=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 07-12-2021 18:00 − Donnerstag 09-12-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Malicious NPM packages are part of a malware “barrage” hitting repositories ∗∗∗
---------------------------------------------
Peoples trust in repositories make them the perfect vectors for malware.
---------------------------------------------
https://arstechnica.com/?p=1818997
∗∗∗ New Cerber ransomware targets Confluence and GitLab servers ∗∗∗
---------------------------------------------
Cerber ransomware is back, as a new ransomware family adopts the old name and targets Atlassian Confluence and GitLab servers using remote code execution vulnerabilities.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-cerber-ransomware-target…
∗∗∗ Grafana fixes zero-day vulnerability after exploits spread over Twitter ∗∗∗
---------------------------------------------
Open-source analytics and interactive visualization solution Grafana received an emergency update today to fix a high-severity, zero-day vulnerability that enabled remote access to local files.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/grafana-fixes-zero-day-vulne…
∗∗∗ Emotet now drops Cobalt Strike, fast forwards ransomware attacks ∗∗∗
---------------------------------------------
In a concerning development, the notorious Emotet malware now installs Cobalt Strike beacons directly, giving immediate network access to threat actors and making ransomware attacks imminent.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/emotet-now-drops-cobalt-stri…
∗∗∗ The life cycle of phishing pages ∗∗∗
---------------------------------------------
Weve analyzed the life cycle of phishing pages, how they transform during their active period, and the domains where they're located.
---------------------------------------------
https://securelist.com/phishing-page-life-cycle/105171/
∗∗∗ Moobot Botnet Chews Up Hikvision Surveillance Systems ∗∗∗
---------------------------------------------
Attackers are milking unpatched Hikvision video systems to drop a DDoS botnet, researchers warned.
---------------------------------------------
https://threatpost.com/moobot-botnet-hikvision-surveillance-systems/176879/
∗∗∗ PHP Re-Infectors – The Malware that Keeps On Giving ∗∗∗
---------------------------------------------
Attackers have developed some methods for protecting their work as we will explore in this post. We will also look at how you can remove this infection from a compromised website.
---------------------------------------------
https://blog.sucuri.net/2021/12/php-re-infectors-the-malware-that-keeps-on-…
∗∗∗ Over 300,000 MikroTik Devices Found Vulnerable to Remote Hacking Bugs ∗∗∗
---------------------------------------------
At least 300,000 IP addresses associated with MikroTik devices have been found vulnerable to multiple remotely exploitable security vulnerabilities that have since been patched by the popular supplier of routers and wireless ISP devices.
---------------------------------------------
https://thehackernews.com/2021/12/over-300000-mikrotik-devices-found.html
∗∗∗ Microsoft and GitHub OAuth Implementation Vulnerabilities Lead to Redirection Attacks ∗∗∗
---------------------------------------------
Vulnerabilities in Microsoft and others’ popular OAuth2.0 implementations lead to redirection attacks that bypass most phishing detection solutions and email security solutions.
---------------------------------------------
https://www.proofpoint.com/us/blog/cloud-security/microsoft-and-github-oaut…
∗∗∗ Virtualisiertes USB als Sicherheitslücke ∗∗∗
---------------------------------------------
USB+Cloud=Gefahr. Lücken in USB-über-Ethernet-Treibern für Clouddienste erlauben Angreifern, lokal und serverseitig beliebigen Code im Kernel-Modus auszuführen.
---------------------------------------------
https://heise.de/-6289521
∗∗∗ Is your web browser vulnerable to data theft? XS-Leak explained ∗∗∗
---------------------------------------------
IT security researchers recently exposed new cross-site leak (XS-Leak) attacks against modern-day browsers. But what is XS-Leak anyway?
---------------------------------------------
https://blog.malwarebytes.com/explained/2021/12/is-your-web-browser-vulnera…
∗∗∗ Was threat actor KAX17 de-anonymizing the Tor network? ∗∗∗
---------------------------------------------
A threat actor was found to be running a high percentage of the Tor Networks servers.
---------------------------------------------
https://blog.malwarebytes.com/reports/2021/12/was-threat-actor-kax17-de-ano…
∗∗∗ Detecting Patient Zero Web Threats in Real Time With Advanced URL Filtering ∗∗∗
---------------------------------------------
Patient zero web threats are malicious URLs that are being seen for the first time. We discuss how to stop them despite attacker cloaking techniques.
---------------------------------------------
https://unit42.paloaltonetworks.com/patient-zero-web-threats/
∗∗∗ CISA Releases Guidance on Protecting Organization-Run Social Media Accounts ∗∗∗
---------------------------------------------
CISA has released Capability Enhancement Guide (CEG): Social Media Account Protection, which details ways to protect the security of organization-run social media accounts.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/12/09/cisa-releases-gui…
∗∗∗ Two Birds with One Stone: An Introduction to V8 and JIT Exploitation ∗∗∗
---------------------------------------------
In this special blog series, ZDI Vulnerability Researcher Hossein Lotfi looks at the exploitation of V8 – Google’s open-source high-performance JavaScript and WebAssembly engine – through the lens of a bug used during Pwn2Own Vancouver 2021.
---------------------------------------------
https://www.thezdi.com/blog/2021/12/6/two-birds-with-one-stone-an-introduct…
∗∗∗ Kernel Karnage – Part 6 (Last Call) ∗∗∗
---------------------------------------------
Having covered process, thread and image callbacks in the previous blogposts, I think it’s only fair if we conclude this topic with registry and object callbacks.
---------------------------------------------
https://blog.nviso.eu/2021/12/09/kernel-karnage-part-6-last-call/
=====================
= Vulnerabilities =
=====================
∗∗∗ SanDisk SecureAccess bug allows brute forcing vault passwords ∗∗∗
---------------------------------------------
Western Digital has fixed a security vulnerability that enabled attackers to brute force SanDisk SecureAccess passwords and access the users protected files.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/sandisk-secureaccess-bug-all…
∗∗∗ IBM Security Bulletins 2021-12-07 and 2021-12-08 ∗∗∗
---------------------------------------------
DB2, WebSphere Application Server, Tivoli Business Service Manager, PowerHA, Guardium Data Encryption, Watson Speech Services, Process Designer, Business Automation Workflow
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Jetzt patchen! Root-Lücke in Fernzugrifflösung SMA 100 von Sonicwall ∗∗∗
---------------------------------------------
Sicherheitsupdates schließen unter anderem kritische Schwachstellen in Secure-Mobile-Access-Appliances.
---------------------------------------------
https://heise.de/-6290012
∗∗∗ FortiOS- und FortiProxy-Updates schließen Sicherheitslücken, Check empfohlen ∗∗∗
---------------------------------------------
Fortinet ist auf ein unterwandertes System gestoßen und empfiehlt Administratoren die Überprüfung auf Einbruchsspuren. Zudem stehen Aktualisierungen bereit.
---------------------------------------------
https://heise.de/-6290546
∗∗∗ LibreOffice zieht Update wegen kritischer Schwachstelle vor ∗∗∗
---------------------------------------------
Eine Sicherheitslücke in der NSS-Bibliothek betrifft auch LibreOffice und ermöglicht das Unterschieben von Schadcode. Updates zur Absicherung stehen bereit.
---------------------------------------------
https://heise.de/-6290069
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (nss), Fedora (rubygem-rmagick), openSUSE (xen), Red Hat (firefox and nss), SUSE (kernel and xen), and Ubuntu (mailman and nss).
---------------------------------------------
https://lwn.net/Articles/878038/
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (firefox, libopenmpt, matrix-synapse, vim, and xen), Mageia (gmp, heimdal, libsndfile, nginx/vsftpd, openjdk, sharpziplib/mono-tools, and vim), Red Hat (java-1.8.0-ibm), Scientific Linux (firefox), SUSE (kernel-rt), and Ubuntu (bluez).
---------------------------------------------
https://lwn.net/Articles/878142/
∗∗∗ Bentley BE-2021-0005: Out-of-bounds and use-after-free vulnerabilities in Bentley MicroStation and Bentley View ∗∗∗
---------------------------------------------
https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
∗∗∗ Helmholz: Remote user enumeration in myREX24/myREX24-virtual ∗∗∗
---------------------------------------------
http://cert.vde.com/de/advisories/VDE-2021-058/
∗∗∗ Helmholz: Privilege Escalation in shDialup ∗∗∗
---------------------------------------------
http://cert.vde.com/de/advisories/VDE-2021-057/
∗∗∗ Hitachi Energy RTU500 OpenLDAP ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-341-01
∗∗∗ Hitachi Energy XMC20 and FOX61x ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-341-02
∗∗∗ FANUC Robot Controllers ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-243-02
∗∗∗ Hillrom Welch Allyn Cardio Products ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsma-21-343-01
∗∗∗ Hitachi Energy GMS600, PWC600, and Relion ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-343-01
∗∗∗ WECON LeviStudioU ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-343-02
∗∗∗ Multiple Vulnerabilities in Bosch BT software products ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html
∗∗∗ Stack Buffer Overflow Vulnerability in Surveillance Station ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-46
∗∗∗ Reflected XSS Vulnerability in Kazoo Server ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-54
∗∗∗ Improper Authentication Vulnerability in Qfile ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-55
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 06-12-2021 18:00 − Dienstag 07-12-2021 18:00
Handler: Robert Waldner
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Code-Schmuggel-Sicherheitslücke in Windows nur halbherzig geschlossen ∗∗∗
---------------------------------------------
Eine Lücke in Windows, die bösartige Webseiten zum Ausführen von Schadcode missbrauchen könnte, lässt sich trotz Update noch eingeschränkt missbrauchen.
---------------------------------------------
https://heise.de/-6288402
∗∗∗ Achtung: Jobangebote von „ab-group.info“ & „mctrl-marktforschung.com“ sind Fake ∗∗∗
---------------------------------------------
Homeoffice, flexible Arbeitszeiten, frei wählbare Anstellungsverhältnisse und obendrein gut bezahlt. Das versprechen Marktforschungsagenturen wie „ab-group.info“ & „mctrl-marktforschung.com“. Doch Vorsicht: Dabei handelt es sich um betrügerische Jobangebote. Interessierte übermitteln bei einer Bewerbung persönliche Daten sowie Ausweiskopien an Kriminelle. Im schlimmsten Fall werden im eigenen Namen Bankkonten für Kriminelle eröffnet!
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-jobangebote-von-ab-groupinfo…
∗∗∗ STOP Ransomware vaccine released to block encryption ∗∗∗
---------------------------------------------
German security software company G DATA has released a vaccine that will block STOP Ransomware from encrypting victims files after infection.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/stop-ransomware-vaccine-rele…
∗∗∗ Apache Kafka Cloud Clusters Expose Sensitive Data for Large Companies ∗∗∗
---------------------------------------------
The culprit is misconfigured Kafdrop interfaces, used for centralized management of the open-source platform.
---------------------------------------------
https://threatpost.com/apache-kafka-cloud-clusters-expose-data/176778/
∗∗∗ WooCommerce Credit Card Swiper Injected Into Random Plugin Files ∗∗∗
---------------------------------------------
It’s that time of year again! While website owners always need to be on guard, the holidays season is when online scams and credit card theft are most rampant. Administrators of ecommerce websites need to be extra vigilant as this case will demonstrate.
---------------------------------------------
https://blog.sucuri.net/2021/12/woocommerce-credit-card-swiper-injected-int…
∗∗∗ Cryptominers arent just a headache – theyre a big neon sign that Bad Things are on your network ∗∗∗
---------------------------------------------
So says Sophos in warning about Tor2Mine Monero malware Cryptominer malware removal is a routine piece of the cybersecurity landscape these days. Yet if criminals are hijacking your compute cycles to mine cryptocurrencies, chances are theres something worse lurking on your network too.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2021/12/07/sophos_tor2m…
∗∗∗ Encryption Does Not Equal Invisibility – Detecting Anomalous TLS Certificates with the Half-Space-Trees Algorithm ∗∗∗
---------------------------------------------
Author: Margit Hazenbroek tl;dr An approach to detecting suspicious TLS certificates using an incremental anomaly detection model is discussed. This model utilizes the Half-Space-Trees algorithm and provides our security operations teams (SOC) with the opportunity to detect suspicious behavior, in real-time, even when network traffic is encrypted.
---------------------------------------------
https://blog.fox-it.com/2021/12/07/encryption-does-not-equal-invisibility-d…
∗∗∗ XE Group – Exposed: 8 Years of Hacking & Card Skimming for Profit ∗∗∗
---------------------------------------------
In 2020 and 2021, Volexity identified multiple compromises related to a relatively unknown criminal threat actor that refers to itself as "XE Group". Volexity believes that XE Group is likely a Vietnamese-origin criminal threat actor whose intrusions follow an approximate pattern: Compromise of externally facing services via known exploits (e.g., Telerik UI vulnerabilities) Monetization of these compromises through installation of password theft or credit card skimming code for web [...]
---------------------------------------------
https://www.volexity.com/blog/2021/12/07/xe-group-exposed-8-years-of-hackin…
=====================
= Vulnerabilities =
=====================
∗∗∗ Angreifer attackieren PC-Management-Software Zoho ManageEngine Desktop Central ∗∗∗
---------------------------------------------
Nur die neusten Versionen schützen die Software. Zoho rät zu zügigen Updates.
---------------------------------------------
https://heise.de/-6287937
∗∗∗ 27 flaws in USB-over-network SDK affect millions of cloud users ∗∗∗
---------------------------------------------
Researchers have discovered 27 vulnerabilities in Eltima SDK, a library used by numerous cloud providers to remotely mount a local USB device.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/27-flaws-in-usb-over-network…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (nss), Debian (roundcube and runc), openSUSE (aaa_base, brotli, clamav, glib-networking, gmp, go1.16, hiredis, kernel, mozilla-nss, nodejs12, nodejs14, openexr, openssh, php7, python-Babel, ruby2.5, speex, wireshark, and xen), Oracle (kernel and nss), Red Hat (kpatch-patch, nss, rpm, and thunderbird), SUSE (brotli, clamav, glib-networking, gmp, kernel, mariadb, mozilla-nss, nodejs12, nodejs14, openssh, php7, python-Babel, and wireshark), and Ubuntu [...]
---------------------------------------------
https://lwn.net/Articles/877945/
∗∗∗ QNAP NAS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1252
∗∗∗ Google Android: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1251
∗∗∗ Security Bulletin: Multiple vulnerabilities in Redis affecting the IBM Event Streams UI ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Vulnerability in IBM Event Streams through Apache Kafka key/password validation (CVE-2021-38153) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-ibm-even…
∗∗∗ Security Bulletin: IBM Event Streams affected by multiple vulnerabilities in the Java runtime ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-event-streams-affecte…
∗∗∗ Security Bulletin: A vulnerability in Samba affects IBM Spectrum Scale SMB protocol access method (CVE-2021-20254) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-samba-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in Mozilla Firefox affect IBM Cloud Pak for Multicloud Management Monitoring ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities affect IBM HTTP Server (powered by Apache) for i ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Vulnerabilities in Node.js affecting IBM Event Streams (CVE-2021-22960 and CVE-2021-22959) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-node-j…
∗∗∗ Security Bulletin: Publicly disclosed vulnerabilities from Kernel affect IBM Netezza Host Management ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-publicly-disclosed-vulner…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 03-12-2021 18:00 − Montag 06-12-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Is My Site Hacked? 4 Gut Checks ∗∗∗
---------------------------------------------
Today, we’re looking at 4 quick gut check tests you can do to get the answer to the question, “is my site hacked?”
---------------------------------------------
https://blog.sucuri.net/2021/12/is-my-site-hacked-4-gut-checks.html
∗∗∗ Warning: Yet Another Zoho ManageEngine Product Found Under Active Attacks ∗∗∗
---------------------------------------------
Enterprise software provider Zoho on Friday warned that a newly patched critical flaw in its Desktop Central and Desktop Central MSP is being actively exploited by malicious actors, marking the third security vulnerability in its products to be abused in the wild in a span of four months. The issue, assigned the identifier CVE-2021-44515, is an authentication bypass vulnerability ...
---------------------------------------------
https://thehackernews.com/2021/12/warning-yet-another-zoho-manageengine.html
∗∗∗ Malicious KMSPico Windows Activator Stealing Users Cryptocurrency Wallets ∗∗∗
---------------------------------------------
Users looking to activate Windows without using a digital license or a product key are being targeted by tainted installers to deploy malware designed to plunder credentials and other information in cryptocurrency wallets. The malware, dubbed "CryptBot," is an information stealer capable of obtaining credentials for browsers, cryptocurrency wallets, browser cookies, credit cards, and capturing screenshots from the infected systems.
---------------------------------------------
https://thehackernews.com/2021/12/malicious-kmspico-windows-activator.html
∗∗∗ The Importance of Out-of-Band Networks ∗∗∗
---------------------------------------------
Out-of-band (or "OoB") networks are usually dedicated to management tasks. Many security appliances and servers have dedicated management interfaces that are used to set up, control, and monitor the device. A best practice is to connect those management interfaces to a dedicated network that is not directly connected to the network used to carry applications/users data.
---------------------------------------------
https://isc.sans.edu/diary/rss/28102
∗∗∗ Who Is the Network Access Broker ‘Babam’? ∗∗∗
---------------------------------------------
Rarely do cybercriminal gangs that deploy ransomware gain the initial access to the target themselves. More commonly, that access is purchased from a cybercriminal broker who specializes in stealing remote access credentials -- such as usernames and passwords needed to remotely connect to the targets network. In this post well look at the clues left behind by "Babam," the handle chosen by a cybercriminal who has sold such access to ransomware groups on many occasions ...
---------------------------------------------
https://krebsonsecurity.com/2021/12/who-is-the-network-access-broker-babam/
∗∗∗ Emotet’s back and it isn’t wasting any time ∗∗∗
---------------------------------------------
Last month we reported on how another notorious bit of malware, TrickBot, was helping Emotet come back from the dead. And then yesterday, several security researchers saw another huge spike in Emotet’s activity.
---------------------------------------------
https://blog.malwarebytes.com/trojans/2021/12/emotets-back-and-it-isnt-wast…
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities ∗∗∗
---------------------------------------------
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following:
- Execute code on the affected device or cause it to reload unexpectedly
- Cause LLDP database corruption on the affected device
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ IBM Security Bulletins 2021-12-03 ∗∗∗
---------------------------------------------
IBM Event Streams, IBM Cloud Automation Manager, IBM Data Studio Client, EDB PostreSQL with IBM, EDB Postgres Advanced Server with IBM, IBM Data Management Platform (Enterprise, Standard), IBM QRadar SIEM
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (isync, lib32-nss, nss, opera, and vivaldi), Debian (gerbv and xen), Fedora (autotrace, chafa, converseen, digikam, dmtx-utils, dvdauthor, eom, kxstitch, libsndfile, nss, pfstools, php-pecl-imagick, psiconv, q, R-magick, rss-glx, rubygem-rmagick, seamonkey, skopeo, synfig, synfigstudio, vdr-scraper2vdr, vdr-skinelchihd, vdr-skinnopacity, vdr-tvguide, vim, vips, and WindowMaker), Mageia (golang, kernel, kernel-linus, mariadb, and vim), openSUSE (aaa_base, python-Pygments, singularity, and tor), Red Hat (nss), Slackware (mozilla), SUSE (aaa_base, kernel, openssh, php74, and xen), and Ubuntu (libmodbus, lrzip, samba, and uriparser).
