🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2021-36356

KRAMER VIAware through August 2021 allows remote attackers to execute arbitrary code because ajaxPages/writeBrowseFilePathAjax.php accepts arbitrary executable pathnames (even though browseSystemFiles.php is no longer reachable via the GUI). NOTE: this issue exists because of an incomplete fix for CVE-2019-17124.

📖 Read

via "National Vulnerability Database".
LockFile Ransomware Uses Never-Before Seen Encryption to Avoid Detection

Researchers from Sophos discovered the emerging threat in July, which exploits the ProxyShell vulnerabilities in Microsoft Exchange servers to attack systems.

📖 Read

via "Threat Post".
🦿 Cybercriminals are holding schools ransom for billions and some are paying up 🦿

A new report highlights the financial costs of school ransomware, days lost to downtime and the number of students impacted, as these incidents become a steady source of criminal income.

📖 Read

via "Tech Republic".
CVE-2021-34578

This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07.

📖 Read

via "National Vulnerability Database".
CVE-2021-34559

In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings.

📖 Read

via "National Vulnerability Database".
CVE-2021-33555

In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.7 the filename parameter is vulnerable to unauthenticated path traversal attacks, enabling read access to arbitrary files on the server.

📖 Read

via "National Vulnerability Database".
CVE-2021-34565

In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.

📖 Read

via "National Vulnerability Database".
CVE-2021-34560

In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once.

📖 Read

via "National Vulnerability Database".
CVE-2021-34562

In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response.

📖 Read

via "National Vulnerability Database".
CVE-2021-3749

axios is vulnerable to Inefficient Regular Expression Complexity

📖 Read

via "National Vulnerability Database".
CVE-2021-34564

Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credentials to the PEPPERL+FUCHS WirelessHART-Gateway 3.0.9.

📖 Read

via "National Vulnerability Database".
CVE-2021-34563

In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.

📖 Read

via "National Vulnerability Database".
CVE-2021-34561

In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser.

📖 Read

via "National Vulnerability Database".
CVE-2021-34581

Missing Release of Resource after Effective Lifetime vulnerability in OpenSSL implementation of WAGO 750-831/xxx-xxx, 750-880/xxx-xxx, 750-881, 750-889 in versions FW4 up to FW15 allows an unauthenticated attacker to cause DoS on the device.

📖 Read

via "National Vulnerability Database".
🦿 Cybercriminals buy up admin credentials to sharpen attacks on cloud deployments 🦿

Lacework analysis finds that SSH, SQL, Docker and Redis were the most common targets over the last three months.

📖 Read

via "Tech Republic".
Top 3 APIs Vulnerabilities: Why Apps are Owned by Cyberattackers

Jason Kent, hacker-in-residence at Cequence, talks about how cybercriminals target apps and how to thwart them.

📖 Read

via "Threat Post".
🦿 Delta variant: Is your IT department ready to go fully remote again due to COVID-19? 🦿

The delta variant is delaying office reentry plans. For companies going fully remote again, team cohesion, cloud investments and reducing IT burden could be key, according to tech experts.

📖 Read

via "Tech Republic".
CVE-2021-35219

ExportToPdfCmd Arbitrary File Read Information Disclosure Vulnerability using ImportAlert function within the Alerts Settings page.

📖 Read

via "National Vulnerability Database".
CVE-2021-35220

Command Injection vulnerability in EmailWebPage API which can lead to a Remote Code Execution (RCE) from the Alerts Settings page.

📖 Read

via "National Vulnerability Database".
CVE-2021-35222

This vulnerability allows attackers to impersonate users and perform arbitrary actions leading to a Remote Code Execution (RCE) from the Alerts Settings page.

📖 Read

via "National Vulnerability Database".
CVE-2021-35221

Improper Access Control Tampering Vulnerability using ImportAlert function which can lead to a Remote Code Execution (RCE) from the Alerts Settings page.

📖 Read

via "National Vulnerability Database".