=====================
= End-of-Day report =
=====================
Timeframe: Freitag 10-09-2021 18:00 − Montag 13-09-2021 18:00
Handler: Dimitri Robl
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Warten auf Windows-Patches: Selbstbau-Anleitung für MSHTML-Exploit in Umlauf ∗∗∗
---------------------------------------------
Sicherheitsforscher warnen, wie Angreifer Microsofts Schutzmaßnahmen vor Windows-Attacken umgehen könnten. Außerdem ist ein Exploit-Baukasten verfügbar.
---------------------------------------------
https://heise.de/-6190319
∗∗∗ SOVA, Worryingly Sophisticated Android Trojan, Takes Flight ∗∗∗
---------------------------------------------
The malware appeared in August with an ambitious roadmap (think ransomware, DDoS) that could make it the most feature-rich Android malware on the market.
---------------------------------------------
https://threatpost.com/sova-sophisticated-android-trojan/169366/
∗∗∗ Shipping to Elasticsearch Microsoft DNS Logs, (Sat, Sep 11th) ∗∗∗
---------------------------------------------
This parser takes the logs from a Windows 2012R2 and/or 2019 server (C:\DNSLogs\windns.log) and parses them into usable metatada which can be monitored and queried via an ELK dashboard. The logs have been mapped using DNS ECS field meta here [1].
---------------------------------------------
https://isc.sans.edu/diary/rss/27828
∗∗∗ New SpookJS Attack Bypasses Google Chrome’s Site Isolation Protection ∗∗∗
---------------------------------------------
A newly discovered side-channel attack demonstrated on modern processors can be weaponized to successfully overcome Site Isolation protections weaved into Google Chrome and Chromium browsers and leak sensitive data in a Spectre-style speculative execution attack. Dubbed "Spook.js" by academics from the University of Michigan, University of Adelaide, Georgia Institute of Technology, and Tel Aviv [...]
---------------------------------------------
https://thehackernews.com/2021/09/new-spookjs-attack-bypasses-google.html
∗∗∗ REvil: Ransomware-Gang in neuer Aufstellung wieder aktiv ∗∗∗
---------------------------------------------
Neue Forenbeiträge und "Happy Blog"-Inhalte belegen, dass die Erpresserbande um REvil zurück ist - und dass ihre Auszeit wohl nicht freiwillig war.
---------------------------------------------
https://heise.de/-6190537
∗∗∗ BazarLoader to Conti Ransomware in 32 Hours ∗∗∗
---------------------------------------------
Conti is a top player in the ransomware ecosystem, being listed as 2nd overall in the Q2 2021 Coveware ransomware report. The groups deploying this RaaS have only grown [...]
---------------------------------------------
https://thedfirreport.com/2021/09/13/bazarloader-to-conti-ransomware-in-32-…
∗∗∗ Incident response analyst report 2020 ∗∗∗
---------------------------------------------
We deliver a range of services: incident response, digital forensics and malware analysis. Data in the report comes from our daily practices with organizations seeking assistance with full-blown incident response or complementary expert activities for their internal incident response teams.
---------------------------------------------
https://securelist.com/incident-response-analyst-report-2020/104080/
=====================
= Vulnerabilities =
=====================
∗∗∗ Vulnerability Spotlight: Code execution vulnerability in Nitro Pro PDF ∗∗∗
---------------------------------------------
Cisco Talos recently discovered a vulnerability in the Nitro Pro PDF reader that could allow an attacker to execute code in the context of the application.
---------------------------------------------
https://blog.talosintelligence.com/2021/09/nitro-pro-code-execution.html
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (qemu and thunderbird), Fedora (chromium, firefox, and mosquitto), openSUSE (apache2-mod_auth_openidc, gifsicle, openssl-1_1, php7-pear, and wireshark), Oracle (oswatcher), Red Hat (cyrus-imapd, firefox, and thunderbird), SUSE (apache2-mod_auth_openidc, compat-openssl098, php7-pear, and wireshark), and Ubuntu (git and linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-dell300x, linux-hwe, linux-kvm, linux-oracle, linux-snapdragon).
---------------------------------------------
https://lwn.net/Articles/869103/
∗∗∗ Update - Kritische Sicherheitslücke in der Microsoft MSHTML Komponente - Workarounds verfügbar, Exploits veröffentlicht ∗∗∗
---------------------------------------------
Update: 13. September 2021 / Beschreibung Microsoft hat außerhalb des üblichen Patch-Zyklus eine Warnung über eine Sicherheitslücke in der MSHTML Komponente veröffentlicht. Diese kann von Angreifer:innen durch entsprechend präparierte Microsoft Office-Dokumente ausgenutzt werden - laut Microsoft sind solche Dokumente bereits im Umlauf.
---------------------------------------------
https://cert.at/de/warnungen/2021/9/kritische-sicherheitslucke-in-der-micro…
∗∗∗ Security Bulletin: IBM Maximo Asset Management is vulnerable to CSV Injection (CVE-2021-20509) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-maximo-asset-manageme…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affects WebSphere Application Server July 2021 CPU that is bundled with IBM WebSphere Application Server Patterns ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in ICU libraries used in IBM DataPower Gateway ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Vulnerabilities in the AIX kernel (CVE-2021-29727, CVE-2021-29801, CVE-2021-29862) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-the-ai…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime affect IBM Security SOAR (CVE-2021-2341, CVE-2021-2369) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities may affect IBM® SDK, Java™ Technology Edition ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple security vulnerabilities affect Liberty for Java for IBM Cloud ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnera…
∗∗∗ Security Bulletin: Input Validation Vulnerability in Apache Commons Codec Affects IBM Sterling Connect:Direct for UNIX ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-input-validation-vulnerab…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 09-09-2021 18:00 − Freitag 10-09-2021 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ MSHTML-Schwachstelle CVE-2021-40444 kritischer als bekannt ∗∗∗
---------------------------------------------
Vor einigen Tagen hat Microsoft einen Sicherheitshinweis zur Schwachstelle CVE-2021-40444 in der in Windows enthaltenen MSHTML-Komponente offen gelegt. Es hieß, es gebe den Versuch, die Schwachstelle in freier Wildbahn über präparierte Office-Dokumente auszunutzen. Aber Office-Nutzer seien eigentlich durch die geschützte Ansicht vor dieser Bedrohung geschützt. Nun wird bekannt, dass dieser Schutz löchrig ist und oft nicht wirkt.
---------------------------------------------
https://www.borncity.com/blog/2021/09/10/mshtml-schwachstelle-cve-2021-4044…
∗∗∗ A Look at iMessage in iOS 14 ∗∗∗
---------------------------------------------
[...] Given that it is also now almost exactly one year ago since we published the Remote iPhone Exploitation blog post series, in which we described how an iMessage 0-click exploit can work in practice and gave a number of suggestions on how similar attacks could be prevented in the future, now seemed like a great time to dig into the security improvements in iOS 14 in more detail and explore how Apple has hardened their platform against 0-click attacks.
---------------------------------------------
https://googleprojectzero.blogspot.com/2021/01/a-look-at-imessage-in-ios-14…
∗∗∗ August 2021’s Most Wanted Malware: Formbook Climbs into First Place ∗∗∗
---------------------------------------------
Check Point Research reports that the infostealer, Formbook, is the most prevalent malware while the banking trojan, Qbot, has dropped from the list all together. Our latest Global Threat Index for August 2021 has revealed that Formbook is now the most prevalent malware, taking over Trickbot, which has fallen into second following a three-month long [...]
---------------------------------------------
https://blog.checkpoint.com/2021/09/10/august-2021s-most-wanted-malware-for…
∗∗∗ Meet Meris, the new 250,000-strong DDoS botnet terrorizing the internet ∗∗∗
---------------------------------------------
A new botnet consisting of an estimated 250,000 malware-infected devices has been behind some of the biggest DDoS attacks over the summer, breaking the record for the largest volumetric DDoS attack twice, once in June and again this month.
---------------------------------------------
https://therecord.media/meet-meris-the-new-250000-strong-ddos-botnet-terror…
=====================
= Vulnerabilities =
=====================
∗∗∗ Sicherheitspatch: WordPress-Entwickler raten zu zügigem Update ∗∗∗
---------------------------------------------
Das Content Management System WordPress ist über mehrere Sicherheitslücken angreifbar.
---------------------------------------------
https://heise.de/-6188735
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (firefox-esr, ghostscript, ntfs-3g, and postorius), Fedora (java-1.8.0-openjdk-aarch32, libtpms, and salt), openSUSE (libaom, libtpms, and openssl-1_0_0), Red Hat (openstack-neutron), SUSE (grilo, java-1_7_0-openjdk, libaom, libtpms, mariadb, openssl-1_0_0, openssl-1_1, and php74-pear), and Ubuntu (firefox and ghostscript).
