SysAdmin 24x7
4.34K subscribers
41 photos
2 videos
8 files
6.02K links
Noticias y alertas de seguridad informática.
Chat y contacto:
t.me/sysadmin24x7chat
Download Telegram
Múltiples vulnerabilidades en Moodle

Fecha 18/10/2023
Importancia 4 - Alta

Recursos Afectados
Las siguientes versiones de Moodle se ven afectadas:

desde 4.2 hasta 4.2.2,
desde 4.1 hasta 4.1.5,
desde 4.0 hasta 4.0.10,
desde 3.11 hasta 3.11.16,
desde 3.9 hasta 3.9.23
versiones anteriores sin soporte.

Descripción
Varios investigadores han reportado 4 vulnerabilidades de severidad alta y varias bajas que se pueden consultar en la web de avisos de Moodle.

Solución
Actualizar a las versiones 4.2.3, 4.1.6, 4.0.11, 3.11.17 y 3.9.24.

http://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-moodle-2
NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2023-4966 and CVE-2023-4967

Description of Problem
Multiple vulnerabilities have been discovered in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway).

https://support.citrix.com/article/CTX579459/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967
Oracle Releases October 2023

Critical Patch Update Advisory
Release DateOctober 19, 2023

Oracle has released its Critical Patch Update Advisory for October 2023 to address 387 vulnerabilities across multiple products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.

https://www.cisa.gov/news-events/alerts/2023/10/19/oracle-releases-october-2023-critical-patch-update-advisory
VMSA-2023-0021

CVSSv3 Range: 8.1
Issue Date: 2023-10-19
CVE(s): CVE-2023-34051, CVE-2023-34052

Synopsis:
VMware Aria Operations for Logs updates address multiple vulnerabilities. (CVE-2023-34051, CVE-2023-34052)

Impacted Products
Aria Operations for Logs

Introduction
Multiple vulnerabilities in VMware Aria Operations for Logs were privately reported to VMware. Updates are available to remediate this vulnerability in affected VMware products.

https://www.vmware.com/security/advisories/VMSA-2023-0021.html
VMSA-2023-0022

CVSSv3 Range: 6.6-7.1
Issue Date: 2023-10-19
CVE(s): CVE-2023-34044, CVE-2023-34045, CVE-2023-34046

Synopsis:
VMware Fusion and Workstation updates address privilege escalation and information disclosure vulnerabilities (CVE-2023-34044, CVE-2023-34045, CVE-2023-34046)

Impacted Products
VMware Workstation Pro / Player (Workstation)
VMware Fusion

Introduction
Multiple security vulnerabilities in VMware Workstation and Fusion were responsibly reported to VMware. Updates are available to remediate these vulnerabilities in the affected VMware products.

https://www.vmware.com/security/advisories/VMSA-2023-0022.html
Critical RCE flaws found in SolarWinds access audit solution

Security researchers found three critical remote code execution vulnerabilities in the SolarWinds Access Rights Manager (ARM) product that remote attackers could use to run code with SYSTEM privileges.

https://www.bleepingcomputer.com/news/security/critical-rce-flaws-found-in-solarwinds-access-audit-solution/
THREAT ACTORS BREACHED OKTA SUPPORT SYSTEM AND STOLE CUSTOMERS’ DATA

Okta revealed that threat actors breached its support case management system and stole sensitive data that can be used in future attacks.
Okta says that threat actors broke into its support case management system and stole authentication data, including cookies and session tokens, that can be abused in future attacks to impersonate valide users.

Okta asks customers to upload an HTTP Archive (HAR) file in order to support them in solving their problems and replicating browser activity. HAR files can also contain sensitive data, including authentication information.

https://securityaffairs.com/152803/data-breach/okta-support-system-breached.html
1Password discloses security incident linked to Okta breach

1Password, a popular password management platform used by over 100,000 businesses, suffered a security incident after hackers gained access to its Okta ID management tenant.

"We detected suspicious activity on our Okta instance related to their Support System incident. After a thorough investigation, we concluded that no 1Password user data was accessed," reads a very brief security incident notification from 1Password CTO Pedro Canahuati.

"On September 29, we detected suspicious activity on our Okta instance that we use to manage our employee-facing apps."

https://www.bleepingcomputer.com/news/security/1password-discloses-security-incident-linked-to-okta-breach/

https://blog.1password.com/okta-incident/
VMSA-2023-0023

CVSSv3 Range: 4.3-9.8
Issue Date: 2023-10-25
CVE(s): CVE-2023-34048, CVE-2023-34056

Synopsis:
VMware vCenter Server updates address out-of-bounds write and information disclosure vulnerabilities (CVE-2023-34048, CVE-2023-34056)

Impacted Products
VMware vCenter Server
VMware Cloud Foundation

Introduction
An out-of-bounds write (CVE-2023-34048) and a partial information disclosure (CVE-2023-34056) in vCenter Server were responsibly reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.

https://www.vmware.com/security/advisories/VMSA-2023-0023.html
Múltiples vulnerabilidades en Squid

Fecha 26/10/2023
Importancia 5 - Crítica

Recursos Afectados
Squid, versiones anteriores a 6.4.

Descripción
Varios investigadores han detectado y reportado varias vulnerabilidades de severidad crítica que afectan a Squid, cuya explotación podría permitir a un atacante realizar DoS o contrabando de peticiones ( request smuggling) HTTP.

Solución
Actualizar Squid a la versión 6.4.

https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-squid
Apple Releases Security Advisories for Multiple Products

Release DateOctober 26, 2023

iOS 17.1 and iPadOS 17.1
iOS 16.7.2 and iPadOS 16.7.2
iOS 15.8 and iPadOS 15.8
macOS Sonoma 14.1
macOS Ventura 13.6.1
macOS Monterey 12.7.1
tvOS 17.1
watchOS 10.1
Safari 17.1

https://www.cisa.gov/news-events/alerts/2023/10/26/apple-releases-security-advisories-multiple-products
NextGen Mirth Connect Remote Code Execution Vulnerability (CVE-2023-43208)

Summary

Mirth Connect, by NextGen HealthCare, is an open source data integration platform widely used by healthcare companies. Versions prior to 4.4.1 are vulnerable to an unauthenticated remote code execution vulnerability, CVE-2023-43208. If you’re a user of Mirth Connect, you’ll want to upgrade to the latest patch release, 4.4.1, as of this writing.

https://www.horizon3.ai/nextgen-mirth-connect-remote-code-execution-vulnerability-cve-2023-43208/
VMSA-2023-0024

CVSSv3 Range: 7.5 - 7.8
Issue Date: 2023-10-26
CVE(s): CVE-2023-34057, CVE-2023-34058

Synopsis:
VMware Tools updates address Local Privilege Escalation and SAML Token Signature Bypass vulnerabilities (CVE-2023-34057, CVE-2023-34058)

Impacted Products
VMware Tools

Introduction
Multiple vulnerabilities in VMware Tools were responsibly reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.

https://www.vmware.com/security/advisories/VMSA-2023-0024.html
Múltiples vulnerabilidades en productos F5

Fecha 30/10/2023
Importancia 5 - Crítica

Recursos Afectados
BIG-IP (todos los módulos), versiones:
17.1.0;
desde 16.1.0 hasta 16.1.4;
desde 15.1.0 hasta 15.1.10;
desde 14.1.0 hasta 14.1.5;
desde 13.1.0 hasta 13.1.5.
BIG-IP Next (todos los módulos), versión 20.0.1.
BIG-IP Next SPK, versiones desde 1.5.0 hasta 1.8.2.
BIG-IP Next CNF, versiones desde 1.1.0 hasta 1.1.1.

Descripción
F5 ha publicado un aviso de seguridad que contiene información de 2 vulnerabilidades, una crítica y otra alta, cuya explotación podría permitir a un atacante realizar acciones, tales como una ejecución remota de código o una inyección SQL.

https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-productos-f5-0
VMSA-2023-0025

CVSSv3 Range:8.8
Issue Date:2023-10-31
CVE(s):CVE-2023-20886

Synopsis:VMware Workspace ONE UEM console updates address an open redirect vulnerability (CVE-2023-20886)

Impacted Products
VMware Workspace ONE UEM console

Introduction
An open redirect vulnerability in VMware Workspace ONE UEM console was responsibly reported to VMware. Updates are available to remediate this vulnerability in affected VMware products.

https://www.vmware.com/security/advisories/VMSA-2023-0025.html
Server-Side Request Forgery en productos Sage

Fecha 31/10/2023
Importancia 4 - Alta

Recursos Afectados
XRT Business Exchange DMZ y Proxy Tools, versiones 14.0.2.2259 y anteriores.

Descripción
INCIBE ha coordinado la publicación de 1 vulnerabilidad que afecta a Sage XRT Business Exchange DMZ y Proxy Tools, una solución para el intercambio de datos financieros intragrupo y con las entidades financieras, la cual ha sido descubierta por Rafael Pedrero.

Solución
La vulnerabilidad ha sido solucionada por el equipo de Sage. Se recomienda a los clientes afectados actualizar a la última versión de software disponible.

https://www.incibe.es/incibe-cert/alerta-temprana/avisos/server-side-request-forgery-en-productos-sage
Autorización incorrecta en Confluence Data Center y Confluence Server de Atlassian

Fecha 31/10/2023
Importancia 5 - Crítica

Recursos Afectados
Todas las versiones de Confluence Data Center y Server.

Descripción
Atlassian ha informado de una vulnerabilidad de severidad crítica que podría ser explotada por un atacante y provocar una perdida significativa de datos.

https://www.incibe.es/incibe-cert/alerta-temprana/avisos/autorizacion-incorrecta-en-confluence-data-center-y-confluence-server-de
Inyección de comandos en Cisco Firepower Management Center

Fecha 02/11/2023
Importancia 5 - Crítica

Recursos Afectados
Esta vulnerabilidad afecta a los productos Cisco que ejecuten una versión vulnerable del software Cisco FMC.

Descripción
Javier Ortega Palacios, investigador de Cisco, ha detectado una vulnerabilidad crítica durante unas pruebas internas de seguridad. La explotación de esta vulnerabilidad podría permitir a un atacante, remoto y autenticado, ejecutar comandos de configuración no autorizados en el dispositivo FTD (Firepower Threat Defense) que es gestionado por FMC (Firepower Management Center).

https://www.incibe.es/incibe-cert/alerta-temprana/avisos/inyeccion-de-comandos-en-cisco-firepower-management-center