---------------------------------------------
https://lwn.net/Articles/877821/
∗∗∗ ABB Cyber Security Advisory: OmniCore RobotWare Missing Authentication Vulnerability CVE ID: CVE-2021-22279 ∗∗∗
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=SI20265&LanguageCod…
∗∗∗ F5 K50839343: NGINX ModSecurity WAF vulnerability CVE-2021-42717 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K50839343
∗∗∗ F5 K12705583: OpenSSH vulnerability CVE-2021-41617 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K12705583
∗∗∗ Auerswald COMpact Multiple Backdoors ∗∗∗
---------------------------------------------
https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-007/
∗∗∗ Auerswald COMpact Arbitrary File Disclosure ∗∗∗
---------------------------------------------
https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-006/
∗∗∗ Auerswald COMpact Privilege Escalation ∗∗∗
---------------------------------------------
https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-005/
∗∗∗ Auerswald COMfortel 1400/2600/3600 IP Authentication Bypass ∗∗∗
---------------------------------------------
https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-004/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 02-12-2021 18:00 − Freitag 03-12-2021 18:00
Handler: Robert Waldner
Co-Handler: Dimitri Robl
=====================
= News =
=====================
∗∗∗ Key Characteristics of Malicious Domains: Report ∗∗∗
---------------------------------------------
Newer top-level domains and certain hosting providers are frequent sources of malicious content, while newly registered domains and free SSL certificates are not any more likely than average to be risky, new research shows.
---------------------------------------------
https://www.darkreading.com/threat-intelligence/research-outs-the-providers…
∗∗∗ Vorsicht: „Neue Weihnachts-Emoji für Whatsapp“ ist eine Falle ∗∗∗
---------------------------------------------
Über eine WhatsApp-Nachricht, die Weihnachts-Emoji verspricht, werden Abo-Fallen und Schadsoftware verbreitet.
---------------------------------------------
https://futurezone.at/apps/vorsicht-neue-weihnachts-emoji-fuer-whatsapp-fal…
∗∗∗ The UPX Packer Will Never Die!, (Fri, Dec 3rd) ∗∗∗
---------------------------------------------
Today, many malware samples that you can find in the wild are "packed". The process of packing an executable file is not new and does not mean that it is de-facto malicious. Many developers decide to pack their software to protect the code.
---------------------------------------------
https://isc.sans.edu/diary/rss/28096
∗∗∗ Exploring Container Security: A Storage Vulnerability Deep Dive ∗∗∗
---------------------------------------------
Recently, the GKE Security team discovered a high severity vulnerability in Kubernetes (CVE-2021-25741) that allowed workloads to have access to parts of the host filesystem outside the mounted volumes boundaries. Although the vulnerability was patched back in September we thought it would be beneficial to write up a more in-depth analysis of the issue to share with the community.
---------------------------------------------
https://security.googleblog.com/2021/12/exploring-container-security-storag…
∗∗∗ Analysis: AWS SageMaker Jupyter Notebook Instance Takeover ∗∗∗
---------------------------------------------
During our research about security in data science tools we decided to look at Amazon SageMaker which is a fully managed machine learning service in AWS. Here is the long and short of our recent discovery. [...] Using the access token, the attacker can read data from S3 buckets, create VPC endpoints and more actions that are allowed by the SageMaker execution role and the “AmazonSageMakerFullAccess” policy. We reported the vulnerability we discovered to the AWS security team [...]
---------------------------------------------
https://blog.lightspin.io/aws-sagemaker-notebook-takeover-vulnerability
∗∗∗ Beispiele für Viren-Mails nach Übernahme eines Exchange-Servers ∗∗∗
---------------------------------------------
Und schon sind wir beim dritten Türchen im Security-Adventskalender meines Blogs. Ich hatte ja hier im Blog mehrfach gewarnt, dass ungepatchte Exchange-Server übernommen und zum Spam-Versand missbraucht werden. Ein Blog-Leser hat mir nun eine kurze Info zukommen lassen (danke), weil er einen kompromittierten Exchange-Server gefunden hat, der kompromittiert war und infizierte Spam-Mails verschickte.
---------------------------------------------
https://www.borncity.com/blog/2021/12/03/beispiele-fr-viren-mails-nach-bern…
∗∗∗ Magnat campaigns use malvertising to deliver information stealer, backdoor and malicious Chrome extension ∗∗∗
---------------------------------------------
Talos recently observed a malicious campaign offering fake installers of popular software as bait to get users to execute malware on their systems.
---------------------------------------------
https://blog.talosintelligence.com/2021/12/magnat-campaigns-use-malvertisin…
∗∗∗ Mehrwertdienste versuchen Sie in die Abo-Falle zu locken! ∗∗∗
---------------------------------------------
Einmal die falsche App am Handy installiert, einen falschen Link geöffnet oder auf einen vermeintlich harmlosen Button geklickt: Am Smartphone kann es sehr schnell passieren, dass Sie in einer Abo-Falle landen und Ihre Telefonrechnung plötzlich deutlich höher ausfällt als gewohnt. Doch keine Sorge: Auch wenn bereits Geld abgebucht wurde, können Sie die Rechnung bei Ihrem Mobilfunkanbieter beanstanden.
---------------------------------------------
https://www.watchlist-internet.at/news/mehrwertdienste-versuchen-sie-in-die…
=====================
= Vulnerabilities =
=====================
∗∗∗ Researchers discover 14 new data-stealing web browser attacks ∗∗∗
---------------------------------------------
IT security researchers from Ruhr-Universität Bochum (RUB) and the Niederrhein University of Applied Sciences have discovered 14 new types of XS-Leak cross-site leak attacks against modern web browsers, including Google Chrome, Microsoft Edge, Safari, and Mozilla Firefox.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/researchers-discover-14-new-…
∗∗∗ CISA and FBI Release Alert on Active Exploitation of CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus ∗∗∗
---------------------------------------------
This vulnerability was addressed by the update released by Zoho on September 16, 2021 for ServiceDesk Plus versions 11306 and above. If left unpatched, successful exploitation of the vulnerability allows an attacker to upload executable files and place webshells that enable post-exploitation activities, such as compromising administrator credentials, conducting lateral movement, and exfiltrating registry hives and Active Directory files.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/12/02/cisa-and-fbi-rele…
∗∗∗ IBM Security Bulletins 2021-12-02 ∗∗∗
---------------------------------------------
IBM Integration Bus, Power System, IBM Cloud Pak System, IBM SDK (Java Technology Edition), IBM Semeru Runtime, IBM Cognos Analytics
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Technical Advisory – Authenticated SQL Injection in SOAP Request in Broadcom CA Network Flow Analysis (CVE-2021-44050) ∗∗∗
---------------------------------------------
The Network Flow Analysis software (formerly known as CA Network Flow Analysis) is a network traffic monitoring solution, which is used to monitor and optimize the performance of network infrastructures. The “Interfaces” Section of the Network Flow Analysis web application made use of a Flash application, which performed SOAP requests.
---------------------------------------------
https://research.nccgroup.com/2021/12/02/technical-advisory-authenticated-s…
∗∗∗ Free Micropatches for the "InstallerFileTakeOver" 0day ∗∗∗
---------------------------------------------
Wow, this is the third 0day found by the same researcher we're patching in the last two weeks. Abdelhamid Naceri, a talented security researcher, has been keeping us busy with 0days this year. In January we micropatched a local privilege escalation in Windows Installer they had found (already fixed by Microsoft), and in the last two weeks we fixed an incompletely patched local privilege escalation in User Profile Service and a local privilege escalation [...]
---------------------------------------------
https://blog.0patch.com/2021/12/free-micropatches-for.html
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (krb5 and mailman), Debian (gmp and librecad), Fedora (php-symfony4 and wireshark), Mageia (bluez, busybox, docker-containerd, gfbgraph, hivex, nss, perl/perl-Encode, and udisks2/libblockdev), openSUSE (permissions), Oracle (mailman and mailman:2.1), Red Hat (mailman, mailman:2.1, and nss), Scientific Linux (mailman and nss), and SUSE (nodejs14).
---------------------------------------------
https://lwn.net/Articles/877582/
∗∗∗ Schneider Electric SESU ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Insufficient Entropy vulnerability in the Schneider Electric Software Update.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-01
∗∗∗ Johnson Controls Entrapass ∗∗∗
---------------------------------------------
This advisory contains mitigations for a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Johnson Controls Entrapass security management software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-02
∗∗∗ Distributed Data Systems WebHMI ∗∗∗
---------------------------------------------
This advisory contains mitigations for Authentication Bypass by Primary Weakness, and Unrestricted Upload of File with Dangerous Type vulnerabilities in Distributed Data Systems WebHMI SCADA systems.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-03
∗∗∗ Hitachi Energy RTU500 series BCI ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Improper Input Validation vulnerability in Hitachi Energy RTU500 series BCI remote terminal units.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-04
∗∗∗ Hitachi Energy Relion 670/650/SAM600-IO ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Insecure Default Initialization of Resource vulnerability in Hitachi Energy Relion 670/650/SAM600-IO Intelligent Electronic Devices (IEDs).
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-05
∗∗∗ Hitachi Energy APM Edge ∗∗∗
---------------------------------------------
This advisory contains mitigations for a Using Components with Known Vulnerabilities vulnerability in Hitachi Energy Transformer Asset Performance Management (APM) Edge software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-06
∗∗∗ Hitachi Energy PCM600 Update Manager ∗∗∗
---------------------------------------------
This advisory contains mitigations for a Improper Certificate Validation vulnerability in Hitachi Energy PCM600 Update Manager protection and control IED software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-07
∗∗∗ Hitachi Energy RTU500 series ∗∗∗
---------------------------------------------
This advisory contains mitigations for Observable Discrepancy, Buffer Over-read, and Out-of-bounds Read vulnerabilities in Hitachi Energy RTU500 remote terminal units.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-336-08
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 01-12-2021 18:00 − Donnerstag 02-12-2021 18:00
Handler: Wolfgang Menezes
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ New malware hides as legit nginx process on e-commerce servers ∗∗∗
---------------------------------------------
eCommerce servers are being targeted with remote access malware that hides on Nginx servers in a way that makes it virtually invisible to security solutions. [...] Because NginRAT hides as a normal Nginx process and the code exists only in the server’s memory, detecting it may be a challenge. However, the malware is launched using two variables, LD_PRELOAD and LD_L1BRARY_PATH. Administrators can use the latter, which contains the “typo,” to reveal the active malicious processes
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-malware-hides-as-legit-n…
∗∗∗ Nine WiFi routers used by millions were vulnerable to 226 flaws ∗∗∗
---------------------------------------------
Security researchers analyzed nine popular WiFi routers and found a total of 226 potential vulnerabilities in them, even when running the latest firmware.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/nine-wifi-routers-used-by-mi…
∗∗∗ WordPress Admin Creator – A Simple, But Effective Attack ∗∗∗
---------------------------------------------
Malicious admin users get added to vulnerable WordPress sites often. This can happen in a variety of different ways, and sometimes the malware that creates these malicious users can hide in plain sight. Injecting a malicious admin user into a WordPress site can allow attackers easy access back into a victims’ website after it has been cleaned.
---------------------------------------------
https://blog.sucuri.net/2021/12/wordpress-admin-creator-a-simple-but-effect…
∗∗∗ pip-audit ∗∗∗
---------------------------------------------
pip-audit is a tool for scanning Python environments for packages with known vulnerabilities. It uses the Python Packaging Advisory Database via the PyPI JSON API as a source of vulnerability reports.
---------------------------------------------
https://pypi.org/project/pip-audit/
∗∗∗ Digitale Vignette nur in offiziellen Shops kaufen! ∗∗∗
---------------------------------------------
Bereits ab 1. Dezember ist die Vignette für das Jahr 2022 auf österreichischen Autobahnen gültig. Die digitale Vignette kann dabei nicht nur an verschiedenen offiziellen Verkaufsstellen, sondern auch online gekauft werde. Das machen sich unseriöse AnbieterInnen zu Nutze und bieten die digitale Vignette ungerechtfertigt zu höheren Preisen an.
---------------------------------------------
https://www.watchlist-internet.at/news/digitale-vignette-nur-in-offiziellen…
∗∗∗ Azure Privilege Escalation via Azure API Permissions Abuse ∗∗∗
---------------------------------------------
In this post, I will explain how one of those permissions systems can be abused to escalate to Global Admin. I’ll explain how you as an attacker can abuse this system, and I will also explain how you as a defender can find, clean up, and prevent these abusable configurations.
---------------------------------------------
https://posts.specterops.io/azure-privilege-escalation-via-azure-api-permis…
∗∗∗ Windows 10/11: Falle beim "trusted" Apps-Installer; Emotet nutzt das ∗∗∗
---------------------------------------------
Hoh hoh, Leute, wir können heute das zweite Türchen im Adventskalender öffnen und schauen, was Microsoft so schönes dahinter versteckt hat, um Administratoren zu erschrecken. Heute finden wir den AppX-Installer, der in Windows 10 und Windows 11 zum Installieren von Anwendungen und Apps verwendet wird. Hier ein kleiner Überblick, warum man das Wörtchen Trusted Apps nicht so ganz wörtlich nehmen soll. Denn der zugehörige Installer kann durchaus Malware auf das System spülen (Emotet nutzt das aktuell bei Angriffen), die Apps aber wegen eines gravierenden Design-Fehlers als Trusted ausweisen.
---------------------------------------------
https://www.borncity.com/blog/2021/12/02/windows-10-11-falle-beim-trusted-a…
=====================
= Vulnerabilities =
=====================
∗∗∗ BigSig-Lücke: Mozilla schließt kritische Schwachstelle in Krypto-Bibliothek NSS ∗∗∗
---------------------------------------------
Setzen Anwendungen zur sicheren Kommunikation Mozillas Network Security Services ein, könnte eine kritische Lücke für Probleme sorgen. [...] Die Programmbibliothek kommt beispielsweise im E-Mail-Client Thunderbird, LibreOffice und verschiedenen PDF-Betrachtern zum Einsatz. Einer Warnmeldung von Mozilla zufolge ist der hauseigene Webbrowser Firefox nicht von der als „kritisch“ eingestuften Sicherheitslücke (CVE-2021-43527) betroffen.
---------------------------------------------
https://heise.de/-6281977
∗∗∗ Multiple missing authorization vulnerabilities in WordPress Plugin "Advanced Custom Fields" ∗∗∗
---------------------------------------------
Users of this product may do the following:
- Browse unauthorized data on the database - CVE-2021-20865
- Obtain a list of information that an user do not have the privilege for - CVE-2021-20866
- Move field groups that an user do not have permission to use - CVE-2021-20867
Solution: Update the plugin
---------------------------------------------
https://jvn.jp/en/jp/JVN09136401/
∗∗∗ ZDI-21-1373: Jenkins Report Info XML External Entity Processing Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Jenkins Report Info. Authentication is required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1373/
∗∗∗ Multiple vulnerabilities in OrbiTeam BSCW Server ∗∗∗
---------------------------------------------
The BSCW Server of OrbiTeam Software GmbH & Co. KG is prone to multiple vulnerabilities like reflected and stored XSS, LFI and Open Redirect. It is possible to chain these vulnerabilities and compromise the server even without a valid login.
---------------------------------------------
https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (kernel, openssh, and rpm), Debian (nss), Fedora (seamonkey), Mageia (glibc), openSUSE (go1.16, go1.17, kernel, mariadb, netcdf, openexr, poppler, python-Pygments, python-sqlparse, ruby2.5, speex, and webkit2gtk3), Oracle (nss), Red Hat (nss), SUSE (clamav, glibc, gmp, go1.16, go1.17, kernel, mariadb, netcdf, OpenEXR, openexr, openssh, poppler, python-Pygments, python-sqlparse, ruby2.1, ruby2.5, speex, webkit2gtk3, and xen), and Ubuntu (nss and thunderbird).
---------------------------------------------
https://lwn.net/Articles/877410/
∗∗∗ Delta Electronics CNCSoft - ICS Advisory (ICSA-21-334-03) ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-334-03
∗∗∗ Security Bulletin: OpenSSH for IBM i is affected by CVE-2021-41617 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-openssh-for-ibm-i-is-affe…
∗∗∗ Security Bulletin: Apache Commons FileUpload vulnerability affects IBM Tivoli Business Service Manager (CVE-2013-0248) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-apache-commons-fileupload…
∗∗∗ Security Bulletin: Security Vulnerabilities in IBM SDK, Java Technology Edition Quarterly CPU – Oct 2020 – affect multiple IBM Continuous Engineering products based on IBM Jazz Technology ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-…
∗∗∗ Security Bulletin: IBM Cloud Pak for Multicloud Management Monitoringhas applied security fixes for its use of Mozilla Firefox ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-multicl…
∗∗∗ Security Bulletin: IBM Cloud Pak for Multicloud Management Monitoring has applied security fixes for its use of Netty.io ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-multicl…
∗∗∗ Security Bulletin: IBM QRadar SIEM is vulnerable to using components with known vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-is-vulner…
∗∗∗ Security Bulletin: IBM Cloud Pak for Multicloud Management Monitoringhas applied security fixes for its use of Mozilla Firefox ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-multicl…
∗∗∗ Security Bulletin: IBM Cloud Pak for Multicloud Management Monitoring has applied security fixes for its use of Mozilla Firefox ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-multicl…
∗∗∗ Security Bulletin: IBM QRadar SIEM Application Framework v1 (CentOS6) is End of Life ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-applicati…
∗∗∗ Security Bulletin: IBM Cloud Pak for Multicloud Management has applied security fixes for its use of Apache Commons ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-multicl…
∗∗∗ Security Bulletin: Apache Wink as used by IBM Disconnected Log Collector is vulnerable to an XML External Entity Error (XXE) (CVE-2010-2245) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-apache-wink-as-used-by-ib…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 30-11-2021 18:00 − Mittwoch 01-12-2021 18:00
Handler: Wolfgang Menezes
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Microsoft Exchange servers hacked to deploy BlackByte ransomware ∗∗∗
---------------------------------------------
BlackByte ransomware actors were observed exploiting the ProxyShell set of vulnerabilities (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) to compromise Microsoft Exchange servers.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-h…
∗∗∗ Info-Stealer Using webhook.site to Exfiltrate Data, (Wed, Dec 1st) ∗∗∗
---------------------------------------------
We already reported multiple times that, when you offer an online (cloud) service, there are a lot of chances that it will be abused for malicious purposes. I spotted an info-stealer that exfiltrates data through webhook.site.
---------------------------------------------
https://isc.sans.edu/diary/rss/28088
∗∗∗ Injection is the New Black: Novel RTF Template Inject Technique Poised for Widespread Adoption Beyond APT Actors ∗∗∗
---------------------------------------------
RTF template injection is a novel technique that is ideal for malicious phishing attachments because it is simple and allows threat actors to retrieve malicious content from a remote URL using an RTF file.
---------------------------------------------
https://www.proofpoint.com/us/blog/threat-insight/injection-new-black-novel…
∗∗∗ l+f: Emotet-Fehlalarm vom Microsoft Defender ∗∗∗
---------------------------------------------
Microsofts Virenschutz hat Nutzer und Administratoren unnötig aufgeschreckt: Ein fehlerhaftes Erkennungs-Update sah Emotet-Infektionen, wo keine waren.
---------------------------------------------
https://heise.de/-6280766
∗∗∗ Tracking a P2P network related with TA505 ∗∗∗
---------------------------------------------
For the past few months, NCC Group has been tracking very closely the operations of TA505 and the development of different projects (e.g. Clop) by them.
---------------------------------------------
https://research.nccgroup.com/2021/12/01/tracking-a-p2p-network-related-wit…
∗∗∗ Vulnerability Spotlight: Use-after-free condition in Google Chrome could lead to code execution ∗∗∗
---------------------------------------------
Cisco Talos recently discovered an exploitable use-after-free vulnerability in Google Chrome.
---------------------------------------------
http://blog.talosintelligence.com/2021/12/vuln-spotlight-chrome-.html
∗∗∗ E-Mail: „Ihr Paket ist in der Warteschleife“ ist Fake ∗∗∗
---------------------------------------------
Warten Sie gerade auf ein Paket? Dann nehmen Sie sich vor E-Mails mit dem Betreff „Ihr Paket ist in der Warteschleife“ in Acht. Kriminelle geben sich als DHL aus und behaupten, dass Zollgebühren ausständig sind.
