πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-20427 β€Ό

IBM Security Guardium 11.2 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 196314.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38545 β€Ό

Raspberry Pi 3 B+ and 4 B devices through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. We assume that the Raspberry Pi supplies power to some speakers. The power indicator LED of the Raspberry Pi is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects the Raspberry Pi's power consumption and as a result is also correlative to the light intensity of the LED. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LED of the Raspberry Pi, we can recover the sound played by the speakers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38543 β€Ό

TP-Link UE330 USB splitter devices through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. We assume that the USB splitter supplies power to some speakers. The power indicator LED of the USB splitter is connected directly to the power line, as a result, the intensity of the USB splitter's power indicator LED is correlative to its power consumption. The sound played by the connected speakers affects the USB splitter's power consumption and as a result is also correlative to the light intensity of the LED. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LED of the USB splitter, we can recover the sound played by the connected speakers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20418 β€Ό

IBM Security Guardium 11.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 196279.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38546 β€Ό

CREATIVE Pebble devices through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3050 β€Ό

An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 9.0 version 9.0.10 through PAN-OS 9.0.14; PAN-OS 9.1 version 9.1.4 through PAN-OS 9.1.10; PAN-OS 10.0 version 10.0.7 and earlier PAN-OS 10.0 versions; PAN-OS 10.1 version 10.1.0 through PAN-OS 10.1.1. Prisma Access firewalls and firewalls running PAN-OS 8.1 versions are not impacted by this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3048 β€Ό

Certain invalid URL entries contained in an External Dynamic List (EDL) cause the Device Server daemon (devsrvr) to stop responding. This condition causes subsequent commits on the firewall to fail and prevents administrators from performing commits and configuration changes even though the firewall remains otherwise functional. If the firewall then restarts, it results in a denial-of-service (DoS) condition and the firewall stops processing traffic. This issue impacts: PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.5. PAN-OS 8.1 and PAN-OS 10.1 versions are not impacted.

πŸ“– Read

via "National Vulnerability Database".
❌ NSA Watchdog Will Review Tucker Carlson Spying Claims ❌

Despite a lack of evidence, the National Security Agency will investigate whether the Fox host was illegally targeted.

πŸ“– Read

via "Threat Post".
🦿 Top 5 ransomware operators by income 🦿

Tom Merritt lists the most lucrative ransomware gangs and why they're dangerous.

πŸ“– Read

via "Tech Republic".
🦿 Ransomware operators by income: Top 5 🦿

Ransomware gangs continue because they make a lot of money. Tom Merritt talks about the five most lucrative ones.

πŸ“– Read

via "Tech Republic".
πŸ” White House Presses Agencies to Protect Critical Software πŸ”

The countdown is on for federal agencies to identify and safeguard critical software. A new White House memo gives entities one year to incorporate new security measures.

πŸ“– Read

via "".
β€Ό CVE-2020-21976 β€Ό

An arbitrary file upload in the <input type="file" name="user_image"> component of NewsOne CMS v1.1.0 allows attackers to webshell and execute arbitrary commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23421 β€Ό

All versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38085 β€Ό

The Canon TR150 print driver through 3.71.2.10 is vulnerable to a privilege escalation issue. During the add printer process, a local attacker can overwrite CNMurGE.dll and, if timed properly, the overwritten DLL will be loaded into a SYSTEM process resulting in escalation of privileges. This occurs because the driver drops a world-writable DLL into a CanonBJ %PROGRAMDATA% location that gets loaded by printisolationhost (a system process).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37694 β€Ό

@asyncapi/java-spring-cloud-stream-template generates a Spring Cloud Stream (SCSt) microservice. In versions prior to 0.7.0 arbitrary code injection was possible when an attacker controls the AsyncAPI document. An example is provided in GHSA-xj6r-2jpm-qvxp. There are no mitigations available and all users are advised to update.

πŸ“– Read

via "National Vulnerability Database".
❌ Accenture Confirms LockBit Ransomware Attack ❌

LockBit offered Accenture's purported databases and made a requisite jab at its purportedly sad security. Accenture says it recovered just fine from backups.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-21363 β€Ό

An arbitrary file deletion vulnerability exists within Maccms10.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25560 β€Ό

In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on Ò€œpingҀ�, Ò€œtracerouteҀ� and Ò€œsnmpҀ� functions and execute code on the server. We also observed the same is true if the JSESSIONID is completely removed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33793 β€Ό

Foxit Reader before 10.1.4 and PhantomPDF before 10.1.4 have an out-of-bounds write because the Cross-Reference table is mishandled during Office document conversion.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33791 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22098 β€Ό

UAA server versions prior to 75.4.0 are vulnerable to an open redirect vulnerability. A malicious user can exploit the open redirect vulnerability by social engineering leading to take over of victimsÒ€ℒ accounts in certain cases along with redirection of UAA users to a malicious sites.

πŸ“– Read

via "National Vulnerability Database".