Cisco Releases Security Updates for Multiple Products
Original release date: August 25, 2022
Cisco has released security updates for vulnerabilities affecting ACI Multi-Site Orchestrator, FXOS, and NX-OS software. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security Advisories page.
CISA encourages users and administrators to review the advisories for ACI Multi-Site Orchestrator, FXOS, and NX-OS and apply the necessary updates.
https://www.cisa.gov/uscert/ncas/current-activity/2022/08/25/cisco-releases-security-updates-multiple-products
Original release date: August 25, 2022
Cisco has released security updates for vulnerabilities affecting ACI Multi-Site Orchestrator, FXOS, and NX-OS software. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security Advisories page.
CISA encourages users and administrators to review the advisories for ACI Multi-Site Orchestrator, FXOS, and NX-OS and apply the necessary updates.
https://www.cisa.gov/uscert/ncas/current-activity/2022/08/25/cisco-releases-security-updates-multiple-products
www.cisa.gov
Cisco Releases Security Updates for Multiple Products | CISA
Cisco has released security updates for vulnerabilities affecting ACI Multi-Site Orchestrator, FXOS, and NX-OS software. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity…
Notice of Recent Security Incident
To All LastPass Customers,
I want to inform you of a development that we feel is important for us to share with our LastPass business and consumer community.
[...]
FAQs
1. Has my Master password or the Master Password of my users been compromised?
No. This incident did not compromise your Master Password. We never store or have knowledge of your Master Password. We utilize an industry standard Zero Knowledge architecture that ensures LastPass can never know or gain access to our customers’ Master Password. You can read about the technical implementation of Zero Knowledge here.
https://blog.lastpass.com/2022/08/notice-of-recent-security-incident/
To All LastPass Customers,
I want to inform you of a development that we feel is important for us to share with our LastPass business and consumer community.
[...]
FAQs
1. Has my Master password or the Master Password of my users been compromised?
No. This incident did not compromise your Master Password. We never store or have knowledge of your Master Password. We utilize an industry standard Zero Knowledge architecture that ensures LastPass can never know or gain access to our customers’ Master Password. You can read about the technical implementation of Zero Knowledge here.
https://blog.lastpass.com/2022/08/notice-of-recent-security-incident/
Lastpass
Security Incident December 2022 Update - LastPass - The LastPass Blog
Please refer to the latest article for updated information.nbs[..]
Bitbucket Server and Data Center - Command injection vulnerability - CVE-2022-36804
There is a command injection vulnerability in multiple API endpoints of Bitbucket Server and Data Center. An attacker with access to a public repository or with read permissions to a private Bitbucket repository can execute arbitrary code by sending a malicious HTTP request.
https://confluence.atlassian.com/bitbucketserver/bitbucket-server-and-data-center-advisory-2022-08-24-1155489835.html
There is a command injection vulnerability in multiple API endpoints of Bitbucket Server and Data Center. An attacker with access to a public repository or with read permissions to a private Bitbucket repository can execute arbitrary code by sending a malicious HTTP request.
https://confluence.atlassian.com/bitbucketserver/bitbucket-server-and-data-center-advisory-2022-08-24-1155489835.html
Twilio breach let hackers gain access to Authy 2FA accounts.
Twilio’s investigation into the attack on August 4 reveals that hackers gained access to some Authy user accounts and registered unauthorized devices.
https://www.bleepingcomputer.com/news/security/twilio-breach-let-hackers-gain-access-to-authy-2fa-accounts/
Twilio’s investigation into the attack on August 4 reveals that hackers gained access to some Authy user accounts and registered unauthorized devices.
https://www.bleepingcomputer.com/news/security/twilio-breach-let-hackers-gain-access-to-authy-2fa-accounts/
BleepingComputer
Twilio breach let hackers gain access to Authy 2FA accounts
Twilio's investigation into the attack on August 4 reveals that hackers gained access to some Authy user accounts and registered unauthorized devices.
Múltiples vulnerabilidades en GitLab
Fecha de publicación: 31/08/2022
Identificador: INCIBE-2022-0904
Importancia: 5 - Crítica
Recursos afectados:
GitLab CE/EE, versiones anteriores a 15.3.2, 15.2.4 y 15.1.6.
