🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Find Your Next Favorite Cybersecurity Tool at the Black Hat USA Arsenal 🕴

Learn new enterprise-grade techniques for identifying vulnerabilities, improving Active Directory security, and building trust with customers at Black Hat USA this summer.

📖 Read

via "Dark Reading: ".
🕴 The Life-Changing Magic of Tidying Up the Cloud 🕴

Most companies' cloud security operations would benefit significantly from clean-up, alignment, and organization.

📖 Read

via "Dark Reading: ".
🕴 Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers 🕴

The attackers behind the Triton, or Xenotime, intrusions into critical infrastructure (CI) safety systems are testing their skills against electric power companies. Options for defense are still limited, however.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2009-5157 (wag54g2_firmware)

On Linksys WAG54G2 1.00.10 devices, there is authenticated command injection via shell metacharacters in the setup.cgi c4_ping_ipaddr variable.

📖 Read

via "National Vulnerability Database".
Microsoft Pushes Azure Users to Patch Linux Systems

Microsoft is urging users to patch every Exim installation in their organization and make sure that they are updated to the most recent version, Exim version 4.92.

📖 Read

via "Threatpost".
🔐 Business travelers, beware: Hackers looking over your shoulder can cause data breaches 🔐

Some 80% of business travelers say visual hacking is a threat, according to a 3M report.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2018-10239

A privilege escalation vulnerability in the "support access" feature on Infoblox NIOS 6.8 through 8.4.1 could allow a locally authenticated administrator to temporarily gain additional privileges on an affected device and perform actions within the super user scope. The vulnerability is due to a weakness in the "support access" password generation algorithm. A locally authenticated administrative user may be able to exploit this vulnerability if the "support access" feature is enabled, they know the support access code for the current session, and they know the algorithm to generate the support access password from the support access code. "Support access" is disabled by default. When enabled, the access will be automatically disabled (and support access code will expire) after the 24 hours.

📖 Read

via "National Vulnerability Database".
A Spate of University Breaches Highlight Email Threats in Higher Ed

Students at Oregon State University, Graceland University and Southern Missouri State have all been impacted by email attacks against school employees.

📖 Read

via "Threatpost".
ATENTION New - CVE-2017-9388

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a web user interface that allows a user to manage the device. As a part of the functionality the device firmware file contains a file known as proxy.sh which allows the device to proxy a specific request to and from from another website. This is primarily used as a method of communication between the device and Vera website when the user is logged in to the https://home.getvera.com and allows the device to communicate between the device and website. One of the parameters retrieved by this specific script is "url". This parameter is not sanitized by the script correctly and is passed in a call to "eval" to execute "curl" functionality. This allows an attacker to escape from the executed command and then execute any commands of his/her choice.

📖 Read

via "National Vulnerability Database".
🔐 How to create an administrator IAM user and group in AWS 🔐

AWS best practices dictate that you should not use root user credentials for everyday admin tasks. Proper data security requires the use of special administrator account.

📖 Read

via "Security on TechRepublic".
🔏 Nevada Beats California With New Privacy Law 🔏

Nevada's new law, which will require website operators to honor opt-out procedures, goes into effect on October 1, three months before the CCPA's compliance deadline, January 1, 2010.

📖 Read

via "Subscriber Blog RSS Feed ".
🕴 New Decryptor Unlocks Latest Versions of Gandcrab 🕴

The decryptor neutralizes GandCrab versions 5.0 through 5.2 and lets victims unlock their files for free.

📖 Read

via "Dark Reading: ".
5,000 Twitter Accounts Linked to Disinformation Campaigns

The social platform has suspended six sets of accounts across four jurisdictions for running alleged influence campaigns, including Iran.

📖 Read

via "Threatpost".
ATENTION New - CVE-2017-9384

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a web user interface that allows a user to manage the device. As a part of the functionality the device firmware file contains a file known as relay.sh which allows the device to create relay ports and connect the device to Vera servers. This is primarily used as a method of communication between the device and Vera servers so the devices can be communicated with even when the user is not at home. One of the parameters retrieved by this specific script is "remote_host". This parameter is not sanitized by the script correctly and is passed in a call to "eval" to execute another script where remote_host is concatenated to be passed a parameter to the second script. This allows an attacker to escape from the executed command and then execute any commands of his/her choice.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2017-9381

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a user with the capability of installing or deleting apps on the device using the web management interface. It seems that the device does not implement any cross-site request forgery protection mechanism which allows an attacker to trick a user who navigates to an attacker controlled page to install or delete an application on the device. Note: The cross-site request forgery is a systemic issue across all other functionalities of the device.

📖 Read

via "National Vulnerability Database".
🕴 Power Outage Hits Millions in South America 🕴

The outage, which is not (so far) seen as the result of a cyberattack, still had a significant impact on network and server availability.

📖 Read

via "Dark Reading: ".
Irked Researcher Discloses Facebook WordPress Plugin Flaws

Researchers at Plugin Vulnerabilities cite grudge and irresponsibly disclose bugs in two WordPress plugins from Facebook.

📖 Read

via "Threatpost".
🕴 DHS Tests Remote Exploit for BlueKeep RDP Vulnerability 🕴

Agency urges organizations with vulnerable systems to apply mitigations immediately.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2017-9392

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides UPnP services that are available on port 3480 and can also be accessed via port 80 using the url "/port_3480". It seems that the UPnP services provide "request_image" as one of the service actions for a normal user to retrieve an image from a camera that is controlled by the controller. It seems that the "res" (resolution) parameter passed in the query string is not sanitized and is stored on the stack which allows an attacker to overflow the buffer. The function "LU::Generic_IP_Camera_Manager::REQ_Image" is activated when the lu_request_image is passed as the "id" parameter in the query string. This function then calls "LU::Generic_IP_Camera_Manager::GetUrlFromArguments". This function retrieves all the parameters passed in the query string including "res" and then uses the value passed in it to fill up buffer using the sprintf function. However, the function in this case lacks a simple length check and as a result an attacker who is able to send more than 184 characters can easily overflow the values stored on the stack including the $RA value and thus execute code on the device.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2017-9391

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides UPnP services that are available on port 3480 and can also be accessed via port 80 using the url "/port_3480". It seems that the UPnP services provide "request_image" as one of the service actions for a normal user to retrieve an image from a camera that is controlled by the controller. It seems that the "URL" parameter passed in the query string is not sanitized and is stored on the stack which allows an attacker to overflow the buffer. The function "LU::Generic_IP_Camera_Manager::REQ_Image" is activated when the lu_request_image is passed as the "id" parameter in query string. This function then calls "LU::Generic_IP_Camera_Manager::GetUrlFromArguments" and passes a "pointer" to the function where it will be allowed to store the value from the URL parameter. This pointer is passed as the second parameter $a2 to the function "LU::Generic_IP_Camera_Manager::GetUrlFromArguments". However, neither the callee or the caller in this case performs a simple length check and as a result an attacker who is able to send more than 1336 characters can easily overflow the values stored on the stack including the $RA value and thus execute code on the device.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2017-9390

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a shell script called connect.sh which is supposed to return a specific cookie for the user when the user is authenticated to https://home.getvera.com. One of the parameters retrieved by this script is "RedirectURL". However, the application lacks strict input validation of this parameter and this allows an attacker to execute the client-side code on this application.

📖 Read

via "National Vulnerability Database".