---------------------------------------------
https://lwn.net/Articles/868863/
∗∗∗ AVEVA PCS Portal ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Uncontrolled Search Path Element vulnerability in AVEVA PCS Portal sofware.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-252-01
∗∗∗ Delta Electronics DOPSoft 2 ∗∗∗
---------------------------------------------
This advisory contains mitigations for Stack-based Buffer Overflow, Out-of-Bounds Write, and Heap-based Buffer Overflow vulnerabilities in Delta Electronics DOPSoft 2 HMI editing software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-252-02
∗∗∗ Mitsubishi Electric Europe B.V. smartRTU and INEA ME-RTU ∗∗∗
---------------------------------------------
This advisory is a follow-up to a CISA product update titled ICS-ALERT-19-225-01 Mitsubishi Electric Europe B.V. smartRTU and INEA ME-RTU (Update A) published September 10, 2019, on the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for OS Command Injection, Improper Access Control, Cross-site Scripting, Use of Hard-coded Credentials, Unprotected Storage of Credentials, and Incorrect Default Permissions vulnerabilities in select Mitsubishi Electric firmware.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-252-03
∗∗∗ Security Bulletin: OpenSSL Vulnerability Affects IBM Sterling Connect:Express for UNIX (CVE-2021-3712) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-openssl-vulnerability-aff…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Rational Directory Server (Tivoli) & Rational Directory Administrator ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: OpenSSL Vulnerability Affects IBM Sterling Connect:Express for UNIX (CVE-2021-3711) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-openssl-vulnerability-aff…
∗∗∗ Stack Buffer Overflow Vulnerabilities in QTS, QuTS hero, and QuTScloud ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-33
∗∗∗ Stack Buffer Overflow Vulnerability in QUSBCam2 ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-34
∗∗∗ Stack-Based Buffer Overflow Vulnerabilities in NVR Storage Expansion ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-36
∗∗∗ Insufficiently Protected Credentials in QSW-M2116P-2T2S and QuNetSwitch ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-37
∗∗∗ Insufficient HTTP Security Headers in QTS, QuTS hero, and QuTScloud ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-03
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 08-09-2021 18:00 − Donnerstag 09-09-2021 18:00
Handler: Dimitri Robl
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Ransomware: Erpressungs-Website der "REvil"-Gang plötzlich wieder online ∗∗∗
---------------------------------------------
Die Gang, deren Kaseya-Lieferkettenangriff Schlagzeilen machte, war Mitte Juli von der Bildfläche verschwunden - nun ist ihre Tor-Onion-Leak-Site wieder aktiv.
---------------------------------------------
https://heise.de/-6187682
∗∗∗ Betrügerische Streaming-Plattformen verschicken ungerechtfertigte Zahlungsaufforderungen! ∗∗∗
---------------------------------------------
Zahlreiche InternetnutzerInnen stolpern bei der Suche nach Hollywood-Blockbustern auf Webseiten wie kinox.su, justhdfilme.com oder kinox-deutsch.com. Wer auf einer solchen Seite versucht einen Film zu schauen, wird auf weitere betrügerische Websites wie luguplay.de, playnate.de oder rubuplay.de weitergeleitet. Nach einer angeblich kostenlosen Anmeldung auf diesen Seiten, können Sie sich keinen Film ansehen - stattdessen erhalten Sie Rechnungen und Mahnungen. Zahlen Sie auf keinen Fall!
---------------------------------------------
https://www.watchlist-internet.at/news/betruegerische-streaming-plattformen…
∗∗∗ Fortinet warns customers after hackers leak passwords for 87,000 VPNs ∗∗∗
---------------------------------------------
Networking equipment vendor Fortinet has notified customers today that a cybercriminal gang has assembled a collection of access credentials for more than 87,000 FortiGate SSL-VPN devices. "This incident is related to an old vulnerability resolved in May 2019," the company said in a blog post following an inquiry from The Record sent on Tuesday, when a small portion of this larger list was published on a private cybercrime forum hosted on the dark web, and later on the website of a ransomware gang, [...]
---------------------------------------------
https://therecord.media/fortinet-warns-customers-after-hackers-leak-passwor…
∗∗∗ Microsoft fixes bug letting hackers take over Azure containers ∗∗∗
---------------------------------------------
Microsoft has fixed a vulnerability in Azure Container Instances called Azurescape that allowed a malicious container to take over containers belonging to other customers on the platform.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/microsoft-fixes-bug-letting-…
∗∗∗ Updates to Our Datafeeds/API, (Thu, Sep 9th) ∗∗∗
---------------------------------------------
Most of the data we are collecting is freely available via our API. For quick documentation, see https://isc.sans.edu/api. One particular popular feed is our list of "Researcher IPs." These are IP addresses connected to commercial and academic projects that scan the internet. These scans can account for a large percentage of your unsolicited inbound activity. One use of this feed is to add "color to your logs" by enriching your log data from this feed.
---------------------------------------------
https://isc.sans.edu/diary/rss/27824
∗∗∗ Multistage WordPress Redirect Kit ∗∗∗
---------------------------------------------
Recently, one of our analysts @kpetku came across a series of semi-randomised malware injections in multiple WordPress environments. Typical of spam redirect infections, the malware redirects visitors by calling malicious files hosted on third party infected websites. Interestingly, the infection stores itself as encoded content in the database and is called through random functions littered throughout plugin files using a very common wordpress function “get_option”.
---------------------------------------------
https://blog.sucuri.net/2021/09/multistage-wordpress-redirect-kit.html
∗∗∗ Get Ready for PYSA Ransomware Attacks Against Linux Systems ∗∗∗
---------------------------------------------
Linux is increasingly targeted by ransomware. Researchers have now detected indications that the PYSA ransomware, often also known as Mespinoza, is also being readied for Linux targets. read more
---------------------------------------------
https://www.securityweek.com/get-ready-pysa-ransomware-attacks-against-linu…
∗∗∗ Analysis of a Parallels Desktop Stack Clash Vulnerability and Variant Hunting using Binary Ninja ∗∗∗
---------------------------------------------
Parallels Desktop uses a paravirtual PCI device called the “Parallels ToolGate” for communication between guest and host OS. This device is identified by Vendor ID 0x1AB8 and Device ID 0x4000 in a Parallels guest. The guest driver provided as part of Parallels Tools and the host virtual device communicate using a ToolGate messaging protocol. To provide a summary, the guest driver prepares a message and writes the physical address of the message to [...]
---------------------------------------------
https://www.thezdi.com/blog/2021/9/9/analysis-of-a-parallels-desktop-stack-…
∗∗∗ When the Cyberthreat Comes from the Inside ∗∗∗
---------------------------------------------
Would you like to earn millions of dollars? The LockBit 2.0 ransomware are now trying to recruit insiders – and there is no reason to believe that your company wouldn’t be targeted. The global competitive framework has changed significantly: hybrid warfare with methods like infiltration and espionage will be an imminent threat against the strategic environment for the foreseeable future.
---------------------------------------------
https://blog.truesec.com/2021/09/08/when-the-cyberthreat-comes-from-the-ins…
=====================
= Vulnerabilities =
=====================
∗∗∗ OpenVPN for Linux and FreeBSD: Schwachstelle ermöglicht Umgehung von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Linux und OpenVPN ausnutzen, um einen Denial of Service zu verursachen oder Sicherheitsvorkehrungen zu umgehen
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0944
∗∗∗ Cisco Security Advisories ∗∗∗
---------------------------------------------
Cisco hat zehn Security Advisories veröffentlicht. Keine der darin behobenen Schwachstellen wird als "critical" eingestuft, vier als "high".
---------------------------------------------
https://tools.cisco.com/security/center/Search.x?publicationTypeIDs=1&first…
∗∗∗ ABB: EIBPORT several CVEs ABBVREP0049_R9120 ∗∗∗
---------------------------------------------
ABB is aware of vulnerabilities in the product versions listed above. A firmware update is available that resolves these privately reported vulnerabilities in the product versions listed above. An attacker who successfully exploited these vulnerabilities could access sensitive information stored inside the device and can access the device with root privileges. CVE-IDs: CVE-2021-28909, CVE-2021-28910, CVE-2021-28911, CVE-2021-28912, CVE-2021-28913, CVE-2021-28914
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A7304&Lan…
∗∗∗ GitHub entdeckt sieben Sicherheitslücken in Node.js Packages ∗∗∗
---------------------------------------------
In einem Rahmen Bug-Bounty-Programm hat GitHub Schwachstellen aufgedeckt und bietet Handlungsanweisungen für betroffene Nutzer.