Descripción:
GitLab ha publicado 15 vulnerabilidades: 1 de severidad crítica, 2 de severidad alta, 10 de severidad media y 2 de severidad baja, por las que un atacante podría ejecutar comandos de forma remota o una vulnerabilidad tipo Stored Cross-Site Scripting (persistent XSS), divulgar información o causar una denegación de servicio entre otros.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-gitlab-2
Fecha de publicación: 31/08/2022
Identificador: INCIBE-2022-0904
Importancia: 5 - Crítica
Recursos afectados:
GitLab CE/EE, versiones anteriores a 15.3.2, 15.2.4 y 15.1.6.
Descripción:
GitLab ha publicado 15 vulnerabilidades: 1 de severidad crítica, 2 de severidad alta, 10 de severidad media y 2 de severidad baja, por las que un atacante podría ejecutar comandos de forma remota o una vulnerabilidad tipo Stored Cross-Site Scripting (persistent XSS), divulgar información o causar una denegación de servicio entre otros.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-gitlab-2
www.incibe.es
Múltiples vulnerabilidades en GitLab
GitLab ha publicado 15 vulnerabilidades: 1 de severidad crítica, 2 de severidad alta, 10 de severidad
Actualización de seguridad 6.0.2 para WordPress
Fecha de publicación: 31/08/2022
Identificador: INCIBE-2022-0905
Importancia: 4 - Alta
Recursos afectados:
WordPress, versiones anteriores a 6.0.2.
Descripción:
Se ha publicado la última versión de WordPress, que contiene 3 correcciones de seguridad.
Solución:
Actualizar a la versión 6.0.2 desde WordPress.org o desde el panel de control (Updates > Update Now).
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/actualizacion-seguridad-602-wordpress
Fecha de publicación: 31/08/2022
Identificador: INCIBE-2022-0905
Importancia: 4 - Alta
Recursos afectados:
WordPress, versiones anteriores a 6.0.2.
Descripción:
Se ha publicado la última versión de WordPress, que contiene 3 correcciones de seguridad.
Solución:
Actualizar a la versión 6.0.2 desde WordPress.org o desde el panel de control (Updates > Update Now).
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/actualizacion-seguridad-602-wordpress
INCIBE-CERT
Actualización de seguridad 6.0.2 para WordPress
Se ha publicado la última versión de WordPress, que contiene 3 correcciones de seguridad.
URGENT! Apple slips out zero-day update for older iPhones and iPads
https://nakedsecurity.sophos.com/2022/08/31/urgent-apple-quietly-slips-out-zero-day-update-for-older-iphones/
https://nakedsecurity.sophos.com/2022/08/31/urgent-apple-quietly-slips-out-zero-day-update-for-older-iphones/
Sophos News
Naked Security – Sophos News
Apple Releases Security Updates for Multiple Products
Original release date: September 01, 2022
Apple has released security updates to address a vulnerability (CVE-2022-32893) in iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation). Exploitation of this vulnerability could allow an attacker to take control of affected device.
CISA encourages users and administrators to review Apple’s advisory HT213428 and apply necessary updates.
https://www.cisa.gov/uscert/ncas/current-activity/2022/09/01/apple-releases-security-updates-multiple-products
https://support.apple.com/en-us/HT213428
Original release date: September 01, 2022
Apple has released security updates to address a vulnerability (CVE-2022-32893) in iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation). Exploitation of this vulnerability could allow an attacker to take control of affected device.
CISA encourages users and administrators to review Apple’s advisory HT213428 and apply necessary updates.
https://www.cisa.gov/uscert/ncas/current-activity/2022/09/01/apple-releases-security-updates-multiple-products
https://support.apple.com/en-us/HT213428
www.cisa.gov
Apple Releases Security Updates for Multiple Products | CISA
Apple has released security updates to address a vulnerability (CVE-2022-32893) in iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation). Exploitation of this vulnerability could allow an attacker to take…
Privilege escalation in HP Support Assistant
Severity High
HP Reference HPSBHF03809 Rev. 1
Release date September 6, 2022
Category PC
Potential Security Impact Privilege escalation
Affected products
Identify the following affected products.
HP Support Assistant versions earlier than 9.11.
Fusion versions earlier than 1.38.2601.0.
https://support.hp.com/us-en/document/ish_6788123-6788147-16/hpsbhf03809
Severity High
HP Reference HPSBHF03809 Rev. 1
Release date September 6, 2022
Category PC
Potential Security Impact Privilege escalation
Affected products
Identify the following affected products.
HP Support Assistant versions earlier than 9.11.
Fusion versions earlier than 1.38.2601.0.
https://support.hp.com/us-en/document/ish_6788123-6788147-16/hpsbhf03809
Cisco Releases Security Updates for Multiple Products
Original release date: September 08, 2022
Cisco has released security updates to address vulnerabilities in multiple Cisco products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security Advisories page.
CISA encourages users and administrators to review the following advisories and apply the necessary updates:
• Cisco SD-WAN vManage Software Unauthenticated Access to Messaging Services cisco-sa-vmanage-msg-serv-AqTup7vs
• Vulnerability in NVIDIA Data Plane Development Kit Affecting Cisco Products: August 2022 cisco-sa-mlx5-jbPCrqD8
https://www.cisa.gov/uscert/ncas/current-activity/2022/09/08/cisco-releases-security-updates-multiple-products
Original release date: September 08, 2022
Cisco has released security updates to address vulnerabilities in multiple Cisco products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security Advisories page.
CISA encourages users and administrators to review the following advisories and apply the necessary updates:
• Cisco SD-WAN vManage Software Unauthenticated Access to Messaging Services cisco-sa-vmanage-msg-serv-AqTup7vs
• Vulnerability in NVIDIA Data Plane Development Kit Affecting Cisco Products: August 2022 cisco-sa-mlx5-jbPCrqD8
https://www.cisa.gov/uscert/ncas/current-activity/2022/09/08/cisco-releases-security-updates-multiple-products
www.cisa.gov
Cisco Releases Security Updates for Multiple Products | CISA
Cisco has released security updates to address vulnerabilities in multiple Cisco products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the…
Forwarded from Una al día
Ataque de cifrado de datos en sistemas Windows con BitLocker
https://unaaldia.hispasec.com/2022/09/ataque-de-cifrado-de-datos-en-sistemas-windows-con-bitlocker.html
https://unaaldia.hispasec.com/2022/09/ataque-de-cifrado-de-datos-en-sistemas-windows-con-bitlocker.html
Una al Día
Ataque de cifrado de datos en sistemas Windows con BitLocker
Microsoft ha publicado una investigación realizada al grupo iraní DEV-0270 en la que han realizado ataques de cifrado de datos con BitLocker.
Vulnerability in Xalan-J could allow arbitrary code execution.
Open source project is used by various SAML implementations
A vulnerability in Xalan-J, an Apache project used by multiple SAML implementations, could allow arbitrary code execution, researchers warn.
https://portswigger.net/daily-swig/vulnerability-in-xalan-j-could-allow-arbitrary-code-execution
Open source project is used by various SAML implementations
A vulnerability in Xalan-J, an Apache project used by multiple SAML implementations, could allow arbitrary code execution, researchers warn.
https://portswigger.net/daily-swig/vulnerability-in-xalan-j-could-allow-arbitrary-code-execution
The Daily Swig | Cybersecurity news and views
Vulnerability in Xalan-J could allow arbitrary code execution
Open source project is used by various SAML implementations
Microsoft September 2022 Patch Tuesday fixes zero-day used in attacks, 63 flaws
18 Elevation of Privilege Vulnerabilities
1 Security Feature Bypass Vulnerabilities
30 Remote Code Execution Vulnerabilities
7 Information Disclosure Vulnerabilities
7 Denial of Service Vulnerabilities
16 Edge - Chromium Vulnerabilities
https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2022-patch-tuesday-fixes-zero-day-used-in-attacks-63-flaws/
18 Elevation of Privilege Vulnerabilities
1 Security Feature Bypass Vulnerabilities
30 Remote Code Execution Vulnerabilities
7 Information Disclosure Vulnerabilities
7 Denial of Service Vulnerabilities
16 Edge - Chromium Vulnerabilities
https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2022-patch-tuesday-fixes-zero-day-used-in-attacks-63-flaws/
BleepingComputer
Microsoft September 2022 Patch Tuesday fixes zero-day used in attacks, 63 flaws
Today is Microsoft's September 2022 Patch Tuesday, and with it comes fixes for an actively exploited Windows vulnerability and a total of 63 flaws.
Forwarded from Una al día
PsExec nueva implementación sobre el puerto 135
https://unaaldia.hispasec.com/2022/09/psexec-nueva-implementacion-sobre-el-puerto-135.html
https://unaaldia.hispasec.com/2022/09/psexec-nueva-implementacion-sobre-el-puerto-135.html
Una al Día
PsExec: nueva implementación sobre el puerto 135
Nueva implementación para PsExec permite movimiento lateral en una red utilizando el puerto 135/TCP en vez del tradicional puerto 445/TCP.
Múltiples vulnerabilidades en HPE SAN Switches con Brocade FOS
Fecha de publicación: 20/09/2022
Identificador: INCIBE-2022-0926
Importancia: 5 - Crítica
Recursos afectados:
HPE SAN Switches con las siguientes versiones de Brocade Fabric OS (FOS):
9.1 anteriores a 9.1.1;
9.0 anteriores a 9.0.1e;
8.2 anteriores a 8.2.3c;
7.4 anteriores a 7.4.2j.
Descripción:
Se han identificado 28 vulnerabilidades en productos HPE SAN Switches con Brocade FOS, 7 con severidad crítica, 11 altas, 9 medias y 1 baja.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-hpe-san-switches-brocade-fos
Fecha de publicación: 20/09/2022
Identificador: INCIBE-2022-0926
Importancia: 5 - Crítica
Recursos afectados:
HPE SAN Switches con las siguientes versiones de Brocade Fabric OS (FOS):
9.1 anteriores a 9.1.1;
9.0 anteriores a 9.0.1e;
8.2 anteriores a 8.2.3c;
7.4 anteriores a 7.4.2j.
Descripción:
Se han identificado 28 vulnerabilidades en productos HPE SAN Switches con Brocade FOS, 7 con severidad crítica, 11 altas, 9 medias y 1 baja.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-hpe-san-switches-brocade-fos
INCIBE-CERT
Múltiples vulnerabilidades en HPE SAN Switches con Brocade FOS
Se han identificado 28 vulnerabilidades en productos HPE SAN Switches con Brocade FOS, 7 con severidad crítica, 11 altas, 9 medias y 1 baja.
Vulnerabilidades de desbordamiento de búfer en Grandstream GSD3710
Fecha de publicación: 20/09/2022
Identificador: INCIBE-2022-0925
Importancia: 5 - Crítica
Recursos afectados:
Grandstream GSD3710, versión 1.0.11.13.
Descripción:
INCIBE ha coordinado la publicación de 2 vulnerabilidades en Grandstream GSD3710, con el código interno INCIBE-2022-0925, que han sido descubiertas por José Luis Verdeguer Navarro.
A estas vulnerabilidades se les han asignado los códigos:
CVE-2022-2070. Se ha calculado una puntuación base CVSS v3.1 de 9,8, siendo el cálculo del CVSS el siguiente: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
CVE-2022-2025. Se ha calculado una puntuación base CVSS v3.1 de 9,8, siendo el cálculo del CVSS el siguiente: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
Solución:
Las vulnerabilidades han sido resueltas por Grandstream en la versión 1.0.11.23.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidades-desbordamiento-bufer-grandstream-gsd3710
Fecha de publicación: 20/09/2022
Identificador: INCIBE-2022-0925
Importancia: 5 - Crítica
Recursos afectados:
Grandstream GSD3710, versión 1.0.11.13.
Descripción:
INCIBE ha coordinado la publicación de 2 vulnerabilidades en Grandstream GSD3710, con el código interno INCIBE-2022-0925, que han sido descubiertas por José Luis Verdeguer Navarro.
A estas vulnerabilidades se les han asignado los códigos:
CVE-2022-2070. Se ha calculado una puntuación base CVSS v3.1 de 9,8, siendo el cálculo del CVSS el siguiente: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
CVE-2022-2025. Se ha calculado una puntuación base CVSS v3.1 de 9,8, siendo el cálculo del CVSS el siguiente: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
Solución:
Las vulnerabilidades han sido resueltas por Grandstream en la versión 1.0.11.23.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidades-desbordamiento-bufer-grandstream-gsd3710
INCIBE-CERT
Vulnerabilidades de desbordamiento de búfer en Grandstream GSD3710
INCIBE ha coordinado la publicación de 2 vulnerabilidades en Grandstream GSD3710, con el código interno INCIBE-2022-0925, que han sido descubiertas por José Luis Verdeguer Navarro. A estas
Moodle corrige múltiples vulnerabilidades, ¡actualiza!
Fecha de publicación: 20/09/2022
Importancia: 4 - Alta
Recursos afectados:
Versiones de Moodle:
desde la versión 4.0 hasta la versión 4.0.3;
desde la versión 3.11 hasta la versión 3.11.9;
desde la versión 3.9 hasta la versión 3.9.16;
todas las versiones anteriores sin soporte.
Descripción:
La plataforma de formación Moodle ha publicado actualizaciones de seguridad que corrigen varias vulnerabilidades.
https://www.incibe.es/protege-tu-empresa/avisos-seguridad/moodle-corrige-multiples-vulnerabilidades-actualiza-0
Fecha de publicación: 20/09/2022
Importancia: 4 - Alta
Recursos afectados:
Versiones de Moodle:
desde la versión 4.0 hasta la versión 4.0.3;
desde la versión 3.11 hasta la versión 3.11.9;
desde la versión 3.9 hasta la versión 3.9.16;
todas las versiones anteriores sin soporte.
Descripción:
La plataforma de formación Moodle ha publicado actualizaciones de seguridad que corrigen varias vulnerabilidades.
https://www.incibe.es/protege-tu-empresa/avisos-seguridad/moodle-corrige-multiples-vulnerabilidades-actualiza-0
www.incibe.es
Moodle corrige múltiples vulnerabilidades, ¡actualiza!
La plataforma de formación Moodle ha publicado actualizaciones de seguridad que corrigen varias vulner
Critical Vulnerability in Oracle Cloud Infrastructure Allowed Unauthorized Access.
A new vulnerability in Oracle Cloud Infrastructure (OCI) would allow unauthorized access to cloud storage volumes of all users, hence violating cloud isolation.
https://www.infosecurity-magazine.com/news/flaw-in-oracle-cloud-unauthorized/
A new vulnerability in Oracle Cloud Infrastructure (OCI) would allow unauthorized access to cloud storage volumes of all users, hence violating cloud isolation.
https://www.infosecurity-magazine.com/news/flaw-in-oracle-cloud-unauthorized/
Infosecurity Magazine
Critical Vulnerability in Oracle Cloud Infrastructure Allowed Unauthorized Access
Potential attacks resulting from it may include privilege escalation and cross–tenant access
Vulnerabilidad de spoofing en Microsoft Endpoint Configuration Manager
Fecha de publicación: 22/09/2022
Importancia: Alta
Recursos afectados
Microsoft Endpoint Configuration Manager, versiones:
2103, 2107, 2111, 2203, 2207.
Descripción
El investigador, Brandon Colley, en colaboración con Trimarc Security, ha descubierto una vulnerabilidad de severidad alta en Microsoft Endpoint Configuration Manager, que ha sido publicada en un aviso fuera de ciclo por parte del fabricante. Un atacante podría aprovechar esta vulnerabilidad para obtener información sensible.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-spoofing-microsoft-endpoint-configuration-manager
Fecha de publicación: 22/09/2022
Importancia: Alta
Recursos afectados
Microsoft Endpoint Configuration Manager, versiones:
2103, 2107, 2111, 2203, 2207.
Descripción
El investigador, Brandon Colley, en colaboración con Trimarc Security, ha descubierto una vulnerabilidad de severidad alta en Microsoft Endpoint Configuration Manager, que ha sido publicada en un aviso fuera de ciclo por parte del fabricante. Un atacante podría aprovechar esta vulnerabilidad para obtener información sensible.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-spoofing-microsoft-endpoint-configuration-manager
www.incibe.es
Vulnerabilidad de spoofing en Microsoft Endpoint Configuration Manager
El investigador, Brandon Colley, en colaboración con Trimarc Security, ha descubierto una vulnerabilid
Cisco NX-OS Software Border Gateway Protocol Denial of Service Vulnerability
Advisory ID: cisco-sa-20180620-nxosbgp
First Published: 2018 June 20 16:00 GMT
Last Updated: 2022 September 22 20:15 GMT
Workarounds: No workarounds available
CVSS Score: Base 8.6
Summary:
A vulnerability in the Border Gateway Protocol (BGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the device unexpectedly reloading.
Version: 1.1
Description: CSCve87784 added for Nexus 7000 and 9000 platforms.
Section: Fixed Software
Status: Final
Date: 2022-SEP-22
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxosbgp
Advisory ID: cisco-sa-20180620-nxosbgp
First Published: 2018 June 20 16:00 GMT
Last Updated: 2022 September 22 20:15 GMT
Workarounds: No workarounds available
CVSS Score: Base 8.6
Summary:
A vulnerability in the Border Gateway Protocol (BGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the device unexpectedly reloading.
Version: 1.1
Description: CSCve87784 added for Nexus 7000 and 9000 platforms.
Section: Fixed Software
Status: Final
Date: 2022-SEP-22
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxosbgp
Cisco
Cisco Security Advisory: Cisco NX-OS Software Border Gateway Protocol Denial of Service Vulnerability
A vulnerability in the Border Gateway Protocol (BGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the device unexpectedly reloading.
The vulnerability is due to…
The vulnerability is due to…