---------------------------------------------
https://www.watchlist-internet.at/news/e-mail-ihr-paket-ist-in-der-wartesch…
∗∗∗ Play Your Cards Right: Detecting Wildcard DNS Abuse ∗∗∗
---------------------------------------------
Wildcard DNS records can be used constructively, but their flexibility also provides attackers with a variety of options for executing attacks.
---------------------------------------------
https://unit42.paloaltonetworks.com/wildcard-dns-abuse/
∗∗∗ Shodan Verified Vulns 2021-12-01 ∗∗∗
---------------------------------------------
Insgesamt gibt es kaum Veränderungen zum Vormonat, wobei die Anzahl der verwundbaren Microsoft Exchange Server relativ deutlich zurückging – Props an die Administrator:innen!
---------------------------------------------
https://cert.at/de/aktuelles/2021/12/shodan-verified-vulns-2021-12-01
∗∗∗ CISA Adds Five Known Exploited Vulnerabilities to Catalog ∗∗∗
---------------------------------------------
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/12/01/cisa-adds-five-kn…
∗∗∗ FBI document shows what data can be obtained from encrypted messaging apps ∗∗∗
---------------------------------------------
A recently discovered FBI training document shows that US law enforcement can gain limited access to the content of encrypted messages from secure messaging services like iMessage, Line, and WhatsApp, but not to messages sent via Signal, Telegram, Threema, Viber, WeChat, or Wickr.
---------------------------------------------
https://therecord.media/fbi-document-shows-what-data-can-be-obtained-from-e…
=====================
= Vulnerabilities =
=====================
∗∗∗ IBM Security Bulletins 2021-11-30 ∗∗∗
---------------------------------------------
IBM QRadar SIEM, IBM Integration Bus, IBM App Connect Enterprise, IBM HTTP Server, IBM Cloud Pak for Data, IBM Watson Discovery for IBM Cloud Pak for Data, IBM Match 360, IBM SDK (Java™ Technology Edition), IBM WebSphere Application Server
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (rsync, rsyslog, and uriparser), Fedora (containerd, freeipa, golang-github-containerd-ttrpc, libdxfrw, libldb, librecad, mingw-speex, moby-engine, samba, and xen), Red Hat (kernel, kernel-rt, kpatch-patch, and samba), and Ubuntu (linux, linux-aws, linux-aws-5.11, linux-azure, linux-azure-5.11, linux-gcp, linux-gcp-5.11, linux-hwe-5.11, linux-kvm, linux-oracle, linux-oracle-5.11, linux-raspi, linux, linux-aws, linux-aws-5.4, linux-azure, linux-gcp, [...])
---------------------------------------------
https://lwn.net/Articles/877284/
∗∗∗ Verwaltungssoftware Jamf Pro für Apple-Geräte könnte Zugangsdaten leaken ∗∗∗
---------------------------------------------
https://heise.de/-6281352
∗∗∗ Security Advisory - Buffer Overflow Vulnerability in Some Huawei Products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20211201-…
∗∗∗ XSS Vulnerability Patched in Plugin Designed to Enhance WooCommerce ∗∗∗
---------------------------------------------
https://www.wordfence.com/blog/2021/12/xss-vulnerability-patched-in-plugin-…
∗∗∗ Mozilla Foundation Security Advisory 2021-51: Memory corruption in NSS via DER-encoded DSA and RSA-PSS signatures ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
∗∗∗ Mitsubishi Electric MELSEC and MELIPC Series ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-334-02
∗∗∗ Johnson Controls CEM Systems AC2000 ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-334-04
∗∗∗ Hitachi Energy Retail Operations and CSB Software ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-334-05
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 29-11-2021 18:00 − Dienstag 30-11-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Printing Shellz: Sicherheitslücken in HP-Druckern/-Multifunktionsgeräten ∗∗∗
---------------------------------------------
Passend zum 30. November, dem Computer Security Day habe ich noch was. Es gibt eine Sicherheitslücke in der Firmware bestimmter HP LaserJet, HP LaserJet Managed, HP PageWide und HP PageWide Managed Produkte. Diese sind möglicherweise für einen Pufferüberlauf anfällig. Das bedeutet, Angreifer könnten Druckaufträge oder Scans abfangen und ggf. die Firmennetzwerke lahmlegen.
---------------------------------------------
https://www.borncity.com/blog/2021/11/30/printing-shellz-sicherheitslcken-i…
∗∗∗ Gefälschtes BAWAG SMS im Umlauf ∗∗∗
---------------------------------------------
Momentan kursieren gefälschte SMS-Nachrichten im Namen der BAWAG. Im SMS mit „BawagPSK“ als Absender werden EmpfängerInnen darüber informiert, dass ihr Konto angeblich gesperrt wurde und eine Sicherheitsapp installiert werden muss. Klicken Sie keinesfalls auf den Link. Dieser führt auf eine gefälschte BAWAG-Website!
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschtes-bawag-sms-im-umlauf/
∗∗∗ Malicious USB drives: Still a security problem ∗∗∗
---------------------------------------------
A malicious USB drive dropped in a parking lot - this image has become a bit of a trope in IT security circles. Still, the threat is very real and more relevant than ever.
---------------------------------------------
https://www.gdatasoftware.com/blog/2021/11/usb-drives-still-a-danger
∗∗∗ What We’ve Learned About SSH Brute Force Attacks ∗∗∗
---------------------------------------------
The first time I encountered brute force attacks I was a hosting specialist who received calls from frustrated site owners that wanted to know who’d gained access to their server. Many of them didn’t understand the importance of a password’s character strength, or how frequent attacks on “root” are as a username, including myself at one point in time. I’ve learned more about SSH Brute Force attacks throughout my years at Sucuri.
---------------------------------------------
https://blog.sucuri.net/2021/11/what-weve-learned-about-ssh-brute-force-att…
∗∗∗ 300.000+ infections via Droppers on Google Play Store ∗∗∗
---------------------------------------------
In this blog we will discuss the recent techniques used to spread Android banking trojans via Google Play (MITRE T1475) resulting in significant financial loss for targeted banks. We will also discuss the, sometimes forgotten, by-product of collecting contacts and keystrokes by Banking trojans, resulting in severe data leakage.
---------------------------------------------
https://www.threatfabric.com/blogs/deceive-the-heavens-to-cross-the-sea.html
∗∗∗ Sabbath Ransomware Operators Target Critical Infrastructure ∗∗∗
---------------------------------------------
Since June 2021, a relatively new ransomware group called Sabbath has been targeting critical infrastructure in the United States and Canada, including education, health and natural resources.
---------------------------------------------
https://www.securityweek.com/sabbath-ransomware-operators-target-critical-i…
∗∗∗ Yanluowang: Further Insights on New Ransomware Threat ∗∗∗
---------------------------------------------
At least one attacker now using Yanluowang may have previously been linked to Thieflock ransomware operation.
---------------------------------------------
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ya…
∗∗∗ Kernel Karnage – Part 5 (I/O & Callbacks) ∗∗∗
---------------------------------------------
After showing interceptor’s options, it’s time to continue coding! On the menu are registry callbacks, doubly linked lists and a struggle with I/O in native C.
---------------------------------------------
https://blog.nviso.eu/2021/11/30/kernel-karnage-part-5-i-o-callbacks/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (samba), Fedora (kernel), openSUSE (netcdf and tor), SUSE (netcdf and python-Pygments), and Ubuntu (imagemagick).
---------------------------------------------
https://lwn.net/Articles/877186/
∗∗∗ ZDI-21-1371: (0Day) Esri ArcReader PMF File Parsing Use-After-Free Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1371/
∗∗∗ ZDI-21-1370: (0Day) Esri ArcReader PMF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1370/
∗∗∗ Trend Micro Produkte: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1244
∗∗∗ Cross-Site Request Forgery im Team Password Manager (SYSS-2021-059) ∗∗∗
---------------------------------------------
https://www.syss.de/pentest-blog/cross-site-request-forgery-im-team-passwor…
∗∗∗ Host Header Poisoning im Team Password Manager (SYSS-2021-060) ∗∗∗
---------------------------------------------
https://www.syss.de/pentest-blog/host-header-poisoning-im-team-password-man…
∗∗∗ Advisory: Vulnerabilities in B&R Automation Studio and PVI Windows Services ∗∗∗
---------------------------------------------
https://www.br-automation.com/downloads_br_productcatalogue/assets/16367454…
∗∗∗ Advisory: Number:Jack in B&R Products ∗∗∗
---------------------------------------------
https://www.br-automation.com/downloads_br_productcatalogue/assets/16367454…
∗∗∗ Security Bulletin: Vulnerability in Apache Log4j may affect Cúram Social Program Management (CVE-2019-17571) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-l…
∗∗∗ Security Bulletin: A Security Vulnerability in IBM® WebSphere Application Server Liberty affect IBM LKS Administration and Reporting Tool and its Agent ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-…
∗∗∗ Security Bulletin: IBM MQ Appliance is affected by a sensitive information disclosure vulnerability (CVE-2021-38999) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-appliance-is-affec…
∗∗∗ Security Bulletin: Multiple Vulnerabilities in WebSphere Application Server Liberty affect IBM Operations Analytics – Log Analysis (CVE-2021-35517, CVE-2021-36090) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities affect IBM HTTP Server (powered by Apache) for i ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Publicly disclosed vulnerability in GNU Binutils affects IBM Netezza Performance Server ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-publicly-disclosed-vulner…
∗∗∗ Security Bulletin: IBM MQ Appliance is affected by a code injection vulnerability (CVE-2021-38967) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-appliance-is-affec…
∗∗∗ Security Bulletin: A Security Vulnerability in IBM Java Runtime affects IBM License Key Server Administration and Reporting Tool and its Agent ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-…
∗∗∗ Security Bulletin: IBM MQ Appliance is affected by a disclosure of sensitive information vulnerability (CVE-2021-39000) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-appliance-is-affec…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 26-11-2021 18:00 − Montag 29-11-2021 18:00
Handler: Wolfgang Menezes
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ TrickBot phishing checks screen resolution to evade researchers ∗∗∗
---------------------------------------------
The TrickBot malware operators have been using a new method to check the screen resolution of a victim system to evade detection of security software and analysis by researchers.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/trickbot-phishing-checks-scr…
∗∗∗ IT-Security: ETSI veröffentlicht erste Norm für sichere Smartphones ∗∗∗
---------------------------------------------
Ein neuer Standard des europäischen Normungsinstituts ETSI soll Herstellern weltweit helfen, die IT-Sicherheit bei Mobiltelefonen für Verbraucher zu erhöhen.
---------------------------------------------
https://heise.de/-6278376
∗∗∗ Google-Analyse: Cloud-Dienste durch schwache Passwörter angreifbar ∗∗∗
---------------------------------------------
Das Unternehmen hat Einbrüche in Cloud-Instanzen untersucht, nennt Ursachen und liefert daraus resultierende Handlungsempfehlungen.
---------------------------------------------
https://heise.de/-6277514
∗∗∗ Micropatching Unpatched Local Privilege Escalation in Mobile Device Management Service (CVE-2021-24084 / 0day) ∗∗∗
---------------------------------------------
In June 2021, security researcher Abdelhamid Naceri published a blog post about an "unpatched information disclosure" vulnerability in Windows. The post details the mechanics of the issue and its exploitation, allowing a non-admin Windows user to read arbitrary files even if they do not have permissions to do so.
---------------------------------------------
https://blog.0patch.com/2021/11/micropatching-unpatched-local-privilege.html
∗∗∗ Ghidra 101: Binary Patching ∗∗∗
---------------------------------------------
There are several circumstances where it can be helpful to make a modification to code or data within a compiled program. Sometimes, it is necessary to fix a vulnerability or compatibility issue without functional source code or compilers. This can happen when source code gets lost, systems go out of support, or software firms go out of business. In case you should find yourself in this situation, keep calm and read on to learn how to do this within Ghidra.
---------------------------------------------
https://www.tripwire.com/state-of-security/security-data-protection/ghidra-…
∗∗∗ AVM warnt vor Phishing-Mails mit FRITZ!Box-Anrufbeantworternachricht ∗∗∗
---------------------------------------------
Der Hersteller der FRITZ!Boxen, die Berliner-Firma AVM warnt aktuell von einer Welle von Phishing-Mails, die im Anhang angeblich eine Sprachnachricht des FRITZ!Box-Anrufbeantworters enthalten. Wer diesen Anhang per Doppelklick unter Windows abhören möchte, installiert sich Schadsoftware.
---------------------------------------------
https://www.borncity.com/blog/2021/11/28/avm-warnt-vor-phishing-mails-mit-f…
∗∗∗ Cobalt Strike: Decrypting DNS Traffic – Part 5 ∗∗∗
---------------------------------------------
Cobalt Strike beacons can communicate over DNS. We show how to decode and decrypt DNS traffic in this blog post.
---------------------------------------------
https://blog.nviso.eu/2021/11/29/cobalt-strike-decrypting-dns-traffic-part-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Backdoor.Win32.Coredoor.10.a / Authentication Bypass RCE ∗∗∗
---------------------------------------------
Description: The malware listens on TCP port 21000. Third-party attackers who can reach infected systems can logon using any username/password combination. Intruders may then upload executables using ftp PASV, STOR commands, this can result in remote code execution.
---------------------------------------------
https://cxsecurity.com/issue/WLB-2021110120
∗∗∗ FortiClientWindows & FortiClient EMS - Privilege escalation via DLL Hijacking ∗∗∗
---------------------------------------------
An unsafe search path vulnerability in FortiClient and FortiClient EMS may allow an attacker to perform a DLL Hijack attack on affected devices via a malicious OpenSSL engine library in the search path.
---------------------------------------------
https://www.fortiguard.com/psirt/FG-IR-21-088
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (bluez, icu, libntlm, libvorbis, libvpx, opensc, roundcube, and tar), Fedora (kernel, kernel-headers, kernel-tools, puppet, slurm, stargz-snapshotter, and suricata), openSUSE (netcdf), Oracle (bluez, kernel, kernel-container, krb5, mailman:2.1, openssh, python3, and rpm), Red Hat (samba), and SUSE (xen).
---------------------------------------------
https://lwn.net/Articles/877105/
∗∗∗ Insulet OmniPod Insulin Management System vulnerability ∗∗∗
---------------------------------------------
https://omnipod.lyrebirds.dk/
∗∗∗ Security Bulletin: Vulnerability in IBM SDK Java affects IBM Cloud Pak System (CVE-2020-27221) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-ibm-sdk-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 25-11-2021 18:00 − Freitag 26-11-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ IT threat evolution Q3 2021 ∗∗∗
---------------------------------------------
WildPressure and LuminousMoth threat actors, FinSpy implants, zero-day vulnerabilities and PrintNightmare, threats for Linux and macOS in our review of Q3 2021.
---------------------------------------------
https://securelist.com/it-threat-evolution-q3-2021/104876/
∗∗∗ YARAs Private Strings, (Thu, Nov 25th) ∗∗∗
---------------------------------------------
YARA supports private strings. A string can be marked as private by including string modifier "private". Here is a use case. [...]
---------------------------------------------
https://isc.sans.edu/diary/rss/28010
∗∗∗ Searching for Exposed ASUS Routers Vulnerable to CVE-2021-20090, (Fri, Nov 26th) ∗∗∗
---------------------------------------------
Over the past 7 days, my honeypot captured a few hundred POST for a vulnerability which appeared to be tracked as a critical path traversal vulnerability in the web interfaces of routers with Arcadyan firmware. If successfully exploited, could allow unauthenticated remote actors to bypass authentication and add the router to the botnet Mirai botnet.
---------------------------------------------
https://isc.sans.edu/diary/rss/28072
∗∗∗ EU needs more cybersecurity graduates, says ENISA infosec agency – pointing at growing list of masters degree courses ∗∗∗
---------------------------------------------
The EU needs more cybersecurity graduates to plug the political blocs shortage of skilled infosec bods, according to a report from the ENISA online security agency.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2021/11/26/enisa_cybers…
∗∗∗ RATDispenser: JavaScript-Loader installiert Remote Access Trojaners (RAT) in Windows ∗∗∗
---------------------------------------------
Noch ein kurzer Nachtrag in Punkto Sicherheit, welcher mir die Tage unter die Augen gekommen ist. Die Sicherheitsforscher von HP Thread-Research sind auf einen in JavaScript geschriebenen Loader gestoßen, der auf Windows-Systemen Remote Access Trojaner (RAT) installiert. Der Entwickler scheint [...]
---------------------------------------------
https://www.borncity.com/blog/2021/11/26/ratdispenser-javascript-loader-ins…
=====================
= Vulnerabilities =
=====================
∗∗∗ Exclusive: Resecurity discovered 0-day vulnerability in TP-Link Wi-Fi 6 devices ∗∗∗
---------------------------------------------
Resecurity researchers found a zero-day vulnerability in the TP-Link enterprise device with model number TL-XVR1800L. Resecurity, a Los Angeles-based cybersecurity company has identified an active a zero-day vulnerability in the TP-Link device with model number TL-XVR1800L (Enterprise AX1800 Dual Band Gigabit Wi-Fi 6 Wireless VPN Router), which is primarily suited to enterprises.
---------------------------------------------
https://securityaffairs.co/wordpress/125016/hacking/0-day-tp-link-wi-fi-6.h…
∗∗∗ Angreifer könnten die Kontrolle über Videoüberwachungssysteme von Qnap erlangen ∗∗∗
---------------------------------------------
Ein wichtiges Update schließt unter anderem eine kritische Lücke in einigen Netzwerk-Videorekordern von Qnap.
---------------------------------------------
https://heise.de/-6277445
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (freerdp, gnome-boxes, gnome-connections, gnome-remote-desktop, guacamole-server, hydra, java-1.8.0-openjdk-aarch32, medusa, mingw-gstreamer1, mingw-gstreamer1-plugins-bad-free, mingw-gstreamer1-plugins-base, mingw-gstreamer1-plugins-good, php, pidgin-sipe, remmina, vinagre, and weston), openSUSE (kernel and netcdf), and SUSE (kernel and netcdf).
---------------------------------------------
https://lwn.net/Articles/876922/
∗∗∗ Zoom Video Communications Produkte: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1235
∗∗∗ Security Bulletin: Vulnerability in jsoup may affect Cúram Social Program Management (CVE-2021-37714) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-jsoup-ma…
∗∗∗ Security Bulletin: Vulnerability in Apache Log4j may affect Cúram Social Program Management (CVE-2020-9488) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-l…
∗∗∗ Security Bulletin: Vulnerabilities affect IBM Netcool Agile Service Manager ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-affect-ib…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Netcool Agile Service Manager ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Vulnerability in Dojo may affect IBM Cúram Social Program Management (CVE-2018-15494) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-dojo-may…
∗∗∗ Security Bulletin: Vulnerability in Apache Santuario XML Security for Java may affect Cúram Social Program Management (CVE-2021-40690) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-s…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 24-11-2021 18:00 − Donnerstag 25-11-2021 18:00
Handler: Wolfgang Menezes
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ New CronRAT malware infects Linux systems using odd day cron jobs ∗∗∗
---------------------------------------------
Security researchers have discovered a new remote access trojan (RAT) for Linux that keeps an almost invisible profile by hiding in tasks scheduled for execution on a non-existent day, February 31st.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-cronrat-malware-infects-…
∗∗∗ Discord malware campaign targets crypto and NFT communities ∗∗∗
---------------------------------------------
A new malware campaign on Discord uses the Babadeda crypter to hide malware that targets the crypto, NFT, and DeFi communities.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/discord-malware-campaign-tar…
∗∗∗ Improving security for mobile devices: CISA issues guides ∗∗∗
---------------------------------------------
CISA has released actionable guides with advice on how to improve security for mobile devices, both for consumers and organizations.
---------------------------------------------
https://blog.malwarebytes.com/android/2021/11/improving-security-for-mobile…
∗∗∗ Bitcoin-Erpressung mit Masturbationsaufnahmen ∗∗∗
---------------------------------------------
Alle Jahre wieder versuchen Kriminelle durch erfundene Behauptungen, Geld zu erpressen. Angeblich wurden Ihre Systeme gehackt und Sie dadurch während dem Aufruf pornografischer Inhalte gefilmt. Die Nachricht ist frei erfunden und wird massenhaft ausgesendet.