---------------------------------------------
https://heise.de/-6187785
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (lynx, matrix-synapse, and proftpd), openSUSE (ntfs-3g_ntfsprogs), Oracle (kernel), Red Hat (RHV-H), Scientific Linux (kernel), and Ubuntu (libapache2-mod-auth-mellon, linux, linux-aws, linux-aws-5.11, linux-azure, linux-azure-5.11, linux-gcp, linux-hwe-5.11, linux-kvm, linux-oracle, linux-oracle-5.11, linux-raspi, linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-gcp, linux-gcp-5.4, linux-gke, linux-gke-5.4, linux-gkeop, [...]
---------------------------------------------
https://lwn.net/Articles/868743/
∗∗∗ Intel processor vulnerabilities CVE-2021-0086 and CVE-2021-0089 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K41043270?utm_source=f5support&utm_mediu…
∗∗∗ SaltStack Salt: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0946
∗∗∗ WordPress: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0948
∗∗∗ Security Advisory - Improper Authorization Vulnerability in Some Huawei Products ∗∗∗
---------------------------------------------
https://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20210908…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by an Improper Restriction of Excessive Authentication Attempts vulnerability (CVE-2021-20427) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: Security vulnerabilitiy has been fixed in IBM Security Identity Manager (CVE-2021-29692) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilitiy-h…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by an OpenLDAP vulnerability (CVE-2020-25692) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: Security vulnerabilities have been identified in IBM® Java SDK that affect IBM Security Directory (CVE-2021-2161) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Guardium ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Vulnerability in NX-OS Firmware used by IBM c-type SAN directors and switches. ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-nx-os-fi…
∗∗∗ Security Bulletin: Security vulnerabilitiy has been identified in IBM® Java SDK that affect IBM Security Directory Suite (CVE-2021-2161) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilitiy-h…
∗∗∗ Security Bulletin: Container Environment Vulnerabilities Affect IBM Secure Proxy (CVE-2020-14298, CVE-2020-14300) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-container-environment-vul…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a kernel vulnerability (CVE-2020-25705, CVE-2020-28374) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a Reliance on Untrusted Inputs in Security Descision ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a Weak Password Policy vulnerability (CVE-2021-20418) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a Oracle MySQL vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 07-09-2021 18:00 − Mittwoch 08-09-2021 18:00
Handler: Dimitri Robl
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ vaxcontrolgroup.com: Nutzlose Studie und Scheckkarte für Nichtgeimpfte ∗∗∗
---------------------------------------------
Auf vaxcontrolgroup.com bewirbt die „Vaccine Control Group“ eine angebliche Studie, in der Nichtgeimpfte auf der ganzen Welt als Kontrollgruppe herangezogen werden sollen. Die Studie ist wissenschaftlich als unbrauchbar zu bewerten. Ein beworbener Ausweis im Scheckkartenformat, der eine Verpflichtung zur Nichtimpfung bestätigen soll, ist kostenpflichtig und nutzlos!
---------------------------------------------
https://www.watchlist-internet.at/news/vaxcontrolgroupcom-nutzlose-studie-u…
=====================
= Vulnerabilities =
=====================
∗∗∗ HAProxy Found Vulnerable to Critical HTTP Request Smuggling Attack ∗∗∗
---------------------------------------------
A critical security vulnerability has been disclosed in HAProxy, a widely used open-source load balancer and proxy server, that could be abused by an adversary to possibly smuggle HTTP requests, resulting in unauthorized access to sensitive data and execution of arbitrary commands, effectively opening the door to an array of attacks. Tracked as CVE-2021-40346..
---------------------------------------------
https://thehackernews.com/2021/09/haproxy-found-vulnerable-to-critical.html
∗∗∗ ZDI: Mehrere Lücken in Parallels Desktop ∗∗∗
---------------------------------------------
Toolgate Uncontrolled Memory Allocation Privilege Escalations:
* CVE-2021-34869 http://www.zerodayinitiative.com/advisories/ZDI-21-1057/
* CVE-2021-34868 http://www.zerodayinitiative.com/advisories/ZDI-21-1056/
* CVE-2021-34867 http://www.zerodayinitiative.com/advisories/ZDI-21-1055/
---------------------------------------------
∗∗∗ Fortinet Security Advisories September 2021 ∗∗∗
---------------------------------------------
Fortinet hat eine Reihe von Security Advisories zu diversen Problemen/Produkten veröffentlicht. Eine Übersicht findet sich auf der Fortinet PSIRT Webseite.
---------------------------------------------
https://www.fortiguard.com/psirt-monthly-advisory/september-2021-vulnerabil…
∗∗∗ September 7, 2021 TNS-2021-15 [R1] Nessus Agent 8.3.1 Fixes Multiple Vulnerabilities ∗∗∗
---------------------------------------------
Nessus Agent 8.3.0 and earlier were found to contain multiple local privilege escalation vulnerabilities which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host.
---------------------------------------------
http://www.tenable.com/security/tns-2021-15
∗∗∗ Android Security Bulletin - September 2021 ∗∗∗
---------------------------------------------
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. Security patch levels of 2021-09-05 or later address all of these issues.
---------------------------------------------
https://source.android.com/security/bulletin/2021-09-01
∗∗∗ Xen XSA-384 - Another race in XENMAPSPACE_grant_table handling ∗∗∗
---------------------------------------------
A malicious guest may be able to elevate its privileges to that of the host, cause host or guest Denial of Service (DoS), or cause information leaks.
All Xen versions from 4.0 onwards are affected. Xen versions 3.4 and older are not affected.
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-384.html
∗∗∗ Citrix Hypervisor Security Update ∗∗∗
---------------------------------------------
Several security issues have been discovered in Citrix Hypervisor that, collectively, may allow privileged code in a guest VM to compromise or crash the host.
Citrix has released hotfixes to address these issues. Citrix recommends that affected customers install these hotfixes as their patching schedule allows
---------------------------------------------
https://support.citrix.com/article/CTX325319
∗∗∗ Microsoft Releases Mitigations and Workarounds for CVE-2021-40444 ∗∗∗
---------------------------------------------
Microsoft has released mitigations and workarounds to address a remote code execution vulnerability (CVE-2021-40444) in Microsoft Windows. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system. This vulnerability has been detected in exploits in the wild.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/09/07/microsoft-release…
∗∗∗ Zoho Releases Security Update for ADSelfService Plus ∗∗∗
---------------------------------------------
Zoho has released a security update on a vulnerability (CVE-2021-40539) affecting ManageEngine ADSelfService Plus builds 6113 and below. CVE-2021-40539 has been detected in exploits in the wild. A remote attacker could exploit this vulnerability to take control of an affected system. ManageEngine ADSelfService Plus is a self-service password management and single sign-on solution for Active Directory and cloud apps.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/09/07/zoho-releases-sec…
∗∗∗ Security Bulletin: CVE-2021-2161 may affect IBM® SDK, Java™ Technology Edition for Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cve-2021-2161-may-affect-…
∗∗∗ Security Bulletin: Vulnerabilities in IBM Java Runtime affect IBM Integration Bus and IBM App Connect Enterpise v11, v12 (CVE-2020-2773) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-ibm-ja…
∗∗∗ Security Bulletin: A security vulnerability has been fixed in IBM Security Identity Manager Virtual Appliance (CVE-2018-15494) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-…
∗∗∗ Security Bulletin: Vulnerabilities in IBM Java Runtime affect IBM Integration Bus and IBM App Connect Enterpise v11, v12 (CVE-2020-14782) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-ibm-ja…
∗∗∗ Security Bulletin: CVE-2021-2161 may affect IBM® SDK, Java™ Technology Edition for Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cve-2021-2161-may-affect-…
∗∗∗ Security Bulletin: CVE-2021-2161 may affect IBM® SDK, Java™ Technology Edition for Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cve-2021-2161-may-affect-…
∗∗∗ Security Bulletin: Security vulnerabilities have been fixed in IBM Security Identity Manager (CVE-2021-29687, CVE-2021-29688) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-…
∗∗∗ Security Bulletin: IBM Security Identity Manager Password Synchronization Plug-in for Windows AD affected by multiple vulnerabilities (CVE-2021-20483, CVE-2021-20488) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-identity-man…
∗∗∗ Security Bulletin: Vulnerabilities in IBM Java Runtime affect IBM Integration Bus and IBM App Connect Enterpise v11, v12 (CVE-2020-14781) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-ibm-ja…
∗∗∗ Security Bulletin: CVE-2021-2161 may affect IBM® SDK, Java™ Technology Edition for Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cve-2021-2161-may-affect-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in OpenSSL may affect IBM Workload Scheduler ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: CVE-2020-1971 vulnerability in OpenSSL may affect IBM Workload Scheduler ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cve-2020-1971-vulnerabili…
∗∗∗ Security Bulletin: Security vulnerabilitiy has been fixed in IBM Security Identity Manager (93519) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilitiy-h…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: IBM Security Identity Manager deprecated Self Service UI contains Struts V1 (CVE-2016-1182) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-identity-man…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in OpenSSL may affect IBM Workload Scheduler ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple security vulnerabilities affect Liberty for Java for IBM Cloud ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnera…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 06-09-2021 18:00 − Dienstag 07-09-2021 18:00
Handler: Dimitri Robl
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Latest Atlassian Confluence Flaw Exploited to Breach Jenkins Project Server ∗∗∗
---------------------------------------------
The maintainers of Jenkins—a popular open-source automation server software—have disclosed a security breach after unidentified threat actors gained access to one of their servers by exploiting a recently disclosed vulnerability in Atlassian Confluence service to install a cryptocurrency miner. [...]
