SysAdmin 24x7
4.34K subscribers
41 photos
2 videos
8 files
6.03K links
Noticias y alertas de seguridad informática.
Chat y contacto:
t.me/sysadmin24x7chat
Download Telegram
Securing #Docker Containers

I made a guide on how to secure docker. I’ve split it up into 3 categories. Feedback is appreciated as this is more a compilation of other resources than anything else and I did not verify everything.

https://0x00sec.org/t/securing-docker-containers/16913
Nasty #PHP7 remote code execution bug exploited in the wild

New PHP7 bug CVE-2019-11043 can allow even non-technical attackers to take over servers.

The issue, tracked as CVE-2019-11043, lets attackers run commands on servers just by accessing a specially-crafted URL.

https://www.zdnet.com/article/nasty-php7-remote-code-execution-bug-exploited-in-the-wild/
Múltiples vulnerabilidades en RouterOS de MikroTik

Fecha de publicación: 29/10/2019
Importancia: 4 - Alta

Recursos afectados: 
RouterOS Stable, con versiones 6.45.6 y anteriores,
RouterOS Long-term, con versiones 6.44.5 y anteriores.

Descripción: 
Jacob Baines, investigador de seguridad en Tenable, ha descubierto 4 vulnerabilidades con criticidades altas. Un atacante remoto, no autenticado, podría acceder, modificar u obtener privilegios de root en el dispositivo.

Solución: 
MikroTik ha publicado actualizaciones que solucionan las vulnerabilidades:
RouterOS Stable, actualizar a la versión 6.45.7,
RouterOS Long-term, actualizar a la versión 6.44.6.

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-routeros-mikrotik
Denegación de servicio en RDesktop

Fecha de publicación: 31/10/2019
Importancia: 4 - Alta

Recursos afectados: 
RDesktop, anterior a la versión 1.8.4.

Descripción: 
El investigador de seguridad, Pavel Cheremushkin, de Kaspersky ICS CERT ha detectado una vulnerabilidad en RDesktop, que podría permitir a un atacante remoto generar una condición de denegación de servicio.

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/denegacion-servicio-rdesktop
#Chrome Zero-Day Bug with Exploit in the Wild Gets A Patch

Google on Thursday night started to roll out an update for Chrome that patches two use-after-free vulnerabilities, one of them having at least one exploit in the wild.

Both security issues are serious as they could be leveraged to take control of a vulnerable system, reads an alert from the Cybersecurity and Infrastructure Security Agency (CISA).

https://www.bleepingcomputer.com/news/security/chrome-zero-day-bug-with-exploit-in-the-wild-gets-a-patch/
Google Releases Security Updates for Chrome

Google has released Chrome version 78.0.3904.87 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system. One of these vulnerabilities (CVE-2019-13720) was detected in exploits in the wild.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Chrome Release and apply the necessary updates.

https://www.us-cert.gov/ncas/current-activity/2019/10/31/google-releases-security-updates-chrome
Watch Out IT Admins! Two Unpatched Critical #RCE Flaws Disclosed in #rConfig

If you're using the popular rConfig network configuration management utility to protect and manage your network devices, here we have an important and urgent warning for you.

A cybersecurity researcher has recently published details and proof-of-concept exploits for two unpatched, critical remote code execution vulnerabilities in the rConfig utility, at least one of which could allow unauthenticated remote attackers to compromise targeted servers, and connected network devices.

https://thehackernews.com/2019/11/rConfig-network-vulnerability.html
ICS Advisory (ICSA-19-304-03)

#Honeywell equIP and Performance Series IP Cameras

CVSS v3 7.5
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Honeywell 
Equipment: equIP series and Performance series IP cameras
Vulnerability: Missing Authentication for Critical Function 

https://www.us-cert.gov/ics/advisories/icsa-19-304-03
ICS Advisory (ICSA-19-304-04)

#Honeywell equIP and Performance Series IP Cameras and Recorders

CVSS v3 7.5
ATTENTION: Exploitable remotely
Vendor: Honeywell
Equipment: equIP series and Performance series IP cameras and recorders
Vulnerability: Authentication Bypass by Capture-Replay 

https://www.us-cert.gov/ics/advisories/icsa-19-304-04
#BlueKeep Attacks Have Arrived, Are Initially Underwhelming

The first attacks that exploit the zero-day #Windows vulnerability install cryptominers and scan for targets rather than a worm with WannaCry potential.

The wave of BlueKeep attacks that security experts predicted could take down systems globally have arrived, but they are not in showing the form nor the destructive impact experts initially feared.

https://threatpost.com/bluekeep-attacks-have-arrived-are-initially-underwhelming/149829/
#BlueKeep attacks go live, but it isn’t as dangerous as feared

Hackers have already started using BlueKeep exploit to break into Windows systems, but according to security researchers, the exploit is not as dangerous as everybody feared.

For those unaware, BlueKeep affects the Remote Desktop Protocole service(RDP), which is widely used for remote control administration. May 14 is when it first came into existence and security experts at various firms labeled it as “wormable,” meaning that code exploiting this vulnerability can be self-propagating in nature, and, therefore, can spread very quickly, just like how Wannacry spread.

https://mspoweruser.com/bluekeep-attacks-go-live-but-it-isnt-as-dangerous-as-feared/amp/
Múltiples vulnerabilidades en Xen

Fecha de publicación: 04/11/2019
Importancia: 4 - Alta

Recursos afectados: 
Xen, versiones 4.6 y posteriores;
Xen, versiones de 32 bit, desde la versión 3.2;
Xen, todos los sistemas x86, con invitados PV sin confianza;
los sistemas Xen en los que los huéspedes tengan acceso directo a los dispositivos físicos.
Xen, todos los sistemas ARM;
Citrix Hypervisor, versión 8.0 y anteriores.

Descripción: 
Se han publicado varias vulnerabilidades en Xen que podrían permitir la denegación del servicio, escalada de privilegios o corrupción de datos.

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-xen-1
Vulnerabilidad de XSS en BIG-IP TMUI de F5

Fecha de publicación: 04/11/2019
Importancia: 4 - Alta

Recursos afectados: 
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM y WebAccelerator), versiones:
desde 13.1.0, hasta 13.1.3;
desde 12.1.0, hasta 12.1.5;
desde 11.5.2, hasta 11.6.5.

Descripción: 
The Tarantula Team ha descubierto una vulnerabilidad de cross-site scripting (XSS) reflejado en una página no revelada en el componente Traffic Management User Interface (TMUI) del producto BIG-IP , también conocido como la utilidad de configuración de BIG-IP.

Solución: 
Actualizar BIG-IP a la versión 14.0.0.

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-xss-big-ip-tmui-f5
Denegación de servicio en RDesktop

Fecha de publicación: 31/10/2019
Importancia: 4 - Alta

Recursos afectados: 
RDesktop, anterior a la versión 1.8.4.

Descripción: 
El investigador de seguridad, Pavel Cheremushkin, de Kaspersky ICS CERT ha detectado una vulnerabilidad en RDesktop, que podría permitir a un atacante remoto generar una condición de denegación de servicio.

Solución: 
Actualizar a la versión 1.8.5.

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/denegacion-servicio-rdesktop
Forwarded from Derecho de la Red
BOE-A-2019-15790.pdf
326.3 KB
"Publicado el Real Decreto-ley 14/2019, de 31 de octubre, por el que se adoptan medidas urgentes por razones de seguridad pública en materia de administración digital, contratación del sector público y telecomunicaciones"