SysAdmin 24x7
Apple Fixes Exploited Zero-Day With iOS 16.1 Patch Apple on Monday shipped a major iOS update with fixes at least 20 documented security defects, including a kernel flaw that’s already being actively exploited in the wild. https://www.securityweek.com/apple…
Apple Releases Security Updates for Multiple Products
https://www.cisa.gov/uscert/ncas/current-activity/2022/10/26/apple-releases-security-updates-multiple-products
https://www.cisa.gov/uscert/ncas/current-activity/2022/10/26/apple-releases-security-updates-multiple-products
www.cisa.gov
Apple Releases Security Updates for Multiple Products | CISA
Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected device. CISA encourages users and administrators to review the Apple security updates page…
Múltiples vulnerabilidades en productos Aruba
Fecha de publicación: 26/10/2022
Identificador: INCIBE-2022-0991
Importancia: 5 - Crítica
Descripción:
Se han identificado 16 vulnerabilidades, una de ellas de severidad crítica, que afectan a productos Aruba (subsidiaria de HP), cuya explotación podría permitir a un atacante inyectar código, ejecutar código arbitrario de forma remota, modificar la secuencia de arranque, eliminar archivos arbitrarios, causar una condición de denegación de servicio, divulgar información sensible, desbordar el búfer o lectura de archivos arbitrarios.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-productos-aruba-0
Fecha de publicación: 26/10/2022
Identificador: INCIBE-2022-0991
Importancia: 5 - Crítica
Descripción:
Se han identificado 16 vulnerabilidades, una de ellas de severidad crítica, que afectan a productos Aruba (subsidiaria de HP), cuya explotación podría permitir a un atacante inyectar código, ejecutar código arbitrario de forma remota, modificar la secuencia de arranque, eliminar archivos arbitrarios, causar una condición de denegación de servicio, divulgar información sensible, desbordar el búfer o lectura de archivos arbitrarios.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-productos-aruba-0
INCIBE-CERT
Múltiples vulnerabilidades en productos Aruba
Se han identificado 16 vulnerabilidades, una de ellas de severidad crítica, que afectan a productos Aruba (subsidiaria de HP), cuya explotación podría permitir a un atacante inyectar código, ejecutar
Vulnerabilidad en Cisco AnyConnect Secure Mobility Client para Windows
Fecha de publicación: 27/10/2022
Importancia: 4 - Alta
Recursos afectados:
Cisco AnyConnect Secure Mobility Client para Windows, versiones anteriores a 4.9.00086.
Descripción:
Cisco ha corregido una vulnerabilidad de severidad alta en el canal de comunicación entre procesos (IPC) de Cisco AnyConnect Secure Mobility Client para Windows.
https://www.incibe.es/protege-tu-empresa/avisos-seguridad/vulnerabilidad-cisco-anyconnect-secure-mobility-client-windows
Fecha de publicación: 27/10/2022
Importancia: 4 - Alta
Recursos afectados:
Cisco AnyConnect Secure Mobility Client para Windows, versiones anteriores a 4.9.00086.
Descripción:
Cisco ha corregido una vulnerabilidad de severidad alta en el canal de comunicación entre procesos (IPC) de Cisco AnyConnect Secure Mobility Client para Windows.
https://www.incibe.es/protege-tu-empresa/avisos-seguridad/vulnerabilidad-cisco-anyconnect-secure-mobility-client-windows
www.incibe.es
Vulnerabilidad en Cisco AnyConnect Secure Mobility Client para Windows
Cisco ha corregido una vulnerabilidad de severidad alta en el canal de comunicación entre procesos (IP
OpenSSL to Patch First Critical Vulnerability Since 2016.
The OpenSSL Project has informed users that an upcoming update will patch a critical vulnerability in the open source cryptography and secure communication toolkit.
OpenSSL version 3.0.7 is scheduled for Tuesday, November 1, between 13:00 and 17:00 UTC. No details have been provided, but it has been described as a ‘security-fix release’ that will include a patch for a vulnerability rated ‘critical’.
The issue does not appear to impact OpenSSL versions prior to 3.0.
https://www.securityweek.com/openssl-patch-first-critical-vulnerability-2016
The OpenSSL Project has informed users that an upcoming update will patch a critical vulnerability in the open source cryptography and secure communication toolkit.
OpenSSL version 3.0.7 is scheduled for Tuesday, November 1, between 13:00 and 17:00 UTC. No details have been provided, but it has been described as a ‘security-fix release’ that will include a patch for a vulnerability rated ‘critical’.
The issue does not appear to impact OpenSSL versions prior to 3.0.
https://www.securityweek.com/openssl-patch-first-critical-vulnerability-2016
Securityweek
OpenSSL to Patch First Critical Vulnerability Since 2016 | SecurityWeek.Com
On November 1, 2022, OpenSSL will release an update that will patch a critical vulnerability, the first since 2016.
Windows 10 KB5018482 update released with nineteen improvements.
Microsoft has released the optional KB5018482 Preview cumulative update for Windows 10 20H2, Windows 10 21H1, and Windows 10 21H2.
This update includes nineteen bug fixes and enhancements, including a fix for graphics issues in Direct3D 9 games and a bug that caused OS upgrades to fail.
The KB5018482 cumulative update preview is part of Microsoft's October 2022 monthly "C" update, allowing admins to test fixes coming in the November 2022 Patch Tuesday.
https://www.bleepingcomputer.com/news/microsoft/windows-10-kb5018482-update-released-with-nineteen-improvements/
Microsoft has released the optional KB5018482 Preview cumulative update for Windows 10 20H2, Windows 10 21H1, and Windows 10 21H2.
This update includes nineteen bug fixes and enhancements, including a fix for graphics issues in Direct3D 9 games and a bug that caused OS upgrades to fail.
The KB5018482 cumulative update preview is part of Microsoft's October 2022 monthly "C" update, allowing admins to test fixes coming in the November 2022 Patch Tuesday.
https://www.bleepingcomputer.com/news/microsoft/windows-10-kb5018482-update-released-with-nineteen-improvements/
BleepingComputer
Windows 10 KB5018482 update released with nineteen improvements
Microsoft has released the optional KB5018482 Preview cumulative update for Windows 10 20H2, Windows 10 21H1, and Windows 10 21H2.
Jira Align flaws enabled malicious users to gain super admin privileges – and potentially worse.
Lateral or upwards movement beyond the instance was theoretically possible, concludes researcher
A pair of vulnerabilities patched in Jira Align could in the “worst-case scenario” be combined by low-privileged malicious users to target Atlassian’s cloud infrastructure, a security researcher warns.
Jira Align is a software-as-a-service (SaaS) platform through which enterprises can scale their deployments of Atlassian Jira, the hugely popular bug tracking and project management application, in the cloud.
https://portswigger.net/daily-swig/jira-align-flaws-enabled-malicious-users-to-gain-super-admin-privileges-and-potentially-worse
Lateral or upwards movement beyond the instance was theoretically possible, concludes researcher
A pair of vulnerabilities patched in Jira Align could in the “worst-case scenario” be combined by low-privileged malicious users to target Atlassian’s cloud infrastructure, a security researcher warns.
Jira Align is a software-as-a-service (SaaS) platform through which enterprises can scale their deployments of Atlassian Jira, the hugely popular bug tracking and project management application, in the cloud.
https://portswigger.net/daily-swig/jira-align-flaws-enabled-malicious-users-to-gain-super-admin-privileges-and-potentially-worse
The Daily Swig | Cybersecurity news and views
Jira Align flaws enabled malicious users to gain super admin privileges
Super admins can, among other things, modify Jira connections, reset user accounts, and modify security settings
SysAdmin 24x7
VMSA-2022-0027 CVSSv3 Range: 5.3-9.8 Issue Date: 2022-10-25 Updated On:2022-10-25 (Initial Advisory) CVE(s): CVE-2021-39144, CVE-2022-31678 Synopsis: VMware Cloud Foundation updates address multiple vulnerabilities. Description VMware Cloud Foundation contains…
VMSA-2022-0027.1
CVSSv3 Range: 5.3-9.8
Issue Date: 2022-10-25
Updated On: 2022-10-27
CVE(s): CVE-2021-39144, CVE-2022-31678
Synopsis:
VMware Cloud Foundation updates address multiple vulnerabilities.
Impacted Products
VMware Cloud Foundation (Cloud Foundation)
https://www.vmware.com/security/advisories/VMSA-2022-0027.html
CVSSv3 Range: 5.3-9.8
Issue Date: 2022-10-25
Updated On: 2022-10-27
CVE(s): CVE-2021-39144, CVE-2022-31678
Synopsis:
VMware Cloud Foundation updates address multiple vulnerabilities.
Impacted Products
VMware Cloud Foundation (Cloud Foundation)
https://www.vmware.com/security/advisories/VMSA-2022-0027.html
Microsoft: Windows domain joins may fail after October updates
Microsoft says Windows domain join processes may fail with "0xaac (2732)" errors after applying this month's security updates.
The issue stems from hardening changes introduced when addressing the CVE-2022-38042 elevation of privilege vulnerability in the Active Directory Domain Services that would allow attackers to gain domain administrator privileges.
https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-domain-joins-may-fail-after-october-updates/
Microsoft says Windows domain join processes may fail with "0xaac (2732)" errors after applying this month's security updates.
The issue stems from hardening changes introduced when addressing the CVE-2022-38042 elevation of privilege vulnerability in the Active Directory Domain Services that would allow attackers to gain domain administrator privileges.
https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-domain-joins-may-fail-after-october-updates/
BleepingComputer
Microsoft: Windows domain joins may fail after October updates
Microsoft says that Windows domain join processes may fail with "0xaac (2732)" errors after applying this month's security updates.
cisco-sa-sdwan-privesc-cli-xkGwmqKu
First Published:2022 September 28 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvz46392 CVE-2022-20930 CWE-88
CVSS Score: Base 6.7
Vulnerable Products
At the time of publication, this vulnerability affected the following Cisco products:
SD-WAN vBond Orchestrator Software
SD-WAN vEdge Routers
SD-WAN vManage Software
SD-WAN vSmart Controller Software
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-cli-xkGwmqKu
First Published:2022 September 28 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvz46392 CVE-2022-20930 CWE-88
CVSS Score: Base 6.7
Vulnerable Products
At the time of publication, this vulnerability affected the following Cisco products:
SD-WAN vBond Orchestrator Software
SD-WAN vEdge Routers
SD-WAN vManage Software
SD-WAN vSmart Controller Software
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-cli-xkGwmqKu
Cisco
Cisco Security Advisory: Cisco SD-WAN Software Arbitrary File Corruption Vulnerability
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite and possibly corrupt files on an affected system.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability…
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability…
open-vm-tools: Local Privilege Escalation
GLSA 202210-27
A vulnerability has been discovered in open-vm-tools which could allow for local privilege escalation.
Affected packages
Package app-emulation/open-vm-tools on all architectures
Affected versions < 12.1.0
Unaffected versions >= 12.1.0
Impact
An unprivileged guest user could achieve root privileges within the guest.
https://security.gentoo.org/glsa/202210-27
GLSA 202210-27
A vulnerability has been discovered in open-vm-tools which could allow for local privilege escalation.
Affected packages
Package app-emulation/open-vm-tools on all architectures
Affected versions < 12.1.0
Unaffected versions >= 12.1.0
Impact
An unprivileged guest user could achieve root privileges within the guest.
https://security.gentoo.org/glsa/202210-27
security.gentoo.org
open-vm-tools: Local Privilege Escalation (GLSA 202210-27) — Gentoo security
A vulnerability has been discovered in open-vm-tools which could allow for local privilege escalation.
VMSA-2021-0021.1
CVSSv3 Range:2.7
Issue Date: 2021-10-12
Updated On: 2022-10-31
CVE(s): CVE-2021-22033
Synopsis:
VMware vRealize Operations update addresses SSRF Vulnerability (CVE-2021-22033)
Impacted Products
VMware vRealize Operations
VMware Cloud Foundation
vRealize Suite Lifecycle Manager
https://www.vmware.com/security/advisories/VMSA-2021-0021.html
CVSSv3 Range:2.7
Issue Date: 2021-10-12
Updated On: 2022-10-31
CVE(s): CVE-2021-22033
Synopsis:
VMware vRealize Operations update addresses SSRF Vulnerability (CVE-2021-22033)
Impacted Products
VMware vRealize Operations
VMware Cloud Foundation
vRealize Suite Lifecycle Manager
https://www.vmware.com/security/advisories/VMSA-2021-0021.html
SysAdmin 24x7
2022 OpenSSL vulnerability https://github.com/NCSC-NL/OpenSSL-2022
OpenSSL Releases Security Update
OpenSSL has released a security advisory to address two vulnerabilities, CVE-2022-3602 and CVE-2022-3786, affecting OpenSSL versions 3.0.0 through 3.0.6.
Both CVE-2022-3602 and CVE-2022-3786 can cause a denial of service. According to OpenSSL, a cyber threat actor leveraging CVE-2022-3786, "can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution," allowing them to take control of an affected system.
CISA encourages users and administrators to review the OpenSSL advisory, blog, OpenSSL 3.0.7 announcement, and upgrade to OpenSSL 3.0.7. For additional information on affected products, see the 2022 OpenSSL vulnerability - CVE-2022-3602 GitHub repository, jointly maintained by the Netherland's National Cyber Security Centrum (NCSC-NL) and CISA.
https://www.cisa.gov/uscert/ncas/current-activity/2022/11/01/openssl-releases-security-update
OpenSSL has released a security advisory to address two vulnerabilities, CVE-2022-3602 and CVE-2022-3786, affecting OpenSSL versions 3.0.0 through 3.0.6.
Both CVE-2022-3602 and CVE-2022-3786 can cause a denial of service. According to OpenSSL, a cyber threat actor leveraging CVE-2022-3786, "can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution," allowing them to take control of an affected system.
CISA encourages users and administrators to review the OpenSSL advisory, blog, OpenSSL 3.0.7 announcement, and upgrade to OpenSSL 3.0.7. For additional information on affected products, see the 2022 OpenSSL vulnerability - CVE-2022-3602 GitHub repository, jointly maintained by the Netherland's National Cyber Security Centrum (NCSC-NL) and CISA.
https://www.cisa.gov/uscert/ncas/current-activity/2022/11/01/openssl-releases-security-update
www.cisa.gov
OpenSSL Releases Security Update | CISA
OpenSSL has released a security advisory to address two vulnerabilities, CVE-2022-3602 and CVE-2022-3786, affecting OpenSSL versions 3.0.0 through 3.0.6. Both CVE-2022-3602 and CVE-2022-3786 can cause a denial of service. According to OpenSSL, a cyber threat…
Inyección de comandos en InfoSphere de IBM
Fecha de publicación: 03/11/2022
Identificador: INCIBE-2022-0998
Importancia: 5 - Crítica
Recursos afectados:
InfoSphere Information Server, versión 11.7.
Descripción:
IBM ha corregido una vulnerabilidad de inyección de comandos en IBM InfoSphere DataStage de severidad crítica.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/inyeccion-comandos-infosphere-ibm
Fecha de publicación: 03/11/2022
Identificador: INCIBE-2022-0998
Importancia: 5 - Crítica
Recursos afectados:
InfoSphere Information Server, versión 11.7.
Descripción:
IBM ha corregido una vulnerabilidad de inyección de comandos en IBM InfoSphere DataStage de severidad crítica.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/inyeccion-comandos-infosphere-ibm
INCIBE-CERT
[Actualización 17/11/2022] Inyección de comandos en InfoSphere de IBM
IBM ha corregido una vulnerabilidad de inyección de comandos en IBM InfoSphere DataStage de severidad crítica.
Apple Releases Security Update for Xcode
Apple has released a security update to address vulnerabilities in Xcode. A remote attacker could exploit one of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Apple security page for Xcode 14.1 and apply the necessary update.
https://www.cisa.gov/uscert/ncas/current-activity/2022/11/03/apple-releases-security-update-xcode
Apple has released a security update to address vulnerabilities in Xcode. A remote attacker could exploit one of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Apple security page for Xcode 14.1 and apply the necessary update.
https://www.cisa.gov/uscert/ncas/current-activity/2022/11/03/apple-releases-security-update-xcode
www.cisa.gov
Apple Releases Security Update for Xcode | CISA
Apple has released a security update to address vulnerabilities in Xcode. A remote attacker could exploit one of these vulnerabilities to take control of an affected system. The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and…
Cisco Releases Security Updates for Multiple Products
Cisco has released security updates for vulnerabilities affecting multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security Advisories page.
CISA encourages users and administrators to review the advisories and apply the necessary updates.
https://www.cisa.gov/uscert/ncas/current-activity/2022/11/03/cisco-releases-security-updates-multiple-products
Cisco has released security updates for vulnerabilities affecting multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security Advisories page.
CISA encourages users and administrators to review the advisories and apply the necessary updates.
https://www.cisa.gov/uscert/ncas/current-activity/2022/11/03/cisco-releases-security-updates-multiple-products
www.cisa.gov
Cisco Releases Security Updates for Multiple Products | CISA
Cisco has released security updates for vulnerabilities affecting multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco…
Múltiples vulnerabilidades de seguridad en productos Netgear
Fecha de publicación: 08/11/2022
Identificador: INCIBE-2022-1005
Importancia: 5 - Crítica
Descripción:
NETGEAR ha publicado correcciones para una vulnerabilidad de seguridad crítica en algunos de sus productos.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-seguridad-productos-netgear
Fecha de publicación: 08/11/2022
Identificador: INCIBE-2022-1005
Importancia: 5 - Crítica
Descripción:
NETGEAR ha publicado correcciones para una vulnerabilidad de seguridad crítica en algunos de sus productos.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-seguridad-productos-netgear
INCIBE-CERT
Múltiples vulnerabilidades de seguridad en productos Netgear
NETGEAR ha publicado correcciones para una vulnerabilidad de seguridad crítica en algunos de sus productos.
Multiple race conditions due to TOCTOU flaws in various UEFI Implementations
Vulnerability Note VU#434994
Original Release Date: 2022-11-08
Last Revised: 2022-11-08
https://kb.cert.org/vuls/id/434994
Vulnerability Note VU#434994
Original Release Date: 2022-11-08
Last Revised: 2022-11-08
https://kb.cert.org/vuls/id/434994
kb.cert.org
CERT/CC Vulnerability Note VU#434994
Multiple race conditions due to TOCTOU flaws in various UEFI Implementations
VMSA-2022-0028
CVSSv3 Range: 4.2-9.8
Issue Date: 2022-11-08
CVE(s):
CVE-2022-31685, CVE-2022-31686, CVE-2022-31687, CVE-2022-31688, CVE-2022-31689
Synopsis:
VMware Workspace ONE Assist update addresses multiple vulnerabilities.
https://www.vmware.com/security/advisories/VMSA-2022-0028.html
CVSSv3 Range: 4.2-9.8
Issue Date: 2022-11-08
CVE(s):
CVE-2022-31685, CVE-2022-31686, CVE-2022-31687, CVE-2022-31688, CVE-2022-31689
Synopsis:
VMware Workspace ONE Assist update addresses multiple vulnerabilities.
https://www.vmware.com/security/advisories/VMSA-2022-0028.html
Vulnerabilidad del sistema de backup de Veeam para Google Cloud
Fecha de publicación: 09/11/2022
Importancia: 5 - Crítica
Recursos afectados:
Backup Appliance de Veeam Backup para Google Cloud, versiones 1 y 3.
Descripción:
Veeam ha corregido una vulnerabilidad de severidad crítica en el componente Backup Appliance de Veeam Backup para Google Cloud.
https://www.incibe.es/protege-tu-empresa/avisos-seguridad/vulnerabilidad-del-sistema-backup-veeam-google-cloud
Fecha de publicación: 09/11/2022
Importancia: 5 - Crítica
Recursos afectados:
Backup Appliance de Veeam Backup para Google Cloud, versiones 1 y 3.
Descripción:
Veeam ha corregido una vulnerabilidad de severidad crítica en el componente Backup Appliance de Veeam Backup para Google Cloud.
https://www.incibe.es/protege-tu-empresa/avisos-seguridad/vulnerabilidad-del-sistema-backup-veeam-google-cloud
www.incibe.es
Vulnerabilidad del sistema de backup de Veeam para Google Cloud
Veeam ha corregido una vulnerabilidad de severidad crítica en el componente Backup Appliance de Veeam