=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 02-12-2021 18:00 − Freitag 03-12-2021 18:00
Handler: Robert Waldner
Co-Handler: Dimitri Robl
=====================
= News =
=====================
∗∗∗ Key Characteristics of Malicious Domains: Report ∗∗∗
---------------------------------------------
Newer top-level domains and certain hosting providers are frequent sources of malicious content, while newly registered domains and free SSL certificates are not any more likely than average to be risky, new research shows.
---------------------------------------------
https://www.darkreading.com/threat-intelligence/research-outs-the-providers…
∗∗∗ Vorsicht: „Neue Weihnachts-Emoji für Whatsapp“ ist eine Falle ∗∗∗
---------------------------------------------
Über eine WhatsApp-Nachricht, die Weihnachts-Emoji verspricht, werden Abo-Fallen und Schadsoftware verbreitet.
---------------------------------------------
https://futurezone.at/apps/vorsicht-neue-weihnachts-emoji-fuer-whatsapp-fal…
∗∗∗ The UPX Packer Will Never Die!, (Fri, Dec 3rd) ∗∗∗
---------------------------------------------
Today, many malware samples that you can find in the wild are "packed". The process of packing an executable file is not new and does not mean that it is de-facto malicious. Many developers decide to pack their software to protect the code.
---------------------------------------------
https://isc.sans.edu/diary/rss/28096
∗∗∗ Exploring Container Security: A Storage Vulnerability Deep Dive ∗∗∗
---------------------------------------------
Recently, the GKE Security team discovered a high severity vulnerability in Kubernetes (CVE-2021-25741) that allowed workloads to have access to parts of the host filesystem outside the mounted volumes boundaries. Although the vulnerability was patched back in September we thought it would be beneficial to write up a more in-depth analysis of the issue to share with the community.
---------------------------------------------
https://security.googleblog.com/2021/12/exploring-container-security-storag…
∗∗∗ Analysis: AWS SageMaker Jupyter Notebook Instance Takeover ∗∗∗
---------------------------------------------
During our research about security in data science tools we decided to look at Amazon SageMaker which is a fully managed machine learning service in AWS. Here is the long and short of our recent discovery. [...] Using the access token, the attacker can read data from S3 buckets, create VPC endpoints and more actions that are allowed by the SageMaker execution role and the “AmazonSageMakerFullAccess” policy. We reported the vulnerability we discovered to the AWS security team [...]
---------------------------------------------
https://blog.lightspin.io/aws-sagemaker-notebook-takeover-vulnerability
∗∗∗ Beispiele für Viren-Mails nach Übernahme eines Exchange-Servers ∗∗∗
---------------------------------------------
Und schon sind wir beim dritten Türchen im Security-Adventskalender meines Blogs. Ich hatte ja hier im Blog mehrfach gewarnt, dass ungepatchte Exchange-Server übernommen und zum Spam-Versand missbraucht werden. Ein Blog-Leser hat mir nun eine kurze Info zukommen lassen (danke), weil er einen kompromittierten Exchange-Server gefunden hat, der kompromittiert war und infizierte Spam-Mails verschickte.
---------------------------------------------
https://www.borncity.com/blog/2021/12/03/beispiele-fr-viren-mails-nach-bern…
∗∗∗ Magnat campaigns use malvertising to deliver information stealer, backdoor and malicious Chrome extension ∗∗∗
---------------------------------------------
Talos recently observed a malicious campaign offering fake installers of popular software as bait to get users to execute malware on their systems.
---------------------------------------------
https://blog.talosintelligence.com/2021/12/magnat-campaigns-use-malvertisin…
∗∗∗ Mehrwertdienste versuchen Sie in die Abo-Falle zu locken! ∗∗∗
---------------------------------------------
Einmal die falsche App am Handy installiert, einen falschen Link geöffnet oder auf einen vermeintlich harmlosen Button geklickt: Am Smartphone kann es sehr schnell passieren, dass Sie in einer Abo-Falle landen und Ihre Telefonrechnung plötzlich deutlich höher ausfällt als gewohnt. Doch keine Sorge: Auch wenn bereits Geld abgebucht wurde, können Sie die Rechnung bei Ihrem Mobilfunkanbieter beanstanden.
---------------------------------------------
https://www.watchlist-internet.at/news/mehrwertdienste-versuchen-sie-in-die…
=====================
= Vulnerabilities =
=====================
∗∗∗ Researchers discover 14 new data-stealing web browser attacks ∗∗∗
---------------------------------------------
IT security researchers from Ruhr-Universität Bochum (RUB) and the Niederrhein University of Applied Sciences have discovered 14 new types of XS-Leak cross-site leak attacks against modern web browsers, including Google Chrome, Microsoft Edge, Safari, and Mozilla Firefox.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/researchers-discover-14-new-…
∗∗∗ CISA and FBI Release Alert on Active Exploitation of CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus ∗∗∗
---------------------------------------------
This vulnerability was addressed by the update released by Zoho on September 16, 2021 for ServiceDesk Plus versions 11306 and above. If left unpatched, successful exploitation of the vulnerability allows an attacker to upload executable files and place webshells that enable post-exploitation activities, such as compromising administrator credentials, conducting lateral movement, and exfiltrating registry hives and Active Directory files.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/12/02/cisa-and-fbi-rele…
∗∗∗ IBM Security Bulletins 2021-12-02 ∗∗∗
---------------------------------------------
IBM Integration Bus, Power System, IBM Cloud Pak System, IBM SDK (Java Technology Edition), IBM Semeru Runtime, IBM Cognos Analytics
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Technical Advisory – Authenticated SQL Injection in SOAP Request in Broadcom CA Network Flow Analysis (CVE-2021-44050) ∗∗∗
---------------------------------------------
The Network Flow Analysis software (formerly known as CA Network Flow Analysis) is a network traffic monitoring solution, which is used to monitor and optimize the performance of network infrastructures. The “Interfaces” Section of the Network Flow Analysis web application made use of a Flash application, which performed SOAP requests.
---------------------------------------------
https://research.nccgroup.com/2021/12/02/technical-advisory-authenticated-s…
∗∗∗ Free Micropatches for the "InstallerFileTakeOver" 0day ∗∗∗
---------------------------------------------
Wow, this is the third 0day found by the same researcher we're patching in the last two weeks. Abdelhamid Naceri, a talented security researcher, has been keeping us busy with 0days this year. In January we micropatched a local privilege escalation in Windows Installer they had found (already fixed by Microsoft), and in the last two weeks we fixed an incompletely patched local privilege escalation in User Profile Service and a local privilege escalation [...]
---------------------------------------------
https://blog.0patch.com/2021/12/free-micropatches-for.html
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (krb5 and mailman), Debian (gmp and librecad), Fedora (php-symfony4 and wireshark), Mageia (bluez, busybox, docker-containerd, gfbgraph, hivex, nss, perl/perl-Encode, and udisks2/libblockdev), openSUSE (permissions), Oracle (mailman and mailman:2.1), Red Hat (mailman, mailman:2.1, and nss), Scientific Linux (mailman and nss), and SUSE (nodejs14).
---------------------------------------------
https://lwn.net/Articles/877582/
∗∗∗ Schneider Electric SESU ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Insufficient Entropy vulnerability in the Schneider Electric Software Update.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-01
∗∗∗ Johnson Controls Entrapass ∗∗∗
---------------------------------------------
This advisory contains mitigations for a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Johnson Controls Entrapass security management software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-02
∗∗∗ Distributed Data Systems WebHMI ∗∗∗
---------------------------------------------
This advisory contains mitigations for Authentication Bypass by Primary Weakness, and Unrestricted Upload of File with Dangerous Type vulnerabilities in Distributed Data Systems WebHMI SCADA systems.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-03
∗∗∗ Hitachi Energy RTU500 series BCI ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Improper Input Validation vulnerability in Hitachi Energy RTU500 series BCI remote terminal units.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-04
∗∗∗ Hitachi Energy Relion 670/650/SAM600-IO ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Insecure Default Initialization of Resource vulnerability in Hitachi Energy Relion 670/650/SAM600-IO Intelligent Electronic Devices (IEDs).
