πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-34365 β€Ό

WMS 3.7 contains a Path Traversal Vulnerability in Device API. An attacker could potentially exploit this vulnerability, to gain unauthorized read access to the files stored on the server filesystem, with the privileges of the running web application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33930 β€Ό

Dell Wyse Management Suite 3.6.1 and below contains Information Disclosure in Devices error pages. An attacker could potentially exploit this vulnerability, leading to the disclosure of certain sensitive information. The attacker may be able to use the exposed information to access and further vulnerability research.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33925 β€Ό

Dell Wyse Management Suite 3.6.1 and below contains an Improper Access control vulnerability in UI. An remote authenticated attacker could potentially exploit this vulnerability by bypassing access controls in order to download reports containing sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33924 β€Ό

Dell Wyse Management Suite 3.6.1 and below contains an Improper Access control vulnerability with which an attacker with no access to create rules could potentially exploit this vulnerability and create rules.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0028 β€Ό

A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target. To be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a source zone that has an external facing interface. This configuration is not typical for URL filtering and, if set, is likely unintended by the administrator. If exploited, this issue would not impact the confidentiality, integrity, or availability of our products. However, the resulting denial-of-service (DoS) attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack. We have taken prompt action to address this issue in our PAN-OS software. All software updates for this issue are expected to be released no later than the week of August 15, 2022. This issue does not impact Panorama M-Series or Panorama virtual appliances. This issue has been resolved for all Cloud NGFW and Prisma Access customers and no additional action is required from them.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33931 β€Ό

Dell Wyse Management Suite 3.6.1 and below contains an Improper Access control vulnerability in UI. An attacker with no access to Alert Classification page could potentially exploit this vulnerability, leading to the change the alert categories.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35715 β€Ό

IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in a stack trace. This information could be used in further attacks against the system. IBM X-Force ID: 231202.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33928 β€Ό

Dell Wyse Management Suite 3.6.1 and below contains an Plain-text Password Storage Vulnerability in UI. An attacker with low privileges could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2756 β€Ό

Server-Side Request Forgery (SSRF) in GitHub repository kareadita/kavita prior to 0.5.4.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33929 β€Ό

Dell Wyse Management Suite 3.6.1 and below contains a Reflected Cross-Site Scripting Vulnerability in EndUserSummary page. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33927 β€Ό

Dell Wyse Management Suite 3.6.1 and below contains a Session Fixation vulnerability. A unauthenticated attacker could exploit this by taking advantage of a user with multiple active sessions in order to hijack a user's session.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22411 β€Ό

IBM Spectrum Scale Data Access Services (DAS) 5.1.3.1 could allow an authenticated user to insert code which could allow the attacker to manipulate cluster resources due to excessive permissions. IBM X-Force ID: 223016.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35280 β€Ό

IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 230634.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20713 β€Ό

A vulnerability in the Clientless SSL VPN (WebVPN) component of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks. This vulnerability is due to improper validation of input that is passed to the Clientless SSL VPN component. An attacker could exploit this vulnerability by convincing a targeted user to visit a website that can pass malicious requests to an ASA device that has the Clientless SSL VPN feature enabled. A successful exploit could allow the attacker to conduct browser-based attacks, including cross-site scripting attacks, against the targeted user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22490 β€Ό

IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could allow a privileged user to obtain sensitive Azure bot credential information. IBM X-Force ID: 226342.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22369 β€Ό

IBM Workload Scheduler 9.4 and 9.5 could allow a local user to overwrite key system files which would cause the system to crash. IBM X-Force ID: 221187.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Rethinking Software in the Organizational Hierarchy πŸ•΄

Least privilege is a good defense normally applied only to users. What if we limited apps' access to other apps and network resources based on their roles and responsibilities?

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ Many ZTNA, MFA Tools Offer Little Protection Against Cookie Session Hijacking Attacks πŸ•΄

Many of the technologies and services that organizations are using to isolate Internet traffic from the internal network lack session validation mechanisms, security startup says.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Black Hat USA: Former CISA director Chris Krebs warns clouds of cyberwar are circling Taiwan πŸ—“οΈ

Attack on Taiwan seemingly a case of β€˜when’ not β€˜if’ Chris Krebs, the former director of the US Cybersecurity and Infrastructure Security Agency (CISA), is β€œbearish in the short term, bullish in the l

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Multiple Vulnerabilities Discovered in Device42 Asset Management Appliance πŸ•΄

Four serious security issues on the popular appliance could be exploited by hackers with any level of access within the host network, Bitdefender researchers say.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-20360 β€Ό

In setChecked of SecureNfcPreferenceController.java, there is a missing permission check. This could lead to local escalation of privilege from the guest user with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-228314987

πŸ“– Read

via "National Vulnerability Database".