πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ North Korean Hacking Group Targets Diplomats, Forgoes Malware πŸ•΄

The TA406 group uses credential harvesting to target diplomats and policy experts in the United States, Russia, China, and South Korea, rarely resorting to malware.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-37322 β€Ό

GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Exchange Server Flaws Now Exploited for BEC Attacks πŸ•΄

Attackers also are deploying ProxyShell and abusing the vulnerabilities in stealthier manner, researchers say.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-40129 β€Ό

A vulnerability in the configuration dashboard of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to submit a SQL query through the CSPC configuration dashboard. This vulnerability is due to insufficient input validation of uploaded files. An attacker could exploit this vulnerability by uploading a file containing a SQL query to the configuration dashboard. A successful exploit could allow the attacker to read restricted information from the CSPC SQL database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40130 β€Ό

A vulnerability in the web application of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to specify non-log files as sources for syslog reporting. This vulnerability is due to improper restriction of the syslog configuration. An attacker could exploit this vulnerability by configuring non-log files as sources for syslog reporting through the web application. A successful exploit could allow the attacker to read non-log files on the CSPC.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41278 β€Ό

Functions SDK for EdgeX is meant to provide all the plumbing necessary for developers to get started in processing/transforming/exporting data out of the EdgeX IoT platform. In affected versions broken encryption in app-functions-sdk Ò€œAESҀ� transform in EdgeX Foundry releases prior to Jakarta allows attackers to decrypt messages via unspecified vectors. The app-functions-sdk exports an Ò€œaesҀ� transform that user scripts can optionally call to encrypt data in the processing pipeline. No decrypt function is provided. Encryption is not enabled by default, but if used, the level of protection may be less than the user may expects due to a broken implementation. Version v2.1.0 (EdgeX Foundry Jakarta release and later) of app-functions-sdk-go/v2 deprecates the Ò€œaesҀ� transform and provides an improved Ò€œaes256Ҁ� transform in its place. The broken implementation will remain in a deprecated state until it is removed in the next EdgeX major release to avoid breakage of existing software that depends on the broken implementation. As the broken transform is a library function that is not invoked by default, users who do not use the AES transform in their processing pipelines are unaffected. Those that are affected are urged to upgrade to the Jakarta EdgeX release and modify processing pipelines to use the new "aes256" transform.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40131 β€Ό

A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit this vulnerability by adding malicious code to the configuration by using the web-based management interface. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Search CT Logs for Misconfigured SSL Certificates πŸ•΄

Security defenders can run these queries against Certificate Transparency logs to identify misconfigured SSL certificates before they can be used by adversaries to map out attacks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-44033 β€Ό

In Ionic Identity Vault before 5.0.5, the protection mechanism for invalid unlock attempts can be bypassed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44025 β€Ό

Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to XSS in handling an attachment's filename extension when displaying a MIME type warning message.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44026 β€Ό

Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39233 β€Ό

In Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were not properly authorized and can be called by any client.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39232 β€Ό

In Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any authenticated users, not just by admins.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39236 β€Ό

In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36372 β€Ό

In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41532 β€Ό

In Apache Ozone before 1.2.0, Recon HTTP endpoints provide access to OM, SCM and Datanode metadata. Due to a bug, any unauthenticated user can access the data from these endpoints.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39235 β€Ό

In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39231 β€Ό

In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42338 β€Ό

4MOSAn GCB DoctorÒ€ℒs login page has improper validation of Cookie, which allows an unauthenticated remote attacker to bypass authentication by code injection in cookie, and arbitrarily manipulate the system or interrupt services by upload and execution of arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39234 β€Ό

In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Iranian hackers charged with cybercrimes in connection with attempts to influence 2020 US Presidential Election πŸ—“οΈ

Pair were affiliated with group that tried to secure a win for Donald Trump

πŸ“– Read

via "The Daily Swig".