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-05
∗∗∗ Hitachi Energy APM Edge ∗∗∗
---------------------------------------------
This advisory contains mitigations for a Using Components with Known Vulnerabilities vulnerability in Hitachi Energy Transformer Asset Performance Management (APM) Edge software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-06
∗∗∗ Hitachi Energy PCM600 Update Manager ∗∗∗
---------------------------------------------
This advisory contains mitigations for a Improper Certificate Validation vulnerability in Hitachi Energy PCM600 Update Manager protection and control IED software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-07
∗∗∗ Hitachi Energy RTU500 series ∗∗∗
---------------------------------------------
This advisory contains mitigations for Observable Discrepancy, Buffer Over-read, and Out-of-bounds Read vulnerabilities in Hitachi Energy RTU500 remote terminal units.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-08
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 01-12-2021 18:00 − Donnerstag 02-12-2021 18:00
Handler: Wolfgang Menezes
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ New malware hides as legit nginx process on e-commerce servers ∗∗∗
---------------------------------------------
eCommerce servers are being targeted with remote access malware that hides on Nginx servers in a way that makes it virtually invisible to security solutions. [...] Because NginRAT hides as a normal Nginx process and the code exists only in the server’s memory, detecting it may be a challenge. However, the malware is launched using two variables, LD_PRELOAD and LD_L1BRARY_PATH. Administrators can use the latter, which contains the “typo,” to reveal the active malicious processes
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-malware-hides-as-legit-n…
∗∗∗ Nine WiFi routers used by millions were vulnerable to 226 flaws ∗∗∗
---------------------------------------------
Security researchers analyzed nine popular WiFi routers and found a total of 226 potential vulnerabilities in them, even when running the latest firmware.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/nine-wifi-routers-used-by-mi…
∗∗∗ WordPress Admin Creator – A Simple, But Effective Attack ∗∗∗
---------------------------------------------
Malicious admin users get added to vulnerable WordPress sites often. This can happen in a variety of different ways, and sometimes the malware that creates these malicious users can hide in plain sight. Injecting a malicious admin user into a WordPress site can allow attackers easy access back into a victims’ website after it has been cleaned.
---------------------------------------------
https://blog.sucuri.net/2021/12/wordpress-admin-creator-a-simple-but-effect…
∗∗∗ pip-audit ∗∗∗
---------------------------------------------
pip-audit is a tool for scanning Python environments for packages with known vulnerabilities. It uses the Python Packaging Advisory Database via the PyPI JSON API as a source of vulnerability reports.
---------------------------------------------
https://pypi.org/project/pip-audit/
∗∗∗ Digitale Vignette nur in offiziellen Shops kaufen! ∗∗∗
---------------------------------------------
Bereits ab 1. Dezember ist die Vignette für das Jahr 2022 auf österreichischen Autobahnen gültig. Die digitale Vignette kann dabei nicht nur an verschiedenen offiziellen Verkaufsstellen, sondern auch online gekauft werde. Das machen sich unseriöse AnbieterInnen zu Nutze und bieten die digitale Vignette ungerechtfertigt zu höheren Preisen an.
---------------------------------------------
https://www.watchlist-internet.at/news/digitale-vignette-nur-in-offiziellen…
∗∗∗ Azure Privilege Escalation via Azure API Permissions Abuse ∗∗∗
---------------------------------------------
In this post, I will explain how one of those permissions systems can be abused to escalate to Global Admin. I’ll explain how you as an attacker can abuse this system, and I will also explain how you as a defender can find, clean up, and prevent these abusable configurations.
---------------------------------------------
https://posts.specterops.io/azure-privilege-escalation-via-azure-api-permis…
∗∗∗ Windows 10/11: Falle beim "trusted" Apps-Installer; Emotet nutzt das ∗∗∗
---------------------------------------------
Hoh hoh, Leute, wir können heute das zweite Türchen im Adventskalender öffnen und schauen, was Microsoft so schönes dahinter versteckt hat, um Administratoren zu erschrecken. Heute finden wir den AppX-Installer, der in Windows 10 und Windows 11 zum Installieren von Anwendungen und Apps verwendet wird. Hier ein kleiner Überblick, warum man das Wörtchen Trusted Apps nicht so ganz wörtlich nehmen soll. Denn der zugehörige Installer kann durchaus Malware auf das System spülen (Emotet nutzt das aktuell bei Angriffen), die Apps aber wegen eines gravierenden Design-Fehlers als Trusted ausweisen.
---------------------------------------------
https://www.borncity.com/blog/2021/12/02/windows-10-11-falle-beim-trusted-a…
=====================
= Vulnerabilities =
=====================
∗∗∗ BigSig-Lücke: Mozilla schließt kritische Schwachstelle in Krypto-Bibliothek NSS ∗∗∗
---------------------------------------------
Setzen Anwendungen zur sicheren Kommunikation Mozillas Network Security Services ein, könnte eine kritische Lücke für Probleme sorgen. [...] Die Programmbibliothek kommt beispielsweise im E-Mail-Client Thunderbird, LibreOffice und verschiedenen PDF-Betrachtern zum Einsatz. Einer Warnmeldung von Mozilla zufolge ist der hauseigene Webbrowser Firefox nicht von der als „kritisch“ eingestuften Sicherheitslücke (CVE-2021-43527) betroffen.
---------------------------------------------
https://heise.de/-6281977
∗∗∗ Multiple missing authorization vulnerabilities in WordPress Plugin "Advanced Custom Fields" ∗∗∗
---------------------------------------------
Users of this product may do the following:
- Browse unauthorized data on the database - CVE-2021-20865
- Obtain a list of information that an user do not have the privilege for - CVE-2021-20866
- Move field groups that an user do not have permission to use - CVE-2021-20867
Solution: Update the plugin
---------------------------------------------
https://jvn.jp/en/jp/JVN09136401/
∗∗∗ ZDI-21-1373: Jenkins Report Info XML External Entity Processing Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Jenkins Report Info. Authentication is required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1373/
∗∗∗ Multiple vulnerabilities in OrbiTeam BSCW Server ∗∗∗
---------------------------------------------
The BSCW Server of OrbiTeam Software GmbH & Co. KG is prone to multiple vulnerabilities like reflected and stored XSS, LFI and Open Redirect. It is possible to chain these vulnerabilities and compromise the server even without a valid login.
---------------------------------------------
https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (kernel, openssh, and rpm), Debian (nss), Fedora (seamonkey), Mageia (glibc), openSUSE (go1.16, go1.17, kernel, mariadb, netcdf, openexr, poppler, python-Pygments, python-sqlparse, ruby2.5, speex, and webkit2gtk3), Oracle (nss), Red Hat (nss), SUSE (clamav, glibc, gmp, go1.16, go1.17, kernel, mariadb, netcdf, OpenEXR, openexr, openssh, poppler, python-Pygments, python-sqlparse, ruby2.1, ruby2.5, speex, webkit2gtk3, and xen), and Ubuntu (nss and thunderbird).
