=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 03-10-2023 18:00 β Mittwoch 04-10-2023 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
βββ Sicherheitswarnung: Schwachstellen in Qualcomm-Treibern werden aktiv ausgenutzt βββ
---------------------------------------------
Mehrere Schwachstellen in Qualcomm-Treibern gefΓ€hrden Smartphones und Tablets weltweit. Patches sind vorhanden - zumindest bei den Herstellern.
---------------------------------------------
https://www.golem.de/news/sicherheitswarnung-schwachstellen-in-qualcomm-treβ¦
βββ Looney Tunables: Schwachstelle in C-Bibliothek gefΓ€hrdet Linux-Systeme βββ
---------------------------------------------
Eine PufferΓΌberlauf-Schwachstelle im dynamischen Lader von glibc ermΓΆglicht es Angreifern, auf Linux-Systemen Root-Rechte zu erlangen.
---------------------------------------------
https://www.golem.de/news/looney-tunables-schwachstelle-in-c-bibliothek-gefβ¦
βββ Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement βββ
---------------------------------------------
Microsoft security researchers recently identified an attack where attackers attempted to move laterally to a cloud environment through a SQL Server instance. The attackers initially exploited a SQL injection vulnerability in an application within the targetβs environment to gain access and elevated permissions to a Microsoft SQL Server instance deployed in an Azure Virtual Machine (VM).
---------------------------------------------
https://www.microsoft.com/en-us/security/blog/2023/10/03/defending-new-vectβ¦
βββ Optimizing WordPress: Security Beyond Default Configurations βββ
---------------------------------------------
Default configurations in software are not always the most secure. For example, you might buy a network-attached home security camera from your friendly neighborhood electronics store. While these are handy to keep an eye on your property from the comfort of your phone, they also typically come shipped with a default username and password. And since they are connected to the web, they can be accessed from anywhere. Attackers know this, [...]
---------------------------------------------
https://blog.sucuri.net/2023/10/optimizing-wordpress-security-beyond-defaulβ¦
βββ Warning: PyTorch Models Vulnerable to Remote Code Execution via ShellTorch βββ
---------------------------------------------
Cybersecurity researchers have disclosed multiple critical security flaws in the TorchServe tool for serving and scaling PyTorch models that could be chained to achieve remote code execution on affected systems. Israel-based runtime application security company Oligo, which made the discovery, has coined the vulnerabilities ShellTorch. "These vulnerabilities [...] can lead to a full chain Remote Code Execution (RCE), leaving countless thousands of services and end-users β including some of the world's largest companies β open to unauthorized access and insertion of malicious AI models, and potentially a full server takeover," [...]
---------------------------------------------
https://thehackernews.com/2023/10/warning-pytorch-models-vulnerable-to.html
βββ Patchday: Attacken auf Android 11, 12 und 13 beobachtet βββ
---------------------------------------------
Unter anderem Google hat wichtige Sicherheitsupdates fΓΌr Android-GerΓ€te verΓΆffentlicht. Zwei LΓΌcken haben Angreifer bereits im Visier.
---------------------------------------------
https://www.heise.de/-9324125.html
βββ Linux tries to dump Windows notoriously insecure RNDIS protocol βββ
---------------------------------------------
Here we go again. Linux developers are trying, once more, to rid Linux of Microsofts Remote Network Driver Interface Specification. Heres why its complicated.
---------------------------------------------
https://www.zdnet.com/home-and-office/networking/linux-tries-to-dump-windowβ¦
βββ Five Misconfigurations Threatening Your AWS Environment Today βββ
---------------------------------------------
In the ever-expanding realm of AWS, with over 200 services at your disposal, securing your cloud account configurations and mastering complex environments can feel like an overwhelming challenge. To help you prioritize and root them out, weβve put together a guide for AWS configurations that are most commonly overlooked. Here are five of the top misconfigurations that could be lurking in your AWS environment right now.
---------------------------------------------
https://blog.aquasec.com/five-misconfigurations-threatening-your-aws-enviroβ¦
=====================
= Vulnerabilities =
=====================
βββ CVE-2023-22515 - Privilege Escalation Vulnerability in Confluence Data Center and Server βββ
---------------------------------------------
Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
---------------------------------------------
https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalatiβ¦
βββ Security updates for Wednesday βββ
---------------------------------------------
Security updates have been issued by Debian (glibc, postgresql-11, and thunderbird), Fedora (openmpi, pmix, prrte, and slurm), Gentoo (glibc and libvpx), Oracle (kernel), Red Hat (kernel), Slackware (libX11 and libXpm), SUSE (firefox, kernel, libeconf, libqb, libraw, libvpx, libX11, libXpm, mdadm, openssl-1_1, poppler, postfix, python311, rubygem-puma, runc, and vim), and Ubuntu (freerdp2, glibc, grub2-signed, grub2-unsigned, libx11, libxpm, linux-intel-iotg, linux-intel-iotg-5.15, linux-oracle, linux-oracle-5.15, and mozjs102).
---------------------------------------------
https://lwn.net/Articles/946496/
βββ New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks βββ
---------------------------------------------
Supermicro has released BMC IPMI firmware updates to address multiple vulnerabilities impacting select motherboard models.
---------------------------------------------
https://www.securityweek.com/new-supermicro-bmc-vulnerabilities-could-exposβ¦
βββ IBM Security Bulletins βββ
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 02-10-2023 18:00 β Dienstag 03-10-2023 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
βββ AVM: Fritzbox-Schwachstelle wohl ohne Fernzugriff ausnutzbar βββ
---------------------------------------------
Seit Anfang September verteilt AVM Sicherheitsupdates fΓΌr die Fritzbox. Inzwischen gibt es weitere Informationen zur gepatchten Schwachstelle.
---------------------------------------------
https://www.golem.de/news/avm-fritzbox-schwachstelle-wohl-ohne-fernzugriff-β¦
βββ Exclusive: Lighting the Exfiltration Infrastructure of a LockBit Affiliate (and more) βββ
---------------------------------------------
Researchers have identified the exfiltration infrastructure of a LockBit affiliate while investigating a LockBit extortion incident that occurred in Q3 2023.
---------------------------------------------
https://securityaffairs.com/151862/breaking-news/exfiltration-infrastructurβ¦
βββ BunnyLoader, a new Malware-as-a-Service advertised in cybercrime forums βββ
---------------------------------------------
Zscaler ThreatLabz researchers discovered a new malware-as-a-service (MaaS) that is called BunnyLoader, which has been advertised for sale in multiple cybercrime forums since September 4, 2023.
---------------------------------------------
https://securityaffairs.com/151869/malware/bunnyloader-maas.html
βββ Security researchers believe mass exploitation attempts against WS_FTP have begun βββ
---------------------------------------------
Security researchers have spotted what they believe to be a "possible mass exploitation" of vulnerabilities in Progress Softwares WS_FTP Server.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2023/10/02/ws_ftp_updatβ¦
βββ Cloudflare Protection Bypass Vulnerability on Threat Actorsβ Radar βββ
---------------------------------------------
Researchers have identified two mechanisms that hinge on the assumption that traffic originating from Cloudflare towards the origin server is inherently trustworthy, while traffic from other origins should be blocked.
---------------------------------------------
https://socradar.io/cloudflare-protection-bypass-vulnerability-on-threat-acβ¦
βββ Drei Fragen und Antworten: Der beste Schutz fΓΌr das Active Directory βββ
---------------------------------------------
Bis zu 90 Prozent aller Angriffe bedienen sich Microsofts Active Directory β es ist der Hebel, um die eigene Sicherheit zu verbessern. Wir zeigen, wie das geht.
---------------------------------------------
https://www.heise.de/news/Drei-Fragen-und-Antworten-Der-beste-Schutz-fuer-dβ¦
βββ Exim-LΓΌcke: Erste Patches laufen ein βββ
---------------------------------------------
Nach verschiedenen Kommunikationspannen hat das Exim-Team kritische SicherheitslΓΌcken im beliebten Mailserver behoben. Debian verteilt bereits Updates.
---------------------------------------------
https://www.heise.de/news/Exim-Luecke-Erste-Patches-laufen-ein-9323709.htmlβ¦
βββ Angriffe auf Γ€ltere Android-GerΓ€te: LΓΌcke in Mali-GPU nur teilweise geschlossen βββ
---------------------------------------------
Aufgrund mehrerer Schwachstellen im Treiber der Grafikeinheit Mali sind unter anderem Smartphone-Modelle von Samsung und Xiaomi verwundbar.
---------------------------------------------
https://www.heise.de/news/Angriffe-auf-aeltere-Android-Geraete-Luecke-in-Maβ¦
βββ Booking.com: Achtung bei βfehlgeschlagener Zahlungβ oder βVerifikation Ihrer Zahlungsinfosβ βββ
---------------------------------------------
FΓ€lle, in denen UnterkΓΌnfte ΓΌber booking.com gebucht wurden und Buchende anschlieΓend zur Verifikation ihrer Zahlungen oder zu einer neuerlichen Zahlung aufgefordert werden, hΓ€ufen sich aktuell. Vorsicht ist geboten, denn die Aufforderungen stammen von Kriminellen, die sich Zugang zu den Buchungsdaten verschaffen konnten und es nun auf das Geld der HotelgΓ€ste abgesehen haben!
---------------------------------------------
https://www.watchlist-internet.at/news/bookingcom-achtung-bei-fehlgeschlageβ¦
βββ Fortinet Labs Uncovers Series of Malicious NPM Packages Stealing Data βββ
---------------------------------------------
FortiGuard Labs has uncovered a series of malicious packages concealed within NPM (Node Package Manager), the primary software repository for JavaScript developers. The researchers utilized a dedicated system designed to detect nefarious open-source packages across multiple ecosystems, including PyPI and NPM.
---------------------------------------------
https://www.hackread.com/fortinet-labs-malicious-npm-packages-steal-data/
=====================
= Vulnerabilities =
=====================
βββ Microsoft Edge, Teams get fixes for zero-days in open-source libraries βββ
---------------------------------------------
Microsoft released emergency security updates for Edge, Teams, and Skype to patch two zero-day vulnerabilities in open-source libraries used by the three products. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/microsoft-edge-teams-get-fiβ¦
βββ Qualcomm says hackers exploit 3 zero-days in its GPU, DSP drivers βββ
---------------------------------------------
Qualcomm is warning of three zero-day vulnerabilities in its GPU and Compute DSP drivers that hackers are actively exploiting in attacks.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/qualcomm-says-hackers-exploiβ¦
βββ Jetzt patchen! Ransomware schlΓΌpft durch kritische TeamCity-LΓΌcke βββ
---------------------------------------------
Angreifer nutzen eine SicherheitslΓΌcke des Software-Distributionssystems TeamCity aus, das weltweit ΓΌber 30.000 Firmen wie Citibank, HP und Nike einsetzen.
---------------------------------------------
https://www.heise.de/news/Jetzt-patchen-Ransomware-schluepft-durch-kritischβ¦
βββ Security updates for Tuesday βββ
---------------------------------------------
Security updates have been issued by Debian (exim4), Fedora (firecracker, rust-aes-gcm, rust-axum, rust-tokio-tungstenite, rust-tungstenite, and rust-warp), Gentoo (nvidia-drivers), Mageia (chromium-browser-stable, glibc, and libwebp), Red Hat (kernel), SUSE (ghostscript and python3), and Ubuntu (firefox, libtommath, libvpx, and thunderbird).
---------------------------------------------
https://lwn.net/Articles/946313/
βββ Mattermost security updates Desktop app v5.5.1 and Mobile app v2.8.1 released βββ
---------------------------------------------
Weβre informing you about a Mattermost security update, which addresses the vulnerability CVE-2023-4863 of the third-party library libwebp which was affecting the Desktop app and the Mobile iOS app. We highly recommend that you apply the update. The security update is available for Mattermost dot releases Desktop app v5.5.1 and Mobile app v2.8.1.
---------------------------------------------
https://mattermost.com/blog/mattermost-security-updates-desktop-app-v5-5-1-β¦
βββ K000137090 : Node.js vulnerabilities CVE-2018-12121, CVE-2018-12122, and CVE-2018-12123 βββ
---------------------------------------------
https://my.f5.com/manage/s/article/K000137090?utm_source=f5support&utm_mediβ¦
βββ K000137093 : Node.js vulnerabilities CVE-2018-7167, CVE-2018-12115, and CVE-2018-12116 βββ
---------------------------------------------
https://my.f5.com/manage/s/article/K000137093?utm_source=f5support&utm_mediβ¦
βββ The IBM App Connect Enterprise Toolkit and the IBM Integration Bus Toolkit are vulnerable to a server-side request forgery due to Apache Batik (CVE-2022-44730, CVE-2022-44729) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7043490
βββ Vulnerabilities in Node.js affect IBM Voice Gateway βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7043727
βββ IBM App Connect Enterprise is vulnerable to a denial of service due to Google Protocol Buffer protobuf-cpp (CVE-2022-1941) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7045071
βββ Multiple vulnerabilities in OpenSSL affects IBM Rational ClearCase. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7035373
βββ Multiple vulnerabilities in OpenSSL affects IBM Rational ClearCase βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7035370
βββ Multiple vulnerabilities in the IBM Java Runtime affects IBM Rational ClearCase. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7035371
βββ A vulnerability in libcURL affect IBM Rational ClearCase. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7035382
βββ IBM Spectrum Symphony openssl 1.1.1 End of Life βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7045753
βββ IBM\u00ae Db2\u00ae is vulnerable to information disclosure due to improper privilege management when certain federation features are used. (CVE-2023-29256) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7010573
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 29-09-2023 18:00 β Montag 02-10-2023 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
βββ Meet LostTrust ransomware β A likely rebrand of the MetaEncryptor gang βββ
---------------------------------------------
The LostTrust ransomware operation is believed to be a rebrand of MetaEncryptor, utilizing almost identical data leak sites and encryptors.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/meet-losttrust-ransomware-a-β¦
βββ New Marvin attack revives 25-year-old decryption flaw in RSA βββ
---------------------------------------------
A flaw related to the PKCS #1 v1.5 padding in SSL servers discovered in 1998 and believed to have been resolved still impacts several widely-used projects today.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-marvin-attack-revives-25β¦
βββ The Silent Threat of APIs: What the New Data Reveals About Unknown Risk βββ
---------------------------------------------
The rapid growth of APIs creates a widening attack surface and increasing unknown cybersecurity risks.
---------------------------------------------
https://www.darkreading.com/attacks-breaches/silent-threat-of-apis-what-newβ¦
βββ Jetzt patchen: Exploit fΓΌr kritische Sharepoint-Schwachstelle aufgetaucht βββ
---------------------------------------------
Er ist Teil einer sehr effektiven Exploit-Kette zur SchadcodeausfΓΌhrung auf Sharepoint-Servern, die ein Forscher kΓΌrzlich offenlegte.
---------------------------------------------
https://www.golem.de/news/jetzt-patchen-exploit-fuer-kritische-sharepoint-sβ¦
βββ Cybercriminals Using New ASMCrypt Malware Loader to Fly Under the Radar βββ
---------------------------------------------
Threat actors are selling a new crypter and loader called ASMCrypt, which has been described as an "evolved version" of another loader malware known as DoubleFinger. "The idea behind this type of malware is to load the final payload without the loading process or the payload itself being detected by AV/EDR, etc.," Kaspersky said in an analysis published this week.
---------------------------------------------
https://thehackernews.com/2023/09/cybercriminals-using-new-asmcrypt.html
βββ BunnyLoader: New Malware-as-a-Service Threat Emerges in the Cybercrime Underground βββ
---------------------------------------------
Cybersecurity experts have discovered yet another malware-as-a-service (MaaS) threat called BunnyLoader thats being advertised for sale on the cybercrime underground. "BunnyLoader provides various functionalities such as downloading and executing a second-stage payload, stealing browser credentials and system information, and much more," [...]
---------------------------------------------
https://thehackernews.com/2023/10/bunnyloader-new-malware-as-service.html
βββ Security researchers believe mass exploitation attempts against WS_FTP have begun βββ
---------------------------------------------
Early signs emerge after Progress Software said there were no active attempts last week Security researchers have spotted what they believe to be a "possible mass exploitation" of vulnerabilities in Progress Softwares WS_FTP Server.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2023/10/02/ws_ftp_updatβ¦
βββ Temporary suspension of automatic snap registration following security incident βββ
---------------------------------------------
On September 28, 2023, the Snap Store team was notified of a potential security incident. A number of snap users reported several recently published and potentially malicious snaps. As a consequence of these reports, the Snap Store team has immediately taken down these snaps, and they can no longer be searched or installed. Furthermore, the Snap Store team has placed a temporary manual review requirement on all new snap registrations, effectively immediately.
---------------------------------------------
https://forum.snapcraft.io/t/temporary-suspension-of-automatic-snap-registrβ¦
βββ The Hitchhikers Guide to Malicious Third-Party Dependencies βββ
---------------------------------------------
The increasing popularity of certain programming languages has spurred the creation of ecosystem-specific package repositories and package managers. Such repositories (e.g., NPM, PyPI) serve as public databases that users can query to retrieve packages for various functionalities, [...] In this work, we show how attackers can [...] achieve arbitrary code execution on victim machines, thereby realizing open-source software supply chain chain attacks.
---------------------------------------------
https://arxiv.org/abs/2307.09087
βββ Fritzbox-Sicherheitsleck analysiert: Risiko sogar bei deaktiviertem Fernzugriff βββ
---------------------------------------------
AVM schlieΓt bei vielen Fritzboxen eine SicherheitslΓΌcke. Unserer Analyse zufolge lΓ€sst sie sich aus der Ferne ausnutzen β sogar mit abgeschaltetem Fernzugriff.
---------------------------------------------
https://www.heise.de/-9323225.html
βββ BSI-Umfrage: Kritische Infrastrukturen haben Nachholbedarf bei IT-Sicherheit βββ
---------------------------------------------
Vor allem bei der Umsetzung organisatorischer SicherheitsmaΓnahmen hapert es noch bei Betreibern kritischer Infrastrukturen. GrΓΌnde: Personal- und Geldmangel.
---------------------------------------------
https://www.heise.de/-9323606.html
βββ Donβt Let Zombie Zoom Links Drag You Down βββ
---------------------------------------------
Many organizations β including quite a few Fortune 500 firms β have exposed web links that allow anyone to initiate a Zoom video conference meeting as a valid employee. These company-specific Zoom links, which include a permanent user ID number and an embedded passcode, can work indefinitely and expose an organizationβs employees, customers or partners to phishing and other social engineering attacks.
---------------------------------------------
https://krebsonsecurity.com/2023/10/dont-let-zombie-zoom-links-drag-you-dowβ¦
βββ Silverfort Open Sources Lateral Movement Detection Tool βββ
---------------------------------------------
Silverfort has released the source code for its lateral movement detection tool LATMA, to help identify and analyze intrusions.
---------------------------------------------
https://www.securityweek.com/silverfort-open-sources-lateral-movement-detecβ¦
βββ Die Γsterreichische Post AG verkauft keine Zufallspakete fΓΌr 2 Euro! βββ
---------------------------------------------
BetrΓΌgerische Werbeschaltungen auf Facebook spielen vor, dass die Post AG nicht zustellbare Pakete fΓΌr nur 2 Euro verkauft. Angeblich haben Sie so die MΓΆglichkeit, mit tollen GegenstΓ€nden wie Tablets, Kaffeemaschinen oder BΓΌchern ΓΌberrascht zu werden. Achtung: Es handelt sich um reinen Betrug. Werbung und Profile stammen nicht von der Post und die Pakete existieren nicht. Sie landen hier in einer Abo-Falle oder geben Ihr Zahlungsmittel unbeabsichtigt fΓΌr Zahlungen durch Kriminelle frei.
---------------------------------------------
https://www.watchlist-internet.at/news/die-oesterreichische-post-ag-verkaufβ¦
βββ Keine Warnung zu den aktuellen Exim Schwachstellen (CVE-2023-42114, CVE-2023-42115, CVE-2023-42116, CVE-2023-42117, CVE-2023-42118, CVE-2023-42119) βββ
---------------------------------------------
Am Mittwoch 27. September wurden durch die Zero Day Initiative sechs Schwachstellen (CVE-2023-42114, CVE-2023-42115, CVE-2023-42116, CVE-2023-42117, CVE-2023-42118, CVE-2023-42119) im Mail Transfer Agent (MTA) Exim verΓΆffentlicht.[1][2][3][4][5][6] Nach interner Analyse und im Austausch mit Experten sind wir zu Γ€hnlichen SchlΓΌssen, wie nun auf der offiziellen Mailingliste des Projekts verΓΆffentlicht[7], gekommen.
---------------------------------------------
https://cert.at/de/aktuelles/2023/10/keine-warnung-zu-den-aktuellen-exim-scβ¦
βββ E-Mail-Angriff via Dropbox βββ
---------------------------------------------
BEC 3.0-Angriffe hΓ€ufen sich und sind noch schwieriger zu erkennen, weil Hacker Links ΓΌber legitime Dienste versenden.
---------------------------------------------
https://www.zdnet.de/88412118/e-mail-angriff-via-dropbox/
βββ Kritische Sicherheitsupdates: Chrome, Edge, Firefox, Thunderbird,Tor βββ
---------------------------------------------
Ende September 2023 gab es Sicherheitsupdates fΓΌr diverse Software, die kritische Schwachstellen (0-Days) schlieΓen sollen. Bei den Chromium-Browsern wurde eine SicherheitslΓΌcke im V8 Encoder geschlossen (betrifft Google Chrome und beim Edge). Die Mozilla Entwickler haben ebenfalls Notfall-Updates fΓΌr den Firefox und den Thunderbird herausgebracht. Und Tor wurde diesbezΓΌglich ebenfalls aktualisiert. Ich fasse mal die Updates in diesem Sammelbeitrag zusammen.
---------------------------------------------
https://www.borncity.com/blog/2023/10/02/kritische-sicherheitsupdates-chromβ¦
βββ Bitsight identifies nearly 100,000 exposed industrial control systems βββ
---------------------------------------------
Bitsight has identified nearly 100,000 exposed industrial control systems (ICS) potentially allowing an attacker to access and control physical infrastructure.
---------------------------------------------
https://www.bitsight.com/blog/bitsight-identifies-nearly-100000-exposed-indβ¦
=====================
= Vulnerabilities =
=====================
βββ JetBrains TeamCity Unauthenticated Remote Code Execution βββ
---------------------------------------------
Topic: JetBrains TeamCity Unauthenticated Remote Code Execution
Risk: High
Text:## # This module requires Metasploit [...]
---------------------------------------------
https://cxsecurity.com/issue/WLB-2023100003
βββ OpenRefines Zip Slip Vulnerability Could Let Attackers Execute Malicious Code βββ
---------------------------------------------
A high-severity security flaw has been disclosed in the open-source OpenRefine data cleanup and transformation tool that could result in arbitrary code execution on affected systems. Tracked as CVE-2023-37476 (CVSS score: 7.8), the vulnerability is a Zip Slip vulnerability that could have adverse impacts when importing a specially crafted project in versions 3.7.3 and below.
---------------------------------------------
https://thehackernews.com/2023/10/openrefines-zip-slip-vulnerability.html
βββ Security updates available in PDF-XChange Editor/Tools 10.1.1.381 βββ
---------------------------------------------
Released version 10.1.1.381, which addresses potential security and stability issues.
---------------------------------------------
https://www.tracker-software.com/support/security-bulletins.html
βββ Security updates for Monday βββ
---------------------------------------------
Security updates have been issued by Debian (chromium, cups, firefox-esr, firmware-nonfree, gerbv, jetty9, libvpx, mosquitto, open-vm-tools, python-git, python-reportlab, and trafficserver), Fedora (firefox, giflib, libvpx, libwebp, webkitgtk, and xen), Gentoo (Chromium, Google Chrome, Microsoft Edge, ClamAV, GNU Binutils, and wpa_supplicant, hostapd), Mageia (flac, giflib, indent, iperf, java, libvpx, libxml2, quictls, wireshark, and xrdp), Oracle (kernel), Slackware (libvpx and mozilla), and SUSE (bind, python, python-bugzilla, roundcubemail, seamonkey, and xen).
---------------------------------------------
https://lwn.net/Articles/946186/
βββ Suprema BioStar 2 βββ
---------------------------------------------
Successful exploitation of this vulnerability could allow an attacker to perform a SQL injection to execute arbitrary commands.
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-01
βββ Multiple Vulnerabilities in Electrolink FM/DAB/TV Transmitter βββ
---------------------------------------------
https://www.zeroscience.mk/en/vulnerabilities/
βββ K000137058 : Linux kernel vulnerability CVE-2022-4269 βββ
---------------------------------------------
https://my.f5.com/manage/s/article/K000137058
βββ IBM Security Bulletins βββ
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 28-09-2023 18:00 β Freitag 29-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
βββ Version 1.0: Ungepatchte Schwachstellen im Mail Transfer Agent Exim βββ
---------------------------------------------
Der Open Source Mail Transfer Agent (MTA) Exim weist mehrere schwerwiegende ungepatchte Schwachstellen auf. Besonders kritisch ist eine Buffer Overflow Schwachstelle in der SMTP-Implementierung, CVE-2023-42115, die einer entfernten, unauthorisierten angreifenden Person gegebenenfalls das AusfΓΌhren von Code mit Rechten des Service Accounts, mit dem Exim betrieben wird, ermΓΆglicht. Sie erreicht daher eine CVSS-Bewertung von 9.8 ("kritisch").
---------------------------------------------
https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2023/2023-2β¦
βββ Betrifft unzΓ€hlige Anwendungen: Zero-Day-Schwachstelle in VP8-Videokodierung βββ
---------------------------------------------
Google hat mal wieder eine Zero-Day-Schwachstelle in Chrome gepatcht. Neben gΓ€ngigen Webbrowsern sind aber auch viele andere Apps betroffen.
