πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-28329 β€Ό

A vulnerability has been identified in SCALANCE W1788-1 M12 (All versions < V3.0.0), SCALANCE W1788-2 EEC M12 (All versions < V3.0.0), SCALANCE W1788-2 M12 (All versions < V3.0.0), SCALANCE W1788-2IA M12 (All versions < V3.0.0). Affected devices do not properly handle malformed TCP packets received over the RemoteCapture feature. This could allow an attacker to lead to a denial of service condition which only affects the port used by the RemoteCapture feature.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28663 β€Ό

A vulnerability has been identified in Simcenter Femap (All versions < V2022.1.2). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted .NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15592)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27241 β€Ό

A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions), Mendix Applications using Mendix 8 (All versions), Mendix Applications using Mendix 9 (All versions < V9.11). Applications built with an affected system publicly expose the internal project structure. This could allow an unauthenticated remote attacker to read confidential information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0140 β€Ό

The Visual Form Builder WordPress plugin before 3.0.6 does not perform access control on entry form export, allowing unauthenticated users to see the form entries or export it as a CSV File using the vfb-export endpoint.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24247 β€Ό

RiteCMS version 3.1.0 and below suffers from an arbitrary file overwrite via path traversal vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to overwrite any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to write) resulting a remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0878 β€Ό

Electric Vehicle (EV) commonly utilises the Combined Charging System (CCS) for DC rapid charging. To exchange important messages such as the State of Charge (SoC) with the Electric Vehicle Supply Equipment (EVSE) CCS uses a high-bandwidth IP link provided by the HomePlug Green PHY (HPGP) power-line communication (PLC) technology. The attack interrupts necessary control communication between the vehicle and charger, causing charging sessions to abort. The attack can be conducted wirelessly from a distance using electromagnetic interference, allowing individual vehicles or entire fleets to be disrupted simultaneously. In addition, the attack can be mounted with off-the-shelf radio hardware and minimal technical knowledge. With a power budget of 1 W, the attack is successful from around 47 m distance. The exploited behavior is a required part of the HomePlug Green PHY, DIN 70121 & ISO 15118 standards and all known implementations exhibit it. In addition to electric cars, Brokenwire affects electric ships, airplanes and heavy duty vehicles utilising these standards.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0142 β€Ό

The Visual Form Builder WordPress plugin before 3.0.6 is vulnerable to CSV injection allowing a user with low level or no privileges to inject a command that will be included in the exported CSV file, leading to possible code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0141 β€Ό

The Visual Form Builder WordPress plugin before 3.0.8 does not enforce nonce checks which could allow attackers to make a logged in admin or editor delete and restore arbitrary form entries via CSRF attacks

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24248 β€Ό

RiteCMS version 3.1.0 and below suffers from an arbitrary file deletion via path traversal vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to delete any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to delete). Furthermore, an attacker might leverage the capability of arbitrary file deletion to circumvent certain web server security mechanisms such as deleting .htaccess file that would deactivate those security constraints.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Building a Cybersecurity Mesh Architecture in the Real World πŸ•΄

Like zero trust, the cybersecurity mesh re-envisions the perimeter at the identity layer and centers upon unifying disparate security tools into a single, interoperable ecosystem.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ OpenSSH 9.0 bakes in post-quantum cryptography to future proof against attacks πŸ—“οΈ

Protection offered against β€˜capture now, decrypt later’ attacks

πŸ“– Read

via "The Daily Swig".
πŸ—“οΈ Internal AWS credentials swiped by researcher via SQL payload πŸ—“οΈ

Amazon cloud service acts quickly to close security hole in RDS

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-32040 β€Ό

It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB versions prior to 5.0.4, 4.4.11, 4.2.16.

πŸ“– Read

via "National Vulnerability Database".
⚠ OpenSSH goes Post-Quantum, switches to qubit-busting crypto by default ⚠

Useful quantum computers might not actually be possible. But what if they are? And what if they arrive, say, tomorrow?

πŸ“– Read

via "Naked Security".
⚠ Five critical bugs fixed in automatic hospital robot control system ⚠

Fortunately, we're not talking about a robot revolution, or about hospital AI run amuck. But these bugs could lead to ransomware, or worse...

πŸ“– Read

via "Naked Security".
❌ Menswear Brand Zegna Reveals Ransomware Attack ❌

Accounting materials from the Italy-based luxury fashion house were leaked online by RansomExx because the company refused to pay.

πŸ“– Read

via "Threat Post".
β™ŸοΈ RaidForums Gets Raided, Alleged Admin Arrested β™ŸοΈ

The U.S. Department of Justice (DOJ) said today it seized the website and user database for RaidForums, an extremely popular English-language cybercrime forum that sold access to more than 10 billion consumer records stolen in some of the world's largest data breaches since 2015. The DOJ also charged the alleged administrator of RaidForums -- 21-year-old Diogo Santos Coelho, of Portugal -- with six criminal counts, including conspiracy, access device fraud and aggravated identity theft.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2021-39804 β€Ό

In reinit of HeifDecoderImpl.cpp, there is a possible crash due to a missing null check. This could lead to remote persistent denial of service in the file picker with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-215002587

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39794 β€Ό

In broadcastPortInfo of AdbService.java, there is a possible way for apps to run code as the shell user, if wireless debugging is enabled, due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-205836329

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21202 β€Ό

The affected product is vulnerable to an out-of-bounds read, which may result in disclosure of sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0707 β€Ό

In dma_buf_release of dma-buf.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-155756045References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".