hrbrmstr, to random
@hrbrmstr@mastodon.social avatar

Well, good to know the dashboard automation is working https://kev.hrbrmstr.app/

hrbrmstr, to rust
@hrbrmstr@mastodon.social avatar

Made a small #Rust CLI to check @CISAgov #KEV and run a specified command if it has changed since the last run. e.g.,

$ kevcheck --cmd /path/to/some/executable  

Shld work nicely in cron jobs.

Code: https://codeberg.org/hrbrmstr/kev-check

simontsui, to random

Hot off the press! CISA adds CVE-2023-43770 (6.1 medium) Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog.
🔗 (to be replaced later) https://www.cisa.gov/known-exploited-vulnerabilities-catalog

#CISA #KEV #KnownExploitedVulnerabilitiesCatalog #vulnerability #eitw #Roundcube #XSS #activeexploitation #CVE_2023_43770

simontsui,

Why you should care about CVE-2023-43770:
ESET Research previously reported on 25 October 2023 that the Winter Vivern APT was exploiting a similar RoundCube cross-site scripting vulnerability CVE-2023-5631 as a zero-day against European overnmental entities and a think tank.

#CISA #KEV #KnownExploitedVulnerabilitiesCatalog #vulnerability #eitw #Roundcube #XSS #activeexploitation #CVE_2023_43770 #WinterVivern #APT #cyberespionage

simontsui, to chrome

Hot off the press! CISA adds CVE-2023-4762 (8.8 high Google Chrome Type Confusion in V8 JavaScript Engine) to the Known Exploited Vulnerabilities Catalog.
🔗 (to be replaced later) https://www.cisa.gov/known-exploited-vulnerabilities-catalog

#CISA #KEV #KnownExploitedVulnerabilitiesCatalog #vulnerability #CVE_2023_4762 #Chrome #eitw #activeexploitation

simontsui, to random

Horizon3 analyzed critical vulnerabilities from the CISA KEV catalog starting from January 2023 through January 2024, categorized the vulnerability root causes, and attempted to analyze if the current efforts in the information security industry match with the current threat vectors being abused.
🔗 https://www.horizon3.ai/analysis-of-2023s-known-exploited-vulnerabilities/

#CISA #KEV #vulnerability #KnownExploitedVulnerabilitiesCatalog #eitw #horizon3

simontsui, to random

Volexity recently disclosed details related to exploitation of Ivanti Connect Secure VPN, revealing how the attacker chained two zero-day vulnerabilities to achieve remote code execution. When investigating the source of compromise, Volexity employed memory forensics, analyzing a memory sample collected from a suspected compromised VPN device, which allowed Volexity to zero in on the source of the compromise. "The lesson for analysts is to independently verify the integrity and trustworthiness of high-value targets using memory forensics, rather than only relying on tools that run on a potentially compromised device."
🔗 https://www.volexity.com/blog/2024/02/01/how-memory-forensics-revealed-exploitation-of-ivanti-connect-secure-vpn-zero-day-vulnerabilities/

#ivanti #connectsecure #vulnerability #zeroday #eitw #activeexploitation #CISA #KEV #KnownExploitedVulnerabilitiesCatalog #CVE_2023_46805 #CVE_2024_21887 #UTA1078 #Volexity

simontsui, to random

watchTowr reports additional zero-days uncovered on a fully patched Ivanti appliance. No further information due to 90 day vulnerability disclosure policy.

#Ivanti #ConnectSecure #vulnerability #zeroday #eitw #activeexploitation #UTA0178 #UNC5221 #CVE_2023_46805 #CVE_2024_21887 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA #CVE_2024_21888
#CVE_2024_21893 cc: @todb @ntkramer @campuscodi @serghei @dangoodin @catc0n
CVE_2024_21893

simontsui, to apple

Hot off the press! CISA adds CVE-2022-48618 to the Known Exploited Vulnerabilities (KEV) Catalog.
Apple Multiple Products Improper Authentication Vulnerability: Apple iOS, iPadOS, macOS, tvOS, and watchOS contain an improper authentication vulnerability that allows an attacker with read and write capabilities to bypass Pointer Authentication.
🔗 https://www.cisa.gov/known-exploited-vulnerabilities-catalog (to be replaced later with official announcement)

#Apple #KnownExploitedVulnerabilitiesCatalog #activeexploitation #vulnerability #KEV #CVE_2022_48618

simontsui,

There's some degree of cybersecurity-hostility (as opposed to user-friendly) that a company can bury an exploited vulnerability affecting their product in a 2 year old security advisory, and the ONLY reason the general public is aware of it is from a government announcement.

