Microsoft Teams vulnerability discovered to bypass file sending restrictions
A newly discovered vulnerability in Microsoft Teams allows attackers to push malware onto the devices of other Microsoft Teams users, even if they are considered external.
IT security researchers at Jumpsec have discovered a new vulnerability in Microsoft Teams. The vulnerability may be exploited to bypass traditional security protections, e.g., against phishing or malware, to push malicious files to the devices of Microsoft Teams users.
https://www.ghacks.net/2023/06/26/microsoft-teams-vulnerability-discovered-to-bypass-file-sending-restrictions/
A newly discovered vulnerability in Microsoft Teams allows attackers to push malware onto the devices of other Microsoft Teams users, even if they are considered external.
IT security researchers at Jumpsec have discovered a new vulnerability in Microsoft Teams. The vulnerability may be exploited to bypass traditional security protections, e.g., against phishing or malware, to push malicious files to the devices of Microsoft Teams users.
https://www.ghacks.net/2023/06/26/microsoft-teams-vulnerability-discovered-to-bypass-file-sending-restrictions/
ghacks.net
Microsoft Teams vulnerability discovered to bypass file sending restrictions
A newly discovered vulnerability in Microsoft Teams allows attackers to push malware onto the devices of other Microsoft Teams users.
CVE-2023-26258 – Remote Code Execution in ArcServe UDP Backup
https://www.mdsec.co.uk/2023/06/cve-2023-26258-remote-code-execution-in-arcserve-udp-backup/
https://www.mdsec.co.uk/2023/06/cve-2023-26258-remote-code-execution-in-arcserve-udp-backup/
MDSec
CVE-2023-26258 - Remote Code Execution in ArcServe UDP Backup - MDSec
Overview During a recent adversary simulation, the MDSec ActiveBreach red team were performing a ransomware scenario, with a key objective set on compromising the organisation’s backup infrastructure. As part of...
Sage soluciona una vulnerabilidad que afecta al uso de credenciales
Fecha 04/07/2023
Importancia 4 - Alta
Recursos Afectados
Sage 200 versión 2023.38.001.
Descripción
INCIBE ha coordinado la publicación de una vulnerabilidad de tipo 0day que afecta a Sage 200, una solución ERP de gestión de negocio para pequeñas y medianas empresas.
Solución
Se recomienda actualizar a la versión 2023.75, que soluciona la vulnerabilidad descrita en este aviso.
http://www.incibe.es/empresas/avisos/sage-soluciona-una-vulnerabilidad-que-afecta-al-uso-de-credenciales
Fecha 04/07/2023
Importancia 4 - Alta
Recursos Afectados
Sage 200 versión 2023.38.001.
Descripción
INCIBE ha coordinado la publicación de una vulnerabilidad de tipo 0day que afecta a Sage 200, una solución ERP de gestión de negocio para pequeñas y medianas empresas.
Solución
Se recomienda actualizar a la versión 2023.75, que soluciona la vulnerabilidad descrita en este aviso.
http://www.incibe.es/empresas/avisos/sage-soluciona-una-vulnerabilidad-que-afecta-al-uso-de-credenciales
www.incibe.es
Sage Soluciona Una Vulnerabilidad Que Afecta Al Uso De Credenciales | Empresas | INCIBE
INCIBE ha coordinado la publicación de una vulnerabilidad de tipo 0day que afecta a Sage 200, una solu
Microsoft denies data breach, theft of 30 million customer accounts
Microsoft has denied the claims of the so-called hacktivists “Anonymous Sudan” that they breached the company's servers and stole credentials for 30 million customer accounts.
Anonymous Sudan is known for debilitating distributed denial-of-service (DDoS) attacks against Western entities in recent months. The group has confirmed their affiliation with pro-Russian hacktivists like Killnet.
Last month, Microsoft admitted that Anonymous Sudan was responsible for service disruptions and outages at the beginning of June that impacting several of its services, including Azure, Outlook, and OneDrive.
https://www.bleepingcomputer.com/news/security/microsoft-denies-data-breach-theft-of-30-million-customer-accounts/
Microsoft has denied the claims of the so-called hacktivists “Anonymous Sudan” that they breached the company's servers and stole credentials for 30 million customer accounts.
Anonymous Sudan is known for debilitating distributed denial-of-service (DDoS) attacks against Western entities in recent months. The group has confirmed their affiliation with pro-Russian hacktivists like Killnet.
Last month, Microsoft admitted that Anonymous Sudan was responsible for service disruptions and outages at the beginning of June that impacting several of its services, including Azure, Outlook, and OneDrive.
https://www.bleepingcomputer.com/news/security/microsoft-denies-data-breach-theft-of-30-million-customer-accounts/
BleepingComputer
Microsoft denies data breach, theft of 30 million customer accounts
Microsoft has denied the claims of the so-called hacktivists "Anonymous Sudan" that they breached the company's servers and stole credentials for 30 million customer accounts.
WordPress plugin lets users become admins – Patch early, patch often!
If you run a WordPress site with the Ultimate Members plugin installed, make sure you’ve updated it to the latest version.
https://nakedsecurity.sophos.com/2023/07/03/wordpress-plugin-lets-users-become-admins-patch-early-patch-often/
If you run a WordPress site with the Ultimate Members plugin installed, make sure you’ve updated it to the latest version.
https://nakedsecurity.sophos.com/2023/07/03/wordpress-plugin-lets-users-become-admins-patch-early-patch-often/
Naked Security
WordPress plugin lets users become admins – Patch early, patch often!
Ultimate Member plugin lets rogue users choose their own site capabilities, including becoming admins.
Ghostscript bug could allow rogue documents to run system commands.
https://nakedsecurity.sophos.com/2023/07/04/ghostscript-bug-could-allow-rogue-documents-to-run-system-commands/
https://nakedsecurity.sophos.com/2023/07/04/ghostscript-bug-could-allow-rogue-documents-to-run-system-commands/
Sophos News
Naked Security – Sophos News
Firefox 115 Patches High-Severity Use-After-Free Vulnerabilities
Mozilla has released Firefox 115 to the stable channel with patches for two high-severity use-after-free vulnerabilities.
Mozilla on Tuesday announced the release of Firefox 115 to the stable channel with patches for a dozen vulnerabilities, including two high-severity use-after-free bugs.
Tracked as CVE-2023-37201, the first of the high-severity issues is described as a use-after-free flaw in WebRTC certificate generation.
https://www.securityweek.com/firefox-115-patches-high-severity-use-after-free-vulnerabilities/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-22/
Mozilla has released Firefox 115 to the stable channel with patches for two high-severity use-after-free vulnerabilities.
Mozilla on Tuesday announced the release of Firefox 115 to the stable channel with patches for a dozen vulnerabilities, including two high-severity use-after-free bugs.
Tracked as CVE-2023-37201, the first of the high-severity issues is described as a use-after-free flaw in WebRTC certificate generation.
https://www.securityweek.com/firefox-115-patches-high-severity-use-after-free-vulnerabilities/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-22/
SecurityWeek
Firefox 115 Patches High-Severity Use-After-Free Vulnerabilities
Mozilla has released Firefox 115 to the stable channel with patches for two high-severity use-after-free vulnerabilities.
Cisco Switch Flaw Let Attack Reads Encrypted Traffic
https://gbhackers.com/cisco-switch-flaw-encryption/
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aci-cloudsec-enc-Vs5Wn2sX
https://gbhackers.com/cisco-switch-flaw-encryption/
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aci-cloudsec-enc-Vs5Wn2sX
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Cisco Switch Flaw Let Attack Reads Encrypted Traffic
A Flaw with Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series switches let attackers read the encrypted traffic.
VMSA-2023-0015
CVSSv3 Range:5.3
Issue Date:2023-07-06
CVE(s):CVE-2023-20899
Synopsis:
VMware SD-WAN update addresses a bypass authentication vulnerability (CVE-2023-20899)
Impacted Products
VMware SD-WAN (Edge)
Introduction
An Authentication Bypass Vulnerability affecting VMware SD-WAN was privately reported to VMware. Updates are available to address this vulnerability in affected VMware products.
https://www.vmware.com/security/advisories/VMSA-2023-0015.html
CVSSv3 Range:5.3
Issue Date:2023-07-06
CVE(s):CVE-2023-20899
Synopsis:
VMware SD-WAN update addresses a bypass authentication vulnerability (CVE-2023-20899)
Impacted Products
VMware SD-WAN (Edge)
Introduction
An Authentication Bypass Vulnerability affecting VMware SD-WAN was privately reported to VMware. Updates are available to address this vulnerability in affected VMware products.
https://www.vmware.com/security/advisories/VMSA-2023-0015.html
VMware
VMSA-2023-0015
VMware SD-WAN update addresses a bypass authentication vulnerability (CVE-2023-20899)
VMSA-2023-0007.1
CVSSv3 Range:7.2-9.8
Issue Date:2023-04-20
Updated On:2023-07-10
CVE(s):
CVE-2023-20864, CVE-2023-20865
Synopsis:
VMware Aria Operations for Logs (Operations for Logs) update addresses multiple vulnerabilities. (CVE-2023-20864, CVE-2023-20865)
Impacted Products
VMware Aria Operations for Logs (formerly vRealize Log Insight)
Introduction
Multiple vulnerabilities in VMware Aria Operations for Logs were privately reported to VMware. Updates and workarounds are available to address these vulnerabilities in affected VMware products.
https://www.vmware.com/security/advisories/VMSA-2023-0007.html
CVSSv3 Range:7.2-9.8
Issue Date:2023-04-20
Updated On:2023-07-10
CVE(s):
CVE-2023-20864, CVE-2023-20865
Synopsis:
VMware Aria Operations for Logs (Operations for Logs) update addresses multiple vulnerabilities. (CVE-2023-20864, CVE-2023-20865)
Impacted Products
VMware Aria Operations for Logs (formerly vRealize Log Insight)
Introduction
Multiple vulnerabilities in VMware Aria Operations for Logs were privately reported to VMware. Updates and workarounds are available to address these vulnerabilities in affected VMware products.
https://www.vmware.com/security/advisories/VMSA-2023-0007.html
0day de tipo ejecución de código arbitrario en WebKit de Apple
Fecha 11/07/2023
Importancia 5 - Crítica
Recursos Afectados
Versiones anteriores a:
iOS 16.5.1 y iPadOS 16.5.1;
macOS Ventura 13.4.1;
Safari 16.5.2.
Descripción
Un investigador anónimo ha informado a Apple de una vulnerabilidad, de tipo 0day, que podría permitir a un atacante ejecutar código arbitrario.
http://www.incibe.es/incibe-cert/alerta-temprana/avisos/0day-de-tipo-ejecucion-de-codigo-arbitrario-en-webkit-de-apple
Fecha 11/07/2023
Importancia 5 - Crítica
Recursos Afectados
Versiones anteriores a:
iOS 16.5.1 y iPadOS 16.5.1;
macOS Ventura 13.4.1;
Safari 16.5.2.
Descripción
Un investigador anónimo ha informado a Apple de una vulnerabilidad, de tipo 0day, que podría permitir a un atacante ejecutar código arbitrario.
http://www.incibe.es/incibe-cert/alerta-temprana/avisos/0day-de-tipo-ejecucion-de-codigo-arbitrario-en-webkit-de-apple
www.incibe.es
0day De Tipo Ejecucion De Codigo Arbitrario En Webkit De Apple | INCIBE-CERT | INCIBE
Un investigador anónimo ha informado a Apple de una vulnerabilidad, de tipo 0day, que podría permitir
Microsoft Updates
July 2023 Security Updates
https://msrc.microsoft.com/update-guide/releaseNote/2023-Jul
July 2023 Security Updates
https://msrc.microsoft.com/update-guide/releaseNote/2023-Jul
Adobe Releases Security Updates for ColdFusion and InDesign
Release DateJuly 11, 2023
Adobe has released security updates to address vulnerabilities affecting ColdFusion and InDesign. An attacker can exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the Adobe security releases APSB23-38 and APSB23-40 and apply the necessary updates.
https://www.cisa.gov/news-events/alerts/2023/07/11/adobe-releases-security-updates-coldfusion-and-indesign
Release DateJuly 11, 2023
Adobe has released security updates to address vulnerabilities affecting ColdFusion and InDesign. An attacker can exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the Adobe security releases APSB23-38 and APSB23-40 and apply the necessary updates.
https://www.cisa.gov/news-events/alerts/2023/07/11/adobe-releases-security-updates-coldfusion-and-indesign
Fortinet Releases Security Update for FortiOS and FortiProxy
Release DateJuly 11, 2023
Fortinet has released a security update to address a critical vulnerability (CVE-2023-33308) affecting FortiOS and FortiProxy. A remote attacker can exploit this vulnerability to take control of an affected system.
CISA encourages users and administrators to review the Fortinet security release FG-IR-23-183 and apply the necessary updates.
https://www.cisa.gov/news-events/alerts/2023/07/11/fortinet-releases-security-update-fortios-and-fortiproxy
Release DateJuly 11, 2023
Fortinet has released a security update to address a critical vulnerability (CVE-2023-33308) affecting FortiOS and FortiProxy. A remote attacker can exploit this vulnerability to take control of an affected system.
