π΄ Closing Coverage Gaps Where Customer Resources Meet Cloud Environments π΄
π Read
via "Dark Reading".
Protecting the spaces where private, public, and hybrid clouds meet users' technologies requires a cloud-centric approach.π Read
via "Dark Reading".
Dark Reading
Closing Coverage Gaps Where Customer Resources Meet Cloud Environments
Protecting the spaces where private, public, and hybrid clouds meet users' technologies requires a cloud-centric approach.
β€1
βΌ CVE-2023-31448 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 x64. To exploit the vulnerability, a authenticated user can create a HL7 Sensor. When creating this sensor, the user can set the HL7 message that should be sent from the PRTG device. This input parameter contains a path traversal vulnerability that allows an attacker to choose arbitrary files from the system.π Read
via "National Vulnerability Database".
βΌ CVE-2023-32781 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760. Due to command-line parameter injection and an undocumented debug feature flag, an attacker can utilize the HL7 sensor to write arbitrary data to the disk. This can be utilized to write a custom EXE(.bat) sensor, that will then run. This primitive gives remote code execution.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2023-31452 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 x64. The NetApp Volume Sensor transmits cleartext credentials over the network when the HTTP protocol is selected. This can be triggered remotely via a CSRF by simply sending a controls/addsensor3.htm link to a logged-in victim.π Read
via "National Vulnerability Database".
βΌ CVE-2023-32782 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760. Due to command-line parameter injection and an undocumented debug feature flag, an attacker can utilize the DICOM sensor to write arbitrary data to the disk. This can be utilized to write a custom EXE(.bat) sensor, that will then run. This primitive gives remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31449 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 x64. To exploit the vulnerability, a authenticated user can create a WMI Custom Sensor. When creating this sensor, the user can set the WQL message that should be sent from the PRTG device. This input parameter contains a path traversal vulnerability that allows an attacker to choose arbitrary files from the system.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33953 βΌ
π Read
via "National Vulnerability Database".
gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/Γ Three vectors were found that allow the following DOS attacks:- Unbounded memory buffering in the HPACK parser- Unbounded CPU consumption in the HPACK parserThe unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client.The unbounded memory buffering bugs:- The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb.- HPACK varints have an encoding quirk whereby an infinite number of 0Γ’β¬β’s can be added at the start of an integer. gRPCΓ’β¬β’s hpack parser needed to read all of them before concluding a parse.- gRPCΓ’β¬β’s metadata overflow check was performed per frame, so that the following sequence of frames could cause infinite buffering: HEADERS: containing a: 1 CONTINUATION: containing a: 2 CONTINUATION: containing a: 3 etcΓ’β¬Β¦π Read
via "National Vulnerability Database".
βΌ CVE-2023-31450 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 x64. To exploit the vulnerability, a authenticated user can create a SQL Sensor. When creating this sensor, the user can set the SQL message that should be sent from the PRTG device. This input parameter contains a path traversal vulnerability that allows an attacker to choose arbitrary files from the system. They will be transmitted over the internet to the attacker's machine.π Read
via "National Vulnerability Database".
π΄ Why Shellshock Remains a Cybersecurity Threat After 9 Years π΄
π Read
via "Dark Reading".
Nearly a decade after it was disclosed, the Shellshock vulnerability still plagues organizations. Learn how to protect yourself.π Read
via "Dark Reading".
Dark Reading
Why Shellshock Remains a Cybersecurity Threat After 9 Years
Nearly a decade after it was disclosed, the Shellshock vulnerability still plagues organizations. Learn how to protect yourself.
π΄ AI Risk Database Tackles AI Supply Chain Risks π΄
π Read
via "Dark Reading".
The open source tool β a collaboration between Robust Intelligence, MITRE, and Indiana University β assesses heavily shared, public machine learning models for risk.π Read
via "Dark Reading".
Dark Reading
AI Risk Database Tackles AI Supply Chain Risks
The open source tool β a collaboration between Robust Intelligence, MITRE, and Indiana University β assesses heavily shared, public machine learning models for risk.
βΌ CVE-2023-3953 βΌ
π Read
via "National Vulnerability Database".
A CWE-119: Improper Restriction of Operations within the Bounds of a MemoryBuffer vulnerability exists that could cause memory corruption when an authenticated useropens a tampered log file from GP-Pro EX.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34545 βΌ
π Read
via "National Vulnerability Database".
A SQL injection vulnerability in CSZCMS 1.3.0 allows remote attackers to run arbitrary SQL commands via p parameter or the search URL.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4273 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40012 βΌ
π Read
via "National Vulnerability Database".
uthenticode is a small cross-platform library for partially verifying Authenticode digital signatures. Versions of uthenticode prior to the 2.x series did not check Extended Key Usages in certificates, in violation of the Authenticode X.509 certificate profile. As a result, a malicious user could produce a "signed" PE file that uthenticode would verify and consider valid using an X.509 certificate that isn't entitled to produce code signatures (e.g., a SSL certificate). By design, uthenticode does not perform full-chain validation. However, the absence of EKU validation was an unintended oversight. The 2.0.0 release series includes EKU checks. There are no workarounds to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3518 βΌ
π Read
via "National Vulnerability Database".
HashiCorp Consul and Consul Enterprise 1.16.0 when using JWT Auth for service mesh incorrectly allows/denies access regardless of service identities. Fixed in 1.16.1.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39969 βΌ
π Read
via "National Vulnerability Database".
uthenticode is a small cross-platform library for partially verifying Authenticode digital signatures. Version 1.0.9 of uthenticode hashed the entire file rather than hashing sections by virtual address, in violation of the Authenticode specification. As a result, an attacker could modify code within a binary without changing its Authenticode hash, making it appear valid from uthenticode's perspective. Versions of uthenticode prior to 1.0.9 are not vulnerable to this attack, nor are versions in the 2.x series. By design, uthenticode does not perform full-chain validation. However, the malleability of signature verification introduced in 1.0.9 was an unintended oversight. The 2.x series addresses the vulnerability. Versions prior to 1.0.9 are also not vulnerable, but users are encouraged to upgrade rather than downgrade. There are no workarounds to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39531 βΌ
π Read
via "National Vulnerability Database".
Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 23.7.2, an attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. Sentry SaaS customers do not need to take any action. Self-hosted installations should upgrade to version 23.7.2 or higher. There are no direct workarounds, but users should review applications authorized on their account and remove any that are no longer needed.π Read
via "National Vulnerability Database".
β Microsoft Patch Tuesday: 74 CVEs plus 2 βExploit Detectedβ advisories β
π Read
via "Naked Security".
74 CVEs, and two "Exploitation Detected" advisories, which are nearly but not quite the same as 0-days. Also, two Teams treacheries that you really want to fix. π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β€1
π΄ Safety of Officers & Civilians of PSNI Compromised in Major Data Breach π΄
π Read
via "Dark Reading".
A mistake snowballs into a serious political issue as the safety of police officers in Northern Ireland is compromised in an accidental data leak.π Read
via "Dark Reading".
Dark Reading
Major Police Breach Endangers Safety of Officers & Civilians
A mistake snowballs into a serious political issue as the safety of police officers in Northern Ireland is compromised in an accidental data leak.
π΄ 'Downfall' Bug in Billions of Intel CPUs Reveals Major Design Flaw π΄
π Read
via "Dark Reading".
A newly revealed flaw affects a good chunk of the world's computers. A patch has been released, but broad, structural change in CPU design will be required to address the root cause.π Read
via "Dark Reading".
Dark Reading
'Downfall' Bug in Billions of Intel CPUs Reveals Major Design Flaw
A newly revealed flaw affects a good chunk of the world's computers. A patch has been released, but broad, structural change in CPU design will be required to address the root cause.
βΌ CVE-2023-39001 βΌ
π Read
via "National Vulnerability Database".
A command injection vulnerability in the component diag_backup.php of OPNsense before 23.7 allows attackers to execute arbitrary commands via a crafted backup configuration file.π Read
via "National Vulnerability Database".