@infosec.exchange at 2024-10-09T17:02:39.000Z ##

Happy #PatchTuesday on a Wednesday from Palo Alto Networks (includes a zero-day)

  • CVE-2024-9469 (CVSSv4: 5.7 medium) Cortex XDR Agent: Local Windows User Can Disable the Agent
  • CVE-2024-9471 (CVSSv4: 5.1 medium) PAN-OS: Privilege Escalation (PE) Vulnerability in XML API
  • CVE-2024-9468 (CVSSv4: 8.2 high) PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet
  • PAN-SA-2024-0010 Expedition: Multiple Vulnerabilities Lead to Firewall Admin Account Takeover
  • CVE-2024-9473 (CVSSv4: 5.2 medium) GlobalProtect App: Local Privilege Escalation (PE) Vulnerability
    • Palo Alto Networks is not aware of any malicious exploitation of this issue. However, a proof of concept for this issue is publicly available.
  • PAN-SA-2024-0011 Chromium: Monthly Vulnerability Updates
  • CVE-2024-9470 (CVSSv4: 5.3 medium) Cortex XSOAR: Information Disclosure Vulnerability

Palo Alto Networks is not aware of any malicious exploitation of these issues.

#paloaltonetworks #expedition #vulnerability #CVE

##

CVE-2024-9464
(6.5 MEDIUM)

EPSS: 0.05%

updated 2024-10-17T06:30:32

2 posts

An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.

1 repos

https://github.com/horizon3ai/CVE-2024-9464

screaminggoat@infosec.exchange at 2024-10-09T16:55:59.000Z ##

Palo Alto Networks security advisory: PAN-SA-2024-0010 Expedition: Multiple Vulnerabilities Lead to Firewall Admin Account Takeover
See parent toot above for Horizon3 vulnerability details.

  • CVE-2024-9463 (9.9 critical) Palo Alto Networks Expedition OS command injection vulnerability
  • CVE-2024-9464 (9.3 critical) Palo Alto Networks Expedition OS command injection vulnerability
  • CVE-2024-9465 (9.2 critical) Palo Alto Networks Expedition SQL injection vulnerability
  • CVE-2024-9466 (8.2 high) Palo Alto Networks Expedition cleartext storage of sensitive information vulnerability
  • CVE-2024-9467 (7.0 high) Palo Alto Networks Expedition reflected XSS vulnerability

Palo Alto Networks is not aware of any malicious exploitation of these issues.

#paloaltonetworks #expedition #vulnerability #CVE

##

screaminggoat@infosec.exchange at 2024-10-09T16:51:28.000Z ##

Horizon3: Palo Alto Expedition: From N-Day to Full Compromise
References:

Daaaaaaaamn @hacks_zach, Zach Hanley at it again with the Palo Alto Networks vulnerabilities. In trying to find CVE2-2024-5910 in Expedition (a configuration migration tool from a supported vendor to Palo Alto Networks PAN-OS), he found CVE-2024-9464, CVE-2024-9465 and CVE-2024-9466. It appears that CVE-2024-9465 (unauth SQL injection) leads to leaking credentials via "users" and "devices" tables which contain password hashes and device API keys. This is the CVE-2024-9466.

#paloaltonetworks #expedition #vulnerability #CVE #vulnerabilityanalysis

##

CVE-2024-7993
(7.8 HIGH)

EPSS: 0.05%

updated 2024-10-17T00:32:47

2 posts

A maliciously crafted PDF file, when parsed through Autodesk Revit, can force an Out-of-Bounds Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.

CVE-2024-43532
(8.8 HIGH)

EPSS: 0.05%

updated 2024-10-16T21:51:34.370000

2 posts

Remote Registry Service Elevation of Privilege Vulnerability

CVE-2024-10004
(9.1 CRITICAL)

EPSS: 0.04%

updated 2024-10-16T21:32:16

2 posts

Opening an external link to an HTTP website when Firefox iOS was previously closed and had an HTTPS tab open could in some cases result in the padlock icon showing an HTTPS indicator incorrectly This vulnerability affects Firefox for iOS < 131.2.

ErikvanStraten@infosec.exchange at 2024-10-16T10:35:00.000Z ##

A Firefox for iOS/iPadOS vulnerability that I reported months ago (infosec.exchange/@ErikvanStrat) has finally been fixed in v131.2.

A thank you to Mozilla for fixing it; CVE-2024-10004 (mozilla.org/en-US/security/adv) was assigned to this issue.

The vulnerability was that, under specific circumstances, Firefox would show a padlock without strikethrough for an http connection (see the images below).

To update Firefox for iOS/iPadOS, open apps.apple.com/app/firefox-pri; then double check that the Apple App Store app has opened, and that it is really the Firefox browser you're looking at (do not simply trust anyone, including me, who tells you to click on a link). Then tap the update button.

The update may also happen automatically, but that may take time.

@screaminggoat @mozilla
#Firefox #iOSFirefox #CVE_2024_10004 #Vulnerability #Phishing

##

screaminggoat@infosec.exchange at 2024-10-15T23:59:36.000Z ##

Mozilla security advisory: 2024-54 Security Vulnerabilities fixed in Firefox for iOS 131.2
Nothing crazy, just one vulnerability: CVE-2024-10004 (moderate? I guess they mean medium) Opening external link to HTTP website could show an HTTPS padlock icon incorrectly

#mozilla #firefox #ios #vulnerability #CVE

##

CVE-2024-20461
(6.0 MEDIUM)

EPSS: 0.04%

updated 2024-10-16T18:31:58

3 posts

A vulnerability in the CLI&nbsp;of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, local attacker with high privileges to execute arbitrary commands as the root user. This vulnerability exists because CLI input is not properly sanitized. An attacker could exploit this vulnerability by sending malicious characters to the CLI. A successful exploit could allow th

RedPacketSecurity@mastodon.social at 2024-10-17T09:11:38.000Z ##

CVE Alert: CVE-2024-20461 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20461

##

RedPacketSecurity@mastodon.social at 2024-10-17T09:11:38.000Z ##

CVE Alert: CVE-2024-20461 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20461

##

screaminggoat@infosec.exchange at 2024-10-16T17:15:44.000Z ##

Cisco multiple security advisories:

  • Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities
    • CVE-2024-20420 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Privilege Escalation Vulnerability
    • CVE-2024-20421 (7.1 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Cross-Site Request Forgery Vulnerability
    • CVE-2024-20458 (8.2 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Authentication Vulnerability
    • CVE-2024-20459 (6.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Command Injection Vulnerability
    • CVE-2024-20460 (6.1 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Reflected Cross-Site Scripting Vulnerability
    • CVE-2024-20461 (6.0 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection Vulnerability
    • CVE-2024-20462 (5.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Information Disclosure Vulnerability
    • CVE-2024-20463 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection and Denial of Service Vulnerability
  • CVE-2024-20280 (6.3 medium) Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability
  • CVE-2024-20512 (6.1 medium) Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

#cisco #ata #ciscoucs #vulnerability #cve

##

CVE-2024-45071
(5.5 MEDIUM)

EPSS: 0.04%

updated 2024-10-16T18:31:58

2 posts

IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

CVE-2024-45072
(5.5 MEDIUM)

EPSS: 0.05%

updated 2024-10-16T18:31:58

2 posts

IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A privileged user could exploit this vulnerability to expose sensitive information or consume memory resources.

CVE-2024-20463
(5.4 MEDIUM)

EPSS: 0.04%

updated 2024-10-16T18:31:58

3 posts

A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to modify the configuration or reboot an affected device. This vulnerability is due to the HTTP server allowing state changes in GET requests. An attacker could exploit this vulnerability by sending a malicious request to the web-based man

RedPacketSecurity@mastodon.social at 2024-10-17T09:11:38.000Z ##

CVE Alert: CVE-2024-20463 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20463

##

RedPacketSecurity@mastodon.social at 2024-10-17T09:11:38.000Z ##

CVE Alert: CVE-2024-20463 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20463

##

screaminggoat@infosec.exchange at 2024-10-16T17:15:44.000Z ##

Cisco multiple security advisories:

  • Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities
    • CVE-2024-20420 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Privilege Escalation Vulnerability
    • CVE-2024-20421 (7.1 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Cross-Site Request Forgery Vulnerability
    • CVE-2024-20458 (8.2 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Authentication Vulnerability
    • CVE-2024-20459 (6.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Command Injection Vulnerability
    • CVE-2024-20460 (6.1 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Reflected Cross-Site Scripting Vulnerability
    • CVE-2024-20461 (6.0 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection Vulnerability
    • CVE-2024-20462 (5.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Information Disclosure Vulnerability
    • CVE-2024-20463 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection and Denial of Service Vulnerability
  • CVE-2024-20280 (6.3 medium) Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability
  • CVE-2024-20512 (6.1 medium) Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

#cisco #ata #ciscoucs #vulnerability #cve

##

CVE-2024-38814
(8.8 HIGH)

EPSS: 0.05%

updated 2024-10-16T18:31:58

5 posts

An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A malicious authenticated user with non-administrator privileges may be able to enter specially crafted SQL queries and perform unauthorized remote code execution on the HCX manager.  Updates are available to remediate this vulnerability in affected VMware products.

RedPacketSecurity@mastodon.social at 2024-10-17T09:11:38.000Z ##

CVE Alert: CVE-2024-38814 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_38814

##

RedPacketSecurity@mastodon.social at 2024-10-17T09:11:38.000Z ##

CVE Alert: CVE-2024-38814 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_38814

##

patchnow24x7 at 2024-10-18T09:46:29.180Z ##

CVE-2024-38814: SQL Injection vulnerability in VMWare HCX

Vulnerability Details: patchnow24x7.com/blog-1/f/cve-











##

jos1264@social.skynetcloud.site at 2024-10-17T16:40:03.000Z ##

VMware fixes high-severity SQL injection flaw CVE-2024-38814 in HCX – Source: securityaffairs.com ciso2ciso.com/vmware-fixes-hig #rssfeedpostgeneratorecho #informationsecuritynews #ITInformationSecurity #SecurityAffairscom #CyberSecurityNews #PierluigiPaganini #SecurityAffairs #SecurityAffairs #BreakingNews #SecurityNews #hackingnews #VMwareHCX #Security #hacking

##

screaminggoat@infosec.exchange at 2024-10-16T19:38:05.000Z ##

VMware multiple security advisories:

  • VMSA-2024-0020 09 October 2024:
    • CVE-2024-38818 (6.7 medium) VMware NSX local privilege escalation vulnerabilit
    • CVE-2024-38817 (6.7 medium) VMware NSX command injection vulnerability
    • CVE-2024-38815 (4.3 medium) VMware NSX content spoofing vulnerability
  • VMSA-2024-0021 16 October 2024: CVE-2024-38814 (8.8 high) Authenticated SQL injection in VMware HCX

No mention of exploitation.

#VMware #nsx #hcx #vulnerability #cve

##

CVE-2024-20512
(6.1 MEDIUM)

EPSS: 0.04%

updated 2024-10-16T18:31:58

3 posts

A vulnerability in the web-based management interface of Cisco Unified Contact Center Management Portal (Unified CCMP) could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit

RedPacketSecurity@mastodon.social at 2024-10-17T09:12:38.000Z ##

CVE Alert: CVE-2024-20512 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20512

##

RedPacketSecurity@mastodon.social at 2024-10-17T09:12:38.000Z ##

CVE Alert: CVE-2024-20512 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20512

##

screaminggoat@infosec.exchange at 2024-10-16T17:15:44.000Z ##

Cisco multiple security advisories:

  • Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities
    • CVE-2024-20420 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Privilege Escalation Vulnerability
    • CVE-2024-20421 (7.1 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Cross-Site Request Forgery Vulnerability
    • CVE-2024-20458 (8.2 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Authentication Vulnerability
    • CVE-2024-20459 (6.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Command Injection Vulnerability
    • CVE-2024-20460 (6.1 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Reflected Cross-Site Scripting Vulnerability
    • CVE-2024-20461 (6.0 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection Vulnerability
    • CVE-2024-20462 (5.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Information Disclosure Vulnerability
    • CVE-2024-20463 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection and Denial of Service Vulnerability
  • CVE-2024-20280 (6.3 medium) Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability
  • CVE-2024-20512 (6.1 medium) Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

#cisco #ata #ciscoucs #vulnerability #cve

##

CVE-2024-20462
(5.5 MEDIUM)

EPSS: 0.04%

updated 2024-10-16T18:31:53

3 posts

A vulnerability in the web-based management interface of Cisco ATA 190 Series Multiplatform Analog Telephone Adapter firmware could allow an authenticated, local attacker with low privileges to view passwords on an affected device. This vulnerability is due to incorrect sanitization of HTML content from an affected device. A successful exploit could allow the attacker to view passwords that belon

RedPacketSecurity@mastodon.social at 2024-10-17T09:11:38.000Z ##

CVE Alert: CVE-2024-20462 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20462

##

RedPacketSecurity@mastodon.social at 2024-10-17T09:11:38.000Z ##

CVE Alert: CVE-2024-20462 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20462

##

screaminggoat@infosec.exchange at 2024-10-16T17:15:44.000Z ##

Cisco multiple security advisories:

  • Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities
    • CVE-2024-20420 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Privilege Escalation Vulnerability
    • CVE-2024-20421 (7.1 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Cross-Site Request Forgery Vulnerability
    • CVE-2024-20458 (8.2 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Authentication Vulnerability
    • CVE-2024-20459 (6.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Command Injection Vulnerability
    • CVE-2024-20460 (6.1 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Reflected Cross-Site Scripting Vulnerability
    • CVE-2024-20461 (6.0 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection Vulnerability
    • CVE-2024-20462 (5.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Information Disclosure Vulnerability
    • CVE-2024-20463 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection and Denial of Service Vulnerability
  • CVE-2024-20280 (6.3 medium) Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability
  • CVE-2024-20512 (6.1 medium) Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

#cisco #ata #ciscoucs #vulnerability #cve

##

CVE-2024-20421
(7.1 HIGH)

EPSS: 0.04%

updated 2024-10-16T18:31:53

3 posts

A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker

RedPacketSecurity@mastodon.social at 2024-10-17T09:12:38.000Z ##

CVE Alert: CVE-2024-20421 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20421

##

RedPacketSecurity@mastodon.social at 2024-10-17T09:12:38.000Z ##

CVE Alert: CVE-2024-20421 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20421

##

screaminggoat@infosec.exchange at 2024-10-16T17:15:44.000Z ##

Cisco multiple security advisories:

  • Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities
    • CVE-2024-20420 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Privilege Escalation Vulnerability
    • CVE-2024-20421 (7.1 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Cross-Site Request Forgery Vulnerability
    • CVE-2024-20458 (8.2 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Authentication Vulnerability
    • CVE-2024-20459 (6.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Command Injection Vulnerability
    • CVE-2024-20460 (6.1 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Reflected Cross-Site Scripting Vulnerability
    • CVE-2024-20461 (6.0 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection Vulnerability
    • CVE-2024-20462 (5.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Information Disclosure Vulnerability
    • CVE-2024-20463 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection and Denial of Service Vulnerability
  • CVE-2024-20280 (6.3 medium) Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability
  • CVE-2024-20512 (6.1 medium) Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

#cisco #ata #ciscoucs #vulnerability #cve

##

CVE-2024-20458
(8.2 HIGH)

EPSS: 0.04%

updated 2024-10-16T18:31:53

5 posts

A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to view or delete the configuration or change the firmware on an affected device. This vulnerability is due to a lack of authentication on specific HTTP endpoints. An attacker could exploit this vulnerability by browsing to a specific URL.

RedPacketSecurity@mastodon.social at 2024-10-17T09:12:38.000Z ##

CVE Alert: CVE-2024-20458 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20458

##

RedPacketSecurity@mastodon.social at 2024-10-17T09:12:38.000Z ##

CVE Alert: CVE-2024-20458 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20458

##

jbhall56 at 2024-10-18T12:42:06.328Z ##

Impacting the web-based management interface of the firmware and tracked as CVE-2024-20458, the first bug exists because specific HTTP endpoints lack authentication. securityweek.com/cisco-patches

##

jbhall56@infosec.exchange at 2024-10-18T12:42:06.000Z ##

Impacting the web-based management interface of the firmware and tracked as CVE-2024-20458, the first bug exists because specific HTTP endpoints lack authentication. securityweek.com/cisco-patches

##

screaminggoat@infosec.exchange at 2024-10-16T17:15:44.000Z ##

Cisco multiple security advisories:

  • Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities
    • CVE-2024-20420 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Privilege Escalation Vulnerability
    • CVE-2024-20421 (7.1 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Cross-Site Request Forgery Vulnerability
    • CVE-2024-20458 (8.2 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Authentication Vulnerability
    • CVE-2024-20459 (6.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Command Injection Vulnerability
    • CVE-2024-20460 (6.1 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Reflected Cross-Site Scripting Vulnerability
    • CVE-2024-20461 (6.0 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection Vulnerability
    • CVE-2024-20462 (5.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Information Disclosure Vulnerability
    • CVE-2024-20463 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection and Denial of Service Vulnerability
  • CVE-2024-20280 (6.3 medium) Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability
  • CVE-2024-20512 (6.1 medium) Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

#cisco #ata #ciscoucs #vulnerability #cve

##

CVE-2024-20459
(6.5 MEDIUM)

EPSS: 0.04%

updated 2024-10-16T18:31:53

3 posts

A vulnerability in the web-based management interface of Cisco ATA 190 Multiplatform Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with high privileges to execute arbitrary commands as the root user on the underlying operating system. This vulnerability is due to a lack of input sanitization in the web-based management interface. An attacker could exploit

RedPacketSecurity@mastodon.social at 2024-10-17T09:12:38.000Z ##

CVE Alert: CVE-2024-20459 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20459

##

RedPacketSecurity@mastodon.social at 2024-10-17T09:12:38.000Z ##

CVE Alert: CVE-2024-20459 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20459

##

screaminggoat@infosec.exchange at 2024-10-16T17:15:44.000Z ##

Cisco multiple security advisories:

  • Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities
    • CVE-2024-20420 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Privilege Escalation Vulnerability
    • CVE-2024-20421 (7.1 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Cross-Site Request Forgery Vulnerability
    • CVE-2024-20458 (8.2 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Authentication Vulnerability
    • CVE-2024-20459 (6.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Command Injection Vulnerability
    • CVE-2024-20460 (6.1 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Reflected Cross-Site Scripting Vulnerability
    • CVE-2024-20461 (6.0 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection Vulnerability
    • CVE-2024-20462 (5.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Information Disclosure Vulnerability
    • CVE-2024-20463 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection and Denial of Service Vulnerability
  • CVE-2024-20280 (6.3 medium) Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability
  • CVE-2024-20512 (6.1 medium) Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

#cisco #ata #ciscoucs #vulnerability #cve

##

CVE-2024-49265
(6.5 MEDIUM)

EPSS: 0.04%

updated 2024-10-16T18:31:53

2 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Partnerships at Booking.Com Booking.Com Banner Creator allows Stored XSS.This issue affects Booking.Com Banner Creator: from n/a through 1.4.6.

1 repos

#search_error

CVE-2024-20460
(6.1 MEDIUM)

EPSS: 0.04%

updated 2024-10-16T18:31:47

3 posts

A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user&nbsp;to click a crafted link. A

1 repos

#search_error

RedPacketSecurity@mastodon.social at 2024-10-17T14:11:32.000Z ##

CVE Alert: CVE-2024-20460 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20460

##

RedPacketSecurity@mastodon.social at 2024-10-17T14:11:32.000Z ##

CVE Alert: CVE-2024-20460 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20460

##

screaminggoat@infosec.exchange at 2024-10-16T17:15:44.000Z ##

Cisco multiple security advisories:

  • Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities
    • CVE-2024-20420 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Privilege Escalation Vulnerability
    • CVE-2024-20421 (7.1 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Cross-Site Request Forgery Vulnerability
    • CVE-2024-20458 (8.2 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Authentication Vulnerability
    • CVE-2024-20459 (6.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Command Injection Vulnerability
    • CVE-2024-20460 (6.1 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Reflected Cross-Site Scripting Vulnerability
    • CVE-2024-20461 (6.0 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection Vulnerability
    • CVE-2024-20462 (5.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Information Disclosure Vulnerability
    • CVE-2024-20463 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection and Denial of Service Vulnerability
  • CVE-2024-20280 (6.3 medium) Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability
  • CVE-2024-20512 (6.1 medium) Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

#cisco #ata #ciscoucs #vulnerability #cve

##

CVE-2024-20280
(6.3 MEDIUM)

EPSS: 0.04%

updated 2024-10-16T18:31:46

3 posts

A vulnerability in the backup feature of Cisco UCS Central Software could allow an attacker with access to a backup file to learn sensitive information that is stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method that is used for the backup function. An attacker could exploit this vulnerability by accessing a backup file and lev

1 repos

#search_error

RedPacketSecurity@mastodon.social at 2024-10-17T14:11:32.000Z ##

CVE Alert: CVE-2024-20280 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20280

##

RedPacketSecurity@mastodon.social at 2024-10-17T14:11:32.000Z ##

CVE Alert: CVE-2024-20280 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20280

##

screaminggoat@infosec.exchange at 2024-10-16T17:15:44.000Z ##

Cisco multiple security advisories:

  • Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities
    • CVE-2024-20420 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Privilege Escalation Vulnerability
    • CVE-2024-20421 (7.1 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Cross-Site Request Forgery Vulnerability
    • CVE-2024-20458 (8.2 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Authentication Vulnerability
    • CVE-2024-20459 (6.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Command Injection Vulnerability
    • CVE-2024-20460 (6.1 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Reflected Cross-Site Scripting Vulnerability
    • CVE-2024-20461 (6.0 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection Vulnerability
    • CVE-2024-20462 (5.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Information Disclosure Vulnerability
    • CVE-2024-20463 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection and Denial of Service Vulnerability
  • CVE-2024-20280 (6.3 medium) Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability
  • CVE-2024-20512 (6.1 medium) Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

#cisco #ata #ciscoucs #vulnerability #cve

##

CVE-2024-20420
(5.4 MEDIUM)

EPSS: 0.04%

updated 2024-10-16T18:31:46

3 posts

A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with low privileges to run commands as an Admin user. This vulnerability is due to incorrect authorization verification by the HTTP server. An attacker could exploit this vulnerability by sending a malicious request to the web-based managem

1 repos

#search_error

RedPacketSecurity@mastodon.social at 2024-10-17T14:11:32.000Z ##

CVE Alert: CVE-2024-20420 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20420

##

RedPacketSecurity@mastodon.social at 2024-10-17T14:11:32.000Z ##

CVE Alert: CVE-2024-20420 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_20420

##

screaminggoat@infosec.exchange at 2024-10-16T17:15:44.000Z ##

Cisco multiple security advisories:

  • Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities
    • CVE-2024-20420 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Privilege Escalation Vulnerability
    • CVE-2024-20421 (7.1 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Cross-Site Request Forgery Vulnerability
    • CVE-2024-20458 (8.2 high) Cisco ATA 190 Series Analog Telephone Adapter Firmware Authentication Vulnerability
    • CVE-2024-20459 (6.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Command Injection Vulnerability
    • CVE-2024-20460 (6.1 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Reflected Cross-Site Scripting Vulnerability
    • CVE-2024-20461 (6.0 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection Vulnerability
    • CVE-2024-20462 (5.5 medium) Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Information Disclosure Vulnerability
    • CVE-2024-20463 (5.4 medium) Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection and Denial of Service Vulnerability
  • CVE-2024-20280 (6.3 medium) Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability
  • CVE-2024-20512 (6.1 medium) Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

#cisco #ata #ciscoucs #vulnerability #cve

##

CVE-2024-29155
(4.3 MEDIUM)

EPSS: 0.04%

updated 2024-10-16T18:31:44

2 posts

On Microchip RN4870 devices, when more than one consecutive PairReqNoInputNoOutput request is received, the device becomes incapable of completing the pairing process. A third party can inject a second PairReqNoInputNoOutput request just after a real one, causing the pair request to be blocked.

