πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-38100 β€Ό

The CMS800 device fails while attempting to parse malformed network data sent by a threat actor. A threat actor with network access can remotely issue a specially formatted UDP request that will cause the entire device to crash and require a physical reboot. A UDP broadcast request could be sent that causes a mass denial-of-service attack on all CME8000 devices connected to the same network.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38540 β€Ό

Archery v1.4.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the ThreadIDs parameter in the create_kill_session interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38453 β€Ό

Multiple binary application files on the CMS8000 device are compiled with 'not stripped' and 'debug_info' compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36780 β€Ό

Avdor CIS - crystal quality Credentials Management Errors. The product is phone call recorder, you can hear all the recorded calls without authenticate to the system. Attacker sends crafted URL to the system: ip:port//V=2;ChannellD=number;Ext=number;Command=startLM;Client=number;Request=number;R=number number - id of the recorded number.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1278 β€Ό

A flaw was found in WildFly, where an attacker can see deployment names, endpoints, and any other data the trace payload may contain.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1602 β€Ό

A potential security vulnerability has been identified in HP ThinPro 7.2 Service Pack 8 (SP8). The security vulnerability in SP8 is not remedied after upgrading from SP8 to Service Pack 9 (SP9). HP has released Service Pack 10 (SP10) to remediate the potential vulnerability introduced in SP8.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3190 β€Ό

Infinite loop in the F5 Ethernet Trailer protocol dissector in Wireshark 3.6.0 to 3.6.7 and 3.4.0 to 3.4.15 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38542 β€Ό

Archery v1.4.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the ThreadIDs parameter in the kill_session interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38537 β€Ό

Archery v1.4.5 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_file, end_file, start_time, and stop_time parameters in the binlog2sql interface.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Arcserve Independent Global Study Finds Businesses Still Losing Mission-Critical Company Data πŸ•΄

.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Opus Security Emerges from Stealth with $10M in Funding for Cloud SecOps and Remediation Processes πŸ•΄

Siemplify veterans introduce Cloud Security Orchestration and Remediation platform, backed by high-profile investors including YL Ventures, Tiger Global, and CEOs of CrowdStrike and CyberArk

πŸ“– Read

via "Dark Reading".
πŸ•΄ Name That Toon: Shiver Me Timbers! πŸ•΄

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
πŸ” CISA Seeks Comment on Cyber Incident Reporting Rules πŸ”

CISA has taken the first step towards implementing a law that will require U.S. critical infrastructure to report cybersecurity incidents to the government.

πŸ“– Read

via "".
πŸ€”1🀯1
β€Ό CVE-2022-36020 β€Ό

The typo3/html-sanitizer package is an HTML sanitizer, written in PHP, aiming to provide XSS-safe markup based on explicitly allowed tags, attributes and values. Due to a parsing issue in the upstream package `masterminds/html5`, malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This allows for a bypass of the cross-site scripting mechanism of `typo3/html-sanitizer`. This issue has been addressed in versions 1.0.7 and 2.0.16 of the `typo3/html-sanitizer` package. Users are advised to upgrade. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36103 β€Ό

Talos Linux is a Linux distribution built for Kubernetes deployments. Talos worker nodes use a join token to get accepted into the Talos cluster. Due to improper validation of the request while signing a worker node CSR (certificate signing request) Talos control plane node might issue Talos API certificate which allows full access to Talos API on a control plane node. Accessing Talos API with full level access on a control plane node might reveal sensitive information which allows full level access to the cluster (Kubernetes and Talos PKI, etc.). Talos API join token is stored in the machine configuration on the worker node. When configured correctly, Kubernetes workloads don't have access to the machine configuration, but due to a misconfiguration workload might access the machine configuration and reveal the join token. This problem has been fixed in Talos 1.2.2. Enabling the Pod Security Standards mitigates the vulnerability by denying hostPath mounts and host networking by default in the baseline policy. Clusters that don't run untrusted workloads are not affected. Clusters with correct Pod Security configurations which don't allow hostPath mounts, and secure access to cloud metadata server (or machine configuration is not supplied via cloud metadata server) are not affected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35298 β€Ό

SAP NetWeaver Enterprise Portal (KMC) - version 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability. KMC servlet is vulnerable to XSS attack. The execution of script content by a victim registered on the portal could compromise the confidentiality and integrity of victimÒ€ℒs web browser session.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35292 β€Ό

In SAP Business One application when a service is created, the executable path contains spaces and isnÒ€ℒt enclosed within quotes, leading to a vulnerability known as Unquoted Service Path which allows a user to gain SYSTEM privileges. If the service is exploited by adversaries, it can be used to gain privileged permissions on a system or network leading to high impact on Confidentiality, Integrity, and Availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3170 β€Ό

An out-of-bounds access issue was found in the Linux kernel sound subsystem. It could occur when the 'id->name' provided by the user did not end with '\0'. A privileged local user could pass a specially crafted name through ioctl() interface and crash the system or potentially escalate their privileges on the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39799 β€Ό

An attacker with no prior authentication could craft and send malicious script to SAP GUI for HTML within Fiori Launchpad, resulting in reflected cross-site scripting attack. This could lead to stealing session information and impersonating the affected user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35295 β€Ό

Under certain conditions, the application SAP BusinessObjects Business Intelligence Platform (Version Management System) - versions 420, 430, exposes sensitive information to an actor over the network with high privileges that is not explicitly authorized to have access to that information, leading to a high impact on Confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3179 β€Ό

Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.2.

πŸ“– Read

via "National Vulnerability Database".