osma, to telegram
@osma@mas.to avatar

#ISW, May 8 assessment: "Reports indicate that there is an available open-source tool that allows people to search by specific coordinates for Telegram users who have enabled a certain location-sharing setting."

But of course there is. The russian-engineering, roll-your-own-crypto, cryptocoin-shilling, encrypted-but-not-encrypted messaging app to have a zero-day exploited privacy flaw exposing users' location? I can't imagine where such failures would come from.

#telegram #zeroday #privacy

br00t4c, to random
@br00t4c@mastodon.social avatar

Zero-day exploited right now in Palo Alto Networks' GlobalProtect gateways

https://go.theregister.com/feed/www.theregister.com/2024/04/12/palo_alto_pan_flaw/

xtaran, to linux
@xtaran@chaos.social avatar

The xz backdoor storm isn't over yet and the next storm seems coming up: in the 5.15 to 6.5 (at least): https://github.com/YuriiCrimson/ExploitGSM

Affects at least 12 Stable and 22.04 LTS (including HWE kernels).

(Via https://twitter.com/matteyeux/status/1777974230325354579 and https://www.reddit.com/r/linux/comments/1c0i7tx/someone_found_a_kernel_0day/)

sanjaymenon, to infosec
@sanjaymenon@mastodon.social avatar

Zero-day vulnerability tracking service

https://www.zero-day.cz

br00t4c, to random
@br00t4c@mastodon.social avatar
simontsui, to random

New Fortinet zero-day:
CVE-2024-21762 (9.6 critical) FortiOS - Out-of-bound Write in sslvpnd: A out-of-bounds write vulnerability [CWE-787] in FortiOS may allow a remote unauthenticated attacker to execute arbitrary code or command via specially crafted HTTP requests.

Note: This is potentially being exploited in the wild.

🔗 https://www.fortiguard.com/psirt/FG-IR-24-015

#Fortinet #FortiOS #zeroday #activeexploitation #eitw #CVE_2024_21762

simontsui,

Other Fortinet security advisories:

  • FG-IR-23-357 FortiClientEMS - Improper privilege management for site super administrator
  • FG-IR-23-268 FortiManager - Informative error messages
  • FG-IR-23-063 FortiNAC - XSS in Show Audit Log
  • FG-IR-24-029 FortiOS - Format String Bug in fgfmd
  • FG-IR-23-301 FortiOS - Fortilink lack of certificate validation
  • FG-IR-23-397 FortiOS & FortiProxy - CVE-2023-44487 - Rapid Reset HTTP/2 vulnerability

Other than CVE-2024-21762 in the original post, the vulnerabilities in these advisories (EDIT: Grammar) were not exploited in the wild.

#Fortinet #FortiOS #zeroday #activeexploitation #eitw #CVE_2024_21762 #securityadvisory #vulnerability #PatchTuesday

simontsui,

Why you should care about CVE-2024-21762:

Fortinet vulnerabilities have historically been targeted by People’s Republic of China (PRC) state-sponsored cyber actors. On 19 January 2023, Mandiant reported the exploitation of FortiOS SSL VPN vulnerability CVE-2022-42475 as a zero-day by suspected Chinese threat actors. Mandiant published a subsequent blog post on 16 March 2023 detailing the exploitation of another FortiOS zero-day CVE-2022-41328 by the Chinese threat actor UNC3886. CISA, FBI and NSA assess that PRC state-sponsored cyber actors are seeking to position themselves on IT networks for disruptive or destructive cyberattacks against U.S. critical infrastructure in the event of a major crisis or conflict with the United States. CISA’s joint cybersecurity advisory on 07 February 2024 states that Chinese Advanced Persistent Threat (APT) Volt Typhoon likely obtained initial access by exploiting CVE-2022-42475 in a network perimeter FortiGate 300D firewall that was not patched. Fortinet also provided case studies of Volt Typhoon targeting of manufacturing, consulting, local government, and internet service provider sectors, and post-exploitation activity described as Living Off the Land (LotL) techniques.

#Fortinet #FortiOS #zeroday #activeexploitation #eitw #CVE_2024_21762 #vulnerability #securityadvisory

jikodesu, to tech
@jikodesu@mastodon.social avatar

"Google said it discovered the unknown Variston customer using these zero-days in March 2023 to target iPhones in Indonesia. The hackers delivered an SMS text message containing a malicious link that infected the target’s phone with spyware, and then redirected the victim to a news article by the Indonesian newspaper Pikiran Rakyat."

https://techcrunch.com/2024/02/06/government-hackers-targeted-iphones-owners-with-zero-days-google-says/?guccounter=1

simontsui, to random

Volexity recently disclosed details related to exploitation of Ivanti Connect Secure VPN, revealing how the attacker chained two zero-day vulnerabilities to achieve remote code execution. When investigating the source of compromise, Volexity employed memory forensics, analyzing a memory sample collected from a suspected compromised VPN device, which allowed Volexity to zero in on the source of the compromise. "The lesson for analysts is to independently verify the integrity and trustworthiness of high-value targets using memory forensics, rather than only relying on tools that run on a potentially compromised device."
🔗 https://www.volexity.com/blog/2024/02/01/how-memory-forensics-revealed-exploitation-of-ivanti-connect-secure-vpn-zero-day-vulnerabilities/

#ivanti #connectsecure #vulnerability #zeroday #eitw #activeexploitation #CISA #KEV #KnownExploitedVulnerabilitiesCatalog #CVE_2023_46805 #CVE_2024_21887 #UTA1078 #Volexity

simontsui, to random

watchTowr reports additional zero-days uncovered on a fully patched Ivanti appliance. No further information due to 90 day vulnerability disclosure policy.


cc: @todb @ntkramer @campuscodi @serghei @dangoodin @catc0n
CVE_2024_21893

zeljkazorz, to Cybersecurity

A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on supported (and some legacy) versions of Windows could spell trouble for enterprise defenders.

Discovered by a security researcher named Florian and reported to Microsoft, the vulnerability is yet to be patched. In the meantime, the researcher has gotten the go-ahead from the company to publish a PoC exploit.

@0patch

simontsui, to random

In CISA's ICS advisory, they revealed that several Hitron Systems Security Camera DVR denial of service vulnerabilities were being actively exploited. These are Zero days reported by Akamai.

  • CVE-2024-22768 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22769 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22770 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22771 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22772 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-23842 (7.4 high) improper input validation to Denial of Service

🔗 https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-04

simontsui, to random

Just your periodic update from Ivanti regarding their CVE-2023-46805 (8.2 high) and CVE-2024-21887 (9.1 critical) zero-days (both disclosed 10 January 2024 as exploited in the wild, has Proofs of Concept, mass exploitation):

"Update 26 January: The targeted release of patches for supported versions is delayed, this delay impacts all subsequent planned patch releases. We are now targeting next week to release a patch for Ivanti Connect Secure (versions 9.1R17x, 9.1R18x, 22.4R2x and 22.5R1.1), Ivanti Policy Secure (versions 9.1R17x, 9.1R18x and 22.5R1x) and ZTA version 22.6R1x.
Patches for supported versions will still be released on a staggered schedule. Instructions on how to upgrade to a supported version will also be provided.
The timing of patch release is subject to change as we prioritize the security and quality of each release. Please ensure you are following this article to receive updates as they become available."
🔗 https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US

simontsui, to apple

Hot off the press: Apple zero day: CVE-2024-23222 affects Webkit: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited.

simontsui, to vmware

CISA adds CVE-2023-34048 (9.8 critical, disclosed 25 October 2023 by VMware, reported by Mandiant as exploited as a zero-day since 2021) VMware vCenter Server Out-of-Bounds Write Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog.
🔗 https://www.cisa.gov/news-events/alerts/2024/01/22/cisa-adds-one-known-exploited-vulnerability-catalog

YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar

🚨 issues emergency directive against two major zero-day actively exploited flaws in Ivanti products.

https://thehackernews.com/2024/01/cisa-issues-emergency-directive-to.html

Patch your Ivanti Connect Secure and Policy Secure ASAP.

simontsui, to random

CISA issues Emergency Directive 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities in response to CVE-2023-46805 (8.2 high, disclosed by Ivanti on 10 January 2024 as exploited zero-days) authentication bypass in Ivanti Connect Secure VPN Version 9.x and 22.x and CVE-2024-21887 (9.1 critical) command injection in Ivanti Connect Secure VPN Version 9.x and 22.x

🔗 https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities

simontsui,

CISA released supplemental directions for Emergency Directive 24-01 Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities. This assumes anyone running Ivanti Connect Secure or Ivanti Policy Secure solutions have been compromised and the remediation steps include isolating the device from resources, continue threat hunting, performing a factory reset, applying the patch, etc.
🔗 https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities#SupplementalDirectionV1

#Ivanti #ConnectSecure #vulnerability #zeroday #eitw #activeexploitation #UTA0178 #UNC5221 #CVE_2023_46805 #CVE_2024_21887 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA #CVE_2024_21888 #CVE_2024_21893 #EmergencyDirective

simontsui, to random

Ron Bowes @iagox86 at @greynoise describes payloads leveraging the Ivanti Connect Secure vulnerabilities #CVE202346805 and #CVE202421887 to install cryptominers. IOC provided.
🔗 https://www.greynoise.io/blog/ivanti-connect-secure-exploited-to-install-cryptominers

#threatintel #Ivanti #ConnectSecure #zeroday #vulnerability #eitw #IOC #KEV

simontsui, to random

AssetNote documents the process they took in reverse engineering the Ivanti Connect Secure vulnerabilities CVE-2023-46805 (Authentication Bypass) & CVE-2024-21887 (Remote Command Execution), as well as understanding potential gaps in other detection mechanisms and exploit payloads that were published. They gave a shoutout to Ron Bowes @iagox86 at @greynoise
🔗 https://www.assetnote.io/resources/research/high-signal-detection-and-exploitation-of-ivantis-pulse-connect-secure-auth-bypass-rce

simontsui, to random

SANS ICS warned of scanning for Ivanti Connect Secure vulnerable to CVE-2023-46805 after Rapid7's vulnerability analysis on AttackerKB.
🔗 https://isc.sans.edu/diary/rss/30568

simontsui, to chrome

CISA Adds Three Known Exploited Vulnerabilities to Catalog:

  • CVE-2023-6549 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability
  • CVE-2023-6548 Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
  • CVE-2024-0519 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability

🔗 https://www.cisa.gov/news-events/alerts/2024/01/17/cisa-adds-three-known-exploited-vulnerabilities-catalog

simontsui,

CISA buries the lede in their cybersecurity alert about Citrix NetScaler ADC and NetScaler Gateway, by not mentioning that CVE-2023-6548 and CVE-2023-6549 are exploited zero-days. See the KEV Catalog announcement that this toot is a reply to.
🔗 https://www.cisa.gov/news-events/alerts/2024/01/18/citrix-releases-security-updates-netscaler-adc-and-netscaler-gateway
"Exploits of these CVEs on unmitigated appliances have been observed."

happygeek, to infosec

Happy New Year. Happy New Google Chrome Zero-Day.

By me at Forbes: The first exploited Chrome zero-day lands in 2024. That didn’t take long…

#infosec #google #chrome #zeroday #vulnerabilities

https://www.forbes.com/sites/daveywinder/2024/01/17/first-new-google-hack-attack-warning-for-2024-update-chrome-now/

br00t4c, to random
@br00t4c@mastodon.social avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • InstantRegret
  • rosin
  • modclub
  • Youngstown
  • khanakhh
  • Durango
  • slotface
  • mdbf
  • cubers
  • GTA5RPClips
  • kavyap
  • DreamBathrooms
  • ngwrru68w68
  • JUstTest
  • magazineikmin
  • osvaldo12
  • tester
  • tacticalgear
  • ethstaker
  • Leos
  • thenastyranch
  • everett
  • normalnudes
  • anitta
  • provamag3
  • cisconetworking
  • lostlight
  • All magazines