1 repos

#search_error

CVE-2024-21258
(5.3 MEDIUM)

EPSS: 0.05%

updated 2024-10-16T18:31:40

2 posts

Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle

CVE-2024-21259
(7.6 HIGH)

EPSS: 0.05%

updated 2024-10-16T18:31:40

2 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.22 and prior to 7.1.2. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, at

CVE-2024-21260
(7.5 HIGH)

EPSS: 0.05%

updated 2024-10-16T18:31:40

2 posts

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or

CVE-2024-8977
(8.1 HIGH)

EPSS: 0.07%

updated 2024-10-16T17:10:13.220000

1 posts

An issue has been discovered in GitLab EE affecting all versions starting from 15.10 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. Instances with Product Analytics Dashboard configured and enabled could be vulnerable to SSRF attacks.

screaminggoat@infosec.exchange at 2024-10-09T21:09:56.000Z ##

GitLab security advisory: GitLab Critical Patch Release: 17.4.2, 17.3.5, 17.2.9

  • CVE-2024-9164 (9.6 critical) Run pipelines on arbitrary branches
  • CVE-2024-8970 (8.2 high) An attacker can impersonate arbitrary user
  • CVE-2024-8977 (8.2 high) SSRF in Analytics Dashboard
  • CVE-2024-9631 (7.5 high) Viewing diffs of MR with conflicts can be slow
  • CVE-2024-6530 (7.3 high) HTMLi in OAuth page
  • CVE-2024-9623 (4.9 medium) Deploy Keys can push changes to an archived repository
  • CVE-2024-5005 (4.3 medium) Guests can disclose project templates
  • CVE-2024-9596 (3.7 low) GitLab instance version disclosed to unauthorized users

No mention of exploitation

#gitlab #patchtuesday #cve #vulnerability

##

CVE-2024-6530
(5.4 MEDIUM)

EPSS: 0.04%

updated 2024-10-16T16:53:08.487000

1 posts

A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 17.1 prior 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2. When adding a authorizing an application, it can be made to render as HTML under specific circumstances.

screaminggoat@infosec.exchange at 2024-10-09T21:09:56.000Z ##

GitLab security advisory: GitLab Critical Patch Release: 17.4.2, 17.3.5, 17.2.9

  • CVE-2024-9164 (9.6 critical) Run pipelines on arbitrary branches
  • CVE-2024-8970 (8.2 high) An attacker can impersonate arbitrary user
  • CVE-2024-8977 (8.2 high) SSRF in Analytics Dashboard
  • CVE-2024-9631 (7.5 high) Viewing diffs of MR with conflicts can be slow
  • CVE-2024-6530 (7.3 high) HTMLi in OAuth page
  • CVE-2024-9623 (4.9 medium) Deploy Keys can push changes to an archived repository
  • CVE-2024-5005 (4.3 medium) Guests can disclose project templates
  • CVE-2024-9596 (3.7 low) GitLab instance version disclosed to unauthorized users

No mention of exploitation

#gitlab #patchtuesday #cve #vulnerability

##

CVE-2024-9893
(9.8 CRITICAL)

EPSS: 0.06%

updated 2024-10-16T16:38:14.557000

4 posts

The Nextend Social Login Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.1.14. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user d

CVE-2024-45844
(7.2 HIGH)

EPSS: 0.04%

updated 2024-10-16T15:32:19

4 posts

BIG-IP monitor functionality may allow an attacker to bypass access control restrictions, regardless of the port lockdown settings.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

1 repos

#search_error

jbhall56 at 2024-10-18T12:40:32.857Z ##

Updates released for BIG-IP address a high-severity security defect tracked as CVE-2024-45844. Affecting the appliance’s monitor functionality, the bug could allow authenticated attackers to elevate their privileges and make configuration changes. securityweek.com/f5-big-ip-upd

##

jbhall56@infosec.exchange at 2024-10-18T12:40:32.000Z ##

Updates released for BIG-IP address a high-severity security defect tracked as CVE-2024-45844. Affecting the appliance’s monitor functionality, the bug could allow authenticated attackers to elevate their privileges and make configuration changes. securityweek.com/f5-big-ip-upd

##

AlmondOffSec@infosec.exchange at 2024-10-17T11:19:29.000Z ##

New article on F5! A write-up on CVE-2024-45844 a privilege escalation vulnerability in BIG-IP by team member @myst404
offsec.almond.consulting/privi

##

screaminggoat@infosec.exchange at 2024-10-16T18:00:39.000Z ##

F5 multiple security advisories: K000141302: Quarterly Security Notification (October 2024)

  • K000140061 CVE-2024-45844 (CVSSv3: 7.2/CVSSv4: 8.6 high) BIG-IP monitors vulnerability (elevation of privilege)
  • K000141080 CVE-2024-47139 (CVSSv3: 6.8/CVSSv4: 4.8 medium) BIG-IQ vulnerability (stored XSS)

No mention of exploitation.

#F5 #bigip #bigiq #vulnerability #cve

##

CVE-2024-47139
(6.8 MEDIUM)

EPSS: 0.04%

updated 2024-10-16T15:32:19

1 posts

A stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IQ Configuration utility that allows an attacker with the Administrator role to run JavaScript in the context of the currently logged-in user.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

screaminggoat@infosec.exchange at 2024-10-16T18:00:39.000Z ##

F5 multiple security advisories: K000141302: Quarterly Security Notification (October 2024)

  • K000140061 CVE-2024-45844 (CVSSv3: 7.2/CVSSv4: 8.6 high) BIG-IP monitors vulnerability (elevation of privilege)
  • K000141080 CVE-2024-47139 (CVSSv3: 6.8/CVSSv4: 4.8 medium) BIG-IQ vulnerability (stored XSS)

No mention of exploitation.

#F5 #bigip #bigiq #vulnerability #cve

##

CVE-2024-9680
(9.8 CRITICAL)

EPSS: 0.32%

updated 2024-10-16T15:07:36.123000

41 posts

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0.

1 repos

#search_error

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

SolarWinds, Firefox, Windows Face Active Exploitation: CISA Issues Urgent Warning thecyberexpress.com/cisa-adds- #knownexploitedvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202428987 #CVE202430088 #CVE20249680 #CyberNews #CISA

##

jos1264@social.skynetcloud.site at 2024-10-16T12:25:02.000Z ##

Tor Browser and Firefox users should update to fix actively exploited vulnerability malwarebytes.com/blog/news/202 #Exploitsandvulnerabilities #cve20249680 #Torbrowser #firefox #News

##

domainlabsk at 2024-10-15T20:01:14.594Z ##

Urcite odporucame uzivatelom aktualizovat prehliadac Firefox

mozilla.org/en-US/security/adv

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

SolarWinds, Firefox, Windows Face Active Exploitation: CISA Issues Urgent Warning thecyberexpress.com/cisa-adds- #knownexploitedvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202428987 #CVE202430088 #CVE20249680 #CyberNews #CISA

##

jos1264@social.skynetcloud.site at 2024-10-16T12:25:02.000Z ##

Tor Browser and Firefox users should update to fix actively exploited vulnerability malwarebytes.com/blog/news/202 #Exploitsandvulnerabilities #cve20249680 #Torbrowser #firefox #News

##

screaminggoat at 2024-10-15T14:48:58.837Z ##

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
Hot off the press!

  • CVE-2024-30088 (7.0 high) Microsoft Windows Kernel TOCTOU Race Condition Vulnerability
  • CVE-2024-9680 (9.8 critical) Mozilla Firefox Use-After-Free Vulnerability
  • CVE-2024-28987 (9.1 critical) SolarWinds Web Help Desk Hardcoded Credential Vulnerability

@hrbrmstr your bot missed these? KEV additions happen around 10am

##

screaminggoat at 2024-10-15T13:35:35.783Z ##

Tor Project security advisory: New Release: Tails 6.8.1
Reference: CVE-2024-9680 (9.8 critical, disclosed 09 October 2024 by Firefox as an exploited zero-day) Use-after-free in Animation timeline (affects both Firefox and Thunderbird)

@torproject updated their security advisory, correcting their earlier statement that "Mozilla is aware of this attack being used in the wild against Tor Browser users":

  • "To be clear, the Tor Project has no evidence that Tor Browser users were targeted specifically."
  • Mozilla is aware that "a Firefox exploit that had been spotted in the wild."

##

screaminggoat at 2024-10-11T13:00:53.676Z ##

Mozilla Foundation: Behind the Scenes: Fixing an In-the-Wild Firefox Exploit
h/t: @tomrittervg. Mozilla talks about how they scrambled a team of security, browser, compiler, and platform engineers to ship a fix for the exploited zero-day CVE-2024-9680. This blog post doesn't go into details, but it reveals that ESET alerted them to a Firefox exploit spotted in the wild, and that a fix was shipped in 25 hours. This dates the reporting to 07 October 2024.

The sample ESET sent us contained a full exploit chain that allowed remote code execution on a user's computer.

Note that CVE-2024-9680 isn't exclusive to Firefox. See parent toot above for details on backporting the patch for Thunderbird email client.

##

screaminggoat at 2024-10-11T11:56:11.924Z ##

Mozilla Foundation Security Advisory: 2024-52 Security Vulnerability fixed in Thunderbird 131.0.1, Thunderbird 128.3.1, Thunderbird 115.16.0
Reference: CVE-2024-9680 (9.8 critical, disclosed 09 October 2024 by Firefox as an exploited zero-day) Use-after-free in Animation timeline

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild.

The Mozilla Firefox zero-day is present in the Thunderbird email client as well.

##

RedPacketSecurity@mastodon.social at 2024-10-10T23:14:55.000Z ##

CVE Alert: CVE-2024-9680 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9680

##

threatcodex at 2024-10-10T20:14:30.699Z ##

Mozilla fixes critical Firefox bug exploited in the wild

therecord.media/mozilla-fixes-

##

harrysintonen at 2024-10-10T10:40:32.843Z ##

users should update their browser immediately as they're also affected by the - forum.torproject.org/t/new-rel

##

ycombinator@rss-mstdn.studiofreesia.com at 2024-10-10T07:18:31.000Z ##

Mozilla fixes Firefox zero-day actively exploited in attacks
bleepingcomputer.com/news/secu
#ycombinator #computers #windows #linux #mac #support #tech_support #spyware #malware #virus #security #Actively_Exploited #CVE_2024_9680 #Firefox #Use_After_Free #Vulnerability #Zero_Day #virus_removal #malware_removal #computer_help #technical_support

##

screaminggoat at 2024-10-09T17:49:39.350Z ##

Mozilla Firefox exploited zero-day: Security Advisory 2024-51 Security Vulnerability fixed in Firefox 131.0.2, Firefox ESR 128.3.1, Firefox ESR 115.16.1
CVE-2024-9680 (9.8 critical) Use-after-free in Animation timeline

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild.

See related @BleepingComputer reporting: Mozilla fixes Firefox zero-day actively exploited in attacks

The Canadian Centre for Cyber Security (CCCS) has a useless Mozilla security advisory (AV24-576) which doesn't indicate that this is an actively exploited zero-day. What's the point in an advisory when it doesn't provide the biz?

##

screaminggoat@infosec.exchange at 2024-10-15T14:48:58.000Z ##

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
Hot off the press!

  • CVE-2024-30088 (7.0 high) Microsoft Windows Kernel TOCTOU Race Condition Vulnerability
  • CVE-2024-9680 (9.8 critical) Mozilla Firefox Use-After-Free Vulnerability
  • CVE-2024-28987 (9.1 critical) SolarWinds Web Help Desk Hardcoded Credential Vulnerability

@hrbrmstr your bot missed these? KEV additions happen around 10am

#cisa #cisakev #kev #knownexploitedvulnerabilitiescatalog #vulnerability #cve #eitw #activeexploitation #zeroday #CVE_2024_30088 #CVE_2024_9680 #CVE_2024_28987 #solarwinds #mozilla #firefox #microsoft #windows #kernel

##

screaminggoat@infosec.exchange at 2024-10-15T13:35:35.000Z ##

Tor Project security advisory: New Release: Tails 6.8.1
Reference: CVE-2024-9680 (9.8 critical, disclosed 09 October 2024 by Firefox as an exploited zero-day) Use-after-free in Animation timeline (affects both Firefox and Thunderbird)

@torproject updated their security advisory, correcting their earlier statement that "Mozilla is aware of this attack being used in the wild against Tor Browser users":

  • "To be clear, the Tor Project has no evidence that Tor Browser users were targeted specifically."
  • Mozilla is aware that "a Firefox exploit that had been spotted in the wild."

#CVE_2024_9680 #Tor #firefox #thunderbird #zeroday #vulnerability #CVE #mozilla #tails

##

screaminggoat@infosec.exchange at 2024-10-11T13:00:53.000Z ##

Mozilla Foundation: Behind the Scenes: Fixing an In-the-Wild Firefox Exploit
h/t: @tomrittervg. Mozilla talks about how they scrambled a team of security, browser, compiler, and platform engineers to ship a fix for the exploited zero-day CVE-2024-9680. This blog post doesn't go into details, but it reveals that ESET alerted them to a Firefox exploit spotted in the wild, and that a fix was shipped in 25 hours. This dates the reporting to 07 October 2024.

The sample ESET sent us contained a full exploit chain that allowed remote code execution on a user's computer.

Note that CVE-2024-9680 isn't exclusive to Firefox. See parent toot above for details on backporting the patch for Thunderbird email client.

#zeroday #vulnerability #CVE_2024_9680 #cve #eitw #activeexploitation #firefox #thunderbird #mozilla

##

screaminggoat@infosec.exchange at 2024-10-11T11:56:11.000Z ##

Mozilla Foundation Security Advisory: 2024-52 Security Vulnerability fixed in Thunderbird 131.0.1, Thunderbird 128.3.1, Thunderbird 115.16.0
Reference: CVE-2024-9680 (9.8 critical, disclosed 09 October 2024 by Firefox as an exploited zero-day) Use-after-free in Animation timeline

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild.

The Mozilla Firefox zero-day is present in the Thunderbird email client as well.

#zeroday #vulnerability #CVE_2024_9680 #cve #eitw #activeexploitation #firefox #thunderbird #mozilla

##

RedPacketSecurity@mastodon.social at 2024-10-10T23:14:55.000Z ##

CVE Alert: CVE-2024-9680 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_9680

##

harrysintonen@infosec.exchange at 2024-10-10T10:40:32.000Z ##

#TorBrowser users should update their browser immediately as they're also affected by the #CVE_2024_9680 #useafterfree #vulnerability - forum.torproject.org/t/new-rel

##

ycombinator@rss-mstdn.studiofreesia.com at 2024-10-10T07:18:31.000Z ##

Mozilla fixes Firefox zero-day actively exploited in attacks
bleepingcomputer.com/news/secu
#ycombinator #computers #windows #linux #mac #support #tech_support #spyware #malware #virus #security #Actively_Exploited #CVE_2024_9680 #Firefox #Use_After_Free #Vulnerability #Zero_Day #virus_removal #malware_removal #computer_help #technical_support

##

screaminggoat@infosec.exchange at 2024-10-09T17:49:39.000Z ##

Mozilla Firefox exploited zero-day: Security Advisory 2024-51 Security Vulnerability fixed in Firefox 131.0.2, Firefox ESR 128.3.1, Firefox ESR 115.16.1
CVE-2024-9680 (9.8 critical) Use-after-free in Animation timeline

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild.

See related @BleepingComputer reporting: Mozilla fixes Firefox zero-day actively exploited in attacks

The Canadian Centre for Cyber Security (CCCS) has a useless Mozilla security advisory (AV24-576) which doesn't indicate that this is an actively exploited zero-day. What's the point in an advisory when it doesn't provide the biz?

#zeroday #vulnerability #firefox #mozilla #cve #CVE_2024_9680

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

SolarWinds, Firefox, Windows Face Active Exploitation: CISA Issues Urgent Warning thecyberexpress.com/cisa-adds- #knownexploitedvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202428987 #CVE202430088 #CVE20249680 #CyberNews #CISA

##

jos1264@social.skynetcloud.site at 2024-10-16T12:25:02.000Z ##

Tor Browser and Firefox users should update to fix actively exploited vulnerability malwarebytes.com/blog/news/202 #Exploitsandvulnerabilities #cve20249680 #Torbrowser #firefox #News

##

domainlabsk at 2024-10-15T20:01:14.594Z ##

Urcite odporucame uzivatelom aktualizovat prehliadac Firefox

mozilla.org/en-US/security/adv

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

SolarWinds, Firefox, Windows Face Active Exploitation: CISA Issues Urgent Warning thecyberexpress.com/cisa-adds- #knownexploitedvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202428987 #CVE202430088 #CVE20249680 #CyberNews #CISA

##

jos1264@social.skynetcloud.site at 2024-10-16T12:25:02.000Z ##

Tor Browser and Firefox users should update to fix actively exploited vulnerability malwarebytes.com/blog/news/202 #Exploitsandvulnerabilities #cve20249680 #Torbrowser #firefox #News

##

AlexaFontanilla2024@mastodon.social at 2024-10-18T17:03:53.000Z ##

@gsuberland
#postoftheweek (season 1):
Mozilla has issued an emergency security update for the Firefox browser to address a critical use-after-free vulnerability that is currently exploited in attacks.

The vulnerability, tracked as CVE-2024-9680, and discovered by ESET researcher Damien Schaeffer, is a use-after-free in Animation timelines.

This type of flaw occurs when memory that has been freed is still used by the program, allowing malicious actors to add their own malicious data.

##

cisakevtracker@mastodon.social at 2024-10-15T15:01:08.000Z ##

CVE ID: CVE-2024-9680
Vendor: Mozilla
Product: Firefox
Date Added: 2024-10-15
Vulnerability: Mozilla Firefox Use-After-Free Vulnerability
Notes: mozilla.org/en-US/security/adv ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

jbhall56@infosec.exchange at 2024-10-15T11:39:33.000Z ##

Tracked as CVE-2024-9680, the exploited bug is described as a high-severity use-after-free issue in Firefox’s Animation timeline that could lead to the execution of arbitrary code. securityweek.com/recent-firefo

##

alternativeto@mas.to at 2024-10-12T15:00:05.000Z ##

⚠️ Mozilla released an emergency update for Firefox due to a critical Web Animations API flaw (CVE-2024-9680) allowing code execution. Users should update to the latest versions immediately alternativeto.net/news/2024/10

##

AlexaFontanilla2024@mastodon.social at 2024-10-11T18:46:44.000Z ##

@j3j5
#postoftheweek (season 1):
Mozilla has revealed that a critical security flaw impacting Firefox and Firefox Extended Support Release (ESR) has come under active exploitation in the wild.

The vulnerability, tracked as CVE-2024-9680 (CVSS score: 9.8), has been described as a use-after-free bug in the Animation timeline component.

"An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines."

##

dalias@hachyderm.io at 2024-10-10T20:00:11.000Z ##

Can anyone confirm if dom.animations-api.timelines.enabled=false fixes CVE-2024-9680?

##

avoidthehack@infosec.exchange at 2024-10-10T18:04:07.000Z ##

#Mozilla fixes #Firefox zero-day actively exploited in attacks

Tracked as CVE-2024-9680. A use-after-free vulnerability in part of Firefox’s Web Animations API, which could give the attacker code execution abilities.

Exploited in the wild, but not a lot of information on how users are targeted.

Mozilla has released a fix - users should update ASAP as upgrading is the best defense here against potential exploitation.

#cybersecurity #security #infosec #browsers

bleepingcomputer.com/news/secu

##

dc@cosocial.ca at 2024-10-10T14:45:51.000Z ##

Time to patch your Firefox mozilla.org/en-US/security/adv

##

jos1264@social.skynetcloud.site at 2024-10-10T12:50:02.000Z ##

Actively exploited Firefox zero-day fixed, update ASAP! (CVE-2024-9680) helpnetsecurity.com/2024/10/10 #securityupdate #vulnerability #Don'tmiss #Hotstuff #Firefox #News #ESET #CVE #Tor

##

BenjaminHCCarr@hachyderm.io at 2024-10-10T12:39:04.000Z ##

#Mozilla fixes #Firefox #zeroday actively exploited in attacks
Given the active exploitation status for CVE-2024-9680 and the lack of any information on how people are targeted, upgrading to the latest versions is essential.
bleepingcomputer.com/news/secu #0day

##

jbhall56@infosec.exchange at 2024-10-10T12:35:12.000Z ##

Mozilla said CVE-2024-9680 is a use-after-free issue in Animation timelines – the pane within the Firefox browser's Page Inspector that depicts how a given element's animation progresses. theregister.com/2024/10/10/fir

##

Signez@mastodon.social at 2024-10-10T10:41:32.000Z ##

@immae Bien sûr, il s’agit de la CVE-2024-9680, considérée comme critique par Mozilla.

mozilla.org/en-US/security/adv

Bleeping Computer en parle :
bleepingcomputer.com/news/secu

##

benzogaga33@mamot.fr at 2024-10-10T09:40:03.000Z ##

Firefox : une faille de sécurité zero-day déjà exploitée a été corrigée en urgence par Mozilla ! it-connect.fr/mozilla-firefox- #ActuCybersécurité #Cybersécurité #Logiciel-OS #Firefox

##

wingo@mastodon.social at 2024-10-10T08:44:28.000Z ##

an actively exploited RCE in firefox -- you know the drill mozilla.org/en-US/security/adv

##

CVE-2024-28987
(9.1 CRITICAL)

EPSS: 96.02%

updated 2024-10-16T13:05:08.363000

17 posts

The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.

1 repos

#search_error

sbeyer@ioc.exchange at 2024-10-17T10:47:19.000Z ##

"The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data."

It is 2024 and this is happening? REALLY???

cve.threatint.com/CVE/CVE-2024

#solarwinds #fail #cybersecurity #software #vulnerability #cve_2024_28987

##

screaminggoat at 2024-10-15T14:48:58.837Z ##

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
Hot off the press!

  • CVE-2024-30088 (7.0 high) Microsoft Windows Kernel TOCTOU Race Condition Vulnerability
  • CVE-2024-9680 (9.8 critical) Mozilla Firefox Use-After-Free Vulnerability
  • CVE-2024-28987 (9.1 critical) SolarWinds Web Help Desk Hardcoded Credential Vulnerability

@hrbrmstr your bot missed these? KEV additions happen around 10am

##

sbeyer at 2024-10-17T10:47:19.026Z ##

"The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data."

It is 2024 and this is happening? REALLY???

cve.threatint.com/CVE/CVE-2024

##

screaminggoat@infosec.exchange at 2024-10-15T14:48:58.000Z ##

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
Hot off the press!

  • CVE-2024-30088 (7.0 high) Microsoft Windows Kernel TOCTOU Race Condition Vulnerability
  • CVE-2024-9680 (9.8 critical) Mozilla Firefox Use-After-Free Vulnerability
  • CVE-2024-28987 (9.1 critical) SolarWinds Web Help Desk Hardcoded Credential Vulnerability

@hrbrmstr your bot missed these? KEV additions happen around 10am

#cisa #cisakev #kev #knownexploitedvulnerabilitiescatalog #vulnerability #cve #eitw #activeexploitation #zeroday #CVE_2024_30088 #CVE_2024_9680 #CVE_2024_28987 #solarwinds #mozilla #firefox #microsoft #windows #kernel

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

SolarWinds, Firefox, Windows Face Active Exploitation: CISA Issues Urgent Warning thecyberexpress.com/cisa-adds- #knownexploitedvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202428987 #CVE202430088 #CVE20249680 #CyberNews #CISA

##

jos1264@social.skynetcloud.site at 2024-10-16T11:20:02.000Z ##

CISA Issues Urgent Advisory on Vulnerabilities Affecting Multiple Products cyble.com/blog/cisa-issues-urg #Vulnerability #CVE202428987 #CISA

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

SolarWinds, Firefox, Windows Face Active Exploitation: CISA Issues Urgent Warning thecyberexpress.com/cisa-adds- #knownexploitedvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202428987 #CVE202430088 #CVE20249680 #CyberNews #CISA

##

jos1264@social.skynetcloud.site at 2024-10-16T11:20:02.000Z ##

CISA Issues Urgent Advisory on Vulnerabilities Affecting Multiple Products cyble.com/blog/cisa-issues-urg #Vulnerability #CVE202428987 #CISA

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

SolarWinds, Firefox, Windows Face Active Exploitation: CISA Issues Urgent Warning thecyberexpress.com/cisa-adds- #knownexploitedvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202428987 #CVE202430088 #CVE20249680 #CyberNews #CISA

##

jos1264@social.skynetcloud.site at 2024-10-16T11:20:02.000Z ##

CISA Issues Urgent Advisory on Vulnerabilities Affecting Multiple Products cyble.com/blog/cisa-issues-urg #Vulnerability #CVE202428987 #CISA

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

SolarWinds, Firefox, Windows Face Active Exploitation: CISA Issues Urgent Warning thecyberexpress.com/cisa-adds- #knownexploitedvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202428987 #CVE202430088 #CVE20249680 #CyberNews #CISA

##

jos1264@social.skynetcloud.site at 2024-10-16T11:20:02.000Z ##

CISA Issues Urgent Advisory on Vulnerabilities Affecting Multiple Products cyble.com/blog/cisa-issues-urg #Vulnerability #CVE202428987 #CISA

##

flagthis@botsin.space at 2024-10-18T06:44:12.000Z ##

## SolarWinds Web Help Desk Flaw Under Active Attack! 🚨

CISA warns of critical vulnerability (CVE-2024-28987) allowing remote code execution, urging immediate patching. #SolarWinds #Cybersecurity #CVE #Vulnerability

malware.news/t/solarwinds-web-
flagthis.com/?pid=5406

##

tecteschi@mastodon.social at 2024-10-18T00:58:41.000Z ##

go.twuai.com/ping/742691379339 SolarWinds enfrenta una crisis de seguridad tras la identificación de la vulnerabilidad CVE-2024-28987 en su software Web Help Desk (WHD). A pesar de haber lanzado correcciones, las credenciales codificadas en el sistema permiten accesos no autorizados, generando preocupaciones sobre la integridad de datos en sectores críticos.

Detalles Relevantes:

- Descripción de la Vulnerabilidad: - CVE-2024-28987 permite a usuarios no autenticados

##

sbeyer at 2024-10-17T10:45:27.778Z ##

"(...) affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data."

It is 2024 and this is happening? REALLY???

cve.threatint.com/CVE/CVE-2024

-2024-28987

##

jbhall56@infosec.exchange at 2024-10-16T11:30:26.000Z ##

The flaw, tracked as CVE-2024-28987 (CVSS score of 9.1), is described as a hardcoded credential issue that allows remote, unauthenticated attackers to access internal WHD functionality and modify data. securityweek.com/organizations

##

cisakevtracker@mastodon.social at 2024-10-15T15:00:53.000Z ##

CVE ID: CVE-2024-28987
Vendor: SolarWinds
Product: Web Help Desk
Date Added: 2024-10-15
Vulnerability: SolarWinds Web Help Desk Hardcoded Credential Vulnerability
Notes: solarwinds.com/trust-center/se ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2024-45711
(7.5 HIGH)

EPSS: 0.05%

updated 2024-10-16T09:30:39

1 posts

SolarWinds Serv-U is vulnerable to a directory traversal vulnerability where remote code execution is possible depending on privileges given to the authenticated user. This issue requires a user to be authenticated and this is present when software environment variables are abused. Authentication is required for this vulnerability

screaminggoat@infosec.exchange at 2024-10-16T18:55:16.000Z ##

SolarWinds multiple security advisories: SolarWinds Security Vulnerabilities

  • CVE-2024-28988 (9.8 critical) SolarWinds Web Help Desk Java Deserialization Remote Code Execution Vulnerability
  • CVE-2024-45713 (5.1 medium) SolarWinds Kiwi CatTools Sensitive Information Disclosure Vulnerability
  • CVE-2024-45714 (5.7 medium) Serv-U Stored XSS Vulnerability
  • CVE-2024-45711 (7.5 high) Serv-U FTP Service Directory Traversal Remote Code Execution Vulnerability
  • CVE-2024-45710 (7.8 high) SolarWinds Platform Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
  • CVE-2024-45715 (7.1 high) SolarWinds Platform Edit Function Cross-Site Scripting Vulnerability

No mention of exploitation.

#Solarwinds #vulnerability #cve

##

CVE-2024-9061
(7.3 HIGH)

EPSS: 0.05%

updated 2024-10-16T09:30:38

2 posts

The The WP Popup Builder – Popup Forms and Marketing Lead Generation plugin for WordPress is vulnerable to arbitrary shortcode execution via the wp_ajax_nopriv_shortcode_Api_Add AJAX action in all versions up to, and including, 1.3.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unaut

1 repos

https://github.com/RandomRobbieBF/CVE-2024-9061

CVE-2024-45715
(7.0 None)

EPSS: 0.04%

updated 2024-10-16T09:30:38

1 posts

The SolarWinds Platform was susceptible to a Cross-Site Scripting vulnerability when performing an edit function to existing elements.

screaminggoat@infosec.exchange at 2024-10-16T18:55:16.000Z ##

SolarWinds multiple security advisories: SolarWinds Security Vulnerabilities

  • CVE-2024-28988 (9.8 critical) SolarWinds Web Help Desk Java Deserialization Remote Code Execution Vulnerability
  • CVE-2024-45713 (5.1 medium) SolarWinds Kiwi CatTools Sensitive Information Disclosure Vulnerability
  • CVE-2024-45714 (5.7 medium) Serv-U Stored XSS Vulnerability
  • CVE-2024-45711 (7.5 high) Serv-U FTP Service Directory Traversal Remote Code Execution Vulnerability
  • CVE-2024-45710 (7.8 high) SolarWinds Platform Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
  • CVE-2024-45715 (7.1 high) SolarWinds Platform Edit Function Cross-Site Scripting Vulnerability

No mention of exploitation.

#Solarwinds #vulnerability #cve

##

CVE-2024-45710
(7.8 HIGH)

EPSS: 0.04%

updated 2024-10-16T09:30:38

1 posts

SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local Privilege Escalation vulnerability. This requires a low privilege account and local access to the affected node machine.

screaminggoat@infosec.exchange at 2024-10-16T18:55:16.000Z ##

SolarWinds multiple security advisories: SolarWinds Security Vulnerabilities

  • CVE-2024-28988 (9.8 critical) SolarWinds Web Help Desk Java Deserialization Remote Code Execution Vulnerability
  • CVE-2024-45713 (5.1 medium) SolarWinds Kiwi CatTools Sensitive Information Disclosure Vulnerability
  • CVE-2024-45714 (5.7 medium) Serv-U Stored XSS Vulnerability
  • CVE-2024-45711 (7.5 high) Serv-U FTP Service Directory Traversal Remote Code Execution Vulnerability
  • CVE-2024-45710 (7.8 high) SolarWinds Platform Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
  • CVE-2024-45715 (7.1 high) SolarWinds Platform Edit Function Cross-Site Scripting Vulnerability

No mention of exploitation.

#Solarwinds #vulnerability #cve

##

CVE-2024-45714
(4.8 MEDIUM)

EPSS: 0.05%

updated 2024-10-16T09:30:38

1 posts

Application is vulnerable to Cross Site Scripting (XSS) an authenticated attacker with users’ permissions can modify a variable with a payload.

screaminggoat@infosec.exchange at 2024-10-16T18:55:16.000Z ##

SolarWinds multiple security advisories: SolarWinds Security Vulnerabilities

  • CVE-2024-28988 (9.8 critical) SolarWinds Web Help Desk Java Deserialization Remote Code Execution Vulnerability
  • CVE-2024-45713 (5.1 medium) SolarWinds Kiwi CatTools Sensitive Information Disclosure Vulnerability
  • CVE-2024-45714 (5.7 medium) Serv-U Stored XSS Vulnerability
  • CVE-2024-45711 (7.5 high) Serv-U FTP Service Directory Traversal Remote Code Execution Vulnerability
  • CVE-2024-45710 (7.8 high) SolarWinds Platform Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
  • CVE-2024-45715 (7.1 high) SolarWinds Platform Edit Function Cross-Site Scripting Vulnerability

No mention of exploitation.

#Solarwinds #vulnerability #cve

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

SolarWinds, Firefox, Windows Face Active Exploitation: CISA Issues Urgent Warning thecyberexpress.com/cisa-adds- #knownexploitedvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202428987 #CVE202430088 #CVE20249680 #CyberNews #CISA

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

SolarWinds, Firefox, Windows Face Active Exploitation: CISA Issues Urgent Warning thecyberexpress.com/cisa-adds- #knownexploitedvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202428987 #CVE202430088 #CVE20249680 #CyberNews #CISA

##

screaminggoat at 2024-10-15T14:48:58.837Z ##

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
Hot off the press!

  • CVE-2024-30088 (7.0 high) Microsoft Windows Kernel TOCTOU Race Condition Vulnerability
  • CVE-2024-9680 (9.8 critical) Mozilla Firefox Use-After-Free Vulnerability
  • CVE-2024-28987 (9.1 critical) SolarWinds Web Help Desk Hardcoded Credential Vulnerability

@hrbrmstr your bot missed these? KEV additions happen around 10am

##

screaminggoat at 2024-10-11T12:02:30.787Z ##

Trend Micro: Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against UAE and Gulf Regions
Reference: CVE-2024-30088 (7.0 high, disclosed 11 June 2024 by Microsoft) Windows Kernel Elevation of Privilege Vulnerability

APT34, aka OilRig (Trend Micro calls them Earth Simnavaz 🤡) is an Iranian state-sponsored APT that is attributed to the Ministry of Intelligence and Security (MOIS) by Microsoft. They were observed by Trend Micro actively targeting governmental entities in the UAE and the broader Gulf region. They deployed a backdoor that leverages Microsoft Exchange servers for credentials theft, and exploiting vulnerabilities like CVE-2024-30088 for privilege escalation. They use a combination of customized .NET tools, PowerShell scripts, and IIS-based malware for defense evasion and blending in with network traffic. Trend Micro assesses that APT34 is focused on abusing vulnerabilities in key infrastructure of geopolitically sensitive regions. They also seek to establish a persistent foothold in compromised entities, so these can be weaponized to launch attacks on additional targets. Trend Micro describes the attack chain, observations of tools and techniques, exploitation of CVE-2024-30088, abuse of dropped password filter policy, and data exfiltration via legitimate mail traffic. Indicators of compromise provided.

##

screaminggoat@infosec.exchange at 2024-10-15T14:48:58.000Z ##

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
Hot off the press!

  • CVE-2024-30088 (7.0 high) Microsoft Windows Kernel TOCTOU Race Condition Vulnerability
  • CVE-2024-9680 (9.8 critical) Mozilla Firefox Use-After-Free Vulnerability
  • CVE-2024-28987 (9.1 critical) SolarWinds Web Help Desk Hardcoded Credential Vulnerability

@hrbrmstr your bot missed these? KEV additions happen around 10am

#cisa #cisakev #kev #knownexploitedvulnerabilitiescatalog #vulnerability #cve #eitw #activeexploitation #zeroday #CVE_2024_30088 #CVE_2024_9680 #CVE_2024_28987 #solarwinds #mozilla #firefox #microsoft #windows #kernel

##

screaminggoat@infosec.exchange at 2024-10-11T12:02:30.000Z ##

Trend Micro: Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against UAE and Gulf Regions
Reference: CVE-2024-30088 (7.0 high, disclosed 11 June 2024 by Microsoft) Windows Kernel Elevation of Privilege Vulnerability

APT34, aka OilRig (Trend Micro calls them Earth Simnavaz 🤡) is an Iranian state-sponsored APT that is attributed to the Ministry of Intelligence and Security (MOIS) by Microsoft. They were observed by Trend Micro actively targeting governmental entities in the UAE and the broader Gulf region. They deployed a backdoor that leverages Microsoft Exchange servers for credentials theft, and exploiting vulnerabilities like CVE-2024-30088 for privilege escalation. They use a combination of customized .NET tools, PowerShell scripts, and IIS-based malware for defense evasion and blending in with network traffic. Trend Micro assesses that APT34 is focused on abusing vulnerabilities in key infrastructure of geopolitically sensitive regions. They also seek to establish a persistent foothold in compromised entities, so these can be weaponized to launch attacks on additional targets. Trend Micro describes the attack chain, observations of tools and techniques, exploitation of CVE-2024-30088, abuse of dropped password filter policy, and data exfiltration via legitimate mail traffic. Indicators of compromise provided.

#APT34 #OilRig #earthsimnavaz #cyberespionage #CVE_2024_30088 #microsoft #vulnerability #CVE #eitw #activeexploitation #IOC #threatintel #infosec #cybersecurity #cyberthreatintelligence #CTI

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

SolarWinds, Firefox, Windows Face Active Exploitation: CISA Issues Urgent Warning thecyberexpress.com/cisa-adds- #knownexploitedvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202428987 #CVE202430088 #CVE20249680 #CyberNews #CISA

##

jos1264@social.skynetcloud.site at 2024-10-17T06:50:02.000Z ##

SolarWinds, Firefox, Windows Face Active Exploitation: CISA Issues Urgent Warning thecyberexpress.com/cisa-adds- #knownexploitedvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202428987 #CVE202430088 #CVE20249680 #CyberNews #CISA

##

cisakevtracker@mastodon.social at 2024-10-15T15:01:23.000Z ##

CVE ID: CVE-2024-30088
Vendor: Microsoft
Product: Windows
Date Added: 2024-10-15
Vulnerability: Microsoft Windows Kernel TOCTOU Race Condition Vulnerability
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

jbhall56@infosec.exchange at 2024-10-14T11:59:17.000Z ##

In these attacks, spotted by Trend Micro researchers, OilRig deployed a novel backdoor, targeting Microsoft Exchange servers to steal credentials, and also exploited the Windows CVE-2024-30088 flaw to elevate their privileges on compromised devices. bleepingcomputer.com/news/secu

##

informapirata@mastodon.uno at 2024-10-13T16:13:03.000Z ##

OilRig sfrutta una falla nel kernel di Windows in una campagna di spionaggio che prende di mira gli Emirati Arabi Uniti e il Golfo

"Il gruppo utilizza tattiche sofisticate che includono l'implementazione di una backdoor che sfrutta i server Microsoft Exchange per il furto di credenziali e lo sfruttamento di vulnerabilità come CVE-2024-30088 per l'escalation dei privilegi"

@informatica
thehackernews.com/2024/10/oilr

##

CVE-2024-38204
(7.5 HIGH)

EPSS: 0.09%

updated 2024-10-16T00:31:04

3 posts

Improper Access Control in Imagine Cup allows an authorized attacker to elevate privileges over a network.

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-38204 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_38204

##

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-38204 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_38204

##

screaminggoat@infosec.exchange at 2024-10-15T23:57:09.000Z ##

wake up babe, new after-hours Microsoft Security Response Center (MSRC) advisories:

  • CVE-2024-38139 (8.7 high) Microsoft Dataverse Elevation of Privilege Vulnerability
  • CVE-2024-38190 (8.6 high) Power Platform Information Disclosure Vulnerability
  • CVE-2024-38204 (7.5 high) Imagine Cup site Information Disclosure Vulnerability

The vulnerability documented by this CVE requires no customer action to resolve

Forget understanding the vulnerabilities, I'm trying to figure out what these products are in the first place. Not exploited or publicly disclosed, and a weird mixture of Exploitability assessments to include a blank.

#microsoft #vulnerability #CVE #PowerPlatform #Dataverse #ImagineCup

##

CVE-2024-38139
(8.7 HIGH)

EPSS: 0.05%

updated 2024-10-16T00:31:03

3 posts

Improper authentication in Microsoft Dataverse allows an authorized attacker to elevate privileges over a network.

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-38139 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_38139

##

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-38139 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_38139

##

screaminggoat@infosec.exchange at 2024-10-15T23:57:09.000Z ##

wake up babe, new after-hours Microsoft Security Response Center (MSRC) advisories:

  • CVE-2024-38139 (8.7 high) Microsoft Dataverse Elevation of Privilege Vulnerability
  • CVE-2024-38190 (8.6 high) Power Platform Information Disclosure Vulnerability
  • CVE-2024-38204 (7.5 high) Imagine Cup site Information Disclosure Vulnerability

The vulnerability documented by this CVE requires no customer action to resolve

Forget understanding the vulnerabilities, I'm trying to figure out what these products are in the first place. Not exploited or publicly disclosed, and a weird mixture of Exploitability assessments to include a blank.

#microsoft #vulnerability #CVE #PowerPlatform #Dataverse #ImagineCup

##

CVE-2024-38190
(8.6 HIGH)

EPSS: 0.09%

updated 2024-10-16T00:31:03

3 posts

Missing authorization in Power Platform allows an unauthenticated attacker to view sensitive information through a network attack vector.

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-38190 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_38190

##

RedPacketSecurity@mastodon.social at 2024-10-16T04:03:41.000Z ##

CVE Alert: CVE-2024-38190 - redpacketsecurity.com/cve_aler

#OSINT #ThreatIntel #CyberSecurity #cve_2024_38190

##

screaminggoat@infosec.exchange at 2024-10-15T23:57:09.000Z ##

wake up babe, new after-hours Microsoft Security Response Center (MSRC) advisories:

  • CVE-2024-38139 (8.7 high) Microsoft Dataverse Elevation of Privilege Vulnerability
  • CVE-2024-38190 (8.6 high) Power Platform Information Disclosure Vulnerability
  • CVE-2024-38204 (7.5 high) Imagine Cup site Information Disclosure Vulnerability

The vulnerability documented by this CVE requires no customer action to resolve

Forget understanding the vulnerabilities, I'm trying to figure out what these products are in the first place. Not exploited or publicly disclosed, and a weird mixture of Exploitability assessments to include a blank.

#microsoft #vulnerability #CVE #PowerPlatform #Dataverse #ImagineCup

##

CVE-2024-45085
(5.9 MEDIUM)

EPSS: 0.05%

updated 2024-10-16T00:31:03

2 posts

IBM WebSphere Application Server 8.5 is vulnerable to a denial of service, under certain configurations, caused by an unexpected specially crafted request. A remote attacker could exploit this vulnerability to cause an error resulting in a denial of service.

CVE-2024-21265
(8.1 HIGH)

EPSS: 0.05%

updated 2024-10-16T00:30:58

2 posts

Vulnerability in the Oracle Site Hub product of Oracle E-Business Suite (component: Site Hierarchy Flows). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Site Hub. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access

CVE-2024-21266
(8.1 HIGH)

EPSS: 0.05%

updated 2024-10-16T00:30:58

2 posts

Vulnerability in the Oracle Advanced Pricing product of Oracle E-Business Suite (component: Price List). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Advanced Pricing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification

CVE-2024-9796
(5.9 MEDIUM)

EPSS: 0.11%

updated 2024-10-15T21:31:40

2 posts

The WP-Advanced-Search WordPress plugin before 3.3.9.2 does not sanitize and escape the t parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks

1 repos

https://github.com/RandomRobbieBF/CVE-2024-9796

CVE-2024-31955
(4.9 MEDIUM)

EPSS: 0.04%

updated 2024-10-15T21:30:47

2 posts

An issue was discovered in Samsung eMMC with KLMAG2GE4A and KLM8G1WEMB firmware. Code bypass through Electromagnetic Fault Injection allows an attacker to successfully authenticate and write to the RPMB (Replay Protected Memory Block) area without possessing secret information.

CVE-2024-21255
(8.8 HIGH)

EPSS: 0.05%

updated 2024-10-15T21:30:46

2 posts

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: XMLPublisher). Supported versions that are affected are 8.59, 8.60 and 8.61. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in takeover of PeopleSoft Ente

CVE-2024-21257
(3.0 LOW)

EPSS: 0.04%

updated 2024-10-15T21:30:46

2 posts

Vulnerability in the Oracle Hyperion BI+ product of Oracle Hyperion (component: UI and Visualization). The supported version that is affected is 11.2.18.0.000. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the Oracle Hyperion BI+ executes to compromise Oracle Hyperion BI+. Successful attacks requi

CVE-2024-21251
(3.1 LOW)

EPSS: 0.04%

updated 2024-10-15T21:30:46

2 posts

Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.24, 21.3-21.15 and 23.4-23.5. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized update, i

CVE-2024-21261
(4.9 MEDIUM)

EPSS: 0.04%

updated 2024-10-15T21:30:46

2 posts

Vulnerability in Oracle Application Express (component: General). Supported versions that are affected are 23.2 and 24.1. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Express. While the vulnerability is in Oracle Application Express, attacks may significantly impact additional products (scope change). Successful

CVE-2024-47874(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-10-15T19:56:07

1 posts

### Summary Starlette treats `multipart/form-data` parts without a `filename` as text form fields and buffers those in byte strings with no size limit. This allows an attacker to upload arbitrary large form fields and cause Starlette to both slow down significantly due to excessive memory allocations and copy operations, and also consume more and more memory until the server starts swapping and gr

CVE-2024-47824(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-10-15T19:56:06

1 posts

### Impact matrix-react-sdk before 3.102.0 allows a malicious homeserver to potentially steal message keys for a room when a user invites another user to that room, via injection of a malicious device controlled by the homeserver. This is possible because matrix-react-sdk before 3.102.0 shared historical message keys on invite. ### Patches matrix-react-sdk 3.102.0 [disables sharing message keys

CVE-2024-9471
(4.7 MEDIUM)

EPSS: 0.04%

updated 2024-10-15T18:30:50

1 posts

A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with "Virtual system administrator (read-only)" access could use an XML API key of a "Virtual system admi

screaminggoat@infosec.exchange at 2024-10-09T17:02:39.000Z ##

Happy #PatchTuesday on a Wednesday from Palo Alto Networks (includes a zero-day)

  • CVE-2024-9469 (CVSSv4: 5.7 medium) Cortex XDR Agent: Local Windows User Can Disable the Agent
  • CVE-2024-9471 (CVSSv4: 5.1 medium) PAN-OS: Privilege Escalation (PE) Vulnerability in XML API
  • CVE-2024-9468 (CVSSv4: 8.2 high) PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet
  • PAN-SA-2024-0010 Expedition: Multiple Vulnerabilities Lead to Firewall Admin Account Takeover
  • CVE-2024-9473 (CVSSv4: 5.2 medium) GlobalProtect App: Local Privilege Escalation (PE) Vulnerability
    • Palo Alto Networks is not aware of any malicious exploitation of this issue. However, a proof of concept for this issue is publicly available.
  • PAN-SA-2024-0011 Chromium: Monthly Vulnerability Updates
  • CVE-2024-9470 (CVSSv4: 5.3 medium) Cortex XSOAR: Information Disclosure Vulnerability

Palo Alto Networks is not aware of any malicious exploitation of these issues.

#paloaltonetworks #expedition #vulnerability #CVE

##

CVE-2024-9469
(5.5 MEDIUM)

EPSS: 0.04%

updated 2024-10-15T18:30:49

1 posts

A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity.

screaminggoat@infosec.exchange at 2024-10-09T17:02:39.000Z ##

Happy #PatchTuesday on a Wednesday from Palo Alto Networks (includes a zero-day)

  • CVE-2024-9469 (CVSSv4: 5.7 medium) Cortex XDR Agent: Local Windows User Can Disable the Agent
  • CVE-2024-9471 (CVSSv4: 5.1 medium) PAN-OS: Privilege Escalation (PE) Vulnerability in XML API
  • CVE-2024-9468 (CVSSv4: 8.2 high) PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet
  • PAN-SA-2024-0010 Expedition: Multiple Vulnerabilities Lead to Firewall Admin Account Takeover
  • CVE-2024-9473 (CVSSv4: 5.2 medium) GlobalProtect App: Local Privilege Escalation (PE) Vulnerability
    • Palo Alto Networks is not aware of any malicious exploitation of this issue. However, a proof of concept for this issue is publicly available.
  • PAN-SA-2024-0011 Chromium: Monthly Vulnerability Updates
  • CVE-2024-9470 (CVSSv4: 5.3 medium) Cortex XSOAR: Information Disclosure Vulnerability

Palo Alto Networks is not aware of any malicious exploitation of these issues.

#paloaltonetworks #expedition #vulnerability #CVE

##

CVE-2024-42640
(9.8 CRITICAL)

EPSS: 0.04%

updated 2024-10-15T17:35:04.623000

4 posts

angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote code execution via demo/server.php. Exploiting this vulnerability allows an attacker to upload arbitrary content to the server, which can subsequently be accessed through demo/uploads. This leads to the execution of previously uploaded content and enables the attacker to achieve code execution on the server. NOTE: This

1 repos

https://github.com/rvizx/CVE-2024-42640

CVE-2024-9467
(6.1 MEDIUM)

EPSS: 0.05%

updated 2024-10-15T15:30:46

1 posts

A reflected XSS vulnerability in Palo Alto Networks Expedition enables execution of malicious JavaScript in the context of an authenticated Expedition user's browser if that user clicks on a malicious link, allowing phishing attacks that could lead to Expedition browser session theft.

screaminggoat@infosec.exchange at 2024-10-09T16:55:59.000Z ##

Palo Alto Networks security advisory: PAN-SA-2024-0010 Expedition: Multiple Vulnerabilities Lead to Firewall Admin Account Takeover
See parent toot above for Horizon3 vulnerability details.

  • CVE-2024-9463 (9.9 critical) Palo Alto Networks Expedition OS command injection vulnerability
  • CVE-2024-9464 (9.3 critical) Palo Alto Networks Expedition OS command injection vulnerability
  • CVE-2024-9465 (9.2 critical) Palo Alto Networks Expedition SQL injection vulnerability
  • CVE-2024-9466 (8.2 high) Palo Alto Networks Expedition cleartext storage of sensitive information vulnerability
  • CVE-2024-9467 (7.0 high) Palo Alto Networks Expedition reflected XSS vulnerability

Palo Alto Networks is not aware of any malicious exploitation of these issues.

#paloaltonetworks #expedition #vulnerability #CVE

##

CVE-2024-9463
(7.5 HIGH)

EPSS: 91.34%

updated 2024-10-15T15:30:45

3 posts

An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.

Nuclei template

iagox86 at 2024-10-17T17:54:57.254Z ##

I love it when companies put their name in the PoC, it makes it so much easier to track down what I'm seeing when it gets sprayed out on the internet. Thanks watchTowr!

(This is Palo Alto Expedition - CVE-2024-9463)

@greynoise

##

iagox86@infosec.exchange at 2024-10-17T17:54:57.000Z ##

I love it when companies put their name in the PoC, it makes it so much easier to track down what I'm seeing when it gets sprayed out on the internet. Thanks watchTowr!

(This is Palo Alto Expedition - CVE-2024-9463)

@greynoise

#vulnerability #exploit #greynoise

##

screaminggoat@infosec.exchange at 2024-10-09T16:55:59.000Z ##

Palo Alto Networks security advisory: PAN-SA-2024-0010 Expedition: Multiple Vulnerabilities Lead to Firewall Admin Account Takeover
See parent toot above for Horizon3 vulnerability details.

  • CVE-2024-9463 (9.9 critical) Palo Alto Networks Expedition OS command injection vulnerability
  • CVE-2024-9464 (9.3 critical) Palo Alto Networks Expedition OS command injection vulnerability
  • CVE-2024-9465 (9.2 critical) Palo Alto Networks Expedition SQL injection vulnerability
  • CVE-2024-9466 (8.2 high) Palo Alto Networks Expedition cleartext storage of sensitive information vulnerability
  • CVE-2024-9467 (7.0 high) Palo Alto Networks Expedition reflected XSS vulnerability

Palo Alto Networks is not aware of any malicious exploitation of these issues.

#paloaltonetworks #expedition #vulnerability #CVE

##

CVE-2024-8048
(7.8 HIGH)

EPSS: 0.05%

updated 2024-10-15T14:56:24.687000

2 posts

In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible using object injection via insecure expression evaluation.

screaminggoat@infosec.exchange at 2024-10-10T18:39:06.000Z ##

Progress Telerik security advisories:

discovered by @codewhitesec

#telerik #vulnerability #cve #progresssoftware

##

codewhitesec@infosec.exchange at 2024-10-10T18:30:15.000Z ##

Using Telerik Reporting or Report Server? Patch now to fix 3 RCEs @mwulftange found (CVE-2024-8015, CVE-2024-8014, CVE-2024-8048). Telerik vulns have a history of being exploited by threat actors according to #CISA Details at code-white.com/public-vulnerab

##

CVE-2024-8014
(8.8 HIGH)

EPSS: 0.05%

updated 2024-10-15T14:54:09.580000

2 posts

In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible through object injection via an insecure type resolution vulnerability.

screaminggoat@infosec.exchange at 2024-10-10T18:39:06.000Z ##

Progress Telerik security advisories:

discovered by @codewhitesec

#telerik #vulnerability #cve #progresssoftware

##

codewhitesec@infosec.exchange at 2024-10-10T18:30:15.000Z ##

Using Telerik Reporting or Report Server? Patch now to fix 3 RCEs @mwulftange found (CVE-2024-8015, CVE-2024-8014, CVE-2024-8048). Telerik vulns have a history of being exploited by threat actors according to #CISA Details at code-white.com/public-vulnerab

##

CVE-2024-45315
(0 None)

EPSS: 0.07%

updated 2024-10-15T12:58:51.050000

1 posts

The Improper link resolution before file access ('Link Following') vulnerability in SonicWall Connect Tunnel (version 12.4.3.271 and earlier of Windows client) allows users with standard privileges to create arbitrary folders and files, potentially leading to local Denial of Service (DoS) attack.

screaminggoat@infosec.exchange at 2024-10-10T15:02:02.000Z ##

SonicWall security advisory: SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Client Affected By Multiple Vulnerabilities

  • CVE-2024-45315 (6.1 medium) SonicWALL SMA1000 Connect Tunnel Windows Client Link Following Denial-of-Service Vulnerability
  • CVE-2024-45316 (7.8 high) SonicWALL SMA1000 Connect Tunnel Windows Client Link Following Local Privilege Escalation Vulnerability
  • CVE-2024-45317 (7.2 high) Unauthenticated SMA1000 12.4.x Server-Side Request Forgery (SSRF) Vulnerability

There is no evidence that these vulnerabilities are being exploited in the wild and SonicWall SSL VPN SMA 100 series products are not affected by these vulnerabilities. Affected products are SMA1000 Connect Tunnel Windows (32 and 64-bit) Client 12.4.3.271 and earlier versions, SMA1000 Appliance firmware 12.4.3-02676 and earlier versions (Note: This vulnerability does not affect Connect Tunnel Linux and Mac client versions.) Vulnerabilities are patched in SMA1000 Connect Tunnel Windows (32 and 64-bit) Client 12.4.3.281 version and higher, along with SMA1000 Platform Hotfix - 12.4.3-02758. SonicWall strongly advises SSLVPN SMA 1000 series product and Connect Tunnel client users to upgrade to the mentioned fixed-release version.

#sonicwall #vulnerability #sslvpn #cve

##

CVE-2024-45734
(4.3 MEDIUM)

EPSS: 0.04%

updated 2024-10-14T18:30:37

1 posts

In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could view images on the machine that runs Splunk Enterprise by using the PDF export feature in Splunk classic dashboards. The images on the machine could be exposed by exporting the dashboard as a PDF, using the local image path in the img tag in the source extensib

screaminggoat@infosec.exchange at 2024-10-14T17:09:02.000Z ##

Splunk Quarterly Update: Oh lord I forgot that Splunk does this.

  • SVD-2024-1001 CVE-2024-45731 (8.0 high) Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
  • SVD-2024-1002 CVE-2024-45732 (7.1 high) Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app
  • SVD-2024-1003 CVE-2024-45733 (8.8 high) Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
  • SVD-2024-1004 CVE-2024-45734 (4.3 medium) Low Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
  • SVD-2024-1005 CVE-2024-45735 (4.3 medium) Improper Access Control for low-privileged user in Splunk Secure Gateway App
  • SVD-2024-1006 CVE-2024-45736 (6.5 medium) Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
  • SVD-2024-1007 CVE-2024-45737 (4.3 medium) Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)
  • SVD-2024-1008 CVE-2024-45738 (4.9 medium) Sensitive information disclosure in REST_Calls logging channel
  • SVD-2024-1009 CVE-2024-45739 (4.9 medium) Sensitive information disclosure in AdminManager logging channel
  • SVD-2024-1010 CVE-2024-45740 (5.4 medium) Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise
  • SVD-2024-1011 CVE-2024-45741 (5.4 medium) Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise
  • SVD-2024-1012 (Muliple CVEs) Third-Party Package Updates in Splunk Enterprise - October 2024

No mention of exploitation, I haven't checked the third party package CVEs individually though.

#splunk #vulnerability #cve

##

CVE-2024-45741
(5.4 MEDIUM)

EPSS: 0.04%

updated 2024-10-14T18:30:37

1 posts

In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create a malicious payload through a custom configuration file that the "api.uri" parameter from the "/manager/search/apps/local" endpoint in Splunk Web calls. This could result in execution of

screaminggoat@infosec.exchange at 2024-10-14T17:09:02.000Z ##

Splunk Quarterly Update: Oh lord I forgot that Splunk does this.

  • SVD-2024-1001 CVE-2024-45731 (8.0 high) Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
  • SVD-2024-1002 CVE-2024-45732 (7.1 high) Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app
  • SVD-2024-1003 CVE-2024-45733 (8.8 high) Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
  • SVD-2024-1004 CVE-2024-45734 (4.3 medium) Low Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
  • SVD-2024-1005 CVE-2024-45735 (4.3 medium) Improper Access Control for low-privileged user in Splunk Secure Gateway App
  • SVD-2024-1006 CVE-2024-45736 (6.5 medium) Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
  • SVD-2024-1007 CVE-2024-45737 (4.3 medium) Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)
  • SVD-2024-1008 CVE-2024-45738 (4.9 medium) Sensitive information disclosure in REST_Calls logging channel
  • SVD-2024-1009 CVE-2024-45739 (4.9 medium) Sensitive information disclosure in AdminManager logging channel
  • SVD-2024-1010 CVE-2024-45740 (5.4 medium) Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise
  • SVD-2024-1011 CVE-2024-45741 (5.4 medium) Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise
  • SVD-2024-1012 (Muliple CVEs) Third-Party Package Updates in Splunk Enterprise - October 2024

No mention of exploitation, I haven't checked the third party package CVEs individually though.

#splunk #vulnerability #cve

##

CVE-2024-45735
(4.3 MEDIUM)

EPSS: 0.04%

updated 2024-10-14T18:30:37

1 posts

In Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Secure Gateway versions on Splunk Cloud Platform versions below 3.4.259, 3.6.17, and 3.7.0, a low-privileged user that does not hold the "admin" or "power" Splunk roles can see App Key Value Store (KV Store) deployment configuration and public/private keys in the Splunk Secure Gateway App.

screaminggoat@infosec.exchange at 2024-10-14T17:09:02.000Z ##

Splunk Quarterly Update: Oh lord I forgot that Splunk does this.

  • SVD-2024-1001 CVE-2024-45731 (8.0 high) Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
  • SVD-2024-1002 CVE-2024-45732 (7.1 high) Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app
  • SVD-2024-1003 CVE-2024-45733 (8.8 high) Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
  • SVD-2024-1004 CVE-2024-45734 (4.3 medium) Low Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
  • SVD-2024-1005 CVE-2024-45735 (4.3 medium) Improper Access Control for low-privileged user in Splunk Secure Gateway App
  • SVD-2024-1006 CVE-2024-45736 (6.5 medium) Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
  • SVD-2024-1007 CVE-2024-45737 (4.3 medium) Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)
  • SVD-2024-1008 CVE-2024-45738 (4.9 medium) Sensitive information disclosure in REST_Calls logging channel
  • SVD-2024-1009 CVE-2024-45739 (4.9 medium) Sensitive information disclosure in AdminManager logging channel
  • SVD-2024-1010 CVE-2024-45740 (5.4 medium) Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise
  • SVD-2024-1011 CVE-2024-45741 (5.4 medium) Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise
  • SVD-2024-1012 (Muliple CVEs) Third-Party Package Updates in Splunk Enterprise - October 2024

No mention of exploitation, I haven't checked the third party package CVEs individually though.

#splunk #vulnerability #cve

##

CVE-2024-45740
(5.4 MEDIUM)

EPSS: 0.04%

updated 2024-10-14T18:30:37

1 posts

In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious payload through Scheduled Views that could result in execution of unauthorized JavaScript code in the browser of a user.

screaminggoat@infosec.exchange at 2024-10-14T17:09:02.000Z ##

Splunk Quarterly Update: Oh lord I forgot that Splunk does this.

  • SVD-2024-1001 CVE-2024-45731 (8.0 high) Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
  • SVD-2024-1002 CVE-2024-45732 (7.1 high) Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app
  • SVD-2024-1003 CVE-2024-45733 (8.8 high) Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
  • SVD-2024-1004 CVE-2024-45734 (4.3 medium) Low Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
  • SVD-2024-1005 CVE-2024-45735 (4.3 medium) Improper Access Control for low-privileged user in Splunk Secure Gateway App
  • SVD-2024-1006 CVE-2024-45736 (6.5 medium) Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
  • SVD-2024-1007 CVE-2024-45737 (4.3 medium) Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)
  • SVD-2024-1008 CVE-2024-45738 (4.9 medium) Sensitive information disclosure in REST_Calls logging channel
  • SVD-2024-1009 CVE-2024-45739 (4.9 medium) Sensitive information disclosure in AdminManager logging channel
  • SVD-2024-1010 CVE-2024-45740 (5.4 medium) Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise
  • SVD-2024-1011 CVE-2024-45741 (5.4 medium) Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise
  • SVD-2024-1012 (Muliple CVEs) Third-Party Package Updates in Splunk Enterprise - October 2024

No mention of exploitation, I haven't checked the third party package CVEs individually though.

#splunk #vulnerability #cve

##

CVE-2024-45736
(6.5 MEDIUM)

EPSS: 0.04%

updated 2024-10-14T18:30:32

1 posts

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a search query with an improperly formatted "INGEST_EVAL" parameter as part of a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowled

screaminggoat@infosec.exchange at 2024-10-14T17:09:02.000Z ##

Splunk Quarterly Update: Oh lord I forgot that Splunk does this.

  • SVD-2024-1001 CVE-2024-45731 (8.0 high) Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
  • SVD-2024-1002 CVE-2024-45732 (7.1 high) Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app
  • SVD-2024-1003 CVE-2024-45733 (8.8 high) Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
  • SVD-2024-1004 CVE-2024-45734 (4.3 medium) Low Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
  • SVD-2024-1005 CVE-2024-45735 (4.3 medium) Improper Access Control for low-privileged user in Splunk Secure Gateway App
  • SVD-2024-1006 CVE-2024-45736 (6.5 medium) Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
  • SVD-2024-1007 CVE-2024-45737 (4.3 medium) Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)
  • SVD-2024-1008 CVE-2024-45738 (4.9 medium) Sensitive information disclosure in REST_Calls logging channel
  • SVD-2024-1009 CVE-2024-45739 (4.9 medium) Sensitive information disclosure in AdminManager logging channel
  • SVD-2024-1010 CVE-2024-45740 (5.4 medium) Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise
  • SVD-2024-1011 CVE-2024-45741 (5.4 medium) Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise
  • SVD-2024-1012 (Muliple CVEs) Third-Party Package Updates in Splunk Enterprise - October 2024

No mention of exploitation, I haven't checked the third party package CVEs individually though.

#splunk #vulnerability #cve

##

CVE-2024-45732
(7.1 HIGH)

EPSS: 0.05%

updated 2024-10-14T18:30:32

1 posts

In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the "admin" or "power" Splunk roles could run a search as the "nobody" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially re

screaminggoat@infosec.exchange at 2024-10-14T17:09:02.000Z ##

Splunk Quarterly Update: Oh lord I forgot that Splunk does this.

  • SVD-2024-1001 CVE-2024-45731 (8.0 high) Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
  • SVD-2024-1002 CVE-2024-45732 (7.1 high) Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app
  • SVD-2024-1003 CVE-2024-45733 (8.8 high) Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
  • SVD-2024-1004 CVE-2024-45734 (4.3 medium) Low Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
  • SVD-2024-1005 CVE-2024-45735 (4.3 medium) Improper Access Control for low-privileged user in Splunk Secure Gateway App
  • SVD-2024-1006 CVE-2024-45736 (6.5 medium) Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
  • SVD-2024-1007 CVE-2024-45737 (4.3 medium) Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)
  • SVD-2024-1008 CVE-2024-45738 (4.9 medium) Sensitive information disclosure in REST_Calls logging channel
  • SVD-2024-1009 CVE-2024-45739 (4.9 medium) Sensitive information disclosure in AdminManager logging channel
  • SVD-2024-1010 CVE-2024-45740 (5.4 medium) Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise
  • SVD-2024-1011 CVE-2024-45741 (5.4 medium) Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise
  • SVD-2024-1012 (Muliple CVEs) Third-Party Package Updates in Splunk Enterprise - October 2024

No mention of exploitation, I haven't checked the third party package CVEs individually though.

#splunk #vulnerability #cve

##

CVE-2024-45733
(8.8 HIGH)

EPSS: 0.05%

updated 2024-10-14T18:30:32

1 posts

In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration.

screaminggoat@infosec.exchange at 2024-10-14T17:09:02.000Z ##

Splunk Quarterly Update: Oh lord I forgot that Splunk does this.

  • SVD-2024-1001 CVE-2024-45731 (8.0 high) Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
  • SVD-2024-1002 CVE-2024-45732 (7.1 high) Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app
  • SVD-2024-1003 CVE-2024-45733 (8.8 high) Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
  • SVD-2024-1004 CVE-2024-45734 (4.3 medium) Low Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
  • SVD-2024-1005 CVE-2024-45735 (4.3 medium) Improper Access Control for low-privileged user in Splunk Secure Gateway App
  • SVD-2024-1006 CVE-2024-45736 (6.5 medium) Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
  • SVD-2024-1007 CVE-2024-45737 (4.3 medium) Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)
  • SVD-2024-1008 CVE-2024-45738 (4.9 medium) Sensitive information disclosure in REST_Calls logging channel
  • SVD-2024-1009 CVE-2024-45739 (4.9 medium) Sensitive information disclosure in AdminManager logging channel
  • SVD-2024-1010 CVE-2024-45740 (5.4 medium) Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise
  • SVD-2024-1011 CVE-2024-45741 (5.4 medium) Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise
  • SVD-2024-1012 (Muliple CVEs) Third-Party Package Updates in Splunk Enterprise - October 2024

No mention of exploitation, I haven't checked the third party package CVEs individually though.

#splunk #vulnerability #cve

##

CVE-2024-45737
(4.3 MEDIUM)

EPSS: 0.04%

updated 2024-10-14T18:30:31

1 posts

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the "admin" or "power" Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF).

screaminggoat@infosec.exchange at 2024-10-14T17:09:02.000Z ##

Splunk Quarterly Update: Oh lord I forgot that Splunk does this.

  • SVD-2024-1001 CVE-2024-45731 (8.0 high) Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
  • SVD-2024-1002 CVE-2024-45732 (7.1 high) Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app
  • SVD-2024-1003 CVE-2024-45733 (8.8 high) Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
  • SVD-2024-1004 CVE-2024-45734 (4.3 medium) Low Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
  • SVD-2024-1005 CVE-2024-45735 (4.3 medium) Improper Access Control for low-privileged user in Splunk Secure Gateway App
  • SVD-2024-1006 CVE-2024-45736 (6.5 medium) Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
  • SVD-2024-1007 CVE-2024-45737 (4.3 medium) Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)
  • SVD-2024-1008 CVE-2024-45738 (4.9 medium) Sensitive information disclosure in REST_Calls logging channel
  • SVD-2024-1009 CVE-2024-45739 (4.9 medium) Sensitive information disclosure in AdminManager logging channel
  • SVD-2024-1010 CVE-2024-45740 (5.4 medium) Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise
  • SVD-2024-1011 CVE-2024-45741 (5.4 medium) Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise
  • SVD-2024-1012 (Muliple CVEs) Third-Party Package Updates in Splunk Enterprise - October 2024

No mention of exploitation, I haven't checked the third party package CVEs individually though.

#splunk #vulnerability #cve

##

CVE-2024-9936(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-10-14T15:30:54

1 posts

When manipulating the selection node cache, an attacker may have been able to cause unexpected behavior, potentially leading to an exploitable crash. This vulnerability affects Firefox < 131.0.3.

screaminggoat@infosec.exchange at 2024-10-14T16:42:47.000Z ##

Mozilla Foundation security advisory: 2024-53: Security Vulnerability fixed in Firefox 131.0.3
Alright this is my day off so don't expect me to try hard. After the exploited zero-day in Firefox last week, this unexpected Firefox advisory this week contains a single vulnerability: CVE-2024-9936 (high severity) Undefined behavior in selection node cache. No mention of exploitation.

#firefox #mozilla #vulnerability #CVE_2024_9936 #cve

##

CVE-2024-9821
(8.8 HIGH)

EPSS: 0.05%

updated 2024-10-12T03:30:47

2 posts

The Bot for Telegram on WooCommerce plugin for WordPress is vulnerable to sensitive information disclosure due to missing authorization checks on the 'stm_wpcfto_get_settings' AJAX action in all versions up to, and including, 1.2.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to view the Telegram Bot Token, a secret token used to control the bot, whi

1 repos

https://github.com/RandomRobbieBF/CVE-2024-9821

CVE-2024-45316
(7.8 HIGH)

EPSS: 0.07%

updated 2024-10-12T00:31:53

1 posts

The Improper link resolution before file access ('Link Following') vulnerability in SonicWall Connect Tunnel (version 12.4.3.271 and earlier of Windows client) allows users with standard privileges to delete arbitrary folders and files, potentially leading to local privilege escalation attack.

screaminggoat@infosec.exchange at 2024-10-10T15:02:02.000Z ##

SonicWall security advisory: SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Client Affected By Multiple Vulnerabilities

  • CVE-2024-45315 (6.1 medium) SonicWALL SMA1000 Connect Tunnel Windows Client Link Following Denial-of-Service Vulnerability
  • CVE-2024-45316 (7.8 high) SonicWALL SMA1000 Connect Tunnel Windows Client Link Following Local Privilege Escalation Vulnerability
  • CVE-2024-45317 (7.2 high) Unauthenticated SMA1000 12.4.x Server-Side Request Forgery (SSRF) Vulnerability

There is no evidence that these vulnerabilities are being exploited in the wild and SonicWall SSL VPN SMA 100 series products are not affected by these vulnerabilities. Affected products are SMA1000 Connect Tunnel Windows (32 and 64-bit) Client 12.4.3.271 and earlier versions, SMA1000 Appliance firmware 12.4.3-02676 and earlier versions (Note: This vulnerability does not affect Connect Tunnel Linux and Mac client versions.) Vulnerabilities are patched in SMA1000 Connect Tunnel Windows (32 and 64-bit) Client 12.4.3.281 version and higher, along with SMA1000 Platform Hotfix - 12.4.3-02758. SonicWall strongly advises SSLVPN SMA 1000 series product and Connect Tunnel client users to upgrade to the mentioned fixed-release version.

#sonicwall #vulnerability #sslvpn #cve

##

CVE-2024-9707
(9.8 CRITICAL)

EPSS: 0.06%

updated 2024-10-11T15:30:45

2 posts

The Hunk Companion plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the /wp-json/hc/v1/themehunk-import REST API endpoint in all versions up to, and including, 1.8.4. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another v

1 repos

https://github.com/RandomRobbieBF/CVE-2024-9707

CVE-2024-9234
(9.8 CRITICAL)

EPSS: 0.04%

updated 2024-10-11T15:30:44

2 posts

The GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the install_and_activate_plugin_from_external() function (install-active-plugin REST API endpoint) in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to install and ac

Nuclei template

1 repos

https://github.com/RandomRobbieBF/CVE-2024-9234

CVE-2024-9164
(9.6 CRITICAL)

EPSS: 0.04%

updated 2024-10-11T15:30:44

2 posts

An issue was discovered in GitLab EE affecting all versions starting from 12.5 prior to 17.2.9, starting from 17.3, prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows running pipelines on arbitrary branches.

adulau@infosec.exchange at 2024-10-11T12:09:23.000Z ##

cve-2024-9164 - Missing Authentication for Critical Function in GitLab

🔗 vulnerability.circl.lu/vuln/cv

#gitlab #security #vulnerability

##

screaminggoat@infosec.exchange at 2024-10-09T21:09:56.000Z ##

GitLab security advisory: GitLab Critical Patch Release: 17.4.2, 17.3.5, 17.2.9

  • CVE-2024-9164 (9.6 critical) Run pipelines on arbitrary branches
  • CVE-2024-8970 (8.2 high) An attacker can impersonate arbitrary user
  • CVE-2024-8977 (8.2 high) SSRF in Analytics Dashboard
  • CVE-2024-9631 (7.5 high) Viewing diffs of MR with conflicts can be slow
  • CVE-2024-6530 (7.3 high) HTMLi in OAuth page
  • CVE-2024-9623 (4.9 medium) Deploy Keys can push changes to an archived repository
  • CVE-2024-5005 (4.3 medium) Guests can disclose project templates
  • CVE-2024-9596 (3.7 low) GitLab instance version disclosed to unauthorized users

No mention of exploitation

#gitlab #patchtuesday #cve #vulnerability

##

CVE-2024-45317(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-10-11T15:30:44

1 posts

A Server-Side Request Forgery (SSRF) vulnerability in SMA1000 appliance firmware versions 12.4.3-02676 and earlier allows a remote, unauthenticated attacker to cause the SMA1000 server-side application to make requests to an unintended IP address.

screaminggoat@infosec.exchange at 2024-10-10T15:02:02.000Z ##

SonicWall security advisory: SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Client Affected By Multiple Vulnerabilities

  • CVE-2024-45315 (6.1 medium) SonicWALL SMA1000 Connect Tunnel Windows Client Link Following Denial-of-Service Vulnerability
  • CVE-2024-45316 (7.8 high) SonicWALL SMA1000 Connect Tunnel Windows Client Link Following Local Privilege Escalation Vulnerability
  • CVE-2024-45317 (7.2 high) Unauthenticated SMA1000 12.4.x Server-Side Request Forgery (SSRF) Vulnerability

There is no evidence that these vulnerabilities are being exploited in the wild and SonicWall SSL VPN SMA 100 series products are not affected by these vulnerabilities. Affected products are SMA1000 Connect Tunnel Windows (32 and 64-bit) Client 12.4.3.271 and earlier versions, SMA1000 Appliance firmware 12.4.3-02676 and earlier versions (Note: This vulnerability does not affect Connect Tunnel Linux and Mac client versions.) Vulnerabilities are patched in SMA1000 Connect Tunnel Windows (32 and 64-bit) Client 12.4.3.281 version and higher, along with SMA1000 Platform Hotfix - 12.4.3-02758. SonicWall strongly advises SSLVPN SMA 1000 series product and Connect Tunnel client users to upgrade to the mentioned fixed-release version.

#sonicwall #vulnerability #sslvpn #cve

##

CVE-2024-5005
(4.3 MEDIUM)

EPSS: 0.04%

updated 2024-10-11T15:30:44

1 posts

An issue has been discovered discovered in GitLab EE/CE affecting all versions starting from 11.4 before 17.2.9, all versions starting from 17.3 before 17.3.5, all versions starting from 17.4 before 17.4.2 It was possible for guest users to disclose project templates using the API.

screaminggoat@infosec.exchange at 2024-10-09T21:09:56.000Z ##

GitLab security advisory: GitLab Critical Patch Release: 17.4.2, 17.3.5, 17.2.9

  • CVE-2024-9164 (9.6 critical) Run pipelines on arbitrary branches
  • CVE-2024-8970 (8.2 high) An attacker can impersonate arbitrary user
  • CVE-2024-8977 (8.2 high) SSRF in Analytics Dashboard
  • CVE-2024-9631 (7.5 high) Viewing diffs of MR with conflicts can be slow
  • CVE-2024-6530 (7.3 high) HTMLi in OAuth page
  • CVE-2024-9623 (4.9 medium) Deploy Keys can push changes to an archived repository
  • CVE-2024-5005 (4.3 medium) Guests can disclose project templates
  • CVE-2024-9596 (3.7 low) GitLab instance version disclosed to unauthorized users

No mention of exploitation

#gitlab #patchtuesday #cve #vulnerability

##

CVE-2024-8970
(8.2 HIGH)

EPSS: 0.04%

updated 2024-10-11T15:30:44

1 posts

An issue was discovered in GitLab CE/EE affecting all versions starting from 11.6 prior to 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows an attacker to trigger a pipeline as another user under certain circumstances.

screaminggoat@infosec.exchange at 2024-10-09T21:09:56.000Z ##

GitLab security advisory: GitLab Critical Patch Release: 17.4.2, 17.3.5, 17.2.9

  • CVE-2024-9164 (9.6 critical) Run pipelines on arbitrary branches
  • CVE-2024-8970 (8.2 high) An attacker can impersonate arbitrary user
  • CVE-2024-8977 (8.2 high) SSRF in Analytics Dashboard
  • CVE-2024-9631 (7.5 high) Viewing diffs of MR with conflicts can be slow
  • CVE-2024-6530 (7.3 high) HTMLi in OAuth page
  • CVE-2024-9623 (4.9 medium) Deploy Keys can push changes to an archived repository
  • CVE-2024-5005 (4.3 medium) Guests can disclose project templates
  • CVE-2024-9596 (3.7 low) GitLab instance version disclosed to unauthorized users

No mention of exploitation

#gitlab #patchtuesday #cve #vulnerability

##

CVE-2024-9312
(7.6 HIGH)

EPSS: 0.04%

updated 2024-10-11T02:30:30

1 posts

CVE description: Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user's ID and gain their privileges. ----- original report ----- # Cause authd assigns user IDs as a pure function of the user name. Moreover, the set of UIDs is much too small for pseudo-random assignment to work: the bir

CVE-2024-9487(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-10-11T00:31:40

1 posts

An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed SAML SSO authentication to be bypassed resulting in unauthorized provisioning of users and access to the instance. Exploitation required the encrypted assertions feature to be enabled, and the attacker would require direct network access as well as a signed SAML response or met

jbhall56@infosec.exchange at 2024-10-16T11:40:55.000Z ##

The vulnerability, tracked as CVE-2024-9487, carries a CVS score of 9.5 out of a maximum of 10.0 thehackernews.com/2024/10/gith

##

CVE-2024-9380
(7.2 HIGH)

EPSS: 4.64%

updated 2024-10-10T18:32:16

7 posts

An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution.

screaminggoat@infosec.exchange at 2024-10-11T22:10:11.000Z ##

Fortinet: Burning Zero Days: Suspected Nation-State Adversary Targets Ivanti CSA
Fortinet describes their incident response for clients who had their Ivanti Cloud Services Appliance (CSA) devices exploited using zero-days CVE-2024-8190, and CVE-2024-8963 (and one other unspecified command injection vulnerability). See the references below for info on those vulnerabilities. This is extremely interesting, as the threat actor, who was still active in the customer's network, actually patched the CVE-2024-8190 vulnerability, which Fortinet assesses was to prevent anyone else from interfering with their attack operations. Indicators of compromise listed.

Okay so what concerns me about this article is that Fortinet doesn't specifically identify the "A publicly unknown command injection vulnerability affecting the resource reports.php." This is very likely CVE-2024-9380 Ivanti CSA OS Command Injection Vulnerability, due to the Threat Signal Report that Fortinet links to in this article. Also missing is CVE-2024-9379 Ivanti CSA SQL Injection and CVE-2024-9381 Ivanti CSA path traversal.

References:

#threatintel #zeroday #ivanti #vulnerability #infosec #cybersecurity #cyberthreatintelligence #CTI #IOC #cyberespionage #ivanticsa #cloudservicesappliance #eitw #activeexploitation #CVE_2024_8190 #CVE_2024_8963 #CVE_2024_29824

##

adulau@infosec.exchange at 2024-10-10T19:41:26.000Z ##

In vulnerability-lookup, we’ve introduced bundles to group multiple vulnerabilities together, making it especially useful for managing Ivanti-related issues.

"An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution."

🔗 vulnerability.circl.lu/vuln/cv

#ivanti #vulnerability #infosec

##

screaminggoat@infosec.exchange at 2024-10-09T23:07:57.000Z ##

@flagthis check the security advisory again: only two are being exploited forums.ivanti.com/s/article/Se

Ivanti updated their pages to say only CVE-2024-9379 and CVE-2024-9380 ivanti.com/blog/october-2024-s

##

screaminggoat@infosec.exchange at 2024-10-09T18:40:40.000Z ##

Ivanti Security Advisory: Ivanti CSA (Cloud Services Application) (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)
Very sneaky of Ivanti to quietly update the security advisory without a changelog: They removed CVE-2024-9381 (CVSSv3: 7.2 high) Path traversal in Ivanti CSA before version 5.0.2 from the exploitation announcement:

We have observed limited exploitation of CSA 4.6 when CVE-2024-9379 or CVE-2024-9380 are chained with CVE-2024-8963, present in CSA 4.6 patch 518 and below, it could lead to unauthenticated remote code execution. We have not observed these vulnerabilities being exploited in CSA 5.0.

See parent toot above for the original wording. cc: @cR0w @reverseics

#ivanti #patchtuesday #zeroday #vulnerability #cve #activeexploitation #ivanticsa #cloudservicesappliance #eitw

##

cisakevtracker@mastodon.social at 2024-10-09T15:01:08.000Z ##

CVE ID: CVE-2024-9379
Vendor: Ivanti
Product: Cloud Services Appliance (CSA)
Date Added: 2024-10-09
Vulnerability: Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability
Notes: forums.ivanti.com/s/article/Se ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2024-10-09T15:00:52.000Z ##

CVE ID: CVE-2024-9380
Vendor: Ivanti
Product: Cloud Services Appliance (CSA)
Date Added: 2024-10-09
Vulnerability: Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability
Notes: forums.ivanti.com/s/article/Se ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

screaminggoat@infosec.exchange at 2024-10-09T14:18:18.000Z ##

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
Hot off the press! CISA only adds two of the Ivanti exploited zero-day vulnerabilities, and a Fortinet vulnerability to the KEV Catalog:

  • CVE-2024-9380 (7.2 high, disclosed 08 October 2024 by Ivanti as exploited zero-day) Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability
  • CVE-2024-9379 (6.5 medium, disclosed 08 October 2024 by Ivanti as exploited zero-day) Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability
  • CVE-2024-23113 (9.8 critical, disclosed 08 February 2024 by Fortinet) Fortinet Multiple Products Format String Vulnerability

#cisa #cisakev #kev #knownexploitedvulnerabilitiescatalog #vulnerability #cve #eitw #activeexploitation #zeroday

##

CVE-2024-9596
(3.7 LOW)

EPSS: 0.05%

updated 2024-10-10T12:31:19

1 posts

An issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. It was possible for an unauthenticated attacker to determine the GitLab version number for a GitLab instance.

screaminggoat@infosec.exchange at 2024-10-09T21:09:56.000Z ##

GitLab security advisory: GitLab Critical Patch Release: 17.4.2, 17.3.5, 17.2.9

  • CVE-2024-9164 (9.6 critical) Run pipelines on arbitrary branches
  • CVE-2024-8970 (8.2 high) An attacker can impersonate arbitrary user
  • CVE-2024-8977 (8.2 high) SSRF in Analytics Dashboard
  • CVE-2024-9631 (7.5 high) Viewing diffs of MR with conflicts can be slow
  • CVE-2024-6530 (7.3 high) HTMLi in OAuth page
  • CVE-2024-9623 (4.9 medium) Deploy Keys can push changes to an archived repository
  • CVE-2024-5005 (4.3 medium) Guests can disclose project templates
  • CVE-2024-9596 (3.7 low) GitLab instance version disclosed to unauthorized users

No mention of exploitation

#gitlab #patchtuesday #cve #vulnerability

##

CVE-2024-9623
(4.9 MEDIUM)

EPSS: 0.05%

updated 2024-10-10T12:31:19

1 posts

An issue was discovered in GitLab CE/EE affecting all versions starting from 8.16 prior to 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows deploy keys to push to an archived repository.

screaminggoat@infosec.exchange at 2024-10-09T21:09:56.000Z ##

GitLab security advisory: GitLab Critical Patch Release: 17.4.2, 17.3.5, 17.2.9

  • CVE-2024-9164 (9.6 critical) Run pipelines on arbitrary branches
  • CVE-2024-8970 (8.2 high) An attacker can impersonate arbitrary user
  • CVE-2024-8977 (8.2 high) SSRF in Analytics Dashboard
  • CVE-2024-9631 (7.5 high) Viewing diffs of MR with conflicts can be slow
  • CVE-2024-6530 (7.3 high) HTMLi in OAuth page
  • CVE-2024-9623 (4.9 medium) Deploy Keys can push changes to an archived repository
  • CVE-2024-5005 (4.3 medium) Guests can disclose project templates
  • CVE-2024-9596 (3.7 low) GitLab instance version disclosed to unauthorized users

No mention of exploitation

#gitlab #patchtuesday #cve #vulnerability

##

CVE-2024-45519
(10.0 CRITICAL)

EPSS: 76.66%

updated 2024-10-10T00:32:08

1 posts

The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands.

Nuclei template

3 repos

https://github.com/Chocapikk/CVE-2024-45519

https://github.com/p33d/CVE-2024-45519

https://github.com/TOB1a3/CVE-2024-45519-PoC

CVE-2024-38815
(4.3 MEDIUM)

EPSS: 0.04%

updated 2024-10-09T21:31:14

1 posts

VMware NSX contains a content spoofing vulnerability.  An unauthenticated malicious actor may be able to craft a URL and redirect a victim to an attacker controlled domain leading to sensitive information disclosure.

screaminggoat@infosec.exchange at 2024-10-16T19:38:05.000Z ##

VMware multiple security advisories:

  • VMSA-2024-0020 09 October 2024:
    • CVE-2024-38818 (6.7 medium) VMware NSX local privilege escalation vulnerabilit
    • CVE-2024-38817 (6.7 medium) VMware NSX command injection vulnerability
    • CVE-2024-38815 (4.3 medium) VMware NSX content spoofing vulnerability
  • VMSA-2024-0021 16 October 2024: CVE-2024-38814 (8.8 high) Authenticated SQL injection in VMware HCX

No mention of exploitation.

#VMware #nsx #hcx #vulnerability #cve

##

CVE-2024-38818
(6.7 MEDIUM)

EPSS: 0.04%

updated 2024-10-09T21:31:14

1 posts

VMware NSX contains a local privilege escalation vulnerability.  An authenticated malicious actor may exploit this vulnerability to obtain permissions from a separate group role than previously assigned.

screaminggoat@infosec.exchange at 2024-10-16T19:38:05.000Z ##

VMware multiple security advisories:

  • VMSA-2024-0020 09 October 2024:
    • CVE-2024-38818 (6.7 medium) VMware NSX local privilege escalation vulnerabilit
    • CVE-2024-38817 (6.7 medium) VMware NSX command injection vulnerability
    • CVE-2024-38815 (4.3 medium) VMware NSX content spoofing vulnerability
  • VMSA-2024-0021 16 October 2024: CVE-2024-38814 (8.8 high) Authenticated SQL injection in VMware HCX

No mention of exploitation.

#VMware #nsx #hcx #vulnerability #cve

##

CVE-2024-38817
(6.7 MEDIUM)

EPSS: 0.04%

updated 2024-10-09T21:31:14

1 posts

Mware NSX contains a command injection vulnerability.  A malicious actor with access to the NSX Edge CLI terminal may be able to craft malicious payloads to execute arbitrary commands on the operating system as root.

screaminggoat@infosec.exchange at 2024-10-16T19:38:05.000Z ##

VMware multiple security advisories:

  • VMSA-2024-0020 09 October 2024:
    • CVE-2024-38818 (6.7 medium) VMware NSX local privilege escalation vulnerabilit
    • CVE-2024-38817 (6.7 medium) VMware NSX command injection vulnerability
    • CVE-2024-38815 (4.3 medium) VMware NSX content spoofing vulnerability
  • VMSA-2024-0021 16 October 2024: CVE-2024-38814 (8.8 high) Authenticated SQL injection in VMware HCX

No mention of exploitation.

#VMware #nsx #hcx #vulnerability #cve

##

CVE-2024-9468(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-10-09T18:31:50

1 posts

A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.

screaminggoat@infosec.exchange at 2024-10-09T17:02:39.000Z ##

Happy #PatchTuesday on a Wednesday from Palo Alto Networks (includes a zero-day)

  • CVE-2024-9469 (CVSSv4: 5.7 medium) Cortex XDR Agent: Local Windows User Can Disable the Agent
  • CVE-2024-9471 (CVSSv4: 5.1 medium) PAN-OS: Privilege Escalation (PE) Vulnerability in XML API
  • CVE-2024-9468 (CVSSv4: 8.2 high) PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet
  • PAN-SA-2024-0010 Expedition: Multiple Vulnerabilities Lead to Firewall Admin Account Takeover
  • CVE-2024-9473 (CVSSv4: 5.2 medium) GlobalProtect App: Local Privilege Escalation (PE) Vulnerability
    • Palo Alto Networks is not aware of any malicious exploitation of this issue. However, a proof of concept for this issue is publicly available.
  • PAN-SA-2024-0011 Chromium: Monthly Vulnerability Updates
  • CVE-2024-9470 (CVSSv4: 5.3 medium) Cortex XSOAR: Information Disclosure Vulnerability

Palo Alto Networks is not aware of any malicious exploitation of these issues.

#paloaltonetworks #expedition #vulnerability #CVE

##

CVE-2024-9470(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-10-09T18:31:50

1 posts

A vulnerability in Cortex XSOAR allows the disclosure of incident data to users who do not have the privilege to view the data.

screaminggoat@infosec.exchange at 2024-10-09T17:02:39.000Z ##

Happy #PatchTuesday on a Wednesday from Palo Alto Networks (includes a zero-day)

  • CVE-2024-9469 (CVSSv4: 5.7 medium) Cortex XDR Agent: Local Windows User Can Disable the Agent
  • CVE-2024-9471 (CVSSv4: 5.1 medium) PAN-OS: Privilege Escalation (PE) Vulnerability in XML API
  • CVE-2024-9468 (CVSSv4: 8.2 high) PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet
  • PAN-SA-2024-0010 Expedition: Multiple Vulnerabilities Lead to Firewall Admin Account Takeover
  • CVE-2024-9473 (CVSSv4: 5.2 medium) GlobalProtect App: Local Privilege Escalation (PE) Vulnerability
    • Palo Alto Networks is not aware of any malicious exploitation of this issue. However, a proof of concept for this issue is publicly available.
  • PAN-SA-2024-0011 Chromium: Monthly Vulnerability Updates
  • CVE-2024-9470 (CVSSv4: 5.3 medium) Cortex XSOAR: Information Disclosure Vulnerability

Palo Alto Networks is not aware of any malicious exploitation of these issues.

#paloaltonetworks #expedition #vulnerability #CVE

##

CVE-2024-8015
(9.1 CRITICAL)

EPSS: 0.05%

updated 2024-10-09T15:32:28

2 posts

In Progress Telerik Report Server versions prior to 2024 Q3 (10.2.24.924), a remote code execution attack is possible through object injection via an insecure type resolution vulnerability.

screaminggoat@infosec.exchange at 2024-10-10T18:39:06.000Z ##

Progress Telerik security advisories:

discovered by @codewhitesec

#telerik #vulnerability #cve #progresssoftware

##

codewhitesec@infosec.exchange at 2024-10-10T18:30:15.000Z ##

Using Telerik Reporting or Report Server? Patch now to fix 3 RCEs @mwulftange found (CVE-2024-8015, CVE-2024-8014, CVE-2024-8048). Telerik vulns have a history of being exploited by threat actors according to #CISA Details at code-white.com/public-vulnerab

##

CVE-2024-43047
(7.8 HIGH)

EPSS: 0.06%

updated 2024-10-09T14:39:06.540000

4 posts

Memory corruption while maintaining memory maps of HLOS memory.

avoidthehack@infosec.exchange at 2024-10-10T15:35:00.000Z ##

Hackers targeted #Android users by exploiting zero-day bug in #Qualcomm chips

Zero-day vulnerability (CVE-2024-43047), a use after free in Qualcomm chips under limited, targeted exploitation in the wild. (No info on threat actor, but my guess is nation-state activity.)

While Qualcomm has released a fix for this vulnerability as of September 2024, Android OEMs still have to incorporate it and then roll out updates to users.

#cybersecurity #security #cve

techcrunch.com/2024/10/09/hack

##

tmcyber at 2024-10-10T13:24:13.134Z ##

Android 0Day : ODay en los chipsets de Qualcomm 🆘

Qualcomm anunció el descubrimiento de una vulnerabilidad de día cero en varios de sus conjuntos de chips, que se utilizó para ataques dirigidos a usuarios de dispositivos Android. La vulnerabilidad afecta a 64 conjuntos de chips, incluidos modelos de gama alta como Snapdragon 8 Gen 1, Snapdragon 888+, así como módems y módulos FastConnect.

🖥 Esta vulnerabilidad fue identificada por investigadores de Google Project Zero y confirmada por Google TAG y el Laboratorio de Seguridad de Amnistía Internacional. Se sabe preliminarmente que los ataques estaban dirigidos a ☠️ usuarios individuales y no estaban generalizados. Los informes indican que la vulnerabilidad puede haber sido objeto de una explotación limitada y selectiva.

Por el momento, no hay información detallada sobre quién estuvo detrás de los ataques y quiénes fueron exactamente los afectados.

🥷 CVE-2024-43047 se describe como un problema grave de uso después de la liberación de memoria en el servicio DSP y fue revelado por el investigador Seth Jenkins de Google Project Zero. El error podría provocar daños en la memoria si lo explotan con éxito atacantes locales con pocos privilegios.

La vulnerabilidad de día cero, oficialmente designada CVE-2024-43047, "puede estar sujeta a una explotación dirigida limitada".
- afirma Qualcomm, refiriéndose a Google TAG.

Según Qualcomm, la compañía ya desarrolló y distribuyó un parche a los fabricantes de dispositivos (OEM) para eliminar la vulnerabilidad, pero su integración llevará algún tiempo. Entre los fabricantes cuyos dispositivos pueden ser susceptibles a esta amenaza se encuentran Samsung, Motorola, Oppo, Xiaomi, ZTE y OnePlus.

La lista de chipsets vulnerables incluye tanto modelos emblemáticos como soluciones de gama media como Snapdragon 660 y Snapdragon 680, así como módems 5G, como el Snapdragon X55 5G, que se utiliza en algunos modelos de iPhone 12 por el momento. No hay información exacta sobre si los dispositivos basados ​​en iOS fueron atacados.

😷 Millones de usuarios de Android en todo el mundo siguen siendo vulnerables hasta que los fabricantes publiquen actualizaciones para sus dispositivos.


⤵️x.com/stegaintell/status/18443

##

oversecurity@mastodon.social at 2024-10-09T14:20:06.000Z ##

OEMs Are Urged to Address Vulnerabilities in Device Communication

Qualcomm's 2024 Security Bulletin reveals critical vulnerabilities, including CVE-2024-43047, linked to the FASTRPC driver, urging OEMs to...

🔗️ [Cyble] link.is.it/wevr0r

##

jbhall56@infosec.exchange at 2024-10-09T12:32:11.000Z ##

That vulnerability, CVE-2024-43047, carries a CVSS 7.8-out-of-10 severity rating, and was notably reported by both Google's Project Zero team and Amnesty International's code testers. theregister.com/2024/10/08/qua

##

CVE-2024-43601
(7.1 HIGH)

EPSS: 0.04%

updated 2024-10-08T18:33:29

1 posts

Visual Studio Code for Linux Remote Code Execution Vulnerability

benzogaga33@mamot.fr at 2024-10-09T05:10:02.000Z ##

Visual Studio Code for Linux Remote Code Execution Vulnerability CVE-2024-43601 github.com/microsoft/vscode/se

##

CVE-2024-9379
(6.5 MEDIUM)

EPSS: 0.76%

updated 2024-10-08T18:33:24

6 posts

SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements.

screaminggoat@infosec.exchange at 2024-10-11T22:10:11.000Z ##

Fortinet: Burning Zero Days: Suspected Nation-State Adversary Targets Ivanti CSA
Fortinet describes their incident response for clients who had their Ivanti Cloud Services Appliance (CSA) devices exploited using zero-days CVE-2024-8190, and CVE-2024-8963 (and one other unspecified command injection vulnerability). See the references below for info on those vulnerabilities. This is extremely interesting, as the threat actor, who was still active in the customer's network, actually patched the CVE-2024-8190 vulnerability, which Fortinet assesses was to prevent anyone else from interfering with their attack operations. Indicators of compromise listed.

Okay so what concerns me about this article is that Fortinet doesn't specifically identify the "A publicly unknown command injection vulnerability affecting the resource reports.php." This is very likely CVE-2024-9380 Ivanti CSA OS Command Injection Vulnerability, due to the Threat Signal Report that Fortinet links to in this article. Also missing is CVE-2024-9379 Ivanti CSA SQL Injection and CVE-2024-9381 Ivanti CSA path traversal.

References:

#threatintel #zeroday #ivanti #vulnerability #infosec #cybersecurity #cyberthreatintelligence #CTI #IOC #cyberespionage #ivanticsa #cloudservicesappliance #eitw #activeexploitation #CVE_2024_8190 #CVE_2024_8963 #CVE_2024_29824

##

screaminggoat@infosec.exchange at 2024-10-09T23:07:57.000Z ##

@flagthis check the security advisory again: only two are being exploited forums.ivanti.com/s/article/Se

Ivanti updated their pages to say only CVE-2024-9379 and CVE-2024-9380 ivanti.com/blog/october-2024-s

##

screaminggoat@infosec.exchange at 2024-10-09T18:40:40.000Z ##

Ivanti Security Advisory: Ivanti CSA (Cloud Services Application) (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)
Very sneaky of Ivanti to quietly update the security advisory without a changelog: They removed CVE-2024-9381 (CVSSv3: 7.2 high) Path traversal in Ivanti CSA before version 5.0.2 from the exploitation announcement:

We have observed limited exploitation of CSA 4.6 when CVE-2024-9379 or CVE-2024-9380 are chained with CVE-2024-8963, present in CSA 4.6 patch 518 and below, it could lead to unauthenticated remote code execution. We have not observed these vulnerabilities being exploited in CSA 5.0.

See parent toot above for the original wording. cc: @cR0w @reverseics

#ivanti #patchtuesday #zeroday #vulnerability #cve #activeexploitation #ivanticsa #cloudservicesappliance #eitw

##

cisakevtracker@mastodon.social at 2024-10-09T15:01:08.000Z ##

CVE ID: CVE-2024-9379
Vendor: Ivanti
Product: Cloud Services Appliance (CSA)
Date Added: 2024-10-09
Vulnerability: Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability
Notes: forums.ivanti.com/s/article/Se ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2024-10-09T15:00:52.000Z ##

CVE ID: CVE-2024-9380
Vendor: Ivanti
Product: Cloud Services Appliance (CSA)
Date Added: 2024-10-09
Vulnerability: Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability
Notes: forums.ivanti.com/s/article/Se ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

screaminggoat@infosec.exchange at 2024-10-09T14:18:18.000Z ##

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
Hot off the press! CISA only adds two of the Ivanti exploited zero-day vulnerabilities, and a Fortinet vulnerability to the KEV Catalog:

  • CVE-2024-9380 (7.2 high, disclosed 08 October 2024 by Ivanti as exploited zero-day) Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability
  • CVE-2024-9379 (6.5 medium, disclosed 08 October 2024 by Ivanti as exploited zero-day) Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability
  • CVE-2024-23113 (9.8 critical, disclosed 08 February 2024 by Fortinet) Fortinet Multiple Products Format String Vulnerability

#cisa #cisakev #kev #knownexploitedvulnerabilitiescatalog #vulnerability #cve #eitw #activeexploitation #zeroday

##

CVE-2024-20659
(7.1 HIGH)

EPSS: 0.05%

updated 2024-10-08T18:33:24

2 posts

Windows Hyper-V Security Feature Bypass Vulnerability

4Dgifts@mastodon.social at 2024-10-09T11:47:41.000Z ##

@froge oh its definetelly one or several of the PixieFail vulns. MSRC send notice out of the blue that they would credit us for CVE-2024-20659 but they did not say what it fixes.
The CVE they assigned is not one of 9 originally assigned to PixieFaul bugs 🤷‍♂️

blog.quarkslab.com/pixiefail-n

##

4Dgifts@mastodon.social at 2024-10-09T00:34:26.000Z ##

This reads like RCE from the local broadcast domain to me but I am not in the MSRC hive mind so no idea why they call it "security feature bypass"
Perhaps UEFI is considered a security feature that can be bypassed?
🤔
msrc.microsoft.com/update-guid

##

CVE-2024-9381
(7.2 HIGH)

EPSS: 0.05%

updated 2024-10-08T18:33:23

7 posts

Path traversal in Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to bypass restrictions.

jos1264@social.skynetcloud.site at 2024-10-18T04:35:03.000Z ##

CVE-2024-9381 – Ivanti CSA Security Vulnerability – October 2024 – Source: securityboulevard.com ciso2ciso.com/cve-2024-9381-iv #rssfeedpostgeneratorecho #SecurityBloggersNetwork #CyberSecurityNews #SecurityBoulevard #SecurityResearch #Cybersecurity #Vulnerability #CVE

##

jos1264@social.skynetcloud.site at 2024-10-18T04:35:03.000Z ##

CVE-2024-9381 – Ivanti CSA Security Vulnerability – October 2024 – Source: securityboulevard.com ciso2ciso.com/cve-2024-9381-iv #rssfeedpostgeneratorecho #SecurityBloggersNetwork #CyberSecurityNews #SecurityBoulevard #SecurityResearch #Cybersecurity #Vulnerability #CVE

##

screaminggoat@infosec.exchange at 2024-10-11T22:10:11.000Z ##

Fortinet: Burning Zero Days: Suspected Nation-State Adversary Targets Ivanti CSA
Fortinet describes their incident response for clients who had their Ivanti Cloud Services Appliance (CSA) devices exploited using zero-days CVE-2024-8190, and CVE-2024-8963 (and one other unspecified command injection vulnerability). See the references below for info on those vulnerabilities. This is extremely interesting, as the threat actor, who was still active in the customer's network, actually patched the CVE-2024-8190 vulnerability, which Fortinet assesses was to prevent anyone else from interfering with their attack operations. Indicators of compromise listed.

Okay so what concerns me about this article is that Fortinet doesn't specifically identify the "A publicly unknown command injection vulnerability affecting the resource reports.php." This is very likely CVE-2024-9380 Ivanti CSA OS Command Injection Vulnerability, due to the Threat Signal Report that Fortinet links to in this article. Also missing is CVE-2024-9379 Ivanti CSA SQL Injection and CVE-2024-9381 Ivanti CSA path traversal.

References:

#threatintel #zeroday #ivanti #vulnerability #infosec #cybersecurity #cyberthreatintelligence #CTI #IOC #cyberespionage #ivanticsa #cloudservicesappliance #eitw #activeexploitation #CVE_2024_8190 #CVE_2024_8963 #CVE_2024_29824

##

screaminggoat@infosec.exchange at 2024-10-09T23:07:57.000Z ##

@flagthis check the security advisory again: only two are being exploited forums.ivanti.com/s/article/Se

Ivanti updated their pages to say only CVE-2024-9379 and CVE-2024-9380 ivanti.com/blog/october-2024-s

##

screaminggoat@infosec.exchange at 2024-10-09T18:40:40.000Z ##

Ivanti Security Advisory: Ivanti CSA (Cloud Services Application) (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)
Very sneaky of Ivanti to quietly update the security advisory without a changelog: They removed CVE-2024-9381 (CVSSv3: 7.2 high) Path traversal in Ivanti CSA before version 5.0.2 from the exploitation announcement:

We have observed limited exploitation of CSA 4.6 when CVE-2024-9379 or CVE-2024-9380 are chained with CVE-2024-8963, present in CSA 4.6 patch 518 and below, it could lead to unauthenticated remote code execution. We have not observed these vulnerabilities being exploited in CSA 5.0.

See parent toot above for the original wording. cc: @cR0w @reverseics

#ivanti #patchtuesday #zeroday #vulnerability #cve #activeexploitation #ivanticsa #cloudservicesappliance #eitw

##

cisakevtracker@mastodon.social at 2024-10-09T15:01:08.000Z ##

CVE ID: CVE-2024-9379
Vendor: Ivanti
Product: Cloud Services Appliance (CSA)
Date Added: 2024-10-09
Vulnerability: Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability
Notes: forums.ivanti.com/s/article/Se ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2024-10-09T15:00:52.000Z ##

CVE ID: CVE-2024-9380
Vendor: Ivanti
Product: Cloud Services Appliance (CSA)
Date Added: 2024-10-09
Vulnerability: Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability
Notes: forums.ivanti.com/s/article/Se ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2024-9441
(9.8 CRITICAL)

EPSS: 0.04%

updated 2024-10-04T13:50:43.727000

1 posts

The Linear eMerge e3-Series through version 1.00-07 is vulnerable to an OS command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary OS commands via the login_id parameter when invoking the forgot_password functionality over HTTP.

2 repos

https://github.com/p33d/CVE-2024-9441

https://github.com/adhikara13/CVE-2024-9441

screaminggoat@infosec.exchange at 2024-10-10T15:27:14.000Z ##

VulnCheck: Following the Trail of Flax Typhoon to Uncover Newly Discovered Vulnerabilities in Linear Emerge Access Control Devices
References:

  • CVE-2019-7256 (9.8 critical, disclosed 02 July 2019) Linear eMerge E3-Series command injection vulnerability
  • CVE-2024-9441 (9.8 critical) Linear eMerge E3-Series OS command injection vulnerability (has proof of concept)

VulnCheck warns that Linear eMerge E3 has an unpatched OS command injection vulnerability in Linear eMerge E3-Series devices and multiple people are creating proofs of concept for it. CVE-2019-7256, which is a similar vulnerability on the same model device, was reported by FBI (PDF) to be exploited by Flax Typhoon's botnet. Flax Typhoon, a PRC state-sponsored APT, is publicly attributed to the Chinese company Integrity Tech by the U.S. Government. It is likely that Flax Typhoon would incorporate proof of concept exploit code for an unpatched vulnerability to their arsenal.

#linear #emerge #vulnerability #flaxtyphoon #china #cyberespionage #proofofconcept #cve

##

CVE-2024-44193
(8.4 HIGH)

EPSS: 0.04%

updated 2024-10-03T21:32:08

1 posts

A logic issue was addressed with improved restrictions. This issue is fixed in iTunes 12.13.3 for Windows. A local attacker may be able to elevate their privileges.

1 repos

https://github.com/mbog14/CVE-2024-44193

obivan@infosec.exchange at 2024-10-16T12:31:30.000Z ##

Hacking Windows through iTunes  - Local Privilege Escalation 0-day github.com/mbog14/CVE-2024-441

##

CVE-2024-38813
(7.5 HIGH)

EPSS: 0.09%

updated 2024-10-02T15:31:39

4 posts

The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet.

AAKL at 2024-10-22T14:01:04.936Z ##

Broadcom patched this yesterday, if you missed it:

vCenter Server updates address heap-overflow and privilege escalation vulnerabilities CVE-2024-38812 and CVE-2024-38813, both critical support.broadcom.com/web/ecx/s

More: thehackernews.com/2024/10/vmwa @thehackernews

##

jos1264@social.skynetcloud.site at 2024-10-22T11:40:03.000Z ##

VMware fixes critical vCenter Server RCE bug – again! (CVE-2024-38812) helpnetsecurity.com/2024/10/22 #securityupdate #virtualization #vulnerability #Don'tmiss #Hotstuff #Broadcom #VMware #News #CVE

##

AAKL@infosec.exchange at 2024-10-22T14:01:04.000Z ##

Broadcom patched this yesterday, if you missed it:

#VMware vCenter Server updates address heap-overflow and privilege escalation vulnerabilities CVE-2024-38812 and CVE-2024-38813, both critical support.broadcom.com/web/ecx/s

More: thehackernews.com/2024/10/vmwa @thehackernews #cybersecurity #Infosec

##

jos1264@social.skynetcloud.site at 2024-10-22T11:40:03.000Z ##

VMware fixes critical vCenter Server RCE bug – again! (CVE-2024-38812) helpnetsecurity.com/2024/10/22 #securityupdate #virtualization #vulnerability #Don'tmiss #Hotstuff #Broadcom #VMware #News #CVE

##

CVE-2024-38812
(9.8 CRITICAL)

EPSS: 0.09%

updated 2024-10-02T15:30:37

15 posts

The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

oversecurity@mastodon.social at 2024-10-22T14:20:07.000Z ##

VMware fixes bad patch for critical vCenter Server RCE flaw

VMware has released another security update for CVE-2024-38812, a critical VMware vCenter Server remote code execution vulnerability that was not...

🔗️ [Bleepingcomputer] link.is.it/bzq846

##

AAKL at 2024-10-22T14:01:04.936Z ##

Broadcom patched this yesterday, if you missed it:

vCenter Server updates address heap-overflow and privilege escalation vulnerabilities CVE-2024-38812 and CVE-2024-38813, both critical support.broadcom.com/web/ecx/s

More: thehackernews.com/2024/10/vmwa @thehackernews

##

jos1264@social.skynetcloud.site at 2024-10-22T11:40:03.000Z ##

VMware fixes critical vCenter Server RCE bug – again! (CVE-2024-38812) helpnetsecurity.com/2024/10/22 #securityupdate #virtualization #vulnerability #Don'tmiss #Hotstuff #Broadcom #VMware #News #CVE

##

jbhall56 at 2024-10-22T11:38:40.067Z ##

The vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), concerns a case of heap-overflow vulnerability in the implementation of the DCE/RPC protocol. thehackernews.com/2024/10/vmwa

##

beyondmachines1 at 2024-10-22T10:01:23.802Z ##

VMware issues second patch for CVE-2024-38812 vCenter Server flaw

beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2024-10-22T09:40:02.000Z ##

VMware vCenter : un second patch pour cette faille de sécurité critique déjà corrigée en septembre dernier ! it-connect.fr/vmware-vcenter-s #ActuCybersécurité #Cybersécurité #Vulnérabilité #VMware

##

decio at 2024-10-22T06:21:20.273Z ##

🛑 MAJ 22 octobre 2024 :

a annoncé que les correctifs publiés le 17 sept. 2024 ne couvraient pas complètement la vulnérabilité CVE-2024-38812. Il est important pour tous les clients d’appliquer les derniers correctifs disponibles dans la matrice de réponse. Les patches pour la version 8.0 U2 sont également disponibles.

Produits impactés :

  • vCenter Server 8.0
  • vCenter Server 7.0
  • VMware Cloud Foundation 5.x
  • VMware Cloud Foundation 4.x

👇
support.broadcom.com/web/ecx/s


##

patchnow24x7 at 2024-10-22T05:17:24.574Z ##

Update on CVE-2024-38812: Heap-Buffer Overflow vulnerability in VMWare vCenter: VMware has determined that the vCenter patches released previously did not completely mitigate the vulnerability. Refer attached image for the UPDATED response matrix.

Source: support.broadcom.com/web/ecx/s

##

oversecurity@mastodon.social at 2024-10-22T14:20:07.000Z ##

VMware fixes bad patch for critical vCenter Server RCE flaw

VMware has released another security update for CVE-2024-38812, a critical VMware vCenter Server remote code execution vulnerability that was not...

🔗️ [Bleepingcomputer] link.is.it/bzq846

##

AAKL@infosec.exchange at 2024-10-22T14:01:04.000Z ##

Broadcom patched this yesterday, if you missed it:

#VMware vCenter Server updates address heap-overflow and privilege escalation vulnerabilities CVE-2024-38812 and CVE-2024-38813, both critical support.broadcom.com/web/ecx/s

More: thehackernews.com/2024/10/vmwa @thehackernews #cybersecurity #Infosec

##

jos1264@social.skynetcloud.site at 2024-10-22T11:40:03.000Z ##

VMware fixes critical vCenter Server RCE bug – again! (CVE-2024-38812) helpnetsecurity.com/2024/10/22 #securityupdate #virtualization #vulnerability #Don'tmiss #Hotstuff #Broadcom #VMware #News #CVE

##

jbhall56@infosec.exchange at 2024-10-22T11:38:40.000Z ##

The vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), concerns a case of heap-overflow vulnerability in the implementation of the DCE/RPC protocol. thehackernews.com/2024/10/vmwa

##

beyondmachines1@infosec.exchange at 2024-10-22T10:01:23.000Z ##

VMware issues second patch for CVE-2024-38812 vCenter Server flaw
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2024-10-22T09:40:02.000Z ##

VMware vCenter : un second patch pour cette faille de sécurité critique déjà corrigée en septembre dernier ! it-connect.fr/vmware-vcenter-s #ActuCybersécurité #Cybersécurité #Vulnérabilité #VMware

##

decio@infosec.exchange at 2024-10-22T06:21:20.000Z ##

🛑 MAJ 22 octobre 2024 :

#Broadcom a annoncé que les correctifs #VMware #vCenter publiés le 17 sept. 2024 ne couvraient pas complètement la vulnérabilité CVE-2024-38812. Il est important pour tous les clients d’appliquer les derniers correctifs disponibles dans la matrice de réponse. Les patches pour la version 8.0 U2 sont également disponibles.

Produits impactés :

  • vCenter Server 8.0
  • vCenter Server 7.0
  • VMware Cloud Foundation 5.x
  • VMware Cloud Foundation 4.x

👇
support.broadcom.com/web/ecx/s

#Cyberveille #CVE_2024_38812
#Patch

##

CVE-2024-44133
(5.5 MEDIUM)

EPSS: 0.04%

updated 2024-09-24T18:31:24

11 posts

This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15. On MDM managed devices, an app may be able to bypass certain Privacy preferences.

tarnkappeinfo@social.tchncs.de at 2024-10-18T07:09:43.000Z ##

📬 macOS-Schwachstelle umgeht Datenschutzkontrollen im Safari-Browser
#ITSicherheit #CVE202444133 #HMSurf #macOS #powerdir #Safari #Shrootless sc.tarnkappe.info/d1e190

##

tarnkappeinfo@social.tchncs.de at 2024-10-18T07:09:43.000Z ##

📬 macOS-Schwachstelle umgeht Datenschutzkontrollen im Safari-Browser
#ITSicherheit #CVE202444133 #HMSurf #macOS #powerdir #Safari #Shrootless sc.tarnkappe.info/d1e190

##

tarnkappeinfo@social.tchncs.de at 2024-10-18T07:09:43.000Z ##

📬 macOS-Schwachstelle umgeht Datenschutzkontrollen im Safari-Browser
#ITSicherheit #CVE202444133 #HMSurf #macOS #powerdir #Safari #Shrootless sc.tarnkappe.info/d1e190

##

tarnkappeinfo@social.tchncs.de at 2024-10-18T07:09:43.000Z ##

📬 macOS-Schwachstelle umgeht Datenschutzkontrollen im Safari-Browser
#ITSicherheit #CVE202444133 #HMSurf #macOS #powerdir #Safari #Shrootless sc.tarnkappe.info/d1e190

##

571906@ap.podcastindex.org at 2024-10-22T02:00:02.000Z ##

New Episode: ISC StormCast for Tuesday, October 22nd, 2024

Shownotes:
A Network Nerd's Take on Emergency Preparedness
https://isc.sans.edu/diary/A%20Network%20Nerd%27s%20Take%20on%20Emergency%20Preparedness/31356
HM Surf Vulnerability Access to Camera Exploited CVE-2024-44133
https://www.microsoft.com/en-us/

AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans

Or Listen right here.

##

AAKL at 2024-10-21T14:45:10.840Z ##

Microsoft: HM Surf vulnerability CVE-2024-44133 might already be under exploit by major family https:/www.theregister.com/2024/10/21/microsoft_macos_hm_surf/ @theregister

##

Hackread@mstdn.social at 2024-10-21T10:32:57.000Z ##

🚨 Microsoft discovered a #macOS vulnerability, “HM Surf” (CVE-2024-44133), which bypasses TCC protections, allowing unauthorised access to sensitive data like camera and microphone.

#CyberSecurity #vulnerability #Apple #Microsoft

Read: hackread.com/hm-surf-macos-fla

##

jbhall56 at 2024-10-18T12:05:50.765Z ##

The shortcoming, codenamed HM Surf by the tech giant, is tracked as CVE-2024-44133. It was addressed by Apple as part of macOS Sequoia 15 by removing the vulnerable code. thehackernews.com/2024/10/micr

##

AAKL@infosec.exchange at 2024-10-21T14:45:10.000Z ##

Microsoft: #macOS HM Surf vulnerability CVE-2024-44133 might already be under exploit by major #malware family https:/www.theregister.com/2024/10/21/microsoft_macos_hm_surf/ @theregister #Microsoft #cybersecurity #Apple #infosec

##

Hackread@mstdn.social at 2024-10-21T10:32:57.000Z ##

🚨 Microsoft discovered a #macOS vulnerability, “HM Surf” (CVE-2024-44133), which bypasses TCC protections, allowing unauthorised access to sensitive data like camera and microphone.

#CyberSecurity #vulnerability #Apple #Microsoft

Read: hackread.com/hm-surf-macos-fla

##

jbhall56@infosec.exchange at 2024-10-18T12:05:50.000Z ##

The shortcoming, codenamed HM Surf by the tech giant, is tracked as CVE-2024-44133. It was addressed by Apple as part of macOS Sequoia 15 by removing the vulnerable code. thehackernews.com/2024/10/micr

##

CVE-2024-8260
(6.1 MEDIUM)

EPSS: 0.04%

updated 2024-09-20T22:06:12

2 posts

A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions.

CVE-2024-7254
(0 None)

EPSS: 0.04%

updated 2024-09-20T12:30:17.483000

3 posts

Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.

eed3si9n@mastodon.social at 2024-10-20T03:52:46.000Z ##

sbt 1.10.3 is released, featuring
- CVE-2024-7254 fix by updating protobuf-java to 3.25.5
- updates metabuild Scala version to 2.12.20
- fix for the spurious “illegal reflective access operation” error on JDK 11
- revert of the invalidation of circular-dependent sources

eed3si9n.com/sbt-1.10.3 #Scala

##

eed3si9n@mastodon.social at 2024-10-20T03:52:46.000Z ##

sbt 1.10.3 is released, featuring
- CVE-2024-7254 fix by updating protobuf-java to 3.25.5
- updates metabuild Scala version to 2.12.20
- fix for the spurious “illegal reflective access operation” error on JDK 11
- revert of the invalidation of circular-dependent sources

eed3si9n.com/sbt-1.10.3 #Scala

##

screaminggoat@infosec.exchange at 2024-10-16T17:19:31.000Z ##

Atlassian multiple security advisories: Security Bulletin - October 15 2024

No mention of exploitation that I can see.

#atlassian #confluence #bitbucket #jira #vulnerability #cve

##

CVE-2024-8698
(7.7 HIGH)

EPSS: 0.90%

updated 2024-09-19T21:34:31

1 posts

A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses t

Nuclei template

1 repos

https://github.com/huydoppaz/CVE-2024-8698-POC

CVE-2024-8963
(9.4 CRITICAL)

EPSS: 30.99%

updated 2024-09-19T18:30:58

2 posts

Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality.

screaminggoat@infosec.exchange at 2024-10-11T22:10:11.000Z ##

Fortinet: Burning Zero Days: Suspected Nation-State Adversary Targets Ivanti CSA
Fortinet describes their incident response for clients who had their Ivanti Cloud Services Appliance (CSA) devices exploited using zero-days CVE-2024-8190, and CVE-2024-8963 (and one other unspecified command injection vulnerability). See the references below for info on those vulnerabilities. This is extremely interesting, as the threat actor, who was still active in the customer's network, actually patched the CVE-2024-8190 vulnerability, which Fortinet assesses was to prevent anyone else from interfering with their attack operations. Indicators of compromise listed.

Okay so what concerns me about this article is that Fortinet doesn't specifically identify the "A publicly unknown command injection vulnerability affecting the resource reports.php." This is very likely CVE-2024-9380 Ivanti CSA OS Command Injection Vulnerability, due to the Threat Signal Report that Fortinet links to in this article. Also missing is CVE-2024-9379 Ivanti CSA SQL Injection and CVE-2024-9381 Ivanti CSA path traversal.

References:

#threatintel #zeroday #ivanti #vulnerability #infosec #cybersecurity #cyberthreatintelligence #CTI #IOC #cyberespionage #ivanticsa #cloudservicesappliance #eitw #activeexploitation #CVE_2024_8190 #CVE_2024_8963 #CVE_2024_29824

##

screaminggoat@infosec.exchange at 2024-10-09T18:40:40.000Z ##

Ivanti Security Advisory: Ivanti CSA (Cloud Services Application) (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)
Very sneaky of Ivanti to quietly update the security advisory without a changelog: They removed CVE-2024-9381 (CVSSv3: 7.2 high) Path traversal in Ivanti CSA before version 5.0.2 from the exploitation announcement:

We have observed limited exploitation of CSA 4.6 when CVE-2024-9379 or CVE-2024-9380 are chained with CVE-2024-8963, present in CSA 4.6 patch 518 and below, it could lead to unauthenticated remote code execution. We have not observed these vulnerabilities being exploited in CSA 5.0.

See parent toot above for the original wording. cc: @cR0w @reverseics

#ivanti #patchtuesday #zeroday #vulnerability #cve #activeexploitation #ivanticsa #cloudservicesappliance #eitw

##

CVE-2024-45409
(10.0 CRITICAL)

EPSS: 16.41%

updated 2024-09-16T15:29:27

4 posts

Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability was reported by ahacker1 of SecureSAML (ah

1 repos

https://github.com/synacktiv/CVE-2024-45409

jos1264@social.skynetcloud.site at 2024-10-15T12:50:03.000Z ##

Active Exploitation of SAML Vulnerability CVE-2024-45409 Detected by Cyble Sensors – Source:cyble.com ciso2ciso.com/active-exploitat #Vulnerability #CybleBlog #Exploit #'Cyber

##

jos1264@social.skynetcloud.site at 2024-10-15T12:40:02.000Z ##

Active Exploitation of SAML Vulnerability CVE-2024-45409 Detected by Cyble Sensors cyble.com/blog/active-exploita #Vulnerability #Exploit

##

oversecurity@mastodon.social at 2024-10-15T12:21:08.000Z ##

Active Exploitation of SAML Vulnerability CVE-2024-45409 Detected by Cyble Sensors

Cyble's Global Sensor Intelligence Network detects the active exploitation of CVE-2024-45409, a critical SAML vulnerability affecting GitLab, which...

🔗️ [Cyble] link.is.it/b3r1pm

##

jos1264@social.skynetcloud.site at 2024-10-09T13:00:03.000Z ##

Exploit code for critical GitLab auth bypass flaw released (CVE-2024-45409) helpnetsecurity.com/2024/10/09 #ProjectDiscovery #authentication #securityupdate #vulnerability #Don'tmiss #Hotstuff #Synactiv #exploit #GitLab #News #PoC

##

CVE-2024-8529
(10.0 CRITICAL)

EPSS: 0.09%

updated 2024-09-12T09:31:27

2 posts

The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_fields' parameter of the /wp-json/lp/v1/courses/archive-course REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attacker

1 repos

https://github.com/RandomRobbieBF/CVE-2024-8529

CVE-2024-8190
(7.2 HIGH)

EPSS: 15.12%

updated 2024-09-10T21:31:40

2 posts

An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability.

2 repos

https://github.com/horizon3ai/CVE-2024-8190

https://github.com/tequilasunsh1ne/ivanti_CVE_2024_8190

jbz@indieweb.social at 2024-10-16T09:00:02.000Z ##

💣 Burning Zero Days: Suspected Nation-State Adversary Targets Ivanti CSA
— FortiGuard Labs

「 During the investigation, FGIR came across an adversary who had gained access to the customer’s network by exploiting the CVE-2024-8190 and two previously unknown vulnerabilities affecting the PHP front end of the Ivanti CSA appliance 」

fortinet.com/blog/threat-resea

#ivanti #zeroday #infosec

##

screaminggoat@infosec.exchange at 2024-10-11T22:10:11.000Z ##

Fortinet: Burning Zero Days: Suspected Nation-State Adversary Targets Ivanti CSA
Fortinet describes their incident response for clients who had their Ivanti Cloud Services Appliance (CSA) devices exploited using zero-days CVE-2024-8190, and CVE-2024-8963 (and one other unspecified command injection vulnerability). See the references below for info on those vulnerabilities. This is extremely interesting, as the threat actor, who was still active in the customer's network, actually patched the CVE-2024-8190 vulnerability, which Fortinet assesses was to prevent anyone else from interfering with their attack operations. Indicators of compromise listed.

Okay so what concerns me about this article is that Fortinet doesn't specifically identify the "A publicly unknown command injection vulnerability affecting the resource reports.php." This is very likely CVE-2024-9380 Ivanti CSA OS Command Injection Vulnerability, due to the Threat Signal Report that Fortinet links to in this article. Also missing is CVE-2024-9379 Ivanti CSA SQL Injection and CVE-2024-9381 Ivanti CSA path traversal.

References:

#threatintel #zeroday #ivanti #vulnerability #infosec #cybersecurity #cyberthreatintelligence #CTI #IOC #cyberespionage #ivanticsa #cloudservicesappliance #eitw #activeexploitation #CVE_2024_8190 #CVE_2024_8963 #CVE_2024_29824

##

CVE-2024-43965
(8.2 HIGH)

EPSS: 0.09%

updated 2024-08-29T18:31:42

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Smackcoders SendGrid for WordPress allows SQL Injection.This issue affects SendGrid for WordPress: from n/a through 1.4.

1 repos

https://github.com/RandomRobbieBF/CVE-2024-43965

CVE-2019-7256
(9.8 CRITICAL)

EPSS: 97.25%

updated 2024-08-13T19:20:23.200000

1 posts

Linear eMerge E3-Series devices allow Command Injections.

Nuclei template

screaminggoat@infosec.exchange at 2024-10-10T15:27:14.000Z ##

VulnCheck: Following the Trail of Flax Typhoon to Uncover Newly Discovered Vulnerabilities in Linear Emerge Access Control Devices
References:

  • CVE-2019-7256 (9.8 critical, disclosed 02 July 2019) Linear eMerge E3-Series command injection vulnerability
  • CVE-2024-9441 (9.8 critical) Linear eMerge E3-Series OS command injection vulnerability (has proof of concept)

VulnCheck warns that Linear eMerge E3 has an unpatched OS command injection vulnerability in Linear eMerge E3-Series devices and multiple people are creating proofs of concept for it. CVE-2019-7256, which is a similar vulnerability on the same model device, was reported by FBI (PDF) to be exploited by Flax Typhoon's botnet. Flax Typhoon, a PRC state-sponsored APT, is publicly attributed to the Chinese company Integrity Tech by the U.S. Government. It is likely that Flax Typhoon would incorporate proof of concept exploit code for an unpatched vulnerability to their arsenal.

#linear #emerge #vulnerability #flaxtyphoon #china #cyberespionage #proofofconcept #cve

##

CVE-2024-38178
(7.5 HIGH)

EPSS: 1.32%

updated 2024-08-13T18:31:21

7 posts

Scripting Engine Memory Corruption Vulnerability

screaminggoat at 2024-10-16T01:55:22.227Z ##

anyone read Korean? ASEC: ASEC and NCSC Release Joint Report on Microsoft Zero-Day Browser Vulnerability (CVE-2024-38178)
See parent toot for information on CVE-2024-38178. AhnLab SEcurity intelligence Center (ASEC) and Korea's National Cyber Security Center (NCSC) published a joint report "Operation Code on Toast by TA-RedAnt" confirming that the DPRK actor known as Scarcruft (APT37) exploited CVE-2024-38178 as a zero-day:

  • This operation exploited a zero-day vulnerability in IE to utilize a specific toast ad program that is installed alongside various free software.
  • TA-RedAnt first attacked the Korean online advertising agency server for ad programs to download ad content. They then injected vulnerability code into the server’s ad content script. This vulnerability is exploited when the ad program downloads and renders the ad content. As a result, a zero-click attack occurred without any interaction from the user.
  • This vulnerability occurs when one type of data is mistakenly treated as another during the optimization process of IE’s JavaScript engine (jscript9.dll), allowing type confusion to occur. TA-RedAnt exploited this vulnerability to trick victims into downloading malware on their desktops with the toast ad program installed. After infecting the system, various malicious behaviors can be performed, such as remote commands.

##

screaminggoat@infosec.exchange at 2024-10-16T01:55:22.000Z ##

anyone read Korean? ASEC: ASEC and NCSC Release Joint Report on Microsoft Zero-Day Browser Vulnerability (CVE-2024-38178)
See parent toot for information on CVE-2024-38178. AhnLab SEcurity intelligence Center (ASEC) and Korea's National Cyber Security Center (NCSC) published a joint report "Operation Code on Toast by TA-RedAnt" confirming that the DPRK actor known as Scarcruft (APT37) exploited CVE-2024-38178 as a zero-day:

  • This operation exploited a zero-day vulnerability in IE to utilize a specific toast ad program that is installed alongside various free software.
  • TA-RedAnt first attacked the Korean online advertising agency server for ad programs to download ad content. They then injected vulnerability code into the server’s ad content script. This vulnerability is exploited when the ad program downloads and renders the ad content. As a result, a zero-click attack occurred without any interaction from the user.
  • This vulnerability occurs when one type of data is mistakenly treated as another during the optimization process of IE’s JavaScript engine (jscript9.dll), allowing type confusion to occur. TA-RedAnt exploited this vulnerability to trick victims into downloading malware on their desktops with the toast ad program installed. After infecting the system, various malicious behaviors can be performed, such as remote commands.

#northkorea #apt #scarcruft #cyberespionage #CVE_2024_38178 #asec #zeroday #vulnerability #CVE #eitw #cisakev #kev #KnownExploitedVulnerabilitiesCatalog #activeexploitation

##

fredbrooker@witter.cz at 2024-10-18T19:59:22.000Z ##

A North Korean threat actor has exploited a recent Internet Explorer zero-day vulnerability in a supply chain attack, threat intelligence firm AhnLab and South Korea’s National Cyber Security Center (NCSC) say.

Tracked as CVE-2024-38178, the security defect is described as a scripting engine memory corruption issue that allows remote attackers to execute arbitrary code on target systems that use Edge in Internet Explorer Mode.

fuck Windows, use Linux!

#security

##

avoidthehack at 2024-10-17T17:09:31.507Z ##

Malicious ads exploited Internet Explorer zero day to drop

Yes, Internet Explorer has been officially EOL since 2022, but it’s still included in Windows. Some older software may also use Internet explorer components.

Nation-state APT compromised servers of an ad agency to push malicious toast ads, which exploit CVE-2024-38178 to achieve code execution privileges. The attackers then drop RokRAT, which can exfil data and files from the infected machine.

Microsoft has apparently fixed this flaw, but this does not guarantee older software using outdated Internet Explorer components will also update.

bleepingcomputer.com/news/secu

##

avoidthehack@infosec.exchange at 2024-10-17T17:09:31.000Z ##

Malicious ads exploited Internet Explorer zero day to drop #malware

Yes, Internet Explorer has been officially EOL since 2022, but it’s still included in Windows. Some older software may also use Internet explorer components.

Nation-state APT compromised servers of an ad agency to push malicious toast ads, which exploit CVE-2024-38178 to achieve code execution privileges. The attackers then drop RokRAT, which can exfil data and files from the infected machine.

Microsoft has apparently fixed this flaw, but this does not guarantee older software using outdated Internet Explorer components will also update.

#cybersecurity #security

bleepingcomputer.com/news/secu

##

AAKL@infosec.exchange at 2024-10-16T13:42:06.000Z ##

AhnLab and NCSC Release Joint Report on Microsoft Zero-Day Browser Vulnerability (CVE-2024-38178) asec.ahnlab.com/en/83877/

More: North Korean #ScarCruft Exploits #Windows Zero-Day to Spread #RokRAT Malware thehackernews.com/2024/10/nort @thehackernews #cybersecurity #infosec #Microsoft #zeroday

##

screaminggoat@infosec.exchange at 2024-10-16T02:10:22.000Z ##

Notes for myself based on the 33 page PDF

  • Table of contents has an overview of Operation Code on Toast by TA-RedAnt, as well as Past similar IE vulnerability exploits. Then it provides detailed analysis contents: payload delivery, exploitation, background, vulnerability CVE-2024-38178 analysis. Then a section on Malware: installation, command and control. Ends with conclusion and IOC.
  • May 2024: large scale attack discovered through incident response by ASEC and NCSC.
  • "delivered through vulnerability code, which are called 'Toast advertisements' in the advertising industry"
  • they mention past Scarcruft zero-day exploitation such as CVE-2020-1380 (reported by Volexity), and CVE-2022-41128 (reported by Google TAG)
  • Free software uses advertising servers to display HTML/JavaScript ads. Scarcruft hacked the advertising server for a domestic advertising agency, which then served a malicious iFrame with the JavaScript file named ad_toast
  • malware confirmed to be RokRAT, executed in-memory. Ruby is used for persistence, commercial cloud servers for C2.
  • malware checks for debugging environment (T1622)
  • 2nd stage loader changes behavior based on antivirus program installed on computer: Avast, Symantec
##

CVE-2024-21147
(7.4 HIGH)

EPSS: 0.09%

updated 2024-08-13T03:32:22

1 posts

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allow

CVE-2024-38200
(7.5 HIGH)

EPSS: 0.56%

updated 2024-08-12T15:30:50

1 posts

Microsoft Office Spoofing Vulnerability

1 repos

https://github.com/passtheticket/CVE-2024-38200

CVE-2024-5910(CVSS UNKNOWN)

EPSS: 0.90%

updated 2024-08-09T05:01:56

1 posts

Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition. Note: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue.

screaminggoat@infosec.exchange at 2024-10-09T16:51:28.000Z ##

Horizon3: Palo Alto Expedition: From N-Day to Full Compromise
References:

Daaaaaaaamn @hacks_zach, Zach Hanley at it again with the Palo Alto Networks vulnerabilities. In trying to find CVE2-2024-5910 in Expedition (a configuration migration tool from a supported vendor to Palo Alto Networks PAN-OS), he found CVE-2024-9464, CVE-2024-9465 and CVE-2024-9466. It appears that CVE-2024-9465 (unauth SQL injection) leads to leaking credentials via "users" and "devices" tables which contain password hashes and device API keys. This is the CVE-2024-9466.

#paloaltonetworks #expedition #vulnerability #CVE #vulnerabilityanalysis

##

CVE-2024-6197
(7.5 HIGH)

EPSS: 0.07%

updated 2024-08-01T15:33:14

1 posts

libcurl's ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. Unfortunately, when doing so it also invokes `free()` on a 4 byte localstack buffer. Most modern malloc implementations detect this error and immediately abort. Some however accept the input pointer and add that memory to its list of available chunks. This

screaminggoat@infosec.exchange at 2024-10-10T23:50:32.000Z ##

Microsoft Security Response Center (MSRC) updated the title of the publicly disclosed vulnerability CVE-2024-6197 to be "Hackerone: CVE-2024-6197 Freeing stack buffer in utf8asn1str" (original was "Open Source Curl Remote Code Execution Vulnerability")

Version: 1.1; Revision Date: Oct 10, 2024. Description: "Updated CVE title. This is an informational change only."

##

CVE-2024-7135
(6.5 MEDIUM)

EPSS: 0.10%

updated 2024-07-31T12:31:48

2 posts

The Tainacan plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_file' function in all versions up to, and including, 0.21.7. The function is also vulnerable to directory traversal. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can c

1 repos

https://github.com/RandomRobbieBF/CVE-2024-7135

CVE-2024-38094
(7.2 HIGH)

EPSS: 0.09%

updated 2024-07-09T18:31:01

2 posts

Microsoft SharePoint Remote Code Execution Vulnerability

cisakevtracker@mastodon.social at 2024-10-22T15:00:52.000Z ##

CVE ID: CVE-2024-38094
Vendor: Microsoft
Product: SharePoint
Date Added: 2024-10-22
Vulnerability: Microsoft SharePoint Deserialization Vulnerability
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2024-10-22T15:00:52.000Z ##

CVE ID: CVE-2024-38094
Vendor: Microsoft
Product: SharePoint
Date Added: 2024-10-22
Vulnerability: Microsoft SharePoint Deserialization Vulnerability
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2024-37383
(6.1 MEDIUM)

EPSS: 0.04%

updated 2024-07-03T18:44:17

2 posts

Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes.

CVE-2024-29824
(9.6 CRITICAL)

EPSS: 36.33%

updated 2024-07-03T18:43:59

1 posts

An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.

Nuclei template

3 repos

https://github.com/horizon3ai/CVE-2024-29824

https://github.com/codeb0ss/CVE-2024-29824-PoC

https://github.com/R4be1/CVE-2024-29824

screaminggoat@infosec.exchange at 2024-10-11T22:10:11.000Z ##

Fortinet: Burning Zero Days: Suspected Nation-State Adversary Targets Ivanti CSA
Fortinet describes their incident response for clients who had their Ivanti Cloud Services Appliance (CSA) devices exploited using zero-days CVE-2024-8190, and CVE-2024-8963 (and one other unspecified command injection vulnerability). See the references below for info on those vulnerabilities. This is extremely interesting, as the threat actor, who was still active in the customer's network, actually patched the CVE-2024-8190 vulnerability, which Fortinet assesses was to prevent anyone else from interfering with their attack operations. Indicators of compromise listed.

Okay so what concerns me about this article is that Fortinet doesn't specifically identify the "A publicly unknown command injection vulnerability affecting the resource reports.php." This is very likely CVE-2024-9380 Ivanti CSA OS Command Injection Vulnerability, due to the Threat Signal Report that Fortinet links to in this article. Also missing is CVE-2024-9379 Ivanti CSA SQL Injection and CVE-2024-9381 Ivanti CSA path traversal.

References:

#threatintel #zeroday #ivanti #vulnerability #infosec #cybersecurity #cyberthreatintelligence #CTI #IOC #cyberespionage #ivanticsa #cloudservicesappliance #eitw #activeexploitation #CVE_2024_8190 #CVE_2024_8963 #CVE_2024_29824

##

CVE-2024-30052
(4.7 MEDIUM)

EPSS: 0.06%

updated 2024-07-02T14:20:55.230000

1 posts

Visual Studio Remote Code Execution Vulnerability

1 repos

https://github.com/ynwarcs/CVE-2024-30052

ringzer0@infosec.exchange at 2024-10-10T08:00:07.000Z ##

Exploiting Visual Studio via dump files - CVE-2024-30052: ynwarcs.github.io/exploiting-v

##

CVE-2024-4577
(9.8 CRITICAL)

EPSS: 96.32%

updated 2024-06-21T21:35:02

1 posts

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP bina

53 repos

https://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP

https://github.com/Junp0/CVE-2024-4577

https://github.com/bl4cksku11/CVE-2024-4577

https://github.com/11whoami99/CVE-2024-4577

https://github.com/Chocapikk/CVE-2024-4577

https://github.com/AhmedMansour93/Event-ID-268-Rule-Name-SOC292-Possible-PHP-Injection-Detected-CVE-2024-4577-

https://github.com/phirojshah/CVE-2024-4577

https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT

https://github.com/Entropt/CVE-2024-4577_Analysis

https://github.com/Sh0ckFR/CVE-2024-4577

https://github.com/0x20c/CVE-2024-4577-nuclei

https://github.com/taida957789/CVE-2024-4577

https://github.com/fa-rrel/CVE-2024-4577-RCE

https://github.com/VictorShem/CVE-2024-4577

https://github.com/JeninSutradhar/CVE-2024-4577-checker

https://github.com/nNoSuger/CVE-2024-4577

https://github.com/PhinehasNarh/CVE-2024-4577-LetsDefend-walkthrough

https://github.com/hexedbyte/cve-2024-4577

https://github.com/watchtowrlabs/CVE-2024-4577

https://github.com/AlperenY-cs/CVE-2024-4577

https://github.com/longhoangth18/CVE-2024-4577

https://github.com/a-roshbaik/CVE-2024-4577

https://github.com/olebris/CVE-2024-4577

https://github.com/l0n3m4n/CVE-2024-4577-RCE

https://github.com/TAM-K592/CVE-2024-4577

https://github.com/codeb0ss/CVEploiterv2

https://github.com/princew88/CVE-2024-4577

https://github.com/zomasec/CVE-2024-4577

https://github.com/a-roshbaik/CVE-2024-4577-PHP-RCE

https://github.com/ohhhh693/CVE-2024-4577

https://github.com/Jcccccx/CVE-2024-4577

https://github.com/nemu1k5ma/CVE-2024-4577

https://github.com/manuelinfosec/CVE-2024-4577

https://github.com/zjhzjhhh/CVE-2024-4577

https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template

https://github.com/aaddmin1122345/cve-2024-4577

https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK

https://github.com/gotr00t0day/CVE-2024-4577

https://github.com/bughuntar/CVE-2024-4577

https://github.com/jakabakos/CVE-2024-4577-PHP-CGI-argument-injection-RCE

https://github.com/waived/CVE-2024-4577-PHP-RCE

https://github.com/Wh02m1/CVE-2024-4577

https://github.com/xcanwin/CVE-2024-4577-PHP-RCE

https://github.com/ggfzx/CVE-2024-4577

https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE

https://github.com/dbyMelina/CVE-2024-4577

https://github.com/it-t4mpan/check_cve_2024_4577.sh

https://github.com/BitMEXResearch/CVE-2024-4577

https://github.com/ywChen-NTUST/PHP-CGI-RCE-Scanner

https://github.com/charis3306/CVE-2024-4577

https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE

https://github.com/d3ck4/Shodan-CVE-2024-4577

https://github.com/Sysc4ll3r/CVE-2024-4577

CVE-2024-4367(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-06-10T20:18:19

1 posts

### Impact If pdf.js is used to load a malicious PDF, and PDF.js is configured with `isEvalSupported` set to `true` (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain. ### Patches The patch removes the use of `eval`: https://github.com/mozilla/pdf.js/pull/18015 ### Workarounds Set the option `isEvalSupported` to `false`

10 repos

https://github.com/UnHackerEnCapital/PDFernetRemotelo

https://github.com/Masamuneee/CVE-2024-4367-Analysis

https://github.com/LOURC0D3/CVE-2024-4367-PoC

https://github.com/clarkio/pdfjs-vuln-demo

https://github.com/avalahEE/pdfjs_disable_eval

https://github.com/Zombie-Kaiser/cve-2024-4367-PoC-fixed

https://github.com/s4vvysec/CVE-2024-4367-POC

https://github.com/snyk-labs/pdfjs-vuln-demo

https://github.com/spaceraccoon/detect-cve-2024-4367

https://github.com/Scivous/CVE-2024-4367-npm

CVE-2024-35219
(8.3 HIGH)

EPSS: 0.04%

updated 2024-05-28T15:47:59

2 posts

### Impact Attackers can exploit the vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. ### Patches The issue was fixed via https://github.com/OpenAPITools/openapi-generator/pull/18652 (included in v7.6.0 release) by removing the usage of the `outputFolder` option.

CVE-2020-1472
(5.5 MEDIUM)

EPSS: 52.41%

updated 2024-05-23T17:56:29.137000

1 posts

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to

1 repos

#search_error

habr@zhub.link at 2024-10-17T14:52:15.000Z ##

Кратко разбираем Zerologon на практике и смотрим его артефакты

Привет! В этой статье мы кратко рассмотрим уязвимость CVE-2020-1472 aka Zerologon со стороны красных и синих: на практическом примере научимся эксплуатировать уязвимость, используя разные векторы, а также отметим основные артефакты атаки.

habr.com/ru/articles/851428/

#zerologon #activedirectory #active_directory #kali #python #cve20201472

##

CVE-2024-29131
(6.5 MEDIUM)

EPSS: 0.04%

updated 2024-05-02T18:47:15

1 posts

This Out-of-bounds Write vulnerability in Apache Commons Configuration affects Apache Commons Configuration: from 2.0 before 2.10.1. User can see this as a 'StackOverflowError' when adding a property in 'AbstractListDelimiterHandler.flattenIterator()'. Users are recommended to upgrade to version 2.10.1, which fixes the issue.

CVE-2023-2868
(9.4 CRITICAL)

EPSS: 7.88%

updated 2024-04-04T05:46:09

1 posts

A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the

4 repos

https://github.com/cashapp323232/CVE-2023-2868CVE-2023-2868

https://github.com/getdrive/PoC

https://github.com/krmxd/CVE-2023-2868

https://github.com/cfielding-r7/poc-cve-2023-2868

screaminggoat@infosec.exchange at 2024-10-11T22:18:03.000Z ##

Another thing to note is that Fortinet states "Suspected Nation-State Adversary" but doesn't include any mention of a country, or even attribution. If they did a little research, they'd point out that 51.91.79[.]17 was previously identified by Mandiant in Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) on 29 August 2023. It was a network indicator for UNC4841, a China-nexus espionage threat actor group.

