πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 How to Create and Use a Docker Secret From a File (+Video) 🦿

In this step-by-step tutorial, learn how to create and use a Docker secret to help keep your data secure.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Engineering-Grade OT Protection πŸ•΄

The worst-case consequences of cyberattacks are sharply, qualitatively different on IT versus OT networks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-47557 β€Ό

** UNSUPPPORTED WHEN ASSIGNED ** Vulnerability in ekorCCP and ekorRCI that could allow an attacker with access to the network where the device is located to decrypt the credentials of privileged users, and subsequently gain access to the system to perform malicious actions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47554 β€Ό

** UNSUPPPORTED WHEN ASSIGNED ** Exposure of sensitive information in ekorCCP and ekorRCI, potentially allowing a remote attacker to obtain critical information from various .xml files, including .xml files containing credentials, without being authenticated within the web server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47553 β€Ό

** UNSUPPPORTED WHEN ASSIGNED ** Incorrect authorisation in ekorCCP and ekorRCI, which could allow a remote attacker to obtain resources with sensitive information for the organisation, without being authenticated within the web server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23957 β€Ό

An authenticated user can see and modify the value for Γ’β‚¬ΛœnextÒ€ℒ query parameter in Symantec Identity Portal 14.4

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47555 β€Ό

** UNSUPPPORTED WHEN ASSIGNED ** Operating system command injection in ekorCCP and ekorRCI, which could allow an authenticated attacker to execute commands, create new users with elevated privileges or set up a backdoor.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4092 β€Ό

SQL injection vulnerability in Arconte ΓƒοΏ½urea, in its 1.5.0.0 version. The exploitation of this vulnerability could allow an attacker to read sensitive data from the database, modify data (insert/update/delete), perform database administration operations and, in some cases, execute commands on the operating system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47558 β€Ό

** UNSUPPPORTED WHEN ASSIGNED ** Devices ekorCCP and ekorRCI are vulnerable due to access to the FTP service using default credentials. Exploitation of this vulnerability can allow an attacker to modify critical files that could allow the creation of new users, delete or modify existing users, modify configuration files, install rootkits or backdoors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47556 β€Ό

** UNSUPPPORTED WHEN ASSIGNED ** Uncontrolled resource consumption in ekorRCI, allowing an attacker with low-privileged access to the web server to send continuous legitimate web requests to a functionality that is not properly validated, in order to cause a denial of service (DoS) on the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41834 β€Ό

Improper Neutralization of CRLF Sequences in HTTP Headers in Apache Flink Stateful Functions 3.1.0, 3.1.1 and 3.2.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted HTTP requests.Γ‚ Attackers could potentially inject malicious content into the HTTP response that is sent to the user's browser. Users should upgrade to Apache Flink Stateful Functions version 3.3.0.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ CapraRAT Impersonates YouTube to Hijack Android Devices πŸ•΄

Pakistani threat group Transparent Tribe targets military and diplomatic personnel in India and Pakistan with romance-themed lures in the latest spyware campaign.

πŸ“– Read

via "Dark Reading".
πŸ“’ Novel China-linked Linux backdoor exploits organizations that fail to patch old vulnerabilities πŸ“’

The threat should serve as a β€œwake-up call” for organizations running Linux, an expert has said

πŸ“– Read

via "ITPro".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.8.6 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Clorox Sees Product Shortages Amid Cyberattack Cleanup πŸ•΄

Everyone's favorite pandemic-era brand is experiencing store shortages in the wake of a cyberattack that impacted its global production lines β€” and there's no timeline for normal operations to resume.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-42447 β€Ό

blurhash-rs is a pure Rust implementation of Blurhash, software for encoding images into ASCII strings that can be turned into a gradient of colors representing the original image. In version 0.1.1, the blurhash parsing code may panic due to multiple panic-guarded out-of-bounds accesses on untrusted input. In a typical deployment, this may get triggered by feeding a maliciously crafted blurhashes over the network. These may include UTF-8 compliant strings containing multi-byte UTF-8 characters. A patch is available in version 0.2.0, which requires user intervention because of slight API churn. No known workarounds are available.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4093 β€Ό

Reflected and persistent XSS vulnerability in Arconte ΓƒοΏ½urea, in its 1.5.0.0 version. The exploitation of this vulnerability could allow an attacker to inject malicious JavaScript code, compromise the victim's browser and take control of it, redirect the user to malicious domains or access information being viewed by the legitimate user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4096 β€Ό

Weak password recovery mechanism vulnerability in Fujitsu Arconte ΓƒοΏ½urea version 1.5.0.0,Γ‚ which exploitation could allow an attacker to perform a brute force attack on the emailed PIN number in order to change the password of a legitimate user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42444 β€Ό

phonenumber is a library for parsing, formatting and validating international phone numbers. Prior to versions `0.3.3+8.13.9` and `0.2.5+8.11.3`, the phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string. In a typical deployment of `rust-phonenumber`, this may get triggered by feeding a maliciously crafted phonenumber over the network, specifically the string `.;phone-context=`. Versions `0.3.3+8.13.9` and `0.2.5+8.11.3` contain a patch for this issue. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31808 β€Ό

Technicolor TG670 10.5.N.9 devices contain multiple accounts with hard-coded passwords. One account has administrative privileges, allowing for unrestricted access over the WAN interface if Remote Administration is enabled.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41890 β€Ό

Sustainsys.Saml2 library adds SAML2P support to ASP.NET web sites, allowing the web site to act as a SAML2 Service Provider. Prior to versions 1.0.3 and 2.9.2, when a response is processed, the issuer of the Identity Provider is not sufficiently validated. This could allow a malicious identity provider to craft a Saml2 response that is processed as if issued by another identity provider. It is also possible for a malicious end user to cause stored state intended for one identity provider to be used when processing the response from another provider. An application is impacted if they rely on any of these features in their authentication/authorization logic: the issuer of the generated identity and claims; or items in the stored request state (AuthenticationProperties). This issue is patched in versions 2.9.2 and 1.0.3. The `AcsCommandResultCreated` notification can be used to add the validation required if an upgrade to patched packages is not possible.

πŸ“– Read

via "National Vulnerability Database".