CISA encourages users and administrators to review the Fortinet security release FG-IR-23-183 and apply the necessary updates.
https://www.cisa.gov/news-events/alerts/2023/07/11/fortinet-releases-security-update-fortios-and-fortiproxy
Actualización de seguridad de SAP de julio de 2023
Fecha de publicación12/07/2023
Importancia5 - Crítica
https://www.incibe.es/incibe-cert/alerta-temprana/avisos/actualizacion-de-seguridad-de-sap-de-julio-de-2023
Fecha de publicación12/07/2023
Importancia5 - Crítica
https://www.incibe.es/incibe-cert/alerta-temprana/avisos/actualizacion-de-seguridad-de-sap-de-julio-de-2023
www.incibe.es
Actualizacion De Seguridad De Sap De Julio De 2023 | INCIBE-CERT | INCIBE
SAP ha publicado varias actualizaciones de seguridad en diferentes productos en su comunicado mensual.
Microsoft July 2023 Patch Tuesday warns of 6 zero-days, 132 flaws
Today is Microsoft's July 2023 Patch Tuesday, with security updates for 132 flaws, including six actively exploited and thirty-seven remote code execution vulnerabilities.
While thirty-seven RCE bugs were fixed, Microsoft only rated nine as 'Critical.' However, one of the RCE flaws remains unpatched and is actively exploited in attacks seen by numerous cybersecurity firms.
The number of bugs in each vulnerability category is listed below:
https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2023-patch-tuesday-warns-of-6-zero-days-132-flaws/
Today is Microsoft's July 2023 Patch Tuesday, with security updates for 132 flaws, including six actively exploited and thirty-seven remote code execution vulnerabilities.
While thirty-seven RCE bugs were fixed, Microsoft only rated nine as 'Critical.' However, one of the RCE flaws remains unpatched and is actively exploited in attacks seen by numerous cybersecurity firms.
The number of bugs in each vulnerability category is listed below:
https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2023-patch-tuesday-warns-of-6-zero-days-132-flaws/
BleepingComputer
Microsoft July 2023 Patch Tuesday warns of 6 zero-days, 132 flaws
Today is Microsoft's July 2023 Patch Tuesday, with security updates for 132 flaws, including six actively exploited and thirty-seven remote code execution vulnerabilities.
Microsoft Warns of Office Zero-Day Attacks, No Patch Available
Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.
https://www.securityweek.com/microsoft-warns-of-office-zero-day-attacks-no-patch-available/
Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.
https://www.securityweek.com/microsoft-warns-of-office-zero-day-attacks-no-patch-available/
SecurityWeek
Microsoft Warns of Office Zero-Day Attacks, No Patch Available
Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.
Citrix Secure Access client for Ubuntu Security Bulletin for CVE-2023-24492
Description of Problem
Vulnerabilities have been discovered in Citrix Secure Access client for Ubuntu (previously Citrix Gateway VPN client for Ubuntu).
The following supported versions are affected by the vulnerability:
Versions before 23.5.2
https://support.citrix.com/article/CTX564169/citrix-secure-access-client-for-ubuntu-security-bulletin-for-cve202324492
Description of Problem
Vulnerabilities have been discovered in Citrix Secure Access client for Ubuntu (previously Citrix Gateway VPN client for Ubuntu).
The following supported versions are affected by the vulnerability:
Versions before 23.5.2
https://support.citrix.com/article/CTX564169/citrix-secure-access-client-for-ubuntu-security-bulletin-for-cve202324492
VU#913565: Hard-coded credentials in Technicolor TG670 DSL gateway router
https://kb.cert.org/vuls/id/913565
https://kb.cert.org/vuls/id/913565
www.kb.cert.org
CERT/CC Vulnerability Note VU#913565
Hard-coded credentials in Technicolor TG670 DSL gateway router
Microsoft patches four zero-days, finally takes action against crimeware kernel drivers
https://nakedsecurity.sophos.com/2023/07/12/microsoft-patches-four-zero-days-finally-takes-action-against-crimeware-kernel-drivers/
https://nakedsecurity.sophos.com/2023/07/12/microsoft-patches-four-zero-days-finally-takes-action-against-crimeware-kernel-drivers/
Sophos News
Naked Security – Sophos News