๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2021-34726 โ€ผ

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system of an affected device. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root-level privileges.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-34712 โ€ผ

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct cypher query language injection attacks on an affected system. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the interface of an affected system. A successful exploit could allow the attacker to obtain sensitive information.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-34723 โ€ผ

A vulnerability in a specific CLI command that is run on Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to overwrite arbitrary files in the configuration database of an affected device. This vulnerability is due to insufficient validation of specific CLI command parameters. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content of the configuration database and gain root-level access to an affected device.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-1623 โ€ผ

A vulnerability in the Simple Network Management Protocol (SNMP) punt handling function of Cisco cBR-8 Converged Broadband Routers could allow an authenticated, remote attacker to overload a device punt path, resulting in a denial of service (DoS) condition. This vulnerability is due to the punt path being overwhelmed by large quantities of SNMP requests. An attacker could exploit this vulnerability by sending a large number of SNMP requests to an affected device. A successful exploit could allow the attacker to overload the device punt path, resulting in a DoS condition.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ—“๏ธ Beego patches severe XSS vulnerability in open source web framework ๐Ÿ—“๏ธ

Security flaw allowed attackers to gain a foothold into a victimโ€™s network

๐Ÿ“– Read

via "The Daily Swig".
โŒ Large-Scale Phishing-as-a-Service Operation Exposed โŒ

Discovery of BulletProofLinkโ€”which provides phishing kits, email templates, hosting and other toolsโ€”sheds light on how wannabe cybercriminals can get into the business.

๐Ÿ“– Read

via "Threat Post".
๐Ÿ—“๏ธ Netgear fixes RCE flaw in routersโ€™ parental controls feature ๐Ÿ—“๏ธ

Bug in third-party code offers salutary lessons around enterprise risk management, say researchers

๐Ÿ“– Read

via "The Daily Swig".
โŒ Domain Brand Monitor: The First Brand Protection Layer by WhoisXML API โŒ

Domain names are often brands' most valuable and impersonated assets. Learn how Brand Monitor by WhoisXML API supports brand protection.

๐Ÿ“– Read

via "Threat Post".
โŒ Google Report Spotlights Uptick in Controversial โ€˜Geofence Warrantsโ€™ by Police โŒ

Digital privacy rights defenders contend that geofencing warrants grab data on everyone near a crime, without cause.

๐Ÿ“– Read

via "Threat Post".
โŒ Acronis Offers up to $5,000 to Users Who Spot Bugs in Its Cyber Protection Products โŒ

Once available only to the cybersecurity community, Acronis has opened its bug-hunting program to the public and aims to double the total bounties paid.

๐Ÿ“– Read

via "Threat Post".
โ™Ÿ๏ธ Indictment, Lawsuits Revive Trump-Alfa Bank Story โ™Ÿ๏ธ

In October 2016, media outlets reported that data collected by some of the world's most renowned cybersecurity experts had identified frequent and unexplained communications between an email server used by the Trump Organization and Alfa Bank, one of Russia's largest financial institutions. Those publications set off speculation about a possible secret back-channel of communications, as well as a series of lawsuits and investigations that culminated last week with the indictment of the same former federal cybercrime prosecutor who brought the data to the attention of the FBI five years ago.

๐Ÿ“– Read

via "Krebs on Security".
โ€ผ CVE-2021-22019 โ€ผ

The vCenter Server contains a denial-of-service vulnerability in VAPI (vCenter API) service. A malicious actor with network access to port 5480 on vCenter Server may exploit this issue by sending a specially crafted jsonrpc message to create a denial of service condition.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-22007 โ€ผ

The vCenter Server contains a local information disclosure vulnerability in the Analytics service. An authenticated user with non-administrative privilege may exploit this issue to gain access to sensitive information.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-22949 โ€ผ

A CSRF in Concrete CMS version 8.5.5 and below allows an attacker to duplicate files which can lead to UI inconvenience, and exhaustion of disk space.Credit for discovery: "Solar Security CMS Research Team"

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-22016 โ€ผ

The vCenter Server contains a reflected cross-site scripting vulnerability due to a lack of input sanitization. An attacker may exploit this issue to execute malicious scripts by tricking a victim into clicking a malicious link.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-22017 โ€ผ

Rhttproxy as used in vCenter Server contains a vulnerability due to improper implementation of URI normalization. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to bypass proxy leading to internal endpoints being accessed.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-22013 โ€ผ

The vCenter Server contains a file path traversal vulnerability leading to information disclosure in the appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-22010 โ€ผ

The vCenter Server contains a denial-of-service vulnerability in VPXD service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to create a denial of service condition due to excessive memory consumption by VPXD service.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-22015 โ€ผ

The vCenter Server contains multiple local privilege escalation vulnerabilities due to improper permissions of files and directories. An authenticated local user with non-administrative privilege may exploit these issues to elevate their privileges to root on vCenter Server Appliance.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-22014 โ€ผ

The vCenter Server contains an authenticated code execution vulnerability in VAMI (Virtual Appliance Management Infrastructure). An authenticated VAMI user with network access to port 5480 on vCenter Server may exploit this issue to execute code on the underlying operating system that hosts vCenter Server.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-22952 โ€ผ

A vulnerability found in UniFi Talk application V1.12.3 and earlier permits a malicious actor who has already gained access to a network to subsequently control Talk device(s) assigned to said network if they are not yet adopted. This vulnerability is fixed in UniFi Talk application V1.12.5 and later.

๐Ÿ“– Read

via "National Vulnerability Database".