---------------------------------------------
https://lwn.net/Articles/877410/
∗∗∗ Delta Electronics CNCSoft - ICS Advisory (ICSA-21-334-03) ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-334-03
∗∗∗ Security Bulletin: OpenSSH for IBM i is affected by CVE-2021-41617 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-openssh-for-ibm-i-is-affe…
∗∗∗ Security Bulletin: Apache Commons FileUpload vulnerability affects IBM Tivoli Business Service Manager (CVE-2013-0248) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-apache-commons-fileupload…
∗∗∗ Security Bulletin: Security Vulnerabilities in IBM SDK, Java Technology Edition Quarterly CPU – Oct 2020 – affect multiple IBM Continuous Engineering products based on IBM Jazz Technology ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-…
∗∗∗ Security Bulletin: IBM Cloud Pak for Multicloud Management Monitoringhas applied security fixes for its use of Mozilla Firefox ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-multicl…
∗∗∗ Security Bulletin: IBM Cloud Pak for Multicloud Management Monitoring has applied security fixes for its use of Netty.io ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-multicl…
∗∗∗ Security Bulletin: IBM QRadar SIEM is vulnerable to using components with known vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-is-vulner…
∗∗∗ Security Bulletin: IBM Cloud Pak for Multicloud Management Monitoringhas applied security fixes for its use of Mozilla Firefox ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-multicl…
∗∗∗ Security Bulletin: IBM Cloud Pak for Multicloud Management Monitoring has applied security fixes for its use of Mozilla Firefox ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-multicl…
∗∗∗ Security Bulletin: IBM QRadar SIEM Application Framework v1 (CentOS6) is End of Life ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-applicati…
∗∗∗ Security Bulletin: IBM Cloud Pak for Multicloud Management has applied security fixes for its use of Apache Commons ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-multicl…
∗∗∗ Security Bulletin: Apache Wink as used by IBM Disconnected Log Collector is vulnerable to an XML External Entity Error (XXE) (CVE-2010-2245) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-apache-wink-as-used-by-ib…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 30-11-2021 18:00 − Mittwoch 01-12-2021 18:00
Handler: Wolfgang Menezes
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Microsoft Exchange servers hacked to deploy BlackByte ransomware ∗∗∗
---------------------------------------------
BlackByte ransomware actors were observed exploiting the ProxyShell set of vulnerabilities (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) to compromise Microsoft Exchange servers.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-h…
∗∗∗ Info-Stealer Using webhook.site to Exfiltrate Data, (Wed, Dec 1st) ∗∗∗
---------------------------------------------
We already reported multiple times that, when you offer an online (cloud) service, there are a lot of chances that it will be abused for malicious purposes. I spotted an info-stealer that exfiltrates data through webhook.site.
---------------------------------------------
https://isc.sans.edu/diary/rss/28088
∗∗∗ Injection is the New Black: Novel RTF Template Inject Technique Poised for Widespread Adoption Beyond APT Actors ∗∗∗
---------------------------------------------
RTF template injection is a novel technique that is ideal for malicious phishing attachments because it is simple and allows threat actors to retrieve malicious content from a remote URL using an RTF file.
---------------------------------------------
https://www.proofpoint.com/us/blog/threat-insight/injection-new-black-novel…
∗∗∗ l+f: Emotet-Fehlalarm vom Microsoft Defender ∗∗∗
---------------------------------------------
Microsofts Virenschutz hat Nutzer und Administratoren unnötig aufgeschreckt: Ein fehlerhaftes Erkennungs-Update sah Emotet-Infektionen, wo keine waren.
---------------------------------------------
https://heise.de/-6280766
∗∗∗ Tracking a P2P network related with TA505 ∗∗∗
---------------------------------------------
For the past few months, NCC Group has been tracking very closely the operations of TA505 and the development of different projects (e.g. Clop) by them.
---------------------------------------------
https://research.nccgroup.com/2021/12/01/tracking-a-p2p-network-related-wit…
∗∗∗ Vulnerability Spotlight: Use-after-free condition in Google Chrome could lead to code execution ∗∗∗
---------------------------------------------
Cisco Talos recently discovered an exploitable use-after-free vulnerability in Google Chrome.
---------------------------------------------
http://blog.talosintelligence.com/2021/12/vuln-spotlight-chrome-.html
∗∗∗ E-Mail: „Ihr Paket ist in der Warteschleife“ ist Fake ∗∗∗
---------------------------------------------
Warten Sie gerade auf ein Paket? Dann nehmen Sie sich vor E-Mails mit dem Betreff „Ihr Paket ist in der Warteschleife“ in Acht. Kriminelle geben sich als DHL aus und behaupten, dass Zollgebühren ausständig sind.
---------------------------------------------
https://www.watchlist-internet.at/news/e-mail-ihr-paket-ist-in-der-wartesch…
∗∗∗ Play Your Cards Right: Detecting Wildcard DNS Abuse ∗∗∗
---------------------------------------------
Wildcard DNS records can be used constructively, but their flexibility also provides attackers with a variety of options for executing attacks.
---------------------------------------------
https://unit42.paloaltonetworks.com/wildcard-dns-abuse/
∗∗∗ Shodan Verified Vulns 2021-12-01 ∗∗∗
---------------------------------------------
Insgesamt gibt es kaum Veränderungen zum Vormonat, wobei die Anzahl der verwundbaren Microsoft Exchange Server relativ deutlich zurückging – Props an die Administrator:innen!
---------------------------------------------
https://cert.at/de/aktuelles/2021/12/shodan-verified-vulns-2021-12-01
∗∗∗ CISA Adds Five Known Exploited Vulnerabilities to Catalog ∗∗∗
---------------------------------------------
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/12/01/cisa-adds-five-kn…
∗∗∗ FBI document shows what data can be obtained from encrypted messaging apps ∗∗∗
---------------------------------------------
A recently discovered FBI training document shows that US law enforcement can gain limited access to the content of encrypted messages from secure messaging services like iMessage, Line, and WhatsApp, but not to messages sent via Signal, Telegram, Threema, Viber, WeChat, or Wickr.
---------------------------------------------
https://therecord.media/fbi-document-shows-what-data-can-be-obtained-from-e…
=====================
= Vulnerabilities =
=====================
∗∗∗ IBM Security Bulletins 2021-11-30 ∗∗∗
---------------------------------------------
IBM QRadar SIEM, IBM Integration Bus, IBM App Connect Enterprise, IBM HTTP Server, IBM Cloud Pak for Data, IBM Watson Discovery for IBM Cloud Pak for Data, IBM Match 360, IBM SDK (Java™ Technology Edition), IBM WebSphere Application Server
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (rsync, rsyslog, and uriparser), Fedora (containerd, freeipa, golang-github-containerd-ttrpc, libdxfrw, libldb, librecad, mingw-speex, moby-engine, samba, and xen), Red Hat (kernel, kernel-rt, kpatch-patch, and samba), and Ubuntu (linux, linux-aws, linux-aws-5.11, linux-azure, linux-azure-5.11, linux-gcp, linux-gcp-5.11, linux-hwe-5.11, linux-kvm, linux-oracle, linux-oracle-5.11, linux-raspi, linux, linux-aws, linux-aws-5.4, linux-azure, linux-gcp, [...])
---------------------------------------------
https://lwn.net/Articles/877284/
∗∗∗ Verwaltungssoftware Jamf Pro für Apple-Geräte könnte Zugangsdaten leaken ∗∗∗
---------------------------------------------
https://heise.de/-6281352
∗∗∗ Security Advisory - Buffer Overflow Vulnerability in Some Huawei Products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20211201-…
∗∗∗ XSS Vulnerability Patched in Plugin Designed to Enhance WooCommerce ∗∗∗
---------------------------------------------
https://www.wordfence.com/blog/2021/12/xss-vulnerability-patched-in-plugin-…
∗∗∗ Mozilla Foundation Security Advisory 2021-51: Memory corruption in NSS via DER-encoded DSA and RSA-PSS signatures ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
∗∗∗ Mitsubishi Electric MELSEC and MELIPC Series ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-334-02
∗∗∗ Johnson Controls CEM Systems AC2000 ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-334-04
∗∗∗ Hitachi Energy Retail Operations and CSB Software ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-334-05
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 29-11-2021 18:00 − Dienstag 30-11-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Printing Shellz: Sicherheitslücken in HP-Druckern/-Multifunktionsgeräten ∗∗∗
---------------------------------------------
Passend zum 30. November, dem Computer Security Day habe ich noch was. Es gibt eine Sicherheitslücke in der Firmware bestimmter HP LaserJet, HP LaserJet Managed, HP PageWide und HP PageWide Managed Produkte. Diese sind möglicherweise für einen Pufferüberlauf anfällig. Das bedeutet, Angreifer könnten Druckaufträge oder Scans abfangen und ggf. die Firmennetzwerke lahmlegen.
---------------------------------------------
https://www.borncity.com/blog/2021/11/30/printing-shellz-sicherheitslcken-i…
∗∗∗ Gefälschtes BAWAG SMS im Umlauf ∗∗∗
---------------------------------------------
Momentan kursieren gefälschte SMS-Nachrichten im Namen der BAWAG. Im SMS mit „BawagPSK“ als Absender werden EmpfängerInnen darüber informiert, dass ihr Konto angeblich gesperrt wurde und eine Sicherheitsapp installiert werden muss. Klicken Sie keinesfalls auf den Link. Dieser führt auf eine gefälschte BAWAG-Website!
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschtes-bawag-sms-im-umlauf/
∗∗∗ Malicious USB drives: Still a security problem ∗∗∗
---------------------------------------------
A malicious USB drive dropped in a parking lot - this image has become a bit of a trope in IT security circles. Still, the threat is very real and more relevant than ever.
---------------------------------------------
https://www.gdatasoftware.com/blog/2021/11/usb-drives-still-a-danger
∗∗∗ What We’ve Learned About SSH Brute Force Attacks ∗∗∗
---------------------------------------------
The first time I encountered brute force attacks I was a hosting specialist who received calls from frustrated site owners that wanted to know who’d gained access to their server. Many of them didn’t understand the importance of a password’s character strength, or how frequent attacks on “root” are as a username, including myself at one point in time. I’ve learned more about SSH Brute Force attacks throughout my years at Sucuri.
---------------------------------------------
https://blog.sucuri.net/2021/11/what-weve-learned-about-ssh-brute-force-att…
∗∗∗ 300.000+ infections via Droppers on Google Play Store ∗∗∗
---------------------------------------------
In this blog we will discuss the recent techniques used to spread Android banking trojans via Google Play (MITRE T1475) resulting in significant financial loss for targeted banks. We will also discuss the, sometimes forgotten, by-product of collecting contacts and keystrokes by Banking trojans, resulting in severe data leakage.
---------------------------------------------
https://www.threatfabric.com/blogs/deceive-the-heavens-to-cross-the-sea.html
∗∗∗ Sabbath Ransomware Operators Target Critical Infrastructure ∗∗∗
---------------------------------------------
Since June 2021, a relatively new ransomware group called Sabbath has been targeting critical infrastructure in the United States and Canada, including education, health and natural resources.
---------------------------------------------
https://www.securityweek.com/sabbath-ransomware-operators-target-critical-i…
∗∗∗ Yanluowang: Further Insights on New Ransomware Threat ∗∗∗
---------------------------------------------
At least one attacker now using Yanluowang may have previously been linked to Thieflock ransomware operation.
---------------------------------------------
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ya…
∗∗∗ Kernel Karnage – Part 5 (I/O & Callbacks) ∗∗∗
---------------------------------------------
After showing interceptor’s options, it’s time to continue coding! On the menu are registry callbacks, doubly linked lists and a struggle with I/O in native C.
---------------------------------------------
https://blog.nviso.eu/2021/11/30/kernel-karnage-part-5-i-o-callbacks/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (samba), Fedora (kernel), openSUSE (netcdf and tor), SUSE (netcdf and python-Pygments), and Ubuntu (imagemagick).
---------------------------------------------
https://lwn.net/Articles/877186/
∗∗∗ ZDI-21-1371: (0Day) Esri ArcReader PMF File Parsing Use-After-Free Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1371/
∗∗∗ ZDI-21-1370: (0Day) Esri ArcReader PMF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1370/
∗∗∗ Trend Micro Produkte: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1244
∗∗∗ Cross-Site Request Forgery im Team Password Manager (SYSS-2021-059) ∗∗∗
---------------------------------------------
https://www.syss.de/pentest-blog/cross-site-request-forgery-im-team-passwor…
∗∗∗ Host Header Poisoning im Team Password Manager (SYSS-2021-060) ∗∗∗
---------------------------------------------
https://www.syss.de/pentest-blog/host-header-poisoning-im-team-password-man…
∗∗∗ Advisory: Vulnerabilities in B&R Automation Studio and PVI Windows Services ∗∗∗
---------------------------------------------
https://www.br-automation.com/downloads_br_productcatalogue/assets/16367454…
∗∗∗ Advisory: Number:Jack in B&R Products ∗∗∗
---------------------------------------------
https://www.br-automation.com/downloads_br_productcatalogue/assets/16367454…
∗∗∗ Security Bulletin: Vulnerability in Apache Log4j may affect Cúram Social Program Management (CVE-2019-17571) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-l…
∗∗∗ Security Bulletin: A Security Vulnerability in IBM® WebSphere Application Server Liberty affect IBM LKS Administration and Reporting Tool and its Agent ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-…
∗∗∗ Security Bulletin: IBM MQ Appliance is affected by a sensitive information disclosure vulnerability (CVE-2021-38999) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-appliance-is-affec…
∗∗∗ Security Bulletin: Multiple Vulnerabilities in WebSphere Application Server Liberty affect IBM Operations Analytics – Log Analysis (CVE-2021-35517, CVE-2021-36090) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities affect IBM HTTP Server (powered by Apache) for i ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Publicly disclosed vulnerability in GNU Binutils affects IBM Netezza Performance Server ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-publicly-disclosed-vulner…
∗∗∗ Security Bulletin: IBM MQ Appliance is affected by a code injection vulnerability (CVE-2021-38967) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-appliance-is-affec…
∗∗∗ Security Bulletin: A Security Vulnerability in IBM Java Runtime affects IBM License Key Server Administration and Reporting Tool and its Agent ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-…
∗∗∗ Security Bulletin: IBM MQ Appliance is affected by a disclosure of sensitive information vulnerability (CVE-2021-39000) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-appliance-is-affec…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 26-11-2021 18:00 − Montag 29-11-2021 18:00
Handler: Wolfgang Menezes
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ TrickBot phishing checks screen resolution to evade researchers ∗∗∗
---------------------------------------------
The TrickBot malware operators have been using a new method to check the screen resolution of a victim system to evade detection of security software and analysis by researchers.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/trickbot-phishing-checks-scr…
∗∗∗ IT-Security: ETSI veröffentlicht erste Norm für sichere Smartphones ∗∗∗
---------------------------------------------
Ein neuer Standard des europäischen Normungsinstituts ETSI soll Herstellern weltweit helfen, die IT-Sicherheit bei Mobiltelefonen für Verbraucher zu erhöhen.
---------------------------------------------
https://heise.de/-6278376
∗∗∗ Google-Analyse: Cloud-Dienste durch schwache Passwörter angreifbar ∗∗∗
---------------------------------------------
Das Unternehmen hat Einbrüche in Cloud-Instanzen untersucht, nennt Ursachen und liefert daraus resultierende Handlungsempfehlungen.
---------------------------------------------
https://heise.de/-6277514
∗∗∗ Micropatching Unpatched Local Privilege Escalation in Mobile Device Management Service (CVE-2021-24084 / 0day) ∗∗∗
---------------------------------------------
In June 2021, security researcher Abdelhamid Naceri published a blog post about an "unpatched information disclosure" vulnerability in Windows. The post details the mechanics of the issue and its exploitation, allowing a non-admin Windows user to read arbitrary files even if they do not have permissions to do so.
---------------------------------------------
https://blog.0patch.com/2021/11/micropatching-unpatched-local-privilege.html
∗∗∗ Ghidra 101: Binary Patching ∗∗∗
---------------------------------------------
There are several circumstances where it can be helpful to make a modification to code or data within a compiled program. Sometimes, it is necessary to fix a vulnerability or compatibility issue without functional source code or compilers. This can happen when source code gets lost, systems go out of support, or software firms go out of business. In case you should find yourself in this situation, keep calm and read on to learn how to do this within Ghidra.
---------------------------------------------
https://www.tripwire.com/state-of-security/security-data-protection/ghidra-…
∗∗∗ AVM warnt vor Phishing-Mails mit FRITZ!Box-Anrufbeantworternachricht ∗∗∗
---------------------------------------------
Der Hersteller der FRITZ!Boxen, die Berliner-Firma AVM warnt aktuell von einer Welle von Phishing-Mails, die im Anhang angeblich eine Sprachnachricht des FRITZ!Box-Anrufbeantworters enthalten. Wer diesen Anhang per Doppelklick unter Windows abhören möchte, installiert sich Schadsoftware.
---------------------------------------------
https://www.borncity.com/blog/2021/11/28/avm-warnt-vor-phishing-mails-mit-f…
∗∗∗ Cobalt Strike: Decrypting DNS Traffic – Part 5 ∗∗∗
---------------------------------------------
Cobalt Strike beacons can communicate over DNS. We show how to decode and decrypt DNS traffic in this blog post.
---------------------------------------------
https://blog.nviso.eu/2021/11/29/cobalt-strike-decrypting-dns-traffic-part-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Backdoor.Win32.Coredoor.10.a / Authentication Bypass RCE ∗∗∗
---------------------------------------------
Description: The malware listens on TCP port 21000. Third-party attackers who can reach infected systems can logon using any username/password combination. Intruders may then upload executables using ftp PASV, STOR commands, this can result in remote code execution.
---------------------------------------------
https://cxsecurity.com/issue/WLB-2021110120
∗∗∗ FortiClientWindows & FortiClient EMS - Privilege escalation via DLL Hijacking ∗∗∗
---------------------------------------------
An unsafe search path vulnerability in FortiClient and FortiClient EMS may allow an attacker to perform a DLL Hijack attack on affected devices via a malicious OpenSSL engine library in the search path.
---------------------------------------------
https://www.fortiguard.com/psirt/FG-IR-21-088
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (bluez, icu, libntlm, libvorbis, libvpx, opensc, roundcube, and tar), Fedora (kernel, kernel-headers, kernel-tools, puppet, slurm, stargz-snapshotter, and suricata), openSUSE (netcdf), Oracle (bluez, kernel, kernel-container, krb5, mailman:2.1, openssh, python3, and rpm), Red Hat (samba), and SUSE (xen).
---------------------------------------------
https://lwn.net/Articles/877105/
∗∗∗ Insulet OmniPod Insulin Management System vulnerability ∗∗∗
---------------------------------------------
https://omnipod.lyrebirds.dk/
∗∗∗ Security Bulletin: Vulnerability in IBM SDK Java affects IBM Cloud Pak System (CVE-2020-27221) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-ibm-sdk-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 25-11-2021 18:00 − Freitag 26-11-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ IT threat evolution Q3 2021 ∗∗∗
---------------------------------------------
WildPressure and LuminousMoth threat actors, FinSpy implants, zero-day vulnerabilities and PrintNightmare, threats for Linux and macOS in our review of Q3 2021.
---------------------------------------------
https://securelist.com/it-threat-evolution-q3-2021/104876/
∗∗∗ YARAs Private Strings, (Thu, Nov 25th) ∗∗∗
---------------------------------------------
YARA supports private strings. A string can be marked as private by including string modifier "private". Here is a use case. [...]
---------------------------------------------
https://isc.sans.edu/diary/rss/28010
∗∗∗ Searching for Exposed ASUS Routers Vulnerable to CVE-2021-20090, (Fri, Nov 26th) ∗∗∗
---------------------------------------------
Over the past 7 days, my honeypot captured a few hundred POST for a vulnerability which appeared to be tracked as a critical path traversal vulnerability in the web interfaces of routers with Arcadyan firmware. If successfully exploited, could allow unauthenticated remote actors to bypass authentication and add the router to the botnet Mirai botnet.
---------------------------------------------
https://isc.sans.edu/diary/rss/28072
∗∗∗ EU needs more cybersecurity graduates, says ENISA infosec agency – pointing at growing list of masters degree courses ∗∗∗
---------------------------------------------
The EU needs more cybersecurity graduates to plug the political blocs shortage of skilled infosec bods, according to a report from the ENISA online security agency.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2021/11/26/enisa_cybers…
∗∗∗ RATDispenser: JavaScript-Loader installiert Remote Access Trojaners (RAT) in Windows ∗∗∗
---------------------------------------------
Noch ein kurzer Nachtrag in Punkto Sicherheit, welcher mir die Tage unter die Augen gekommen ist. Die Sicherheitsforscher von HP Thread-Research sind auf einen in JavaScript geschriebenen Loader gestoßen, der auf Windows-Systemen Remote Access Trojaner (RAT) installiert. Der Entwickler scheint [...]
---------------------------------------------
https://www.borncity.com/blog/2021/11/26/ratdispenser-javascript-loader-ins…
=====================
= Vulnerabilities =
=====================
∗∗∗ Exclusive: Resecurity discovered 0-day vulnerability in TP-Link Wi-Fi 6 devices ∗∗∗
---------------------------------------------
Resecurity researchers found a zero-day vulnerability in the TP-Link enterprise device with model number TL-XVR1800L. Resecurity, a Los Angeles-based cybersecurity company has identified an active a zero-day vulnerability in the TP-Link device with model number TL-XVR1800L (Enterprise AX1800 Dual Band Gigabit Wi-Fi 6 Wireless VPN Router), which is primarily suited to enterprises.
---------------------------------------------
https://securityaffairs.co/wordpress/125016/hacking/0-day-tp-link-wi-fi-6.h…
∗∗∗ Angreifer könnten die Kontrolle über Videoüberwachungssysteme von Qnap erlangen ∗∗∗
---------------------------------------------
Ein wichtiges Update schließt unter anderem eine kritische Lücke in einigen Netzwerk-Videorekordern von Qnap.
---------------------------------------------
https://heise.de/-6277445
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (freerdp, gnome-boxes, gnome-connections, gnome-remote-desktop, guacamole-server, hydra, java-1.8.0-openjdk-aarch32, medusa, mingw-gstreamer1, mingw-gstreamer1-plugins-bad-free, mingw-gstreamer1-plugins-base, mingw-gstreamer1-plugins-good, php, pidgin-sipe, remmina, vinagre, and weston), openSUSE (kernel and netcdf), and SUSE (kernel and netcdf).
---------------------------------------------
https://lwn.net/Articles/876922/
∗∗∗ Zoom Video Communications Produkte: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1235
∗∗∗ Security Bulletin: Vulnerability in jsoup may affect Cúram Social Program Management (CVE-2021-37714) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-jsoup-ma…
∗∗∗ Security Bulletin: Vulnerability in Apache Log4j may affect Cúram Social Program Management (CVE-2020-9488) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-l…
∗∗∗ Security Bulletin: Vulnerabilities affect IBM Netcool Agile Service Manager ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-affect-ib…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Netcool Agile Service Manager ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Vulnerability in Dojo may affect IBM Cúram Social Program Management (CVE-2018-15494) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-dojo-may…
∗∗∗ Security Bulletin: Vulnerability in Apache Santuario XML Security for Java may affect Cúram Social Program Management (CVE-2021-40690) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-s…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 24-11-2021 18:00 − Donnerstag 25-11-2021 18:00
Handler: Wolfgang Menezes
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ New CronRAT malware infects Linux systems using odd day cron jobs ∗∗∗
---------------------------------------------
Security researchers have discovered a new remote access trojan (RAT) for Linux that keeps an almost invisible profile by hiding in tasks scheduled for execution on a non-existent day, February 31st.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-cronrat-malware-infects-…
∗∗∗ Discord malware campaign targets crypto and NFT communities ∗∗∗
---------------------------------------------
A new malware campaign on Discord uses the Babadeda crypter to hide malware that targets the crypto, NFT, and DeFi communities.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/discord-malware-campaign-tar…
∗∗∗ Improving security for mobile devices: CISA issues guides ∗∗∗
---------------------------------------------
CISA has released actionable guides with advice on how to improve security for mobile devices, both for consumers and organizations.
---------------------------------------------
https://blog.malwarebytes.com/android/2021/11/improving-security-for-mobile…
∗∗∗ Bitcoin-Erpressung mit Masturbationsaufnahmen ∗∗∗
---------------------------------------------
Alle Jahre wieder versuchen Kriminelle durch erfundene Behauptungen, Geld zu erpressen. Angeblich wurden Ihre Systeme gehackt und Sie dadurch während dem Aufruf pornografischer Inhalte gefilmt. Die Nachricht ist frei erfunden und wird massenhaft ausgesendet.
---------------------------------------------
https://www.watchlist-internet.at/news/bitcoin-erpressung-mit-masturbations…
∗∗∗ Sophisticated Tardigrade malware launches attacks on vaccine manufacturing infrastructure ∗∗∗
---------------------------------------------
Security researchers are warning biomanufacturing facilities around the world that they are being targeted by a sophisticated new strain of malware, known as Tardigrade.
---------------------------------------------
https://www.tripwire.com/state-of-security/security-data-protection/sophist…
∗∗∗ Black-Friday-Spam-Kampagnen in den Startlöchern ∗∗∗
---------------------------------------------
Am 26. November 2021 ist Black Friday – da gibt es fast alles umsonst. Das ruft auch Cyber-Kriminelle auf den Plan und diese greifen Verbraucher verstärkt mit Online-Shopping-Betrugsversuchen an.
---------------------------------------------
https://www.borncity.com/blog/2021/11/25/black-friday-spam-kampagnen-in-den…
=====================
= Vulnerabilities =
=====================
∗∗∗ VMware dichtet Schwachstellen in vSphere Web Client ab - zum Teil ∗∗∗
---------------------------------------------
Der Hersteller meldet Sicherheitslücken, teils mit hohem Risiko. Es gibt jedoch noch nicht für alle betroffenen Produkte Updates.
---------------------------------------------
https://heise.de/-6276216
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (busybox, getdata, and php), Mageia (couchdb, freerdp, openexr, postgresql, python-reportlab, and rsh), openSUSE (bind, java-1_8_0-openjdk, and kernel), SUSE (java-1_7_0-openjdk), and Ubuntu (icu).
---------------------------------------------
https://lwn.net/Articles/876852/
∗∗∗ ModSecurity DoS Vulnerability in JSON Parsing (CVE-2021-42717) ∗∗∗
---------------------------------------------
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity…
∗∗∗ Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021 ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security Bulletin: Vulnerabilities in Apache Ant affect IBM Installation Manager and IBM Packaging Utility ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-apache…
∗∗∗ Security Bulletin: WebSphere Application Server is vulnerable to a Privilege Escalation vulnerability and affects Content Collector for Email ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-websphere-application-ser…
∗∗∗ Security Bulletin: Vulnerabilities affect IBM Netcool Agile Service Manager ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-affect-ib…
∗∗∗ Security Bulletin: Vulnerabilities in Node.js affect IBM Integration Bus v10 (CVE-2021-32803) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-node-j…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Netcool Agile Service Manager ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: A vulnerability in IBM Java Runtime affects IBM Installation Manager and IBM Packaging Utility ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-ibm-ja…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 23-11-2021 18:00 − Mittwoch 24-11-2021 18:00
Handler: Wolfgang Menezes
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Phishing page hiding itself using dynamically adjusted IP-based allow list, (Wed, Nov 24th) ∗∗∗
---------------------------------------------
It can be instructive to closely examine even completely usual-looking phishing messages from time to time, since they may lead one to unusual phishing sites or may perhaps use some novel technique that might not be obvious at first glance.
---------------------------------------------
https://isc.sans.edu/diary/rss/28070
∗∗∗ Hunting for Persistence in Linux (Part 1): Auditd, Sysmon, Osquery, and Webshells ∗∗∗
---------------------------------------------
This blog series explores methods attackers might use to maintain persistent access to a compromised linux system.
---------------------------------------------
https://pberba.github.io/security/2021/11/22/linux-threat-hunting-for-persi…
∗∗∗ Nach Windows-Update: Zero-Day-Lücke erlaubt lokale Rechteausweitung ∗∗∗
---------------------------------------------
Eines der Windows-Updates im November sollte eine gefährliche Lücke schließen. Doch sie lässt sich noch immer zur Erhöhung der eigenen Rechte missbrauchen.
---------------------------------------------
https://heise.de/-6274893
∗∗∗ Vorsicht vor Love Scams auf Facebook Dating! ∗∗∗
---------------------------------------------
Immer wieder melden uns besorgte LeserInnen sogenannte Love- oder Romance-Scammer. Dabei handelt es sich um Online-Bekanntschaften, die sich durch Liebesbeteuerungen das Vertrauen der Opfer erschleichen.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-love-scams-auf-facebook…
∗∗∗ New JavaScript malware works as a “RAT dispenser” ∗∗∗
---------------------------------------------
Cybersecurity experts from HP said they discovered a new strain of JavaScript malware that criminals are using as a way to infect systems and then deploy much dangerous remote access trojans (RATs).
---------------------------------------------
https://therecord.media/new-javascript-malware-works-as-a-rat-dispenser/
∗∗∗ ASEC Weekly Malware Statistics (November 15th, 2021 – November 21st, 2021) ∗∗∗
---------------------------------------------
This post will list weekly statistics collected from November 15th, 2021 (Monday) to November 21st, 2021 (Sunday).
---------------------------------------------
https://asec.ahnlab.com/en/28954/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (openjdk-17), Fedora (libxls, roundcubemail, and vim), openSUSE (bind, java-1_8_0-openjdk, and redis), Red Hat (kernel, kernel-rt, kpatch-patch, krb5, mailman:2.1, openssh, and rpm), Scientific Linux (kernel, krb5, openssh, and rpm), SUSE (bind, java-1_8_0-openjdk, redis, and webkit2gtk3), and Ubuntu (bluez).
---------------------------------------------
https://lwn.net/Articles/876799/
∗∗∗ Schwachstelle in MediaTek-Chips von Android-Smartphones ∗∗∗
---------------------------------------------
Sicherheitsforscher von Check Point haben in einer Android-APU, die APU ist die AI Processing Unit in MediaTek-Chips, eine Schwachstelle entdeckt. Die Sicherheitsforscher warnen, dass Nutzer über den Audio-Prozessor abgehört werden können. Die Mediatek-Chips sind in 37 % aller Android-Geräte verbaut.
---------------------------------------------
https://www.borncity.com/blog/2021/11/24/schwachstelle-in-mediatek-chips-vo…
∗∗∗ ZDI-21-1333: Adobe Creative Cloud Incorrect Permission Assignment Privilege Escalation Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1333/
∗∗∗ Security Advisory - Possible Out-Of-Bounds Read Vulnerability in Some Huawei Products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20211124-…
∗∗∗ Security Bulletin: Weak Cryptographic Control Vulnerability Affects IBM Sterling Connect:Direct Web Services (CVE-2021-38891) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-weak-cryptographic-contro…
∗∗∗ Security Bulletin: IBM Planning Analytics Workspace is affected by security vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-planning-analytics-wo…
∗∗∗ Security Bulletin: Account Lockout Vulnerability Affects IBM Sterling Connect:Direct Web Services (CVE-2021-38890) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-account-lockout-vulnerabi…
∗∗∗ Security Bulletin: PostgreSQL Sensitive Information Exposure Vulnerability Affects IBM Connect:Direct Web Services (CVE-2021-32029) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-postgresql-sensitive-info…
∗∗∗ K20072454: Linux kernel vulnerability CVE-2021-43267 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K20072454
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 22-11-2021 18:00 − Dienstag 23-11-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Warnung: ProxyShell, Squirrelwaffle und ein PoC-Eploit, patcht endlich eure Exchange-Server ∗∗∗
---------------------------------------------
Wie oft denn noch? Aktuell warne ich fast im Tagesrhythmus vor dem Betrieb ungepatchter Exchange-Schwachstellen und ProxyShell-Angriffen. Vor einigen Tagen hat Trend Micro eine Warnung vor Angriffen auf die ProxyShell-Schwachstellen über den Squirrelwaffle-Exploit und der Übernahme der Exchange-E-Mail-Postfächer gewarnt. Seit wenigen Stunden ist ein weitere Exploit als Proof of Concept öffentlich, die Ausnutzung gegen ungepatchte Exchange-Server ist wahrscheinlich. Patcht also endlich die Systeme.
---------------------------------------------
https://www.borncity.com/blog/2021/11/23/warnung-proxyshell-squirrelwaffle-…
∗∗∗ GoDaddy-Datenpanne betrifft 1,2 Millionen WordPress-Kunden ∗∗∗
---------------------------------------------
Hacker verschafft sich Zugang zu den persönlichen Daten von mehr als 1,2 Millionen Kunden des WordPress-Hostingdienstes von GoDaddy.
---------------------------------------------
https://heise.de/-6274187
∗∗∗ FBI warnt vor Einbrüchen via VPN-Software ∗∗∗
---------------------------------------------
Bei Untersuchungen stießen Strafverfolger vom FBI auf Sicherheitslücken in VPN-Software, durch die Cyberkriminelle derzeit in Netzwerke eindringen.
---------------------------------------------
https://heise.de/-6274101
∗∗∗ ZDF-Reportage: Wie Betrüger online abzocken ∗∗∗
---------------------------------------------
Wer sind die Cyber-Kriminellen hinter den unzähligen Fake-Shops und wie können sie entlarvt werden? "WISO crime" - ein ZDF-Format berichtet über Fake-Shops im Internet und versucht, einem Fake-Shop-Betreiber auf die Schliche zu kommen.
---------------------------------------------
https://www.watchlist-internet.at/news/zdf-reportage-wie-betrueger-online-a…
∗∗∗ Over nine million Android devices infected by info-stealing trojan ∗∗∗
---------------------------------------------
A large-scale malware campaign on Huaweis AppGallery has led to approximately 9,300,000 installs of Android trojans masquerading as over 190 different apps
---------------------------------------------
https://www.bleepingcomputer.com/news/security/over-nine-million-android-de…
∗∗∗ How to investigate service provider trust chains in the cloud ∗∗∗
---------------------------------------------
This blog outlines DART’s recommendations for incident responders to investigate potential abuse of these delegated admin permissions, independent of the threat actor.
---------------------------------------------
https://www.microsoft.com/security/blog/2021/11/22/how-to-investigate-servi…
∗∗∗ Simple YARA Rules for Office Maldocs, (Mon, Nov 22nd) ∗∗∗
---------------------------------------------
In diary entry "Extra Tip For Triage Of MALWARE Bazaar's Daily Malware Batches" I shared 2 simple YARA rules to triage Office documents with VBA code.
---------------------------------------------
https://isc.sans.edu/diary/rss/28062
∗∗∗ Observing Attacks Against Hundreds of Exposed Services in Public Clouds ∗∗∗
---------------------------------------------
Insecurely exposed services are common misconfigurations in cloud environments. We used a honeypot infrastructure to learn about attacks against them.
---------------------------------------------
https://unit42.paloaltonetworks.com/exposed-services-public-clouds/
∗∗∗ What to do if you receive a data breach notice ∗∗∗
---------------------------------------------
Receiving a breach notification doesn't mean you’re doomed - here's what you should consider doing in the hours and days after learning that your personal data has been exposed
---------------------------------------------
https://www.welivesecurity.com/2021/11/22/what-do-if-you-receive-data-breac…
∗∗∗ GÉANT launches new security services website ∗∗∗
---------------------------------------------
As technology becomes more complex and threats more sophisticated, it’s a challenge to keep any organisation’s online environment and physical infrastructure secure. Security services protect both the networks and services from attacks, but also help secure individuals using the networks.
---------------------------------------------
https://connect.geant.org/2021/11/23/geant-launches-new-security-services-w…
∗∗∗ The digital operational resilience act (DORA): what you need to know about it, the requirements and challenges we see. ∗∗∗
---------------------------------------------
TL;DR - In this blogpost, we will give you an introduction to DORA, as well as how you can prepare yourself to be ready for it. More specifically, throughout this blogpost we will try to formulate an answer to following questions: What is DORA and what are the key requirements of DORA? What are the biggest [...]
---------------------------------------------
https://blog.nviso.eu/2021/11/23/the-digital-operational-resilience-act-dor…
∗∗∗ GoSecure Investigates Abusing Windows Server Update Services (WSUS) to Enable NTLM Relaying Attacks ∗∗∗
---------------------------------------------
In part three of a series, GoSecure ethical hackers have found another way to exploit insecure Windows Server Update Services (WSUS) configurations. By taking advantage of the authentication provided by the Windows update client and relaying it to other domain services, we found this can lead to remote code execution. In this blog, we’ll share our findings and recommend mitigations.
---------------------------------------------
https://www.gosecure.net/blog/2021/11/22/gosecure-investigates-abusing-wind…
=====================
= Vulnerabilities =
=====================
∗∗∗ VMSA-2021-0027 ∗∗∗
---------------------------------------------
VMware vCenter Server updates address arbitrary file read and SSRF vulnerabilities (CVE-2021-21980, CVE-2021-22049)
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0027.html
∗∗∗ Xen Security Advisories ∗∗∗
---------------------------------------------
XSA-385 - guests may exceed their designated memory limit
XSA-387 - grant table v2 status pages may remain accessible after de-allocation (take two)
XSA-388 - PoD operations on misaligned GFNs
XSA-389 - issues with partially successful P2M updates on x86
---------------------------------------------
https://xenbits.xen.org/xsa/
∗∗∗ Vulnerability Spotlight: PHP deserialize vulnerability in CloudLinux Imunity360 could lead to arbitrary code execution ∗∗∗
---------------------------------------------
Cisco Talos recently discovered a vulnerability in the Ai-Bolit functionality of CloudLinux Inc Imunify360 that could lead to arbitrary code execution. Imunify360 is a security platform for web-hosting servers that allows users to configure various settings for real-time website protection and web server security.
---------------------------------------------
https://blog.talosintelligence.com/2021/11/vulnerability-spotlight-php-dese…
∗∗∗ A review of Azure Sphere vulnerabilities: Unsigned code execs, kernel bugs, escalation chains and firmware downgrades ∗∗∗
---------------------------------------------
Summary of all the vulnerabilities reported by Cisco Talos in Microsoft Azure Sphere
---------------------------------------------
https://blog.talosintelligence.com/2021/11/a-review-of-azure-sphere.html
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (mbedtls), Red Hat (kernel and rpm), and Ubuntu (freerdp2).
---------------------------------------------
https://lwn.net/Articles/876723/
∗∗∗ 0-Day LPE-Schwachstelle im Windows Installer (Nov. 2021) ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher hat eine eine 0-Day-Schwachstelle im Windows Installer gefunden, über die ein lokaler Angreifer Administratorrechte erlangen kann. Die Windows Installer Elevation of Privilege"-Schwachstelle CVE-2021-41379 ist zwar im November 2021 gepatcht worden. Aber es gibt eine Umgehungslösung, der Patch ist wirkungslos. Betroffen sind alle Windows-Versionen, einschließlich Windows 10, dass brandneue Windows 11 sowie alle Windows Server-Versionen.
---------------------------------------------
https://www.borncity.com/blog/2021/11/23/0-day-lpe-schwachstelle-im-windows…
∗∗∗ Security Bulletin: IBM MQ is vulnerable to multiple issues within the IBM® Runtime Environment Java™ Technology Edition, Version 8 shipped with IBM MQ (CVE-2021-2432, CVE-2021-2388) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-is-vulnerable-to-m…
∗∗∗ Security Bulletin: Vulnerability in MIT Kerberos 5 (CVE-2020-28196) affects HMC ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-mit-kerb…
∗∗∗ Security Bulletin: Vulnerability in Apache HTTP (CVE-2018-17199 and CVE-2020-11993) affects HMC ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-h…
∗∗∗ Security Bulletin: Application error in IBM Security Guardium Key Lifecycle Manager (CVE-2021-38980) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-application-error-in-ibm-…
∗∗∗ Security Bulletin: Vulnerability in Apache Tomcat (CVE-2021-42340) affects HMC ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-t…
∗∗∗ Security Bulletin: IBM MQ is vulnerable to a denial of service attack caused by an error processing messages. (CVE-2021-38875) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-is-vulnerable-to-a…
∗∗∗ Security Bulletin: Vulnerability in Bash (CVE-2019-18276) affects HMC ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-bash-cve…
∗∗∗ Security Bulletin: Vulnerability in bind (CVE-2021-25215) affects Power HMC ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-bind-cve…
∗∗∗ Security Bulletin: Vulnerability in glib2 (CVE-2021-27218 and CVE-2021-27219) affects Power HMC ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-glib2-cv…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 19-11-2021 18:00 − Montag 22-11-2021 18:00
Handler: Wolfgang Menezes
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Picky PPID Spoofing ∗∗∗
---------------------------------------------
Parent Process ID (PPID) Spoofing is one of the techniques employed by malware authors to blend in the target system. This is done by making the malicious process look like it was spawned by another process. This helps evade detections that are based on anomalous parent-child process relationships.
---------------------------------------------
https://captmeelo.com/redteam/maldev/2021/11/22/picky-ppid-spoofing.html
∗∗∗ Command injection prevention for Python ∗∗∗
---------------------------------------------
This is a command/code injection prevention cheat sheet by r2c. It contains code patterns of potential ways to run an OS command or arbitrary code in an application. Instead of scrutinizing code for exploitable vulnerabilities, the recommendations in this cheat sheet pave a safe road for developers that mitigates the possibility of command/code injection in your code.
---------------------------------------------
https://semgrep.dev/docs/cheat-sheets/python-command-injection/
∗∗∗ Missing Link: Wie sicher ist der Anonymisierungsdienst Tor? ∗∗∗
---------------------------------------------
Tor gilt als Wunderwaffe gegen den Überwachungswahn von Geheimdiensten. Wie gut lässt sich die Technologie knacken? Ist Tor tatsächlich NSA- und BND-proof?
---------------------------------------------
https://heise.de/-6272025
∗∗∗ Virtuelle Mobilfunknetze mit Open RAN: BSI sieht Sicherheitsrisiken ∗∗∗
---------------------------------------------
Mehr "Security by Design" empfehlen die Autoren einer Risikoanalyse des BSI für die Weiterentwicklung von Open RAN – nachträgliche Korrekturen seien aufwändig.
---------------------------------------------
https://heise.de/-6274060
∗∗∗ UEFI virtual machine firmware hardening through snapshots and attack surface reduction. (arXiv:2111.10167v1 [cs.SE]) ∗∗∗
---------------------------------------------
This paper introduces Amaranth project - a solution to some of the contemporary security issues related to UEFI firmware. In this work we focused our attention on virtual machines as it allowed us to simplify the development of secure UEFI firmware. Security hardening of our firmware is achieved through several techniques, the most important of which are an operating system integrity checking mechanism (through snapshots) and overall firmware size reduction.
---------------------------------------------
http://arxiv.org/abs/2111.10167
∗∗∗ Oh ... Ransomware verschlüsselt meine virtuellen Maschinen direkt im Hypervisor ... Wie jetzt? ∗∗∗
---------------------------------------------
Viele Ransomware- oder Ransomware-as-a-Service (RaaS)- Gruppen besitzen inzwischen die Fähigkeit, virtuelle Maschinen direkt auf Hypervisor-Ebene zu verschlüsseln. Das heisst, es sind nicht einzelne Clients, Workstations oder Server auf Windows Betriebsystem-Ebene, sondern alle Maschinen, die virtualisiert - auf zum Beispiel VMware ESXi oder Microsoft Hyper-V - laufen, gleichzeitig betroffen. Die Cybersecurityfirma Crowdstrike hat dieser Thematik zwei interessante Blog-Posts gewidmet
---------------------------------------------
https://cert.at/de/blog/2021/11/oh-ransomware-verschlusselt-meine-virtuelle…
∗∗∗ NSA and CISA Release Guidance on Securing 5G Cloud Infrastructures ∗∗∗
---------------------------------------------
CISA has announced the joint National Security Agency (NSA) and CISA publication of the second of a four-part series, Security Guidance for 5G Cloud Infrastructures. Part II: Securely Isolate Network Resources examines threats to 5G container-centric or hybrid container/virtual network, also known as Pods. The guidance provides several aspects of pod security including limiting permissions on deployed containers, avoiding resource contention and denial-of-service attacks, and implementing real-time threat detection.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/11/19/nsa-and-cisa-rele…
=====================
= Vulnerabilities =
=====================
∗∗∗ Vulnerability Spotlight: Multiple vulnerabilities in Advantech R-SeeNet ∗∗∗
---------------------------------------------
R-SeeNet is the software system used for monitoring Advantech routers. It continuously collects information from individual routers in the network and records the data into a SQL database. The vulnerabilities Talos discovered exist in various scripts inside of R-SeeNet's web applications.
CVEs: CVE-2021-21920, CVE-2021-21921, CVE-2021-21922, CVE-2021-21923, CVE-2021-21915, CVE-2021-21916, CVE-2021-21917, CVE-2021-21918, CVE-2021-21919, CVE-2021-21910, CVE-2021-21911, CVE-2021-21912
---------------------------------------------
http://blog.talosintelligence.com/2021/11/re-see-net-advantched-vuln-spotli…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (firebird3.0, libmodbus, and salt), Fedora (js-jquery-ui and wordpress), Mageia (arpwatch, chromium-browser-stable, php, rust, and wireshark), openSUSE (barrier, firefox, hylafax+, opera, postgresql12, postgresql13, postgresql14, and tomcat), SUSE (ardana-ansible, ardana-monasca, crowbar-openstack, influxdb, kibana, openstack-cinder, openstack-ec2-api, openstack-heat-gbp, openstack-heat-templates, openstack-horizon-plugin-gbp-ui, openstack-keystone, openstack-neutron-gbp, openstack-nova, python-eventlet, rubygem-redcarpet, rubygem-puma, ardana-ansible, ardana-monasca, documentation-suse-openstack-cloud, openstack-ec2-api, openstack-heat-templates, python-Django, python-monasca-common, rubygem-redcarpet, rubygem-puma, firefox, kernel, postgresql, postgresql13, postgresql14, postgresql10, postgresql12, postgresql13, postgresql14, postgresql96, and samba), and Ubuntu (libreoffice).
---------------------------------------------
https://lwn.net/Articles/876655/
∗∗∗ Serious Vulnerabilities Found in Wi-Fi Module Designed for Critical Industrial Applications ∗∗∗
---------------------------------------------
Talos has published 18 separate advisories describing the vulnerabilities. The researchers have reproduced the vulnerabilities on Lantronix PremierWave 2050 version 8.9.0.0R4, and Talos claims there are no official patches for the security holes, despite the vendor knowing about them since June 15.
---------------------------------------------
https://www.securityweek.com/serious-vulnerabilities-found-wi-fi-module-des…
∗∗∗ ZDI-21-1332: Commvault CommCell AppStudioUploadHandler Arbitrary File Upload Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1332/
∗∗∗ ZDI-21-1331: Commvault CommCell Demo_ExecuteProcessOnGroup Exposed Dangerous Function Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1331/
∗∗∗ ZDI-21-1330: Commvault CommCell DownloadCenterUploadHandler Arbitrary File Upload Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1330/
∗∗∗ ZDI-21-1329: Commvault CommCell DataProvider JavaScript Sandbox Escape Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1329/
∗∗∗ ZDI-21-1328: Commvault CommCell CVSearchService Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1328/
∗∗∗ Security Bulletin: IBM MQ is vulnerable to a denial of service attack caused by an issue processing message properties. (CVE-2021-29843) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-is-vulnerable-to-a…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily