Apple Releases Security Updates for Multiple Products
Apple has released security updates to address vulnerabilities in multiple products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following advisories and apply the necessary updates.
Safari 17
macOS Sonoma 14
https://www.cisa.gov/news-events/alerts/2023/09/28/apple-releases-security-updates-multiple-products
Apple has released security updates to address vulnerabilities in multiple products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following advisories and apply the necessary updates.
Safari 17
macOS Sonoma 14
https://www.cisa.gov/news-events/alerts/2023/09/28/apple-releases-security-updates-multiple-products
Millions of Exim mail servers exposed to zero-day RCE attacks.
A critical zero-day vulnerability in all versions of Exim mail transfer agent (MTA) software can let unauthenticated attackers gain remote code execution (RCE) on Internet-exposed servers.
Found by an anonymous security researcher and disclosed through Trend Micro's Zero Day Initiative (ZDI), the security bug (CVE-2023-42115) is due to an Out-of-bounds Write weakness found in the SMTP service.
https://www.bleepingcomputer.com/news/security/millions-of-exim-mail-servers-exposed-to-zero-day-rce-attacks/
A critical zero-day vulnerability in all versions of Exim mail transfer agent (MTA) software can let unauthenticated attackers gain remote code execution (RCE) on Internet-exposed servers.
Found by an anonymous security researcher and disclosed through Trend Micro's Zero Day Initiative (ZDI), the security bug (CVE-2023-42115) is due to an Out-of-bounds Write weakness found in the SMTP service.
https://www.bleepingcomputer.com/news/security/millions-of-exim-mail-servers-exposed-to-zero-day-rce-attacks/
BleepingComputer
Millions of Exim mail servers exposed to zero-day RCE attacks
A critical zero-day vulnerability in all versions of Exim mail transfer agent (MTA) software can let unauthenticated attackers gain remote code execution (RCE) on Internet-exposed servers.
Los próximos 2, 3 y 4 de noviembre regresa #HoneyCON23, como todos los años tendremos charlas técnicas, talleres y nos tomaremos alguna cerveza hablando de Ciberseguridad.
🗓️Apertura de reserva de entradas: 16 de octubre.
ℹ️ Más info: honeycon.eu
https://twitter.com/Honey_SEC/status/1708399853351711008
🗓️Apertura de reserva de entradas: 16 de octubre.
ℹ️ Más info: honeycon.eu
https://twitter.com/Honey_SEC/status/1708399853351711008
Forwarded from HoneySEC TwitterBot
Los próximos 2, 3 y 4 de noviembre regresa #HoneyCON23, como todos los años tendremos charlas técnicas, talleres y nos tomaremos alguna cerveza hablando de Ciberseguridad.
🗓️Apertura de reserva de entradas: 16 de octubre.
ℹ️ Más info: honeycon.eu
https://twitter.com/Honey_SEC/status/1706950504972988526?t=jedI-zUaL0KjjIyBv8CVqg&s=19
🗓️Apertura de reserva de entradas: 16 de octubre.
ℹ️ Más info: honeycon.eu
https://twitter.com/Honey_SEC/status/1706950504972988526?t=jedI-zUaL0KjjIyBv8CVqg&s=19
X (formerly Twitter)
Honey_SEC (@Honey_SEC) on X
Los próximos 2, 3 y 4 de noviembre regresa #HoneyCON23, como todos los años tendremos charlas técnicas, talleres y nos tomaremos alguna cerveza hablando de Ciberseguridad.
🗓️Apertura de reserva de entradas: 16 de octubre.
ℹ️ Más info: https://t.co/uwrKctARgh
🗓️Apertura de reserva de entradas: 16 de octubre.
ℹ️ Más info: https://t.co/uwrKctARgh
Desbordamiento de búfer en librería glibc de distribuciones Linux
Fecha 04/10/2023
Importancia 4 - Alta
Recursos Afectados
Esta vulnerabilidad se introdujo en abril de 2021, con la versión 2.34 de glibc ( commit 2ed18c).
Distribuciones de Linux confirmadas como vulnerables:
Fedora 37 y 38;
Ubuntu 22.04 y 23.04;
Debian 12 y 13.
*Este listado podría ser ampliado en los próximos días.
Descripción
Qualys Threat Research Unit (TRU) ha descubierto una vulnerabilidad de severidad alta, denominada Looney Tunables, de tipo desbordamiento de búfer, que afecta a la librería glibc, nombre común utilizado para GNU C Library. La explotación de esta vulnerabilidad podría permitir una escalada local de privilegios que otorgase privilegios completos de root .
Solución
Aplicar las medidas de mitigación descritas en el aviso de RedHat.
http://www.incibe.es/incibe-cert/alerta-temprana/avisos/desbordamiento-de-bufer-en-libreria-glibc-de-distribuciones-linux
Fecha 04/10/2023
Importancia 4 - Alta
Recursos Afectados
Esta vulnerabilidad se introdujo en abril de 2021, con la versión 2.34 de glibc ( commit 2ed18c).
Distribuciones de Linux confirmadas como vulnerables:
Fedora 37 y 38;
Ubuntu 22.04 y 23.04;
Debian 12 y 13.
*Este listado podría ser ampliado en los próximos días.
Descripción
Qualys Threat Research Unit (TRU) ha descubierto una vulnerabilidad de severidad alta, denominada Looney Tunables, de tipo desbordamiento de búfer, que afecta a la librería glibc, nombre común utilizado para GNU C Library. La explotación de esta vulnerabilidad podría permitir una escalada local de privilegios que otorgase privilegios completos de root .
Solución
Aplicar las medidas de mitigación descritas en el aviso de RedHat.
http://www.incibe.es/incibe-cert/alerta-temprana/avisos/desbordamiento-de-bufer-en-libreria-glibc-de-distribuciones-linux
www.incibe.es
Desbordamiento De Bufer En Libreria Glibc De Distribuciones Linux | INCIBE-CERT | INCIBE
Qualys Threat Research Unit (TRU) ha descubierto una vulnerabilidad de severidad alta, denominada Loon
Cisco Releases Security Advisories for Multiple Products
10/05/2023 11:00 AM EDT
Cisco released security advisories for vulnerabilities affecting multiple Cisco products. A remote cyber threat actor could exploit one of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following advisories and apply the necessary updates:
Cisco Emergency Responder Static Credentials Vulnerability (cisco-sa-cer-priv-esc-B9t3hqk9)
Multiple Cisco Unified Communications Products Unauthenticated API High CPU Utilization Denial of Service Vulnerability (cisco-sa-cucm-apidos-PGsDcdNF)
https://www.cisa.gov/news-events/alerts/2023/10/05/cisco-releases-security-advisories-multiple-products
10/05/2023 11:00 AM EDT
Cisco released security advisories for vulnerabilities affecting multiple Cisco products. A remote cyber threat actor could exploit one of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following advisories and apply the necessary updates:
Cisco Emergency Responder Static Credentials Vulnerability (cisco-sa-cer-priv-esc-B9t3hqk9)
Multiple Cisco Unified Communications Products Unauthenticated API High CPU Utilization Denial of Service Vulnerability (cisco-sa-cucm-apidos-PGsDcdNF)
https://www.cisa.gov/news-events/alerts/2023/10/05/cisco-releases-security-advisories-multiple-products
Atlassian Releases Security Advisory for Confluence Data Center and Server
Release DateOctober 05, 2023
Atlassian released a security advisory to address a vulnerability affecting Confluence Data Center and Confluence Server. A remote cyber threat actor could exploit this vulnerability to take control of an affected system.
CISA encourages users and administrators to review the following advisory and apply the necessary updates: CVE-2023-22515 - Privilege Escalation Vulnerability in Confluence Data Center and Server.
https://www.cisa.gov/news-events/alerts/2023/10/05/atlassian-releases-security-advisory-confluence-data-center-and-server
This advisory has been updated since the initial publication.
Collapse
Clarified Confluence versions prior to 8.0.0 are not affected.
04 Oct 2023 2:20 PM UTC (Coordinated Universal Time, +0 hours)
Edited group name in Threat detection section to the correct one - confluence-administrators
05 Oct 2023 8.30 AM UTC (Coordinated Universal Time, +0 hours)
Clarified Category as Broken Access Control to align with OWASP definition.