---------------------------------------------
https://www.golem.de/news/betrifft-unzaehlige-anwendungen-zero-day-schwachsβ¦
βββ Dringend patchen: Schwachstelle mit maximalem Schweregrad in WS_FTP βββ
---------------------------------------------
Der Entwickler der Datentransfersoftware Moveit hat erneut kritische Schwachstellen behoben - dieses Mal in der Serveranwendung WS_FTP.
---------------------------------------------
https://www.golem.de/news/dringend-patchen-schwachstelle-mit-maximalem-schwβ¦
βββ Important release of LibreOffice 7.6.2 Community and LibreOffice 7.5.7 Community with key security fix βββ
---------------------------------------------
The Document Foundation is releasing LibreOffice 7.6.2 Community and LibreOffice 7.5.7 Community ahead of schedule to address a security issue known as CVE 2023-4863, which originates in a widely used code library known as libwebp, created by Google more than a decade ago to render the then-new WebP graphics format.
---------------------------------------------
https://blog.documentfoundation.org/blog/2023/09/26/lo-762-and-lo-757/
βββ Jetzt patchen! Angreifer haben NetzwerkgerΓ€te von Cisco im Visier βββ
---------------------------------------------
Cisco hat unter anderem eine kritische LΓΌcke in Catalyst SD-WAN geschlossen. AuΓerdem gibt es Sicherheitsupdates fΓΌr weitere Produkte.
---------------------------------------------
https://www.heise.de/-9320947.html
βββ Balkonkraftwerke: Hoymiles schlieΓt SicherheitslΓΌcken βββ
---------------------------------------------
Der Wechselrichterhersteller hat die LΓΌcken in der API geschlossen β das haben wir verifiziert. Im GesprΓ€ch gelobte Hoymiles Besserung.
---------------------------------------------
https://www.heise.de/-9321291.html
βββ Malicious ad served inside Bings AI chatbot βββ
---------------------------------------------
Users looking for software downloads may be tricked into visiting malicious websites via their interaction with Bing Chat.
---------------------------------------------
https://www.malwarebytes.com/blog/threat-intelligence/2023/09/malicious-ad-β¦
βββ Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks βββ
---------------------------------------------
Hackers have set their sights on CVE-2023-34468, an RCE vulnerability in Apache NiFi that impacts thousands of organizations.
---------------------------------------------
https://www.securityweek.com/hackers-set-sights-on-apache-nifi-flaw-that-exβ¦
βββ Oktober ist Cyber Security Month: Tipps und Veranstaltungen βββ
---------------------------------------------
Im Oktober dreht sich alles um Cyber-Sicherheit. Machen auch Sie mit und nutzen Sie das vielfΓ€ltige Angebot. Wir zeigen Ihnen, wie Sie Ihre Kenntnisse zu Phishing, Randsomeware und Co. verbessern.
---------------------------------------------
https://www.watchlist-internet.at/news/oktober-ist-cyber-security-month-tipβ¦
βββ BetrΓΌgerisches EP-Gewinnspiel wird massenhaft per SMS verschickt βββ
---------------------------------------------
βGratulation an die EP Electronic Gewinnerβ. Dieser Text steht in einer SMS, die derzeit massenhaft von Kriminellen verschickt wird. Besonders perfid: In der SMS werden auch die Namen der angeblichen Gewinner:innen genannt. Selbst wenn Ihr Name in der SMS auftaucht, sollten Sie nicht auf den mitgeschickten Link klicken! BetrΓΌger:innen versuchen Sie in die Abo-Falle zu locken.
---------------------------------------------
https://www.watchlist-internet.at/news/betruegerisches-ep-gewinnspiel-wird-β¦
βββ CL0P Seeds ^_- Gotta Catch Em All! βββ
---------------------------------------------
CL0P is distributing ransomware data via torrents. We investigate this new method, including seeds weβve tracked β disguising victims with Pokemon. Catch them all!
---------------------------------------------
https://unit42.paloaltonetworks.com/cl0p-group-distributes-ransomware-data-β¦
βββ Phishing via Dropbox βββ
---------------------------------------------
A burgeoning attack involving Dropbox is making the rounds. In the first two weeks of September, we saw 5,440 of these attacks. Hackers are using Dropbox to create fake login pages that eventually lead to a credential harvesting page. Itβs yet another example of how hackers are utilizing legitimate services in what we call BEC 3.0 attacks. Business Email Compromise 3.0 attacks refer to the usage of legitimate sitesβlike Dropboxβto send and host phishing material.
---------------------------------------------
https://blog.checkpoint.com/harmony-email/phishing-via-dropbox/
βββ Analysis of Time-to-Exploit Trends: 2021-2022 βββ
---------------------------------------------
Mandiant Intelligence analyzed 246 vulnerabilities that were exploited between 2021 and 2022. Sixty-two percent (153) of the vulnerabilities were first exploited as zero-day vulnerabilities. The number of exploited vulnerabilities each year continues to increase, while the overall times-to-exploit (TTEs) we are seeing are decreasing. Exploitation of a vulnerability is most likely to occur before the end of the first month following the release of a patch.
---------------------------------------------
https://www.mandiant.com/resources/blog/time-to-exploit-trends-2021-2022
=====================
= Vulnerabilities =
=====================
βββ Security updates for Friday βββ
---------------------------------------------
Security updates have been issued by Debian (firefox-esr, jetty9, and vim), Gentoo (Fish, GMP, libarchive, libsndfile, Pacemaker, and sudo), Oracle (nodejs:16 and nodejs:18), Red Hat (virt:av and virt-devel:av), Slackware (mozilla), SUSE (chromium, firefox, Golang Prometheus, iperf, libqb, and xen), and Ubuntu (linux-raspi).
---------------------------------------------
https://lwn.net/Articles/945965/
βββ Security Vulnerability fixed in Firefox 118.0.1, Firefox ESR 115.3.1, Firefox for Android 118.1.0, Firefox Focus for Android 118.1.0, and Thunderbird 115.3.1. βββ
---------------------------------------------
CVE-2023-5217: Heap buffer overflow in libvpx
Specific handling of an attacker-controlled VP8 media stream could lead to a heap buffer overflow in the content process. We are aware of this issue being exploited in other products in the wild.
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/
βββ Vulnerabilities in node.js affect Cloud Pak Sytem [CVE-2023-28154, CVE-2022-46175, CVE-2022-3517] βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7038776
βββ IBM Instana Observability is vulnerable to arbitrary code execution βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7041863
βββ IBM MQ Operator and Queue manager container images are vulnerable to multiple vulnerabilities from go-toolset and amicontained βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7039373
βββ Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to denial of service due to Go CVE-2023-29409 βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7032246
βββ Vulnerabilities in XStream library affects IBM Engineering Test Management (ETM) (CVE-2022-40151) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7042166
βββ Vulnerabilities in xercesImpl library affects IBM Engineering Test Management (ETM) (CVE-2022-23437) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7042167
βββ The IBM\u00ae Engineering Lifecycle Engineering product is affected as Java deserialization filters (JEP 290) ignored during IBM ORB deserialization (CVE-2022-40609) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7042172
βββ Vulnerabilities in batik-all library affects IBM Engineering Test Management (ETM) (CVE-2022-44730, CVE-2022-44729) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7042170
βββ Multiple vulnerabilities in IBM Storage Defender \u2013 Data Protect βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7040913
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 27-09-2023 18:00 β Donnerstag 28-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
βββ Researchers Release Details of New RCE Exploit Chain for SharePoint βββ
---------------------------------------------
One of the already-patched flaws enables elevation of privilege, while the other enables remote code execution.
---------------------------------------------
https://www.darkreading.com/vulnerabilities-threats/reseachers-release-detaβ¦
βββ UnzΓ€hlige Anwendungen betroffen: Chaos bei WebP-LΓΌcke βββ
---------------------------------------------
Anfangs ordnete Google die LΓΌcke aber nur dem hauseigenen Webbrowser Chrome zu. Mittlerweile hat Google sich aber korrigiert und fΓΌr die alte SicherheitslΓΌcke (CVE-2023-4863 "hoch") den neuen Eintrag CVE-2023-5129 mit einer kritischen Einstufung (CVSS Score 10 von 10) eingereicht. Dieser wurde aber bereits nach sechs Stunden durch Google als ungΓΌltig erklΓ€rt. Als Grund ist angegeben, dass der neue Eintrag sich mit dem alten Eintrag doppelt.
---------------------------------------------
https://www.heise.de/-9319783
βββ SMS Security & Privacy Gaps Make It Clear Users Need a Messaging Upgrade βββ
---------------------------------------------
Like any forty-year-old technology, SMS is antiquated compared to its modern counterparts. Thatβs especially concerning when it comes to security.
---------------------------------------------
http://security.googleblog.com/2023/09/sms-security-privacy-gaps-make-it-clβ¦
βββ Mit Cloudflare Cloudflare umgehen βββ
---------------------------------------------
Von Cloudflare-Kunden konfigurierte Schutzmechanismen (z. B. Firewall, DDoS-Schutz) fΓΌr Webseiten kΓΆnnen aufgrund von LΓΌcken in den mandantenΓΌbergreifenden SchutzmaΓnahmen umgangen werden, wodurch Kunden potenziell Angriffen ausgesetzt sind, welche von Cloudflare verhindert werden sollten.
---------------------------------------------
https://certitude.consulting/blog/de/cloudflare-verwenden-um-cloudflare-zu-β¦
βββ TrendMicro verΓΆffentlicht kritischen Patch fΓΌr Apex One SP1 Build 12512 βββ
---------------------------------------------
Der kritische Patch beseitigt gleich mehrere Bugs, wovon einer verhindert, dass der Apex One-Server Virenerkennungsprotokolldaten von verwalteten Sicherheitsagenten empfangen kann.
---------------------------------------------
https://www.borncity.com/blog/2023/09/28/trendmicro-verffentlicht-kritischeβ¦
βββ SSH keys stolen by stream of malicious PyPI and npm packages βββ
---------------------------------------------
A stream of malicious npm and PyPi packages have been found stealing a wide range of sensitive data from software developers on the platforms.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/ssh-keys-stolen-by-stream-ofβ¦
=====================
= Vulnerabilities =
=====================
βββ Cisco Security Advisories 2023-09-27 βββ
---------------------------------------------
Cisco has published 15 security advisories: (1x Critical, 7x High, 6x Medium, 1x Informational)
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/Search.x?publicationTypeIDsβ¦
βββ Hoymiles: Bedrohliche LΓΌcken in der S-Miles-Cloud βββ
---------------------------------------------
Ein Sicherheitsforscher hat sich Hoymiles Cloudservice genauer angesehen und LΓΌcken gefunden, ΓΌber die Wechselrichter sogar zerstΓΆrt werden kΓΆnnen.
---------------------------------------------
https://www.heise.de/-9319500
βββ Mozilla: Security Vulnerability fixed in Firefox 118.0.1, Firefox ESR 115.3.1, Firefox for Android 118.1.0, and Firefox Focus for Android 118.1.0. βββ
---------------------------------------------
CVE-2023-5217: Heap buffer overflow in libvpx. Impact: critical
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/
βββ Google Chrome 117.0.5938.132 βββ
---------------------------------------------
Google hat zum 27. September 2023 Updates des Google Chrome Browsers 117 im Stable Channel fΓΌr Mac, Linux und Windows freigegeben. Es ist ein Sicherheitsupdate, das ausgerollt werden und mehrere Schwachstellen (Einstufung teilweise als "hoch") beseitigen sollen.
---------------------------------------------
https://www.borncity.com/blog/2023/09/28/google-chrome-117-0-5938-132/
βββ GStreamer Security Advisories 2023-09-20 βββ
---------------------------------------------
GStreamer has published 3 security advisories at 2023-09-20.
---------------------------------------------
https://gstreamer.freedesktop.org/security/
βββ Hancom Office 2020 HWord footerr use-after-free vulnerability βββ
---------------------------------------------
A use-after-free vulnerability exists in the footerr functionality of Hancom Office 2020 HWord 11.0.0.7520. A specially crafted .doc file can lead to a use-after-free. An attacker can trick a user into opening a malformed file to trigger this vulnerability.
---------------------------------------------
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1759
βββ Accusoft ImageGear dcm_pixel_data_decode out-of-bounds write vulnerability βββ
---------------------------------------------
An out-of-bounds write vulnerability exists in the dcm_pixel_data_decode functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.
---------------------------------------------
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1802
βββ Security updates for Thursday βββ
---------------------------------------------
Security updates have been issued by Debian (ncurses), Fedora (emacs, firecracker, firefox, libkrun, python-oauthlib, and virtiofsd), Mageia (glibc and vim), Oracle (18), SUSE (bind, binutils, busybox, cni, cni-plugins, container-suseconnect, containerd, curl, exempi, ffmpeg, firefox, go1.19-openssl, go1.20-openssl, gpg2, grafana, gsl, gstreamer-plugins-bad, gstreamer-plugins-base, libpng15, libwebp, mutt, nghttp2, open-vm-tools, pmix, python-brotlipy, python3, python310, qemu, quagga, rubygem-actionview-5_1, salt, supportutils, xen, and xrdp), and Ubuntu (libwebp, minidlna, puma, and python2.7, python3.5).
---------------------------------------------
https://lwn.net/Articles/945829/
βββ WebKitGTK and WPE WebKit Security Advisory WSA-2023-0009 βββ
---------------------------------------------
Several vulnerabilities were discovered in WebKitGTK and WPE WebKit. CVE identifiers: CVE-2023-39928, CVE-2023-35074, CVE-2023-39434, CVE-2023-40451, CVE-2023-41074, CVE-2023-41993.
---------------------------------------------
https://webkitgtk.org/security/WSA-2023-0009.html
βββ (0Day) Control Web Panel βββ
---------------------------------------------
ZDI-23-1476 - ZDI-23-1479
---------------------------------------------
https://www.zerodayinitiative.com/advisories/published/
βββ (0Day) Exim βββ
---------------------------------------------
ZDI-23-1468 - ZDI-23-1473
---------------------------------------------
https://www.zerodayinitiative.com/advisories/published/
βββ ZDI-23-1475: (0Day) Avast Premium Security Sandbox Protection Link Following Privilege Escalation Vulnerability βββ
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-23-1475/
βββ ZDI-23-1474: (0Day) Avast Premium Security Sandbox Protection Incorrect Authorization Privilege Escalation Vulnerability βββ
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-23-1474/
βββ Drupal: Content Moderation Notifications - Moderately critical - Information disclosure - SA-CONTRIB-2023-047 βββ
---------------------------------------------
https://www.drupal.org/sa-contrib-2023-047
βββ Drupal: Entity cache - Critical - Information disclosure - SA-CONTRIB-2023-046 βββ
---------------------------------------------
https://www.drupal.org/sa-contrib-2023-046
βββ IBM Security Bulletins βββ
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
βββ Rockwell Automation PanelView 800 βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-271-01
βββ DEXMA DexGate βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-271-02
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 26-09-2023 18:00 β Mittwoch 27-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
βββ UnzΓ€hlige Anwendungen betroffen: WebP-Schwachstelle erreicht maximalen Schweregrad βββ
---------------------------------------------
Die Schwachstelle in der WebP-Bibliothek wurde zuvor fΓ€lschlicherweise als Chrome-Bug markiert. Sie betrifft aber weitaus mehr Anwendungen.
---------------------------------------------
https://www.golem.de/news/unzaehlige-anwendungen-betroffen-webp-schwachstelβ¦
βββ Apple Releases MacOS Sonoma Including Numerous Security Patches, (Tue, Sep 26th) βββ
---------------------------------------------
As expected, Apple today released macOS Sonoma (14.0). This update, in addition to new features, provides patches for about 60 different vulnerabilities.
---------------------------------------------
https://isc.sans.edu/diary/rss/30252
βββ ShadowSyndicate: A New Cybercrime Group Linked to 7 Ransomware Families βββ
---------------------------------------------
Cybersecurity experts have shed light on a new cybercrime group known as ShadowSyndicate (formerly Infra Storm) that may have leveraged as many as seven different ransomware families over the past year. "ShadowSyndicate is a threat actor that works with various ransomware groups and affiliates of ransomware programs," Group-IB and Bridewell said in a joint technical report.
---------------------------------------------
https://thehackernews.com/2023/09/shadowsyndicate-new-cybercrime-group.html
βββ Reports about Cyber Actors Hiding in Router Firmware βββ
---------------------------------------------
On September 27, 2023, a joint cybersecurity advisory (CSA) was released detailing activities of the cyber actors known as BlackTech. The CSA describes how BlackTech is able to modify router firmware without detection. [...] Cisco has reviewed the report. Cisco would like to highlight the following key facts: The most prevalent initial access vector in these attacks involves stolen or weak administrative credentials. As outlined in the report, certain configuration changes, such as disabling logging and downloading firmware, require administrative credentials. [...]
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisoβ¦
βββ Hacking htmx applications βββ
---------------------------------------------
With the normal flow of frontend frameworks moving from hipster to mainstream in the coming few months, during a test, you bump into this strange application that receives HTML with `hx-` attributes in responses. Congrats, you are testing your first htmx application, let me give you the building blocks to play with for testing this type of application.
---------------------------------------------
https://medium.com/@matuzg/hacking-htmx-applications-f8d29665faf
βββ A Deep Dive into Brute Ratel C4 payloads β Part 2 βββ
---------------------------------------------
Brute Ratel C4 is a Red Team & Adversary Simulation software that can be considered an alternative to Cobalt Strike. In this blog post, weβre presenting a technical analysis of a Brute Ratel badger/agent that doesnβt implement all the recent features of the framework. There arenβt a lot of Brute Ratel samples available in the wild. This second part of the analysis presents the remaining commands executed by the agent.
---------------------------------------------
https://cybergeeks.tech/a-deep-dive-into-brute-ratel-c4-payloads-part-2/
βββ Fake Bitwarden installation packages delivered RAT to Windows users βββ
---------------------------------------------
Windows users looking to install the Bitwarden password manager may have inadvertently installed a remote access trojan (RAT). The ZenRAT malware A malicious website spoofing Bitwardenβs legitimate one (located at bitwariden[.]com) has been offering fake installation packages containing the ZenRAT malware.
---------------------------------------------
https://www.helpnetsecurity.com/2023/09/27/windows-bitwarden-rat/
βββ Security updates for Wednesday βββ
---------------------------------------------
Security updates have been issued by Oracle (libtiff), Red Hat (libtiff, nodejs:16, and nodejs:18), Slackware (mozilla), SUSE (bind, cacti, cacti-spine, ImageMagick, kernel, libwebp, netatalk, open-vm-tools, postfix, quagga, wire, and wireshark), and Ubuntu (cups, linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-hwe, linux-oracle, linux-bluefield, and linux-bluefield, linux-raspi, linux-raspi-5.4).
---------------------------------------------
https://lwn.net/Articles/945700/
βββ New GPU Side-Channel Attack Allows Malicious Websites to Steal Data βββ
---------------------------------------------
GPUs from AMD, Apple, Arm, Intel, Nvidia and Qualcomm are vulnerable to a new type of side-channel attack named GPU.zip.
---------------------------------------------
https://www.securityweek.com/new-gpu-side-channel-attack-allows-malicious-wβ¦
=====================
= Vulnerabilities =
=====================
βββ VMSA-2023-0020 βββ
---------------------------------------------
VMware Aria Operations updates address local privilege escalation vulnerability. (CVE-2023-34043)
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2023-0020.html
βββ K000136909 : BIG-IP APM Clients TunnelCrack vulnerability CVE-2023-43125 βββ
---------------------------------------------
https://my.f5.com/manage/s/article/K000136909
βββ K000136907 : BIG-IP APM Clients TunnelCrack vulnerability CVE-2023-43124 βββ
---------------------------------------------
https://my.f5.com/manage/s/article/K000136907
βββ semver-6.3.0.tgz is vulnerable to CVE-2022-25883 used in IBM Maximo Application Suite - Monitor Component βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7039430
βββ Okio GzipSource is vulnerable to CVE-2023-3635 used in IBM Maximo Application Suite - Monitor Component βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7039433
βββ Certifi is vulnerable to CVE-2023-37920 used in IBM Maximo Application Suite - Monitor Component βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7039436
βββ VMware Tanzu Spring for Apache Kafka is vulnerable to CVE-2023-34040 used in IBM Maximo Application Suite - Monitor Component βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7039438
βββ A security vulnerability has been identified in IBM WebSphere Application Server shipped with IBM Tivoli System Automation Application Manager (CVE-2023-35890) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7039519
βββ Vulnerability found in Eclipse Jetty may affect IBM Enterprise Records βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7040603
βββ Vulnerability of jython-standalone-2.7.0.jar have affected APM WebSphere Application Server Agent and APM Tomcat Agent βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7040614
βββ IBM SOAR QRadar Plugin App is vulnerable to using components with known vulnerabilities βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7040672
βββ IBM Cognos Analytics is affected but not classified as vulnerable to vulnerabilities in IBM Websphere Application Server Liberty βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7040744
βββ The Bouncy Castle Crypto Package For Java (bc-java) component is vulnerable to CVE-2023-33201 is used by IBM Maximo Application Suite βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7028107
βββ Control Access issues in PCOMM βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031707
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 25-09-2023 18:00 β Dienstag 26-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
βββ A new spin on the ZeroFont phishing technique, (Tue, Sep 26th) βββ
---------------------------------------------
Last week, I came across an interesting phishing e-mail, in which a text written in a font with zero-pixel size was used in quite a novel way.
---------------------------------------------
https://isc.sans.edu/diary/rss/30248
βββ Analysis of CVE-2023-38831 Zero-Day vulnerability in WinRAR βββ
---------------------------------------------
A remote code execution when the user attempts to view a benign file within a ZIP archive. The issue occurs because a) ZIP archive may include a benign file such as an ordinary .JPG file and also a folder that has the same name as the benign file, and the contents of the folder which may include executable content are processed during an attempt to access only the benign file.
---------------------------------------------
https://blog.securelayer7.net/analysis-of-cve-2023-38831-zero-day-vulnerabiβ¦
βββ Xenomorph Malware Strikes Again: Over 30+ US Banks Now Targeted βββ
---------------------------------------------
>From what was observed in previous cases, we were able to clearly identify a distribution campaign, using phishing webpages to trick victims into installing malicious APKs, which feature a larger list of targets compared to its previous versions.
---------------------------------------------
https://www.threatfabric.com/blogs/xenomorph
βββ PGP-verschlΓΌsselte E-Mails mit macOS 14: GPGTools warnt vor schnellem Upgrade βββ
---------------------------------------------
macOS 14 sΓ€gt Mail-Plug-ins ab, bewΓ€hrte Tools wie GPG funktionieren deshalb nicht mehr. GPGTools stellt aber eine neue Extension fΓΌr Apple Mail in Aussicht.
---------------------------------------------
https://www.heise.de/-9318030
βββ Vorsicht, wenn PCM Marketing anruft βββ
---------------------------------------------
Unternehmen werden im Moment hΓ€ufig von der Marketing-Agentur βPCM Marketingβ angerufen und an eine KΓΌndigung eines Abos erinnert. Bei NichtkΓΌndigung kommt es angeblich zu hohen Kosten. Nach dem Telefonat erhalten Sie ein E-Mail mit einer ausgefΓΌllten Vorlage, die Sie unterschreiben und zurΓΌckschicken sollen. Achtung: Unterschreiben Sie nicht, Sie werden in ein teures Abo gelockt!
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-wenn-pcm-marketing-anruft/
βββ Fortifying your wireless network: A comprehensive guide to defend against wireless attacks βββ
---------------------------------------------
In this in-depth blog, we will delve into the technical intricacies of safeguarding your network against wireless threats. Armed with this knowledge, you can confidently defend your wireless infrastructure against potential attackers.
---------------------------------------------
https://cybersecurity.att.com/blogs/security-essentials/fortifying-your-wirβ¦
=====================
= Vulnerabilities =
=====================
βββ Xen Security Advisory CVE-2023-20588 / XSA-439 βββ
---------------------------------------------
Version 1 accidentally linked to the wrong AMD bulletin. This has been corrected in v2. All other information in v1 is believed to be correct. | Impact: An attacker might be able to infer data from a different execution context on the same CPU core.
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-439.html
βββ Security updates for Tuesday βββ
---------------------------------------------
Security updates have been issued by Debian (exempi, glib2.0, lldpd, and netatalk), Fedora (curl, libppd, and linux-firmware), Oracle (kernel), and SUSE (Cadence, frr, modsecurity, python-CairoSVG, python-GitPython, and tcpreplay).
---------------------------------------------
https://lwn.net/Articles/945559/
βββ Firefox 118 und 115.3 ESR freigegeben βββ
---------------------------------------------
Zum 26. September 2023 haben die Mozilla-Entwickler den neuen Firefox 118 sowie das Wartungsupdate des Firefox 115.3 ESR verΓΆffentlicht. Mit den Updates wurden einige Schwachstellen geschlossen.
---------------------------------------------
https://www.borncity.com/blog/2023/09/26/firefox-118-115-3-freigegeben/
βββ Suprema BioStar 2 βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-01
βββ Advantech EKI-1524-CE series βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-04
βββ Hitachi Energy Asset Suite 9 βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-02
βββ Baker Hughes Bently Nevada 3500 βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-05
βββ Mitsubishi Electric FA Engineering Software βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-03
βββ IBM Storage Protect Server is susceptible to numerous vulnerabilities due to Golang Go (CVE-2023-29402, CVE-2023-29403, CVE-2023-29404, CVE-2023-29405, CVE-2023-29406, CVE-2023-29400, CVE-2023-24540, CVE-2023-24539, X-Force 250518) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7038772
βββ Vulnerability with kernel , OpenJDK jna-platform affect IBM Cloud Object Storage Systems (Sept2023) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7038968
βββ Vulnerability with bcprov-jdk affect IBM Cloud Object Storage Systems (Sept2023) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7038966
βββ Vulnerability with Python affect IBM Cloud Object Storage Systems (Sept2023v2) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7038969
βββ IBM InfoSphere Information Server is vulnerable to OS command injection (CVE-2022-35717) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7038982
βββ IBM Sterling Global Mailbox is vulnerable to privilege escalation attack due to Apache Cassandra βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7039222
βββ Multiple vulnerabilities in IBM SDK for Node.js and packaged modules affect IBM Business Automation Workflow Configuration Editor βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7039262
βββ Multiple security vulnerabilities affecting Watson Knowledge Catalog for IBM Cloud Pak for Data βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7039367
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 22-09-2023 18:00 β Montag 25-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
βββ Akira Ransomware Mutates to Target Linux Systems βββ
---------------------------------------------
The newly emerged ransomware actively targets both Windows and Linux systems with a double-extortion approach.
---------------------------------------------
https://www.darkreading.com/attacks-breaches/akira-ransomware-mutates-to-taβ¦
βββ Predator-Spyware: Staatstrojaner wurde ΓΌber iOS-Schwachstellen eingeschleust βββ
---------------------------------------------
Intellexa hat die jΓΌngst von Apple gepatchten Schwachstellen in iOS ausgenutzt, um eine Zero-Day-Exploit-Kette fΓΌr iPhones zu entwickeln.
---------------------------------------------
https://www.golem.de/news/predator-spyware-staatstrojaner-wurde-ueber-ios-sβ¦
βββ Blocking Visual Studio Code embedded reverse shell before its too late βββ
---------------------------------------------
Since July 2023, Microsoft is offering the perfect reverse shell, embedded inside Visual Studio Code, a widely used development tool. With just a few clicks, any user with a github account can share their visual studio desktop on the web. VS code tunnel is almost considered a lolbin (Living Of the Land Binary).
---------------------------------------------
https://ipfyx.fr/post/visual-studio-code-tunnel/
βββ iRacing Exploit allows attackers to take control of users computer βββ
---------------------------------------------
If you have updated iRacing since 2023 Season 2 Patch 5, youβre safe. But if you have the game installed and havenβt updated it, itβs important to either update or uninstall it as soon as possible. Keep in mind this exploit is possible even if you havenβt got an active iRacing subscription, so if you were thinking about updating it later, itβs worth uninstalling it in the meanwhile.
---------------------------------------------
https://blog.ss23.geek.nz/2023/09/21/iracing-electron-rce-exploit.html
βββ AuΓergewΓΆhnliche Malware nimmt westeuropΓ€ische Telkos ins Visier βββ
---------------------------------------------
Lua Dream ist ein mittels Lua modular aufgebauter SchΓ€dling, der es auf Telekommunikationsunternehmen abgesehen hat β und wahrscheinlich aus Asien stammt.
---------------------------------------------
https://www.heise.de/-9315204.html
βββ In-the-Wild Exploitation Expected for Critical TeamCity Flaw Allowing Server Takeover βββ
---------------------------------------------
A critical vulnerability in the TeamCity CI/CD server could allow unauthenticated attackers to execute code and take over vulnerable servers.
---------------------------------------------
https://www.securityweek.com/in-the-wild-exploitation-expected-for-criticalβ¦
βββ Webinar: Manipulation durch Dark Patterns β wie kann ich mich schΓΌtzen? βββ
---------------------------------------------
Dark Patterns werden im Internet eingesetzt, um uns zu Handlungen zu verleiten, die nicht in unserem Interesse liegen β und so z. B. mehr Geld auszugeben oder mehr Daten zu teilen, als wir eigentlich mΓΆchten. Dieses Webinar erklΓ€rt, wie uns Dark Patterns manipulieren und wie Sie sich davor schΓΌtzen kΓΆnnen. Nehmen Sie kostenlos teil: Dienstag 03. Oktober 2023, 18:30 - 20:00 Uhr via zoom
---------------------------------------------
https://www.watchlist-internet.at/news/webinar-manipulation-durch-dark-pattβ¦
βββ GefΓ€lschtes Gewinnspiel fΓΌr ΓBB-Geschenkkarten & iPhone 15 Pro βββ
---------------------------------------------
Uns werden aktuell betrΓΌgerische Gewinnspiele fΓΌr das neue iPhone sowie ΓBB-Geschenkkarten zum Gratis-Zugfahren gemeldet. Die Gewinnspiele werden ΓΌber Soziale Netzwerke, Messenger und per E-Mail verbreitet. Den Gewinn bekommen Sie angeblich, wenn Sie β¬ 1,95 zahlen. Wer bezahlt verliert aber Geld!
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschtes-gewinnspiel-fuer-oebb-gβ¦
βββ SCCM Hierarchy Takeover βββ
---------------------------------------------
tl;dr: There is no security boundary between sites in the same hierarchy.
When an administrative user is granted a security role in SCCM, such as Full Administrator or Infrastructure Administrator, in any primary site, the underlying database changes propagate upward to the central administration site (CAS) and then to other primary sites in the hierarchy.
This means that if an attacker gains control of any primary site, they gain control of the entire SCCM hierarchy.
---------------------------------------------
https://posts.specterops.io/sccm-hierarchy-takeover-41929c61e087
βββ iOS 17 update secretly changed your privacy settings; hereβs how to set them back βββ
---------------------------------------------
Many iPhone users who upgraded their iPhones to the recently-released iOS 17 will be alarmed to hear that they may have actually downgraded their security and privacy.
---------------------------------------------
https://www.bitdefender.com/blog/hotforsecurity/ios-17-update-secretly-chanβ¦
βββ From ScreenConnect to Hive Ransomware in 61 hours βββ
---------------------------------------------
In 2022, The DFIR Report observed an increase in the adversarial usage of Remote Management and Monitoring (RMM) tools. When compared to post-exploitation channels that heavily rely on terminals, [...]
---------------------------------------------
https://thedfirreport.com/2023/09/25/from-screenconnect-to-hive-ransomware-β¦
βββ CoinMiner Distribution Process within Infiltrated Systems (Detected by EDR) βββ
---------------------------------------------
AhnLab Security Emergency Response Center (ASEC) has identified the process through which threat actors install CoinMiners, which utilize a compromised systemβs resources for cryptocurrency mining. This post will cover how the AhnLab EDR product detects the installation process of CoinMiners that use system resources for cryptocurrency mining.
---------------------------------------------
https://asec.ahnlab.com/en/57222/
βββ Kaspersky Reveals Alarming IoT Threats and Dark Web DDoS Boom βββ
---------------------------------------------
Kaspersky Unveils Alarming IoT Vulnerabilities and Dark Webs Thriving DDoS Economy.
---------------------------------------------
https://www.hackread.com/iot-vulnerabilities-dark-web-ddos-economy/
=====================
= Vulnerabilities =
=====================
βββ Elasticsearch 8.9.0, 7.17.13 Security Update βββ
---------------------------------------------
An issue has been identified with how Elasticsearch handled incoming requests on the HTTP layer. An unauthenticated user could force an Elasticsearch node to exit with an OutOfMemory error by sending a moderate number of malformed HTTP requests.
---------------------------------------------
https://discuss.elastic.co/t/elasticsearch-8-9-0-7-17-13-security-update/34β¦
βββ Security updates for Monday βββ
---------------------------------------------
Security updates have been issued by Debian (bind9, elfutils, flac, ghostscript, libapache-mod-jk, lldpd, and roundcube), Fedora (linux-firmware, roundcubemail, and thunderbird), Mageia (curl, file, firefox/thunderbird, ghostpcl, libtommath, and nodejs), Oracle (kernel, open-vm-tools, qemu, and virt:ol and virt-devel:rhel), SUSE (bind, busybox, djvulibre, exempi, ImageMagick, libqb, libssh2_org, opera, postfix, python, python36, renderdoc, webkit2gtk3, and xrdp), and Ubuntu (accountsservice and open-vm-tools).
---------------------------------------------
https://lwn.net/Articles/945503/
βββ CISA Adds Three Known Exploited Vulnerabilities to Catalog βββ
---------------------------------------------
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-41991 Apple Multiple Products Improper Certificate Validation Vulnerability CVE-2023-41992 Apple Multiple Products Kernel Privilege Escalation Vulnerability CVE-2023-41993 Apple Multiple Products WebKit Code Execution Vulnerability
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/09/25/cisa-adds-three-known-exβ¦
βββ RoyalTSX 6.0.1 RTSZ File Handling Heap Memory Corruption PoC βββ
---------------------------------------------
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5788.php
βββ Wago: Vulnerable WIBU-SYSTEMS Codemeter installed through e!COCKPIT and WAGO-I/O-Pro βββ
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2023-042/
βββ Stored Cross-Site Scripting in der mb Support broker management Solution openVIVA c2 βββ
---------------------------------------------
https://sec-consult.com/de/vulnerability-lab/advisory/stored-cross-site-scrβ¦
βββ IBM Security Bulletins βββ
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 21-09-2023 18:00 β Freitag 22-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
βββ Incomplete disclosures by Apple and Google create βhuge blindspotβ for 0-day hunters βββ
---------------------------------------------
No one mentioned that libwebp, a library found in millions of apps, was a 0-day origin.
---------------------------------------------
https://arstechnica.com/?p=1970341
βββ GitHub passkeys generally available for passwordless sign-ins βββ
---------------------------------------------
GitHub has made passkeys generally available across the platform today to secure accounts against phishing and allow passwordless logins for all users.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/github-passkeys-generally-avβ¦
βββ iOS, iPad OS, Watch OS und MacOS: Apple behebt aktiv ausgenutzte Schwachstellen βββ
---------------------------------------------
Drei Zero-Day-Schwachstellen in iOS, iPad OS, Watch OS sowie Mac OS sollen bereits aktiv ausgenutzt werden. Patches stehen jetzt bereit.
---------------------------------------------
https://www.golem.de/news/ios-ipad-os-watch-os-und-macos-apple-behebt-aktivβ¦
βββ The WebP 0day βββ
---------------------------------------------
Early last week, Google released a new stable update for Chrome. The update included a single security fix that was reported by Apples Security Engineering and Architecture (SEAR) team. The issue, CVE-2023-4863, was a heap buffer overflow in the WebP image library, and it had a familiar warning attached:"Google is aware that an exploit for CVE-2023-4863 exists in the wild."
---------------------------------------------
https://blog.isosceles.com/the-webp-0day/
βββ Proof-of-Concept-Exploit fΓΌr WinRAR-LΓΌcke bringt VenomRAT-Malware mit βββ
---------------------------------------------
Mitte August haben die Entwickler eine Zero-Day-LΓΌcke in WinRAR ausgebessert. DafΓΌr taucht ein gefΓ€lschter PoC auf, der Malware mitbringt.
---------------------------------------------
https://www.heise.de/-9313479.html
βββ Qnap warnt vor Codeschmuggel durch Schwachstellen βββ
---------------------------------------------
Qnap warnt vor SicherheitslΓΌcken im QTS-Betriebssystem und der Multimedia Console, durch die Angreifer Schadcode einschleusen kΓΆnnen.
---------------------------------------------
https://www.heise.de/-9313549.html
βββ SicherheitslΓΌcke: Datenleaks auf Drupal-Websites mΓΆglich βββ
---------------------------------------------
Unter bestimmten Voraussetzungen kΓΆnnen Angreifer mit dem Content Management System Drupal erstellte Seiten attackieren. Abgesicherte Versionen sind verfΓΌgbar.
---------------------------------------------
https://www.heise.de/-9313594.html
βββ Schon einmal auf einen Fake-Shop hineingefallen? βββ
---------------------------------------------
Sie kaufen regelmΓ€Γig online ein und verwenden dabei Ihr Mobiltelefon? Sie sind schon einmal in BerΓΌhrung mit Fake-Shops gekommen oder waren Opfer von Internetbetrug? Sie mΓΆchten mehr darΓΌber erfahren, welche prΓ€ventiven MaΓnahmen es gibt, um den Einkauf in Fake-Shops zu verhindern? Sie mΓΆchten aktiv an der Gestaltung einer LΓΆsung mitarbeiten? Dann nehmen Sie an unserem Workshop teil!
---------------------------------------------
https://www.watchlist-internet.at/news/schon-einmal-auf-einen-fake-shop-hinβ¦
βββ Finding Deserialization Bugs in the SolarWind Platform βββ
---------------------------------------------
Itβs been a while since I have written a blog post, please accept my sincerest apologies. This is because a lot of fun stuff that Iβve recently done is going to be presented during conferences. Please treat this post as a small introduction to my upcoming Hexacon 2023 talk titled βExploiting Hardened .NET Deserialization: New Exploitation Ideas and Abuse of Insecure Serializationβ.
---------------------------------------------
https://www.thezdi.com/blog/2023/9/21/finding-deserialization-bugs-in-the-sβ¦
=====================
= Vulnerabilities =
=====================
βββ ZDI-23-1449: (0Day) Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability βββ
---------------------------------------------
This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-23-1449/
βββ (0Day) Ashlar-Vellum Cobalt AR Remote Code Execution Vulnerability βββ
---------------------------------------------
The specific flaw exists within the parsing of AR files [...] Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application. (ZDI-23-1450 - ZDI-23-1454)
---------------------------------------------
https://www.zerodayinitiative.com/advisories/published/
βββ Security updates for Friday βββ
---------------------------------------------
Security updates have been issued by Debian (gsl), Fedora (dotnet6.0 and dotnet7.0), Oracle (libwebp), Slackware (bind, cups, and seamonkey), SUSE (kernel and rust, rust1.72), and Ubuntu (cups, flac, gnome-shell, imagemagick, and python3.5).
---------------------------------------------
https://lwn.net/Articles/945322/
βββ Vulnerabilities in Apache HTTP Server βββ
---------------------------------------------
Multiple vulnerabilities in Apache HTTP Server have been reported to affect certain QNAP operating systems.
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-23-12
βββ Vulnerability in Legacy QTS βββ
---------------------------------------------
A buffer copy without checking size of input vulnerability has been reported to affect certain legacy versions of QTS.
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-23-25
βββ Vulnerability in Multimedia Console βββ
---------------------------------------------
A buffer copy without checking size of input vulnerability has been reported to affect certain versions of Multimedia Console.
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-23-29
βββ Security update 1.5.4 released βββ
---------------------------------------------
We just published a security update to the LTS version 1.5 of Roundcube Webmail. It provides a fix to a recently reported XSS vulnerability: Cross-site scripting (XSS) vulnerability in handling of linkrefs in plain text messages, reported by Niraj Shivtarkar. See the full changelog in the release notes in the release notes on the Github download page. We strongly recommend to update all productive installations of Roundcube 1.5.x with this new version.
---------------------------------------------
https://roundcube.net/news/2023/09/18/security-update-1.5.4-released
βββ Security update 1.4.14 released βββ
---------------------------------------------
We just published a security update to the LTS version 1.4 of Roundcube Webmail. It provides a fix to a recently reported XSS vulnerability: Cross-site scripting (XSS) vulnerability in handling of linkrefs in plain text messages, reported by Niraj Shivtarkar. See the full changelog in the release notes in the release notes on the Github download page. We strongly recommend to update all productive installations of Roundcube 1.4.x with this new version.
---------------------------------------------
https://roundcube.net/news/2023/09/18/security-update-1.4.14-released
βββ Security update 1.6.3 released βββ
---------------------------------------------
We just published a security update to the version 1.6 of Roundcube Webmail. It provides a fix to a recently reported XSS vulnerability: Fix cross-site scripting (XSS) vulnerability in handling of linkrefs in plain text messages,reported by Niraj Shivtarkar. See the full changelog in the release notes in the release notes on the Github download page. We strongly recommend to update all productive installations of Roundcube 1.6.x with this new version.
---------------------------------------------
https://roundcube.net/news/2023/09/15/security-update-1.6.3-released
βββ [R1] Nessus Version 10.5.5 Fixes Multiple Vulnerabilities βββ
---------------------------------------------
https://www.tenable.com/security/tns-2023-31
βββ IBM Security Bulletins βββ
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 20-09-2023 18:00 β Donnerstag 21-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
βββ Free Download Manager releases script to check for Linux malware βββ
---------------------------------------------
The developers of Free Download Manager (FDM) have published a script to check if a Linux device was infected through a recently reported supply chain attack.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/free-download-manager-releasβ¦
βββ P2PInfect botnet activity surges 600x with stealthier malware variants βββ
---------------------------------------------
The P2PInfect botnet worm is going through a period of highly elevated activity volumes starting in late August and then picking up again in September 2023.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/p2pinfect-botnet-activity-suβ¦
βββ LUCR-3: Scattered Spider Getting SaaS-y in the Cloud βββ
---------------------------------------------
LUCR-3 overlaps with groups such as Scattered Spider, Oktapus, UNC3944, and STORM-0875 and is a financially motivated attacker that leverages the Identity Provider (IDP) as initial access into an environment with the goal of stealing Intellectual Property (IP) for extortion. LUCR-3 targets Fortune 2000 companies across various sectors to include but not limited to Software, Retail, Hospitality, Manufacturing, and Telecoms.
---------------------------------------------
https://permiso.io/blog/lucr-3-scattered-spider-getting-saas-y-in-the-cloud
βββ Remote Code Execution in Tutanota Desktop due to Code Flaw βββ
---------------------------------------------
In this article, we explained how an innocent-looking mistake in the code could significantly impact the security of an application. We showed how we found a Cross-Site Scripting vulnerability in Tutanota, a popular end-to-end encrypted webmail service, and explained how an attacker could have exploited the flaw to execute arbitrary code on a victims system.
---------------------------------------------
https://www.sonarsource.com/blog/remote-code-execution-in-tutanota-desktop-β¦
=====================
= Vulnerabilities =
=====================
βββ Drupal core - Critical - Cache poisoning - SA-CORE-2023-006 βββ
---------------------------------------------
This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API. The core REST and contributed GraphQL modules are not affected.
---------------------------------------------
https://www.drupal.org/sa-core-2023-006
βββ MOVEit Transfer: Schwachstellen ermΓΆglichen Angreifern Datenschmuggel βββ
---------------------------------------------
Neue MOVEit Transfer-Versionen schlieΓen teils hochriskante SicherheitslΓΌcken. IT-Verantwortliche sollten sie zΓΌgig installieren.
---------------------------------------------
https://www.heise.de/-9312162
βββ Sicherheitsupdate: Passwort-LΓΌcke bedroht Nagios XI βββ
---------------------------------------------
Angreifer kΓΆnnen die Server-Monitoring-LΓΆsung Nagios XI attackieren. Eine dagegen abgesicherte Version ist verfΓΌgbar.
---------------------------------------------
https://www.heise.de/-9312331
βββ Sicherheitsupdate: Authentifizierung von HPE OneView umgehbar βββ
---------------------------------------------
Die IT-InfrastrukturmanagementlΓΆsung OneView von HPE ist verwundbar. Der Entwickler hat zwei kritische SicherheitslΓΌcken geschlossen.
---------------------------------------------
https://www.heise.de/-9312816
βββ Wordfence Intelligence Weekly WordPress Vulnerability Report (September 11, 2023 to September 17, 2023) βββ
---------------------------------------------
Last week, there were 55 vulnerabilities disclosed in 46 WordPress Plugins and no WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 15 Vulnerability Researchers that contributed to WordPress Security last week.
---------------------------------------------
https://www.wordfence.com/blog/2023/09/wordfence-intelligence-weekly-wordprβ¦
βββ Security updates for Wednesday βββ
---------------------------------------------
Security updates have been issued by Debian (frr and libyang), Fedora (golang-github-prometheus-exporter-toolkit, golang-github-xhit-str2duration, golang-gopkg-alecthomas-kingpin-2, libpano13, and open-vm-tools), Oracle (firefox, frr, and thunderbird), Red Hat (dmidecode, kernel, kernel-rt, kpatch-patch, libwebp: critical, linux-firmware, mariadb:10.3, ncurses, postgresql:15, and virt:rhel and virt-devel:rhel), Scientific Linux (firefox, open-vm-tools, and thunderbird), SUSE (binutils, bluez, chromium, curl, gcc7, go1.20, go1.21, grpc, protobuf, python-Deprecated, python-PyGithub, python-aiocontextvars, python-avro, python-bcrypt, python-cryptography, python- cryptography-vectors, python-google-api-core, pyt, gstreamer-plugins-good, kernel, libcares2, libxml2, mdadm, mutt, and python-brotlipy), and Ubuntu (indent, linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-gcp, linux-gcp-5.4, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-iot, linux-kvm, linux-oracle, linux-oracle-5.4, linux-xilinx-zynqmp, linux, linux-aws, linux-aws-6.2, linux-azure, linux-azure-6.2, linux-azure-fde-6.2, linux-gcp, linux-gcp-6.2, linux-hwe-6.2, linux-ibm, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-6.2, linux-oracle, linux-raspi, linux-starfive, linux, linux-aws, linux-kvm, linux-lts-xenial, linux-oem-6.0, linux-oem-6.1, and memcached).
---------------------------------------------
https://lwn.net/Articles/945073/
βββ Security updates for Thursday βββ
---------------------------------------------
Security updates have been issued by Debian (mutt, netatalk, and python2.7), Fedora (chromium, golang-github-prometheus-exporter-toolkit, golang-github-xhit-str2duration, and golang-gopkg-alecthomas-kingpin-2), Oracle (dmidecode, frr, libwebp, open-vm-tools, and thunderbird), Red Hat (libwebp and open-vm-tools), SUSE (cups, frr, mariadb, openvswitch3, python39, qemu, redis7, rubygem-rails-html-sanitizer, and skopeo), and Ubuntu (bind9, cups, and libppd).
---------------------------------------------
https://lwn.net/Articles/945173/
βββ Synology-SA-23:13 SRM βββ
---------------------------------------------
A vulnerability allow remote attackers to bypass security constraint via a susceptible version of Synology Router Manager (SRM).
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_23_13
βββ ISC Releases Security Advisories for BIND 9 βββ
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/09/21/isc-releases-security-adβ¦
βββ Frauscher: Multiple Vulnerabilities in FDS101 βββ
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2023-038/
βββ Rockwell Automation FactoryTalk View Machine Edition βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-06
βββ Rockwell Automation Connected Components Workbench βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-05
βββ Rockwell Automation Select Logix Communication Modules βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-04
βββ Delta Electronics DIAScreen βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-03
βββ Real Time Automation 460 Series βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01
βββ IBM Security Guardium is affected by multiple vulnerabilities βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/6963075
βββ IBM Virtualization Engine TS7700 is susceptible to a denial of service due to use of Apache Commons FileUpload (CVE-2023-24998) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031979
βββ Vulnerabilities in CKEditor library affects IBM Engineering Test Management (ETM) (CVE-2021-32809, CVE-2021-37695) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7037094
βββ Multiple vulnerabilities in IBM Java SDK affects IBM Storage Scale βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7037135
βββ IBM Events Operator is affected by a denial of service in OpenSSL (CVE-2023-0215). βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7037162
βββ A vulnerability in Red Hat Enterprise Linux may affect IBM Robotic Process Automation for Cloud Pak and result in elevated privileges (CVE-2023-3899). βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7037164
βββ IBM Events Operator is affected by a denial of service in OpenSSL (CVE-2022-4450). βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7037167
βββ IBM Events Operator is vulnerable to a denial of service in OpenSSL (CVE-2023-0286) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7037165
βββ Vulnerability in node.js package may affect IBM Storage Scale GUI (CVE-2022-25883) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7037185
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 19-09-2023 18:00 β Mittwoch 20-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
βββ Gitlab warnt vor kritischer SicherheitslΓΌcke βββ
---------------------------------------------
Eine kritische SicherheitslΓΌcke bedroht die Enterprise-Anwender des Repository-Diensts Gitlab. Kunden sollten unverzΓΌglich ein Update einspielen.
---------------------------------------------
https://www.heise.de/-9311249.html
βββ Atlassian stopft Sicherheitslecks in Bitbucket, Confluence und Jira βββ
---------------------------------------------
Atlassian warnt vor SicherheitslΓΌcken in Bitbucket, Confluence und Jira. Aktualisierte Fassungen dichten sie ab.
---------------------------------------------
https://www.heise.de/-9311520.html
βββ Trend Micro: Update schlieΓt ausgenutzte, kritische Schwachstelle CVE-2023-41179 βββ
---------------------------------------------
Kurzer Hinweis fΓΌr Nutzer und Administratoren von Trend Micro die Sicherheitsprodukte Apex One und Worry-Free Business Security unter Windows einsetzen. In den Produkten gibt es eine kritische SicherheitslΓΌcke (CVE-2023-41179), die bereits in freier Wildbahn ausgenutzt wird. Der Hersteller bietet aber [...]
---------------------------------------------
https://www.borncity.com/blog/2023/09/20/trend-micro-notfall-update-schlietβ¦
βββ Analyzing a Modern In-the-wild Android Exploit βββ
---------------------------------------------
In December 2022, Googleβs Threat Analysis Group (TAG) discovered an in-the-wild exploit chain targeting Samsung Android devices. TAGβs blog post covers the targeting and the actor behind the campaign. This is a technical analysis of the final stage of one of the exploit chains, specifically CVE-2023-0266 (a 0-day in the ALSA compatibility layer) and CVE-2023-26083 (a 0-day in the Mali GPU driver) as well as the techniques used by the [...]
---------------------------------------------
https://googleprojectzero.blogspot.com/2023/09/analyzing-modern-in-wild-andβ¦
βββ Fresh Wave of Malicious npm Packages Threaten Kubernetes Configs and SSH Keys βββ
---------------------------------------------
Cybersecurity researchers have discovered a fresh batch of malicious packages in the npm package registry that are designed to exfiltrate Kubernetes configurations and SSH keys from compromised machines to a remote server. Sonatype said it has discovered 14 different npm packages so far: [...]
---------------------------------------------
https://thehackernews.com/2023/09/fresh-wave-of-malicious-npm-packages.html
βββ The mystery of the CVEs that are not vulnerabilities βββ
---------------------------------------------
Researchers have raised the alarm about a large set of CVE for older bugs that never were vulnerabilities.
---------------------------------------------
https://www.malwarebytes.com/blog/news/2023/09/the-mystery-of-the-cves-thatβ¦
βββ Shodan Verified Vulns 2023-09-01 βββ
---------------------------------------------
Mit Stand 2023-09-01 sieht Shodan in Γsterreich die folgenden Schwachstellen: [...] In diesem Monat folgen die Schwachstellen in den unteren zwei Dritteln wieder dem AbwΓ€rtstrend und nΓ€hern sich der Nullmarke oder haben diese bereits erreicht. Im oberen Drittel ist im Gegensatz zu den Vormonaten ein leichter Anstieg bei FREAK (CVE-2015-0204) (+131) und Logjam (CVE-2015-4000) (+63) zu verzeichnen.
---------------------------------------------
https://cert.at/de/aktuelles/2023/9/shodan-verified-vulns-2023-09-01
βββ #StopRansomware: Snatch Ransomware βββ
---------------------------------------------
This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more [...]
---------------------------------------------
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-263a
βββ Attacker Unleashes Stealthy Crypto Mining via Malicious Python Package βββ
---------------------------------------------
Recently, our team came across a Python package named βculturestreakβ. A closer look reveals a darker purpose: unauthorized cryptocurrency mining. Letβs break down how βculturestreakβ operates, its potential impact, and the broader implications for user security and ethical [...]
---------------------------------------------
https://checkmarx.com/blog/attacker-unleashes-stealthy-crypto-mining-via-maβ¦
βββ Protect CNC Machines in Networked IT/OT Environments βββ
---------------------------------------------
Networking IT/OT environments is a bit like walking a tightrope, balancing the pursuit of intelligence and efficiency against the risks of exposing OT systems to the wider world. Trend Micro recently teamed up with global machine tool company Celada to identify specific risks associated with industrial CNC machinesβand how to mitigate them.
---------------------------------------------
https://www.trendmicro.com/en_us/ciso/23/i/cnc-machine-security.html
=====================
= Vulnerabilities =
=====================
βββ Critical Security Flaws Exposed in Nagios XI Network Monitoring Software βββ
---------------------------------------------
Multiple security flaws have been disclosed in the Nagios XI network monitoring software that could result in privilege escalation and information disclosure. The four security vulnerabilities, tracked from CVE-2023-40931 through CVE-2023-40934, impact Nagios XI versions 5.11.1 and lower. Following responsible disclosure on August 4, 2023, They have been patched as of September 11, 2023, [...]
---------------------------------------------
https://thehackernews.com/2023/09/critical-security-flaws-exposed-in.html
βββ Xen Security Advisory CVE-2023-34322 / XSA-438 βββ
---------------------------------------------
top-level shadow reference dropped too early for 64-bit PV guests | Impact: Privilege escalation, Denial of Service (DoS) affecting the entire host, and information leaks all cannot be ruled out.
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-438.html
βββ IBM Security Guardium is affected by several vulnerabilities βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7007815
βββ IBM Security Guardium is affected by an SQL Injection vulnerability (CVE-2023-33852) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7028514
βββ IBM Security Guardium is affected by a denial of service vulnerability in MIT keb5 (CVE-2022-42898) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/6981101
βββ IBM Security Guardium is affected by multiple vulnerabilities (CVE-2023-30435, CVE-2023-30436, CVE-2023-30437) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7028506
βββ IBM Security Guardium is affected by multiple vulnerabilities βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7028511
βββ IBM Security Guardium is affected by an Improper Restriction of Excessive Authentication Attempts vulnerability (CVE-2022-43904) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7028509
βββ IBM Security Guardium is affected by an Hazardous Input Validation vulnerability (CVE-2022-43903) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030110
βββ IBM Storage Protect is vulnerable to a remote attack due to Java ( CVE-2023-21967 ) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7034474
βββ IBM Storage Protect is vulnerable to deserialization issues due to Java ( CVE-2022-40609 ) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7034467
βββ Vulnerability in moment-timezone affects IBM VM Recovery Manager DR GUI βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7035336
βββ IBM App Connect Enterprise and IBM Integration Bus are vulnerable to a denial of service due to IBM MQ (CVE-2023-28513). βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7035334
βββ The IBM Engineering Lifecycle Engineering product using IBM WebSphere Application Server Liberty is vulnerable to Identity Spoofing (CVE-2022-22476) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7035367
βββ A vulnerability in python-request affects IBM Robotic Process Automation for Cloud Pak and may result in an attacker obtaining sensitive information (CVE-2023-32681) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7034002
βββ A vulnerability in gRPC may affect IBM Robotic Process Automation and result in an attacker obtaining sensitive information. (CVE-2023-32731) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7034007
βββ A vulnerability in Apache Johnzon may affect IBM Robotic Process Automation and result in a denial of service (CVE-2023-33008) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7034006
βββ A vulnerability in Microsoft ASP.NET Core may affect IBM Robotic Process Automation and result in an exposure of sensitive information (CVE-2023-35391). βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7034005
βββ IBM Security Guardium is affected by a Command injection in CLI vulnerability [CVE-2023-35893] βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7027853
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 18-09-2023 18:00 β Dienstag 19-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
βββ Jetzt patchen! Tausende Juniper-Firewalls immer noch ohne Sicherheitsupdate βββ
---------------------------------------------
Aufgrund eines neuen Exploits sind Attacken auf Juniper-Firewalls jetzt noch einfacher. Sicherheitspatches sind verfΓΌgbar.
---------------------------------------------
https://www.heise.de/news/Jetzt-patchen-Tausende-Juniper-Firewalls-immer-noβ¦
βββ Bumblebee malware returns in new attacks abusing WebDAV folders βββ
---------------------------------------------
The malware loader Bumblebee has broken its two-month vacation with a new campaign that employs new distribution techniques that abuse 4shared WebDAV services.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/bumblebee-malware-returns-inβ¦
βββ Security baseline for Microsoft Edge version 117 βββ
---------------------------------------------
Automatically open downloaded MHT or MHTML files from the web in Internet Explorer mode (Added)
---------------------------------------------
https://techcommunity.microsoft.com/t5/microsoft-security-baselines/securitβ¦
βββ HΓ€rtung des Dateitransfers: Microsoft sichert das SMB-Protokoll ab βββ
---------------------------------------------
Mit zwei MaΓnahmen sichert Microsoft sowohl die SMB Client- als auch die Serverseite besser ab. Wir zeigen, worauf Administratoren achten mΓΌssen.
---------------------------------------------
https://www.heise.de/news/Haertung-des-Dateitransfers-Microsoft-sichert-dasβ¦
βββ CISA Says Owl Labs Vulnerabilities Requiring Close Physical Range Exploited in Attacks βββ
---------------------------------------------
The US cybersecurity agency CISA says four vulnerabilities found last year in Owl Labs video conferencing devices β flaws that require the attacker to be in close range of the target β have been exploited in attacks.
---------------------------------------------
https://www.securityweek.com/cisa-says-owl-labs-vulnerabilities-requiring-cβ¦
βββ Fake-Shop-Trends im Herbst und Winter βββ
---------------------------------------------
Warme Jacken, SkianzΓΌge und Regenstiefel haben wieder Saison. Auch die Nachfrage nach Pellets und Holz steigt langsam wieder. Das wissen auch Kriminelle und stellen ihre Fake-Shops auf Herbst- und Winterangebote um. Wir zeigen Ihnen, welche Fake-Shop-Trends es gerade gibt und wie Sie sich vor betrΓΌgerischen Angeboten schΓΌtzen.
---------------------------------------------
https://www.watchlist-internet.at/news/fake-shop-trends-im-herbst-und-winteβ¦
βββ Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT βββ
---------------------------------------------
Researchers should be aware of threat actors repurposing older proof of concept (PoC) code to quickly craft a fake PoC for a newly released vulnerability. On Aug. 17, 2023, the Zero Day Initiative publicly reported a remote code execution (RCE) vulnerability in WinRAR tracked as CVE-2023-40477. They had disclosed it to the vendor on June 8, 2023. Four days after the public reporting of CVE-2023-40477, an actor using an alias of whalersplonk committed a fake PoC script to their GitHub repository.
---------------------------------------------
https://unit42.paloaltonetworks.com/fake-cve-2023-40477-poc-hides-venomrat/
=====================
= Vulnerabilities =
=====================
βββ Wind River VxWorks tarExtract directory traversal vulnerability (CVE-2023-38346) βββ
---------------------------------------------
VxWorks is a real-time operating system used in many embedded devices in high-availability environments with high safety and security requirements. This includes important industrial, medical, airospace, networking and automotive devices. For example, NASAs Curiosity rover currently deployed on planet Mars is using Wind Rivers VxWorks operating system.
---------------------------------------------
https://www.pentagrid.ch/en/blog/wind-river-vxworks-tarextract-directory-trβ¦
βββ SolarWinds Platform 2023.3.1 Release Notes βββ
---------------------------------------------
SolarWinds Platform 2023.3.1 is a service release providing bug and security fixes for release 2023.3. For information about the 2023.3 release, including EOL notices and upgrade information, see SolarWinds Platform 2023.3 Release Notes.
---------------------------------------------
https://documentation.solarwinds.com/en/success_center/orionplatform/contenβ¦
βββ Security updates for Tuesday βββ
---------------------------------------------
Security updates have been issued by Debian (chromium, flac, gnome-shell, libwebp, openjdk-11, and xrdp), Fedora (giflib), Oracle (kernel), Red Hat (busybox, dbus, firefox, frr, kpatch-patch, libwebp, open-vm-tools, and thunderbird), Slackware (netatalk), SUSE (flac, gcc12, kernel, libeconf, libwebp, libxml2, and thunderbird), and Ubuntu (binutils, c-ares, libraw, linux-intel-iotg, nodejs, python-django, and vsftpd).
---------------------------------------------
https://lwn.net/Articles/944848/
βββ Trend Micro Patches Exploited Zero-Day Vulnerability in Endpoint Security Products βββ
---------------------------------------------
Trend Micro on Tuesday released an advisory to warn customers that a critical vulnerability affecting Apex One and other endpoint security products has been exploited in the wild.
---------------------------------------------
https://www.securityweek.com/trend-micro-patches-exploited-zero-day-vulneraβ¦
βββ Spring Security 5.8.7, 6.0.7, 6.1.4, 6.2.0-M1 Released, including fixes for CVE-2023-34042 βββ
---------------------------------------------
https://spring.io/blog/2023/09/18/spring-security-5-8-7-6-0-7-6-1-4-6-2-0-mβ¦
βββ Spring for GraphQL 1.0.5, 1.1.6, 1.2.3 released βββ
---------------------------------------------
https://spring.io/blog/2023/09/19/spring-for-graphql-1-0-5-1-1-6-1-2-3-releβ¦
βββ Zyxel security advisory for command injection vulnerability in EMG2926-Q10A Ethernet CPE βββ
---------------------------------------------
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-β¦
βββ PHOENIX CONTACT: Multiple products affected by WIBU Codemeter Vulnerabilities βββ
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2023-030/
βββ Omron CJ/CS/CP Series βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-262-05
βββ Omron Engineering Software βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-262-04
βββ Omron Engineering Software Zip-Slip βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-262-03
βββ Vulnerabilities in Bash affect ProtecTIER (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/690049
βββ Multiple vulnerabilities in OpenSSL affect ProtecTIER βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/691201
βββ Multiple vulnerabilities in Samba β including Badlock β affect ProtecTIER βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/691257
βββ Vulnerability in Linux Kernel affects ProtecTIER: Dirty COW vulnerability (CVE-2016-5195) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/696401
βββ Vulnerability in glibc library affects ProtecTIER(CVE-2014-5119) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/690187
βββ Vulnerability in OpenSSL affects ProtecTIER (CVE-2016-2108) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/695443
βββ IBM Security Guardium is affected by a multiple vulnerabilities (CVE-2023-22809, CVE-2019-12490, CVE-2023-0041) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7000021
βββ IBM Storage Protect Operations Center is vulnerable to denial of service due to Websphere Application Server Liberty ( CVE-2023-28867 ) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7034039
βββ IBM Storage Protect Server is vulnerable to denial of service and other attacks due to Db2 βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7034037
βββ Vulnerability in moment-timezone affects IBM VM Recovery Manager DR GUI βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7034198
βββ Vulnerabilities in Linux kernel and Python can affect IBM Spectrum Protect Plus βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7034265
βββ IBM App Connect Enterprise is vulnerable to a remote attack and a denial of service due to Node.js modules tough-cookie and semver (CVE-2023-26136, CVE-2022-25883). βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031733
βββ A vulnerability in the Administrative command line client affects IBM Storage Protect Client, IBM Storage Protect for Virtual Environments, and IBM Storage Protect for Space Management (CVE-2023-40368) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7034288
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 15-09-2023 18:00 β Montag 18-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
βββ BlackCat ransomware hits Azure Storage with Sphynx encryptor βββ
---------------------------------------------
The BlackCat (ALPHV) ransomware gang now uses stolen Microsoft accounts and the recently spotted Sphynx encryptor to encrypt targets Azure cloud storage.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/blackcat-ransomware-hits-azuβ¦
βββ Microsoft leaks 38TB of private data via unsecured Azure storage βββ
---------------------------------------------
The Microsoft AI research division accidentally leaked dozens of terabytes of sensitive data starting in July 2020 while contributing open-source AI learning models to a public GitHub repository.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/microsoft-leaks-38tb-of-priβ¦
βββ Retool Falls Victim to SMS-Based Phishing Attack Affecting 27 Cloud Clients βββ
---------------------------------------------
Software development company Retool has disclosed that the accounts of 27 of its cloud customers were compromised following a targeted and SMS-based social engineering attack. The San Francisco-based firm blamed a Google Account cloud synchronization feature recently introduced in April 2023 for making the breach worse, calling it a "dark pattern." "The fact that Google Authenticator syncs to the cloud is a novel attack vector," Snir Kodesh, Retool's head of engineering, said. "What we had originally implemented was multi-factor authentication. But through this Google update, what was previously multi-factor-authentication had silently (to administrators) become single-factor-authentication."
---------------------------------------------
https://thehackernews.com/2023/09/retool-falls-victim-to-sms-based.html
βββ Fuzzing with multiple servers in parallel: AFL++ with Network File Systems βββ
---------------------------------------------
When fuzzing large-scale applications, using a single server (even with 4 64-core AMD Ryzen CPUs) may not be powerful enough by itself. Thatβs where parallelized/distributed fuzzing comes in (i.e. automatic sharing of results between fuzzing systems). In this guide, weβll take a look at how to set up multiple servers fuzzing the same program using AFL++, linked all together with an NFS (Network File System).
---------------------------------------------
https://joshua.hu/fuzzing-multiple-servers-parallel-aflplusplus-nfs
βββ donut-decryptor βββ
---------------------------------------------
donut-decryptor checks file(s) for known signatures of the donut obfuscators loader shellcode. If located, it will parse the shellcode to locate, decrypt, and extract the DONUT_INSTANCE structure embedded in the binary, and report pertinent configuration data. If a DONUT_MODULE is present in the binary it is decrypted and dumped to disk.
---------------------------------------------
https://github.com/volexity/donut-decryptor
βββ CVE-2023-34040 Spring Kafka Deserialization Remote Code Execution βββ
---------------------------------------------
MEDIUM | AUGUST 23, 2023 | CVE-2023-34040: In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and earlier, a possible deserialization attack vector existed, but only if unusual configuration was applied. An attacker would have to construct a malicious serialized object in one of the deserialization exception record headers [...] According to the description in security bulletin, we can simply attain some critical points resulting in the vulnerability.
---------------------------------------------
https://pyn3rd.github.io/2023/09/15/CVE-2023-34040-Spring-Kafka-Deserializaβ¦
βββ AWSβs Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation βββ
---------------------------------------------
The Sysdig Threat Research Team (TRT) has uncovered a novel cloud-native cryptojacking operation which theyβve named AMBERSQUID. This operation leverages AWS services not commonly used by attackers, such as AWS Amplify, AWS Fargate, and Amazon SageMaker. The uncommon nature of these services means that they are often overlooked from a security perspective, and the AMBERSQUID operation can cost victims more than $10,000/day.
---------------------------------------------
https://sysdig.com/blog/ambersquid/
βββ Fileless Remote Code Execution on Juniper Firewalls βββ
---------------------------------------------
CVE-2023-36845 is a PHP environment variable manipulation vulnerability affecting Juniper SRX firewalls and EX switches. Juniper scored the vulnerability as a medium severity issue. However, in this blog, weβll show you how this vulnerability alone can achieve remote, unauthenticated code execution without even touching the disk.
---------------------------------------------
https://vulncheck.com/blog/juniper-cve-2023-36845
βββ Sherlock: Spyware kommt ΓΌber Online-Werbung βββ
---------------------------------------------
Die israelische Firma Insanet soll eine SpΓ€hsoftware entwickelt haben, die ΓΌber gezielte Werbebanner auf Windows-PCs und gΓ€ngige Smartphones ausgespielt wird.
---------------------------------------------
https://www.heise.de/-9308891.html
βββ CISA Releases New Identity and Access Management Guidance βββ
---------------------------------------------
CISA has released new guidance on how federal agencies can integrate identity and access management into their ICAM architecture.
---------------------------------------------
https://www.securityweek.com/cisa-releases-new-identity-and-access-managemeβ¦
βββ Verkaufen auf Vinted: Vermeintliche KΓ€ufer:innen locken auf gefΓ€lschte Zahlungsplattform βββ
---------------------------------------------
Sie verkaufen etwas auf Vinted? Vorsicht, wenn interessierte KΓ€ufer:innen nach Ihrer E-Mail-Adresse fragen. Dahinter steckt eine Betrugsmasche, die darauf abzielt, Sie auf eine gefΓ€lschte Vinted-Zahlungsplattform zu locken. Auf dieser Plattform erhalten Sie angeblich den Kaufbetrag. TatsΓ€chlich stehlen die Kriminellen dort Ihre Bank- oder Kreditkartendaten und ΓΌberzeugen Sie, Zahlungen freizugeben.
---------------------------------------------
https://www.watchlist-internet.at/news/verkaufen-auf-vinted-vermeintliche-kβ¦
βββ Vorsicht: Steam Fake Accounts und Scam-Methoden βββ
---------------------------------------------
Kurze Warnung fΓΌr Leser und Leserinnen, die auf der Plattform Steam unterwegs sind. Ein Leser hat mich auf eine Betrugswelle aufmerksam gemacht, die gerade lΓ€uft und mit gefΓ€lschten Konten operiert.
---------------------------------------------
https://www.borncity.com/blog/2023/09/16/vorsicht-steam-fake-accounts-und-sβ¦
βββ 18th September β Threat Intelligence Report βββ
---------------------------------------------
For the latest discoveries in cyber research for the week of 11th September, please download our Threat_Intelligence Bulletin.
---------------------------------------------
https://research.checkpoint.com/2023/18th-september-threat-intelligence-repβ¦
βββ Earth Lusca Employs New Linux Backdoor, Uses Cobalt Strike for Lateral Movement βββ
---------------------------------------------
While monitoring Earth Lusca, we discovered an intriguing, encrypted file on the threat actors server - a Linux-based malware, which appears to originate from the open-source Windows backdoor Trochilus, which weve dubbed SprySOCKS due to its swift behavior and SOCKS implementation.
---------------------------------------------
https://www.trendmicro.com/en_us/research/23/i/earth-lusca-employs-new-linuβ¦
βββ MidgeDropper Variant Targets Work-from-Home Employees on Windows PCs βββ
---------------------------------------------
If you are working from home, you need to be on the lookout for the new and complex variant of MidgeDropper malware.
---------------------------------------------
https://www.hackread.com/midgedropper-variant-work-from-home-windows/
=====================
= Vulnerabilities =
=====================
βββ Qnap-Updates schlieΓen hochriskante LΓΌcke βββ
---------------------------------------------
Qnap hat aktualisierte Betriebssysteme verΓΆffentlicht. Die neuen QTS-, QuTS-hero- und QuTScloud-Releases schlieΓen teils hochriskante LΓΌcken.
---------------------------------------------
https://www.heise.de/-9308427.html
βββ Anonymisierendes Linux: Kritische libWebP-LΓΌcke in Tails 5.17.1 geschlossen βββ
---------------------------------------------
Die Maintainer des anonymisierenden Linux Tails fΓΌr den USB-Stick haben in Version 5.17.1 die bereits angegriffene, kritische libWebP-LΓΌcke geschlossen.
---------------------------------------------
https://www.heise.de/-9307906.html
βββ Security updates for Monday βββ
---------------------------------------------
Security updates have been issued by Debian (firefox-esr, libwebp, and thunderbird), Fedora (chromium, curl, flac, libtommath, libwebp, matrix-synapse, python-matrix-common, redis, and rust-pythonize), Gentoo (binwalk, ghostscript, python-requests, rar, samba, and wireshark), Oracle (.NET 6.0, kernel, and kernel-container), Slackware (python3), and SUSE (firefox).
---------------------------------------------
https://lwn.net/Articles/944744/
βββ Authenticated Remote Code Execution und fehlende Authentifizierung in Atos Unify OpenScape βββ
---------------------------------------------
https://sec-consult.com/de/vulnerability-lab/advisory/authenticated-remote-β¦
βββ Vulnerabilities in Apache Struts library affect Tivoli Netcool\/OMNIbus WebGUI βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7033228
βββ Vulnerabilities in Certifi, cryptography, python-requests and Tornado can affect IBM Storage Protect Plus Microsoft File Systems Backup and Restore [CVE-2023-37920, CVE-2023-38325, CVE-2023-32681, CVE-2023-28370] βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031489
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 14-09-2023 18:00 β Freitag 15-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
βββ What is Secure Shell (SSH) & How to Use It: Security & Best Practices βββ
---------------------------------------------
In this blog post, weβre going to delve deeper into what Secure Shell (SSH) is, how it operates, and why itβs useful. Weβll cover everything from the basics of connecting with SSH to common commands and best practices for ensuring secure communications and file transfers.
---------------------------------------------
https://blog.sucuri.net/2023/09/what-is-secure-shell-ssh-how-to-use-it-secuβ¦
βββ A detailed analysis of the Money Message Ransomware βββ
---------------------------------------------
The threat actor group, Money Message ransomware, first appeared in March 2023, demanding million-dollar ransoms from its targets. Its configuration, which contains the services and processes to stop a ransomware attack, can be found at the end of the executable. The ransomware creates a mutex and deletes the Volume Shadow Copies using vssadmin.exe.
---------------------------------------------
https://resources.securityscorecard.com/research/analysis-money-message-ranβ¦
βββ Mehr Sicherheit fΓΌr (Open-)Sourcecode: OpenSSF verΓΆffentlicht Leitfaden βββ
---------------------------------------------
Ein Leitfaden der Open Source Security Foundation zeigt Tools und Best Practices zum Absichern von Code auf Versionsverwaltungsplattformen auf.
---------------------------------------------
https://www.heise.de/-9306112.html
βββ Watch out, this LastPass email with "Important information about your account" is a phish βββ
---------------------------------------------
The consequences of last year's LastPass breach continue to be felt, with the latest insult to users coming in the form of a highly convincing phishing email.
---------------------------------------------
https://www.malwarebytes.com/blog/news/2023/09/nasty-lastpass-phish
βββ Threat Group Assessment: Turla (aka Pensive Ursa) βββ
---------------------------------------------
Pensive Ursa was chosen to be the main focus for the 2023 MITRE ATT&CK evaluation. MITRE has described Turla as being βknown for their targeted intrusions and innovative stealth.β The results of this evaluation, including Palo Alto Networks scoring, will be published in late September 2023.
---------------------------------------------
https://unit42.paloaltonetworks.com/turla-pensive-ursa-threat-assessment/
βββ Why Are You Texting Me? UNC3944 Leverages SMS Phishing Campaigns for SIM Swapping, Ransomware, Extortion, and Notoriety βββ
---------------------------------------------
UNC3944 is a financially motivated threat cluster that has persistently used phone-based social engineering and SMS phishing campaigns (smshing) to obtain credentials to gain and escalate access to victim organizations. At least some UNC3944 threat actors appear to operate in underground communities, such as Telegram and underground forums, which they may leverage to acquire tools, services, and/or other support to augment their operations.
---------------------------------------------
https://www.mandiant.com/resources/blog/unc3944-sms-phishing-sim-swapping-rβ¦
=====================
= Vulnerabilities =
=====================
βββ Jetzt patchen! SicherheitslΓΆsungen von Fortinet als Sicherheitsrisiko βββ
---------------------------------------------
Mehrere Produkte von Fortinet sind verwundbar. Sicherheitsupdates schaffen Abhilfe.
---------------------------------------------
https://www.heise.de/-9306543.html
βββ Management-Controller Lenovo XCC: Angreifer kΓΆnnen PasswΓΆrter manipulieren βββ
---------------------------------------------
Der Computerhersteller Lenovo hat in XClarity Controller mehrere SicherheitslΓΌcken geschlossen.
---------------------------------------------
https://www.heise.de/-9304734.html
βββ Security updates for Friday βββ
---------------------------------------------
Security updates have been issued by Debian (c-ares and samba), Fedora (borgbackup, firefox, and libwebp), Oracle (.NET 6.0 and kernel), Slackware (libwebp), SUSE (chromium and firefox), and Ubuntu (atftp, dbus, gawk, libssh2, libwebp, modsecurity-apache, and mutt).
---------------------------------------------
https://lwn.net/Articles/944581/
βββ QRadar Pulse application add on to IBM QRadar SIEM is vulnerable to using components with known vulnerabilities βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7032220
βββ Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to HTTP header injection due to Go CVE-2023-29406 βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7032249
βββ Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to bypassing security restrictions due to multiple Node.js vulnerabilities βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7032238
βββ IBM Virtualization Engine TS7700 is susceptible to a denial of service due to use of Apache Commons FileUpload (CVE-2023-24998) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031979
βββ Due to use of Golang Go, IBM Cloud Pak for Multicloud Management Monitoring is vulnerable to multiple vulnerabilities. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7032901
βββ Multiple vulnerabilities in jackson-databind affect IBM Application Performance Management products βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7032899
βββ IBM Operational Decision Manager August 2023 - Multiple CVEs addressed βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7032928
βββ Vulnerabilities in Linux Kernel might affect IBM Spectrum Copy Data Management βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7029387
βββ CVE-2023-24539, CVE-2023-29400, CVE-2023-29403, CVE-2023-24540, CVE-2023-29402, CVE-2023-29404, CVE-2023-29405 related to Go affect IBM CICS TX Standard 11.1 βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7033006
βββ CVE-2023-24540, CVE-2023-29402, CVE-2023-29404, CVE-2023-29405 related to Go affect IBM CICS TX Advanced 11.1 βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7033004
βββ Vulnerabilities in Golang, openSSH and openJDK might affect IBM Spectrum Copy Data Management βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7029389
βββ Vulnerabilities in snappy-java might affect IBM Spectrum Copy Data Management βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7029381
βββ Vulnerabilities in cURL libcurl might affect IBM Spectrum Copy Data Management βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7029380
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 13-09-2023 18:00 β Donnerstag 14-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
βββ Windows 11 βThemeBleedβ RCE bug gets proof-of-concept exploit βββ
---------------------------------------------
Security researcher Gabe Kirkpatrick has made a proof-of-concept (PoC) exploit available for CVE-2023-38146, aka "ThemeBleed," which enables attackers to trigger arbitrary remote code execution if the target opens a specially crafted .theme file.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/windows-11-themebleed-rce-buβ¦
βββ Top 10 Facts About MOVEit Breach βββ
---------------------------------------------
This breach exposed the vulnerabilities inherent in some of the worldβs most trusted platforms and highlighted the audacity and capabilities of modern cybercriminals. Furthermore, becoming the primary attack vector for the Cl0p ransomware group, it has led to many other attacks.
---------------------------------------------
https://socradar.io/top-10-facts-about-moveit-breach/
βββ Column-Level Encryption 101: What is It, implementation & Benefits βββ
---------------------------------------------
By encrypting individual columns of data, organizations can limit access to the data, reduce the potential damage of a breach and help ensure the privacy of their customers information. In this post, we will explore the power of column-level encryption for data security. So letβs dive in.
---------------------------------------------
https://www.piiano.com/blog/column-level-encryption
βββ Uncursing the ncurses: Memory corruption vulnerabilities found in library βββ
---------------------------------------------
Microsoft has discovered a set of memory corruption vulnerabilities in a library called ncurses, which provides APIs that support text-based user interfaces (TUI). Released in 1993, the ncurses library is commonly used by various programs on Portable Operating System Interface (POSIX) operating systems, including Linux, macOS, and FreeBSD.
---------------------------------------------
https://www.microsoft.com/en-us/security/blog/2023/09/14/uncursing-the-ncurβ¦
βββ PSA: Ongoing Webex malvertising campaign drops BatLoader βββ
---------------------------------------------
A new malvertising campaign is targeting corporate users who are downloading the popular web conferencing software Webex. Threat actors have bought an advert that impersonates Cisco's brand and is displayed first when performing a Google search.
---------------------------------------------
https://www.malwarebytes.com/blog/threat-intelligence/2023/09/ongoing-webexβ¦
βββ QR-Code in E-Mails von vermeintlichen Lieferanten fΓΌhrt zu Phishing-Seite βββ
---------------------------------------------
Aktuell ist ein besonders perfides Phishing-Mail im Umlauf: Unternehmen werden von ihnen bekannten Lieferanten kontaktiert, die ein Angebot per QR-Code ΓΌbermitteln. Zumindest wird das in der Nachricht behauptet. TatsΓ€chlich fΓΌhrt das Scannen des QR-Codes auf eine Phishing-Seite. Kriminelle versuchen dabei, an die Zugangsdaten fΓΌr das Microsoft-Konto der Mitarbeiter:innen zu kommen.
---------------------------------------------
https://www.watchlist-internet.at/news/qr-code-in-e-mails-von-vermeintlicheβ¦
βββ Vorsicht vor Phishing-E-Mails von "oesterreich.gv.at" & "a-trust.at" βββ
---------------------------------------------
Momentan befinden sich zahlreiche Phishing-Nachrichten von vermeintlich vertrauenswΓΌrdigen Absendern in Umlauf. Die Nachrichten versprechen angebliche RΓΌckerstattungen von Oesterreich.gv.at. Klicken Sie nicht auf die Links, Ihre Daten werden gestohlen!
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-phishing-e-mails-von-oeβ¦
=====================
= Vulnerabilities =
=====================
βββ FortiGuard PSIRT Advisories βββ
---------------------------------------------
Fortiguard Labs have released 12 Advisories for FortiADC, FortiAPs, FortiAP-U, FortiClient-EMS, FortiManager & FortiAnalyzer, FortiOS & FortiProxy, FortiPresence, FortiSIEM, FortiTester and FortiWeb. (Severity: 3x High, 8x Medium, 1x Low)
---------------------------------------------
https://fortiguard.fortinet.com/psirt?date=2023&product=FortiWeb,FortiSIEM,β¦
βββ Siemens hat mit 14.09.2023 weitere 2 Security Advisories verΓΆffentlicht βββ
---------------------------------------------
SSA-646240: Sensitive Information Disclosure in SIMATIC PCS neo Administration Console (5.5), SSA-357182: Local Privilege Escalation Vulnerability in Spectrum Power 7 (8.2)
---------------------------------------------
https://www.siemens.com/global/en/products/services/cert.html#SecurityPubliβ¦
βββ Wordfence Intelligence Weekly WordPress Vulnerability Report (September 4, 2023 to September 10, 2023) βββ
---------------------------------------------
Last week, there were 107 vulnerabilities disclosed in 89 WordPress Plugins and 5 WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 36 Vulnerability Researchers that contributed to WordPress Security last week.
---------------------------------------------
https://www.wordfence.com/blog/2023/09/wordfence-intelligence-weekly-wordprβ¦
βββ Security updates for Thursday βββ
---------------------------------------------
Security updates have been issued by Debian (firefox-esr, libwebp, ruby-loofah, and ruby-rails-html-sanitizer), Fedora (open-vm-tools and salt), Oracle (.NET 7.0, dmidecode, flac, gcc, httpd:2.4, keylime, libcap, librsvg2, and qemu-kvm), Red Hat (.NET 6.0 and .NET 7.0), Slackware (libarchive and mozilla), SUSE (chromium and kernel), and Ubuntu (curl, firefox, ghostscript, open-vm-tools, postgresql-9.5, and thunderbird).
---------------------------------------------
https://lwn.net/Articles/944481/
βββ Drupal: Mail Login - Critical - Access bypass - SA-CONTRIB-2023-045 βββ
---------------------------------------------
https://www.drupal.org/sa-contrib-2023-045
βββ Rockwell Automation Pavilion8 βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-257-07
βββ Palo Alto: CVE-2023-3280 Cortex XDR Agent: Local Windows User Can Disable the Agent (Severity: MEDIUM) βββ
---------------------------------------------
https://security.paloaltonetworks.com/CVE-2023-3280
βββ Palo Alto: CVE-2023-38802 PAN-OS: Denial-of-Service (DoS) Vulnerability in BGP Software (Severity: HIGH) βββ
---------------------------------------------
https://security.paloaltonetworks.com/CVE-2023-38802
βββ : PostgreSQL Vulnerability Affects IBM Connect:Direct Web Service (CVE-2023-39417) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7032120
βββ CISA Adds Three Known Vulnerabilities to Catalog βββ
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/09/13/cisa-adds-three-known-vuβ¦
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 12-09-2023 18:00 β Mittwoch 13-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
βββ Patchday: Angriffe mittels prΓ€parierter PDF-Dateien auf Adobe Acrobat βββ
---------------------------------------------
Adobe hat in Acrobat und Reader, Connect und Experience Manager mehrere SicherheitslΓΌcken geschlossen.
---------------------------------------------
https://heise.de/-9303487
βββ Notfallpatch sichert Firefox und Thunderbird gegen Attacken ab βββ
---------------------------------------------
Mozilla hat in seinen Webbrowsern und seinem Mailclient eine SicherheitslΓΌcke geschlossen, die Angreifer bereits ausnutzen.
---------------------------------------------
https://heise.de/-9303536
βββ Microsoft Security Update Summary (12. September 2023) βββ
---------------------------------------------
Am 12. September 2023 hat Microsoft Sicherheitsupdates fΓΌr Windows-Clients und -Server, fΓΌr Office- sowie fΓΌr weitere Produkte β verΓΆffentlicht. Die Sicherheitsupdates beseitigen 61 CVE-Schwachstellen, zwei sind 0-day Schwachstellen. Nachfolgend findet sich ein kompakter Γberblick ΓΌber diese Updates [...]
---------------------------------------------
https://www.borncity.com/blog/2023/09/13/microsoft-security-update-summary-β¦
βββ Threat landscape for industrial automation systems. Statistics for H1 2023 βββ
---------------------------------------------
In the first half of 2023, the percentage of ICS computers on which malicious objects were blocked decreased from H2 2022 by just 0.3 pp to 34%.
---------------------------------------------
https://securelist.com/threat-landscape-for-industrial-automation-systems-sβ¦
βββ Malware distributor Storm-0324 facilitates ransomware access βββ
---------------------------------------------
The threat actor that Microsoft tracks as Storm-0324 is a financially motivated group known to gain initial access using email-based initial infection vectors and then hand off access to compromised networks to other threat actors. These handoffs frequently lead to ransomware deployment. Beginning in July 2023, Storm-0324 was observed distributing payloads using an open-source tool [...]
---------------------------------------------
https://www.microsoft.com/en-us/security/blog/2023/09/12/malware-distributoβ¦
βββ Alert: New Kubernetes Vulnerabilities Enable Remote Attacks on Windows Endpoints βββ
---------------------------------------------
Three interrelated high-severity security flaws discovered in Kubernetes could be exploited to achieve remote code execution with elevated privileges on Windows endpoints within a cluster. The issues, tracked as CVE-2023-3676, CVE-2023-3893, and CVE-2023-3955, carry CVSS scores of 8.8 and impact all Kubernetes environments with Windows nodes. Fixes for the vulnerabilities were released on August 23, 2023, [...]
---------------------------------------------
https://thehackernews.com/2023/09/alert-new-kubernetes-vulnerabilities.html
βββ OpenSSL 1.1.1 reaches end of life for all but the well-heeled βββ
---------------------------------------------
$50k to breathe new life into its corpse. The rest of us must move on to OpenSSL 3.0
OpenSSL 1.1.1 has reached the end of its life, making a move to a later version essential for all, bar those with extremely deep pockets.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2023/09/12/openssl_111_β¦
βββ macOS Info-Stealer Malware βMetaStealerβ Targeting Businesses βββ
---------------------------------------------
The MetaStealer macOS information stealer has been targeting businesses to exfiltrate keychain and other valuable information.
---------------------------------------------
https://www.securityweek.com/macos-info-stealer-malware-metastealer-targetiβ¦
βββ How Next-Gen Threats Are Taking a Page From APTs βββ
---------------------------------------------
Cybercriminals are increasingly trying to find ways to get around security, detection, intelligence and controls as APTs start to merge with conventional cybercrime.
---------------------------------------------
https://www.securityweek.com/how-next-gen-threats-are-taking-a-page-from-apβ¦
βββ How Three Letters Brought Down UK Air Traffic Control βββ
---------------------------------------------
The UK bank holiday weekend at the end of August is a national holiday in which it sometimes seems the entire country ups sticks and makes for somewhere with a beach. This year though, many of them couldnβt, because the countryβs NATS air traffic system went down and stranded many to grumble in the heat of a crowded terminal. At the time it was blamed on faulty flight data, but news now emerges that the data which brought down an entire countryβs air traffic control may have not been faulty at all.
---------------------------------------------
https://hackaday.com/2023/09/13/how-three-letters-brought-down-uk-air-traffβ¦
βββ 3AM: New Ransomware Family Used As Fallback in Failed LockBit Attack βββ
---------------------------------------------
Attackers resorted to new ransomware after deployment of LockBit was blocked on targeted network.
---------------------------------------------
https://symantec-enterprise-blogs.security.com/threat-intelligence/3am-ransβ¦
βββ White House urging dozens of countries to publicly commit to not pay ransoms βββ
---------------------------------------------
The U.S. National Security Council (NSC) is urging the governments of all countries participating in the International Counter Ransomware Initiative (CRI) to issue a joint statement announcing they will not pay ransoms to cybercriminals, according to three sources with knowledge of the plans.
---------------------------------------------
https://therecord.media/counter-ransomware-initiative-members-ransom-paymenβ¦
βββ September 2023 release of new Exchange Server CVEs (resolved by August 2023 Security Updates) βββ
---------------------------------------------
You may have noticed there were several new Exchange Server CVEs that were released today (a part of September 2023 βPatch Tuesdayβ). If you havenβt yet, you can go to the Security Update Guide and filter on Exchange Server under Product Family to review CVE information. The CVEs released today were actually addressed in the August 2023 Exchange Server Security Update (SU). Due to the timing of validation of those fixes and release dates, we decided to release the CVEs as a part of September 2023 βPatch Tuesdayβ release cycle. We know that many customers are accustomed to checking for Microsoft security releases on the second Tuesday of every month, and we did not want these CVEs to go unnoticed.
---------------------------------------------
https://techcommunity.microsoft.com/t5/exchange-team-blog/september-2023-reβ¦
=====================
= Vulnerabilities =
=====================
βββ Security updates for Wednesday βββ
---------------------------------------------
Security updates have been issued by Debian (e2guardian), Fedora (libeconf), Red Hat (dmidecode, kernel, kernel-rt, keylime, kpatch-patch, libcap, librsvg2, linux-firmware, and qemu-kvm), Slackware (mozilla), SUSE (chromium and shadow), and Ubuntu (cups, dotnet6, dotnet7, file, flac, and ruby-redcloth).
---------------------------------------------
https://lwn.net/Articles/944354/
βββ BSRT-2023-001 Vulnerabilities in Management Console and Self Service Impact AtHoc Server βββ
---------------------------------------------
https://support.blackberry.com/kb/articleDetail?language=en_US&articleNumbeβ¦
βββ VU#347067: Multiple BGP implementations are vulnerable to improperly formatted BGP updates βββ
---------------------------------------------
https://kb.cert.org/vuls/id/347067
βββ PHP Shopping Cart-4.2 Multiple-SQLi βββ
---------------------------------------------
https://cxsecurity.com/issue/WLB-2023090037
βββ Cisco IOS XR Software Compression ACL Bypass Vulnerability βββ
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisoβ¦
βββ Cisco IOS XR Software Image Verification Vulnerability βββ
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisoβ¦
βββ Cisco IOS XR Software iPXE Boot Signature Bypass Vulnerability βββ
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisoβ¦
βββ Cisco IOS XR Software Model-Driven Programmability Behavior with AAA Authorization βββ
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisoβ¦
βββ Cisco IOS XR Software Connectivity Fault Management Denial of Service Vulnerability βββ
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisoβ¦
βββ Cisco IOS XR Software Access Control List Bypass Vulnerability βββ
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisoβ¦
βββ IBM Security Bulletins βββ
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
βββ K000136157 : sssd vulnerability CVE-2022-4254 βββ
---------------------------------------------
https://my.f5.com/manage/s/article/K000136157?utm_source=f5support&utm_mediβ¦
βββ Trumpf: Multiple Products affected by WIBU Codemeter Vulnerability βββ
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2023-031/
βββ Elliptic Labs Virtual Lock Sensor Vulnerability βββ
---------------------------------------------
https://support.lenovo.com/product_security/PS500576-ELLIPTIC-LABS-VIRTUAL-β¦
βββ Lenovo XClarity Controller (XCC) Vulnerabilities βββ
---------------------------------------------
https://support.lenovo.com/product_security/PS500578
βββ Intel Dynamic Tuning Technology Advisory βββ
---------------------------------------------
https://support.lenovo.com/product_security/PS500577-INTEL-DYNAMIC-TUNING-Tβ¦
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 11-09-2023 18:00 β Dienstag 12-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
βββ New WiKI-Eve attack can steal numerical passwords over WiFi βββ
---------------------------------------------
A new attack dubbed WiKI-Eve can intercept the cleartext transmissions of smartphones connected to modern WiFi routers and deduce individual numeric keystrokes at an accuracy rate of up to 90%, allowing numerical passwords to be stolen.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-wiki-eve-attack-can-steaβ¦
βββ Free Download Manager backdoored β a possible supply chain attack on Linux machines βββ
---------------------------------------------
Kaspersky researchers analyzed a Linux backdoor disguised as Free Download Manager software that remained under the radar for at least three years.
---------------------------------------------
https://securelist.com/backdoored-free-download-manager-linux-malware/11046β¦
βββ Sophisticated Phishing Campaign Deploying Agent Tesla, OriginBotnet, and RedLine Clipper βββ
---------------------------------------------
"A phishing email delivers the Word document as an attachment, presenting a deliberately blurred image and a counterfeit reCAPTCHA to lure the recipient into clicking on it," Fortinet FortiGuard Labs researcher Cara Lin said.
---------------------------------------------
https://thehackernews.com/2023/09/sophisticated-phishing-campaign.html
βββ GefΓ€lschte Post-, DHL und UPS-Benachrichtigungen im Umlauf βββ
---------------------------------------------
Sie warten gerade auf ein Paket? Nehmen Sie Benachrichtigungen ΓΌber den Lieferstatus genau unter die Lupe. Momentan kursieren viele betrΓΌgerische Infos. Per E-Mail oder SMS werden Sie informiert, dass noch ZollgebΓΌhren oder Versandkosten bezahlt werden mΓΌssen. Klicken Sie nicht auf den Link. Sie landen auf einer betrΓΌgerischen Seite, die Kreditkartendaten abgreift.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-post-dhl-und-ups-benachrβ¦
βββ Das European Cyber Shield βββ
---------------------------------------------
Die EU will im Rahmen vom "Digital Europe Programme" mit FΓΆrderungen fΓΌr die Vernetzung von SOCs die Sicherheit der EU stΓ€rken und das System ΓΌber einen neuen "Cyber Solidarity Act" dauerhaft einrichten. Ich hab dazu im Rahmen des CSIRTs Network Meetings im Juni einen Vortrag gehalten, dessen Inhalt ich jetzt auf ein ausformuliertes Paper (auf Englisch) erweitert habe.
---------------------------------------------
https://cert.at/de/blog/2023/9/european-cyber-shield
βββ Persistent Threat: New Exploit Puts Thousands of GitHub Repositories and Millions of Users at Risk βββ
---------------------------------------------
A new vulnerability has been discovered that could allow an attacker to exploit a race condition within GitHub's repository creation and username renaming operations. This technique could be used to perform a Repojacking attack (hijacking popular repositories to distribute malicious code).
---------------------------------------------
https://checkmarx.com/blog/persistent-threat-new-exploit-puts-thousands-of-β¦
βββ Deleting Your Way Into SYSTEM: Why Arbitrary File Deletion Vulnerabilities Matter βββ
---------------------------------------------
Windows arbitrary file deletion vulnerabilities should no longer be considered mere annoyances or tools for Denial-of-Service (DoS) attacks. Over the past couple of years, these vulnerabilities have matured into potent threats capable of unearthing a portal to full system compromise. This transformation is exemplified in CVE-2023-27470 (an arbitrary file deletion vulnerability in N-Ableβs Take Control Agent with a CVSS Base Score of 8.8) demonstrating that what might initially seem innocuous can, in fact, expose unexpected weaknesses within your system.
---------------------------------------------
https://www.mandiant.com/resources/blog/arbitrary-file-deletion-vulnerabiliβ¦
=====================
= Vulnerabilities =
=====================
βββ NSO-Exploit: Apple fixt auch Γ€ltere Versionen von macOS, iOS und iPadOS βββ
---------------------------------------------
Nach Notfall-Updates fΓΌr aktuelle Betriebssysteme schiebt Apple nun auch Patches fΓΌr Γ€ltere Versionen nach. Man sollte flott aktualisieren.
---------------------------------------------
https://heise.de/-9301842
βββ Patchday: SAP schlieΓt kritische Datenleak-LΓΌcke in BusinessObjects βββ
---------------------------------------------
Es sind wichtige Sicherheitsupdates fΓΌr SAP-Software erschienen. Admins sollten zeitnah handeln.
---------------------------------------------
https://heise.de/-9302399
βββ Security updates for Tuesday βββ
---------------------------------------------
Security updates have been issued by Debian (node-cookiejar and orthanc), Oracle (firefox, kernel, and kernel-container), Red Hat (flac and httpd:2.4), Slackware (vim), SUSE (python-Django, terraform-provider-aws, terraform-provider-helm, and terraform-provider-null), and Ubuntu (c-ares, curl, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-raspi, and linux-ibm, linux-ibm-5.4).
---------------------------------------------
https://lwn.net/Articles/944263/
βββ ICS Patch Tuesday: Critical CodeMeter Vulnerability Impacts Several Siemens Products βββ
---------------------------------------------
ICS Patch Tuesday: Siemens has released 7 new advisories and Schneider Electric has released 1 new advisory.
---------------------------------------------
https://www.securityweek.com/ics-patch-tuesday-critical-codemeter-vulnerabiβ¦
βββ WebKitGTK and WPE WebKit Security Advisory WSA-2023-0008 βββ
---------------------------------------------
CVE identifiers: CVE-2023-28198, CVE-2023-32370,CVE-2023-40397.
---------------------------------------------
https://webkitgtk.org/security/WSA-2023-0008.html
βββ Google Chrome 116.0.5845.187/.188 fixt kritische Schwachstelle βββ
---------------------------------------------
Google hat zum 11. September 2023 Updates des Google Chrome Browsers 116 im Stable und Extended Channel fΓΌr Mac, Linux und Windows freigegeben. Es sind Sicherheitsupdates, die ausgerollt werden und eine Schwachstelle (Einstufung als "kritisch") beseitigen sollen.
---------------------------------------------
https://www.borncity.com/blog/2023/09/11/google-chrome-116-0-5845-187-188-fβ¦
βββ Fujitsu Software Infrastructure Manager βββ
---------------------------------------------
An issue was discovered in Fujitsu Software Infrastructure Manager (ISM) before 2.8.0.061. The ismsnap component (in this specific case at /var/log/fujitsu/ServerViewSuite/ism/FirmwareManagement/FirmwareManagement.log) allows insecure collection and storage of authorization credentials in cleartext.
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-255-02
βββ Sicherheitsupdates in Foxit PDF Reader 2023.2 und Foxit PDF Editor 2023.2 verfΓΌgbar βββ
---------------------------------------------
https://www.foxit.com/de/support/security-bulletins.html
βββ Hitachi Energy Lumada APM Edge βββ
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-255-01
βββ Multiple vulnerabilities in OpenSSL affect AIX βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031625
βββ Control Access issues in PCOMM βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031707
βββ Multiple Security vulnerabilities in IBM Java in FileNet Content Manager βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7001699
βββ A vulnerability in FasterXML Jackson Core may affect IBM Robotic Process Automation and result in an application crash (IBM X-Force ID: 256137). βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031716
βββ IBM WebSphere Application Server shipped with Jazz for Service Management (JazzSM) is vulnerable could provide weaker than expected security. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031051
βββ Vulnerability in Open JDK affecting Rational Functional Tester βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031729
βββ IBM App Connect Enterprise is vulnerable to a remote attack and a denial of service due to Node.js modules tough-cookie and semver (CVE-2023-26136, CVE-2022-25883). βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031733
βββ IBM Cloud Pak for Security includes components with multiple known vulnerabilities βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031754
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 08-09-2023 18:00 β Montag 11-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
βββ Microsoft Teams phishing attack pushes DarkGate malware βββ
---------------------------------------------
A new phishing campaign is abusing Microsoft Teams messages to send malicious attachments that install the DarkGate Loader malware.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-attβ¦
βββ Facebook Messenger phishing wave targets 100K business accounts per week βββ
---------------------------------------------
Hackers use a massive network of fake and compromised Facebook accounts to send out millions of Messenger phishing messages to target Facebook business accounts with password-stealing malware.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/facebook-messenger-phishing-β¦
βββ From Caribbean shores to your devices: analyzing Cuba ransomware βββ
---------------------------------------------
The article analyzes the malicious tactics, techniques and procedures (TTP) used by the operator of the Cuba ransomware, and details a Cuba attack incident.
---------------------------------------------
https://securelist.com/cuba-ransomware/110533/
βββ New HijackLoader Modular Malware Loader Making Waves in the Cybercrime World βββ
---------------------------------------------
A new malware loader called HijackLoader is gaining traction among the cybercriminal community to deliver various payloads such as DanaBot, SystemBC, and RedLine Stealer.
---------------------------------------------
https://thehackernews.com/2023/09/new-hijackloader-modular-malware-loader.hβ¦
βββ Cybercriminals Using PowerShell to Steal NTLMv2 Hashes from Compromised Windows βββ
---------------------------------------------
A new cyber attack campaign is leveraging the PowerShell script associated with a legitimate red teaming tool to plunder NTLMv2 hashes from compromised Windows systems primarily located in Australia, Poland, and Belgium. The activity has been codenamed Steal-It by Zscaler ThreatLabz.
---------------------------------------------
https://thehackernews.com/2023/09/cybercriminals-using-powershell-to.html
βββ Passwortmanager: LastPass-Hacker scheinen Kennworttresore zu knacken βββ
---------------------------------------------
Cyberkriminelle haben vergangenes Jahr LastPass-Kennworttresore kopiert. Nun scheinen sie diese zu knacken und Krypto-Wallets leerzurΓ€umen.
---------------------------------------------
https://heise.de/-9300583
βββ From ERMAC to Hook: Investigating the technical differences between two Android malware variants βββ
---------------------------------------------
Hook and ERMAC are Android based malware families that are both advertised by the actor named βDukeEugeneβ. Hook is the latest variant to be released by this actor and was first announced at the start of 2023. In this announcement, the actor claims that Hook was written from scratch [1]. In our research, we have analysed two samples of Hook and two samples of ERMAC to further examine the technical differences between these malware families.
---------------------------------------------
https://research.nccgroup.com/2023/09/11/from-ermac-to-hook-investigating-tβ¦
βββ Zahlreiche unseriΓΆse Dirndl-Shops im Umlauf βββ
---------------------------------------------
Wiesenzeit ist Dirndlzeit! Das wissen auch unseriΓΆse Shop-Betreiber:innen. Damit mΓΆglichst viele potenzielle Opfer davon erfahren, wird auf Werbung via Facebook und Instagram gesetzt. Versprochen werden hochwertige Dirndl zu einem unschlagbar gΓΌnstigen Preis. Erfahrungsberichte zeigen jedoch, dass nur minderwertige Kleidung bei den Konsument:innen ankommt.
---------------------------------------------
https://www.watchlist-internet.at/news/zahlreiche-unserioese-dirndl-shops-iβ¦
βββ A classification of CTI Data feeds βββ
---------------------------------------------
We at CERT.at process and share a wide selection of cyber threat intelligence (CTI) as part of our core mission as Austriaβs hub for IT security information. Right now, we are involved in two projects that involve the purchase of commercial CTI. I encountered some varying views on what CTI is and what one should do with the indicators of compromise (IoCs) that are part of a CTI feed. This blog post describes my view on this topic.
---------------------------------------------
https://cert.at/en/blog/2023/9/cti-data-feeds
=====================
= Vulnerabilities =
=====================
βββ Pyramid vulnerable to directory traversal βββ
---------------------------------------------
Pyramid provided by Pylons Project contains a directory traversal vulnerability.
---------------------------------------------
https://jvn.jp/en/jp/JVN41113329/
βββ HPE OneView: Kritische LΓΌcke erlaubt Umgehung von Authentifizierung βββ
---------------------------------------------
HPE warnt vor mehreren SicherheitslΓΌcken in OneView, einer Infrastrukurverwaltungssoftware. Angreifer kΓΆnnten etwa die Anmeldung umgehen.
---------------------------------------------
https://heise.de/-9301047
βββ Security updates for Monday βββ
---------------------------------------------
Security updates have been issued by Debian (frr, kernel, libraw, mutt, and open-vm-tools), Fedora (cjose, pypy, vim, wireshark, and xrdp), Gentoo (apache), Mageia (chromium-browser-stable, clamav, ghostscript, librsvg, libtiff, openssl, poppler, postgresql, python-pypdf2, and unrar), Red Hat (flac), SUSE (firefox, geoipupdate, icu73_2, libssh2_org, rekor, skopeo, and webkit2gtk3), and Ubuntu (linux-azure, linux-azure-4.15, linux-azure-5.4, linux-gcp-5.4, linux-gkeop, linux-raspi, linux-raspi-5.4, linux-xilinx-zynqmp, linux-gcp, linux-gcp-6.2, linux-ibm, linux-oracle, linux-starfive, linux-gcp-5.15, linux-gkeop-5.15, and opendmarc).
---------------------------------------------
https://lwn.net/Articles/944190/
βββ Security updates available in PDF-XChange Editor/Tools 10.1.0.380 βββ
---------------------------------------------
https://www.tracker-software.com/support/security-bulletins.html
βββ Mattermost security updates 8.1.2 (ESR) / 8.0.3 / 7.8.11 (ESR) released βββ
---------------------------------------------
https://mattermost.com/blog/mattermost-security-updates-8-1-2-esr-8-0-3-7-8β¦
βββ AIX is vulnerable to arbitrary command execution (CVE-2023-26286) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/6983236
βββ IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in TensorFlow βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031271
βββ Vulnerability in BIND affects IBM Integrated Analytics System (Sailfish)[CVE-2023-2828] βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031294
βββ Vulnerability in OpenSSH affects IBM Integrated Analytics System (Sailfish)[CVE-2023-38408] βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031293
βββ Vulnerabilities in IBM Websphere Application Server affects IBM Application Performance Management. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031576
βββ Due to use of, IBM Application Performance Management is vulnerable to a local authenticated attacker to obtain sensitive information. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031614
βββ A vulnerability in Microsoft .NET may affect IBM Robotic Process Automation allowing an attacker to conduct spoofing attacks (CVE-2022-34716) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031620
βββ A vulnerability in Microsoft .NET Core may affect IBM Robotic Process Automation and result in a remote attacker obtaining sensitive information (CVE-2018-8292). βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7029529
βββ A vulnerability in Microsoft .NET Framework may affect IBM Robotic Process Automation and result in an exposure of sensitive information (CVE-2022-41064) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031621
βββ IBM Robotic Process Automation could disclose sensitive information from access to RPA scripts, workflows and related data (CVE-2023-38718) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031619
βββ IBM App Connect Enterprise is vulnerable to a remote attack and a denial of service due to Node.js modules protobuf.js, vm2 and word-wrap [CVE-2023-36665, CVE-2023-37903, CVE-2023-37466 and CVE-2023-26115] βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031624
βββ A vulnerability in Newtonsoft.Json may affect IBM Robotic Process Automation and result in a denial of service (IBM X-Force ID: 234366). βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7031623
βββ IBM Cognos Command Center is affected by multiple vulnerabilities (CVE-2023-21939, CVE-2023-21967, CVE-2022-29117, XFID: 234366) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7012455
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 07-09-2023 18:00 β Freitag 08-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
βββ Post-Quantum Cryptography βββ
---------------------------------------------
Das Aufkommen von fΓ€higen Quantencomputern hat massive Seiteneffekte auf die Sicherheit diverser kryptografischer Grundoperationen. Diese sind in den letzten Jahren zu essentiellen Bausteinen unserer IT Architektur β insbesondere in vernetzten Systemen β geworden. Noch funktioniert alles, aber wenn wir nicht bald anfangen, uns auf die diese kommende Gefahr vorzubereiten, dann wird die Transition zu βpost-quantum cryptographyβ eine Schmerzhafte werden. [..] Ich darf nΓ€chste Woche bei einer Veranstaltung dazu am Podium sitzen. Und wenn ich mich schon darauf vorbereite, dann teile ich doch gleich meine Quellen und Schlussfolgerungen.
---------------------------------------------
https://cert.at/de/blog/2023/9/post-quantum-cryptography
βββ CISA warns of critical Apache RocketMQ bug exploited in attacks βββ
---------------------------------------------
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added to its catalog of known exploited vulnerabilities (KEV) a critical-severity issue tracked as CVE-2023-33246 that affects Apaches RocketMQ distributed messaging and streaming platform.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-apachβ¦
βββ Paranoids Vulnerability Research: Ivanti Issues Security Alert βββ
---------------------------------------------
The vulnerability allowed for remote code execution β giving a bad actor a method to distribute malicious software through a tool that sends out security updates. And, as part of the research process, we confirmed the feasibility of this by developing an end-to-end exploit that showcases how malware can be distributed to managed endpoints (demo).
---------------------------------------------
https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-ivanti-β¦
βββ Malvertising-Kampagne will Mac-Nutzern Atomic Stealer unterjubeln βββ
---------------------------------------------
IT-Forscher beobachten eine Malvertising-Kampagne, deren Urheber Mac-Nutzern den Atomic Stealer unterschieben wollen. Der klaut etwa Krypto-WΓ€hrungen.
---------------------------------------------
https://heise.de/-9298637
βββ Emsisoft Tells Users to Update Products, Reboot Systems Due to Certificate Mishap βββ
---------------------------------------------
The problem, the company says, affects its Extended Validation (EV) code signing certificate that was renewed on August 23 and used to sign all program files compiled after that date, including the latest software version, released on September 4.
---------------------------------------------
https://www.securityweek.com/emsisoft-tells-users-to-update-products-rebootβ¦
βββ New Phishing Campaign Launched via Google Looker Studio βββ
---------------------------------------------
Cybersecurity firm Check Point is warning of a new type of phishing attacks that abuse Google Looker Studio to bypass protections.
---------------------------------------------
https://www.securityweek.com/new-phishing-campaign-launched-via-google-lookβ¦
βββ MAR-10454006.r5.v1 SUBMARINE, SKIPJACK, SEASPRAY, WHIRLPOOL, and SALTWATER Backdoors βββ
---------------------------------------------
CISA obtained five malware samples - including artifacts related to SUBMARINE, SKIPJACK, SEASPRAY, WHIRLPOOL, and SALTWATER backdoors. The device was compromised by threat actors exploiting CVE-2023-2868, a former zero-day vulnerability affecting versions 5.1.3.001-9.2.0.006 of Barracuda Email Security Gateway (ESG).
---------------------------------------------
https://www.cisa.gov/news-events/analysis-reports/ar23-250a-0
βββ W3LL-Phishing Kit kann Multifaktor-Authentifizierung aushebeln; Tausende von Microsoft 365-Konten gekapert βββ
---------------------------------------------
Der in Singapur angesiedelte Sicherheitsanbieter Group-IB hat die Tage einen Sicherheits-Report verΓΆffentlicht, der auf spezielle AktivitΓ€ten einer W3LL genannten Gruppe von Cyberkriminellen hinweist. Die Cybergang hat ein spezielles Phishing-Kit entwickelt, um Microsoft 365-Konten zu kapern und bietet diese Dienstleistung mindestens 500 anderen Cybergangs ΓΌber einen geheimen W3LL Store an.
---------------------------------------------
https://www.borncity.com/blog/2023/09/08/w3ll-phishing-kit-kann-multifaktorβ¦
βββ A Deep Dive into 70 Layers of Obfuscated Info-Stealer Malware βββ
---------------------------------------------
In the battle of hackers against defenders, we consistently find hackers trying to disguise their true intent. We have analyzed an interesting sample that was armed with multiple layers of obfuscation. These packages were quite the challenge.
---------------------------------------------
https://checkmarx.com/blog/a-deep-dive-into-70-layers-of-obfuscated-info-stβ¦
=====================
= Vulnerabilities =
=====================
βββ Sicherheitsupdates fΓΌr macOS, iOS/iPadOS schlieΓen zwei 0-Days der NSO-Group (Pegasus Spyware) βββ
---------------------------------------------
Apple hat zum 7. September 2023 wieder einen Schwung Sicherheitsupdates fΓΌr seine Betriebssysteme macOS, iOS/iPadOS und auch WatchOS verΓΆffentlicht. Mit diesen Updates werden zwei 0-Day-Schwachstellen geschlossen, die von der Pegasus Spyware der NSO-Group fΓΌr die Γberwachung von MobilgerΓ€ten missbraucht wurden.
---------------------------------------------
https://www.borncity.com/blog/2023/09/08/sicherheitsupdates-fr-macos-ios-ipβ¦
βββ OpenSSL Security Advisory [8th September 2023] βββ
---------------------------------------------
POLY1305 MAC implementation corrupts XMM registers on Windows (CVE-2023-4807). Severity: Low
---------------------------------------------
https://www.openssl.org/news/secadv/20230908.txt
βββ QNAP Security Advisories 2023-09-08 βββ
---------------------------------------------
QNAP has released 4 security advisories: (1x High, 3x Medium)
---------------------------------------------
https://www.qnap.com/en-us/security-advisories?ref=security_advisory_details
βββ Security updates for Friday βββ
---------------------------------------------
Security updates have been issued by Debian (chromium, libssh2, memcached, and python-django), Fedora (netconsd), Oracle (firefox and thunderbird), Scientific Linux (firefox), SUSE (open-vm-tools), and Ubuntu (grub2-signed, grub2-unsigned, shim, and shim-signed, plib, and python2.7, python3.5).
---------------------------------------------
https://lwn.net/Articles/943990/
βββ Notepad++ v8.5.7 fixt Schwachstellen βββ
---------------------------------------------
Mitte August 2023 hatte Sicherheitsforscher Jaroslav Lobacevski vier Schwachstellen (CVE-2023-40031, CVE-2023-40036, CVE-2023-40164, CVE-2023-40166) im Editor Notepad ++ fΓΌr Windows ΓΆffentlich gemacht. Die Einstufung der Schwachstellen reicht von mittel bis hoch. Der Entwickler hat diese Schwachstellen, nachdem ihm diese seit Monaten bekannt sind, nun mit dem Update auf Notepad++ v8.5.7 beseitigt.
---------------------------------------------
https://www.borncity.com/blog/2023/09/08/notepad-v8-5-7-fixt-schwachstellen/
βββ PHOENIX CONTACT: Multiple vulnerabilities in WP 6xxx Web panels βββ
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2023-018/
βββ IBM Security Bulletins βββ
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 06-09-2023 18:00 β Donnerstag 07-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Robert Waldner
=====================
= News =
=====================
βββ Next-Generation Context Aware Password Cracking βββ
---------------------------------------------
TLDR; Using ChatGPT, an attacker can generate a list of password guesses based on the context of the target such as a companyβs description or social media accounts.
---------------------------------------------
https://medium.com/@doctoreww/next-generation-context-aware-password-crackiβ¦
βββ Cisco warnt vor teils kritischen LΓΌcken und liefert Updates fΓΌr mehrere Produkte βββ
---------------------------------------------
In mehreren Cisco-Produkten lauern SicherheitslΓΌcken, die Updates schlieΓen sollen. Eine gilt sogar als kritisch.
---------------------------------------------
https://heise.de/-9297182
βββ FreeWorld ransomware attacks MSSQLβget your databases off the Internet βββ
---------------------------------------------
When we think of ransomware and brute force password guessing attacks, we normally think of RDP, but recent research from Securonix reminds us that anything secured with a password and exposed to the internet is of interest to cybercriminals.
---------------------------------------------
https://www.malwarebytes.com/blog/news/2023/09/freeworld-ransomware-attacksβ¦
βββ Ozempic, Wegovy & Co: Vorsicht vor Fake-Shops mit βSchlankheitsmittelnβ βββ
---------------------------------------------
Diabetes-Medikamente wie Ozempic, Saxenda oder Metformin sind seit einiger Zeit von LieferengpΓ€ssen betroffen. Der Grund: Elon Musk, Kim Kardashian und andere Prominente nutzen diese und Γ€hnliche Medikamente zum Abnehmen, der Hype dieser βAbnehmspritzenβ lieΓ nicht lange auf sich warten. Ein Trend, den sich auch Kriminelle zunutze machen. Sie bieten die eigentlich verschreibungspflichtigen Medikamente in Fake-Shops als Schlankheitsmittel an.
---------------------------------------------
https://www.watchlist-internet.at/news/ozempic-wegovy-co-vorsicht-vor-fake-β¦
βββ A classification of CTI Data feeds βββ
---------------------------------------------
We at CERT.at process and share a wide selection of cyber threat intelligence (CTI) as part of our core mission as Austriaβs hub for IT security information. Right now, we are involved in two projects that involve the purchase of commercial CTI. I encountered some varying views on what CTI is and what one should do with the indicators of compromise (IoCs) that are part of a CTI feed. This blog post describes my view on this topic.
---------------------------------------------
https://cert.at/en/blog/2023/9/cti-data-feeds
βββ Cybercriminals target graphic designers with GPU miners βββ
---------------------------------------------
Cybercriminals are abusing Advanced Installer, a legitimate Windows tool used for creating software packages, to drop cryptocurrency-mining malware including PhoenixMiner and lolMiner on infected machines.
---------------------------------------------
https://blog.talosintelligence.com/cybercriminals-target-graphic-designers-β¦
βββ CISA Releases Update to Threat Actors Exploiting Citrix CVE-2023-3519 to Implant Webshells βββ
---------------------------------------------
This Cybersecurity Advisory has been updated with new tactics, techniques, and procedures (TTPs) as well as indicators of compromise (IOCs) received from an additional victim and trusted third parties.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/09/06/cisa-releases-update-thrβ¦
βββ MAR-10430311-1.v1 Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475 βββ
---------------------------------------------
CISA received 4 files for analysis from an incident response engagement conducted at an Aeronautical Sector organization [..] CISA has provided indicators of compromise (IOCs) and YARA rules for detection within this Malware Analysis Report (MAR).
---------------------------------------------
https://www.cisa.gov/news-events/analysis-reports/ar23-250a
=====================
= Vulnerabilities =
=====================
βββ Aruba-Controller und -Gateways mit hochriskanten SicherheitslΓΌcken βββ
---------------------------------------------
FΓΌr Aruba-Controller und -Gateways der Serien 9000 und 9200 gibt es Updates, die hochriskante SicherheitslΓΌcken schlieΓen.
---------------------------------------------
https://heise.de/-9297925
βββ Cisco Security Advisories 2023-09-06 - 2023-09-06 βββ
---------------------------------------------
Cisco has released 6 security advisories: (1x Critical, 1x High, 4x Medium)
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/Search.x?publicationTypeIDsβ¦
βββ Sicherheitsupdates: Unbefugte Zugriffe auf TP-Link-Router mΓΆglich βββ
---------------------------------------------
Angreifer kΓΆnnen verschiedene Router von TP-Link attackieren und im schlimmsten Fall eigene Befehle auf GerΓ€ten ausfΓΌhren.
---------------------------------------------
https://heise.de/-9297306
βββ 2023-08 Out-of-Cycle Security Bulletin: Junos OS: SRX Series and EX Series: Multiple vulnerabilities in J-Web can be combined to allow a preAuth Remote Code Execution βββ
---------------------------------------------
Update - September 5th 2023: A new variant of the SRX upload vulnerability has been published by external researchers (CVE-2023-36851). All fixes listed under Solution below break the RCE chain
---------------------------------------------
https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bβ¦
βββ Wordfence Intelligence Weekly WordPress Vulnerability Report (August 28, 2023 to September 3, 2023) βββ
---------------------------------------------
Last week, there were 64 vulnerabilities disclosed in 61 WordPress Plugins and 2 WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 32 Vulnerability Researchers that contributed to WordPress Security last week.
---------------------------------------------
https://www.wordfence.com/blog/2023/09/wordfence-intelligence-weekly-wordprβ¦
βββ Security updates for Thursday βββ
---------------------------------------------
Security updates have been issued by Fedora (erofs-utils, htmltest, indent, libeconf, netconsd, php-phpmailer6, tinyexr, and vim), Red Hat (firefox), and Ubuntu (linux-aws, linux-aws-5.15, linux-ibm-5.15, linux-oracle, linux-oracle-5.15, linux-azure, linux-azure-fde-5.15, linux-gke, linux-gkeop, linux-intel-iotg-5.15, linux-raspi, linux-oem-6.1, linux-raspi, linux-raspi-5.4, shiro, and sox).
---------------------------------------------
https://lwn.net/Articles/943856/
βββ CVE-2023-4528: Java Deserialization Vulnerability in JSCAPE MFT (Fixed) βββ
---------------------------------------------
CVE-2023-4528 affects all versions of JSCAPE MFT Server prior to version 2023.1.9 on all platforms (Windows, Linux, and MacOS). See the JSCAPE advisory for more information [..] CVE-2023-4528 has been addressed in JSCAPE version 2023.1.9 which is now available for customer deployment.
---------------------------------------------
https://www.rapid7.com/blog/post/2023/09/07/cve-2023-4528-java-deserializatβ¦
βββ CISA Releases Four Industrial Control Systems Advisories βββ
---------------------------------------------
ICSA-23-250-01 Dover Fueling Solutions MAGLINK LX Console (CVSS v3 9.1),
ICSA-23-250-02 Phoenix Contact TC ROUTER and TC CLOUD CLIENT (CVSS v3 9.6),
ICSA-23-250-03 Socomec MOD3GP-SY-120K (CVSS v3 10.0),
ICSA-23-157-01 Delta Electronics CNCSoft-B DOPSoft (Update) (CVSS v3 7.8)
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/09/07/cisa-releases-four-indusβ¦
βββ Drupal: WebProfiler - Moderately critical - Cross Site Scripting - SA-CONTRIB-2023-044 βββ
---------------------------------------------
https://www.drupal.org/sa-contrib-2023-044
βββ Drupal: highlight.php - Moderately critical - Cross Site Scripting - SA-CONTRIB-2023-043 βββ
---------------------------------------------
https://www.drupal.org/sa-contrib-2023-043
βββ IBM Security Bulletins βββ
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 05-09-2023 18:00 β Mittwoch 06-09-2023 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
=====================
= News =
=====================
βββ Patchday: Schadcode-Attacken auf Android 11, 12, 13 mΓΆglich βββ
---------------------------------------------
Google und weitere Hersteller von Android-GerΓ€ten haben wichtige Sicherheitsupdates verΓΆffentlicht.
---------------------------------------------
https://heise.de/-9296497
βββ Microsoft ΓΌberarbeitet Downfall-Empfehlungen; MSI liefert BIOS-Update fΓΌr UNSUPPORTED_PROCESSOR-Problem βββ
---------------------------------------------
Im August war die sogenannte Downfall-Schwachstelle in Prozessoren bekannt geworden, die ein AbflieΓen von Informationen ermΓΆglicht. Nun hat Microsoft seinen Support-Beitrag mit Hinweisen zur Downfall-Schwachstelle unter Windows aktualisiert und Informationen zum Deaktivieren der SchutzmaΓnahmen entfernt. Weiterhin gab es nach Installation [..]
---------------------------------------------
https://www.borncity.com/blog/2023/09/06/microsoft-berarbeitet-downfall-empβ¦
βββ Pandoras box is now open: the well-known Mirai trojan arrives in a new disguise to Android-based TV sets and TV boxes βββ
---------------------------------------------
Doctor Web has identified a family of Android.Pandora trojans that compromise Android devices, either during firmware updates or when applications for viewing pirated video content are installed. This backdoor inherited its advanced DDoS-attack capabilities from its ancestor, the well-known Linux.Mirai trojan.
---------------------------------------------
https://news.drweb.com/show/?i=14743
βββ Security Relevant DNS Records, (Wed, Sep 6th) βββ
---------------------------------------------
DNS has a big security impact. DNS is in part responsible for your traffic reaching the correct host on the internet. But there is more to DNS then name resolution. I am going to mention a few security relevant record types here, in no particular order: [..]
---------------------------------------------
https://isc.sans.edu/diary/rss/30194
βββ Bogus URL Shorteners Go Mobile-Only in AdSense Fraud Campaign βββ
---------------------------------------------
Since September 2022, our team has been tracking a bogus URL shortener redirect campaign that started with just a single domain: ois[.]is. By the beginning of 2023, this malware campaign had expanded to over a hundred domain names to redirect traffic to low quality Q&A sites and monetize traffic via Google AdSense. In fact, since the beginning of this year alone, Sucuriβs remote website scanner has detected various strains of this malware on over 24,000 websites.
---------------------------------------------
https://blog.sucuri.net/2023/09/bogus-url-shorteners-go-mobile-only-in-adseβ¦
βββ Alert: Phishing Campaigns Deliver New SideTwist Backdoor and Agent Tesla Variant βββ
---------------------------------------------
The Iranian threat actor tracked as APT34 has been linked to a new phishing attack that leads to the deployment of a variant of a backdoor called SideTwist. βAPT34 has a high level of attack technology, can design different intrusion methods for different types of targets, and has supply chain attack capability,β NSFOCUS Security Labs said in a report published last week.
---------------------------------------------
https://thehackernews.com/2023/09/alert-phishing-campaigns-deliver-new.html
βββ Lord Of The Ring0 - Part 5 βββ
---------------------------------------------
In this blog post, Iβll explain two common hooking methods (IRP Hooking and SSDT Hooking) and two different injection techniques from the kernel to the user mode for both shellcode and DLL (APC and CreateThread) with code snippets and examples from Nidhogg.
---------------------------------------------
https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html
βββ A review of SolarWinds attack on Orion platform using persistent threat agents and techniques for gaining unauthorized access βββ
---------------------------------------------
This paper of work examines the SolarWinds attack, designed on Orion Platform security incident. It analyses the persistent threats agents and potential technical attack techniques to gain unauthorized access. [..] It concludes with necessary remediation actions on cyber hygiene countermeasures, common vulnerabilities and exposure analysis and solutions.
---------------------------------------------
https://arxiv.org/abs/2308.10294
βββ What is ISO 27002:2022 Control 8.9? A Quick Look at the Essentials βββ
---------------------------------------------
Configuration management is now presented as a new control in the new, revised edition of ISO 27002:2022 (Control 8.9). It is a crucial component of an organizations security management. This blog will guide you through the essentials of Control 8.9.
---------------------------------------------
https://www.tripwire.com/state-of-security/what-iso-270022022-control-89-quβ¦
βββ Peeking under the bonnet of the Litter Robot 3 βββ
---------------------------------------------
I began to wonder what interesting things I may find when doing a small tear down of the Litter Robotβs components including the PCB, firmware, and mobile application. [..] So, please follow me on my journey to understanding the extraction and analysis of an ESP32 IOT device, reverse engineering a Flutter mobile application, and capturing and analysing the network traffic between the device, the mobile app and the internet.
---------------------------------------------
https://www.elttam.com/blog/re-of-lr3/
βββ Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach βββ
---------------------------------------------
[..] Palant said while LastPass indeed improved its master password defaults in 2018, it did not force all existing customers who had master passwords of lesser lengths to pick new credentials [..] Palant believes LastPass also failed to upgrade many older, original customers to more secure encryption protections [..] According to MetaMaskβs Monahan, users who stored any important passwords with LastPass [..] should change those credentials immediately
---------------------------------------------
https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-sβ¦
βββ Android 14 blocks all modification of system certificates, even as root βββ
---------------------------------------------
If youre an Android developer, tester, reverse engineer, or anybody else interested in directly controlling who your device trusts, this is going to create some new challenges. Before we get into the finer details, first I want to talk a little about the context around Android CA management and how we got here [..]
---------------------------------------------
https://httptoolkit.com/blog/android-14-breaks-system-certificate-installatβ¦
βββ You patched yet? Years-old Microsoft security holes still hot targets for cyber-crooks βββ
---------------------------------------------
And so we can believe it when Qualys yesterday said 15 of the 20 most-exploited software vulnerabilities it has observed are in Microsofts code. [..] The No. 1 flaw on the list was patched in November 2017, a code execution hole in Microsoft Offices Equation Editor wed have hoped had been mostly mitigated by now.
---------------------------------------------
https://www.theregister.com/2023/09/05/qualys_top_20_vulnerabilities/
βββ Code Vulnerabilities Leak Emails in Proton Mail βββ
---------------------------------------------
In this blog post, we first present the technical details of the vulnerabilities we found in Proton Mail. We show how an innocent-looking piece of code led to a Cross-Site Scripting issue that made it possible for attackers to steal unencrypted emails and impersonate victims. As part of a 3-post series, we will cover other severe vulnerabilities we found in Skiff and Tutanota Desktop in the coming weeks.
---------------------------------------------
https://www.sonarsource.com/blog/code-vulnerabilities-leak-emails-in-protonβ¦
βββ 4,500 of the Top 1 Million Websites Leaked Source Code, Secrets βββ
---------------------------------------------
We scanned the Alexa Top 1 Million Websites for leaked secrets. We found thousands of exposed source code repositories and hundreds of live API keys. These are our top 5 takeaways
---------------------------------------------
https://trufflesecurity.com/blog/4500-of-the-top-1-million-websites-leaked-β¦
βββ Apache Superset Part II: RCE, Credential Harvesting and More βββ
---------------------------------------------
In this post, we disclose all the issues weβve reported to Superset, including two new high severity vulnerabilities, CVE-2023-39265 and CVE-2023-37941, that are fixed in the just released 2.1.1 version of Superset. We strongly recommend that all Superset users upgrade to this version.
---------------------------------------------
https://www.horizon3.ai/apache-superset-part-ii-rce-credential-harvesting-aβ¦
βββ New phishing tool hijacked thousands of Microsoft business email accounts βββ
---------------------------------------------
Researchers have uncovered a hidden βphishing empireβ targeting businesses in Europe, Australia and the U.S. with a sophisticated new tool. A hacking group called W3LL, which has been active since at least 2017, has created an English-language underground marketplace to sell a phishing kit that can bypass multi-factor authentication, according to a report [..]
---------------------------------------------
https://therecord.media/w3ll-phishing-toolkit-bec-microsoft-365-accounts
βββ Distribution of Backdoor via Malicious LNK: RedEyes (ScarCruft) βββ
---------------------------------------------
AhnLab Security Emergency response Center (ASEC) has confirmed that malware [1], which was previously distributed in CHM format, is now being distributed in LNK format. This malware executes additional scripts located at a specific URL through the mshta process. It then receives commands from the threat actorβs server to carry out additional malicious behaviors.
---------------------------------------------
https://asec.ahnlab.com/en/56756/
βββ SapphireStealer: Open-source information stealer enables credential and data theft βββ
---------------------------------------------
SapphireStealer appears to be delivered as part of a multi-stage infection process, with threat actors leveraging open-source malware downloaders like FUD-Loader to deliver SapphireStealer to potential victims.
---------------------------------------------
https://blog.talosintelligence.com/sapphirestealer-goes-open-source/
βββ Threat Actor Continues to Plague the Open-Source Ecosystem with Sophisticated Info-Stealing Malware βββ
---------------------------------------------
In May, we sounded the alarm about PYTA31, an advanced persistent threat actor distributing the βWhiteSnakeβ malware. Since then, weβve been rigorously monitoring this group, which has been active from April through mid-August, distributing malicious PyPI packages laced with βWhiteSnake Malware.β
---------------------------------------------
https://checkmarx.com/blog/threat-actor-continues-to-plague-the-open-sourceβ¦
=====================
= Vulnerabilities =
=====================
βββ Sicherheitsupdates: Angreifer kΓΆnnen Kontrolle ΓΌber Asus-Router erlangen βββ
---------------------------------------------
Mehrere SicherheitslΓΌcken gefΓ€hrden verschiedene Router-Modelle von Asus. Patches sichern GerΓ€te ab.
---------------------------------------------
https://heise.de/-9296210
βββ Webbrowser: Hochriskante Schwachstellen in Google Chrome geschlossen βββ
---------------------------------------------
Google stopft mit aktualisiertern Chrome-Versionen vier als hochriskant eingestufte SicherheitslΓΌcken.
---------------------------------------------
https://heise.de/-9295977
βββ Researchers Discover Critical Vulnerability in PHPFusion CMS βββ
---------------------------------------------
No patch is available yet for the bug, which can enable remote code execution under the correct circumstances.
---------------------------------------------
https://www.darkreading.com/application-security/researchers-discover-critiβ¦
βββ Forthcoming OpenSSL Release βββ
---------------------------------------------
The OpenSSL project team would like to announce the forthcoming release of OpenSSL version 1.1.1w. This release will be made available on Monday 11th September 2023 between 1300-1700 UTC. This is a security-fix release. The highest severity issue fixed in this release is Low
---------------------------------------------
https://mta.openssl.org/pipermail/openssl-announce/2023-September/000271.htβ¦
βββ 2023-08 Out-of-Cycle Security Bulletin: Junos OS: SRX Series and EX Series: Multiple vulnerabilities in J-Web can be combined to allow a preAuth Remote Code Execution βββ
---------------------------------------------
2023-09-05: Important update for SRX customers
---------------------------------------------
https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bβ¦
βββ Security updates for Wednesday βββ
---------------------------------------------
Security updates have been issued by Debian (aom and php7.3), Fedora (freeimage and mingw-freeimage), Scientific Linux (thunderbird), SUSE (amazon-ssm-agent, chromium, container-suseconnect, docker, glib2, php7, python-Django1, and rubygem-rails-html-sanitizer), and Ubuntu (kernel, linux, linux-aws, linux-aws-5.4, linux-gcp, linux-hwe-5.4, linux-ibm, linux-iot, linux-kvm, linux-oracle, linux-oracle-5.4, linux, linux-aws, linux-aws-6.2, linux-hwe-6.2, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-6.2, linux-raspi, linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, and linux, linux-gcp, linux-hwe-5.15, linux-ibm, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia).
---------------------------------------------
https://lwn.net/Articles/943679/
βββ VU#304455: Authentication Bypass in Tenda N300 Wireless N VDSL2 Modem Router βββ
---------------------------------------------
https://kb.cert.org/vuls/id/304455
βββ Stored Cross-Site Scripting Vulnerability Patched in Newsletter WordPress Plugin βββ
---------------------------------------------
https://www.wordfence.com/blog/2023/09/stored-cross-site-scripting-vulnerabβ¦
βββ AtlasVPN to Patch IP Leak Vulnerability After Public Disclosure βββ
---------------------------------------------
https://www.securityweek.com/atlasvpn-to-patch-ip-leak-vulnerability-after-β¦
βββ Dozens of Unpatched Flaws Expose Security Cameras Made by Defunct Company Zavio βββ
---------------------------------------------
https://www.securityweek.com/dozens-of-unpatched-flaws-expose-security-cameβ¦
βββ IBM Security Bulletins βββ
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 04-09-2023 18:00 β Dienstag 05-09-2023 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
βββ Hackers exploit MinIO storage system to breach corporate networks βββ
---------------------------------------------
Hackers are exploiting two recent MinIO vulnerabilities to breach object storage systems and access private information, execute arbitrary code, and potentially take over servers.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hackers-exploit-minio-storagβ¦
βββ DarkGate Malware Activity Spikes as Developer Rents Out Malware to Affiliates βββ
---------------------------------------------
A new malspam campaign has been observed deploying an off-the-shelf malware called DarkGate."The current spike in DarkGate malware activity is plausible given the fact that the developer of the malware has recently started to rent out the malware to a limited number of affiliates," Telekom Security said in a report published last week.
---------------------------------------------
https://thehackernews.com/2023/08/darkgate-malware-activity-spikes-as.html
βββ New Python Variant of Chaes Malware Targets Banking and Logistics Industries βββ
---------------------------------------------
Banking and logistics industries are under the onslaught of a reworked variant of a malware called Chaes."It has undergone major overhauls: from being rewritten entirely in Python, which resulted in lower detection rates by traditional defense systems, to a comprehensive redesign and an enhanced communication protocol," Morphisec said in a new detailed technical write-up [..]
---------------------------------------------
https://thehackernews.com/2023/09/new-python-variant-of-chaes-malware.html
βββ New BLISTER Malware Update Fuelling Stealthy Network Infiltration βββ
---------------------------------------------
An updated version of a malware loader known as BLISTER is being used as part of SocGholish infection chains to distribute an open-source command-and-control (C2) framework called Mythic.βNew BLISTER update includes keying feature that allows for precise targeting of victim networks and lowers exposure within VM/sandbox environments,β Elastic Security Labs researchers [..]
---------------------------------------------
https://thehackernews.com/2023/09/new-blister-malware-update-fuelling.html
βββ Nascent Malware Campaign Targets npm, PyPI, and RubyGems Developers βββ
---------------------------------------------
Python Malware: On the morning of September 3, 2023, our automated platform notified us of the first package in this campaign: kwxiaodian [..] This follows a common pattern we see across many early campaigns and one we witnessed a few weeks back [..] Obfuscated Javascript Packages: At roughly the same time, we received notifications about malicious package publications on npm. Rubygems Package: The Rubygems package follows similar patterns to both the PyPI and npm packages.
---------------------------------------------
https://blog.phylum.io/malware-campaign-targets-npm-pypi-and-rubygems-develβ¦
βββ Common usernames submitted to honeypots βββ
---------------------------------------------
Based on reader feedback, I decided to take a look at usernames submitted to honeypots. The usernames that are seen on a daily basis look very familiar. [..] I exported the username data from my honeypot, which is a little over 16 months of data
---------------------------------------------
https://isc.sans.edu/diary/rss/30188
βββ Uncovering Web Cache Deception: A Missed Vulnerability in the Most Unexpected Places βββ
---------------------------------------------
During the assessment of the target application, it was observed that the server had implemented restrictions to prevent Web Cache Deception attacks on API/Web endpoints that had session tokens or data in the response. Unfortunately, the same precautions were not implemented on the /404 page or any /nonexistingurl. We discovered that the response for any endpoint that doesnt exist contained PII information without any cache controls in place.
---------------------------------------------
https://blog.agilehunt.com/blogs/security/web-cache-deception-attack-on-404β¦
βββ Whats in a name? [..] The .kids TLD is not alright βββ
---------------------------------------------
Cisco Talos successfully registered the domain name: your-dns-needs-immediate-attention.kids. Talos set up an internet server to log all activity related to this name, and immediately we received a barrage of HTTP requests from systems running Microsoftβs βSystem Center Configuration Manager.β [..] we were able to masquerade as a trusted system. Networks using .kids names could be tricked into trusting our system to relay internal mail, dictate configuration management settings, and more.
---------------------------------------------
https://blog.talosintelligence.com/whats-in-a-name/
βββ Inconsistencies in the Common Vulnerability Scoring System (CVSS) βββ
---------------------------------------------
The goal of CVSS is to provide comparable scores across different evaluators. However, previous works indicate that CVSS might not reach this goal: If a vulnerability is evaluated by several analysts, their scores often differ. This raises the following questions: Are CVSS evaluations consistent? Which factors influence CVSS assessments? We systematically investigate these questions in an online survey with 196 CVSS users.
---------------------------------------------
https://www.schneier.com/blog/archives/2023/09/inconsistencies-in-the-commoβ¦
βββ CVE-2023-4634 - Tricky Unauthenticated RCE on Wordpress Media Library Assistant Plugin using a good old Imagick βββ
---------------------------------------------
As discussed in many of our articles, you already know that WordPress and related plugins are taking up a large space in the global attack surface [..] The vulnerability described below is a perfect example
---------------------------------------------
https://patrowl.io/blog-wordpress-media-library-rce-cve-2023-4634/
βββ When URL parsers disagree (CVE-2023-38633) βββ
---------------------------------------------
Discovery and walkthrough of CVE-2023-38633 in librsvg, when two URL parser implementations (Rust and Glib) disagree on file scheme parsing leading to path traversal.
---------------------------------------------
https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-3β¦
βββ Vorsicht vor betrΓΌgerischen PayPal-Anrufen βββ
---------------------------------------------
Ihr Telefon klingelt. Sie heben ab und eine Tonbandstimme meldet sich: βHallo, hier ist PayPal. Sie haben soeben 738 Euro ΓΌberwiesen. Um den Zahlvorgang abzubrechen, drΓΌcken Sie die 1.β DrΓΌcken Sie keinesfalls die 1, hierbei handelt es sich um eine Betrugsmasche. Legen Sie auf!
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-betruegerischen-paypal-β¦
=====================
= Vulnerabilities =
=====================
βββ ASUS routers vulnerable to critical remote code execution flaws βββ
---------------------------------------------
Three critical-severity remote code execution vulnerabilities impact ASUS RT-AX55, RT-AX56U_V2, and RT-AC86U routers, potentially allowing threat actors to hijack devices if security updates are not installed.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/asus-routers-vulnerable-to-cβ¦
βββ Multiple vulnerabilities in F-RevoCRM βββ
---------------------------------------------
* An attacker who can access the product may execute an arbitrary OS command on the server where the product is running - CVE-2023-41149
* An arbitrary script may be executed on the web browser of the user who is using the product - CVE-2023-41150
---------------------------------------------
https://jvn.jp/en/jp/JVN78113802/
βββ Festo: MSE6-C2M/D2M/E2M Incomplete User Documentation of Remote Accessible Functions (CVE-2023-3634) βββ
---------------------------------------------
Festo developed the products according to the respective state of the art. As a result, the protocols used no longer fully meet todays security requirements. The products are designed and developed for use in sealed-off (industrial) networks. If the network is not adequately sealed off, unauthorized access to the product can cause damage or malfunctions, particularly Denial of Service (DoS) or loss of integrity. Remediation: Update of user documentation in next product version.
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2023-020/
βββ 9 Vulnerabilities Patched in SEL Power System Management Products βββ
---------------------------------------------
Researchers at industrial cybersecurity firm Nozomi Networks have analyzed the companyβs SEL-5030 acSELerator QuickSet and SEL-5037 Grid Configurator, software products designed to allow engineers and technicians to configure and manage devices for power system protection, control, metering and monitoring, and to create and deploy settings for SEL power system devices. Nozomi researchers discovered a total of nine vulnerabilities, including four that have been assigned a βhigh severityβ rating
---------------------------------------------
https://www.securityweek.com/9-vulnerabilities-patched-in-sel-power-system-β¦
βββ CISA Releases Two Industrial Control Systems Advisories βββ
---------------------------------------------
* ICSA-23-248-01 Fujitsu Limited Real-time Video Transmission Gear IP series: CVE-2023-38433
* ICSMA-23-248-01 Softneta MedDream PACS Premium: CVE-2023-40150, CVE-2023-39227
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/09/05/cisa-releases-two-industβ¦
βββ AVM: Fritzbox-Firmware 7.57 und 7.31 stopfen Sicherheitsleck βββ
---------------------------------------------
AVM hat fΓΌr zahlreiche Fritzboxen die Firmware 7.57 und 7.31 verΓΆffentlicht. Es handelt sich um ein StabilitΓ€ts- und Sicherheitsupdate.
---------------------------------------------
https://heise.de/-9294758
βββ Xen XSA-437: arm32: The cache may not be properly cleaned/invalidated βββ
---------------------------------------------
A malicious guest may be able to read sensitive data from memory that previously belonged to another guest.
CVE ID: CVE-2023-34321
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-437.html
βββ Security updates for Tuesday βββ
---------------------------------------------
Security updates have been issued by Debian (file and thunderbird), Fedora (exercism, libtommath, moby-engine, and python-pyramid), Oracle (cups and kernel), Red Hat (firefox, kernel, kernel-rt, kpatch-patch, and thunderbird), SUSE (amazon-ecs-init, buildah, busybox, djvulibre, exempi, firefox, gsl, keylime, kubernetes1.18, php7, and sccache), and Ubuntu (docker-registry and linux-azure-5.4).
---------------------------------------------
https://lwn.net/Articles/943584/
βββ IBM UrbanCode Build is vulnerable to CVE-2023-24998 βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030594
βββ IBM UrbanCode Build is vulnerable to CVE-2023-28708 βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030596
βββ Vulnerabilities found in batik-all-1.7.jar, batik-dom-1.7.jar which is shipped with IBM Intelligent Operations Center(CVE-2018-8013, CVE-2017-5662, CVE-2015-0250) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030598
βββ Due to use of FasterXML Jackson-databind, IBM Cloud Pak for Multicloud Management Monitoring is vulnerable to a denial of service. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030601
βββ Due to use of Kafka, IBM Cloud Pak for Multicloud Management Monitoring could allow a remote attacker to obtain sensitive information. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030604
βββ Due to use of Spark from Hadoop, IBM Cloud Pak for Multicloud Management Monitoring could allow a remote attacker to traverse directories on the system. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030603
βββ Due to use of Apache Cassandra , IBM Cloud Pak for Multicloud Management Monitoring is vulnerable to an authenticated attacker to gaining elevated privileges. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030602
βββ Due to use of IBM WebSphere Application Server Liberty, IBM Cloud Pak for Multicloud Management Monitoring is vulnerable to multiple vulnerabilities. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030610
βββ Multiple vulnerabilities in IBM Java SDK affect WebSphere Service Registry and Repository due to July 2023 CPU βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030605
βββ Due to use of NodeJS, IBM Cloud Pak for Multicloud Management Monitoring is vulnerable to multiple security vulnerabilities. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030612
βββ A security vulnerability has been identified in IBM SDK, Java Technology Edition shipped with IBM Tivoli Business Service Manager (CVE-2022-40609) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030613
βββ Vulnerabilities in IBM Java SDK and IBM Java Runtime affect Rational Performance Tester βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030614
βββ Vulnerabilities in IBM Java SDK and IBM Java Runtime affect Rational Service Tester βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030615
βββ Vulnerability found in commons-io-1.3.1.jar which is shipped with IBM Intelligent Operations Center(CVE-2021-29425) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030617
βββ Vulnerabilities found in poi-ooxml-3.9.jar which is shipped with IBM Intelligent Operations Center(CVE-2017-5644, CVE-2019-12415, CVE-2014-3574, CVE-2014-3529) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030627
βββ Vulnerability found in pdfbox-1.8.1.jar which is shipped with IBM Intelligent Operations Center(220742, CVE-2018-11797, CVE-2016-2175) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030626
βββ Vulnerabilities found in poi-3.9.jar, poi-scratchpad-3.9.jar which is shipped with IBM Intelligent Operations Center(CVE-2017-12626, CVE-2014-9527) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030629
βββ Vulnerabilities found in jackson-mapper-asl-1.9.13.jar which is shipped with IBM Intelligent Operations Center(CVE-2019-10202, CVE-2019-10172) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030623
βββ Multiple Vulnerabilities found in Turf.js which is shipped with IBM Intelligent Operations Center(CVE-2020-15168, CVE-2022-0235) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030624
βββ Vulnerability found in fontbox-1.8.1.jarr which is shipped with IBM Intelligent Operations Center(CVE-2018-8036) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030622
βββ Vulnerabilities found in cxf-rt-transports-http-3.0.3.jar which is shipped with IBM Intelligent Operations Center(CVE-2016-6812, CVE-2018-8039, CVE-2020-13954) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030618
βββ Vulnerability found in fop-1.1.jar which is shipped with IBM Intelligent Operations Center(CVE-2017-5661) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030621
βββ Multiple Vulnerabilities found in Turf.js which is shipped with IBM Intelligent Operations Center(CVE-2021-44906, CVE-2020-7598) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030625
βββ Vulnerability found in dom4j-1.6.1.jar which is shipped with IBM Intelligent Operations Center(CVE-2018-1000632) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030619
βββ Vulnerability found in commons-codec-1.5.jar which is shipped with IBM Intelligent Operations Center(177835) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030616
βββ IBM MQ is affected by a denial of service vulnerability in OpenSSL (CVE-2023-2650) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7027922
βββ Multiple vulnerabilities found in IBM Java which is shipped with IBM Intelligent Operations Center(CVE-2022-21628, CVE-2022-21626, CVE-2022-21624, CVE-2022-21619) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030632
βββ A Vulnerability found in IBM Java which is shipped with IBM Intelligent Operations Center(CVE-2022-3676) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030634
βββ Vulnerability found in dom4j-1.6.1.jar which is shipped with IBM Intelligent Operations Center(CVE-2020-10683) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030636
βββ Vulnerability found in xmlgraphics-commons-1.5.jar which is shipped with IBM Intelligent Operations Center(CVE-2020-11988) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030630
βββ Multiple Vulnerabilities found in IBM DB2 which is shipped with IBM Intelligent Operations Center(CVE-2022-43929, CVE-2022-43927, CVE-2014-3577, CVE-2022-43930) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030638
βββ Vulnerabilities found in batik-bridge-1.7.jar which is shipped with IBM Intelligent Operations Center(CVE-2022-40146, CVE-2022-38648, CVE-2022-38398) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030631
βββ Vulnerability found in cxf-core-3.5.4.jar which is shipped with IBM Intelligent Operations Center(CVE-2022-46364) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030633
βββ Vulnerability found in cxf-rt-transports-http-3.5.3.jar which is shipped with IBM Intelligent Operations Center(CVE-2022-46363) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030635
βββ Vulnerability found in commons-net-1.4.1.jar which is shipped with IBM Intelligent Operations Center(CVE-2021-37533) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030637
βββ A vulnerability found in IBM Java which is shipped with IBM Intelligent Operations Center(CVE-2022-21426) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030641
βββ Vulnerabilities found in jackson-mapper-asl which is shipped with IBM Intelligent Operations Center(CVE-2019-10172, CVE-2019-10202) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030639
βββ Multiple vulnerabilities found in IBM Java which is shipped with IBM Intelligent Operations Center(CVE-2023-21830, CVE-2023-21843) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030640
βββ A vulnerability found in IBM WebSphere Application Server Liberty which is shipped with IBM Intelligent Operations Center(CVE-2023-24998) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030642
βββ A vulnerability found in IBM Java which is shipped with IBM Intelligent Operations Center(CVE-2023-30441) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030643
βββ A vulnerability found in IBM Java which is shipped with IBM Intelligent Operations Center(CVE-2022-40609) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030644
βββ Multiple Angular vulnerabilities affects IBM Tivoli Business Service Manager (CVE-2023-26116, CVE-2023-26117, CVE-2023-26118, CVE-2022-25869, CVE-2022-25844) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030667
βββ IBM SDK, Java Technology Edition, Security Update August 2023 βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030664
βββ Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli Business Service Manager (CVE-2023-22045, CVE-2023-22049) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030666
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 01-09-2023 18:00 β Montag 04-09-2023 18:00
Handler: Robert Waldner
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
βββ Chrome extensions can steal plaintext passwords from websites βββ
---------------------------------------------
A team of researchers from the University of Wisconsin-Madison has uploaded to the Chrome Web Store a proof-of-concept extension that can steal plaintext passwords from a websites source code.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/chrome-extensions-can-steal-β¦
βββ New βYouPornβ sextortion scam threatens to leak your sex tape βββ
---------------------------------------------
A new sextortion scam is making the rounds that pretends to be an email from the adult site YouPorn, warning that a sexually explicit video of you was uploaded to the site and suggesting you pay to have it taken down.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-youporn-sextortion-scam-β¦
βββ Yes, theres an npm package called @(-.-)/env and some others like it βββ
---------------------------------------------
Strangely named npm packages like -, @!-!/-, @(-.-)/env, and --hepl continue to exist on the internets largest software registry. While not all of these may necessarily pose an obvious security risk, some were named before npm enforced naming guidelines and could potentially break tooling.
---------------------------------------------
https://www.bleepingcomputer.com/news/technology/yes-theres-an-npm-package-β¦
βββ PoC Exploit Released for Critical VMware Arias SSH Auth Bypass Vulnerability βββ
---------------------------------------------
Proof-of-concept (PoC) exploit code has been made available for a recently disclosed and patched critical flaw impacting VMware Aria Operations for Networks (formerly vRealize Network Insight). The flaw, tracked as CVE-2023-34039, is rated 9.8 out of a maximum of 10 for severity and has been described as a case of authentication bypass due to a lack of unique cryptographic key generation.
---------------------------------------------
https://thehackernews.com/2023/09/poc-exploit-released-for-critical.html
βββ Webinar: Betrugsfallen im Internet erkennen βββ
---------------------------------------------
Wie schΓΌtze ich mich vor InternetkriminalitΓ€t? Wie kann ich einen Fake Shop von einem seriΓΆsen Online-Shop unterscheiden? Wo lauern die dreistesten Abo-Fallen? Wie verschaffen sich Kriminelle Zugang zu meinen Daten? Das Webinar informiert ΓΌber gΓ€ngige Betrugsfallen im Internet und hilft, diese zu erkennen. Nehmen Sie kostenlos teil: Dienstag 12. September 2023, 18:30 - 20:00 Uhr via zoom
---------------------------------------------
https://www.watchlist-internet.at/news/webinar-betrugsfallen-im-internet-erβ¦
βββ Neue Phishing-Mails im Namen der ΓGK und des Finanzamtes unterwegs βββ
---------------------------------------------
Aktuell sind zwei neue Phishing-Mails im Umlauf. In der einen geben sich Kriminelle als Γsterreichische Gesundheitskasse (ΓGK) aus und behaupten, dass Sie eine Erstattung erhalten. Im anderen Mail wird Ihnen im Namen von FinanzOnline eine ErhΓΆhung der Rente versprochen. Beide Mails fordern Sie auf, auf einen Link zu klicken. Ignorieren Sie diese Mails. Kriminelle stehlen damit Ihre Bankdaten.
---------------------------------------------
https://www.watchlist-internet.at/news/neue-phishing-mails-im-namen-der-oegβ¦
βββ Decryptor fΓΌr Key Group Ransomware verfΓΌgbar βββ
---------------------------------------------
Sicherheitsforscher von ElectricIQ haben in den Routinen der Key Group Ransomware eine Schwachstelle entdeckt, die es ermΓΆglichte, EntschlΓΌsselungs-Tools zur Wiederherstellung verschlΓΌsselter Dateien zu entwickeln.
---------------------------------------------
https://www.borncity.com/blog/2023/09/03/decryptor-fr-key-group-ransomware-β¦
βββ Firmware-Updates: Surface Laptop 4 und Surface Duo βββ
---------------------------------------------
Microsoft hat zum 31. August 2023 ein Firmware-Update fΓΌr seinen Surface Laptop 4 verΓΆffentlicht, welches Sicherheitsprobleme und ein Lade-Problem beheben soll. Zudem gibt es wohl das (vermutlich) letzte Firmware-Update fΓΌr das Smartphone Surface Duo.
---------------------------------------------
https://www.borncity.com/blog/2023/09/03/firmware-updates-surface-laptop-4-β¦
=====================
= Vulnerabilities =
=====================
βββ Tinycontrol LAN Controller v3 (LK3) Remote Admin Password Change βββ
---------------------------------------------
The application suffers from an insecure access control allowing an unauthenticated attacker to change accounts passwords and bypass authentication gaining panel control access.
---------------------------------------------
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5787.php
βββ Tinycontrol LAN Controller v3 (LK3) Remote Credentials Extraction PoC βββ
---------------------------------------------
An unauthenticated attacker can retrieve the controllers configuration backup file and extract sensitive information that can allow him/her/them to bypass security controls and penetrate the system in its entirety.
---------------------------------------------
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5786.php
βββ Security updates for Monday βββ
---------------------------------------------
Security updates have been issued by Debian (thunderbird), Fedora (firefox, kernel, kubernetes, and mediawiki), Mageia (openldap), SUSE (terraform), and Ubuntu (atftp, busybox, and thunderbird).
---------------------------------------------
https://lwn.net/Articles/943492/
βββ Mattermost security updates 8.1.1 (ESR) / 8.0.2 / 7.8.10 (ESR) released βββ
---------------------------------------------
Weβre informing you about a Mattermost security update, which addresses low- to medium-level severity vulnerabilities. We highly recommend that you apply the update. The security update is available for Mattermost dot releases 8.1.1 (Extended Support Release), 8.0.2, and 7.8.10 (Extended Support Release), for both Team Edition and Enterprise Edition.
---------------------------------------------
https://mattermost.com/blog/mattermost-security-updates-8-1-1-esr-8-0-2-7-8β¦
βββ SicherheitslΓΌcken (CVE-2023-40481, CVE-2023-31102) in 7-ZIP; Fix in Version 23.00 (August 2023) βββ
---------------------------------------------
Kurzer Nachtrag vom Ende August 2023. Im Programm 7-Zip, welches zum Packen und Entpacken von ZIP-Archivdateien eingesetzt wird, haben Sicherheitsforscher gleich zwei Schwachstellen gefunden. Die Schwachstellen CVE-2023-40481 und CVE-2023-31102 werden vom Sicherheitsaspekt als hoch riskant eingestuft [..] Beide Schwachstellen wurden am 21. November 2022 an die 7-ZIP-Entwickler gemeldet und laut der Zero-Day-Initiative vom 23. August 2023 mit einem Update der Software auf die Version 23.00 (damals noch Beta) geschlossen.
---------------------------------------------
https://www.borncity.com/blog/2023/09/03/sicherheitslcken-cve-2023-40481-cvβ¦
βββ IBM MQ Explorer is affected by vulnerabilities in Eclipse Jetty (CVE-2023-26048, CVE-2023-26049) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7027923
βββ IBM MQ is affected by a denial of service vulnerability in OpenSSL (CVE-2023-2650) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7027922
βββ Google Guava component is vulnerable to CVE-2023-2976 is used by IBM Maximo Application Suite βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030429
βββ IBM Security Verify Information Queue has multiple information exposure vulnerabilities (CVE-2023-33833, CVE-2023-33834, CVE-2023-33835) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7029584
βββ IBM Sterling Connect:Direct Browser User Interface vulnerable to remote code execution due to IBM Java (CVE-2022-40609) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030442
βββ IBM Sterling Connect:Direct Web Services is vulnerable to remote code execution due to IBM Java (CVE-2022-40609) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030443
βββ The IBM Engineering Lifecycle Engineering product using IBM WebSphere Application Server traditional is vulnerable to spoofing when using Web Server Plug-ins (CVE-2022-39161) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030450
βββ The IBM Engineering Lifecycle Engineering product using WebSphere Application Server Liberty is vulnerable to denial of service (CVE-2023-38737) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030449
βββ The IBM Engineering Lifecycle Engineering product using IBM\u00ae SDK, Java\u2122 Technology Edition is affected by multiple vulnerabilities (CVE-2023-22045, CVE-2023-22049) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030448
βββ IBM Event Endpoint Management is vulnerable to a denial of service in Netty (CVE-2023-34462) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030456
βββ A vulnerability has been identified in IBM WebSphere Application Server Liberty profile shipped with IBM Business Automation Workflow CVE-2023-38737) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030458
βββ A vulnerability found in IBM WebSphere Application Server Liberty which is shipped with IBM\u00ae Intelligent Operations Center(CVE-2022-34165) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030460
βββ IBM Cloud Pak for Network Automation 2.6 addresses multiple security vulnerabilities βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030469
βββ Multiple CVEs may affect Operating System packages shipped with IBM CICS TX Advanced 10.1 βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030462
βββ Multiple CVEs may affect Operating System packages shipped with IBM CICS TX Advanced 10.1 βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030461
βββ IBM Cloud Pak for Network Automation 2.6.1 fixes multiple security vulnerabilities βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030470
βββ Multiple vulnerabilities may affect IBM SDK, Java\u2122 Technology Edition for Content Collector for Email, Content Collector for File Systems and Content Collector for Microsoft SharePoint βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030463
βββ CVE-2022-40609 may affect Java Technology Edition used by Content Collector for Email, Content Collector for File Systems and Content Collector for Microsoft SharePoint βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030466
βββ CVE-2023-34149 may affect Apache Struts used by Content Collector for Email, Content Collector for File Systems and Content Collector for Microsoft SharePoint βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030464
βββ CVE-2023-34396 may affect Apache Struts used by Content Collector for Email, Content Collector for File Systems and Content Collector for Microsoft SharePoint. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030465
βββ IBM Java SDK update forJava deserialization filters (JEP 290) ignored during IBM ORB deserialization βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030522
βββ The Transformation Advisor Tool in IBM App Connect Enterprise is vulnerable to a denial of service due to Apache Johnzon (CVE-2023-33008) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030531
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 31-08-2023 18:00 β Freitag 01-09-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Robert Waldner
=====================
= News =
=====================
βββ Monitoring aus der Cloud: Kundensysteme dank schwacher StandardpasswΓΆrter gehackt βββ
---------------------------------------------
Hacker haben offenbar aufgrund schwacher StandardpasswΓΆrter eine Ransomware auf lokalen Systemen von Logicmonitor-Kunden verbreitet.
---------------------------------------------
https://www.golem.de/news/monitoring-aus-der-cloud-kundensysteme-dank-schwaβ¦
βββ WordPress Vulnerability & Patch Roundup August 2023 βββ
---------------------------------------------
To help educate website owners on emerging threats to their environments, weβve compiled a list of important security updates and vulnerability patches for the WordPress ecosystem this past month.
---------------------------------------------
https://blog.sucuri.net/2023/08/wordpress-vulnerability-patch-roundup-augusβ¦
βββ Potential Weaponizing of Honeypot Logs βββ
---------------------------------------------
Escape sequences have long been used to create ASCII art on screens and allow for customization of a userβs terminal. Because most terminals support some kind of escape sequences, it could be possible to manipulate the analystβs terminal, and hypothetically allow for remote code execution on the analysistβs system.
---------------------------------------------
https://isc.sans.edu/diary/rss/30178
βββ MONDEO: Multistage Botnet Detection βββ
---------------------------------------------
MONDEO is a multistage mechanism with a flexible design to detect DNS-based botnet malware. MONDEO is lightweight and can be deployed without requiring the deployment of software, agents, or configuration in mobile devices, allowing easy integration in core networks. MONDEO comprises four detection stages: Blacklisting/Whitelisting, Query rate analysis, DGA analysis, and Machine learning evaluation. [..] The implementation is available at github.
---------------------------------------------
https://arxiv.org/abs/2308.16570
βββ Mashing Enter to bypass full disk encryption with TPM, Clevis, dracut and systemd βββ
---------------------------------------------
Using the vulnerability described in this advisory an attacker may take control of an encrypted Linux computer during the early boot process, manually unlock TPM-based disk encryption and either modify or read sensitive information stored on the computerβs disk. This blog post runs through how this vulnerability was identified and exploited - no tiny soldering required.
---------------------------------------------
https://pulsesecurity.co.nz/advisories/tpm-luks-bypass
βββ BitLocker, TPM and Pluton | What Are They and How Do They Work βββ
---------------------------------------------
The optimal kind of security measure is imperceptible to the user during deployment and usage. Whenever there is a potential delay or difficulty due to a security feature, there is a high probability that users will attempt to circumvent security. This situation is particularly prevalent for data protection, and that is a scenario that organizations need to prevent.
---------------------------------------------
https://github.com/HotCakeX/Harden-Windows-Security/wiki/BitLocker,-TPM-andβ¦
βββ NetNTLMv1 Downgrade to compromise βββ
---------------------------------------------
In this blogpost Iβm going to blow your mind with some easy to understand NetNTLMv1 downgrade and relaying stuff. I will keep this blogpost simple, so that everyone can follow these steps, but I will link further resources for those who want to get the bigger picture at the end of this post.
---------------------------------------------
https://www.r-tec.net/r-tec-blog-netntlmv1-downgrade-to-compromise.html
βββ Free Decryptor Available for βKey Groupβ Ransomware βββ
---------------------------------------------
EclecticIQ has released a free decryption tool to help victims of the Key Group ransomware recover their data without paying a ransom.
---------------------------------------------
https://www.securityweek.com/free-decryptor-available-for-key-group-ransomwβ¦
βββ How companies can get a grip on βbusiness email compromiseβ βββ
---------------------------------------------
The delivery methods vary but the most exploited vector is email as a vehicle for a credential harvesting phishing campaign. Phishing, in general, has grown in scale and sophistication in recent years, with the most damaging form of phishing from a financial perspective being βbusiness email compromiseβ (BEC). According to Check Point Research, credential harvesting makes up about 15% of all email-based attacks but is the most financially damaging category.
---------------------------------------------
https://blog.checkpoint.com/security/how-companies-can-get-a-grip-on-busineβ¦
=====================
= Vulnerabilities =
=====================
βββ Multiple vulnerabilities in i-PRO VI Web Client βββ
---------------------------------------------
VI Web Client provided by i-PRO Co., Ltd. contains multiple vulnerabilities. Update the software to the latest version according to the information provided by the developer. These vulnerabilities have been addressed in VI Web Client 7.9.6.
---------------------------------------------
https://jvn.jp/en/jp/JVN60140221/
βββ Tinycontrol LAN Controller v3 (LK3) Remote Denial Of Service βββ
---------------------------------------------
The controller suffers from an unauthenticated remote denial of service vulnerability. An attacker can issue direct requests to the stm.cgi page to reboot and also reset factory settings on the device.
---------------------------------------------
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5785.php
βββ Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software βββ
---------------------------------------------
Autodesk AutoCAD and certain AutoCAD-based products have been affected by Out-of-Bounds Write, Heap-based Buffer Overflow, Untrusted Pointer Dereference, and Memory Corruption vulnerabilities. CVE IDs: CVE-2023-29073, CVE-2023-29074, CVE-2023-29075, CVE-2023-29076, CVE-2023-41139, CVE-2023-41140
---------------------------------------------
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0018
βββ Acronis: Updates dichten Sicherheitslecks in mehreren Produkten ab βββ
---------------------------------------------
Acronis hat Sicherheitsmeldungen zu insgesamt zwΓΆlf Schwachstellen in mehreren Produkten herausgegeben. Updates stehen lΓ€nger bereit.
---------------------------------------------
https://heise.de/-9291446
βββ Kritische LΓΌcke in VPN von Securepoint βββ
---------------------------------------------
Updates sollen eine kritische SicherheitslΓΌcke in der VPN-Software von Securepoint schlieΓen, durch die Angreifer ihre Rechte ausweiten kΓΆnnen.
---------------------------------------------
https://heise.de/-9291723
βββ Security updates for Friday βββ
---------------------------------------------
Security updates have been issued by Debian (chromium, firefox-esr, and gst-plugins-ugly1.0), Fedora (firefox, libeconf, libwebsockets, mosquitto, and rust-rustls-webpki), SUSE (amazon-ssm-agent, open-vm-tools, and terraform-provider-helm), and Ubuntu (linux-azure, linux-azure, linux-azure-5.15, linux-azure-fde, linux-gcp-5.15, linux-gcp-5.4, linux-oracle-5.4, linux-gkeop, linux-gkeop-5.15, linux-intel-iotg, linux-kvm, linux-oracle, and python-git).
---------------------------------------------
https://lwn.net/Articles/943302/
βββ IBM Security Bulletins βββ
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 30-08-2023 18:00 β Donnerstag 31-08-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Robert Waldner
=====================
= News =
=====================
βββ MMRat Android Trojan Executes Remote Financial Fraud Through Accessibility Feature βββ
---------------------------------------------
A previously undocumented Android banking trojan dubbed MMRat has been observed targeting mobile users in Southeast Asia since late June 2023 to remotely commandeer the devices and perform financial fraud."The malware, named after its distinctive package name com.mm.user, can capture user input and screen content, and can also remotely control victim devices through various techniques [..]
---------------------------------------------
https://thehackernews.com/2023/08/mmrat-android-trojan-executes-remote.html
βββ North Korean Hackers Deploy New Malicious Python Packages in PyPI Repository βββ
---------------------------------------------
Three additional malicious Python packages have been discovered in the Package Index (PyPI) repository as part of an ongoing malicious software supply chain campaign called VMConnect, with signs pointing to the involvement of North Korean state-sponsored threat actors.The findings come from ReversingLabs, which detected the packages tablediter, request-plus, and requestspro.
---------------------------------------------
https://thehackernews.com/2023/08/north-korean-hackers-deploy-new.html
βββ CISA and FBI Publish Joint Advisory on QakBot Infrastructure βββ
---------------------------------------------
CISA and FBI urge organizations to implement the recommendations contained within the joint CSA to reduce the likelihood of QakBot-related activity and promote identification of QakBot-facilitated ransomware and malware infections.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/08/30/cisa-and-fbi-publish-joiβ¦
βββ Converting Tokens to Session Cookies for Outlook Web Application βββ
---------------------------------------------
More and more organizations are adopting cloud-based solutions and federating with various identity providers. As these deployments increase in complexity, ensuring that Conditional Access Policies (CAPs) always act as expected can become a challenge. Today, we will share a technique weve been using to gain access to Outlook Web Application (OWA) in a browser by utilizing Bearer and Refresh tokens for the outlook.office365.com or outlook.office.com endpoints.
---------------------------------------------
https://labs.lares.com/owa-cap-bypass/
βββ Contain Yourself: Staying Undetected Using the Windows Container Isolation Framework βββ
---------------------------------------------
Starting with Windows Server 2016, Microsoft released its own version of this solution, Windows Containers, which offers process and Hyper-V isolation modes. The presentation covered the basics of Windows containers, broke down its file system isolation framework, reverse-engineered its main mini-filter driver, and detailed how it can be utilized and manipulated by a bad actor to bypass EDR products in multiple domains.
---------------------------------------------
https://www.deepinstinct.com/blog/contain-yourself-staying-undetected-usingβ¦
βββ NosyMonkey: API hooking and code injection made easy βββ
---------------------------------------------
As a researcher I often run into situations in which I need to make a compiled binary do things that it wouldnβt normally do or change the way it works in some way. [..] Enter, NosyMonkey: a library to inject code and place hooks that does almost everything for you. No need to write complicated ASM shellcode, or even think about allocating code, hot patching and other dirty business.
---------------------------------------------
https://www.anvilsecure.com/blog/nosymonkey.html
βββ Bypassing Defenderβs LSASS dump detection and PPL protection In Go βββ
---------------------------------------------
This blog reviews the technique that can be used to bypass Protected Process Light protection for any Windows process using theProcess Explorer driver and explores methods to bypass Windows Defenderβs signature-based mechanisms for process dump detection. The tool introduced in this blog (PPLBlade), is written entirely in GO and can be used as a POC for the techniques overviewed below.
---------------------------------------------
https://tastypepperoni.medium.com/bypassing-defenders-lsass-dump-detection-β¦
βββ Unpinnable Actions: How Malicious Code Can Sneak into Your GitHub Actions Workflows βββ
---------------------------------------------
In todayβs post, we look at action pinning, one of the profound mitigations against supply chain attacks in the GitHub Actions ecosystem. It turns out, though, that action pinning comes with a downside β a pitfall we call "unpinnable actions" that allows attackers to execute code in GitHub Actions workflows.
---------------------------------------------
https://www.paloaltonetworks.com/blog/prisma-cloud/unpinnable-actions-githuβ¦
βββ Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store βββ
---------------------------------------------
ESET researchers have identified two active campaigns targeting Android users, where the threat actors behind the tools for Telegram and Signal are attributed to the China-aligned APT group GREF. Most likely active since July 2020 and since July 2022, respectively for each malicious app, the campaigns have distributed the Android BadBazaar espionage code through the Google Play store, Samsung Galaxy Store, and dedicated websites posing as legitimate encrypted chat applications [..]
---------------------------------------------
https://www.helpnetsecurity.com/2023/08/31/fake-signal-telegram-apps/
βββ Infamous Chisel Malware Analysis Report βββ
---------------------------------------------
Infamous Chisel is a collection of components targeting Android devices.This malware is associated with Sandworm activity.It performs periodic scanning of files and network information for exfiltration.System and application configuration files are exfiltrated from an infected device.
---------------------------------------------
https://www.cisa.gov/news-events/analysis-reports/ar23-243a
βββ A Deep Dive into Brute Ratel C4 payloads βββ
---------------------------------------------
Summary Brute Ratel C4 is a Red Team & Adversary Simulation software that can be considered an alternative to Cobalt Strike. In this blog post, weβre presenting a technical analysis of a Brute Ratel badger/agent that doesnβt implement all the recent features of the framework.
---------------------------------------------
https://cybergeeks.tech/a-deep-dive-into-brute-ratel-c4-payloads/
=====================
= Vulnerabilities =
=====================
βββ WordPress migration add-on flaw could lead to data breaches βββ
---------------------------------------------
All-in-One WP Migration, a popular data migration plugin for WordPress sites that has 5 million active installations, suffers from unauthenticated access token manipulation that could allow attackers to access sensitive site information.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/wordpress-migration-add-on-fβ¦
βββ Wordpress: Cloud-Extensions fΓΌr Migrationstool ermΓΆglichen Datenklau βββ
---------------------------------------------
Die Box-, Google-Drive-, Onedrive- und Dropbox-Erweiterungen fΓΌr ein weitverbreitetes Wordpress-Migrations-Plug-in sind anfΓ€llig fΓΌr Datenklau.
---------------------------------------------
https://www.golem.de/news/wordpress-cloud-extensions-fuer-migrationstool-erβ¦
βββ Drupal: Unified Twig Extensions - Moderately critical - Cross Site Scripting - SA-CONTRIB-2023-041 βββ
---------------------------------------------
This module makes PatternLab's custom Twig functions available to Drupal theming.
The module's included examples don't sufficiently filter data.
This vulnerability is mitigated by the fact that the included examples must have been copied to a site's theme.
---------------------------------------------
https://www.drupal.org/sa-contrib-2023-041
βββ Drupal: Obfuscate Email - Less critical - Cross Site Scripting - SA-CONTRIB-2023-042 βββ
---------------------------------------------
This module enables you to hide email addresses from bots and site scrapers by using the rot13 strategy. The module doesnt sufficiently escape the data attribute under the scenario a user has access to manipulate that value. This vulnerability is mitigated by the fact that an attacker must have a role with permissions to allow data attributes in content on a site.
---------------------------------------------
https://www.drupal.org/sa-contrib-2023-042
βββ CISA Releases Four Industrial Control Systems Advisories βββ
---------------------------------------------
* ICSA-23-243-01 ARDEREG Sistemas SCADA, CVE-2023-4485
* ICSA-23-243-02 GE Digital CIMPLICITY, CVE-2023-4487
* ICSA-23-243-03 PTC Kepware KepServerEX, CVE-2023-29444, CVE-2023-29445, CVE-2023-29446, CVE-2023-29447
* ICSA-23-243-04 Digi RealPort Protocol, CVE-2023-4299
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/08/31/cisa-releases-four-indusβ¦
βββ Sicherheitsupdates: Schadcode-Attacken auf Aruba-Switches mΓΆglich βββ
---------------------------------------------
Verschiedene Switch-Modelle von Aruba sind verwundbar. Abgesicherte Ausgaben von ArubaOS schaffen Abhilfe.
---------------------------------------------
https://heise.de/-9290375
βββ Big Data: Splunk dichtet hochriskante LΓΌcken ab βββ
---------------------------------------------
Die Big-Data-Experten von Splunk haben aktualisierte Software bereitgestellt, die teils hochriskante Schwachstellen in der Analysesoftware ausbessert.
---------------------------------------------
https://heise.de/-9290325
βββ VMware Tools: Schwachstelle ermΓΆglicht Angreifern unbefugte Aktionen in GΓ€sten βββ
---------------------------------------------
VMware warnt vor einer SicherheitslΓΌcke in VMware Tools. Sie ermΓΆglicht eine Man-in-the-Middle-Attacke auf Gastsysteme.
---------------------------------------------
https://heise.de/-9290783
βββ Wordfence Intelligence Weekly WordPress Vulnerability Report (August 21, 2023 to August 27, 2023) βββ
---------------------------------------------
Last week, there were 43 vulnerabilities disclosed in 38 WordPress Plugins and no WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 23 Vulnerability Researchers that contributed to WordPress Security last week.
---------------------------------------------
https://www.wordfence.com/blog/2023/08/wordfence-intelligence-weekly-wordprβ¦
βββ Security updates for Thursday βββ
---------------------------------------------
Security updates have been issued by Debian (firefox-esr, json-c, opendmarc, and otrs2), Red Hat (java-1.8.0-ibm and kpatch-patch), Scientific Linux (kernel), Slackware (mozilla), SUSE (haproxy, php7, vim, and xen), and Ubuntu (elfutils, frr, and linux-gcp, linux-starfive).
---------------------------------------------
https://lwn.net/Articles/943192/
βββ Mozilla Releases Security Updates for Firefox and Firefox ESR βββ
---------------------------------------------
Mozilla has released security updates to address vulnerabilities for Firefox 117, Firefox ESR 115.2, and Firefox ESR 102.15. A cyber threat actor can exploit some of these vulnerabilities to take control of an affected system.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/08/30/mozilla-releases-securitβ¦
βββ Weitere Windows-Rechteausweitung ΓΌber Razer Synapse (SYSS-2023-002) βββ
---------------------------------------------
In Razer Synapse kann ΓΌber eine Time-of-check Time-of-use Race Condition die ΓberprΓΌfung fremder Bibliotheken durch den Dienst ΓΌberlistet werden.
---------------------------------------------
https://www.syss.de/pentest-blog/weitere-windows-rechteausweitung-ueber-razβ¦
βββ Cisco Unified Communications Products Privilege Escalation Vulnerability βββ
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisoβ¦
βββ Multiple vulnerabilities in IBM Storage Defender Data Protect βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7029861
βββ Security Vulnerability in the IBM Java Runtime Environment (JRE) affect the 3592 Enterprise Tape Controller βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/691223
βββ Vulnerability in SSLv3 affects IBM System Storage Tape Controller 3592 Model C07 (CVE-2014-3566) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/690117
βββ IBM Java Runtime (JRE) security vulnerabilities CVE-2022-21426 in FileNet Content Manager βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/6983442
βββ Security vulnerability in IBM Java Object Request Broker (ORB) in FileNet Content Manager βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7027874
βββ IBM Java Runtime (JRE) security vulnerabilities CVE-2023-21830, CVE-2023-21843 in FileNet Content Manager βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/6983440
βββ Multiple Security vulnerabilities in IBM Java in FileNet Content Manager βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7001699
βββ IBM QRadar User Behavior Analytics is vulnerable to components with known vulnerabilities βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7029864
βββ TADDM affected by vulnerability due to IBM Java and its runtime βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7029984
βββ Due to use of Mozilla Firefox, IBM Cloud Pak for Multicloud Management Monitoring is vulnerable to multiple vulnerabilities. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7029986
βββ Multiple Vulnerabilities in IBM Java SDK affect IBM WebSphere Application Server and IBM WebSphere Application Server Liberty, which are used in IBM Security Guardium Key Lifecycle Manager βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7006475
βββ A vulnerability in Microsoft ASP.NET affects IBM Robotic Process Automation and may result in a denial of service (CVE-2022-29117) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7029527
βββ A vulnerability in Microsoft Azure SDK for .NET affects IBM Robotic Process Automation and could allow a remote authenticated attacker to obtain sensitive information (CVE-2022-26907). βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7029524
βββ Multiple security vulnerabilities affect IBM Robotic Process Automation βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7026754
βββ A vulnerability in MicrosoftAspNetCore.Identity affects IBM Robotic Process Automation and may result in allowing an attacker to bypass secrity restrictions (CVE-2023-33170). βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7029540
βββ Multiple security vulnerabilities in Java affect IBM Robotic Process Automation βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7026758
βββ IBM Security Guardium is affected by an Hazardous Input Validation vulnerability (CVE-2022-43903) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030110
βββ IBM MQ is affected by OpenSSL vulnerability (CVE-2023-2650) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030100
βββ IBM MQ is affected by a sensitive information disclosure vulnerability (CVE-2023-28514) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030101
βββ IBM MQ is affected by a denial of service vulnerability (CVE-2023-28513) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030102
βββ IBM MQ is vulnerable to a denial of service attack (CVE-2023-26285) βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030103
βββ IBM Edge Application Manager 4.5.2 addresses the security vulnerabilities listed in the CVEs below. βββ
---------------------------------------------
https://www.ibm.com/support/pages/node/7030159
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily