circl, to random
@circl@social.circl.lu avatar

New Mitigations to Defend Against Exploitation of Ivanti Connect Secure and Policy Secure Gateways

"Threat actors are continuing to leverage vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways to capture credentials and/or drop webshells that enable further compromise of enterprise networks. "

#Ivanti #CISA #vulnerability

🔗 https://www.cisa.gov/news-events/alerts/2024/01/30/new-mitigations-defend-against-exploitation-ivanti-connect-secure-and-policy-secure-gateways

harrysintonen, to random

CVE-2023-6246 - syslog() heap-based buffer overflow - https://www.openwall.com/lists/oss-security/2024/01/30/6 - Impact: local privilege escalation to root

simontsui, to microsoft

Microsoft MSRC had a random security advisory for CVE-2024-21388 (6.5 medium) Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. Not publicly disclosed, not exploited, exploitation is less likely.
🔗 https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-21388

#Microsoft #MSRC #CVE_2024_21388 #vulnerability

simontsui, to random
simontsui, to random

In CISA's ICS advisory, they revealed that several Hitron Systems Security Camera DVR denial of service vulnerabilities were being actively exploited. These are Zero days reported by Akamai.

  • CVE-2024-22768 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22769 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22770 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22771 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22772 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-23842 (7.4 high) improper input validation to Denial of Service

🔗 https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-04

#CISA #ICS #zeroday #eitw #activeexploitation #vulnerability

simontsui, to random

Ivanti Avalanche directory traversal vulnerability CVE-2023-41474 (unknown CVSSv3 score) was publicly disclosed on 08 January 2024 with a proof of concept: https://github.com/JBalanza/CVE-2023-41474

#Ivanti #ivantiavalanche #vulnerability #CVE_2023_41474 #directorytraversal

raptor, to random
YourAnonRiots, to Cybersecurity Japanese

Make sure your Outlook is patched!

Hackers can remotely steal your Windows login 🔑 NTLM passwords through a #vulnerability in Outlook's calendar feature triggered via specially crafted invites.

https://thehackernews.com/2024/01/researchers-uncover-outlook.html

#cybersecurity #hacking

simontsui, to jenkins

Horizon3 discusses factors that could significantly increase the criticality of Jenkins RCE CVE-2024-23897 (9.8 critical): "There are two dangerous Jenkins configuration options that allow unauthenticated attackers to effectively act like authenticated attackers. The “Allow users to sign up” option allows anyone with access to the Jenkins instance to self-register an account. And the “Allow anonymous read access” option gives everyone the Overall/Read permission." The impact matrix alone was worth taking a look at.
🔗 https://www.horizon3.ai/cve-2024-23897-assessing-the-impact-of-the-jenkins-arbitrary-file-leak-vulnerability/

simontsui, to random

Juniper out-of-cycle security advisory for Junos OS SRX Series and EX Series:

  • CVE-2024-21619 (5.3 medium) unauthenticated information disclosure
  • CVE-2023-36846 (5.3 medium) unauthenticated remote impact to file system integrity (note: added to KEV Catalog on 13 November 2023)
  • CVE-2024-21620 (8.8 high) improper neutralization of input (cross-site scripting)
  • CVE-2023-36851 (5.3 medium) unauthenticated remote impact to file system integrity (note: added to KEV Catalog on 13 November 2023)

🔗 https://supportportal.juniper.net/s/article/2024-01-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-have-been-addressed?language=en_US

#Juniper #JunosOS #vulnerability #CVE_2024_21619 #CVE_2023_36846 #CVE_2024_21620 #CVE_2023_36851 #KEV #eitw #KnownExploitedVulnerabilitiesCatalog #CISA

simontsui, to random

Just your periodic update from Ivanti regarding their CVE-2023-46805 (8.2 high) and CVE-2024-21887 (9.1 critical) zero-days (both disclosed 10 January 2024 as exploited in the wild, has Proofs of Concept, mass exploitation):

"Update 26 January: The targeted release of patches for supported versions is delayed, this delay impacts all subsequent planned patch releases. We are now targeting next week to release a patch for Ivanti Connect Secure (versions 9.1R17x, 9.1R18x, 22.4R2x and 22.5R1.1), Ivanti Policy Secure (versions 9.1R17x, 9.1R18x and 22.5R1x) and ZTA version 22.6R1x.
Patches for supported versions will still be released on a staggered schedule. Instructions on how to upgrade to a supported version will also be provided.
The timing of patch release is subject to change as we prioritize the security and quality of each release. Please ensure you are following this article to receive updates as they become available."
🔗 https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US

simontsui, to jenkins

Jenkins RCE CVE-2024-23897 (9.8 critical, proofs of concept publicly available) allegedly being exploited in the wild, reported 3 days ago by a graduate student researcher* of Sky Computing Lab, UC Berkeley.

harrysintonen, to infosec

Linux shim has a heap buffer overflow CVE-2023-40547 that allows arbitrary code execution and full system compromise when attacker is able to control the HTTP response.

Fix: https://github.com/rhboot/shim/commit/0226b56513b2b8bd5fd281bce77c40c9bf07c66d

simontsui, to microsoft

random Microsoft MSRC security advisory: CVE-2024-21336 (2.5 low) Microsoft Edge (Chromium-based) Spoofing Vulnerability. Marked Not Publicly Disclosed, Not Exploited, Exploitation Less Likely.
🔗 https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-21336

YourAnonRiots, to Cybersecurity Japanese

📢 Tesla, Sony, Alpine Players and others Hacked on Day One at #Pwn2Own Automotive 2024.

https://hackread.com/pwn2own-automotive-tesla-sony-alpine-players-hack/

#Pwn2OwnAutomotive #CyberSecurity #Vulnerability #Tesla

YourAnonRiots, to Cybersecurity Japanese

🚨 Urgent: Critical Jenkins RCE #vulnerability (CVE-2024-23897) discovered.

Hackers can remotely control your CI/CD pipelines. Patch immediately to prevent malicious code in builds.

https://thehackernews.com/2024/01/critical-jenkins-vulnerability-exposes.html

#cybersecurity #informationsecurity

SonarResearch, to jenkins

🔍Uncovering critical vulnerabilities in Jenkins, which could lead to RCE (CVE-2024-23898, CVE-2024-23897):

Check out our latest blog post for the technical details on how attackers could potentially gain unauthenticated RCE on

https://www.sonarsource.com/blog/excessive-expansion-uncovering-critical-security-vulnerabilities-in-jenkins/?utm_medium=social&utm_source=mastodon&utm_campaign=research&utm_content=blog-excessive-expansion-uncovering-critical-security-vulnerabilities-in-jenkins-240125-p1&utm_term=ww_en_all_x

83r71n, to Cybersecurity

A popular file transfer software from Fortra called GoAnywhere Managed File Transfer (MFT) has been found to have a serious security flaw. This flaw, known as a path traversal weakness, could give anyone free administrator rights over the system. The flaw was discovered in December 2023 by cybersecurity researchers Mohammed Eldeeb and Islam Elrfai from Spark Engineering Consultants and disclosed to GoAnywhere’s developer, Fortra. The flaw has a severity score of 9.8 out of 10, making it extremely critical. Users are urged to patch the software immediately to prevent potential misuse and avoid further issues.

https://www.fortra.com/security/advisory/fi-2024-001

#cybersecurity #fortra #goanywhere #mft #vulnerability #patch

CVE_Program, to opensource

Tod Beardsley of Austin Hackers Anonymous has joined the CVE Board. Tod is also currently the CNA Board Liaison.
https://cve.org/Media/News/item/news/2024/01/23/New-CVE-Board-Member-Austin-Hackers-Anonymous

simontsui, to firefox
simontsui, to Citrix

Citrix Hypervisor Security Bulletin for CVE-2023-46838. "An issue has been discovered that affects Citrix Hypervisor 8.2 CU1 LTSR and may allow malicious privileged code in a guest VM to cause the host to crash or become unresponsive." We have released a hotfix (NOTE: NOT A PROPER PATCH) to address this issue.
🔗 https://support.citrix.com/article/CTX587605/citrix-hypervisor-security-bulletin-for-cve202346838

simontsui, to apple

Hot off the press: Apple zero day: CVE-2024-23222 affects Webkit: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited.

#Apple #zeroday #vulnerability #activeexploitation #eitw #CVE202423222

simontsui, to random

Johannes Ullrich @jullrich of SANS ISC warns of scanning and exploitation attempts of the Atlassian Confluence RCE vulnerability CVE-2023-22527 (10.0 critical, disclosed 16 January 2024 by Atlassian).
🔗 https://isc.sans.edu/diary/rss/30576

simontsui, to random

Ron Bowes @iagox86 of @greynoise blogs about the Confusing History of F5 BIG-IP RCE Vulnerabilities, stemming from a unidentified shell-injection attack against the filePath parameter in the F5 BIG-IP login page. This turned out to be CVE-2021-23015, but the path to figuring that out is an interesting read.
🔗 https://www.labs.greynoise.io/grimoire/2024-01-14-f5-rce-explained/

simontsui, to vmware

CISA adds CVE-2023-34048 (9.8 critical, disclosed 25 October 2023 by VMware, reported by Mandiant as exploited as a zero-day since 2021) VMware vCenter Server Out-of-Bounds Write Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog.
🔗 https://www.cisa.gov/news-events/alerts/2024/01/22/cisa-adds-one-known-exploited-vulnerability-catalog

#CVE202334048 #VMware #CISA #KEV #eitw #activeexploitation #Mandiant #UNC3886 #cyberespionage #vCenter #zeroday #vulnerability #cybersecurity

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • khanakhh
  • mdbf
  • ethstaker
  • magazineikmin
  • cubers
  • rosin
  • thenastyranch
  • Youngstown
  • InstantRegret
  • slotface
  • osvaldo12
  • kavyap
  • DreamBathrooms
  • JUstTest
  • Durango
  • everett
  • tacticalgear
  • modclub
  • normalnudes
  • ngwrru68w68
  • cisconetworking
  • tester
  • GTA5RPClips
  • Leos
  • anitta
  • provamag3
  • lostlight
  • All magazines