05 Oct 2023 9:35 PM UTC (Coordinated Universal Time, +0 hours)
https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html
Release DateOctober 05, 2023
Atlassian released a security advisory to address a vulnerability affecting Confluence Data Center and Confluence Server. A remote cyber threat actor could exploit this vulnerability to take control of an affected system.
CISA encourages users and administrators to review the following advisory and apply the necessary updates: CVE-2023-22515 - Privilege Escalation Vulnerability in Confluence Data Center and Server.
https://www.cisa.gov/news-events/alerts/2023/10/05/atlassian-releases-security-advisory-confluence-data-center-and-server
This advisory has been updated since the initial publication.
Collapse
Clarified Confluence versions prior to 8.0.0 are not affected.
04 Oct 2023 2:20 PM UTC (Coordinated Universal Time, +0 hours)
Edited group name in Threat detection section to the correct one - confluence-administrators
05 Oct 2023 8.30 AM UTC (Coordinated Universal Time, +0 hours)
Clarified Category as Broken Access Control to align with OWASP definition.
05 Oct 2023 9:35 PM UTC (Coordinated Universal Time, +0 hours)
https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html
Múltiples vulnerabilidades en D-View de D-Link
Fecha 09/10/2023
Importancia 5 - Crítica
Recursos Afectados
D-View.
Descripción
rgod ha notificado varias vulnerabilidades 0day, entre ellas dos de severidad crítica, que podrían permitir a atacantes remotos eludir la autenticación o ejecutar código arbitrario.
Solución
Aún no existe una actualización, por lo que se recomienda restringir la interacción con la aplicación.
http://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-d-view-de-d-link
Fecha 09/10/2023
Importancia 5 - Crítica
Recursos Afectados
D-View.
Descripción
rgod ha notificado varias vulnerabilidades 0day, entre ellas dos de severidad crítica, que podrían permitir a atacantes remotos eludir la autenticación o ejecutar código arbitrario.
Solución
Aún no existe una actualización, por lo que se recomienda restringir la interacción con la aplicación.
http://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-d-view-de-d-link
Múltiples vulnerabilidades en productos Cisco
Fecha 09/10/2023
Importancia 5 - Crítica
Recursos Afectados
Emergency Responder, versiones 12.5(1)SU4 y 14SU3;
Prime Collaboration Deployment, versión 14SU3;
Unified CM and Unified CM SME, versiones 12.5(1)SU7 y 14SU3;
Unified CM IM&P, versiones 12.5(1)SU7 y 14SU3;
Unity Connection, versión 14SU3.
Descripción
Unas pruebas internas de seguridad realizadas por Cisco revelaron 2 vulnerabilidades, una de severidad crítica y otra alta, cuya explotación podría permitir a un atacante, remoto y no autenticado, iniciar sesión en un dispositivo afectado utilizando credenciales de root o elevar el uso de CPU provocando retrasos en el procesamiento de las llamadas.
Solución
Actualizar los productos afectados a las versiones correctoras indicadas en el apartado "Fixed Releases" de cada aviso.
http://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-productos-cisco
Fecha 09/10/2023
Importancia 5 - Crítica
Recursos Afectados
Emergency Responder, versiones 12.5(1)SU4 y 14SU3;
Prime Collaboration Deployment, versión 14SU3;
Unified CM and Unified CM SME, versiones 12.5(1)SU7 y 14SU3;
Unified CM IM&P, versiones 12.5(1)SU7 y 14SU3;
Unity Connection, versión 14SU3.
Descripción
Unas pruebas internas de seguridad realizadas por Cisco revelaron 2 vulnerabilidades, una de severidad crítica y otra alta, cuya explotación podría permitir a un atacante, remoto y no autenticado, iniciar sesión en un dispositivo afectado utilizando credenciales de root o elevar el uso de CPU provocando retrasos en el procesamiento de las llamadas.
Solución
Actualizar los productos afectados a las versiones correctoras indicadas en el apartado "Fixed Releases" de cada aviso.
http://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-productos-cisco
HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487
Release DateOctober 10, 2023
Researchers and vendors have disclosed a denial-of-service (DoS) vulnerability in HTTP/2 protocol. The vulnerability (CVE-2023-44487), known as Rapid Reset, has been exploited in the wild in August 2023 through October 2023.
https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487
Release DateOctober 10, 2023
Researchers and vendors have disclosed a denial-of-service (DoS) vulnerability in HTTP/2 protocol. The vulnerability (CVE-2023-44487), known as Rapid Reset, has been exploited in the wild in August 2023 through October 2023.
https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487
Citrix Releases Security Updates for Multiple Products
Release DateOctober 10, 2023
Citrix has released security updates to address vulnerabilities affecting multiple products. A malicious cyber actor can exploit one of these vulnerabilities take control of an affected system.
https://www.cisa.gov/news-events/alerts/2023/10/10/citrix-releases-security-updates-multiple-products
Release DateOctober 10, 2023
Citrix has released security updates to address vulnerabilities affecting multiple products. A malicious cyber actor can exploit one of these vulnerabilities take control of an affected system.
https://www.cisa.gov/news-events/alerts/2023/10/10/citrix-releases-security-updates-multiple-products
Microsoft Releases October 2023 Security Updates
https://msrc.microsoft.com/update-guide/releaseNote/2023-oct
https://msrc.microsoft.com/update-guide/releaseNote/2023-oct
Fortinet Releases Security Updates for Multiple Products
Release DateOctober 11, 2023
https://www.cisa.gov/news-events/alerts/2023/10/11/fortinet-releases-security-updates-multiple-products
Release DateOctober 11, 2023
https://www.cisa.gov/news-events/alerts/2023/10/11/fortinet-releases-security-updates-multiple-products
Actualización de seguridad 6.3.2 para WordPress
Fecha 13/10/2023
Importancia 3 - Media
Recursos Afectados
WordPress, versiones anteriores a 6.3.2.
Descripción
Se ha publicado la última versión de WordPress que contiene 41 correcciones de errores y 8 de seguridad.
http://www.incibe.es/incibe-cert/alerta-temprana/avisos/actualizacion-de-seguridad-632-para-wordpress
Fecha 13/10/2023
Importancia 3 - Media
Recursos Afectados
WordPress, versiones anteriores a 6.3.2.
Descripción
Se ha publicado la última versión de WordPress que contiene 41 correcciones de errores y 8 de seguridad.
http://www.incibe.es/incibe-cert/alerta-temprana/avisos/actualizacion-de-seguridad-632-para-wordpress
Apple fixes iOS Kernel zero-day vulnerability on older iPhones
Apple has published security updates for older iPhones and iPads to backport patches released one week ago, addressing two zero-day vulnerabilities exploited in attacks.
"Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.6," the company said in an advisory.
The first zero-day (tracked as CVE-2023-42824) is a privilege escalation vulnerability caused by a weakness in the XNU kernel that can let local attackers elevate privileges on vulnerable iPhones and iPads.
https://www.bleepingcomputer.com/news/security/apple-fixes-ios-kernel-zero-day-vulnerability-on-older-iphones/
Apple has published security updates for older iPhones and iPads to backport patches released one week ago, addressing two zero-day vulnerabilities exploited in attacks.
"Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.6," the company said in an advisory.
The first zero-day (tracked as CVE-2023-42824) is a privilege escalation vulnerability caused by a weakness in the XNU kernel that can let local attackers elevate privileges on vulnerable iPhones and iPads.
https://www.bleepingcomputer.com/news/security/apple-fixes-ios-kernel-zero-day-vulnerability-on-older-iphones/
BleepingComputer
Apple fixes iOS Kernel zero-day vulnerability on older iPhones
Apple has published security updates for older iPhones and iPads to backport patches released one week ago, addressing two zero-day vulnerabilities exploited in attacks.
DarkGate Opens Organizations for Attack via Skype, Teams
https://www.trendmicro.com/en_ph/research/23/j/darkgate-opens-organizations-for-attack-via-skype-teams.html
https://www.trendmicro.com/en_ph/research/23/j/darkgate-opens-organizations-for-attack-via-skype-teams.html
Trend Micro
DarkGate Opens Organizations for Attack via Skype, Teams
SysAdmin 24x7
Atlassian Releases Security Advisory for Confluence Data Center and Server Release DateOctober 05, 2023 Atlassian released a security advisory to address a vulnerability affecting Confluence Data Center and Confluence Server. A remote cyber threat actor…
X (formerly Twitter)
Microsoft Threat Intelligence on X
Microsoft has observed nation-state threat actor Storm-0062 exploiting CVE-2023-22515 in the wild since September 14, 2023. CVE-2023-22515 was disclosed on October 4, 2023. Storm-0062 is tracked by others as DarkShadow or Oro0lxy.
Cisco IOS XE Software Web UI Privilege Escalation Vulnerability
Advisory ID:
cisco-sa-iosxe-webui-privesc-j22SaA4z
First Published: 2023 October 16 15:00 GMT
Version 1.1: Interim
Workarounds: No workarounds available
Cisco Bug IDs:
CSCwh87343 CVE-2023-20198
CVSS Score: Base 10.0
Vulnerable Products
This vulnerability affects Cisco IOS XE Software if the web UI feature is enabled. The web UI feature is enabled through the ip http server or ip http secure-server commands.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z
Advisory ID:
cisco-sa-iosxe-webui-privesc-j22SaA4z
First Published: 2023 October 16 15:00 GMT
Version 1.1: Interim
Workarounds: No workarounds available
Cisco Bug IDs:
CSCwh87343 CVE-2023-20198
CVSS Score: Base 10.0
Vulnerable Products
This vulnerability affects Cisco IOS XE Software if the web UI feature is enabled. The web UI feature is enabled through the ip http server or ip http secure-server commands.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z
Cisco
Cisco Security Advisory: Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature
Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker.
Fix information can be found in the Fixed Software…
Fix information can be found in the Fixed Software…
SONICOS AFFECTED BY MULTIPLE VULNERABILITIES
Advisory ID SNWLID-2023-0012
First Published 2023-10-17
Workaround true
Status Applicable
CVE CVE-2023-39276, CVE-2023-39277, CVE-2023-39278, CVE-2023-39279, CVE-2023-39280, CVE-2023-41711, CVE-2023-41712, CVE-2023-41713, CVE-2023-41715
CWE CWE-121, CWE-259, CWE-269
CVSS v3 7.7
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012
Advisory ID SNWLID-2023-0012
First Published 2023-10-17
Workaround true
Status Applicable
CVE CVE-2023-39276, CVE-2023-39277, CVE-2023-39278, CVE-2023-39279, CVE-2023-39280, CVE-2023-41711, CVE-2023-41712, CVE-2023-41713, CVE-2023-41715
CWE CWE-121, CWE-259, CWE-269
CVSS v3 7.7
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012
HTTP/2 Rapid Reset: cómo desarmamos el ataque sin precedentes
https://blog.cloudflare.com/es-es/technical-breakdown-http2-rapid-reset-ddos-attack-es-es/
https://blog.cloudflare.com/es-es/technical-breakdown-http2-rapid-reset-ddos-attack-es-es/
The Cloudflare Blog
HTTP/2 Rapid Reset: cómo desarmamos el ataque sin precedentes
Este artículo analiza los detalles del protocolo HTTP/2, la función que explotaron los atacantes para generar estos ataques masivos, y las estrategias de mitigación que adoptamos para garantizar la protección de todos nuestros clientes
Actualizaciones críticas en Oracle (octubre 2023)
Fecha 18/10/2023
Importancia 5 - Crítica
http://www.incibe.es/incibe-cert/alerta-temprana/avisos/actualizaciones-criticas-en-oracle-octubre-2023
Fecha 18/10/2023
Importancia 5 - Crítica
http://www.incibe.es/incibe-cert/alerta-temprana/avisos/actualizaciones-criticas-en-oracle-octubre-2023
www.incibe.es
Actualizaciones Criticas En Oracle Octubre 2023 | INCIBE-CERT | INCIBE
Oracle ha publicado una actualización crítica con parches para corregir vulnerabilidades, que afectan