simontsui, to chrome

Hot off the press! CISA adds CVE-2023-4762 (8.8 high Google Chrome Type Confusion in V8 JavaScript Engine) to the Known Exploited Vulnerabilities Catalog.
🔗 (to be replaced later) https://www.cisa.gov/known-exploited-vulnerabilities-catalog

#CISA #KEV #KnownExploitedVulnerabilitiesCatalog #vulnerability #CVE_2023_4762 #Chrome #eitw #activeexploitation

simontsui, to random

Horizon3 analyzed critical vulnerabilities from the CISA KEV catalog starting from January 2023 through January 2024, categorized the vulnerability root causes, and attempted to analyze if the current efforts in the information security industry match with the current threat vectors being abused.
🔗 https://www.horizon3.ai/analysis-of-2023s-known-exploited-vulnerabilities/

#CISA #KEV #vulnerability #KnownExploitedVulnerabilitiesCatalog #eitw #horizon3

simontsui, to random

Volexity recently disclosed details related to exploitation of Ivanti Connect Secure VPN, revealing how the attacker chained two zero-day vulnerabilities to achieve remote code execution. When investigating the source of compromise, Volexity employed memory forensics, analyzing a memory sample collected from a suspected compromised VPN device, which allowed Volexity to zero in on the source of the compromise. "The lesson for analysts is to independently verify the integrity and trustworthiness of high-value targets using memory forensics, rather than only relying on tools that run on a potentially compromised device."
🔗 https://www.volexity.com/blog/2024/02/01/how-memory-forensics-revealed-exploitation-of-ivanti-connect-secure-vpn-zero-day-vulnerabilities/

#ivanti #connectsecure #vulnerability #zeroday #eitw #activeexploitation #CISA #KEV #KnownExploitedVulnerabilitiesCatalog #CVE_2023_46805 #CVE_2024_21887 #UTA1078 #Volexity

itsecbot, to China

China is hacking Wi-Fi routers for attack on US electrical grid and water supplies, FBI warns - China-sponsored attacks likened to "placing bombs in water treatment facilities, and powe... https://grahamcluley.com/china-is-hacking-wi-fi-routers-for-attack-on-us-electrical-grid-and-water-supplies-fbi-warns/ #denialofservice #securitythreats #vulnerability #lawℴ #congress #malware #china #cisa #fbi

simontsui, to random

watchTowr reports additional zero-days uncovered on a fully patched Ivanti appliance. No further information due to 90 day vulnerability disclosure policy.

#Ivanti #ConnectSecure #vulnerability #zeroday #eitw #activeexploitation #UTA0178 #UNC5221 #CVE_2023_46805 #CVE_2024_21887 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA #CVE_2024_21888
#CVE_2024_21893 cc: @todb @ntkramer @campuscodi @serghei @dangoodin @catc0n
CVE_2024_21893

itnewsbot, to security

Agencies using vulnerable Ivanti products have until Saturday to disconnect them - Enlarge (credit: Getty Images)

Federal civilian agencies have ... - https://arstechnica.com/?p=2000723 #connectsecure #security #zerodays #biz#ivanti #cisa

YourAnonRiots, to apple Japanese

⚠️ Critical #Apple kernel bug in #iOS, #macOS, and more exploited in the wild. #CISA urges FCEB agencies to patch by February 21st.

https://thehackernews.com/2024/02/cisa-warns-of-active-exploitation-of.html

Don't wait for a breach, take action now. #CyberSecurity #cyberdefence

governa, to iPhone
@governa@fosstodon.org avatar
simontsui, to random

CISA and the Federal Bureau of Investigation (FBI) published guidance on Security Design Improvements for SOHO Device Manufacturers as a part of the new Secure by Design (SbD) Alert series that focuses on how manufacturers should shift the burden of security away from customers by integrating security into product design and development.
🔗 https://www.cisa.gov/resources-tools/resources/secure-design-alert-security-design-improvements-soho-device-manufacturers

#CISA #FBI #SOHO #securebydesign #guidance

circl, to random
@circl@social.circl.lu avatar

New Mitigations to Defend Against Exploitation of Ivanti Connect Secure and Policy Secure Gateways

"Threat actors are continuing to leverage vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways to capture credentials and/or drop webshells that enable further compromise of enterprise networks. "

#Ivanti #CISA #vulnerability

🔗 https://www.cisa.gov/news-events/alerts/2024/01/30/new-mitigations-defend-against-exploitation-ivanti-connect-secure-and-policy-secure-gateways

simontsui, to random

In CISA's ICS advisory, they revealed that several Hitron Systems Security Camera DVR denial of service vulnerabilities were being actively exploited. These are Zero days reported by Akamai.

  • CVE-2024-22768 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22769 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22770 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22771 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22772 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-23842 (7.4 high) improper input validation to Denial of Service

🔗 https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-04

#CISA #ICS #zeroday #eitw #activeexploitation #vulnerability

simontsui, to random

Juniper out-of-cycle security advisory for Junos OS SRX Series and EX Series:

  • CVE-2024-21619 (5.3 medium) unauthenticated information disclosure
  • CVE-2023-36846 (5.3 medium) unauthenticated remote impact to file system integrity (note: added to KEV Catalog on 13 November 2023)
  • CVE-2024-21620 (8.8 high) improper neutralization of input (cross-site scripting)
  • CVE-2023-36851 (5.3 medium) unauthenticated remote impact to file system integrity (note: added to KEV Catalog on 13 November 2023)

🔗 https://supportportal.juniper.net/s/article/2024-01-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-have-been-addressed?language=en_US

#Juniper #JunosOS #vulnerability #CVE_2024_21619 #CVE_2023_36846 #CVE_2024_21620 #CVE_2023_36851 #KEV #eitw #KnownExploitedVulnerabilitiesCatalog #CISA

simontsui, to random

Just your periodic update from Ivanti regarding their CVE-2023-46805 (8.2 high) and CVE-2024-21887 (9.1 critical) zero-days (both disclosed 10 January 2024 as exploited in the wild, has Proofs of Concept, mass exploitation):

"Update 26 January: The targeted release of patches for supported versions is delayed, this delay impacts all subsequent planned patch releases. We are now targeting next week to release a patch for Ivanti Connect Secure (versions 9.1R17x, 9.1R18x, 22.4R2x and 22.5R1.1), Ivanti Policy Secure (versions 9.1R17x, 9.1R18x and 22.5R1x) and ZTA version 22.6R1x.
Patches for supported versions will still be released on a staggered schedule. Instructions on how to upgrade to a supported version will also be provided.
The timing of patch release is subject to change as we prioritize the security and quality of each release. Please ensure you are following this article to receive updates as they become available."
🔗 https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US

#Ivanti #ConnectSecure #vulnerability #zeroday #eitw #activeexploitation #UTA0178 #UNC5221 #CVE_2023_46805 #CVE_2024_21887 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA

br00t4c, to random
@br00t4c@mastodon.social avatar

Wait, security courses aren't a requirement to graduate with a computer science degree?

#cisa #wait

https://go.theregister.com/feed/www.theregister.com/2024/01/26/security_courses_requirements/

br00t4c, to random
@br00t4c@mastodon.social avatar

CISA boss swatted: 'While my own experience was certainly harrowing, it was unfortunately not unique'

#cisa #election

https://go.theregister.com/feed/www.theregister.com/2024/01/23/cisa_easterly_swatted/

simontsui, to vmware

CISA adds CVE-2023-34048 (9.8 critical, disclosed 25 October 2023 by VMware, reported by Mandiant as exploited as a zero-day since 2021) VMware vCenter Server Out-of-Bounds Write Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog.
🔗 https://www.cisa.gov/news-events/alerts/2024/01/22/cisa-adds-one-known-exploited-vulnerability-catalog

#CVE202334048 #VMware #CISA #KEV #eitw #activeexploitation #Mandiant #UNC3886 #cyberespionage #vCenter #zeroday #vulnerability #cybersecurity

YourAnonRiots, to random Japanese

🚨#CISA issues emergency directive against two major zero-day actively exploited flaws in Ivanti products.

https://thehackernews.com/2024/01/cisa-issues-emergency-directive-to.html

Patch your Ivanti Connect Secure and Policy Secure ASAP. #zeroday

simontsui, to random

CISA issues Emergency Directive 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities in response to CVE-2023-46805 (8.2 high, disclosed by Ivanti on 10 January 2024 as exploited zero-days) authentication bypass in Ivanti Connect Secure VPN Version 9.x and 22.x and CVE-2024-21887 (9.1 critical) command injection in Ivanti Connect Secure VPN Version 9.x and 22.x

🔗 https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities

#Ivanti #ConnectSecure #vulnerability #zeroday #eitw #activeexploitation #UTA0178 #UNC5221 #CVE202346805 #CVE202421887

simontsui,

CISA released supplemental directions for Emergency Directive 24-01 Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities. This assumes anyone running Ivanti Connect Secure or Ivanti Policy Secure solutions have been compromised and the remediation steps include isolating the device from resources, continue threat hunting, performing a factory reset, applying the patch, etc.
🔗 https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities#SupplementalDirectionV1

#Ivanti #ConnectSecure #vulnerability #zeroday #eitw #activeexploitation #UTA0178 #UNC5221 #CVE_2023_46805 #CVE_2024_21887 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA #CVE_2024_21888 #CVE_2024_21893 #EmergencyDirective

dave_aitel, to random
@dave_aitel@mastodon.social avatar

Here is my draft initial essay on Secure By Design/Secure By Default . Feel free to comment on it. @thedarktangent @boblord

https://docs.google.com/document/d/1s__73KUZgZQnbV-24PdduJKcy8pxbbN5e5oaGpzSPe8/edit?usp=sharing

YourAnonRiots, to microsoft Japanese

🚨 Alert: #CISA & FBI warn of a growing #AndroxGh0st botnet targeting AWS, #Microsoft Office 365, SendGrid, and Twilio credentials.

https://thehackernews.com/2024/01/feds-warn-of-androxgh0st-botnet.html

Don't be the next victim; patch your Laravel servers NOW.

#cybersecurity #hacking

simontsui, to chrome

CISA Adds Three Known Exploited Vulnerabilities to Catalog:

  • CVE-2023-6549 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability
  • CVE-2023-6548 Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
  • CVE-2024-0519 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability

🔗 https://www.cisa.gov/news-events/alerts/2024/01/17/cisa-adds-three-known-exploited-vulnerabilities-catalog

#CISA #KEV #KnownExploitedVulnerabilitiesCatalog #CVE20236548 #CVE20236549 #CVE20240519 #Chrome #Google #Citrix #NetScaler #ADC

simontsui,

CISA buries the lede in their cybersecurity alert about Citrix NetScaler ADC and NetScaler Gateway, by not mentioning that CVE-2023-6548 and CVE-2023-6549 are exploited zero-days. See the KEV Catalog announcement that this toot is a reply to.
🔗 https://www.cisa.gov/news-events/alerts/2024/01/18/citrix-releases-security-updates-netscaler-adc-and-netscaler-gateway
"Exploits of these CVEs on unmitigated appliances have been observed."

#CISA #securityadvisory #CVE20236548 #CVE20236549 #Citrix #NetScaler #ADC #zeroday #activeexploitation #eitw

RonaldTooTall, to Cybersecurity

Feds Warn of AndroxGh0st Botnet Targeting AWS, Azure, and Office 365 Credentials

https://thehackernews.com/2024/01/feds-warn-of-androxgh0st-botnet.html
#CyberSecurity #Security #CISA #FBI #Technology #Malware

governa, to opensource
@governa@fosstodon.org avatar

#OpenSource Detector of #CISA's Known Exploitable Vulnerabilities

https://github.com/Ostorlab/KEV

Cappyjax, to infosec
@Cappyjax@mastodon.social avatar

Ostorlab KEV: a one-command tool to detect most remotely known exploitable vulnerabilities 🐞🔍

https://github.com/Ostorlab/KEV

#infosec #security #cybersecurity #CISA

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • thenastyranch
  • magazineikmin
  • ethstaker
  • GTA5RPClips
  • InstantRegret
  • rosin
  • love
  • Youngstown
  • slotface
  • khanakhh
  • kavyap
  • everett
  • DreamBathrooms
  • megavids
  • osvaldo12
  • tester
  • cisconetworking
  • tacticalgear
  • ngwrru68w68
  • Durango
  • cubers
  • mdbf
  • normalnudes
  • anitta
  • modclub
  • Leos
  • JUstTest
  • All magazines