π CISA Releases Draft Guidance on SCuBA Cloud Security π
π Read
via "".
The program hopes to get agencies on the same page when it comes to implementing security and resilience practices when utilizing cloud services.π Read
via "".
Digital Guardian
CISA Releases Draft Guidance on SCuBA Cloud Security
The program hopes to get agencies on the same page when it comes to implementing security and resilience practices when utilizing cloud services.
βΌ CVE-2022-0567 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in ovn-kubernetes. This flaw allows a system administrator or privileged attacker to create an egress network policy that bypasses existing ingress policies of other pods in a cluster, allowing network traffic to access pods that should not be reachable. This issue results in information disclosure and other attacks on other pods that should not be reachable.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43933 βΌ
π Read
via "National Vulnerability Database".
The affected product is vulnerable to a network-based attack by threat actors sending unimpeded requests to the receiving server, which could cause a denial-of-service condition due to lack of heap memory resources.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43986 βΌ
π Read
via "National Vulnerability Database".
The setup program for the affected product configures its files and folders with full access, which may allow unauthorized users permission to replace original binaries and achieve privilege escalation.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26516 βΌ
π Read
via "National Vulnerability Database".
Authorized users may install a maliciously modified package file when updating the device via the web user interface. The user may inadvertently use a package file obtained from an unauthorized source or a file that was compromised between download and deployment.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38483 βΌ
π Read
via "National Vulnerability Database".
The affected product is vulnerable to misconfigured binaries, allowing users on the target PC with SYSTEM level privileges access to overwrite the binary and modify files to gain privilege escalation.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27179 βΌ
π Read
via "National Vulnerability Database".
A malicious actor having access to the exported configuration file may obtain the stored credentials and thereby gain access to the protected resource. If the same passwords were used for other resources, further such assets may be compromised.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1039 βΌ
π Read
via "National Vulnerability Database".
The weak password on the web user interface can be exploited via HTTP or HTTPS. Once such access has been obtained, the other passwords can be changed. The weak password on Linux accounts can be accessed via SSH or Telnet, the former of which is by default enabled on trusted interfaces. While the SSH service does not support root login, a user logging in using either of the other Linux accounts may elevate to root access using the su command if they have access to the associated password.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43988 βΌ
π Read
via "National Vulnerability Database".
The affected product is vulnerable to a network-based attack by threat actors utilizing crafted naming conventions of files to gain unauthorized access rights.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2021-43990 βΌ
π Read
via "National Vulnerability Database".
The affected product is vulnerable to a network-based attack by threat actors supplying a crafted, malicious XML payload designed to trigger an external entity reference call.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1318 βΌ
π Read
via "National Vulnerability Database".
Hills ComNav version 3002-19 suffers from a weak communication channel. Traffic across the local network for the configuration pages can be viewed by a malicious actor. The size of certain communications packets are predictable. This would allow an attacker to learn the state of the system if they can observe the traffic. This would be possible even if the traffic were encrypted, e.g., using WPA2, as the packet sizes would remain observable. The communication encryption scheme is theoretically sound, but is not strong enough for the level of protection required.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26519 βΌ
π Read
via "National Vulnerability Database".
There is no limit to the number of attempts to authenticate for the local configuration pages for the Hills ComNav Version 3002-19 interface, which allows local attackers to brute-force credentials.π Read
via "National Vulnerability Database".
π2
π΄ Lightspin Secures Infrastructure as Code Files with New GitHub Integration π΄
π Read
via "Dark Reading".
Users can scan GitHub repositories and detect misconfigurations, exposed secrets and other security issues.π Read
via "Dark Reading".
Dark Reading
Lightspin Secures Infrastructure as Code Files with New GitHub Integration
Users can scan GitHub repositories and detect misconfigurations, exposed secrets and other security issues.
π΄ Incognia Introduces New Location-Based Device Authorization Solution π΄
π Read
via "Dark Reading".
Module enables apps to establish trust in new devices without adding user friction.π Read
via "Dark Reading".
Dark Reading
Incognia Introduces New Location-Based Device Authorization Solution
Module enables apps to establish trust in new devices without adding user friction.
ποΈ Java encryption implementation error made it trivial to forge credentials ποΈ
π Read
via "The Daily Swig".
Bundled math in code issue created security trapπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Java encryption implementation error made it trivial to forge credentials
Bundled math in code issue created security trap
π΄ The Modern Software Supply Chain: How It's Evolved and What to Prepare For π΄
π Read
via "Dark Reading".
Supply chain security attacks have been becoming increasingly common and more sophisticated. Find out how to remain secure throughout the software supply chain.π Read
via "Dark Reading".
Dark Reading
The Modern Software Supply Chain: How It's Evolved and What to Prepare For
Supply chain security attacks have been becoming increasingly common and more sophisticated. Find out how to remain secure throughout the software supply chain.
βΌ CVE-2022-0540 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24871 βΌ
π Read
via "National Vulnerability Database".
Shopware is an open commerce platform based on Symfony Framework and Vue. In affected versions an attacker can abuse the Admin SDK functionality on the server to read or update internal resources. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24864 βΌ
π Read
via "National Vulnerability Database".
Origin Protocol is a blockchain based project. The Origin Protocol project website allows for malicious users to inject malicious Javascript via a POST request to `/presale/join`. User-controlled data is passed with no sanitization to SendGrid and injected into an email that is delivered to the founders@originprotocol.com. If the email recipient is using an email program that is susceptible to XSS, then that email recipient will receive an email that may contain malicious XSS. Regardless if the email recipientΓ’β¬β’s mail program has vulnerabilities or not, the hacker can at the very least inject malicious HTML that modifies the body content of the email. There are currently no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24799 βΌ
π Read
via "National Vulnerability Database".
wire-webapp is the web application interface for the wire messaging service. Insufficient escaping in markdown Γ’β¬Εcode highlightingΓ’β¬οΏ½ in the wire-webapp resulted in the possibility of injecting and executing arbitrary HTML code and thus also JavaScript. If a user receives and views such a malicious message, arbitrary code is injected and executed in the context of the victim. This allows the attacker to fully control the user account. Wire-desktop clients that are connected to a vulnerable wire-webapp version are also vulnerable to this attack. The issue has been fixed in wire-webapp 2022-03-30-production.0 and is already deployed on all Wire managed services. On-premise instances of wire-webapp need to be updated to docker tag 2022-03-30-production.0-v0.29.2-0-d144552 or wire-server 2022-03-30 (chart/4.8.0), so that their applications are no longer affected. There are no known workarounds for this issue. ### Patches * The issue has been fixed in wire-webapp **2022-03-30-production.0** and is already deployed on all Wire managed services. * On-premise instances of wire-webapp need to be updated to docker tag **2022-03-30-production.0-v0.29.2-0-d144552** or wire-server **2022-03-30 (chart/4.8.0)**, so that their applications are no longer affected. ### Workarounds * No workarounds known ### For more information If you have any questions or comments about this advisory feel free to email us at [vulnerability-report@wire.com](mailto:vulnerability-report@wire.com) ### Credits We thank [Posix](https://twitter.com/po6ix) for reporting this vulnerabilityπ Read
via "National Vulnerability Database".
βΌ CVE-2022-24861 βΌ
π Read
via "National Vulnerability Database".
Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has remote code execution vulnerability. JDBC drivers are not validated prior to use and may be provided by users of the system. This can lead to code execution by any basic user who has access to the system. Users are advised to upgrade. There are no known workarounds to this issue.π Read
via "National Vulnerability Database".