---------------------------------------------
https://www.watchlist-internet.at/news/bitcoin-erpressung-mit-masturbations…
∗∗∗ Sophisticated Tardigrade malware launches attacks on vaccine manufacturing infrastructure ∗∗∗
---------------------------------------------
Security researchers are warning biomanufacturing facilities around the world that they are being targeted by a sophisticated new strain of malware, known as Tardigrade.
---------------------------------------------
https://www.tripwire.com/state-of-security/security-data-protection/sophist…
∗∗∗ Black-Friday-Spam-Kampagnen in den Startlöchern ∗∗∗
---------------------------------------------
Am 26. November 2021 ist Black Friday – da gibt es fast alles umsonst. Das ruft auch Cyber-Kriminelle auf den Plan und diese greifen Verbraucher verstärkt mit Online-Shopping-Betrugsversuchen an.
---------------------------------------------
https://www.borncity.com/blog/2021/11/25/black-friday-spam-kampagnen-in-den…
=====================
= Vulnerabilities =
=====================
∗∗∗ VMware dichtet Schwachstellen in vSphere Web Client ab - zum Teil ∗∗∗
---------------------------------------------
Der Hersteller meldet Sicherheitslücken, teils mit hohem Risiko. Es gibt jedoch noch nicht für alle betroffenen Produkte Updates.
---------------------------------------------
https://heise.de/-6276216
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (busybox, getdata, and php), Mageia (couchdb, freerdp, openexr, postgresql, python-reportlab, and rsh), openSUSE (bind, java-1_8_0-openjdk, and kernel), SUSE (java-1_7_0-openjdk), and Ubuntu (icu).
---------------------------------------------
https://lwn.net/Articles/876852/
∗∗∗ ModSecurity DoS Vulnerability in JSON Parsing (CVE-2021-42717) ∗∗∗
---------------------------------------------
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity…
∗∗∗ Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021 ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security Bulletin: Vulnerabilities in Apache Ant affect IBM Installation Manager and IBM Packaging Utility ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-apache…
∗∗∗ Security Bulletin: WebSphere Application Server is vulnerable to a Privilege Escalation vulnerability and affects Content Collector for Email ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-websphere-application-ser…
∗∗∗ Security Bulletin: Vulnerabilities affect IBM Netcool Agile Service Manager ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-affect-ib…
∗∗∗ Security Bulletin: Vulnerabilities in Node.js affect IBM Integration Bus v10 (CVE-2021-32803) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-node-j…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Netcool Agile Service Manager ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: A vulnerability in IBM Java Runtime affects IBM Installation Manager and IBM Packaging Utility ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-ibm-ja…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 23-11-2021 18:00 − Mittwoch 24-11-2021 18:00
Handler: Wolfgang Menezes
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Phishing page hiding itself using dynamically adjusted IP-based allow list, (Wed, Nov 24th) ∗∗∗
---------------------------------------------
It can be instructive to closely examine even completely usual-looking phishing messages from time to time, since they may lead one to unusual phishing sites or may perhaps use some novel technique that might not be obvious at first glance.
---------------------------------------------
https://isc.sans.edu/diary/rss/28070
∗∗∗ Hunting for Persistence in Linux (Part 1): Auditd, Sysmon, Osquery, and Webshells ∗∗∗
---------------------------------------------
This blog series explores methods attackers might use to maintain persistent access to a compromised linux system.
---------------------------------------------
https://pberba.github.io/security/2021/11/22/linux-threat-hunting-for-persi…
∗∗∗ Nach Windows-Update: Zero-Day-Lücke erlaubt lokale Rechteausweitung ∗∗∗
---------------------------------------------
Eines der Windows-Updates im November sollte eine gefährliche Lücke schließen. Doch sie lässt sich noch immer zur Erhöhung der eigenen Rechte missbrauchen.
---------------------------------------------
https://heise.de/-6274893
∗∗∗ Vorsicht vor Love Scams auf Facebook Dating! ∗∗∗
---------------------------------------------
Immer wieder melden uns besorgte LeserInnen sogenannte Love- oder Romance-Scammer. Dabei handelt es sich um Online-Bekanntschaften, die sich durch Liebesbeteuerungen das Vertrauen der Opfer erschleichen.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-love-scams-auf-facebook…
∗∗∗ New JavaScript malware works as a “RAT dispenser” ∗∗∗
---------------------------------------------
Cybersecurity experts from HP said they discovered a new strain of JavaScript malware that criminals are using as a way to infect systems and then deploy much dangerous remote access trojans (RATs).
---------------------------------------------
https://therecord.media/new-javascript-malware-works-as-a-rat-dispenser/
∗∗∗ ASEC Weekly Malware Statistics (November 15th, 2021 – November 21st, 2021) ∗∗∗
---------------------------------------------
This post will list weekly statistics collected from November 15th, 2021 (Monday) to November 21st, 2021 (Sunday).
---------------------------------------------
https://asec.ahnlab.com/en/28954/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (openjdk-17), Fedora (libxls, roundcubemail, and vim), openSUSE (bind, java-1_8_0-openjdk, and redis), Red Hat (kernel, kernel-rt, kpatch-patch, krb5, mailman:2.1, openssh, and rpm), Scientific Linux (kernel, krb5, openssh, and rpm), SUSE (bind, java-1_8_0-openjdk, redis, and webkit2gtk3), and Ubuntu (bluez).
---------------------------------------------
https://lwn.net/Articles/876799/
∗∗∗ Schwachstelle in MediaTek-Chips von Android-Smartphones ∗∗∗
---------------------------------------------
Sicherheitsforscher von Check Point haben in einer Android-APU, die APU ist die AI Processing Unit in MediaTek-Chips, eine Schwachstelle entdeckt. Die Sicherheitsforscher warnen, dass Nutzer über den Audio-Prozessor abgehört werden können. Die Mediatek-Chips sind in 37 % aller Android-Geräte verbaut.
---------------------------------------------
https://www.borncity.com/blog/2021/11/24/schwachstelle-in-mediatek-chips-vo…
∗∗∗ ZDI-21-1333: Adobe Creative Cloud Incorrect Permission Assignment Privilege Escalation Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1333/
∗∗∗ Security Advisory - Possible Out-Of-Bounds Read Vulnerability in Some Huawei Products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20211124-…
∗∗∗ Security Bulletin: Weak Cryptographic Control Vulnerability Affects IBM Sterling Connect:Direct Web Services (CVE-2021-38891) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-weak-cryptographic-contro…
∗∗∗ Security Bulletin: IBM Planning Analytics Workspace is affected by security vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-planning-analytics-wo…
∗∗∗ Security Bulletin: Account Lockout Vulnerability Affects IBM Sterling Connect:Direct Web Services (CVE-2021-38890) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-account-lockout-vulnerabi…
∗∗∗ Security Bulletin: PostgreSQL Sensitive Information Exposure Vulnerability Affects IBM Connect:Direct Web Services (CVE-2021-32029) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-postgresql-sensitive-info…
∗∗∗ K20072454: Linux kernel vulnerability CVE-2021-43267 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K20072454
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 22-11-2021 18:00 − Dienstag 23-11-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Warnung: ProxyShell, Squirrelwaffle und ein PoC-Eploit, patcht endlich eure Exchange-Server ∗∗∗
---------------------------------------------
Wie oft denn noch? Aktuell warne ich fast im Tagesrhythmus vor dem Betrieb ungepatchter Exchange-Schwachstellen und ProxyShell-Angriffen. Vor einigen Tagen hat Trend Micro eine Warnung vor Angriffen auf die ProxyShell-Schwachstellen über den Squirrelwaffle-Exploit und der Übernahme der Exchange-E-Mail-Postfächer gewarnt. Seit wenigen Stunden ist ein weitere Exploit als Proof of Concept öffentlich, die Ausnutzung gegen ungepatchte Exchange-Server ist wahrscheinlich. Patcht also endlich die Systeme.
---------------------------------------------
https://www.borncity.com/blog/2021/11/23/warnung-proxyshell-squirrelwaffle-…
∗∗∗ GoDaddy-Datenpanne betrifft 1,2 Millionen WordPress-Kunden ∗∗∗
---------------------------------------------
Hacker verschafft sich Zugang zu den persönlichen Daten von mehr als 1,2 Millionen Kunden des WordPress-Hostingdienstes von GoDaddy.
---------------------------------------------
https://heise.de/-6274187
∗∗∗ FBI warnt vor Einbrüchen via VPN-Software ∗∗∗
---------------------------------------------
Bei Untersuchungen stießen Strafverfolger vom FBI auf Sicherheitslücken in VPN-Software, durch die Cyberkriminelle derzeit in Netzwerke eindringen.
---------------------------------------------
https://heise.de/-6274101
∗∗∗ ZDF-Reportage: Wie Betrüger online abzocken ∗∗∗
---------------------------------------------
Wer sind die Cyber-Kriminellen hinter den unzähligen Fake-Shops und wie können sie entlarvt werden? "WISO crime" - ein ZDF-Format berichtet über Fake-Shops im Internet und versucht, einem Fake-Shop-Betreiber auf die Schliche zu kommen.
---------------------------------------------
https://www.watchlist-internet.at/news/zdf-reportage-wie-betrueger-online-a…
∗∗∗ Over nine million Android devices infected by info-stealing trojan ∗∗∗
---------------------------------------------
A large-scale malware campaign on Huaweis AppGallery has led to approximately 9,300,000 installs of Android trojans masquerading as over 190 different apps
---------------------------------------------
https://www.bleepingcomputer.com/news/security/over-nine-million-android-de…
∗∗∗ How to investigate service provider trust chains in the cloud ∗∗∗
---------------------------------------------
This blog outlines DART’s recommendations for incident responders to investigate potential abuse of these delegated admin permissions, independent of the threat actor.
---------------------------------------------
https://www.microsoft.com/security/blog/2021/11/22/how-to-investigate-servi…
∗∗∗ Simple YARA Rules for Office Maldocs, (Mon, Nov 22nd) ∗∗∗
---------------------------------------------
In diary entry "Extra Tip For Triage Of MALWARE Bazaar's Daily Malware Batches" I shared 2 simple YARA rules to triage Office documents with VBA code.
---------------------------------------------
https://isc.sans.edu/diary/rss/28062
∗∗∗ Observing Attacks Against Hundreds of Exposed Services in Public Clouds ∗∗∗
---------------------------------------------
Insecurely exposed services are common misconfigurations in cloud environments. We used a honeypot infrastructure to learn about attacks against them.
---------------------------------------------
https://unit42.paloaltonetworks.com/exposed-services-public-clouds/
∗∗∗ What to do if you receive a data breach notice ∗∗∗
---------------------------------------------
Receiving a breach notification doesn't mean you’re doomed - here's what you should consider doing in the hours and days after learning that your personal data has been exposed
---------------------------------------------
https://www.welivesecurity.com/2021/11/22/what-do-if-you-receive-data-breac…
∗∗∗ GÉANT launches new security services website ∗∗∗
---------------------------------------------
As technology becomes more complex and threats more sophisticated, it’s a challenge to keep any organisation’s online environment and physical infrastructure secure. Security services protect both the networks and services from attacks, but also help secure individuals using the networks.
---------------------------------------------
https://connect.geant.org/2021/11/23/geant-launches-new-security-services-w…
∗∗∗ The digital operational resilience act (DORA): what you need to know about it, the requirements and challenges we see. ∗∗∗
---------------------------------------------
TL;DR - In this blogpost, we will give you an introduction to DORA, as well as how you can prepare yourself to be ready for it. More specifically, throughout this blogpost we will try to formulate an answer to following questions: What is DORA and what are the key requirements of DORA? What are the biggest [...]
---------------------------------------------
https://blog.nviso.eu/2021/11/23/the-digital-operational-resilience-act-dor…
∗∗∗ GoSecure Investigates Abusing Windows Server Update Services (WSUS) to Enable NTLM Relaying Attacks ∗∗∗
---------------------------------------------
In part three of a series, GoSecure ethical hackers have found another way to exploit insecure Windows Server Update Services (WSUS) configurations. By taking advantage of the authentication provided by the Windows update client and relaying it to other domain services, we found this can lead to remote code execution. In this blog, we’ll share our findings and recommend mitigations.
---------------------------------------------
https://www.gosecure.net/blog/2021/11/22/gosecure-investigates-abusing-wind…
=====================
= Vulnerabilities =
=====================
∗∗∗ VMSA-2021-0027 ∗∗∗
---------------------------------------------
VMware vCenter Server updates address arbitrary file read and SSRF vulnerabilities (CVE-2021-21980, CVE-2021-22049)
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0027.html
∗∗∗ Xen Security Advisories ∗∗∗
---------------------------------------------
XSA-385 - guests may exceed their designated memory limit
XSA-387 - grant table v2 status pages may remain accessible after de-allocation (take two)
XSA-388 - PoD operations on misaligned GFNs
XSA-389 - issues with partially successful P2M updates on x86
---------------------------------------------
https://xenbits.xen.org/xsa/
∗∗∗ Vulnerability Spotlight: PHP deserialize vulnerability in CloudLinux Imunity360 could lead to arbitrary code execution ∗∗∗
---------------------------------------------
Cisco Talos recently discovered a vulnerability in the Ai-Bolit functionality of CloudLinux Inc Imunify360 that could lead to arbitrary code execution. Imunify360 is a security platform for web-hosting servers that allows users to configure various settings for real-time website protection and web server security.
---------------------------------------------
https://blog.talosintelligence.com/2021/11/vulnerability-spotlight-php-dese…
∗∗∗ A review of Azure Sphere vulnerabilities: Unsigned code execs, kernel bugs, escalation chains and firmware downgrades ∗∗∗
---------------------------------------------
Summary of all the vulnerabilities reported by Cisco Talos in Microsoft Azure Sphere
---------------------------------------------
https://blog.talosintelligence.com/2021/11/a-review-of-azure-sphere.html
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (mbedtls), Red Hat (kernel and rpm), and Ubuntu (freerdp2).
---------------------------------------------
https://lwn.net/Articles/876723/
∗∗∗ 0-Day LPE-Schwachstelle im Windows Installer (Nov. 2021) ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher hat eine eine 0-Day-Schwachstelle im Windows Installer gefunden, über die ein lokaler Angreifer Administratorrechte erlangen kann. Die Windows Installer Elevation of Privilege"-Schwachstelle CVE-2021-41379 ist zwar im November 2021 gepatcht worden. Aber es gibt eine Umgehungslösung, der Patch ist wirkungslos. Betroffen sind alle Windows-Versionen, einschließlich Windows 10, dass brandneue Windows 11 sowie alle Windows Server-Versionen.
---------------------------------------------
https://www.borncity.com/blog/2021/11/23/0-day-lpe-schwachstelle-im-windows…
∗∗∗ Security Bulletin: IBM MQ is vulnerable to multiple issues within the IBM® Runtime Environment Java™ Technology Edition, Version 8 shipped with IBM MQ (CVE-2021-2432, CVE-2021-2388) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-is-vulnerable-to-m…
∗∗∗ Security Bulletin: Vulnerability in MIT Kerberos 5 (CVE-2020-28196) affects HMC ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-mit-kerb…
∗∗∗ Security Bulletin: Vulnerability in Apache HTTP (CVE-2018-17199 and CVE-2020-11993) affects HMC ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-h…
∗∗∗ Security Bulletin: Application error in IBM Security Guardium Key Lifecycle Manager (CVE-2021-38980) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-application-error-in-ibm-…
∗∗∗ Security Bulletin: Vulnerability in Apache Tomcat (CVE-2021-42340) affects HMC ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-t…
∗∗∗ Security Bulletin: IBM MQ is vulnerable to a denial of service attack caused by an error processing messages. (CVE-2021-38875) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-is-vulnerable-to-a…
∗∗∗ Security Bulletin: Vulnerability in Bash (CVE-2019-18276) affects HMC ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-bash-cve…
∗∗∗ Security Bulletin: Vulnerability in bind (CVE-2021-25215) affects Power HMC ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-bind-cve…
∗∗∗ Security Bulletin: Vulnerability in glib2 (CVE-2021-27218 and CVE-2021-27219) affects Power HMC ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-glib2-cv…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 19-11-2021 18:00 − Montag 22-11-2021 18:00
Handler: Wolfgang Menezes
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Picky PPID Spoofing ∗∗∗
---------------------------------------------
Parent Process ID (PPID) Spoofing is one of the techniques employed by malware authors to blend in the target system. This is done by making the malicious process look like it was spawned by another process. This helps evade detections that are based on anomalous parent-child process relationships.
---------------------------------------------
https://captmeelo.com/redteam/maldev/2021/11/22/picky-ppid-spoofing.html
∗∗∗ Command injection prevention for Python ∗∗∗
---------------------------------------------
This is a command/code injection prevention cheat sheet by r2c. It contains code patterns of potential ways to run an OS command or arbitrary code in an application. Instead of scrutinizing code for exploitable vulnerabilities, the recommendations in this cheat sheet pave a safe road for developers that mitigates the possibility of command/code injection in your code.
---------------------------------------------
https://semgrep.dev/docs/cheat-sheets/python-command-injection/
∗∗∗ Missing Link: Wie sicher ist der Anonymisierungsdienst Tor? ∗∗∗
---------------------------------------------
Tor gilt als Wunderwaffe gegen den Überwachungswahn von Geheimdiensten. Wie gut lässt sich die Technologie knacken? Ist Tor tatsächlich NSA- und BND-proof?
---------------------------------------------
https://heise.de/-6272025
∗∗∗ Virtuelle Mobilfunknetze mit Open RAN: BSI sieht Sicherheitsrisiken ∗∗∗
---------------------------------------------
Mehr "Security by Design" empfehlen die Autoren einer Risikoanalyse des BSI für die Weiterentwicklung von Open RAN – nachträgliche Korrekturen seien aufwändig.
---------------------------------------------
https://heise.de/-6274060
∗∗∗ UEFI virtual machine firmware hardening through snapshots and attack surface reduction. (arXiv:2111.10167v1 [cs.SE]) ∗∗∗
---------------------------------------------
This paper introduces Amaranth project - a solution to some of the contemporary security issues related to UEFI firmware. In this work we focused our attention on virtual machines as it allowed us to simplify the development of secure UEFI firmware. Security hardening of our firmware is achieved through several techniques, the most important of which are an operating system integrity checking mechanism (through snapshots) and overall firmware size reduction.
---------------------------------------------
http://arxiv.org/abs/2111.10167
∗∗∗ Oh ... Ransomware verschlüsselt meine virtuellen Maschinen direkt im Hypervisor ... Wie jetzt? ∗∗∗
---------------------------------------------
Viele Ransomware- oder Ransomware-as-a-Service (RaaS)- Gruppen besitzen inzwischen die Fähigkeit, virtuelle Maschinen direkt auf Hypervisor-Ebene zu verschlüsseln. Das heisst, es sind nicht einzelne Clients, Workstations oder Server auf Windows Betriebsystem-Ebene, sondern alle Maschinen, die virtualisiert - auf zum Beispiel VMware ESXi oder Microsoft Hyper-V - laufen, gleichzeitig betroffen. Die Cybersecurityfirma Crowdstrike hat dieser Thematik zwei interessante Blog-Posts gewidmet
---------------------------------------------
https://cert.at/de/blog/2021/11/oh-ransomware-verschlusselt-meine-virtuelle…
∗∗∗ NSA and CISA Release Guidance on Securing 5G Cloud Infrastructures ∗∗∗
---------------------------------------------
CISA has announced the joint National Security Agency (NSA) and CISA publication of the second of a four-part series, Security Guidance for 5G Cloud Infrastructures. Part II: Securely Isolate Network Resources examines threats to 5G container-centric or hybrid container/virtual network, also known as Pods. The guidance provides several aspects of pod security including limiting permissions on deployed containers, avoiding resource contention and denial-of-service attacks, and implementing real-time threat detection.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/11/19/nsa-and-cisa-rele…
=====================
= Vulnerabilities =
=====================
∗∗∗ Vulnerability Spotlight: Multiple vulnerabilities in Advantech R-SeeNet ∗∗∗
---------------------------------------------
R-SeeNet is the software system used for monitoring Advantech routers. It continuously collects information from individual routers in the network and records the data into a SQL database. The vulnerabilities Talos discovered exist in various scripts inside of R-SeeNet's web applications.
CVEs: CVE-2021-21920, CVE-2021-21921, CVE-2021-21922, CVE-2021-21923, CVE-2021-21915, CVE-2021-21916, CVE-2021-21917, CVE-2021-21918, CVE-2021-21919, CVE-2021-21910, CVE-2021-21911, CVE-2021-21912
---------------------------------------------
http://blog.talosintelligence.com/2021/11/re-see-net-advantched-vuln-spotli…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (firebird3.0, libmodbus, and salt), Fedora (js-jquery-ui and wordpress), Mageia (arpwatch, chromium-browser-stable, php, rust, and wireshark), openSUSE (barrier, firefox, hylafax+, opera, postgresql12, postgresql13, postgresql14, and tomcat), SUSE (ardana-ansible, ardana-monasca, crowbar-openstack, influxdb, kibana, openstack-cinder, openstack-ec2-api, openstack-heat-gbp, openstack-heat-templates, openstack-horizon-plugin-gbp-ui, openstack-keystone, openstack-neutron-gbp, openstack-nova, python-eventlet, rubygem-redcarpet, rubygem-puma, ardana-ansible, ardana-monasca, documentation-suse-openstack-cloud, openstack-ec2-api, openstack-heat-templates, python-Django, python-monasca-common, rubygem-redcarpet, rubygem-puma, firefox, kernel, postgresql, postgresql13, postgresql14, postgresql10, postgresql12, postgresql13, postgresql14, postgresql96, and samba), and Ubuntu (libreoffice).
---------------------------------------------
https://lwn.net/Articles/876655/
∗∗∗ Serious Vulnerabilities Found in Wi-Fi Module Designed for Critical Industrial Applications ∗∗∗
---------------------------------------------
Talos has published 18 separate advisories describing the vulnerabilities. The researchers have reproduced the vulnerabilities on Lantronix PremierWave 2050 version 8.9.0.0R4, and Talos claims there are no official patches for the security holes, despite the vendor knowing about them since June 15.
---------------------------------------------
https://www.securityweek.com/serious-vulnerabilities-found-wi-fi-module-des…
∗∗∗ ZDI-21-1332: Commvault CommCell AppStudioUploadHandler Arbitrary File Upload Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1332/
∗∗∗ ZDI-21-1331: Commvault CommCell Demo_ExecuteProcessOnGroup Exposed Dangerous Function Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1331/
∗∗∗ ZDI-21-1330: Commvault CommCell DownloadCenterUploadHandler Arbitrary File Upload Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1330/
∗∗∗ ZDI-21-1329: Commvault CommCell DataProvider JavaScript Sandbox Escape Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1329/
∗∗∗ ZDI-21-1328: Commvault CommCell CVSearchService Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1328/
∗∗∗ Security Bulletin: IBM MQ is vulnerable to a denial of service attack caused by an issue processing message properties. (CVE-2021-29843) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-is-vulnerable-to-a…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 18-11-2021 18:00 − Freitag 19-11-2021 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Sicherheitsbedrohungen im Web: Die größten Risiken laut OWASP Top Ten 2021 ∗∗∗
---------------------------------------------
Die OWASP Top Ten 2021 aktualisiert die Liste der Sicherheitsbedrohungen im Web. Defekte Zugriffsbeschränkungen stehen an erster Stelle.
---------------------------------------------
https://heise.de/-6271591
∗∗∗ Qnap veröffentlicht NAS-Updates und deaktiviert aus Sicherheitsgründen eine App ∗∗∗
---------------------------------------------
Angreifer könnten Netzwerkspeicher von Qnap attackieren. Der Sicherheitspatch für eine Lücke steht noch aus.
---------------------------------------------
https://heise.de/-6272271
∗∗∗ Azure Active Directory: Sicherheitslücke entblößt private Schlüssel ∗∗∗
---------------------------------------------
In Azure Automation waren private Schlüssel für jeden Nutzer des AD einsehbar. Obwohl Microsoft das Problem gelöst hat, ist ein Schlüsseltausch angeraten.
---------------------------------------------
https://heise.de/-6272248
∗∗∗ ProxyNoShell: Mandiant warnt vor neuen Angriffsmethoden auf Exchange-Server (Nov. 2021) ∗∗∗
---------------------------------------------
Cyber-Angreifer verwenden seit Monaten drei bekannte Schwachstellen in Microsofts Exchange Servern, für die es bereits seit Monaten Updates gibt. Trotzdem sind um die 30.000 Microsoft Exchange Sever per Internet erreichbar, die über diese Schwachstellen angreifbar sind. Sicherheitsforscher haben jetzt eine [...]
---------------------------------------------
https://www.borncity.com/blog/2021/11/19/proxynoshell-mandiant-warnt-vor-ne…
∗∗∗ Malware downloaded from PyPI 41,000 times was surprisingly stealthy ∗∗∗
---------------------------------------------
Malware infiltrating open source repositories is getting more sophisticated.
---------------------------------------------
https://arstechnica.com/?p=1814211
∗∗∗ Android malware BrazKing returns as a stealthier banking trojan ∗∗∗
---------------------------------------------
The BrazKing Android banking trojan has returned with dynamic banking overlays and a new implementation trick that enables it to operate without requesting risky permissions.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/android-malware-brazking-ret…
∗∗∗ Ransomware Phishing Emails Sneak Through SEGs ∗∗∗
---------------------------------------------
The MICROP ransomware spreads via Google Drive and locally stored passwords.
---------------------------------------------
https://threatpost.com/ransomware-phishing-emails-segs/176470/
∗∗∗ Downloader Disguised as Excel Add-In (XLL), (Fri, Nov 19th) ∗∗∗
---------------------------------------------
At the Internet Storm Center, we like to show how exotic extensions can be used to make victims feel confident to open malicious files. There is an interesting webpage that maintains a list of dangerous extensions used by attackers: filesec.io[1]. The list is regularly updated and here is an example of malicious file that is currently not listed: "XLL". It's not a typo, it's not a "DLL" but close to!
---------------------------------------------
https://isc.sans.edu/diary/rss/28052
∗∗∗ New Side Channel Attacks Re-Enable Serious DNS Cache Poisoning Attacks ∗∗∗
---------------------------------------------
Researchers have demonstrated yet another variant of the SAD DNS cache poisoning attack that leaves about 38% of the domain name resolvers vulnerable, enabling attackers to redirect traffic originally destined to legitimate websites to a server under their control. "The attack allows an off-path attacker to inject a malicious DNS record into a DNS cache," University of California researchers Keyu Man, Xin'an Zhou, and Zhiyun Qian said.
---------------------------------------------
https://thehackernews.com/2021/11/new-side-channel-attacks-re-enable.html
∗∗∗ Web trust dies in darkness: Hidden Certificate Authorities undermine public crypto infrastructure ∗∗∗
---------------------------------------------
Security researchers have checked the webs public key infrastructure and have measured a long-known but little-analyzed security threat: hidden root Certificate Authorities.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2021/11/19/web_trust_ce…
∗∗∗ Patch now! FatPipe VPN zero-day actively exploited ∗∗∗
---------------------------------------------
The FBI has revealed that APT actors have been abusing a zero-day in FatPipes MPVPN, WARP, and IPVPN products since May.
---------------------------------------------
https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/11/patch-no…
∗∗∗ New Aggah Campaign Hijacks Clipboards to Replace Cryptocurrency Addresses ∗∗∗
---------------------------------------------
Aggah is a threat group known for espionage and information theft worldwide, as well as its deft use of free and open-source infrastructure to conduct its attacks. Weve recently reported that the group is linked with the Mana Tools malware distribution and command and control (C2) panel. RiskIQ recently identified a new Aggah campaign via our global monitoring of malicious VBScript code posted on websites. In this latest campaign, operators deployed clipboard hijacking code that replaces a [...]
---------------------------------------------
https://www.riskiq.com/blog/external-threat-management/aggah-clipboard-hija…
∗∗∗ Ransomware is now a giant black hole that is sucking in all other forms of cybercrime ∗∗∗
---------------------------------------------
File-encrypting malware is where the money is -- and thats changing the whole online crime ecosystem.
---------------------------------------------
https://www.zdnet.com/article/ransomware-is-now-a-giant-black-hole-that-is-…
∗∗∗ All Roads Lead to OpenVPN: Pwning Industrial Remote Access Clients ∗∗∗
---------------------------------------------
[...] Team82’s research uncovered four vulnerabilities in popular industrial VPN solutions from vendors HMS Industrial Networks, Siemens, PerFact, and MB connect line.
The vulnerabilities expose users to remote and arbitrary code execution attacks, and also enable attackers to elevate privileges.
All four vendors have either provided a fix in an updated version of their respective products, or suggested mitigations.
---------------------------------------------
https://claroty.com/2021/11/19/blog-research-all-roads-lead-to-openvpn-pwni…
∗∗∗ Kernel Karnage – Part 4 (Inter(ceptor)mezzo) ∗∗∗
---------------------------------------------
To make up for the long wait between parts 2 and 3, we’re releasing another blog post this week. Part 4 is a bit smaller than the others, an intermezzo between parts 3 and 5 if you will, discussing interceptor.
---------------------------------------------
https://blog.nviso.eu/2021/11/19/kernel-karnage-part-4-interceptormezzo/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security Bulletin: Vulnerability in sed affects IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem V9000 products ∗∗∗
---------------------------------------------
A vulnerability in the sed command could allow an authenticated attacker to escape from a restricted shell to obtain sensitive information and cause a denial of service.
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-sed-affe…
∗∗∗ Security Bulletin: IBM MQ for HP NonStop Server is affected by vulnerability CVE-2021-29843 ∗∗∗
---------------------------------------------
IBM MQ is vulnerable to a denial of service attack caused by an issue processing message properties. The issue is described by CVE-2021-29843.
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-for-hp-nonstop-ser…
∗∗∗ Xen Security Advisory CVE-2021-28710 / XSA-390 - certain VT-d IOMMUs may not work in shared page table mode ∗∗∗
---------------------------------------------
Impact: A malicious guest may be able to escalate its privileges to that of the host.
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-390.html
∗∗∗ Vulnerability Spotlight: Use-after-free vulnerability in Google Chrome could lead to code execution ∗∗∗
---------------------------------------------
Cisco Talos recently discovered an exploitable use-after-free vulnerability in Google Chrome.
---------------------------------------------
https://blog.talosintelligence.com/2021/11/vulnerability-spotlight-user-aft…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (chromium, grafana, kubectl-ingress-nginx, and opera), Debian (netkit-rsh and salt), Fedora (freeipa and samba), Mageia (opensc, python-django-filter, qt4, tinyxml, and transfig), openSUSE (opera and transfig), Red Hat (devtoolset-11-annobin, devtoolset-11-binutils, and llvm-toolset:rhel8), SUSE (php72 and php74), and Ubuntu (mailman and thunderbird).
---------------------------------------------
https://lwn.net/Articles/876528/
∗∗∗ QNX-2021-002 Vulnerability in BMP Image Codec Impacts BlackBerry QNX Software Development Platform (SDP) ∗∗∗
---------------------------------------------
https://support.blackberry.com/kb/articleDetail?language=en_US&articleNumbe…
∗∗∗ K48382137: Bootstrap vulnerability CVE-2018-14040 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K48382137
∗∗∗ K19785240: Bootstrap vulnerability CVE-2018-14042 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K19785240
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 17-11-2021 18:00 − Donnerstag 18-11-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ PerSwaysion Phishing Campaign Continues to Be an Active Threat for Organizations ∗∗∗
---------------------------------------------
Research shows that multiple attack groups have been using the Microsoft file-sharing service - leveraging phishing kit for much longer than previously thought.
---------------------------------------------
https://www.darkreading.com/vulnerabilities-threats/-perswaysion-phishing-c…
∗∗∗ Fake Ransomware Infection Hits WordPress Sites ∗∗∗
---------------------------------------------
WordPress sites have been splashed with ransomware warnings that are as real as dime-store cobwebs made out of spun polyester.
---------------------------------------------
https://threatpost.com/fake-ransomware-infection-wordpress/176410/
∗∗∗ Guidance for Azure Active Directory (AD) keyCredential property Information Disclosure in Application and Service Principal APIs ∗∗∗
---------------------------------------------
Microsoft recently mitigated an information disclosure issue, CVE-2021-42306, to prevent private key data from being stored by some Azure services in the keyCredentials property of an Azure Active Directory (Azure AD) Application and/or Service Principal, and prevent reading of private key data previously stored in the keyCredentials property. [...] As a precautionary measure, Microsoft is recommending customers using these services take action as described in “Affected products/services,”...
---------------------------------------------
https://msrc-blog.microsoft.com:443/2021/11/17/guidance-for-azure-active-di…
∗∗∗ [Conti] Ransomware Group In-Depth Analysis ∗∗∗
---------------------------------------------
Providing a detailed perspective towards different fundamental aspects of Conti's Operation, our report approaches this case through different angles such as "Business Model", "Conti Attack Kill Chain", "Management Panel" and "Money Operation".
---------------------------------------------
https://www.prodaft.com/resource/detail/conti-ransomware-group-depth-analys…
∗∗∗ Portable Malware Analyzis Lab ∗∗∗
---------------------------------------------
Short tutorial about the installation of a malware analyzis lab on Proxmox.
---------------------------------------------
https://blog.rootshell.be/2021/11/17/portable-malware-analyzis-lab/
∗∗∗ New ETW Attacks Can Allow Hackers to Blind Security Products ∗∗∗
---------------------------------------------
Researchers have described two new attack methods that can be used to “blind” cybersecurity products that rely on a logging mechanism named Event Tracing for Windows (ETW). ETW, which is present by default in Windows since Windows XP, is designed for tracing and logging events associated with user-mode applications and kernel-mode drivers.
---------------------------------------------
https://www.securityweek.com/new-etw-attacks-can-allow-hackers-blind-securi…
∗∗∗ biovea.net und biovea.com: Häufig Probleme bei Bestellungen ∗∗∗
---------------------------------------------
Biovea bietet auf den Websites biovea.net und biovea.com diverse Nahrungsergänzungsmittel, Körperpflegeprodukte und Waren aus dem Gesundheitsbereich an. Bestellte Produkte werden tatsächlich versandt, doch fehlende Kontaktinformationen, Versand teils aus Amerika und der Import der Produkte beim Zoll können zu zahlreichen Problemen für Bestellende führen.
---------------------------------------------
https://www.watchlist-internet.at/news/bioveanet-und-bioveacom-haeufig-prob…
=====================
= Vulnerabilities =
=====================
∗∗∗ Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2021-011 ∗∗∗
---------------------------------------------
13∕25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default
The Drupal project uses the CKEditor library for WYSIWYG editing. CKEditor has released a security update that impacts Drupal.Vulnerabilities are possible if Drupal is configured to allow use of the CKEditor library for WYSIWYG editing. An attacker that can create or edit content (even without access to
---------------------------------------------
https://www.drupal.org/sa-core-2021-011
∗∗∗ Drupal: OpenID Connect Microsoft Azure Active Directory client - Moderately critical - Access Bypass - SA-CONTRIB-2021-044 ∗∗∗
---------------------------------------------
14∕25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Default
This module enables users to authenticate through their Microsoft Azure AD account.The module does not sufficiently check authorization before updating user profile information in certain non-default configurations. This could lead a user being able to hijack another
---------------------------------------------
https://www.drupal.org/sa-contrib-2021-044
∗∗∗ Vulnerability Spotlight: Multiple code execution vulnerabilities in LibreCAD ∗∗∗
---------------------------------------------
Cisco Talos recently discovered three vulnerabilities in LibreCAD’s libdfxfw open-source library. This library reads and writes .dxf and .dwg files — the primary file format for vector graphics in CAD software. LibreCAD, a free computer-aided design software for 2-D models, uses this libdfxfw. [...] Users are encouraged to update these affected products as soon as possible: LibreCad libdxfrw, version 2.2.0-rc2-19-ge02f3580. Talos tested and confirmed these versions of the library could be exploited by this vulnerability.
---------------------------------------------
http://blog.talosintelligence.com/2021/11/libre-cad-vuln-spotlight-.html
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (binutils, firefox, flatpak, freerdp, httpd, java-1.8.0-openjdk, java-11-openjdk, kernel, openssl, and thunderbird), Fedora (python-sport-activities-features, rpki-client, and vim), and Red Hat (devtoolset-10-annobin and devtoolset-10-binutils).
---------------------------------------------
https://lwn.net/Articles/876413/
∗∗∗ Reflected XSS Vulnerability in Ragic Cloud DB ∗∗∗
---------------------------------------------
A reflected cross-site scripting (XSS) vulnerability has been reported to affect QNAP NAS running Ragic Cloud DB. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already disabled and removed Ragic Cloud DB from the QNAP App Center, pending a security patch from Ragic.
To secure your device, we recommend uninstalling Ragic Cloud DB until a security patch is available.
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-48
∗∗∗ CSRF Vulnerability in QmailAgent ∗∗∗
---------------------------------------------
A cross-site request forgery (CSRF) vulnerability has been reported to affect QNAP NAS running QmailAgent. If exploited, this vulnerability allows remote attackers to trick a victim into performing unintended actions on the web application while the victim is logged in. We have already fixed this vulnerability in the following versions of QmailAgent: QmailAgent 3.0.2 (2021/08/25) and later
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-49
∗∗∗ Heap-Based Buffer Overflow Vulnerability in QTS and QuTS hero ∗∗∗
---------------------------------------------
A heap-based buffer overflow vulnerability has been reported to affect QNAP NAS devices that have Apple File Protocol (AFP) enabled in QTS or QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary code.
We have already fixed this vulnerability in the following versions of QTS and QuTS hero: [...]
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-50
∗∗∗ Security Bulletin: Vulnerabilitiy affects IBM Observability with Instana ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilitiy-affects-ib…
∗∗∗ Security Bulletin: Multiple vulnerabilities affect IBM Cloud Object Storage Systems (Nov V2) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Philips IntelliBridge EC 40 and EC 80 Hub ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsma-21-322-01
∗∗∗ Philips Patient Information Center iX (PIC iX) and Efficia CM Series ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsma-21-322-02
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 16-11-2021 18:00 − Mittwoch 17-11-2021 18:00
Handler: Wolfgang Menezes
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ These are the cryptomixers hackers use to clean their ransoms ∗∗∗
---------------------------------------------
Cryptomixers have always been at the epicenter of cybercrime activity, allowing hackers to "clean" cryptocurrency stolen from victims and making it hard for law enforcement to track them.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/these-are-the-cryptomixers-h…
∗∗∗ 6 Tips To Keep in Mind for Ransomware Defense ∗∗∗
---------------------------------------------
Ransomware is everywhere, including the nightly news. Most people know what it is, but how do ransomware attackers get in, and how can we defend against them?
---------------------------------------------
https://www.darkreading.com/edge-articles/6-tips-to-keep-in-mind-for-ransom…
∗∗∗ Github: NPM-Pakete konnten beliebig überschrieben werden ∗∗∗
---------------------------------------------
Ein Fehler in der NPM-Registry hat das Überschreiben von Paketen ermöglicht. Github weiß nicht sicher, ob dies ausgenutzt wurde.
---------------------------------------------
https://www.golem.de/news/github-npm-pakete-konnten-beliebig-ueberschrieben…
∗∗∗ Infect If Needed | A Deeper Dive Into Targeted Backdoor macOS.Macma ∗∗∗
---------------------------------------------
Thanks to the work of Google’s TAG team, we were able to grab two versions of the backdoor used by the threat actors, which we will label UserAgent 2019 and UserAgent 2021.
---------------------------------------------
https://www.sentinelone.com/labs/infect-if-needed-a-deeper-dive-into-target…
∗∗∗ Lücken in Industrie-IoT-Protokoll ermöglichen Fremdsteuerung ∗∗∗
---------------------------------------------
Implementierungen eines Datenaustauschprotokolls für industrielle Steuerungen sind anfällig für Manipulationen, die zu Schäden führen könnten.
---------------------------------------------
https://heise.de/-6268372
∗∗∗ Bestellung auf fotoexperte24.de führt in Abo-Falle! ∗∗∗
---------------------------------------------
Auf der Webseite fotoexperte24.de können günstige Passbilder für verschiedene Ausweise bestellt werden. Doch tatsächlich handelt es sich um einen Fake-Shop, der keine Bilder liefert. Stattdessen bucht der unseriöse Anbieter deutlich mehr Geld von der Kreditkarte ab als beim Bestellprozess angezeigt wurde.
---------------------------------------------
https://www.watchlist-internet.at/news/bestellung-auf-fotoexperte24de-fuehr…
∗∗∗ Cobalt Strike: Decrypting Obfuscated Traffic – Part 4 ∗∗∗
---------------------------------------------
Encrypted Cobalt Strike C2 traffic can be obfuscated with malleable C2 data transforms. We show how to deobfuscate such traffic.
---------------------------------------------
https://blog.nviso.eu/2021/11/17/cobalt-strike-decrypting-obfuscated-traffi…
∗∗∗ ProxyNoShell: A Change in Tactics Exploiting ProxyShell Vulnerabilities ∗∗∗
---------------------------------------------
In several recent Incident Response engagements, Mandiant has observed threat actors exploiting the vulnerabilities in different ways than previously reported.
---------------------------------------------
https://www.mandiant.com/resources/change-tactics-proxyshell-vulnerabilities
=====================
= Vulnerabilities =
=====================
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
IBM hat 15 Security Bulletins veröffentlicht. Davon wird eine als "Kritisch", sechs als "High", und acht als "Medium" eingestuft.
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (389-ds-base and libxml2), Debian (atftp, axis, and ntfs-3g), Fedora (digikam, freerdp, guacamole-server, and remmina), openSUSE (java-11-openjdk, kernel, samba, and tomcat), SUSE (firefox, java-11-openjdk, kernel, libarchive, samba, and tomcat), and Ubuntu (accountsservice, hivex, and openexr).
---------------------------------------------
https://lwn.net/Articles/876327/
∗∗∗ Netgear patches severe pre-auth RCE in 61 router and modem models ∗∗∗
---------------------------------------------
Networking equipment vendor Netgear has patched the fifth set of dangerous remote code execution bugs impacting its small office and small home (SOHO) routers this year.
---------------------------------------------
https://therecord.media/netgear-deals-with-its-fifth-wave-of-severe-rce-bug…
∗∗∗ ZDI-21-1320: Trend Micro Antivirus for Mac Improper Access Control Privilege Escalation Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1320/
∗∗∗ ZDI-21-1319: (0Day) Autodesk Design Review PNG File Parsing Use-After-Free Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1319/
∗∗∗ ZDI-21-1317: (0Day) Autodesk Design Review PDF File Parsing Type Confusion Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1317/
∗∗∗ ZDI-21-1316: (0Day) Autodesk Design Review PDF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1316/
∗∗∗ ZDI-21-1315: (0Day) Autodesk Design Review PDF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1315/
∗∗∗ Cisco Common Services Platform Collector Improper Logging Restriction Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Common Services Platform Collector Stored Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Common Services Platform Collector SQL Injection Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ WooCommerce Extension – Reflected XSS Vulnerability ∗∗∗
---------------------------------------------
https://www.wordfence.com/blog/2021/11/woocommerce-extension-reflected-xss-…
∗∗∗ Synology-SA-21:29 Samba ∗∗∗
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_21_29
∗∗∗ FATEK Automation WinProladder ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-320-01
∗∗∗ Mitsubishi Electric GOT products ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-320-02
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 15-11-2021 18:00 − Dienstag 16-11-2021 18:00
Handler: Dimitri Robl
Co-Handler: Wolfgang Menezes
=====================
= News =
=====================
∗∗∗ Malware: Emotet ist zurück ∗∗∗
---------------------------------------------
Sicherheitsforscher haben eine neue Variante von Emotet entdeckt. Noch wird der Schädling von einer anderen Malware nachgeladen.
---------------------------------------------
https://www.golem.de/news/malware-emotet-ist-zurueck-2111-161124-rss.html
∗∗∗ Windows Sonder-Updates gegen DC-Authentifizierungsprobleme und Druckprobleme ∗∗∗
---------------------------------------------
Die Sicherheitsupdates vom November für Windows verursachen teils Authentifizierungsprobleme bei Domain Controllern sowie Druckprobleme. Microsoft patcht nach.
---------------------------------------------
https://heise.de/-6267784
∗∗∗ Fake Ransomware Infection Spooks Website Owners ∗∗∗
---------------------------------------------
Starting this past Friday we have seen a number of websites showing a fake ransomware infection. Google search results for “FOR RESTORE SEND 0.1 BITCOIN” were sitting at 6 last week and increased to 291 at the time of writing this.
---------------------------------------------
https://blog.sucuri.net/2021/11/fake-ransomware-infection-spooks-website-ow…
∗∗∗ GitHub Confirms Another Major NPM Security Defect ∗∗∗
---------------------------------------------
Microsoft-owned GitHub is again flagging major security problems in the npm registry, warning that a pair of newly discovered vulnerabilities continue to expose the soft underbelly of the open-source software supply chain.
---------------------------------------------
https://www.securityweek.com/github-confirms-another-major-npm-security-def…
∗∗∗ Black Friday: Vorsicht vor Fake-Angeboten ∗∗∗
---------------------------------------------
Am 26. November 2021 ist Black Friday. Und darauf folgt am 29. November schon der Cyber Monday - für Schnäppchenjäger wahre Shopping-Feiertage. Wir raten aber zur Vorsicht: Nicht nur seriöse Anbieter locken mit günstigen Preisen und Rabatten, auch Fake-Shops werben mit Black Friday Angeboten.
---------------------------------------------
https://www.watchlist-internet.at/news/black-friday-vorsicht-vor-fake-angeb…
∗∗∗ An update on the state of the NIS2 draft ∗∗∗
---------------------------------------------
This is a TLP:WHITE summary of my presentation at the 15th CSIRTs Network meeting in Ljubljana on November 11th. This is not a complete review of the current state of the NIS2 discussions.
---------------------------------------------
https://cert.at/en/blog/2021/11/an-update-on-the-state-of-the-nis2-draft
∗∗∗ New Federal Government Cybersecurity Incident and Vulnerability Response Playbooks ∗∗∗
---------------------------------------------
[...] today, CISA published the Federal Government Cybersecurity Incident and Vulnerability Response Playbooks. The playbooks provide federal civilian executive branch (FCEB) agencies with operational procedures for planning and conducting cybersecurity incident and vulnerability response activities. The playbooks provide illustrated decision trees and detail each step for both incident and vulnerability response.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/11/16/new-federal-gover…
∗∗∗ A new Android banking trojan named SharkBot is makings its presence felt ∗∗∗
---------------------------------------------
Security researchers have discovered a new Android banking trojan capable of hijacking users smartphones and emptying out e-banking and cryptocurrency accounts.
---------------------------------------------
https://therecord.media/a-new-android-banking-trojan-named-sharkbot-is-maki…
∗∗∗ New Type of Supply Chain Attack Could Put Popular Admin Tools at Risk ∗∗∗
---------------------------------------------
Research between Intezer and Checkmarx describes ChainJacking, a type of software supply chain attack that could be potentially exploited by threat actors and puts common admin tools at risk. We have identified a number of open-source Go packages that are susceptible to ChainJacking given that some of these vulnerable packages are embedded in popular admin [...]
---------------------------------------------
https://www.intezer.com/blog/malware-analysis/chainjacking-supply-chain-att…
∗∗∗ Kernel Karnage – Part 3 (Challenge Accepted) ∗∗∗
---------------------------------------------
[...] The past weeks I mostly experimented with existing tooling and got acquainted with the basics of kernel driver development. I managed to get a quick win versus $vendor1 but that didn’t impress our blue team, so I received a challenge to bypass $vendor2. I have to admit, after trying all week to get around the protections, $vendor2 is definitely a bigger beast to tame.
---------------------------------------------
https://blog.nviso.eu/2021/11/16/kernel-karnage-part-3-challenge-accepted/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libxml-security-java), Fedora (botan2), openSUSE (drbd-utils, kernel, and samba), Red Hat (kernel and webkit2gtk3), SUSE (drbd-utils and samba), and Ubuntu (vim).
---------------------------------------------
https://lwn.net/Articles/876227/
∗∗∗ Synology-SA-21:28 Mail Station ∗∗∗
---------------------------------------------
A vulnerability allows remote authenticated users to execute arbitrary commands via a susceptible version of Mail Station.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_21_28
∗∗∗ AMD Windows 10-Grafiktreiber mit Schwachstellen (Nov. 2021) ∗∗∗
---------------------------------------------
Nutzer mit AMD-Grafikkarten und Windows 10 sollten sich mit dem Thema Aktualisierung von AMD-Grafiktreibern befassten. Der Hersteller hat eingestanden, dass seine Windows 10-Grafiktreiber zahlreiche Sicherheitslücken aufweisen. Einige Schwachstellen (z.B. im Grafiktreiber) werden als sicherheitstechnisch Hoch eingestuft.
---------------------------------------------
https://www.borncity.com/blog/2021/11/16/amd-windows-10-treiber-mit-schwach…
∗∗∗ WAGO: Denial of Service Vulnerability in CODESYS Runtime 2.3 ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2021-049/
∗∗∗ WAGO: Multiple devices affected by Vulnerabilities in NUCLEUS TCP Stack. ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2021-050/
∗∗∗ WAGO: Multiple Vulnerabilities in CODESYS Runtime 2.3 and WebVisualisation ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2021-056/
∗∗∗ Grafana: Schwachstelle ermöglicht Privilegieneskalation ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1205
∗∗∗ Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen ermöglichen Denial of Service ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1207
∗∗∗ ZDI-21-1312: Open Design Alliance (ODA) ODAViewer DWG File Parsing Use-After-Free Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1312/
∗∗∗ ZDI-21-1311: Open Design Alliance (ODA) ODAViewer U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1311/
∗∗∗ ZDI-21-1310: Open Design Alliance (ODA) ODAViewer U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1310/
∗∗∗ Security Bulletin: A vulnerability in filesystem audit logging affects IBM Spectrum Scale. ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-filesy…
∗∗∗ Security Bulletin: Vulnerability in IBM SDK Java affects IBM Cloud Pak System (CVE-2020-27221) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-ibm-sdk-…
∗∗∗ Security Bulletin: IBM MQ for HP NonStop Server is affected by OpenSSL vulnerability CVE-2021-3711 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-for-hp-nonstop-ser…
∗∗∗ Security Bulletin: IBM MQ is vulnerable to an issue in Eclipse Jetty (CVE-2021-28165) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-is-vulnerable-to-a…
∗∗∗ Security Bulletin: IBM WebSphere MQ for HP NonStop Server is affected by OpenSSL vulnerability CVE-2021-3711 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-websphere-mq-for-hp-n…
∗∗∗ Security Bulletin: IBM MQ is vulnerable to an issue in Eclipse (CVE-2020-27225) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-is-vulnerable-to-a…
∗∗∗ Security Bulletin: IBM MQ can inadvertently display cleartext credentials via diagnostic logs (CVE-2021-38949) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-can-inadvertently-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 12-11-2021 18:00 − Montag 15-11-2021 18:00
Handler: Dimitri Robl
Co-Handler: Wolfgang Menezes
=====================
= News =
=====================
∗∗∗ PSA: Apple isn’t actually patching all the security holes in older versions of macOS ∗∗∗
---------------------------------------------
Big Sur got a fix 234 days before Catalina did, although both are supported.
---------------------------------------------
https://arstechnica.com/?p=1812611
∗∗∗ FTC shares ransomware defense tips for small US businesses ∗∗∗
---------------------------------------------
The US Federal Trade Commission (FTC) has shared guidance for small businesses on how to secure their networks from ransomware attacks by blocking threat actors attempts to exploit vulnerabilities using social engineering or exploits targeting technology.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/ftc-shares-ransomware-defens…
∗∗∗ Video: Obfuscated Maldoc: Reversed BASE64, (Sun, Nov 14th) ∗∗∗
---------------------------------------------
I made a video of the maldoc analysis I explained in yesterday's diary entry "Obfuscated Maldoc: Reversed BASE64".
---------------------------------------------
https://isc.sans.edu/diary/rss/28032
∗∗∗ Changing your AD Password Using the Clipboard - Not as Easy as Youd Think!, (Mon, Nov 15th) ∗∗∗
---------------------------------------------
Let me know if this scenario is familiar? [...] Microsoft won't allow you to paste a password into their GUI "password change". Apparantly Microsoft wants us to continue to use passwords like "Passw0rd1!" and "Winter2021!" forever, until all AD domains are "passwordless"
---------------------------------------------
https://isc.sans.edu/diary/rss/28036
∗∗∗ Microsoft Out of Band Update Resolves Kerberos Issue, (Mon, Nov 15th) ∗∗∗
---------------------------------------------
Since Patch Tuesday, we've been tracking a Kerboros issue in November's patch bundle that affected authentication in several deployment scenarios: [...] This was fixed out of band yesterday (November 14, 2021). If you have applied November's update and are affected, you'll want to apply the "November-take-two" update on any affected servers.
---------------------------------------------
https://isc.sans.edu/diary/rss/28040
∗∗∗ Exploiting CSP in Webkit to Break Authentication & Authorization ∗∗∗
---------------------------------------------
[...] Long story short, there was a vulnerability that we reported to Safari that Apple didn’t consider severe enough to fix quickly which then after waiting for a significant amount of time, we decided to exploit and earn some bounties by reporting them to bug bounty programs.
---------------------------------------------
https://threatnix.io/blog/exploiting-csp-in-webkit-to-break-authentication-…
∗∗∗ E-Mail-Server des FBI gehackt - für Fake-Warnungen über Cyber-Angriffe genutzt ∗∗∗
---------------------------------------------
Cyberkriminelle haben einen E-Mail-Server des FBI gekapert. Anschließend verschickten sie über 100.000 Spam-Mails mit einer Warnung vor einem Cyberangriff.
---------------------------------------------
https://heise.de/-6266349
∗∗∗ POC2021 – Pwning the Windows 10 Kernel with NFTS and WNF Slides ∗∗∗
---------------------------------------------
Alex Plaskett presented “Pwning the Windows 10 Kernel with NTFS and WNF” at Power Of Community (POC) on the 11th of November 2021. The abstract of the talk is as follows: A local privilege escalation vulnerability (CVE-2021-31956) 0day was identified as being exploited in the wild by Kaspersky. At the time it affected a broad [...]
---------------------------------------------
https://research.nccgroup.com/2021/11/15/poc2021-pwning-the-windows-10-kern…
∗∗∗ Exchange Exploit Leads to Domain Wide Ransomware ∗∗∗
---------------------------------------------
In late September, we observed an intrusion in which initial access was gained by the threat actor exploiting multiple vulnerabilities in Microsoft Exchange. ProxyShell is a name given to [...]
---------------------------------------------
https://thedfirreport.com/2021/11/15/exchange-exploit-leads-to-domain-wide-…
∗∗∗ AutoPoC - Validating the Lack of Validation in PoCs ∗∗∗
---------------------------------------------
HoneyPoC was a project to look at how popular CVE PoCs could be. AutoPoC took that concept and enabled the mass creation of disinformation. Also, Data is beautiful.
---------------------------------------------
https://blog.zsec.uk/honeypoc-ultimate/
∗∗∗ AT&T Alien Labs finds new Golang malware (BotenaGo) targeting millions of routers and IoT devices with more than 30 exploits ∗∗∗
---------------------------------------------
AT&T Alien Labs™ has found new malware written in the open source programming language Golang. Deployed with more than 30 exploits, it has the potential of targeting millions of routers and IoT devices.
---------------------------------------------
https://cybersecurity.att.com/blogs/labs-research/att-alien-labs-finds-new-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (ffmpeg and tomcat9), Fedora (et and kernel), openSUSE (binutils, rubygem-activerecord-5_1, samba, and tinyxml), Oracle (freerdp and httpd:2.4), Red Hat (devtoolset-11-gcc, gcc-toolset-10-binutils, kernel, kernel-rt, and kpatch-patch), and Scientific Linux (freerdp).
---------------------------------------------
https://lwn.net/Articles/876135/
∗∗∗ Security Bulletin: Use of a one way hash without a salt in IBM Security Guardium Key Lifecycle Manager (CVE-2021-38979) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-use-of-a-one-way-hash-wit…
∗∗∗ Security Bulletin: Hazardous Input Validation in IBM Security Guardium Key Lifecycle Manager (CVE-2021-38972) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-hazardous-input-validatio…
∗∗∗ Security Bulletin: Password stored in cleartext in IBM Security Guardium Key Lifecycle Manager (CVE-2021-38976) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-password-stored-in-cleart…
∗∗∗ Security Bulletin: Missing http strict transport security header in in IBM Security Guardium Key Lifecycle Manager (CVE-2021-38978) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-missing-http-strict-trans…
∗∗∗ Security Bulletin: Cross-Site scripting in IBM Security Guardium Key Lifecycle Manager (CVE-2021-38982) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cross-site-scripting-in-i…
∗∗∗ Security Bulletin: Missing cookie secure attribute in IBM Security Guardium Key Lifecycle Manager (CVE-2021-38977) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-missing-cookie-secure-att…
∗∗∗ Security Bulletin: Hazardous input validation in IBM Security Guardium Key Lifecycle Manager (CVE-2021-38985) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-hazardous-input-validatio…
∗∗∗ Security Bulletin: Inadequate encryption strength in IBM Security Guardium Key Lifecycle Manager (CVE-2021-38983) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-inadequate-encryption-str…
∗∗∗ Security Bulletin: Using components with known vulnerabilities in IBM Security Guardium Key Lifecycle Manager (CVE-2021-20492) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-using-components-with-kno…
∗∗∗ Security Bulletin: Vulnerabilities in Node.js affect IBM Integration Bus v10 (CVE-2021-32803) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-node-j…
∗∗∗ Security Bulletin: Denial of service in IBM Security Guardium Key Lifecycle Manager (CVE-2021-38974) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-denial-of-service-in-ibm-…
∗∗∗ Security Bulletin: Hazardous input validation in IBM Security Guardium Key Lifecycle Manager (CVE-2021-38973) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-hazardous-input-validatio…
∗∗∗ Security Bulletin: Information exposure in IBM Security Guardium Key Lifecycle Manager 4.1.1 (CVE-2021-38975) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-information-exposure-in-i…
∗∗∗ Security Bulletin: Inadequate encryption strength in IBM Security Guardium Key Lifecycle Manager (CVE-2021-38984) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-inadequate-encryption-str…
∗∗∗ Security Bulletin: Application error in IBM Security Guardium Key Lifecycle Manager 4.1.1 (CVE-2021-38981) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-application-error-in-ibm-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 11-11-2021 18:00 − Freitag 12-11-2021 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Zoom dichtet Sicherheitslücken in mehreren Produkten und Clients ab ∗∗∗
---------------------------------------------
In einigen Produkten des Webkonferenz-Anbieters Zoom hat der Hersteller Sicherheitslücken geschlossen.
---------------------------------------------
https://heise.de/-6265648
∗∗∗ Kriminelle versenden betrügerische Mails im Namen der Post! ∗∗∗
---------------------------------------------
Derzeit melden uns zahlreiche LeserInnen ein betrügerisches E-Mail, das im Namen der Post verschickt wird. Darin behaupten die Kriminellen, dass für eine Bestellung zusätzliche Einfuhrgebühren notwendig seien. Auch wenn Sie gerade auf ein Paket warten, sollten Sie bei solchen E-Mails skeptisch sein. In diesem Fall versuchen die BetrügerInnen an Ihr Geld zu kommen!
---------------------------------------------
https://www.watchlist-internet.at/news/kriminelle-versenden-betruegerische-…
∗∗∗ HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks ∗∗∗
---------------------------------------------
HTML smuggling, a highly evasive malware delivery technique that leverages legitimate HTML5 and JavaScript features, is increasingly used in email campaigns that deploy banking malware, remote access Trojans (RATs), and other payloads related to targeted attacks.
---------------------------------------------
https://www.microsoft.com/security/blog/2021/11/11/html-smuggling-surges-hi…
∗∗∗ Malware uses namesilo Parking pages and Googles custom pages to spread ∗∗∗
---------------------------------------------
Recently, we found a suspicious GoELFsample, which is a downloder mainly to spread mining malwares. The interesting part is that we noticed it using namesilos Parking page and Googles user-defined page to spread the sample and configuration. Apparently this is yet another attempt to hide control channel to avoid [...]
---------------------------------------------
https://blog.netlab.360.com/zhatuniubility-malware-uses-namesilo-parking-pa…
∗∗∗ Murder-for-hire, money laundering, and more: How organised criminals work online ∗∗∗
---------------------------------------------
Europol has released an extensive report into serious and organized crime, including how these groups use the internet to aid in their criminal behaviour.
---------------------------------------------
https://blog.malwarebytes.com/reports/2021/11/murder-for-hire-money-launder…
∗∗∗ “We wait, because we know you.” Inside the ransomware negotiation economics. ∗∗∗
---------------------------------------------
Organizations worldwide continue to face waves of digital extortion in the form of targeted ransomware. Digital extortion is now classified as the most prominent form of cybercrime and the most devastating and pervasive threat to functioning [...]
---------------------------------------------
https://research.nccgroup.com/2021/11/12/we-wait-because-we-know-you-inside…
∗∗∗ Researcher Shows Windows Flaw More Serious After Microsoft Releases Incomplete Patch ∗∗∗
---------------------------------------------
A researcher has discovered that a Windows vulnerability for which Microsoft released an incomplete patch in August is more serious than initially believed.
---------------------------------------------
https://www.securityweek.com/researcher-shows-windows-flaw-more-serious-aft…
∗∗∗ When the alarms go off: 10 key steps to take after a data breach ∗∗∗
---------------------------------------------
It’s often said that data breaches are no longer a matter of ‘if’, but ‘when’ – here’s what your organization should do, and avoid doing, in the case of a security breach
---------------------------------------------
https://www.welivesecurity.com/2021/11/11/alarms-go-off-10-steps-take-data-…
∗∗∗ Network Code on Cybersecurity is out for public consultation ∗∗∗
---------------------------------------------
The draft for the Network Code for cybersecurity aspects of cross-border electricity flows has been released today for public consultation. ENCS has collaborated on the writing of the Network Code as part of the drafting team. During the public consultation period, stakeholders within the energy sector have the opportunity of sharing their views on the [...]
---------------------------------------------
https://encs.eu/news/network-code-on-cybersecurity-is-out-for-public-consul…
∗∗∗ Number of Malicious Shopping Websites Jumps 178% ahead of November e-Shopping Holidays, Breaking Records ∗∗∗
---------------------------------------------
Highlights: Check Point Research (CPR) spots over 5300 different malicious websites per week, marking the highest since the beginning of 2021 Numbers show a 178% increase compared to 2021 so far 1 out of 38 corporate networks are being impacted on average per week in November, compared to 1 in 47 in October, and [...]
---------------------------------------------
https://blog.checkpoint.com/2021/11/12/number-of-malicious-shopping-website…
=====================
= Vulnerabilities =
=====================
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
IBM hat 15 Security Bulletins veröffentlicht.
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Technical Advisory – Multiple Vulnerabilities in Victure WR1200 WiFi Router (CVE-2021-43282, CVE-2021-43283, CVE-2021-43284) ∗∗∗
---------------------------------------------
Victure’s WR1200 WiFi router, also sometimes referred to as AC1200, was found to have multiple vulnerabilities exposing its owners to potential intrusion in their local WiFi network and complete overtake of the device. Three vulnerabilities were uncovered, with links to the associated technical advisories below: [...]
---------------------------------------------
https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulner…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (node-tar, postgresql-11, postgresql-13, and postgresql-9.6), Fedora (autotrace, botan2, chafa, converseen, digikam, dmtx-utils, dvdauthor, eom, kxstitch, pfstools, php-pecl-imagick, psiconv, q, R-magick, radeontop, rss-glx, rubygem-rmagick, synfig, synfigstudio, vdr-scraper2vdr, vdr-skinelchihd, vdr-skinnopacity, vdr-tvguide, and WindowMaker), Mageia (kernel, kernel-linus, and openafs), openSUSE (kernel), Red Hat (freerdp), SUSE (bind and kernel), [...]
---------------------------------------------
https://lwn.net/Articles/875931/
∗∗∗ WECON PLC Editor ∗∗∗
---------------------------------------------
This advisory contains mitigation for Stack-based Buffer Overflow, and Out-of-bounds Write vulnerabilities in WECON PLC Editor ladder logic software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-315-01
∗∗∗ Multiple Data Distribution Service (DDS) Implementations ∗∗∗
---------------------------------------------
This advisory contains mitigations for several vulnerabilities in Multiple Data Distribution Service (DDS) Implementations developed by a number of different vendors.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-315-02
∗∗∗ VMware Releases Security Update for Tanzu Application Service for VMs ∗∗∗
---------------------------------------------
VMware has released a security update to address a vulnerability in Tanzu Application Service for VMs. A remote attacker could exploit this vulnerability to cause a denial-of-service condition. CISA encourages users and administrators to review VMware Security Advisory VMSA-2021-0026 and apply the necessary update.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/11/12/vmware-releases-s…
∗∗∗ SYSS-2021-057: Open Redirect durch HTML Injection in Cryptshare ∗∗∗
---------------------------------------------
Im Cryptshare-Server besteht eine Schwachstelle. Sie erlaubt Angreifenden, die Empfänger einer manipulierten Nachricht auf beliebige Seiten weiterzuleiten.
---------------------------------------------
https://www.syss.de/pentest-blog/syss-2021-057-open-redirect-durch-html-inj…
∗∗∗ Unlimited Sitemap Generator vulnerable to cross-site request forgery ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN58407606/
∗∗∗ PostgreSQL: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1201
∗∗∗ Red Hat Enterprise Linux: Schwachstelle ermöglicht Codeausführung ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1198
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 10-11-2021 18:00 − Donnerstag 11-11-2021 18:00
Handler: Dimitri Robl
Co-Handler: Wolfgang Menezes
=====================
= News =
=====================
∗∗∗ Sophos 2022 Threat Report: Malware, Mobile, Machine learning and more! ∗∗∗
---------------------------------------------
The crooks have shown that the'yre willing to learn and adapt their attacks, so we need to make sure we learn and adapt, too.
---------------------------------------------
https://nakedsecurity.sophos.com/2021/11/09/2022-threat-report/
∗∗∗ Understanding .htaccess Malware ∗∗∗
---------------------------------------------
The .htaccess file is notorious for being targeted by attackers. Whether it’s using the file to hide malware, redirect search engines to other sites with blackhat SEO tactics, hide backdoors, inject content, modify php.ini values; the possibilities are endless. Many site owners are unaware of this file, due to it starting with a “.” making it a hidden file. .htaccess malware can be hard to pinpoint and clean on a server [...]
---------------------------------------------
https://blog.sucuri.net/2021/11/understanding-htaccess-malware.html
∗∗∗ A Detailed Analysis of Lazarus’ RAT Called FALLCHILL ∗∗∗
---------------------------------------------
FALLCHILL is a RAT that has been used by Lazarus Group since 2016. It implements a custom algorithm that is used to decode multiple DLL names and export functions, which will be imported at runtime.
---------------------------------------------
https://lifars.com/knowledge-center/a-detailed-analysis-of-lazarus-rat-call…
∗∗∗ The Newest Malicious Actor: “Squirrelwaffle” Malicious Doc. ∗∗∗
---------------------------------------------
Authored By Kiran Raj Due to their widespread use, Office Documents are commonly used by Malicious actors as a way...The post The Newest Malicious Actor: “Squirrelwaffle” Malicious Doc. appeared first on McAfee Blogs.
---------------------------------------------
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/the-newest-malicious-a…
∗∗∗ ClusterFuzzLite: Continuous fuzzing for all ∗∗∗
---------------------------------------------
Posted by Jonathan Metzman, Google Open Source Security TeamIn recent years, continuous fuzzing has become an essential part of the software development lifecycle. By feeding unexpected or random data into a program, fuzzing catches bugs that would otherwise slip through the most thorough manual checks and provides coverage that would take staggering human effort to replicate. NIST’s guidelines for software verification, recently released in response to the White House Executive Order on
---------------------------------------------
http://security.googleblog.com/2021/11/clusterfuzzlite-continuous-fuzzing-f…
∗∗∗ HändlerInnen aufgepasst: BetrügerInnen geben Fake-Bestellungen im Namen von ATOS auf ∗∗∗
---------------------------------------------
Kriminelle geben sich derzeit als das Unternehmen ATOS aus und bekunden per Mail Interesse an einer Großbestellung. Für die betroffenen HändlerInnen mag das nach einem schnellen und leichten Geschäft klingen, doch tatsächlich hat die seriöse Firma ATOS nichts mit dieser Bestellung am Hut. Stattdessen würden Sie ihre Produkte an Kriminelle versenden, Geld dafür erhalten Sie nicht.
---------------------------------------------
https://www.watchlist-internet.at/news/haendlerinnen-aufgepasst-betruegerin…
∗∗∗ Capability Abstraction Case Study: Detecting Malicious Boot Configuration Modifications ∗∗∗
---------------------------------------------
[...] In simple terms, capability abstraction provides a way to describe how a given attack technique interacts with the internal components of a targeted system. The abstraction map that this process produces helps us to understand the common denominator between distinct implementations of the same technique.
---------------------------------------------
https://posts.specterops.io/capability-abstraction-case-study-detecting-mal…
∗∗∗ A Peek into Top-Level Domains and Cybercrime ∗∗∗
---------------------------------------------
We analyze which top-level domains (TLDs) have the highest rate of malicious domains and why, and suggest strategies for blocking malicious domains.
---------------------------------------------
https://unit42.paloaltonetworks.com/top-level-domains-cybercrime/
∗∗∗ BazarBackdoor now abuses Windows 10 apps feature in call me back attack ∗∗∗
---------------------------------------------
AppInstaller.exe has been twisted in a new form of phishing attack.
---------------------------------------------
https://www.zdnet.com/article/bazarloader-now-abuses-windows-10-apps-featur…
∗∗∗ October 2021’s Most Wanted Malware: Trickbot Takes Top Spot for Fifth Time ∗∗∗
---------------------------------------------
Check Point Research reveals that Trickbot is the most prevalent malware and a new vulnerability in Apache is one of the most exploited vulnerabilities worldwide.
---------------------------------------------
https://blog.checkpoint.com/2021/11/11/october-2021s-most-wanted-malware-tr…
=====================
= Vulnerabilities =
=====================
∗∗∗ ZDI-21-1303: NETGEAR R6400v2 UPnP uuid Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400v2 routers. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1303/
∗∗∗ Wordpress-Plug-in WP Reset Pro fixt kritische Sicherheitslücke ∗∗∗
---------------------------------------------
In WP Reset Pro klaffte eine Sicherheitslücke, durch die angemeldete Nutzer auch ohne entsprechende Rechte ganze Wordpress-Webauftritte löschen konnten.
---------------------------------------------
https://heise.de/-6264564
∗∗∗ Sicherheitsupdate: Kritische Root-Lücke bedroht Firewalls von Palo Alto ∗∗∗
---------------------------------------------
Sind bestimmte Einstellungen aktiviert und Voraussetzungen gegeben, könnten Angreifer Palo-Alto-Firewalls attackieren.
---------------------------------------------
https://heise.de/-6264656
∗∗∗ Over 1 Million Sites Impacted by Vulnerability in Starter Templates Plugin ∗∗∗
---------------------------------------------
On October 4, 2021, the Wordfence Threat Intelligence team initiated the responsible disclosure process for the Starter Templates plugin, which is installed on over 1 Million WordPress websites. The full name of the WordPress plugin is “Starter Templates — Elementor, Gutenberg & Beaver Builder Templates” [...]
---------------------------------------------
https://www.wordfence.com/blog/2021/11/over-1-million-sites-impacted-by-vul…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (icinga2, libxstream-java, ruby-kaminari, and salt), Fedora (awscli, cacti, cacti-spine, python-boto3, python-botocore, radeontop, and rust), Mageia (firefox, libesmtp, libzapojit, sssd, and thunderbird), openSUSE (samba and samba and ldb), SUSE (firefox, pcre, qemu, samba, and samba and ldb), and Ubuntu (firejail, linux-bluefield, linux-gke-5.4, linux-oracle, linux-oracle-5.4, linux-oem-5.10, linux-oem-5.14, and python-py).
---------------------------------------------
https://lwn.net/Articles/875813/
∗∗∗ iCloud for Windows 13 ∗∗∗
---------------------------------------------
https://support.apple.com/kb/HT212953
∗∗∗ Security Bulletin: Multiple Vulnerabilities in IBM Sterling Connect:Direct Browser User Interface ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: IBM Security SiteProtector System is affected by Cross-Site Scripting (CVE-2020-4140) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-siteprotecto…
∗∗∗ Security Bulletin: Multiple Vulnerabilities in IBM Java Runtime Affect IBM Connect:Direct Web Services ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: IBM API Connect is impacted by multiple vulnerabilities in Oracle MySQL ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-api-connect-is-impact…
∗∗∗ Security Bulletin: IBM Security SiteProtector System is affected by vulnerability CVE-2020-4146 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-siteprotecto…
∗∗∗ VMSA-2021-0026 ∗∗∗
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0026.html
∗∗∗ NGINX Ingress Controller vulnerability CVE-2021-23055 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K01051452?utm_source=f5support&utm_mediu…
∗∗∗ Micropatching Incompletely Patched Local Privilege Escalation in User Profile Service (CVE-2021-34484) ∗∗∗
---------------------------------------------
https://blog.0patch.com/2021/11/micropatching-incompletely-patched.html
∗∗∗ Stack Buffer Overflow Vulnerability in Multimedia Console ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-45
∗∗∗ Reflected XSS Vulnerability in QmailAgent ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-47
∗∗∗ TR-64 - Exploited Exchange Servers - Mails with links to malware from known/valid senders ∗∗∗
---------------------------------------------
https://www.circl.lu/pub/tr-64
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 09-11-2021 18:00 − Mittwoch 10-11-2021 18:00
Handler: Stephan Richter
Co-Handler: Wolfgang Menezes
=====================
= News =
=====================
∗∗∗ Researcher Details Vulnerabilities Found in AWS API Gateway ∗∗∗
---------------------------------------------
AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them.
---------------------------------------------
https://www.darkreading.com/vulnerabilities-threats/researcher-details-vuln…
∗∗∗ Unboxing BusyBox – 14 new vulnerabilities uncovered by Claroty and JFrog ∗∗∗
---------------------------------------------
Using static and dynamic techniques, Claroty’s Team82 and JFrog discovered 14 vulnerabilities affecting the latest version of BusyBox. All vulnerabilities were privately disclosed and fixed by BusyBox in version 1.34.0.
---------------------------------------------
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by…
∗∗∗ Patchday: Microsoft warnt vor Attacken auf Excel und Exchange ∗∗∗
---------------------------------------------
Abermals haben es Angreifer Exchange Server abgesehen. Außerdem gibt es wichtige Sicherheitsupdates für Azure, Office, Windows & Co.
---------------------------------------------
https://heise.de/-6263036
∗∗∗ Patchday: SAP schließt kritische Sicherheitslücke ∗∗∗
---------------------------------------------
Am Patch-Tuesday hat auch SAP Aktualisierungen für seine Produkte veröffentlicht. Ein Fix behandelt eine kritische Lücke im ABAP Platform Kernel.
---------------------------------------------
https://heise.de/-6263099
∗∗∗ Cisco Talos finds 10 vulnerabilities in Azure Sphere’s Linux kernel, Security Monitor and Pluton ∗∗∗
---------------------------------------------
Today, we’re disclosing another 10 vulnerabilities in Azure Sphere — two of which are on the Linux side, seven that exist in Security Monitor and one in the Pluton security subsystem.
---------------------------------------------
https://blog.talosintelligence.com/2021/11/cisco-talos-finds-10-vulnerabili…
∗∗∗ Achtung: Momentan kursieren zahlreiche E-Mails mit Schadsoftware ∗∗∗
---------------------------------------------
Kriminelle versenden momentan gefälschte E-Mails im Namen von Electrolux, Weitzer Parkett Vertriebs GmbH und der TU Wien. Wer ein komisches E-Mail mit der Aufforderung einen Anhang zu öffnen erhält, sollte besonders vorsichtig sein. Im Anhang befindet sich Schadsoftware!
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-momentan-kursieren-zahlreich…
=====================
= Vulnerabilities =
=====================
∗∗∗ AMD Server Vulnerabilities – November 2021 ∗∗∗
---------------------------------------------
During security reviews in collaboration with Google, Microsoft, and Oracle, potential vulnerabilities in the AMD Platform Security Processor (PSP), AMD System Management Unit (SMU), AMD Secure Encrypted Virtualization (SEV) and other platform components were discovered and have been mitigated in AMD EPYC™ AGESA™ PI packages.
---------------------------------------------
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
Cloud Pak for Multicloud Management Infrastructure Management, Cloud Pak for Multicloud Management Managed Services, Rational Business Developer, InfoSphere Information Server
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Open Design Alliance (ODA) Security Advisories ∗∗∗
---------------------------------------------
ODA PRC SDK, Drawings SDK, ODA Viewer
---------------------------------------------
https://www.opendesign.com/security-advisories
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (openjdk-8 and samba), Fedora (community-mysql, firefox, and vim), openSUSE (binutils, kernel, and tinyxml), Red Hat (annobin, autotrace, babel, bind, binutils, bluez, compat-exiv2-026, container-tools:2.0, container-tools:3.0, container-tools:rhel8, cups, curl, dnf, dnsmasq, edk2, exiv2, file, file-roller, firefox, gcc, gcc-toolset-10-annobin, gcc-toolset-10-binutils, gcc-toolset-10-gcc, gcc-toolset-11-annobin, gcc-toolset-11-binutils,[...]
---------------------------------------------
https://lwn.net/Articles/875708/
∗∗∗ Adobe Releases Security Updates for Multiple Products ∗∗∗
---------------------------------------------
Adobe has released security updates to address vulnerabilities in multiple Adobe products. An attacker could exploit some of these vulnerabilities to take control of an affected system.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/11/09/adobe-releases-se…
∗∗∗ BSRT-2021-003 Vulnerabilities Impact BlackBerry Protect for Windows ∗∗∗
---------------------------------------------
https://support.blackberry.com/kb/articleDetail?language=en_US&articleNumbe…
∗∗∗ ZDI-21-1302: Ivanti Avalanche EnterpriseServer Service SQL Injection Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1302/
∗∗∗ ZDI-21-1301: Ivanti Avalanche EnterpriseServer Service Unrestricted File Upload Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1301/
∗∗∗ ZDI-21-1300: Ivanti Avalanche User Management Improper Authentication Privilege Escalation Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1300/
∗∗∗ ZDI-21-1299: Ivanti Avalanche Filestore Management Arbitrary File Upload Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1299/
∗∗∗ ZDI-21-1298: Ivanti Avalanche JNLP File Improper Access Control Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1298/
∗∗∗ Technical Advisory – Arbitrary Signature Forgery in Stark Bank ECDSA Libraries (CVE-2021-43572, CVE-2021-43570, CVE-2021-43569, CVE-2021-43568, CVE-2021-43571) ∗∗∗
---------------------------------------------
https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signa…
∗∗∗ INTEL-SA-00481 ∗∗∗
---------------------------------------------
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-0…
∗∗∗ INTEL-SA-00560 ∗∗∗
---------------------------------------------
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-0…
∗∗∗ INTEL-SA-00568 ∗∗∗
---------------------------------------------
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-0…
∗∗∗ INTEL-SA-00569 ∗∗∗
---------------------------------------------
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-0…
∗∗∗ INTEL-SA-00567 ∗∗∗
---------------------------------------------
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-0…
∗∗∗ VMSA-2021-0025 ∗∗∗
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0025.html
∗∗∗ Samba 4.15.2, 4.14.10, 4.13.14 security releases available ∗∗∗
---------------------------------------------
https://lwn.net/Articles/875565/
∗∗∗ Philips MRI 1.5T and 3T ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsma-21-313-01
∗∗∗ OSIsoft PI Vision ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-313-05
∗∗∗ OSIsoft PI Web API ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-313-06
∗∗∗ NVIDIA GPU Display Driver Advisory - October 2021 ∗∗∗
---------------------------------------------
http://support.lenovo.com/product_security/PS500449-NVIDIA-GPU-DISPLAY-DRIV…
∗∗∗ NetApp Clustered Data ONTAP Vulnerabilities ∗∗∗
---------------------------------------------
http://support.lenovo.com/product_security/PS500448-NETAPP-CLUSTERED-DATA-O…
∗∗∗ Realtek Driver Privilege Escalation Vulnerability ∗∗∗
---------------------------------------------
http://support.lenovo.com/product_security/PS500447-REALTEK-DRIVER-PRIVILEG…
∗∗∗ Multi-vendor BIOS Security Vulnerabilities (November 2021) ∗∗∗
---------------------------------------------
http://support.lenovo.com/product_security/PS500446-MULTI-VENDOR-BIOS-SECUR…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 08-11-2021 18:00 − Dienstag 09-11-2021 18:00
Handler: Dimitri Robl
Co-Handler: Wolfgang Menezes
=====================
= News =
=====================
∗∗∗ Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus ∗∗∗
---------------------------------------------
Microsoft has detected exploits being used to compromise systems running the ZOHO ManageEngine ADSelfService Plus software versions vulnerable to CVE-2021-40539 in a targeted campaign. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to DEV-0322.
---------------------------------------------
https://www.microsoft.com/security/blog/2021/11/08/threat-actor-dev-0322-ex…
∗∗∗ Abcbot, an evolving botnet ∗∗∗
---------------------------------------------
Business on the cloud and security on the cloud is one of the industry trends in recent years. 360Netlab is also continuing to focus on security incidents and trends on the cloud from its own expertise in the technology field. The following is a recent security incident we observed,
---------------------------------------------
https://blog.netlab.360.com/abcbot_an_evolving_botnet_en/
∗∗∗ (Ab)Using Security Tools & Controls for the Bad, (Mon, Nov 8th) ∗∗∗
---------------------------------------------
As security practitioners, we give daily advice to our customers to increase the security level of their infrastructures. Install this tool, enable this feature, disable this function, etc. When enabled, these techniques can also be (ab)used by attackers to perform nasty actions.
---------------------------------------------
https://isc.sans.edu/diary/rss/28014
∗∗∗ WooCommerce Skimmer Spoofs Checkout Page ∗∗∗
---------------------------------------------
Recently a client of ours was reporting a bogus checkout page appearing on their website. When trying to access their “my-account” page an unfamiliar prompt appeared in their browser soliciting credit card billing information: This form was foreign to our client and was clearly placed during a website compromise. Interestingly, the website itself doesn’t even accept payments at all. If this was an attempt at a targeted credit card theft infection (as quite a few of them are) [...]
---------------------------------------------
https://blog.sucuri.net/2021/11/woocommerce-skimmer-spoofs-checkout-page.ht…
∗∗∗ ICS Patch Tuesday: Siemens and Schneider Electric Address Over 50 Security Flaws ∗∗∗
---------------------------------------------
Industrial giants Siemens and Schneider Electric have released a total of 20 Patch Tuesday advisories to address more than 50 vulnerabilities affecting their products.
---------------------------------------------
https://www.securityweek.com/ics-patch-tuesday-siemens-and-schneider-electr…
∗∗∗ „media-markt-outlet.de“ ist Fake ∗∗∗
---------------------------------------------
Die Webseite media-markt-outlet.de gibt vor, ein Outlet-Store von Media Markt zu sein. Da es sich bei diesem Fake-Shop angeblich um ein Outlet handelt, erscheinen die günstigen Preise auf dem ersten Blick nicht untypisch. Doch Vorsicht: media-markt-outlet.de ist Fake - Sie erhalten trotz Bezahlung keine Ware.
---------------------------------------------
https://www.watchlist-internet.at/news/media-markt-outletde-ist-fake/
∗∗∗ The Invisible JavaScript Backdoor ∗∗∗
---------------------------------------------
A few months ago we saw a post on the r/programminghorror subreddit: A developer describes the struggle of identifying a syntax error resulting from an invisible Unicode character hidden in JavaScript source code. This post inspired an idea: What if a backdoor literally cannot be seen and thus evades detection even from thorough code reviews?
---------------------------------------------
https://certitude.consulting/blog/en/invisible-backdoor/
=====================
= Vulnerabilities =
=====================
∗∗∗ Jetzt patchen! Attacken auf CMS Sitecore Experience Platform beobachtet ∗∗∗
---------------------------------------------
Angreifer haben es derzeit auf eine Schadcode-Lücke im Content Management System Sitecore XP abgesehen. Sicherheitspatches gibt es bereits seit Oktober 2021.
---------------------------------------------
https://heise.de/-6262157
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (firefox, grafana, jenkins, opera, and thunderbird), Debian (botan1.10 and ckeditor), openSUSE (chromium, kernel, qemu, and rubygem-activerecord-5_1), SUSE (qemu and rubygem-activerecord-5_1), and Ubuntu (docker.io, kernel, linux, linux-aws, linux-aws-5.11, linux-azure, linux-azure-5.11, linux-gcp, linux-gcp-5.11, linux-hwe-5.11, linux-kvm, linux-oem-5.13, linux-oracle, linux-oracle-5.11, linux, linux-aws, linux-aws-5.4, linux-azure, [...]
---------------------------------------------
https://lwn.net/Articles/875531/
∗∗∗ Adobe Patches Critical RoboHelp Server Security Flaw ∗∗∗
---------------------------------------------
Software maker Adobe on Tuesday released patches to cover at least four documented security defects that expose users to malicious hacker attacks. The most serious of the flaw was addressed in RoboHelp Server and is rated “critical” because it exposes corporate environments to arbitrary code execution attacks.
---------------------------------------------
https://www.securityweek.com/adobe-patches-critical-robohelp-server-securit…
∗∗∗ IPAS: Security Advisories for November 2021 ∗∗∗
---------------------------------------------
Hi everyone, Today we released 25 security advisories addressing 72 vulnerabilities. Through our internal security research and the investment we make in our bug bounty programs, 96% of the issues being addressed today are the result of our proactive product security assurance efforts. Given that almost half of today’s advisories address drivers in various components, [...]
---------------------------------------------
https://blogs.intel.com/technology/2021/11/intel-security-advisories-for-no…
∗∗∗ NUCLEUS:13 vulnerabilities impact Siemens medical & industrial equipment ∗∗∗
---------------------------------------------
Security researchers have disclosed today a set of 13 vulnerabilities that impact a crucial Siemens software library that is included with medical devices, automotive, and industrial systems.
---------------------------------------------
https://therecord.media/nucleus13-vulnerabilities-impact-siemens-medical-in…
∗∗∗ Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP Edition appliance Security Update ∗∗∗
---------------------------------------------
https://support.citrix.com/article/CTX330728
∗∗∗ Security Bulletin: IBM Tivoli Netcool Impact is affected by an Apache Ant vulnerability (CVE-2021-36374) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-tivoli-netcool-impact…
∗∗∗ Security Bulletin: A vulnerability in IBM Java SDK affects IBM Tivoli Netcool Impact (CVE-2021-2388, CVE-2021-2369, CVE-2021-2432) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-ibm-ja…
∗∗∗ Security Bulletin: IBM Tivoli Netcool Impact is affected by an Apache Ant vulnerability (CVE-2021-36373) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-tivoli-netcool-impact…
∗∗∗ Security Bulletin: IBM App Connect Enterprise Certified Container may be affected by CVE-2021-23509 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-app-connect-enterpris…
∗∗∗ Security Bulletin: IBM Event Streams affected by multiple vulnerabilities in Golang ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-event-streams-affecte…
∗∗∗ Security Bulletin: A vulnerability in Apache Commons Compress Library affects IBM LKS ART and Agent ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-apache…
∗∗∗ Security Bulletin: A vulnerability in IBM Java SDK (July 2021) affects IBM InfoSphere Information Server (CVE-2021-2432) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-ibm-ja…
∗∗∗ Security Bulletin: IBM QRadar Network Security is affected by multiple vulnerabilities (CVE-2020-25648, CVE-2021-31535, CVE-2021-20305, CVE-2020-25692) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-network-securi…
∗∗∗ Security Bulletin: IBM QRadar Network Security is affected by multiple vulnerabilities (CVE-2020-4152, CVE-2020-4160, CVE-2020-4153) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-network-securi…
∗∗∗ Security Bulletin: IBM Safer Payments v5.7 to v6.3 releases are affected by an OpenSSL Security Advisory (CVE-2021-3711) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-safer-payments-v5-7-t…
∗∗∗ Security Bulletin: Multiple vulnerabilities affect IBM Cloud Object Storage Systems (Nov. 2021 V1) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 05-11-2021 18:00 − Montag 08-11-2021 18:00
Handler: Dimitri Robl
Co-Handler: Wolfgang Menezes
=====================
= News =
=====================
∗∗∗ Unbekannte infiltrieren Paketmanager npm und verseuchen Tools mit Schadcode ∗∗∗
---------------------------------------------
Die Betreiber des Paketmanagers npm warnen davor, dass Unbefugte die Pakete coa und rc trojanisiert haben.
---------------------------------------------
https://heise.de/-6260153
∗∗∗ Targeted Attack Campaign Against ManageEngine ADSelfService Plus Delivers Godzilla Webshells, NGLite Trojan and KdcSponge Stealer ∗∗∗
---------------------------------------------
A malicious campaign against ManageEngine ADSelfService Plus used Godzilla webshells, the NGLite backdoor and KdcSponge, a credential stealer.
---------------------------------------------
https://unit42.paloaltonetworks.com/manageengine-godzilla-nglite-kdcsponge/
∗∗∗ Pwn2Own: Printer plays AC/DC, Samsung Galaxy S21 hacked twice ∗∗∗
---------------------------------------------
Trend Micros ZDI has awarded $1,081,250 for 61 zero-days exploited at Pwn2Own Austin 2021, with competitors successfully pwning the Samsung Galaxy S21 again and hacking an HP LaserJet printer to play AC/DCs Thunderstruck on the contests third day.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/pwn2own-printer-plays-ac-dc-…
∗∗∗ Sitecore XP RCE flaw patched last month now actively exploited ∗∗∗
---------------------------------------------
The Australian Cyber Security Center (ACSC) is alerting web admins of the active exploitation of CVE-2021-42237, a remote code execution flaw in the Sitecore Experience Platform (Sitecore XP).
---------------------------------------------
https://www.bleepingcomputer.com/news/security/sitecore-xp-rce-flaw-patched…
∗∗∗ Video: Decrypting Cobalt Strike Traffic With Keys Extracted From Process Memory, (Sun, Nov 7th) ∗∗∗
---------------------------------------------
I made a video showing the steps to take to decrypt Cobalt Strike traffic that I covered in my diary entry "Decrypting Cobalt Strike Traffic With Keys Extracted From Process Memory".
---------------------------------------------
https://isc.sans.edu/diary/rss/28008
∗∗∗ ICS Threat Hunting: “Theyre Shootin’ at the Lights!” - PART 2 ∗∗∗
---------------------------------------------
[...] In this PART 2 of the blog series we will: Identify several critical and targeted ICS assets to protect, Identify related data sources for those assets, Focus on aspects of threat intel to use for a hunt, Build a threat hunt package template to prepare for executing the actual hunt
---------------------------------------------
https://www.sans.org/blog/ics-threat-hunting-they-are-shootin-at-the-lights…
∗∗∗ TA505 exploits SolarWinds Serv-U vulnerability (CVE-2021-35211) for initial access ∗∗∗
---------------------------------------------
NCC Group’s global Cyber Incident Response Team have observed an increase in Clop ransomware victims in the past weeks. The surge can be traced back to a vulnerability in SolarWinds Serv-U that is being abused by the TA505 threat actor. TA505 is a known cybercrime threat actor, who is known for extortion attacks using the [...]
---------------------------------------------
https://blog.fox-it.com/2021/11/08/ta505-exploits-solarwinds-serv-u-vulnera…
∗∗∗ DDoS Attack Trends for Q3 2021 ∗∗∗
---------------------------------------------
The third quarter of 2021 was a busy quarter for DDoS attackers. Cloudflare observed and mitigated record-setting HTTP DDoS attacks, terabit-strong network-layer attacks, one of the largest botnets ever deployed (Meris), and more recently, ransom DDoS attacks on voice over IP (VoIP) service providers and their network infrastructure around the world.
---------------------------------------------
https://blog.cloudflare.com/ddos-attack-trends-for-2021-q3/
∗∗∗ ASEC Weekly Malware Statistics (October 25th, 2021 – October 31st, 2021) ∗∗∗
---------------------------------------------
The ASEC analysis team is using the ASEC automatic analysis system RAPIT to categorize and respond to known malware. This post will list weekly statistics collected from October 25th, 2021 (Monday) to October 31st, 2021 (Sunday). For the main category, info-stealer ranked top with 48.3%, followed by RAT (Remote Administration Tool) malware with 24.5%, Downloader with 18.3%, Backdoor malware with 4.6%, Ransomware with 4.1%, and Banking malware with 0.2%.
---------------------------------------------
https://asec.ahnlab.com/en/28464/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (containerd, redis, and sqlalchemy), Fedora (kernel, radeontop, rpki-client, and webkit2gtk3), openSUSE (java-1_8_0-openj9, libvirt, mailman, transfig, and webkit2gtk3), Oracle (thunderbird), SUSE (libvirt), and Ubuntu (icu).
---------------------------------------------
https://lwn.net/Articles/875420/
∗∗∗ Security Bulletin:Multiple Security Vulnerabilities fixed in Openssl as shipped with IBM Security Verify products (CVE-2021-3711, CVE-2021-3712) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletinmultiple-security-vulnerab…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a Cross-Site Scripting in Guardium STAP vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: XSS vulerability in Dojo affects IBM Tivoli Business Service Manager (CVE-2018-15494) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-xss-vulerability-in-dojo-…
∗∗∗ Security Bulletin: IBM MQ Appliance vulnerable to a denial of service attack (CVE-2021-29843) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-appliance-vulnerab…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by an Oracle MySQL vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: Multiple Apache Commons FileUpload vulnerabilities affects IBM Tivoli Business Service Manager (CVE-2014-0034, CVE-2014-0050, CVE-2013-2186, CVE-2016-3092) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-apache-commons-f…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 04-11-2021 18:00 − Freitag 05-11-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Phishing emails deliver spooky zombie-themed MirCop ransomware ∗∗∗
---------------------------------------------
A new phishing campaign pretending to be supply lists infects users with the MirCop ransomware that encrypts a target system in under fifteen minutes.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/phishing-emails-deliver-spoo…
∗∗∗ Bluetooth-Lücken Braktooth: Das Patchen geht nur schleppend voran ∗∗∗
---------------------------------------------
Für Braktooth-Attacken anfällige Bluetooth-Geräte könnten zeitnah in den Fokus von Angreifern rücken. Patches sind noch längst nicht flächendeckend verfügbar.
---------------------------------------------
https://heise.de/-6254474
∗∗∗ SSL certificate research highlights pitfalls for company data, competition ∗∗∗
---------------------------------------------
Analysis reveals hidden risks for organizations that do not monitor their certificate usage.
---------------------------------------------
https://www.zdnet.com/article/ssl-certificate-research-highlights-pitfalls-…
∗∗∗ The IoT is getting a lot bigger, but security is still getting left behind ∗∗∗
---------------------------------------------
Four in five Internet of Things device vendors dont provide any information on how to disclose security vulnerabilities. That means problems just dont get fixed.
---------------------------------------------
https://www.zdnet.com/article/the-iot-is-getting-a-lot-bigger-but-security-…
∗∗∗ Malware found in coa and rc, two npm packages with 23M weekly downloads ∗∗∗
---------------------------------------------
The security team of the npm JavaScript package manager has warned users that two of its most popular packages had been hijacked by a threat actor who released new versions laced with what appeared to be password-stealing malware.
---------------------------------------------
https://therecord.media/malware-found-in-coa-and-rc-two-npm-packages-with-2…
∗∗∗ Datenbank mit Millionen Daten von VPN-Nutzern ungeschützt im Internet (Okt. 2021) ∗∗∗
---------------------------------------------
Wer VPN-Anbieter nutzt, muss sich auf deren Sicherheit und Integrität verlassen können. Sicherheitsforscher Bob Diachenko von comparitech ist kürzlich im Internet auf eine ungeschützte Datenbank (kein Passwort) gestoßen, die mehr als 300 Millionen Datensätze mit den persönlichen Daten [...]
---------------------------------------------
https://www.borncity.com/blog/2021/11/05/datenbank-mit-millionen-daten-von-…
∗∗∗ Phishing PDF Files with CAPTCHA Screen Being Mass-distributed ∗∗∗
---------------------------------------------
Phishing PDF files that have CAPTCHA screens are rapidly being mass-distributed this year. A CAPTCHA screen appears upon running the PDF file, but it is not an invalid CAPTCHA. It is simply an image with a link that redirects to a malicious URL. Related types that have been collected by AhnLab’s ASD infrastructure since July up till now amount to 1,500,000.
---------------------------------------------
https://asec.ahnlab.com/en/28431/
=====================
= Vulnerabilities =
=====================
∗∗∗ ZDI-21-1278: Hewlett Packard Enterprise iLO Amplifier Pack backup Directory Traversal Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise iLO Amplifier Pack. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1278/
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (python3.5, redis, and udisks2), Fedora (rust), openSUSE (binutils, java-1_8_0-openj9, and qemu), Oracle (firefox and httpd), Red Hat (thunderbird), Scientific Linux (thunderbird), and SUSE (binutils, qemu, and systemd).
---------------------------------------------
https://lwn.net/Articles/875212/
∗∗∗ SYSS-2021-048/SYSS-2021-049: PHP Event Calendar – SQL Injection und Persistent Cross-Site Scripting ∗∗∗
---------------------------------------------
Im "PHP Event Calendar" wurden zwei Sicherheitslücken gefunden. So kann die Datenbank ausgelesen oder die Sitzung anderer Nutzer kompromittiert werden.
---------------------------------------------
https://www.syss.de/pentest-blog/syss-2021-048/syss-2021-049-php-event-cale…
∗∗∗ D-LINK Router: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1157
∗∗∗ Security Bulletin: IBM Security Guardium is affected by an OpenLDAP vulnerability (CVE-2020-25692) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: Information disclosure vulnerability affect IBM Business Automation Workflow and IBM Business Process Manager (BPM) – CVE-2021-29753 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-information-disclosure-vu…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by multiple vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Guardium ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by the following vulnerabilities ( CVE-2021-29773, CVE-2021-2161) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a jackson-databind vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a kernel vulnerability (CVE-2020-25705, CVE-2020-28374) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Event Streams affected by multiple vulnerabilities in Golang ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-event-streams-affecte…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a Reliance on Untrusted Inputs in Security Descision ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a Weak Password Policy vulnerability (CVE-2021-20418) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by multiple vulnerabilites ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a Oracle MySQL vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily