.NET Framework Information Disclosure Vulnerability
CVE-2022-41064
Released: Nov 8, 2022
Last updated: Feb 1, 2023
v3.0
In the Security Updates table, added .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 installed on supported editions of Windows Server 2016 and Windows 10 version 1607 as these versions of Windows with .NET Framework AND 4.6.2/4.7/4.7.1/4.7.2 installed are affected by this vulnerability. Customers running these versions of .NET Framework should install the November 2022 security updates to be protected from this vulnerability.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41064
CVE-2022-41064
Released: Nov 8, 2022
Last updated: Feb 1, 2023
v3.0
In the Security Updates table, added .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 installed on supported editions of Windows Server 2016 and Windows 10 version 1607 as these versions of Windows with .NET Framework AND 4.6.2/4.7/4.7.1/4.7.2 installed are affected by this vulnerability. Customers running these versions of .NET Framework should install the November 2022 security updates to be protected from this vulnerability.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41064
Vulnerabilidad de inyección de comandos en Cisco IOx
Fecha de publicación: 02/02/2023
Identificador: INCIBE-2023-0036
Importancia: 4 - Alta
Recursos afectados:
La vulnerabilidad afecta a los siguientes productos de Cisco, siempre y cuando cuenten con la función Cisco IOx activada y no tengan soporte nativo de docker:
Dispositivos Cisco que cuenten con el software Cisco IOS XE.
Dispositivos Cisco que cuenten con una versión de software vulnerable:
800 Series Industrial ISRs;
Catalyst Access Points (COS-APs);
CGR1000 Compute Modules;
IC3000 Industrial Compute Gateways (versión de software inferior a la 1.2.1);
IR510 WPAN Industrial Routers.
Para más información acerca de las versiones concretas de software vulnerables, visitar el siguiente aviso.
Descripción:
Sam Quinn y Kasimir Schulz, del Centro de Investigación Avanzada de Trellix, han reportado una vulnerabilidad de severidad alta, que podría permitir a un atacante remoto, no autenticado, ejecutar comandos arbitrarios como root.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-inyeccion-comandos-cisco-iox
Fecha de publicación: 02/02/2023
Identificador: INCIBE-2023-0036
Importancia: 4 - Alta
Recursos afectados:
La vulnerabilidad afecta a los siguientes productos de Cisco, siempre y cuando cuenten con la función Cisco IOx activada y no tengan soporte nativo de docker:
Dispositivos Cisco que cuenten con el software Cisco IOS XE.
Dispositivos Cisco que cuenten con una versión de software vulnerable:
800 Series Industrial ISRs;
Catalyst Access Points (COS-APs);
CGR1000 Compute Modules;
IC3000 Industrial Compute Gateways (versión de software inferior a la 1.2.1);
IR510 WPAN Industrial Routers.
Para más información acerca de las versiones concretas de software vulnerables, visitar el siguiente aviso.
Descripción:
Sam Quinn y Kasimir Schulz, del Centro de Investigación Avanzada de Trellix, han reportado una vulnerabilidad de severidad alta, que podría permitir a un atacante remoto, no autenticado, ejecutar comandos arbitrarios como root.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-inyeccion-comandos-cisco-iox
INCIBE-CERT
Vulnerabilidad de inyección de comandos en Cisco IOx
Sam Quinn y Kasimir Schulz, del Centro de Investigación Avanzada de Trellix, han reportado una vulnerabilidad de severidad alta, que podría permitir a un atacante remoto, no autenticado, ejecutar
VMSA-2023-0003
CVSSv3 Range: 7.8
Issue Date: 2023-02-02
CVE(s): CVE-2023-20854
Synopsis:
VMware Workstation update addresses an arbitrary file deletion vulnerability (CVE-2023-20854)
Impacted Products
VMware Workstation
https://www.vmware.com/security/advisories/VMSA-2023-0003.html
CVSSv3 Range: 7.8
Issue Date: 2023-02-02
CVE(s): CVE-2023-20854
Synopsis:
VMware Workstation update addresses an arbitrary file deletion vulnerability (CVE-2023-20854)
Impacted Products
VMware Workstation
https://www.vmware.com/security/advisories/VMSA-2023-0003.html
Password-stealing “vulnerability” reported in KeePass – bug or feature?
It’s been a newsworthy few weeks for password managers – those handy utilities that help you come up with a different password for every website you use, and then to keep track of them all.
https://nakedsecurity.sophos.com/2023/02/01/password-stealing-vulnerability-reported-in-keypass-bug-or-feature/
It’s been a newsworthy few weeks for password managers – those handy utilities that help you come up with a different password for every website you use, and then to keep track of them all.
https://nakedsecurity.sophos.com/2023/02/01/password-stealing-vulnerability-reported-in-keypass-bug-or-feature/
Sophos News
Password-stealing “vulnerability” reported in KeePass – bug or feature?
Is it a vulnerability if someone with control over your account can mess with files that your account is allowed to access anyway?
New HeadCrab malware infects 1,200 Redis servers to mine Monero.
New stealthy malware designed to hunt down vulnerable Redis servers online has infected over a thousand of them since September 2021 to build a botnet that mines for Monero cryptocurrency.
https://www.bleepingcomputer.com/news/security/new-headcrab-malware-infects-1-200-redis-servers-to-mine-monero/
New stealthy malware designed to hunt down vulnerable Redis servers online has infected over a thousand of them since September 2021 to build a botnet that mines for Monero cryptocurrency.
https://www.bleepingcomputer.com/news/security/new-headcrab-malware-infects-1-200-redis-servers-to-mine-monero/
BleepingComputer
New HeadCrab malware infects 1,200 Redis servers to mine Monero
New stealthy malware designed to hunt down vulnerable Redis servers online has infected over a thousand of them since September 2021 to build a botnet that mines for Monero cryptocurrency.
GitHub code-signing certificates stolen (but will be revoked this week)
https://nakedsecurity.sophos.com/2023/01/31/github-code-signing-certificates-stolen-but-will-be-revoked-this-week/
https://nakedsecurity.sophos.com/2023/01/31/github-code-signing-certificates-stolen-but-will-be-revoked-this-week/
Naked Security
GitHub code-signing certificates stolen (but will be revoked this week)
There was a breach, so the bad news isn’t great, but the good news isn’t too bad…
Forwarded from Una al día
Vulnerabilidad zero-day en AWS Glue
https://unaaldia.hispasec.com/2023/02/vulnerabilidad-zero-day-en-aws-glue.html?utm_source=rss&utm_medium=rss&utm_campaign=vulnerabilidad-zero-day-en-aws-glue
https://unaaldia.hispasec.com/2023/02/vulnerabilidad-zero-day-en-aws-glue.html?utm_source=rss&utm_medium=rss&utm_campaign=vulnerabilidad-zero-day-en-aws-glue
Una al Día
Vulnerabilidad zero-day en AWS Glue
Una vulnerabilidad zero-day permitía a potenciales atacantes abusar del servicio AWS Glue para acceder a recursos de otros clientes.
Cisco Releases Security Advisories for Multiple Products
Cisco released security updates for vulnerabilities affecting multiple products. A remote attacker could exploit these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the Cisco Security Advisories page and apply the necessary updates.
https://www.cisa.gov/uscert/ncas/current-activity/2023/02/02/cisco-releases-security-advisories-multiple-products
Cisco released security updates for vulnerabilities affecting multiple products. A remote attacker could exploit these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the Cisco Security Advisories page and apply the necessary updates.
https://www.cisa.gov/uscert/ncas/current-activity/2023/02/02/cisco-releases-security-advisories-multiple-products
Apigee Edge - Moderately critical - Access bypass -
SA-CONTRIB-2023-005
Project: Apigee Edge
Date: 2023-February-01
Security risk:
Moderately critical 13∕25 AC:None/A:User/CI:Some/II:None/E:Theoretical/TD:All
Vulnerability: Access bypass
Description:
The Apigee Edge module allows connecting a Drupal site to Apigee X / Edge in order to build a developer portal.
Previous module versions did not support entity query level access checking, which could have led to information disclosure or access bypass in various places.
https://www.drupal.org/sa-contrib-2023-005
SA-CONTRIB-2023-005
Project: Apigee Edge
Date: 2023-February-01
Security risk:
Moderately critical 13∕25 AC:None/A:User/CI:Some/II:None/E:Theoretical/TD:All
Vulnerability: Access bypass
Description:
The Apigee Edge module allows connecting a Drupal site to Apigee X / Edge in order to build a developer portal.
Previous module versions did not support entity query level access checking, which could have led to information disclosure or access bypass in various places.
https://www.drupal.org/sa-contrib-2023-005
Drupal.org
Apigee Edge - Moderately critical - Access bypass - SA-CONTRIB-2023-005
The Apigee Edge module allows connecting a Drupal site to Apigee X / Edge in order to build a developer portal. Previous module versions did not support entity query level access checking which could have lead to information disclosure or access bypass in…
A HIGH-SEVERITY BUG IN F5 BIG-IP CAN LEAD TO CODE EXECUTION AND DOS
The flaw affects the following versions of BIG-IP:
F5 BIG-IP 17.0.0
F5 BIG-IP 16.1.2.2 – 16.1.3
F5 BIG-IP 15.1.5.1 – 15.1.8
F5 BIG-IP 14.1.4.6 – 14.1.5
F5 BIG-IP 13.1.5
“The most likely impact of a successful attack is to crash the server process. A skilled attacker could potentially develop a remote code execution exploit, which would run code on the F5 BIG-IP device as the root user.” continues Rapid7’s advisory.
https://securityaffairs.com/141728/security/f5-big-ip-bug.html
https://my.f5.com/manage/s/article/K000130415
The flaw affects the following versions of BIG-IP:
F5 BIG-IP 17.0.0
F5 BIG-IP 16.1.2.2 – 16.1.3
F5 BIG-IP 15.1.5.1 – 15.1.8
F5 BIG-IP 14.1.4.6 – 14.1.5
F5 BIG-IP 13.1.5
“The most likely impact of a successful attack is to crash the server process. A skilled attacker could potentially develop a remote code execution exploit, which would run code on the F5 BIG-IP device as the root user.” continues Rapid7’s advisory.
https://securityaffairs.com/141728/security/f5-big-ip-bug.html
https://my.f5.com/manage/s/article/K000130415
Security Affairs
High-severity bug in F5 BIG-IP can lead to code execution and DoS
Experts warn of a high-severity vulnerability that affects F5 BIG-IP that can lead to arbitrary code execution or DoS condition.
Fallo de autenticación en productos Jira de Atlassian
Fecha de publicación: 03/02/2023
Identificador: INCIBE-2023-0039
Importancia: 5 - Crítica
Descripción:
Atlassian ha notificado una vulnerabilidad crítica de fallo de autenticación en Jira Service Management Server y Data Center, que podría permitir a un atacante suplantar a otro usuario y obtener acceso a una instancia de Jira Service Management.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/fallo-autenticacion-productos-jira-atlassian
Fecha de publicación: 03/02/2023
Identificador: INCIBE-2023-0039
Importancia: 5 - Crítica
Descripción:
Atlassian ha notificado una vulnerabilidad crítica de fallo de autenticación en Jira Service Management Server y Data Center, que podría permitir a un atacante suplantar a otro usuario y obtener acceso a una instancia de Jira Service Management.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/fallo-autenticacion-productos-jira-atlassian
INCIBE-CERT
Fallo de autenticación en productos Jira de Atlassian
Atlassian ha notificado una vulnerabilidad crítica de fallo de autenticación en Jira Service Management Server y Data Center, que podría permitir a un atacante suplantar a otro usuario y obtener
OpenSSH fixes double-free memory bug that’s pokable over the network.
The open source operating system distribution OpenBSD is well-known amongst sysadmins, especially those who manage servers, for its focus on security over speed, features and fancy front-ends.
https://nakedsecurity.sophos.com/2023/02/03/openssh-fixes-double-free-memory-bug-thats-pokable-over-the-network/
The open source operating system distribution OpenBSD is well-known amongst sysadmins, especially those who manage servers, for its focus on security over speed, features and fancy front-ends.
https://nakedsecurity.sophos.com/2023/02/03/openssh-fixes-double-free-memory-bug-thats-pokable-over-the-network/
Naked Security
OpenSSH fixes double-free memory bug that’s pokable over the network
It’s a bug fix for a bug fix. A memory leak was turned into a double-free that has now been turned into correct code…
Vulnerabilidad 0day en un plugin de Prestashop
Fecha de publicación: 06/02/2023
Importancia: 3 - Media
Recursos afectados:
Plugin M4 PDF para sitios web Prestashop, versiones 3.2.3 y anteriores.
Descripción:
Se han detectado dos vulnerabilidades de tipo 0day, una de criticidad media y otra de criticidad baja, que afectan al Plugin M4 PDF para sitios web Prestashop.
https://www.incibe.es/protege-tu-empresa/avisos-seguridad/vulnerabilidad-0day-plugin-prestashop
Fecha de publicación: 06/02/2023
Importancia: 3 - Media
Recursos afectados:
Plugin M4 PDF para sitios web Prestashop, versiones 3.2.3 y anteriores.
Descripción:
Se han detectado dos vulnerabilidades de tipo 0day, una de criticidad media y otra de criticidad baja, que afectan al Plugin M4 PDF para sitios web Prestashop.
https://www.incibe.es/protege-tu-empresa/avisos-seguridad/vulnerabilidad-0day-plugin-prestashop
www.incibe.es
Vulnerabilidad 0day Plugin Prestashop | Empresas | INCIBE
Se han detectado dos vulnerabilidades de tipo 0day, una de criticidad media y otra de criticidad baja,
Boletín de seguridad de Android de febrero de 2023
Fecha de publicación: 07/02/2023
Identificador: INCIBE-2023-0043
Importancia: Crítica
Recursos afectados:
Android Open Source Project (AOSP): versiones 10, 11, 12, 12L y 13.
Componentes:
framework,
media framework,
system,
sistema de actualizaciones de Google Play,
kernel,
MediaTek,
Unisoc,
Qualcomm (incluidos closed-source).
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/boletin-seguridad-android-febrero-2023
Fecha de publicación: 07/02/2023
Identificador: INCIBE-2023-0043
Importancia: Crítica
Recursos afectados:
Android Open Source Project (AOSP): versiones 10, 11, 12, 12L y 13.
Componentes:
framework,
media framework,
system,
sistema de actualizaciones de Google Play,
kernel,
MediaTek,
Unisoc,
Qualcomm (incluidos closed-source).
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/boletin-seguridad-android-febrero-2023
www.incibe.es
Boletin Seguridad Android Febrero 2023 | INCIBE-CERT | INCIBE
El boletín de Android, relativo a febrero de 2023, soluciona múltiples vulnerabilidades de severidad c
Múltiples vulnerabilidades en OpenSSL
Fecha de publicación: 08/02/2023
Identificador: INCIBE-2023-0044
Importancia: 4 - Alta
Recursos afectados:
OpenSSL, versiones:
desde 3.0 hasta 3.0.7;
1.1.1;
1.0.2.
Descripción:
OpenSSL ha publicado un aviso que recoge 8 vulnerabilidades: 1 de severidad alta y 7 de severidad media, cuya explotación podría permitir a un atacante leer el contenido de la memoria, provocar una denegación de servicio, descifrar los datos de la aplicación enviados a través de una conexión o provocar un fallo en la aplicación.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-openssl-4
Fecha de publicación: 08/02/2023
Identificador: INCIBE-2023-0044
Importancia: 4 - Alta
Recursos afectados:
OpenSSL, versiones:
desde 3.0 hasta 3.0.7;
1.1.1;
1.0.2.
Descripción:
OpenSSL ha publicado un aviso que recoge 8 vulnerabilidades: 1 de severidad alta y 7 de severidad media, cuya explotación podría permitir a un atacante leer el contenido de la memoria, provocar una denegación de servicio, descifrar los datos de la aplicación enviados a través de una conexión o provocar un fallo en la aplicación.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-openssl-4
CISA Releases ESXiArgs Ransomware Recovery Script
Original release date: February 07, 2023
CISA has released a recovery script for organizations that have fallen victim to ESXiArgs ransomware. The ESXiArgs ransomware encrypts configuration files on vulnerable ESXi servers, potentially rendering virtual machines (VMs) unusable.
CISA recommends organizations impacted by ESXiArgs evaluate the script and guidance provided in the accompanying README file to determine if it is fit for attempting to recover access to files in their environment.
https://www.cisa.gov/uscert/ncas/current-activity/2023/02/07/cisa-releases-esxiargs-ransomware-recovery-script
Organizations can access the recovery script here:
https://github.com/cisagov/ESXiArgs-Recover
Original release date: February 07, 2023
CISA has released a recovery script for organizations that have fallen victim to ESXiArgs ransomware. The ESXiArgs ransomware encrypts configuration files on vulnerable ESXi servers, potentially rendering virtual machines (VMs) unusable.
CISA recommends organizations impacted by ESXiArgs evaluate the script and guidance provided in the accompanying README file to determine if it is fit for attempting to recover access to files in their environment.
https://www.cisa.gov/uscert/ncas/current-activity/2023/02/07/cisa-releases-esxiargs-ransomware-recovery-script
Organizations can access the recovery script here:
https://github.com/cisagov/ESXiArgs-Recover
www.cisa.gov
CISA Releases ESXiArgs Ransomware Recovery Script | CISA
CISA has released a recovery script for organizations that have fallen victim to ESXiArgs ransomware. The ESXiArgs ransomware encrypts configuration files on vulnerable ESXi servers, potentially rendering virtual machines (VMs) unusable. CISA recommends organizations…
OpenSSL Releases Security Advisory
OpenSSL has released a security advisory to address multiple vulnerabilities affecting OpenSSL versions 3.0.0, 2.2.2, and 1.0.2. An attacker could exploit some of these vulnerabilities to obtain sensitive information.
CISA encourages users and administrators to review the OpenSSL advisory and make the necessary updates.
https://www.cisa.gov/uscert/ncas/current-activity/2023/02/09/openssl-releases-security-advisory
https://www.openssl.org/news/secadv/20230207.txt
OpenSSL has released a security advisory to address multiple vulnerabilities affecting OpenSSL versions 3.0.0, 2.2.2, and 1.0.2. An attacker could exploit some of these vulnerabilities to obtain sensitive information.
CISA encourages users and administrators to review the OpenSSL advisory and make the necessary updates.
https://www.cisa.gov/uscert/ncas/current-activity/2023/02/09/openssl-releases-security-advisory
https://www.openssl.org/news/secadv/20230207.txt
www.cisa.gov
OpenSSL Releases Security Advisory | CISA
OpenSSL has released a security advisory to address multiple vulnerabilities affecting OpenSSL versions 3.0.0, 2.2.2, and 1.0.2. An attacker could exploit some of these vulnerabilities to obtain sensitive information. CISA encourages users and administrators…
Microsoft Releases February 2023 Security Updates
https://msrc.microsoft.com/update-guide/releaseNote/2023-Feb
https://msrc.microsoft.com/update-guide/releaseNote/2023-Feb
Apple Releases Security Updates for Multiple Products
Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit these vulnerabilities to take control of an affected device.
CISA encourages users and administrators to review the Apple security updates page for the following products and apply the necessary updates as soon as possible:
• Safari 16.3.1
• iOS 16.3.1 and iPadOS 16.3.1
• macOS 13.2.1
https://www.cisa.gov/uscert/ncas/current-activity/2023/02/14/apple-releases-security-updates-multiple-products
Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit these vulnerabilities to take control of an affected device.
CISA encourages users and administrators to review the Apple security updates page for the following products and apply the necessary updates as soon as possible:
• Safari 16.3.1
• iOS 16.3.1 and iPadOS 16.3.1
• macOS 13.2.1
https://www.cisa.gov/uscert/ncas/current-activity/2023/02/14/apple-releases-security-updates-multiple-products
www.cisa.gov
Apple Releases Security Updates for Multiple Products | CISA
Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit these vulnerabilities to take control of an affected device. CISA encourages users and administrators to review the Apple security updates page…
Citrix Releases Security Updates for Workspace Apps, Virtual Apps and Desktops
https://www.cisa.gov/uscert/ncas/current-activity/2023/02/14/citrix-releases-security-updates-workspace-apps-virtual-apps-and
https://www.cisa.gov/uscert/ncas/current-activity/2023/02/14/citrix-releases-security-updates-workspace-apps-virtual-apps-and
Adobe Releases Security Updates for Multiple Products
https://www.cisa.gov/uscert/ncas/current-activity/2023/02/14/adobe-releases-security-updates-multiple-products
https://www.cisa.gov/uscert/ncas/current-activity/2023/02/14/adobe-releases-security-updates-multiple-products
www.cisa.gov
Adobe Releases Security Updates for Multiple Products | CISA
Adobe has released security updates to address multiple vulnerabilities in Adobe software. An attacker can exploit these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the following Adobe Security…