🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2020-4395

IBM Security Access Manager Appliance 9.0.7 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 179358.

📖 Read

via "National Vulnerability Database".
🔏 Microsoft Fixes Critical TCP/IP Vulnerability 🔏

A new, potentially wormable remote code execution vulnerability in the Windows TCP/IP stack was patched this week.

📖 Read

via "Digital Guardian".
Critical SonicWall VPN Portal Bug Allows DoS, Worming RCE

The CVE-2020-5135 stack-based buffer overflow security vulnerability is trivial to exploit, without logging in.

📖 Read

via "Threat Post".
🕴 What's Really Happening in Infosec Hiring Now? 🕴

As the pandemic continues, security teams still need help they can't get. But the "skills shortage" is only part of the story.

📖 Read

via "Dark Reading".
🛠 See-SURF 2.0 🛠

See-SURF is a python-based scanner to find potential SSRF parameters in a web application.

📖 Read

via "Packet Storm Security".
CVE-2020-15224

In Open Enclave before version 0.12.0, an information disclosure vulnerability exists when an enclave application using the syscalls provided by the sockets.edl is loaded by a malicious host application. An attacker who successfully exploited the vulnerability could read privileged data from the enclave heap across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information otherwise considered confidential in an enclave, which could be used in further compromises. The issue has been addressed in version 0.12.0 and the current master branch. Users will need to to recompile their applications against the patched libraries to be protected from this vulnerability.

📖 Read

via "National Vulnerability Database".
CVE-2020-7318

Cross-Site Scripting vulnerability in McAfee ePolicy Orchistrator (ePO) prior to 5.10.9 Update 9 allows administrators to inject arbitrary web script or HTML via parameter values for "syncPointList" not being correctly sanitsed.

📖 Read

via "National Vulnerability Database".
Travelex, Other Orgs Face DDoS Threats as Extortion Campaign Rages On

Organizations worldwide – including Travelex – have been sent letters threatening to launch DDoS attacks on their network unless a $230K ransom is paid.

📖 Read

via "Threat Post".
🕴 Zoom Announces Rollout of End-to-End Encryption 🕴

Phase 1 removes Zoom servers from the key generation and distribution processes.

📖 Read

via "Dark Reading".
CVE-2020-7383

A SQL Injection issue in Rapid7 Nexpose version prior to 6.6.49 that may have allowed an authenticated user with a low permission level to access resources & make changes they should not have been able to access.

📖 Read

via "National Vulnerability Database".
CVE-2020-8345

A DLL search path vulnerability was reported in the Lenovo HardwareScan Plugin for the Lenovo Vantage hardware scan feature prior to version 1.0.46.11 that could allow escalation of privilege.

📖 Read

via "National Vulnerability Database".
CVE-2020-6373

SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PDF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.

📖 Read

via "National Vulnerability Database".
CVE-2020-6372

SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PDF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.

📖 Read

via "National Vulnerability Database".
CVE-2020-5642

Cross-site request forgery (CSRF) vulnerability in Live Chat - Live support version 3.1.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.

📖 Read

via "National Vulnerability Database".
CVE-2020-7334

Improper privilege assignment vulnerability in the installer McAfee Application and Change Control (MACC) prior to 8.3.2 allows local administrators to change or update the configuration settings via a carefully constructed MSI configured to mimic the genuine installer. This version adds further controls for installation/uninstallation of software.

📖 Read

via "National Vulnerability Database".
🕴 Microsoft Office 365 Accounts a Big Target for Attackers 🕴

Just as they did with PowerShell for Windows, threat actors are abusing native O365 capabilities for lateral movement, command-and-control communication, and other malicious activity.

📖 Read

via "Dark Reading".
Carnival Corp. Ransomware Attack Affected Three Cruise Lines

Hackers accessed personal information of guests, employees and crew for Carnival Cruise, Holland America and Seabourn as well as casino operations.

📖 Read

via "Threat Post".
CVE-2020-7327

Improperly implemented security check in McAfee MVISION Endpoint Detection and Response Client (MVEDR) prior to 3.2.0 may allow local administrators to execute malicious code via stopping a core Windows service leaving McAfee core trust component in an inconsistent state resulting in MVEDR failing open rather than closed

📖 Read

via "National Vulnerability Database".
CVE-2020-7326

Improperly implemented security check in McAfee Active Response (MAR) prior to 2.4.4 may allow local administrators to execute malicious code via stopping a core Windows service leaving McAfee core trust component in an inconsistent state resulting in MAR failing open rather than closed

📖 Read

via "National Vulnerability Database".
Barnes & Noble Hack: A Reading List for Phishers and Crooks

Customers' lists of book purchases along with email addresses and more could have been exposed -- and that's a problem.

📖 Read

via "Threat Post".
🕴 The Ruthless Cyber Chaos of Business Recovery 🕴

Critical technology initiatives leveraging the best of technology solutions are the only way through the cyber chaos of 2020.

📖 Read

via "Dark Reading".