🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🔏 Friday Five 11/6 🔏

New privacy laws, botnet schemes, and Bitcoin seizures - catch up on all the week's infosec news with the Friday Five!

📖 Read

via "Digital Guardian".
🕴 Name That Toon: Masks and Manners 🕴

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

📖 Read

via "Dark Reading".
CVE-2020-8580

SANtricity OS Controller Software versions 11.30 and higher are susceptible to a vulnerability which allows an unauthenticated attacker with access to the system to cause a Denial of Service (DoS).

📖 Read

via "National Vulnerability Database".
CVE-2020-7198

There is a remote escalation of privilege possible for a malicious user that has a OneView account in OneView and Synergy Composer. HPE has provided updates to Oneview and Synergy Composer: Update to version 5.5 of OneView, Composer, or Composer2.

📖 Read

via "National Vulnerability Database".
CVE-2020-5795

UNIX Symbolic Link (Symlink) Following in TP-Link Archer A7(US)_V5_200721 allows an authenticated admin user, with physical access and network access, to execute arbitrary code after plugging a crafted USB drive into the router.

📖 Read

via "National Vulnerability Database".
Gitpaste-12 Worm Targets Linux Servers, IoT Devices

The newly discovered malware uses GitHub and Pastebin to house component code, and harbors 12 different initial attack vectors.

📖 Read

via "Threat Post".
🕴 The Oracle-Walmart-TikTok Deal Is Not Enough 🕴

The social media deal raises issues involving data custodianship and trusted tech partnerships.

📖 Read

via "Dark Reading".
CVE-2020-25170

An Excel Macro Injection vulnerability exists in the export feature in the B. Braun OnlineSuite Version AP 3.0 and earlier via multiple input fields that are mishandled in an Excel export.

📖 Read

via "National Vulnerability Database".
CVE-2020-26214

In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients.

📖 Read

via "National Vulnerability Database".
CVE-2020-26213

In teler before version 0.0.1, if you run teler inside a Docker container and encounter `errors.Exit` function, it will cause denial-of-service (`SIGSEGV`) because it doesn't get process ID and process group ID of teler properly to kills. The issue is patched in teler 0.0.1 and 0.0.1-dev5.1.

📖 Read

via "National Vulnerability Database".
CVE-2020-25174

A DLL hijacking vulnerability in the B. Braun OnlineSuite Version AP 3.0 and earlier allows local attackers to execute code on the system as a high privileged user.

📖 Read

via "National Vulnerability Database".
CVE-2017-18926

raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml).

📖 Read

via "National Vulnerability Database".
CVE-2020-25172

A relative path traversal attack in the B. Braun OnlineSuite Version AP 3.0 and earlier allows unauthenticated attackers to upload or download arbitrary files.

📖 Read

via "National Vulnerability Database".
CVE-2020-8577

SANtricity OS Controller Software versions 11.50.1 and higher are susceptible to a vulnerability which could allow an attacker to discover sensitive information by intercepting its transmission within an https session.

📖 Read

via "National Vulnerability Database".
CVE-2020-5794

A vulnerability in Nessus Network Monitor versions 5.11.0, 5.11.1, and 5.12.0 for Windows could allow an authenticated local attacker to execute arbitrary code by copying user-supplied files to a specially constructed path in a specifically named user directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability.

📖 Read

via "National Vulnerability Database".
Feds Seize $1B in Bitcoin from Silk Road

The illegal marketplace was hacked prior to it's takedown -- the IRS has now tracked down those stolen funds, it said.

📖 Read

via "Threat Post".
Campari Site Suffers Ransomware Hangover

The Ragnar Locker operators released a stolen contract between Wild Turkey and actor Matthew McConaughey, as proof of compromise.

📖 Read

via "Threat Post".
🕴 Apple Patches 24 Vulnerabilities Across Product Lines 🕴

The vulnerabilities include three for which exploits have already been seen in the wild.

📖 Read

via "Dark Reading".
🕴 New Gitpaste-12 Botnet Exploits 12 Known Vulnerabilities 🕴

Researchers discover a new worm and botnet dubbed Gitpaste-12 for its ability to spread via GitHub and Pastebin.

📖 Read

via "Dark Reading".
CVE-2020-26084

A vulnerability in the REST API of Cisco Edge Fog Fabric could allow an authenticated, remote attacker to access files outside of their authorization sphere on an affected device. The vulnerability is due to incorrect authorization enforcement on an affected system. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.

📖 Read

via "National Vulnerability Database".
CVE-2020-3551

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

📖 Read

via "National Vulnerability Database".