#Apple #KnownExploitedVulnerabilitiesCatalog #activeexploitation #vulnerability #KEV #CVE_2022_48618

simontsui, to random

Juniper out-of-cycle security advisory for Junos OS SRX Series and EX Series:

  • CVE-2024-21619 (5.3 medium) unauthenticated information disclosure
  • CVE-2023-36846 (5.3 medium) unauthenticated remote impact to file system integrity (note: added to KEV Catalog on 13 November 2023)
  • CVE-2024-21620 (8.8 high) improper neutralization of input (cross-site scripting)
  • CVE-2023-36851 (5.3 medium) unauthenticated remote impact to file system integrity (note: added to KEV Catalog on 13 November 2023)

🔗 https://supportportal.juniper.net/s/article/2024-01-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-have-been-addressed?language=en_US

#Juniper #JunosOS #vulnerability #CVE_2024_21619 #CVE_2023_36846 #CVE_2024_21620 #CVE_2023_36851 #KEV #eitw #KnownExploitedVulnerabilitiesCatalog #CISA

simontsui, to random

Just your periodic update from Ivanti regarding their CVE-2023-46805 (8.2 high) and CVE-2024-21887 (9.1 critical) zero-days (both disclosed 10 January 2024 as exploited in the wild, has Proofs of Concept, mass exploitation):

"Update 26 January: The targeted release of patches for supported versions is delayed, this delay impacts all subsequent planned patch releases. We are now targeting next week to release a patch for Ivanti Connect Secure (versions 9.1R17x, 9.1R18x, 22.4R2x and 22.5R1.1), Ivanti Policy Secure (versions 9.1R17x, 9.1R18x and 22.5R1x) and ZTA version 22.6R1x.
Patches for supported versions will still be released on a staggered schedule. Instructions on how to upgrade to a supported version will also be provided.
The timing of patch release is subject to change as we prioritize the security and quality of each release. Please ensure you are following this article to receive updates as they become available."
🔗 https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US

#Ivanti #ConnectSecure #vulnerability #zeroday #eitw #activeexploitation #UTA0178 #UNC5221 #CVE_2023_46805 #CVE_2024_21887 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA

simontsui, to vmware

CISA adds CVE-2023-34048 (9.8 critical, disclosed 25 October 2023 by VMware, reported by Mandiant as exploited as a zero-day since 2021) VMware vCenter Server Out-of-Bounds Write Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog.
🔗 https://www.cisa.gov/news-events/alerts/2024/01/22/cisa-adds-one-known-exploited-vulnerability-catalog

#CVE202334048 #VMware #CISA #KEV #eitw #activeexploitation #Mandiant #UNC3886 #cyberespionage #vCenter #zeroday #vulnerability #cybersecurity

simontsui, to random

CISA issues Emergency Directive 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities in response to CVE-2023-46805 (8.2 high, disclosed by Ivanti on 10 January 2024 as exploited zero-days) authentication bypass in Ivanti Connect Secure VPN Version 9.x and 22.x and CVE-2024-21887 (9.1 critical) command injection in Ivanti Connect Secure VPN Version 9.x and 22.x

🔗 https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities

#Ivanti #ConnectSecure #vulnerability #zeroday #eitw #activeexploitation #UTA0178 #UNC5221 #CVE202346805 #CVE202421887

simontsui,

CISA released supplemental directions for Emergency Directive 24-01 Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities. This assumes anyone running Ivanti Connect Secure or Ivanti Policy Secure solutions have been compromised and the remediation steps include isolating the device from resources, continue threat hunting, performing a factory reset, applying the patch, etc.
🔗 https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities#SupplementalDirectionV1

simontsui, to random

Ron Bowes @iagox86 at @greynoise describes payloads leveraging the Ivanti Connect Secure vulnerabilities and to install cryptominers. IOC provided.
🔗 https://www.greynoise.io/blog/ivanti-connect-secure-exploited-to-install-cryptominers

simontsui, to random

AssetNote documents the process they took in reverse engineering the Ivanti Connect Secure vulnerabilities CVE-2023-46805 (Authentication Bypass) & CVE-2024-21887 (Remote Command Execution), as well as understanding potential gaps in other detection mechanisms and exploit payloads that were published. They gave a shoutout to Ron Bowes @iagox86 at @greynoise
🔗 https://www.assetnote.io/resources/research/high-signal-detection-and-exploitation-of-ivantis-pulse-connect-secure-auth-bypass-rce

#AssetNote #Ivanti #ConnectSecure #zeroday #CVE202346805 #CVE202421887 #eitw #KEV #KnownExploitedVulnerabilitiesCatalog #activeexploitation

simontsui, to chrome

CISA Adds Three Known Exploited Vulnerabilities to Catalog:

  • CVE-2023-6549 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability
  • CVE-2023-6548 Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
  • CVE-2024-0519 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability

🔗 https://www.cisa.gov/news-events/alerts/2024/01/17/cisa-adds-three-known-exploited-vulnerabilities-catalog

simontsui, to random

CISA and FBI released a joint Cybersecurity Advisory (CSA), Known Indicators of Compromise Associated with Androxgh0st Malware, to disseminate known indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with threat actors deploying Androxgh0st malware.
🔗 https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-016a

simontsui,

Hot off the press: CISA adds CVE-2018-15133 (8.1 high, disclosed 09 August 2018) Laravel Deserialization of Untrusted Data Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog. No official press release yet
🔗 https://www.cisa.gov/news-events/alerts/2024/01/16/cisa-adds-one-known-exploited-vulnerability-catalog

cc: @hrbrmstr

#CISA #KEV #eitw #activeexploitation #CVE201815133

simontsui,

Vulnerabilities mentioned in this CISA cybersecurity advisory:

  • CVE-2017-9841 (9.8 critical, disclosed 27 June 2017, added to CISA KEV Catalog 15 February 2022) arbitrary PHP code execution in PHPUnit
  • CVE-2018-15133 (8.1 high, disclosed 09 August 2018, added to KEV 16 January 2024) Laravel Deserialization of Untrusted Data Vulnerability (RCE)
  • CVE-2021-41773 (7.5 high, disclosed 05 October 2021, added to KEV 03 November 2021) Apache HTTP Server Path Traversal Vulnerability (RCE)

#CVE201815133 #KEV #vulnerability #CVE20179841 #CVE202141773 #eitw #activeexploitation

simontsui, to random

Hot off the press: CISA adds four Qualcomm vulnerabilities to the Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation:

  • CVE-2023-33106 (8.4 high severity) Qualcomm Multiple Chipsets Use of Out-of-Range Pointer Offset Vulnerability
  • CVE-2023-33063 (7.8 high) Qualcomm Multiple Chipsets Use-After-Free Vulnerability
  • CVE-2023-33107 (8.4 high) Qualcomm Multiple Chipsets Integer Overflow Vulnerability
  • CVE-2022-22071 (7.8 high) Qualcomm Multiple Chipsets Use-After-Free Vulnerability

#CISA #KnownExploitedVulnerabilitiesCatalog #KEV #eitw #activeexploitation #CVE202333106 #CVE202333107 #CVE202333063 #CVE202222071 #Qualcomm

simontsui, to apple

Hot off the press: CISA adds the two Apple Zero-Days to the Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation:

  • CVE-2023-42916 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability
  • CVE-2023-42917 Apple Multiple Products WebKit Memory Corruption Vulnerability

#CISA #KnownExploitedVulnerabilitiesCatalog #KEV #eitw #activeexploitation #CVE202342916 #CVE202342917 #Apple #zeroday #vulnerability

simontsui, to random

Hot off the press: CISA removed CVE-2022-28958 (D-Link DIR-816L Remote Code Execution Vulnerability) from the Known Exploited Vulnerabilities Catalog. The KEV Team determined that CVE-2022-28958 is no longer a valid vulnerability, as the CVE record has since been rejected by the issuing CVE Numbering Authority.

#CISA #KEV #KnownExploitedVulnerabilitiesCatalog

simontsui, to random

Dark Reading: "Exploited Vulnerabilities Can Take Months to Make KEV List" 🤔 The author himself admits that there were exploitation "attempts," and "likely exploited." I think the keyword in KEV Catalog is Known. @todb I figured you'd have a good laugh.

Link: https://www.darkreading.com/edge/exploited-vulnerabilities-take-months-to-make-kev-list

#KEV #CISA #KnownExploitedVulnerabilitiesCatalog

simontsui, to Citrix

CISA, FBI, MS-ISAC, and ASD’s ACSC Release Advisory : LockBit Ransomware Affiliates Exploit CVE-2023-4966 Citrix Bleed Vulnerability (along with an accompanying analysis report MAR-10478915-1.v1 Citrix Bleed), in response to LockBit 3.0 ransomware affiliates and multiple threat actor groups exploiting CVE-2023-4966. Labeled Citrix Bleed, the vulnerability affects Citrix’s NetScaler web application delivery control (ADC) and NetScaler Gateway appliances.
Link: https://www.cisa.gov/news-events/alerts/2023/11/21/cisa-fbi-ms-isac-and-asds-acsc-release-advisory-lockbit-affiliates-exploiting-citrix-bleed

citrixbleed

simontsui, to random

CISA adds CVE-2023-4911 (CVSS: 7.8 high severity, disclosed 03 October 2023 by Qualys) GNU C Library Buffer Overflow Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog based on evidence of active exploitation.
Link: https://www.cisa.gov/news-events/alerts/2023/11/21/cisa-adds-one-known-exploited-vulnerability-catalog

#CISA #KEV #KnownExploitedVulnerabilitiesCatalog #vulnerability #eitw #activeexploitation #looneytunables #CVE20234911

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines