🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2023-36833

A Use After Free vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS Evolved on PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202 allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS).The process 'aftman-bt' will crash after multiple flaps on a multicast-only fast reroute (MoFRR) enabled interface. This will cause the respective FPC to stop forwarding traffic and it needs to be rebooted to restore the service.An indication that the system experienced this issue is the following log message:  <date> <hostname> evo-aftmand-bt[<pid>]: [Error] jexpr_fdb: sanity check failed, ... , app_name L3 Mcast RoutesThis issue affects Juniper Networks Junos OS Evolved on PTX10001-36MR, PTX10004, PTX10008, PTX10016 with LC1201/1202:21.2 version 21.2R1-EVO and later versions;21.3 version 21.3R1-EVO and later versions;21.4 versions prior to 21.4R3-S3-EVO;22.1 version 22.1R1-EVO and later versions;22.2 versions prior to 22.2R3-S2-EVO;22.3 versions prior to 22.3R3-EVO;22.4 versions prior to 22.4R1-S2-EVO, 22.4R2-EVO.

📖 Read

via "National Vulnerability Database".
🕴 Healthcare Innovation: A Safe and Secure Approach 🕴

Six focus areas to address the top security challenges facing healthcare organizations today.

📖 Read

via "Dark Reading".
1
CVE-2023-32761

Cross Site Request Forgery (CSRF) vulnerability in Archer Platform before v.6.13 and fixed in v.6.12.0.6 and v.6.13.0 allows an authenticated attacker to execute arbitrary code via a crafted request.

📖 Read

via "National Vulnerability Database".
CVE-2023-36849

An Improper Check or Handling of Exceptional Conditions vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS).When a malformed LLDP packet is received, l2cpd will crash and restart. The impact of the l2cpd crash is reinitialization of STP protocols (RSTP, MSTP or VSTP), and MVRP and ERP. Also, if any services depend on LLDP state (like PoE or VoIP device recognition), then these will also be affected. Continued receipt of such packets will lead to a sustained Denial of Service.This issue affects:Juniper Networks Junos OS21.4 versions prior to 21.4R3-S3;22.1 versions prior to 22.1R3-S3;22.2 versions prior to 22.2R2-S1, 22.2R3;22.3 versions prior to 22.3R2.Juniper Networks Junos OS Evolved21.4-EVO versions prior to 21.4R3-S2-EVO;22.1-EVO versions prior to 22.1R3-S3-EVO;22.2-EVO versions prior to 22.2R2-S1-EVO, 22.2R3-EVO;22.3-EVO versions prior to 22.3R2-EVO.

📖 Read

via "National Vulnerability Database".
CVE-2023-38252

An out-of-bounds read flaw was found in w3m, in the Strnew_size function in Str.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file.

📖 Read

via "National Vulnerability Database".
CVE-2023-36883

Microsoft Edge for iOS Spoofing Vulnerability

📖 Read

via "National Vulnerability Database".
CVE-2023-36887

Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

📖 Read

via "National Vulnerability Database".
CVE-2023-38253

An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str function in indep.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file.

📖 Read

via "National Vulnerability Database".
CVE-2023-36848

An Improper Handling of Undefined Values vulnerability in the periodic packet management daemon (PPMD) of Juniper Networks Junos OS on MX Series(except MPC10, MPC11 and LC9600) allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS).When a malformed CFM packet is received, it leads to an FPC crash. Continued receipt of these packets causes a sustained denial of service. This vulnerability occurs only when CFM has been configured on the interface.This issue affects Juniper Networks Junos OS:versions prior to 19.1R3-S10 on MX Series;19.2 versions prior to 19.2R3-S7 on MX Series;19.3 versions prior to 19.3R3-S8 on MX Series;19.4 versions prior to 19.4R3-S12 on MX Series;20.1 version 20.1R1 and later versions on MX Series;20.2 versions prior to 20.2R3-S8 on MX Series;20.3 version 20.3R1 and later versions on MX Series;20.4 versions prior to 20.4R3-S7 on MX Series;21.1 versions prior to 21.1R3-S5 on MX Series;21.2 versions prior to 21.2R3-S5 on MX Series;21.3 versions prior to 21.3R3-S4 on MX Series;21.4 versions prior to 21.4R3-S4 on MX Series;22.1 versions prior to 22.1R3-S3 on MX Series;22.2 versions prior to 22.2R3-S1 on MX Series;22.3 versions prior to 22.3R3 on MX Series;22.4 versions prior to 22.4R1-S2, 22.4R2 on MX Series.