The first hit is free, you have to pay me to continue working on a Friday night before a three day weekend. Peace out 🤙

#threatintel #zeroday #ivanti #vulnerability #infosec #cybersecurity #cyberthreatintelligence #CTI #IOC #cyberespionage #ivanticsa #cloudservicesappliance #eitw #activeexploitation #CVE_2024_8190 #CVE_2024_8963 #CVE_2024_29824

##

screaminggoat@infosec.exchange at 2024-10-10T15:16:34.000Z ##

@mttaggart CISA added the CVE-2023-7028 (perfect 10.0 critical🥳 cc: @cR0w) GitLab Community and Enterprise Editions Improper Access Control Vulnerability to the KEV Catalog on 01 May 2024

##

CVE-2024-23113
(9.8 CRITICAL)

EPSS: 1.84%

updated 2024-02-15T15:30:37

10 posts

A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized co

5 repos

https://github.com/OxLmahdi/cve-2024-23113

https://github.com/HazeLook/CVE-2024-23113

https://github.com/p33d/CVE-2024-23113

https://github.com/maybelookis/CVE-2024-23113

https://github.com/CheckCve2/CVE-2024-23113

ringzer0 at 2024-10-21T12:00:11.781Z ##

Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024 - watchTowr Labs: labs.watchtowr.com/fortinet-fo

##

ringzer0@infosec.exchange at 2024-10-21T12:00:11.000Z ##

Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024 - watchTowr Labs: labs.watchtowr.com/fortinet-fo

##

jos1264@social.skynetcloud.site at 2024-10-15T12:40:02.000Z ##

87,000+ Fortinet devices still open to attack, are yours among them? (CVE-2024-23113) helpnetsecurity.com/2024/10/15 #vulnerability #Shadowserver #enterprise #Don'tmiss #WatchTowr #Hotstuff #Fortinet #FortiOS #News #CVE

##

GossiTheDog@cyberplace.social at 2024-10-14T20:43:30.000Z ##

lol at this Watchtowr write up - it’s on the money. Vulns from 1998.

Wait until they see the new FortiManager zero day, I wanna see their write up.

labs.watchtowr.com/fortinet-fo

##

screaminggoat@infosec.exchange at 2024-10-14T17:59:10.000Z ##

watchTowr: Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024
Reference: CVE-2024-23113 (9.8 critical, disclosed 08 February 2024 by Fortinet, added to CISA KEV Catalog 09 October 2024) Fortinet Multiple Products Format String Vulnerability

I personally love the snark that watchTowr brings to the infosec community. If you didn't already grasp it from all the memes, you'll understand once you start reading this blog post. watchTowr covers locating the vulnerability CVE-2024-23113 and finding the root cause. I know the term rabbit hole is used often, but in this case, each vulnerable/patched version of their firmware provides different behavior to exploitation attempts and these are explained. No one's safe from watchTowr: they even include a dis for Check Point:

I mean, it's one up from Checkpoint's 'buy another Checkpoint device to put infront of your vulnerable Checkpoint device'

#CVE_2024_23113 #fortinet #vulnerability #eitw #vulnerabilityanalysis #cybersecurity #infosec #cve #activeexploitation #kev

##

screaminggoat@infosec.exchange at 2024-10-11T12:51:45.000Z ##

Fortinet is behind the curve, as they update their security advisory FG-IR-24-029 CVE-2024-23113 (9.8 critical, disclosed 08 February 2024) Format String Bug in fgfmd 3 days later to say "A third-party report is indicating this may be exploited in the wild."

See parent toot above for the CISA announcement that CVE-2024-23113 was added to the Known Exploited Vulnerabilities Catalog on 08 October 2024.

#cisa #cisakev #kev #knownexploitedvulnerabilitiescatalog #CVE_2024_23113 #fortinet #fortios #vulnerability #eitw #activeexploitation

##

jbhall56@infosec.exchange at 2024-10-10T12:50:28.000Z ##

The vulnerability, tracked as CVE-2024-23113 (CVSS score: 9.8), relates to cases of remote code execution that affects FortiOS, FortiPAM, FortiProxy, and FortiWeb. thehackernews.com/2024/10/cisa

##

benzogaga33@mamot.fr at 2024-10-10T09:40:02.000Z ##

Fortinet : la faille de sécurité critique CVE-2024-23113 est exploitée dans des cyberattaques, alerte la CISA ! it-connect.fr/fortinet-faille- #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet

##

cisakevtracker@mastodon.social at 2024-10-09T15:01:23.000Z ##

CVE ID: CVE-2024-23113
Vendor: Fortinet
Product: Multiple Products
Date Added: 2024-10-09
Vulnerability: Fortinet Multiple Products Format String Vulnerability
Notes: fortiguard.com/psirt/FG-IR-24- ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

screaminggoat@infosec.exchange at 2024-10-09T14:18:18.000Z ##

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
Hot off the press! CISA only adds two of the Ivanti exploited zero-day vulnerabilities, and a Fortinet vulnerability to the KEV Catalog:

  • CVE-2024-9380 (7.2 high, disclosed 08 October 2024 by Ivanti as exploited zero-day) Ivanti Cloud Services Appliance (CSA) OS Command Injection Vulnerability
  • CVE-2024-9379 (6.5 medium, disclosed 08 October 2024 by Ivanti as exploited zero-day) Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability
  • CVE-2024-23113 (9.8 critical, disclosed 08 February 2024 by Fortinet) Fortinet Multiple Products Format String Vulnerability

#cisa #cisakev #kev #knownexploitedvulnerabilitiescatalog #vulnerability #cve #eitw #activeexploitation #zeroday

##

CVE-1999-0113
(0 None)

EPSS: 1.58%

updated 2024-02-13T17:55:39.687000

2 posts

Some implementations of rlogin allow root access if given a -froot parameter.

alanc@fosstodon.org at 2024-10-18T16:42:22.000Z ##

@cks @jschauma the non-BSD implementation was more fun, with rlogind passing a “trust me, this user is in the rhosts” flag, leading to the AIX & Linux -froot security hole (CVE-1999-0113), one of the easier to understand remote exploits.

##

alanc@fosstodon.org at 2024-10-18T16:42:22.000Z ##

@cks @jschauma the non-BSD implementation was more fun, with rlogind passing a “trust me, this user is in the rhosts” flag, leading to the AIX & Linux -froot security hole (CVE-1999-0113), one of the easier to understand remote exploits.

##

CVE-2022-24785
(7.5 HIGH)

EPSS: 0.33%

updated 2023-11-29T22:04:56

1 posts

### Impact This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale. ### Patches This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive). ### Workarounds Sanitize user-provided locale name before passing it to moment.js. ### Refe

CVE-2022-31129
(7.5 HIGH)

EPSS: 0.76%

updated 2023-11-29T22:02:29

1 posts

### Impact * using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs * noticeable slowdown is observed with inputs above 10k characters * users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks ### Patches The problem is patched in 2.29

CVE-2022-31197
(7.1 HIGH)

EPSS: 0.12%

updated 2023-10-30T13:06:31

1 posts

### Impact _What kind of vulnerability is it? Who is impacted?_ The PGJDBC implementation of the `java.sql.ResultRow.refreshRow()` method is not performing escaping of column names so a malicious column name that contains a statement terminator, e.g. `;`, could lead to SQL injection. This could lead to executing additional SQL commands as the application's JDBC user. User applications that do no

petrillic@hachyderm.io at 2024-10-09T21:03:53.000Z ##

Few things make me hate the security industry as much as the dumb ass CVSS scores so many CVE receive. Take CVE-2022-31197. It literally requires you to have a column with a “;” in the name.

I mean yes, but holy fuck people… if you do that you have so many other problems to deal with first.

Could it happen? Sure. Will it? I sure hope your database isn’t that absolutely bonkers.

##

CVE-2022-41128
(8.8 HIGH)

EPSS: 56.24%

updated 2023-05-28T05:01:06

1 posts

Windows Scripting Languages Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41118.

screaminggoat@infosec.exchange at 2024-10-16T02:10:22.000Z ##

Notes for myself based on the 33 page PDF

  • Table of contents has an overview of Operation Code on Toast by TA-RedAnt, as well as Past similar IE vulnerability exploits. Then it provides detailed analysis contents: payload delivery, exploitation, background, vulnerability CVE-2024-38178 analysis. Then a section on Malware: installation, command and control. Ends with conclusion and IOC.
  • May 2024: large scale attack discovered through incident response by ASEC and NCSC.
  • "delivered through vulnerability code, which are called 'Toast advertisements' in the advertising industry"
  • they mention past Scarcruft zero-day exploitation such as CVE-2020-1380 (reported by Volexity), and CVE-2022-41128 (reported by Google TAG)
  • Free software uses advertising servers to display HTML/JavaScript ads. Scarcruft hacked the advertising server for a domestic advertising agency, which then served a malicious iFrame with the JavaScript file named ad_toast
  • malware confirmed to be RokRAT, executed in-memory. Ruby is used for persistence, commercial cloud servers for C2.
  • malware checks for debugging environment (T1622)
  • 2nd stage loader changes behavior based on antivirus program installed on computer: Avast, Symantec
##

CVE-2022-40684
(9.8 CRITICAL)

EPSS: 97.37%

updated 2023-03-27T18:30:24

1 posts

An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.

Nuclei template

1 repos

#search_error

robertguetzkow at 2024-10-22T17:03:27.018Z ##

@GossiTheDog the aspect of a manipulated hostname reminds me of CVE-2022-40684 where the "for" attribute of Forwarded header set to 127.0.0.1 bypassed authorization checks. github.com/horizon3ai/CVE-2022

##

CVE-2017-11882
(7.8 HIGH)

EPSS: 97.44%

updated 2023-02-01T05:03:36

1 posts

Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.

34 repos

https://github.com/Sunqiz/CVE-2017-11882-reproduction

https://github.com/Ridter/CVE-2017-11882

https://github.com/HaoJame/CVE-2017-11882

https://github.com/rip1s/CVE-2017-11882

https://github.com/letiencong96/CVE_2017_11882

https://github.com/ActorExpose/CVE-2017-11882

https://github.com/tzwlhack/CVE-2017-11882

https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-

https://github.com/Ridter/RTF_11882_0802

https://github.com/Abdibimantara/Maldoc-Analysis

https://github.com/rxwx/CVE-2018-0802

https://github.com/CSC-pentest/cve-2017-11882

https://github.com/chanbin/CVE-2017-11882

https://github.com/ChaitanyaHaritash/CVE-2017-11882

https://github.com/likekabin/CVE-2018-0802_CVE-2017-11882

https://github.com/Shadowshusky/CVE-2017-11882-

https://github.com/HZachev/ABC

https://github.com/likekabin/CVE-2017-11882

https://github.com/0x09AL/CVE-2017-11882-metasploit

https://github.com/lisinan988/CVE-2017-11882-exp

https://github.com/littlebin404/CVE-2017-11882

https://github.com/BlackMathIT/2017-11882_Generator

https://github.com/nhuynhuy/cve-2017-11882

https://github.com/jadeapar/Dragonfish-s-Malware-Cyber-Analysis

https://github.com/herbiezimmerman/CVE-2017-11882-Possible-Remcos-Malspam

https://github.com/legendsec/CVE-2017-11882-for-Kali

https://github.com/embedi/CVE-2017-11882

https://github.com/ekgg/Overflow-Demo-CVE-2017-11882

https://github.com/j0lama/CVE-2017-11882

https://github.com/zhouat/cve-2017-11882

https://github.com/Grey-Li/CVE-2017-11882

https://github.com/Retr0-code/SignHere

https://github.com/starnightcyber/CVE-2017-11882

https://github.com/n18dcat053-luuvannga/DetectPacket-CVE-2017-11882

screaminggoat@infosec.exchange at 2024-10-15T13:39:46.000Z ##

Kaspersky: Beyond the Surface: the evolution and expansion of the SideWinder APT group
Reference: CVE-2017-11882 (7.8 high, disclosed 14 November 2017 by Microsoft, added to CISA KEV Catalog 03 November 2021) Microsoft Office Memory Corruption Vulnerability
Sidewinder is a suspected Indian APT which loves to target Pakistan among other neighboring countries. Kaspersky reports on new Sidewinder attacks targeting the Middle East and Africa, and a new post-exploitation toolkit called "StealerBot." They talk about the infection chain, which includes an RTF file that exploits CVE-2017-11882. Kaspersky goes over the Stealerbot malware features, including a section for each one of the modules. Victim and targeted sector list is extensive. Attribution is made to Sidewinder with medium/high confidence based on similarities in historical TTPs. Indicators of compromise listed.

#Sidewinder #India #cyberespionage #APT #IOC #stealerbot #CVE_2017_11882 #vulnerability #eitw #threatintel #cybersecurity #infosec #cyberthreatintelligence #CTI

##

CVE-2020-1380
(7.5 HIGH)

EPSS: 20.70%

updated 2023-01-29T05:03:44

1 posts

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1555, CVE-2020-1570.

screaminggoat@infosec.exchange at 2024-10-16T02:10:22.000Z ##

Notes for myself based on the 33 page PDF

  • Table of contents has an overview of Operation Code on Toast by TA-RedAnt, as well as Past similar IE vulnerability exploits. Then it provides detailed analysis contents: payload delivery, exploitation, background, vulnerability CVE-2024-38178 analysis. Then a section on Malware: installation, command and control. Ends with conclusion and IOC.
  • May 2024: large scale attack discovered through incident response by ASEC and NCSC.
  • "delivered through vulnerability code, which are called 'Toast advertisements' in the advertising industry"
  • they mention past Scarcruft zero-day exploitation such as CVE-2020-1380 (reported by Volexity), and CVE-2022-41128 (reported by Google TAG)
  • Free software uses advertising servers to display HTML/JavaScript ads. Scarcruft hacked the advertising server for a domestic advertising agency, which then served a malicious iFrame with the JavaScript file named ad_toast
  • malware confirmed to be RokRAT, executed in-memory. Ruby is used for persistence, commercial cloud servers for C2.
  • malware checks for debugging environment (T1622)
  • 2nd stage loader changes behavior based on antivirus program installed on computer: Avast, Symantec
##

CVE-2022-26134
(9.8 CRITICAL)

EPSS: 97.40%

updated 2023-01-27T05:03:24

2 posts

In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17

Nuclei template

75 repos

https://github.com/MaskCyberSecurityTeam/CVE-2022-26134_Behinder_MemShell

https://github.com/BeichenDream/CVE-2022-26134-Godzilla-MEMSHELL

https://github.com/shiftsansan/CVE-2022-26134-Console

https://github.com/W01fh4cker/Serein_Linux

https://github.com/2212970396/CVE_2022_26134

https://github.com/Chocapikk/CVE-2022-26134

https://github.com/DARKSTUFF-LAB/-CVE-2022-26134

https://github.com/CJ-0107/cve-2022-26134

https://github.com/murataydemir/CVE-2022-26134

https://github.com/yTxZx/CVE-2022-26134

https://github.com/abhishekmorla/CVE-2022-26134

https://github.com/acfirthh/CVE-2022-26134

https://github.com/crowsec-edtech/CVE-2022-26134

https://github.com/yyqxi/CVE-2022-26134

https://github.com/AmoloHT/CVE-2022-26134

https://github.com/iveresk/cve-2022-26134

https://github.com/cai-niao98/CVE-2022-26134

https://github.com/Sakura-nee/CVE-2022-26134

https://github.com/twoning/CVE-2022-26134-PoC

https://github.com/cc3305/CVE-2022-26134

https://github.com/kelemaoya/CVE-2022-26134

https://github.com/ma1am/CVE-2022-26134-Exploit-Detection

https://github.com/cbk914/CVE-2022-26134_check

https://github.com/latings/CVE-2022-26134

https://github.com/Habib0x0/CVE-2022-26134

https://github.com/skhalsa-sigsci/CVE-2022-26134-LAB

https://github.com/offlinehoster/CVE-2022-26134

https://github.com/alcaparra/CVE-2022-26134

https://github.com/b4dboy17/CVE-2022-26134

https://github.com/Brucetg/CVE-2022-26134

https://github.com/Muhammad-Ali007/Atlassian_CVE-2022-26134

https://github.com/sunny-kathuria/exploit_CVE-2022-26134

https://github.com/CLincat/vulcat

https://github.com/ColdFusionX/CVE-2022-26134

https://github.com/Luchoane/CVE-2022-26134_conFLU

https://github.com/jbaines-r7/through_the_wire

https://github.com/SIFalcon/confluencePot

https://github.com/0xAgun/CVE-2022-26134

https://github.com/vesperp/CVE-2022-26134-Confluence

https://github.com/0x14dli/cve2022-26134exp

https://github.com/whokilleddb/CVE-2022-26134-Confluence-RCE

https://github.com/hev0x/CVE-2022-26134

https://github.com/xsxtw/CVE-2022-26134

https://github.com/xanszZZ/ATLASSIAN-Confluence_rce

https://github.com/Y000o/Confluence-CVE-2022-26134

https://github.com/khulnasoft-lab/awesome-security

https://github.com/redhuntlabs/ConfluentPwn

https://github.com/Debajyoti0-0/CVE-2022-26134

https://github.com/shamo0/CVE-2022-26134

https://github.com/f4yd4-s3c/cve-2022-26134

https://github.com/BBD-YZZ/Confluence-RCE

https://github.com/axingde/CVE-2022-26134

https://github.com/coskper-papa/CVE-2022-26134

https://github.com/CatAnnaDev/CVE-2022-26134

https://github.com/archanchoudhury/Confluence-CVE-2022-26134

https://github.com/kyxiaxiang/CVE-2022-26134

https://github.com/KeepWannabe/BotCon

https://github.com/1337in/CVE-2022-26134web

https://github.com/itwestend/cve_2022_26134

https://github.com/kh4sh3i/CVE-2022-26134

https://github.com/dream434/CVE_20222_26134

https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134

https://github.com/Vulnmachines/Confluence-CVE-2022-26134

https://github.com/Agentgilspy/CVE-2022-26134

https://github.com/W01fh4cker/Serein

https://github.com/p4b3l1t0/confusploit

https://github.com/keven1z/CVE-2022-26134

https://github.com/kailing0220/CVE-2022-26134

https://github.com/yigexioabai/CVE-2022-26134-cve1

https://github.com/404fu/CVE-2022-26134-POC

https://github.com/reubensammut/cve-2022-26134

https://github.com/li8u99/CVE-2022-26134

https://github.com/nxtexploit/CVE-2022-26134

https://github.com/wjlin0/CVE-2022-26134

https://github.com/SNCKER/CVE-2022-26134

jbz@indieweb.social at 2024-10-20T11:00:01.000Z ##

⚠️ Spectre flaws continue to haunt Intel and AMD
— The Register

「 The indirect branch predictor barrier (IBPB) was intended as a defense against Spectre v2 (CVE-2017-5715) attacks on x86 Intel and AMD chips. IBPB is designed to prevent forwarding of previously learned indirect branch target predictions for speculative execution.

Evidently, the barrier wasn't implemented properly 」

theregister.com/2024/10/18/spe

#spectre #IBPB #amd #intel #infosec

##

jbz@indieweb.social at 2024-10-20T11:00:01.000Z ##

⚠️ Spectre flaws continue to haunt Intel and AMD
— The Register

「 The indirect branch predictor barrier (IBPB) was intended as a defense against Spectre v2 (CVE-2017-5715) attacks on x86 Intel and AMD chips. IBPB is designed to prevent forwarding of previously learned indirect branch target predictions for speculative execution.

Evidently, the barrier wasn't implemented properly 」

theregister.com/2024/10/18/spe

#spectre #IBPB #amd #intel #infosec

##

CVE-2024-9050
(0 None)

EPSS: 0.00%

2 posts

N/A

CVE-2024-38819
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2024-28988
(0 None)

EPSS: 0.00%

1 posts

N/A

screaminggoat@infosec.exchange at 2024-10-16T18:55:16.000Z ##

SolarWinds multiple security advisories: SolarWinds Security Vulnerabilities

  • CVE-2024-28988 (9.8 critical) SolarWinds Web Help Desk Java Deserialization Remote Code Execution Vulnerability
  • CVE-2024-45713 (5.1 medium) SolarWinds Kiwi CatTools Sensitive Information Disclosure Vulnerability
  • CVE-2024-45714 (5.7 medium) Serv-U Stored XSS Vulnerability
  • CVE-2024-45711 (7.5 high) Serv-U FTP Service Directory Traversal Remote Code Execution Vulnerability
  • CVE-2024-45710 (7.8 high) SolarWinds Platform Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
  • CVE-2024-45715 (7.1 high) SolarWinds Platform Edit Function Cross-Site Scripting Vulnerability

No mention of exploitation.

#Solarwinds #vulnerability #cve

##

CVE-2024-24919
(0 None)

EPSS: 94.03%

1 posts

N/A

Nuclei template

53 repos

https://github.com/smackerdodi/CVE-2024-24919-nuclei-templater

https://github.com/P3wc0/CVE-2024-24919

https://github.com/gurudattch/CVE-2024-24919

https://github.com/J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT

https://github.com/yagyuufellinluvv/CVE-2024-24919

https://github.com/skyrowalker/CVE-2024-24919

https://github.com/B1naryo/CVE-2024-24919-POC

https://github.com/GoatSecurity/CVE-2024-24919

https://github.com/hendprw/CVE-2024-24919

https://github.com/Expl0itD0g/CVE-2024-24919---Poc

https://github.com/RevoltSecurities/CVE-2024-24919

https://github.com/nullcult/CVE-2024-24919-Exploit

https://github.com/starlox0/CVE-2024-24919-POC

https://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN

https://github.com/am-eid/CVE-2024-24919

https://github.com/GuayoyoCyber/CVE-2024-24919

https://github.com/LuisMateo1/Arbitrary-File-Read-CVE-2024-24919

https://github.com/0xkalawy/CVE-2024-24919

https://github.com/Tim-Hoekstra/CVE-2024-24919

https://github.com/protonnegativo/CVE-2024-24919

https://github.com/Jutrm/cve-2024-24919

https://github.com/zam89/CVE-2024-24919

https://github.com/Cappricio-Securities/CVE-2024-24919

https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner

https://github.com/Rug4lo/CVE-2024-24919-Exploit

https://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-

https://github.com/0nin0hanz0/CVE-2024-24919-PoC

https://github.com/birdlex/cve-2024-24919-checker

https://github.com/satriarizka/CVE-2024-24919

https://github.com/Vulnpire/CVE-2024-24919

https://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN

https://github.com/bigb0x/CVE-2024-24919-Sniper

https://github.com/YN1337/CVE-2024-24919

https://github.com/un9nplayer/CVE-2024-24919

https://github.com/mr-kasim-mehar/CVE-2024-24919-Exploit

https://github.com/Bytenull00/CVE-2024-24919

https://github.com/seed1337/CVE-2024-24919-POC

https://github.com/ShadowByte1/CVE-2024-24919

https://github.com/LucasKatashi/CVE-2024-24919

https://github.com/c3rrberu5/CVE-2024-24919

https://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check

https://github.com/fernandobortotti/CVE-2024-24919

https://github.com/emanueldosreis/CVE-2024-24919

https://github.com/GlobalsecureAcademy/CVE-2024-24919

https://github.com/geniuszlyy/CVE-2024-24919

https://github.com/nexblade12/CVE-2024-24919

https://github.com/H3KEY/CVE-2024-24919

https://github.com/satchhacker/cve-2024-24919

https://github.com/0xans/CVE-2024-24919

https://github.com/0xYumeko/CVE-2024-24919

https://github.com/SalehLardhi/CVE-2024-24919

https://github.com/verylazytech/CVE-2024-24919

https://github.com/nicolvsrlr27/CVE-2024-24919

CVE-2024-9631
(0 None)

EPSS: 0.00%

1 posts

N/A

screaminggoat@infosec.exchange at 2024-10-09T21:09:56.000Z ##

GitLab security advisory: GitLab Critical Patch Release: 17.4.2, 17.3.5, 17.2.9

  • CVE-2024-9164 (9.6 critical) Run pipelines on arbitrary branches
  • CVE-2024-8970 (8.2 high) An attacker can impersonate arbitrary user
  • CVE-2024-8977 (8.2 high) SSRF in Analytics Dashboard
  • CVE-2024-9631 (7.5 high) Viewing diffs of MR with conflicts can be slow
  • CVE-2024-6530 (7.3 high) HTMLi in OAuth page
  • CVE-2024-9623 (4.9 medium) Deploy Keys can push changes to an archived repository
  • CVE-2024-5005 (4.3 medium) Guests can disclose project templates
  • CVE-2024-9596 (3.7 low) GitLab instance version disclosed to unauthorized users

No mention of exploitation

#gitlab #patchtuesday #cve #vulnerability

##

CVE-2024-9427
(0 None)

EPSS: 0.00%

1 posts

N/A

nirik@fosstodon.org at 2024-10-09T04:13:17.000Z ##

Today in #fedora infra land:
* Built a ton of koji builds for the new exciting CVE-2024-9427. (all fedora + epel + a 1.34.x for our hubs now + 1.35.x for our hubs when we upgrade tomorrow.
* Meetings
* Re-installed a a bunch of openqa vmhosts and db server and workers with @adamw 3 less rhel8 installs and standardized openqa workers!
* tomorrow koji outage and some cert reissues and a bunch more meetings.

##

Visit counter For Websites