πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-27984 β€Ό

A CWE-20: Improper Input Validation vulnerability exists in Custom Reports that could cause a macro to be executed, potentially leading to remote code execution when a user opens a malicious report file planted by an attacker. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27981 β€Ό

A CWE-22: Improper Limitation of a Pathname to a Restricted Directory vulnerability exists in Custom Reports that could cause a remote code execution when a victim tries to open a malicious report. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior).

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Bitwarden to release fix for four-year-old vulnerability πŸ“’

The password manager knew about the issue since 2018, exploits for which were highlighted in a Flashpoint report earlier in March

πŸ“– Read

via "ITPro".
πŸ“’ Podcast transcript: The changing face of cyber warfare πŸ“’

Read the full transcript for this episode of ITPro Podcast

πŸ“– Read

via "ITPro".
πŸ“’ ITPro Podcast: The changing face of cyber warfare πŸ“’

Russian-sponsored cyber attacks may not have had the feared impact, but for Europe they’re here to stay

πŸ“– Read

via "ITPro".
πŸ“’ Latitude hack leaves customers unable to protect their accounts πŸ“’

The cyber attack has affected around 330,000 customers, although the company has said this is likely to increase

πŸ“– Read

via "ITPro".
πŸ“’ Hacker who ran BreachForums could face 20 years in prison πŸ“’

The hacker behind BreachForums is thought to have been involved in a string of cyber attacks

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ Free decryptor released for Conti ransomware variant infecting hundreds of organisations πŸ“’

Hundreds of organisations and state institutions are believed to have been impacted by the strain

πŸ“– Read

via "ITPro".
πŸ•΄ Controlling Third-Party Data Risk Should Be a Top Cybersecurity Priority πŸ•΄

Third-party breaches have a wide effect that legacy security practices can no longer detect.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-1153 β€Ό

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pacsrapor allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Pacsrapor: before 1.22.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27979 β€Ό

A CWE-345: Insufficient Verification of Data Authenticity vulnerability exists in the Data Server that could allow the renaming of files in the IGSS project report directory, this could lead to denial of service when an attacker sends specific crafted messages to the Data Server TCP port. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1314 β€Ό

A vulnerability has been discovered in cloudflared's installer (<= 2023.3.0) for Windows 32-bits devices that allows a local attacker with no administrative permissions to escalate their privileges on the affected device. This vulnerability exists because the MSI installer used by cloudflared relied on a world-writable directory. An attacker with local access to the device (without Administrator rights) can use symbolic links to trick the MSI installer into deleting files in locations that the attacker would otherwise have no access to. By creating a symlink from the world-writable directory to the target file, the attacker can manipulate the MSI installer's repair functionality to delete the target file during the repair process. Exploitation of this vulnerability could allow an attacker to delete important system files or replace them with malicious files, potentially leading to the affected device being compromised. The cloudflared client itself is not affected by this vulnerability, only the installer for 32-bit Windows devices.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27977 β€Ό

A CWE-345: Insufficient Verification of Data Authenticity vulnerability exists in the Data Server that could cause access to delete files in the IGSS project report directory, this could lead to loss of data when an attacker sends specific crafted messages to the Data Server TCP port. Affected Products: IGSS Data Server(IGSSdataServer.exe)(V16.0.0.23040 and prior), IGSS Dashboard(DashBoard.exe)(V16.0.0.23040 and prior), Custom Reports(RMS16.dll)(V16.0.0.23040 and prior).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42332 β€Ό

x86 shadow plus log-dirty mode use-after-free In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Shadow mode maintains a pool of memory used for both shadow page tables as well as auxiliary data structures. To migrate or snapshot guests, Xen additionally runs them in so called log-dirty mode. The data structures needed by the log-dirty tracking are part of aformentioned auxiliary data. In order to keep error handling efforts within reasonable bounds, for operations which may require memory allocations shadow mode logic ensures up front that enough memory is available for the worst case requirements. Unfortunately, while page table memory is properly accounted for on the code path requiring the potential establishing of new shadows, demands by the log-dirty infrastructure were not taken into consideration. As a result, just established shadow page tables could be freed again immediately, while other code is still accessing them on the assumption that they would remain allocated.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42331 β€Ό

x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42334 β€Ό

x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1154 β€Ό

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pacsrapor allows Reflected XSS.This issue affects Pacsrapor: before 1.22.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42333 β€Ό

x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27874 β€Ό

IBM Aspera Faspex 4.4.2 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to execute arbitrary commands. IBM X-Force ID: 249845.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25689 β€Ό

IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1 , and 4.1.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 247618.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27873 β€Ό

IBM Aspera Faspex 4.4.2 could allow a remote authenticated attacker to obtain sensitive credential information using specially crafted XML input. IBM X-Force ID: 249654.

πŸ“– Read

via "National Vulnerability Database".