📖 Read

via "National Vulnerability Database".
CVE-2023-36850

An Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Connectivity Fault Management(CFM) module of Juniper Networks Junos OS on MX Series(except MPC10, MPC11 and LC9600) allows an adjacent attacker on the local broadcast domain to cause a Denial of Service(DoS).Upon receiving a malformed CFM packet, the MPC crashes. Continued receipt of these packets causes a sustained denial of service. This issue can only be triggered when CFM hasn't been configured.This issue affects:Juniper Networks Junos OSAll versions prior to 19.1R3-S10 on MX Series;19.2 versions prior to 19.2R3-S7 on MX Series;19.3 versions prior to 19.3R3-S8 on MX Series;19.4 versions prior to 19.4R3-S12 on MX Series;20.1 version 20.1R1 and later versions on MX Series;20.2 versions prior to 20.2R3-S7 on MX Series;20.3 version 20.3R1 and later versions on MX Series;20.4 versions prior to 20.4R3-S7 on MX Series;21.1 versions prior to 21.1R3-S5 on MX Series;21.2 versions prior to 21.2R3-S4 on MX Series;21.3 versions prior to 21.3R3-S4 on MX Series;21.4 versions prior to 21.4R3-S3 on MX Series;22.1 versions prior to 22.1R3-S2 on MX Series;22.2 versions prior to 22.2R3 on MX Series;22.3 versions prior to 22.3R2, 22.3R3 on MX Series;22.4 versions prior to 22.4R2 on MX Series.

📖 Read

via "National Vulnerability Database".
CVE-2023-32759

An issue in Archer Platform before v.6.13 and fixed in 6.12.0.6 and 6.13.0 allows an authenticated attacker to obtain sensitive information via a crafted URL.

📖 Read

via "National Vulnerability Database".
CVE-2023-37223

Cross Site Scripting (XSS) vulnerability in Archer Platform before v.6.13 and fixed in v.6.12.0.6 and v.6.13.0 allows a remote authenticated attacker to execute arbitrary code via a crafted malicious script.

📖 Read

via "National Vulnerability Database".
CVE-2023-36834

An Incomplete Internal State Distinction vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX 4600 and SRX 5000 Series allows an adjacent attacker to cause a Denial of Service (DoS).If an SRX is configured in L2 transparent mode the receipt of a specific genuine packet can cause a single Packet Processing Engines (PPE) component of the PFE to run into a loop, which in turn will render the PPE unavailable. Each packet will cause one PPE to get into a loop, leading to a gradual performance degradation until all PPEs are unavailable and all traffic processing stops. To recover the affected FPC need to be restarted.This issue affects Juniper Networks Junos OS on SRX 4600 and SRX 5000 Series:20.1 version 20.1R1 and later versions;20.2 versions prior to 20.2R3-S7;20.3 version 20.3R1 and later versions;20.4 versions prior to 20.4R3-S7;21.1 versions prior to 21.1R3-S5;21.2 versions prior to 21.2R3-S3;21.3 versions prior to 21.3R3-S3;21.4 versions prior to 21.4R3-S1;22.1 versions prior to 22.1R3;22.2 versions prior to 22.2R2;22.3 versions prior to 22.3R1-S1, 22.3R2.

📖 Read

via "National Vulnerability Database".
CVE-2023-37224

An issue in Archer Platform before v.6.13 fixed in v.6.12.0.6 and v.6.13.0 allows an authenticated attacker to obtain sensitive information via the log files.

📖 Read

via "National Vulnerability Database".
CVE-2023-36835

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on QFX10000 Series allows a network based attacker to cause a Denial of Service (DoS).If a specific valid IP packet is received and that packet needs to be routed over a VXLAN tunnel, this will result in a PFE wedge condition due to which traffic gets impacted. As this is not a crash and restart scenario, this condition will persist until the system is rebooted to recover.This issue affects Juniper Networks Junos OS on QFX10000:20.3 version 20.3R1 and later versions;20.4 versions prior to 20.4R3-S5;21.1 versions prior to 21.1R3-S5;21.2 versions prior to 21.2R3-S5;21.3 versions prior to 21.3R3-S4;21.4 versions prior to 21.4R3-S1;22.1 versions prior to 22.1R3;22.2 versions prior to 22.2R2;22.3 versions prior to 22.3R1-S2, 22.3R2.

📖 Read

via "National Vulnerability Database".
CVE-2023-36836

A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved platforms, in a Multicast only Fast Reroute (MoFRR) scenario, the rpd process can crash when a a specific low privileged CLI command is executed. The rpd crash will impact all routing protocols until the process has automatically been restarted. As the operational state which makes this issue exploitable is outside the attackers control, this issue is considered difficult to exploit. Continued execution of this command will lead to a sustained DoS.This issue affects:Juniper Networks Junos OS19.4 version 19.4R3-S5 and later versions prior to 19.4R3-S9;20.1 version 20.1R2 and later versions;20.2 versions prior to 20.2R3-S7;20.3 versions prior to 20.3R3-S5;20.4 versions prior to 20.4R3-S6;21.1 versions prior to 21.1R3-S4;21.2 versions prior to 21.2R3-S2;21.3 versions prior to 21.3R3-S1;21.4 versions prior to 21.4R3;22.1 versions prior to 22.1R1-S2, 22.1R2;22.2 versions prior to 22.2R2.Juniper Networks Junos OS EvolvedAll versions prior to 20.4R3-S6-EVO;21.1-EVO version 21.1R1-EVO and later versions;21.2-EVO version 21.2R1-EVO and later versions;21.3-EVO versions prior to 21.3R3-S1-EVO;21.4-EVO versions prior to 21.4R3-EVO;22.1-EVO versions prior to 22.1R1-S2-EVO, 22.1R2-EVO;22.2-EVO versions prior to 22.2R2-EVO.

📖 Read

via "National Vulnerability Database".
CVE-2023-36888

Microsoft Edge for Android (Chromium-based) Tampering Vulnerability

📖 Read

via "National Vulnerability Database".
CVE-2023-24896

Dynamics 365 Finance Spoofing Vulnerability

📖 Read

via "National Vulnerability Database".
CVE-2023-32760

An issue in Archer Platform before v.6.13 fixed in v.6.12.0.6 and v.6.13.0 allows an authenticated attacker to obtain sensitive information via API calls related to data feeds and data publication.

📖 Read

via "National Vulnerability Database".
CVE-2023-36840

A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a locally-based, low-privileged attacker to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved, when a specific L2VPN command is run, RPD will crash and restart. Continued execution of this specific command will create a sustained Denial of Service (DoS) condition.This issue affects:Juniper Networks Junos OSAll versions prior to 19.3R3-S10;20.1 versions prior to 20.1R3-S4;20.2 versions prior to 20.2R3-S6;20.3 versions prior to 20.3R3-S6;20.4 versions prior to 20.4R3-S5;21.1 versions prior to 21.1R3-S4;21.2 versions prior to 21.2R3-S3;21.3 versions prior to 21.3R3-S2;21.4 versions prior to 21.4R3;22.1 versions prior to 22.1R3;22.2 versions prior to 22.2R2;22.3 versions prior to 22.3R2;Juniper Networks Junos OS EvolvedAll versions prior to 20.4R3-S7-EVO;21.1 versions prior to 21.1R3-S3-EVO;21.2 versions prior to 21.2R3-S5-EVO;21.3 versions prior to 21.3R3-S4-EVO;21.4 versions prior to 21.4R3-EVO;22.1 versions prior to 22.1R3-EVO;22.2 versions prior to 22.2R2-EVO;22.3 versions prior to 22.3R2-EVO;

📖 Read

via "National Vulnerability Database".
🦿 Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns 🦿

The Scarleteel threat targets AWS Fargate environments for data theft and more malicious types of attacks such as cryptojacking and DDoS. Learn how to mitigate this threat.

📖 Read

via "Tech Republic".