"At this time we have no reason to believe that any Jenkins releases, plugins, or source code have been affected," the company said in a statement published over the weekend.
---------------------------------------------
https://thehackernews.com/2021/09/latest-atlassian-confluence-flaw.html
∗∗∗ Firefox 92 und ESR-Versionen bringen wichtige Sicherheitsupdates mit ∗∗∗
---------------------------------------------
Die neuen Versionen des Browsers nebst Extended Support Releases umfassen nicht nur funktionale Neuerungen, sondern auch Sicherheitslücken-Fixes.
---------------------------------------------
https://heise.de/-6185311
∗∗∗ online-handelsregister.eu bucht für einen Handelsregisterauszug über 750 Euro ab ∗∗∗
---------------------------------------------
Für einen Handelsregisterauszug verrechnet das Unternehmen hinter online-handelsregister.eu zusätzlich 749,00 Euro – angeblich für die Freischaltung des Portals. Opfern ist meist nicht bewusst, wie dieser Betrag zu Stande kam. Eines ist klar: online-handelsregister.eu geht nicht seriös vor und hat diesen Betrag ohne Berechtigung abgezogen, denn beim Kaufabschluss wurde die sogenannte Button-Lösung nicht eingehalten.
---------------------------------------------
https://www.watchlist-internet.at/news/online-handelsregistereu-bucht-fuer-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Ghostscript Zero-Day Allows Full Server Compromises ∗∗∗
---------------------------------------------
Proof-of-concept exploit code was published online over the weekend for an unpatched Ghostscript vulnerability that puts all servers that rely on the component at risk of attacks. From a report: Published by Vietnamese security researcher Nguyen The Duc, the proof-of-concept code is available on GitHub and was confirmed to work by several of todays leading security researchers.
---------------------------------------------
https://it.slashdot.org/story/21/09/07/1532205/ghostscript-zero-day-allows-…
∗∗∗ Netgear schließt Sicherheitslücken in 20 Switches ∗∗∗
---------------------------------------------
Wenn die Voraussetzungen stimmen, könnten Angreifer die Kontrolle über Netgear-Switches erlangen. Sicherheitsupdates sind verfügbar.
---------------------------------------------
https://heise.de/-6184272
∗∗∗ Lücken in Gutenberg-Template-Plug-in gefährden eine Million WordPress-Websites ∗∗∗
---------------------------------------------
Angreifer könnten WordPress-Websites mit dem Plug-in Gutenberg Template Library & Redux Framework attackieren. Ein Sicherheitspatch steht zum Download.
---------------------------------------------
https://heise.de/-6184875
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by openSUSE (apache2, java-11-openjdk, libesmtp, nodejs10, ntfs-3g_ntfsprogs, openssl-1_1, xen, and xerces-c), Red Hat (kernel-rt and kpatch-patch), and SUSE (ntfs-3g_ntfsprogs and openssl-1_1).
---------------------------------------------
https://lwn.net/Articles/868569/
∗∗∗ Synology-SA-21:26 Photo Station ∗∗∗
---------------------------------------------
A vulnerability allows remote attackers to bypass security constraints via a susceptible version of Photo Station.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_21_26
∗∗∗ Security Bulletin: A security vulnerability has been identified in Oracle Oct 2020 CPU for Java 8 shipped with IBM® Intelligent Operations Center (CVE-2020-14782) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime affect Rational Functional Tester ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Vulnerability in Dojo affects WebSphere Application Server (CVE-2020-5258) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-dojo-aff…
∗∗∗ Security Bulletin: Multiple vulnerabilities have been identified in Oracle Jan 2021 CPU for Java 8 shipped with IBM® Intelligent Operations Center (CVE-2020-14803) (CVE-2020-27221) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: A security vulnerability has been identified in Oracle Oct 2020 CPU for Java 8 shipped with IBM® Intelligent Operations Center (CVE-2020-2773) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-…
∗∗∗ Security Bulletin: Vulnerability in Bind affects IBM Integrated Analytics System ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-bind-aff…
∗∗∗ Security Bulletin: Multiple vulnerabilities in OpenSSL may affect IBM Workload Scheduler ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: CVE-2020-1971 vulnerability in OpenSSL may affect IBM Workload Scheduler ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cve-2020-1971-vulnerabili…
∗∗∗ Security Bulletin: Multiple vulnerabilities have been identified in Oracle Oct 2020 CPU for Java 8 shipped with IBM® Intelligent Operations Center (CVE-2020-14779, CVE-2020-14792,CVE-2020-14796,CVE-2020-14797,CVE-2020-14798) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in OpenSSL may affect IBM Workload Scheduler ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Mitsubishi Electric MELSEC iQ-R Series ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-250-01
∗∗∗ Hitachi ABB Power Grids System Data Manager ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-250-02
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 03-09-2021 18:00 − Montag 06-09-2021 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Exchange-Server-Attacken reißen nicht ab - Angreifer installieren 7 Hintertüren ∗∗∗
---------------------------------------------
Wenn nicht längst geschehen, sollten Admins die ProxyShell-Lücken in Exchange Server durch die Installation von Sicherheitsupdates schließen.
---------------------------------------------
https://heise.de/-6182364
∗∗∗ Patch me if you can: Ransomware 3.0 - der Widerstand wächst ∗∗∗
---------------------------------------------
ITler jonglieren gern mit Zahlen, vor allem beim Reifegrad von Software. Bei Ransomware hat ein Versionssprung aber nichts Gutes zu bedeuten - oder doch?
---------------------------------------------
https://heise.de/-6071696
∗∗∗ Sourcecode von Erpressungstrojaner "Babuk Locker" geleakt ∗∗∗
---------------------------------------------
In einem russischen Hacker-Forum sind alle Bauteile für die Ransomware "Babuk Locker" aufgetaucht. Darunter könnten auch für Opfer interessante Schlüssel sein.
---------------------------------------------
https://heise.de/-6182385
∗∗∗ Ransomware gangs target companies using these criteria ∗∗∗
---------------------------------------------
Ransomware gangs increasingly purchase access to a victims network on dark web marketplaces and from other threat actors. Analyzing their want ads makes it possible to get an inside look at the types of companies ransomware operations are targeting for attacks.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/ransomware-gangs-target-comp…
∗∗∗ The State of Incident Response: Measuring Risk and Evaluating Your Preparedness ∗∗∗
---------------------------------------------
Grant Oviatt, director of incident-response engagements at Red Canary, provides advice and best practices on how to get there faster.
---------------------------------------------
https://threatpost.com/incident-response-risk-preparedness/169211/
∗∗∗ Traffic Exchange Networks Distributing Malware Disguised as Cracked Software ∗∗∗
---------------------------------------------
An ongoing campaign has been found to leverage a network of websites acting as a "dropper as a service" to deliver a bundle of malware payloads to victims looking for "cracked" versions of popular business and consumer applications. "These malware included an assortment of click fraud bots, other information stealers, and even ransomware," researchers from cybersecurity firm Sophos said [...]
---------------------------------------------
https://thehackernews.com/2021/09/traffic-exchange-networks-distributing.ht…
=====================
= Vulnerabilities =
=====================
∗∗∗ Proxies are complicated: RCE vulnerability in a 3 million downloads/week NPM package ∗∗∗
---------------------------------------------
Pac-Resolver, a widely used NPM dependency, had a high-severity RCE (Remote Code Execution) vulnerability that could allow network administrators or other malicious actors on your local network to remotely run arbitrary code inside your Node.js process whenever you tried to send an HTTP request.
---------------------------------------------
https://httptoolkit.tech/blog/npm-pac-proxy-agent-vulnerability/
∗∗∗ ‘Demon’s Cries’ authentication bypass patched in Netgear switches ∗∗∗
---------------------------------------------
Networking equipment vendor Netgear has patched three vulnerabilities in several of its smart switches that can allow threat actors to bypass authentication and take over devices.
---------------------------------------------
https://therecord.media/demons-cries-authentication-bypass-patched-in-netge…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (btrbk, pywps, and squashfs-tools), Fedora (libguestfs, libss7, ntfs-3g, ntfs-3g-system-compression, partclone, testdisk, wimlib, and xen), Mageia (exiv2, golang, libspf2, and ruby-addressable), openSUSE (apache2, dovecot23, gstreamer-plugins-good, java-11-openjdk, libesmtp, mariadb, nodejs10, opera, python39, sssd, and xerces-c), and SUSE (apache2, java-11-openjdk, libesmtp, mariadb, nodejs10, python39, sssd, xen, and xerces-c).
---------------------------------------------
https://lwn.net/Articles/868464/
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to Helm vulnerabilities ( CVE-2021-21303) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to OpenSSL vulnerabilities (CVE-2020-1971 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to OpenSSL and Node.js vulnerabilities (CVE-2020-1971, CVE-2020-8287, CVE-2020-8265) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to Kubernetes vulnerabilities (CVE-2020-8554) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to Java vulnerabilities (CVE-2020-14781) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to Docker vulnerabilities (CVE-2021-21285, CVE-2021-21284) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: Multiple vulnerabilities in VMware affect IBM Cloud Pak System ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to Node.js lodash vulnerabilities (CVE-2021-23337) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: A Privilege Escalation vulnerability in Pivotal Spring Framework affects IBM LKS Administration & Reporting Tool and its Agent ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-privilege-escalation-vu…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to OpenSSL vulnerabilities (CVE-2020-1968 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to a Go vulnerability (CVE-2021-3121) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to Kubernetes vulnerabilities (CVE-2020-8569) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to FasterXML jackson-databind vulnerabilities (CVE-2020-25649) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: A security vulnerability has been identified in Oracle Oct 2020 CPU for Java 8 shipped with IBM® Intelligent Operations Center (CVE-2020-14781) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to Elastic vulnerabilities (CVE-2020-7020 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to Java vulnerabilities (CVE-2020-2773) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 02-09-2021 18:00 − Freitag 03-09-2021 18:00
Handler: Stephan Richter
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ A deep-dive into the SolarWinds Serv-U SSH vulnerability ∗∗∗
---------------------------------------------
We're sharing technical information about the vulnerability tracked as CVE-2021-35211, which was used to attack the SolarWinds Serv-U FTP software in limited and targeted attacks.
---------------------------------------------
https://www.microsoft.com/security/blog/2021/09/02/a-deep-dive-into-the-sol…
∗∗∗ From RpcView to PetitPotam ∗∗∗
---------------------------------------------
In the previous post we saw how to set up a Windows 10 machine in order to manually analyze Windows RPC with RpcView. In this post, we will see how the information provided by this tool can be used to create a basic RPC client application in C/C++. Then, we will see how we can reproduce the trick used in the PetitPotam tool.
---------------------------------------------
https://itm4n.github.io/from-rpcview-to-petitpotam/
∗∗∗ PST, Want a Shell? ProxyShell Exploiting Microsoft Exchange Servers ∗∗∗
---------------------------------------------
The Exploit Chain Explained - ProxyShell refers to a chain of attacks that exploit three different vulnerabilities affecting on-premises Microsoft Exchange servers to achieve pre-authenticated remote code execution (RCE).
---------------------------------------------
http://www.fireeye.com/blog/threat-research/2021/09/proxyshell-exploiting-m…
∗∗∗ Jetzt patchen! Krypto-Miner schlüpft durch Confluence-Lücke ∗∗∗
---------------------------------------------
Angreifer nutzen derzeit aktiv eine kritische Sicherheitslücke in der Wiki-Software Confluence aus. Ein Sicherheitsupdate ist verfügbar.
---------------------------------------------
https://heise.de/-6181023
∗∗∗ From open Guest Wi-Fi to pwning a lift or why validating network segregation is critical ∗∗∗
---------------------------------------------
TL;DR A recent engagement took quite an unexpected turn and led to me having remote control of a bunch of building services including a lift from the street outside, unauthenticated.
---------------------------------------------
https://www.pentestpartners.com/security-blog/from-open-guest-wi-fi-to-pwni…
∗∗∗ Shodan Verified Vulns 2021-09-01 ∗∗∗
---------------------------------------------
Mit 2021-09-01 sah die Lage laut den Daten in unserer Shodan-Datenbank wie folgt aus: Während der Großteil sich zu den Vormonaten wenig verändert hat, gibt es zwei größere Änderungen:
* Im Zuge der BlackHat 2021 USA stellte der Sicherheitsforscher Orange Tsai eine neue Exploit-Chain gegen Microsoft Exchange Server vor, die "ProxyShell" genannt wurde...
* Außerdem neu ist CVE-2021-31206, eine – wie auch ProxyShell – im Zuge des diesjährigen Pwn2Own-Contests der Zero Day Initiative gefundene Schwachstelle, die ebenfalls zu einer Remote-Code-Execution führen kann.
---------------------------------------------
https://cert.at/de/aktuelles/2021/9/shodan-verified-vulns-2021-09-01
=====================
= Vulnerabilities =
=====================
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
IBM hat 19 Security Bulletins zu diversen Schwachstellen veröffentlicht.
---------------------------------------------
https://www.ibm.com/blogs/psirt/2021/09/
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (qemu), Fedora (condor, grilo, libopenmpt, opencryptoki, and php), openSUSE (xen), and SUSE (ffmpeg, file, php72, rubygem-addressable, and xen).
---------------------------------------------
https://lwn.net/Articles/868282/
∗∗∗ Microsoft Edge: Mehrere Schwachstelle ∗∗∗
---------------------------------------------
Edge ist ein Web Browser von Microsoft.
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Microsoft Edge ausnutzen, um einen Angriff mit unbekannten Auswirkungen durchzuführen.
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K21-0934
∗∗∗ CVE-2021-2429: A Heap-based Buffer Overflow Bug in the MySQL InnoDB memcached Plugin ∗∗∗
---------------------------------------------
The vulnerability affects MySQL versions 8.0.25 and prior. It can be triggered remotely and without authentication. Attackers can leverage this vulnerability to execute arbitrary code on the MySQL database server. Oracle patched it in July and assigned it CVE-2021-2429, while ZDI’s identifier is ZDI-2021-889.
...
Although the InnoDB memcached plugin is not enabled by default, it is nonetheless wise to apply the patch as soon as possible. It would not surprise me to see a reliable full exploit in the near future.
---------------------------------------------
https://www.thezdi.com/blog/2021/9/2/cve-2021-2429-a-heap-based-buffer-over…
∗∗∗ 2021-06-03: Cybersecurity Advisory - Multiple Vulnerabilities in Automation Runtime NTP Service ∗∗∗
---------------------------------------------
https://www.br-automation.com/downloads_br_productcatalogue/assets/16212592…
∗∗∗ SECURITY - ABB Base Software for SoftControl Remote Code Execution vulnerability ∗∗∗
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=2PAA122974&Language…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to OpenSSL vulnerabilities (CVE-2021-23839, CVE-2021-23840, CVE-2021-23841) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to Elastic vulnerabilities (CVE-2020-7021 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to Node.js lodash vulnerabilities (CVE-2020-28500) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to OpenSSL and Node.js vulnerabilities (CVE-2021-23840, CVE-2021-22884, CVE-2021-22883) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to a Go vulnerability (CVE-2021-27919, CVE-2021-27918) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to OpenSSL vulnerabilities (CVE-2021-3449, CVE-2021-3450) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to Apache vulnerabilities (CVE-2021-26296) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
∗∗∗ Security Bulletin: IBM Cloud Private is vulnerable to Dojo vulnerabilities (CVE-2020-5258) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-private-is-vuln…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 01-09-2021 18:00 − Donnerstag 02-09-2021 18:00
Handler: Stephan Richter
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ How to block Windows Plug-and-Play auto-installing insecure apps ∗∗∗
---------------------------------------------
A trick has been discovered that prevents your device from being taken over by vulnerable Windows applications when devices are plugged into your computer.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/how-to-block-windows-plug-a…
∗∗∗ Team Cymru’s Threat Hunting Maturity Model Explained ∗∗∗
---------------------------------------------
In this four-part series, we’ll be looking at Team Cymru’s Threat Hunting Maturity Model.
---------------------------------------------
https://team-cymru.com/blog/2021/09/02/team-cymrus-threat-hunting-maturity-…
∗∗∗ QakBot technical analysis ∗∗∗
---------------------------------------------
This report contains technical analysis of the Trojan-Banker named QakBot (aka QBot, QuackBot or Pinkslipbot) and its information stealing, web injection and other modules.
---------------------------------------------
https://securelist.com/qakbot-technical-analysis/103931/
∗∗∗ Analysis of a Phishing Kit (that targets Chase Bank) ∗∗∗
---------------------------------------------
Most of us are already familiar with phishing: A common type of internet scam where unsuspecting victims are conned into entering their real login credentials on fake pages controlled by attackers.
---------------------------------------------
https://blog.sucuri.net/2021/09/analysis-of-a-phishing-kit-that-targets-cha…
∗∗∗ Too Log; Didnt Read — Unknown Actor Using CLFS Log Files for Stealth ∗∗∗
---------------------------------------------
The Mandiant Advanced Practices team recently discovered a new malware family we have named PRIVATELOG and its installer, STASHLOG.
---------------------------------------------
http://www.fireeye.com/blog/threat-research/2021/09/unknown-actor-using-clf…
∗∗∗ Google Play sign-ins can be abused to track another person’s movements ∗∗∗
---------------------------------------------
We tried to help somebody install an app on an Android phone and stumbled on a way to track them instead.
---------------------------------------------
https://blog.malwarebytes.com/awareness/2021/09/google-play-sign-ins-can-be…
∗∗∗ Translated: Talos insights from the recently leaked Conti ransomware playbook ∗∗∗
---------------------------------------------
Cisco Talos recently became aware of a leaked playbook that has been attributed to the ransomware-as-a-service (RaaS) group Conti.
---------------------------------------------
https://blog.talosintelligence.com/2021/09/Conti-leak-translation.html
∗∗∗ Vorsicht vor fit4fun-arena.de – zu günstig um wahr zu sein ∗∗∗
---------------------------------------------
Der Fake-Shop fit4fun-arena.de bietet unglaublich günstige Fahrräder und weitere Fitnessartikel an.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-fit4fun-arenade-zu-guen…
=====================
= Vulnerabilities =
=====================
∗∗∗ Dateimanager Midnight Commander seit neun Jahren angreifbar ∗∗∗
---------------------------------------------
Es gibt ein wichtiges Sicherheitsupdate für Midnight Commander.
---------------------------------------------
https://heise.de/-6180301
∗∗∗ Braktooth: Neue Bluetooth-Lücken bedrohen unzählige Geräte ∗∗∗
---------------------------------------------
Sicherheitsforscher haben mehrere Bluetooth-Schwachstellen entdeckt. Nicht alle Hersteller planen, Patches zu veröffentlichen.
---------------------------------------------
https://heise.de/-6180540
∗∗∗ Cisco beseitigt kritische Lücke aus Enterprise NFV Infrastructure Software ∗∗∗
---------------------------------------------
Jetzt updaten: Die Enterprise NFV Infrastructure Software (NFVIS) kann je nach Konfiguration aus der Ferne angreifbar sein. Aktualisierungen stehen bereit.
---------------------------------------------
https://heise.de/-6180655
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by openSUSE (ffmpeg and gstreamer-plugins-good), SUSE (apache2, apache2-mod_auth_mellon, ffmpeg, gstreamer-plugins-good, libesmtp, openexr, rubygem-puma, xen, and xerces-c), and Ubuntu (openssl).
---------------------------------------------
https://lwn.net/Articles/868155/
∗∗∗ Recently Patched Confluence Vulnerability Exploited in the Wild ∗∗∗
---------------------------------------------
Hackers started exploiting a vulnerability in Atlassian’s Confluence enterprise collaboration product just one week after the availability of a patch was announced.
---------------------------------------------
https://www.securityweek.com/recently-patched-confluence-vulnerability-expl…
∗∗∗ Cisco Nexus Insights Authenticated Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Prime Collaboration Provisioning Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Enterprise NFV Infrastructure Software Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Identity Services Engine Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Johnson Controls Sensormatic Electronics Illustra ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-245-01
∗∗∗ JTEKT TOYOPUC TCC-6353 PC10G-CPU ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-245-02
∗∗∗ Advantech WebAccess ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-245-03
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 31-08-2021 18:00 − Mittwoch 01-09-2021 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Kritische Root-Sicherheitslücke in Netzwerk-Videorekorder von Annke entdeckt ∗∗∗
---------------------------------------------
Es gibt ein wichtiges Sicherheitsupdate für den Netzwerk-Videorekorder N48PBB von Annke.
---------------------------------------------
https://heise.de/-6179374
∗∗∗ Energiemanagementsystem DIAEnergie weist kritische Lücken auf ∗∗∗
---------------------------------------------
Wichtige Sicherheitsupdates für das industrielle Energiemanagementsystem DIAEnergie sind in Arbeit. Die US-Behörde CISA rät zwischenzeitlich zu Schutzmaßnahmen.
---------------------------------------------
https://heise.de/-6179591
∗∗∗ SMS: Vorsicht vor gefälschter Sendungsverfolgung ∗∗∗
---------------------------------------------
Kriminelle versenden momentan per SMS gefälschte Paketinformationen zu einer Bestellung. In der Nachricht heißt es, dass Ihr Paket nicht zugestellt werden konnte oder eine Sendungsverfolgung nun möglich ist. Sie werden aufgefordert, auf einen Link zu klicken. Achtung: Der Link führt in eine Internetfalle.
---------------------------------------------
https://www.watchlist-internet.at/news/sms-vorsicht-vor-gefaelschter-sendun…
∗∗∗ STRRAT: a Java-based RAT that doesnt care if you have Java, (Wed, Sep 1st) ∗∗∗
---------------------------------------------
STRRAT was discovered earlier this year as a Java-based Remote Access Tool (RAT) that does not require a preinstalled Java Runtime Environment (JRE). It has been distributed through malicious spam (malspam) during 2021. Today's diary reviews an infection generated using an Excel spreadsheet discovered on Monday, 2021-08-30.
---------------------------------------------
https://isc.sans.edu/diary/rss/27798
∗∗∗ This is why the Mozi botnet will linger on ∗∗∗
---------------------------------------------
The botnet continues to haunt IoT devices, and likely will for some time to come.
---------------------------------------------
https://www.zdnet.com/article/this-is-why-the-mozi-botnet-will-linger-on/
=====================
= Vulnerabilities =
=====================
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
IBM hat 52 Security Bulletins zu diversen Schwachstellen veröffentlicht.
---------------------------------------------
https://www.ibm.com/blogs/psirt/2021/08/
∗∗∗ Mehrere Schwachstellen in Moxa Netzwerkgeräten ∗∗∗
---------------------------------------------
Mehrere Geräte, entwickelt von MOXA Inc., sind anfällig auf verschiedene Schwachstellen wie Command Injection und Cross-Site Scripting in der Config-Upload Funktion. Des weiteren wurde veraltete Software identifiziert und eine Stichprobe (CVE-2015-0235) davon wurde auch mithilfe eines öffentlichen exploits getestet. Alle Schwachstellen wurden durch Emulation des Gerätes mit der MEDUSA scalable firmware runtime verifiziert.
---------------------------------------------
https://sec-consult.com/de/vulnerability-lab/advisory/mehrere-schwachstelle…
∗∗∗ Over 1 Million Sites Affected by Gutenberg Template Library & Redux Framework Vulnerabilities ∗∗∗
---------------------------------------------
On August 3, 2021, the Wordfence Threat Intelligence team initiated the disclosure process for two vulnerabilities we discovered in the Gutenberg Template Library & Redux Framework plugin, which is installed on over 1 million WordPress sites. One vulnerability allowed users with lower permissions, such as contributors, to install and activate arbitrary plugins and delete any [...]
---------------------------------------------
https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-red…
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (bind, GNOME, hivex, kernel, and sssd), Debian (gpac and squashfs-tools), Fedora (c-ares and openssl), openSUSE (dovecot23), Oracle (bind, hivex, kernel, and sssd), Red Hat (kernel), Scientific Linux (bind, hivex, kernel, libsndfile, libX11, and sssd), Slackware (ntfs), SUSE (dovecot23), and Ubuntu (ntfs-3g).
---------------------------------------------
https://lwn.net/Articles/868015/
∗∗∗ Vulnerability Allows Remote DoS Attacks Against Apps Using Linphone SIP Stack ∗∗∗
---------------------------------------------
A serious vulnerability affecting the Linphone Session Initiation Protocol (SIP) client suite can allow malicious actors to remotely crash applications, industrial cybersecurity firm Claroty warned on Tuesday. read more
---------------------------------------------
https://www.securityweek.com/vulnerability-allows-remote-dos-attacks-agains…
∗∗∗ Sensormatic Electronics KT-1 ∗∗∗
---------------------------------------------
This advisory contains mitigations for a Use of Unmaintained Third-party Components vulnerability in Sensormatic Electronics KT-1 Ethernet-ready single-door controller.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-243-01
∗∗∗ Philips Patient Monitoring Devices (Update A) ∗∗∗
---------------------------------------------
This updated advisory is a follow-up to the original advisory titled ICSMA-20-254-01 Philips Patient Monitoring Devices that was published September 10, 2020, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for Improper Neutralization of Formula Elements in a CSV File, Cross-site Scripting, Improper Authentication, Improper Check for Certificate Revocation, Improper Handling of Length Parameter Inconsistency, Improper Validation of Syntactic Correctness of Input, [...]
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsma-20-254-01
∗∗∗ Node.js: Mehrere Schwachstellen ermöglichen Manipulation von Dateien ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0932
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 30-08-2021 18:00 − Dienstag 31-08-2021 18:00
Handler: Stephan Richter
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Cybercriminal sells tool to hide malware in AMD, NVIDIA GPUs ∗∗∗
---------------------------------------------
Cybercriminals are making strides towards attacks with malware that executes code from the graphics processing unit (GPU) of a compromised system.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/cybercriminal-sells-tool-to-…
∗∗∗ LockFile Ransomware Uses Never-Before Seen Encryption to Avoid Detection ∗∗∗
---------------------------------------------
Researchers from Sophos discovered the emerging threat in July, which exploits the ProxyShell vulnerabilities in Microsoft Exchange servers to attack systems.
---------------------------------------------
https://threatpost.com/lockfile-ransomware-avoid-detection/169042/
∗∗∗ Top 3 APIs Vulnerabilities: Why Apps are Owned by Cyberattackers ∗∗∗
---------------------------------------------
Jason Kent, hacker-in-residence at Cequence, talks about how cybercriminals target apps and how to thwart them.
---------------------------------------------
https://threatpost.com/top-3-api-vulnerabilities-cyberattackers/169048/
∗∗∗ BrakTooth: Impacts, Implications and Next Steps, (Tue, Aug 31st) ∗∗∗
---------------------------------------------
Today, the Automated Systems SEcuriTy (ASSET) Research Group from the Singapore University of Technology and Design (SUTD) revealed the BrakTooth family of vulnerabilities in commercial Bluetooth (BT) Classic stacks for various System-on-Chips (SoC).
---------------------------------------------
https://isc.sans.edu/diary/rss/27802
∗∗∗ Code Generated by GitHub Copilot Can Introduce Vulnerabilities: Researchers ∗∗∗
---------------------------------------------
A group of researchers has discovered that roughly 40% of the code produced by the GitHub Copilot language model is vulnerable.
---------------------------------------------
https://www.securityweek.com/code-generated-github-copilot-can-introduce-vu…
∗∗∗ SWR-Verbrauchermagazin „Marktcheck“ warnt vor Fake-Shops auf Instagram ∗∗∗
---------------------------------------------
Betrügerische Online-Shops schalten im großen Stil auf Social-Media-Plattformen wie Instagram Werbeanzeigen.
---------------------------------------------
https://www.watchlist-internet.at/news/swr-verbrauchermagazin-marktcheck-wa…
∗∗∗ DNS Rebinding Attack: How Malicious Websites Exploit Private Networks ∗∗∗
---------------------------------------------
DNS rebinding allows attackers to take advantage of web-based consoles to exploit internal networks by abusing the domain name system.
---------------------------------------------
https://unit42.paloaltonetworks.com/dns-rebinding/
∗∗∗ Cyberattackers are now quietly selling off their victims internet bandwidth ∗∗∗
---------------------------------------------
Proxyware is yet another way for criminals to generate revenue from their victims.
---------------------------------------------
https://www.zdnet.com/article/cyberattackers-are-now-quietly-selling-off-th…
=====================
= Vulnerabilities =
=====================
∗∗∗ NAS und Sicherheit: Qnap und Synology von OpenSSL-Lücke betroffen ∗∗∗
---------------------------------------------
Produkte beider NAS-Hersteller sind von einer bereits geschlossenen OpenSSL-Lücke betroffen. Sie arbeiten an einem Fix.
---------------------------------------------
https://www.golem.de/news/nas-und-sicherheit-qnap-und-synology-von-openssl-…
∗∗∗ HPE Warns Sudo Bug Gives Attackers Root Privileges to Aruba Platform ∗∗∗
---------------------------------------------
HPE joins Apple in warning customers of a high-severity Sudo vulnerability.
---------------------------------------------
https://threatpost.com/hpe-sudo-bug-aruba-platform/169038/
∗∗∗ Kritische Rechte-Lücke in PostgreSQL-Modul geschlossen ∗∗∗
---------------------------------------------
Es gibt ein wichtiges Sicherheitsupdate für das set_user-Extension-Modul der Open-Source-Datenbank PostgreSQL.
---------------------------------------------
https://heise.de/-6177973
∗∗∗ CPU-Sicherheitslücke: AMD Ryzen und Epyc per Seitenkanal verwundbar ∗∗∗
---------------------------------------------
Sicherheitsforscher der TU Dresden beweisen, dass komplizierte Angriffe der Meltdown-Klasse grundsätzlich auch bei AMDs Ryzen-Prozessoren funktionieren.
---------------------------------------------
https://heise.de/-6178386
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (libsndfile and libX11), Debian (ledgersmb, libssh, and postgresql-9.6), Fedora (squashfs-tools), openSUSE (389-ds, nodejs12, php7, spectre-meltdown-checker, and thunderbird), Oracle (kernel, libsndfile, and libX11), Red Hat (bind, cloud-init, edk2, glibc, hivex, kernel, kernel-rt, kpatch-patch, microcode_ctl, python3, and sssd), SUSE (bind, mysql-connector-java, nodejs12, sssd, and thunderbird), and Ubuntu (apr, squashfs-tools, thunderbird, [...]
---------------------------------------------
https://lwn.net/Articles/867917/
∗∗∗ Companies Release Security Advisories in Response to New OpenSSL Vulnerabilities ∗∗∗
---------------------------------------------
Updates announced by the OpenSSL Project on August 24 patched CVE-2021-3711, a high-severity buffer overflow related to SM2 decryption, and CVE-2021-3712, a medium-severity flaw that can be exploited for denial-of-service (DoS) attacks, and possibly for the disclosure of private memory contents.
---------------------------------------------
https://www.securityweek.com/companies-release-security-advisories-response…
∗∗∗ Vulnerabilities Can Allow Hackers to Disarm Fortress Home Security Systems ∗∗∗
---------------------------------------------
Researchers at cybersecurity firm Rapid7 have identified a couple of vulnerabilities that they claim can be exploited by hackers to remotely disarm one of the home security systems offered by Fortress Security Store.
---------------------------------------------
https://www.securityweek.com/vulnerabilities-can-allow-hackers-disarm-fortr…
∗∗∗ Crashing SIP Clients with a Single Slash ∗∗∗
---------------------------------------------
Claroty’s Team82 has disclosed a vulnerability in Belledonne Communications’ Linphone SIP Protocol Stack.
---------------------------------------------
https://claroty.com/2021/08/31/blog-research-crashing-sip-clients-with-a-si…
∗∗∗ Synology-SA-21:25 DSM ∗∗∗
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_21_25
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 27-08-2021 18:00 − Montag 30-08-2021 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Exchange Server: Authentifizierungs-Bypass mit ProxyToken ∗∗∗
---------------------------------------------
Im Juni 2021 hat Microsoft mit den kumulativen Updates eine Schwachstelle in seinen on-premises Exchange Servern beseitigt, über die Angreifer ohne Authentifizierung die Konfigurierung verändern konnten. So wäre es für einen nicht authentifizierten Angreifer möglich gewesen, die Konfiguration für Postfächer beliebiger Benutzer zu ändern. So hätten alle an ein E-Mail-Konto adressierten E-Mails kopiert und an ein vom Angreifer kontrolliertes Konto weitergeleitet werden können.
---------------------------------------------
https://www.borncity.com/blog/2021/08/30/exchange-server-authentifizierungs…
∗∗∗ [SANS ISC] Cryptocurrency Clipboard Swapper Delivered With Love ∗∗∗
---------------------------------------------
I published the following diary on isc.sans.edu: “Cryptocurrency Clipboard Swapper Delivered With Love“: Be careful if you’re a user of cryptocurrencies. My goal is not to re-open a debate about them and their associated financial risks. No, I’m talking here about technical risk.
---------------------------------------------
https://blog.rootshell.be/2021/08/30/sans-isc-cryptocurrency-clipboard-swap…
∗∗∗ Understanding Cobalt Strike Profiles ∗∗∗
---------------------------------------------
I really enjoy the process of red teaming especially when it comes to evading detection and lining up against a good blue team. Probably one of the most common commercially available Command and Control(C2) frameworks used today is Cobalt Strike(CS). So popular in fact it is classified on its own as a malware family by many defensive security products. Using CS in red team operations is common practice for a lot of companies offering red teaming to their clients and my milage is no different [...]
---------------------------------------------
https://blog.zsec.uk/cobalt-strike-profiles/
∗∗∗ Cobalt Strike, a Defender’s Guide ∗∗∗
---------------------------------------------
In our research, we expose adversarial Tactics, Techniques and Procedures (TTPs) as well as the tools they use to execute their mission objectives. In most of our cases, we [...]
---------------------------------------------
https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/
=====================
= Vulnerabilities =
=====================
∗∗∗ ZDI-21-1052: Trend Micro Maximum Security Directory Junction Denial-of-Service Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Trend Micro Maximum Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1052/
∗∗∗ ZDI-21-1051: NETGEAR Multiple Routers mini_httpd Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of multiple NETGEAR routers. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1051/
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (exiv2, grilo, gthumb, and redis), Fedora (krb5, nbdkit, and rubygem-addressable), Mageia (libass and opencontainers-runc), openSUSE (cacti, cacti-spine, go1.15, opera, qemu, and spectre-meltdown-checker), Red Hat (java-1.7.1-ibm, java-1.8.0-ibm, libsndfile, and libX11), SUSE (389-ds, qemu, and spectre-meltdown-checker), and Ubuntu (grilo).
---------------------------------------------
https://lwn.net/Articles/867791/
∗∗∗ Out-of-Bounds Read Vulnerability in OpenSSL ∗∗∗
---------------------------------------------
An out-of-bounds read vulnerability in OpenSSL has been reported to affect QNAP NAS running QTS, QuTS hero, and QuTScloud.
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-40
∗∗∗ Out-of-Bounds Vulnerabilities in OpenSSL ∗∗∗
---------------------------------------------
Two out-of-bounds vulnerabilities in OpenSSL have been reported to affect QNAP NAS running HBS 3 (Hybrid Backup Sync).
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-39
∗∗∗ Security Bulletin: IBM API Connect V5 is impacted by a vulnerability in nginx. (CVE-2021-23017) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-api-connect-v5-is-imp…
∗∗∗ Security Bulletin: Vulnerability in IBM Java SDK and IBM Java Runtime affects Rational Business Developer ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-ibm-java…
∗∗∗ Atlassian Jira Software: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0920
∗∗∗ ZDI-21-1038: (0Day) Fuji Electric Tellus Lite V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1038/
∗∗∗ ZDI-21-1037: (0Day) Fuji Electric Tellus Lite V9 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1037/
∗∗∗ ZDI-21-1036: (0Day) Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1036/
∗∗∗ ZDI-21-1035: (0Day) Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1035/
∗∗∗ ZDI-21-1034: (0Day) Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1034/
∗∗∗ ZDI-21-1033: (0Day) Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1033/
∗∗∗ ZDI-21-1032: (0Day) Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1032/
∗∗∗ ZDI-21-1031: (0Day) Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Memory Corruption Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1031/
∗∗∗ ZDI-21-1050: (0Day) Fuji Electric Tellus Lite V-Simulator V8 File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1050/
∗∗∗ ZDI-21-1049: (0Day) Fuji Electric Tellus Lite V-Simulator V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1049/
∗∗∗ ZDI-21-1048: (0Day) Fuji Electric Tellus Lite V-Simulator V8 File Parsing Uninitialized Pointer Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1048/
∗∗∗ ZDI-21-1047: (0Day) Fuji Electric Tellus Lite V-Simulator V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1047/
∗∗∗ ZDI-21-1046: (0Day) Fuji Electric Tellus Lite V-Simulator V8 File Parsing Untrusted Pointer Dereference Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1046/
∗∗∗ ZDI-21-1045: (0Day) Fuji Electric Tellus Lite V9 File Parsing Memory Corruption Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1045/
∗∗∗ ZDI-21-1044: (0Day) Fuji Electric Tellus Lite V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1044/
∗∗∗ ZDI-21-1043: (0Day) Fuji Electric Tellus Lite V9 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-21-1043/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 26-08-2021 18:00 − Freitag 27-08-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Cosmos DB: Tausende Azure-Nutzer von Sicherheitslücke betroffen ∗∗∗
---------------------------------------------
Angreifer hätten an die Schlüssel zu Cosmos-Datenbanken gelangen können. Viele große Firmen wie Coca-Cola setzen auf den Azure-Datenbankdienst.
---------------------------------------------
https://www.golem.de/news/cosmos-db-tausende-azure-nutzer-von-sicherheitslu…
∗∗∗ Ragnarok Master-Decryptor-Schlüssel veröffentlicht ∗∗∗
---------------------------------------------
Opfer der Ragnarok-Ransomware, deren Daten bei einem Angriff verschlüsselt wurden, können wieder hoffen. Nachdem die Cyber-Kriminellen gerade ihren Betrieb eingestellt hat, wurde der Master-Decryptor-Schlüssel veröffentlicht. Damit sollten sich die verschlüsselten Dateien wiederherstellen lassen.
---------------------------------------------
https://www.borncity.com/blog/2021/08/27/ragnarok-master-decryptor-schlssel…
∗∗∗ Widespread credential phishing campaign abuses open redirector links ∗∗∗
---------------------------------------------
Microsoft has been actively tracking a widespread credential phishing campaign using open redirector links, which allow attackers to use a URL in a trusted domain and embed the eventual final malicious URL as a parameter.
---------------------------------------------
https://www.microsoft.com/security/blog/2021/08/26/widespread-credential-ph…
∗∗∗ Big bad decryption bug in OpenSSL – but no cause for alarm ∗∗∗
---------------------------------------------
The buggy codes in there, alright. Fortunately, its hard to get OpenSSL to use it even if you want to, which mitigates the risk.
---------------------------------------------
https://nakedsecurity.sophos.com/2021/08/27/big-bad-decryption-bug-in-opens…
∗∗∗ How Passwords Get Hacked ∗∗∗
---------------------------------------------
Can you think of an online service that doesn’t require a password? Everything on the internet requires a password. However, constantly creating and remembering new and ever more complex passwords is no small task. In fact, 66% of people polled admitted to using the same password more than once because of how hard it is to remember passwords that are considered strong. Taking steps to make passwords easier to remember can also make them easier for hackers to guess.
---------------------------------------------
https://blog.sucuri.net/2021/08/how-passwords-get-hacked-2.html
∗∗∗ AWS ReadOnlyAccess: Not Even Once ∗∗∗
---------------------------------------------
You need to give your AWS role a set of permissions, but you still want to feel warm and safe on the inside. "Why not ReadOnlyAccess?" you ask. "I can just deny the permissions I don’t like" you proclaim. Let me show you how your faith in ReadOnly access will betray you and leave you with trust issues.
---------------------------------------------
https://posts.specterops.io/aws-readonlyaccess-not-even-once-ffbceb9fc908
∗∗∗ FBI Releases Indicators of Compromise Associated with Hive Ransomware ∗∗∗
---------------------------------------------
The Federal Bureau of Investigation (FBI) has released a Flash report detailing indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with ransomware attacks by Hive, a likely Ransomware-as-a-Service organization consisting of a number of actors using multiple mechanisms to compromise business networks, exfiltrate data and encrypt data on the networks, and attempt to collect a ransom in exchange for access to the [...]
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/08/27/fbi-releases-indi…
∗∗∗ Academics bypass PINs for Mastercard and Maestro contactless payments ∗∗∗
---------------------------------------------
A team of scientists from a Swiss university has discovered a way to bypass PIN codes on contactless cards from Mastercard and Maestro.
---------------------------------------------
https://therecord.media/academics-bypass-pins-for-mastercard-and-maestro-co…
=====================
= Vulnerabilities =
=====================
∗∗∗ Sicherheitsupdates: Root-Kernel-Lücke bedroht IBMs Betriebssystem AIX ∗∗∗
---------------------------------------------
Angreifer könnten Systeme mit IBM AIX attackieren und sich Root-Rechte verschaffen. Sicherheitsupdates schaffen Abhilfe.
---------------------------------------------
https://heise.de/-6176064
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (haproxy and libopenmpt), openSUSE (aws-cli, python-boto3, python-botocore,, dbus-1, and qemu), Oracle (rh-postgresql10-postgresql), Red Hat (compat-exiv2-023, compat-exiv2-026, exiv2, libsndfile, microcode_ctl, python27, rh-nodejs12-nodejs and rh-nodejs12-nodejs-nodemon, rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon, and rh-python38), Scientific Linux (compat-exiv2-023 and compat-exiv2-026), SUSE (compat-openssl098), and Ubuntu (libssh, openssl, [...]
---------------------------------------------
https://lwn.net/Articles/867636/
∗∗∗ Johnson Controls Controlled Electronic Management Systems CEM Systems AC2000 ∗∗∗
---------------------------------------------
This advisory contains mitigation for an Improper Authorization vulnerability in Johnson Controls Controlled Electronic Management Systems CEM Systems AC2000, an enterprise access control and integrated security management system.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-238-01
∗∗∗ Annke Network Video Recorder ∗∗∗
---------------------------------------------
This advisory contains mitigation for a Stack-based Buffer Overflow vulnerability in the Annke N48PBB Network Video Recorder.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-238-02
∗∗∗ Delta Electronics DIAEnergie ∗∗∗
---------------------------------------------
This advisory contains mitigations for Use of Password Hash with Insufficient Computational Effort, Incorrect Authorization, Unrestricted Upload of File with Dangerous Type, SQL Injection, and Cross-site Request Forgery vulnerabilities in the Delta Electronics DIAEnergie industrial energy management system.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-238-03
∗∗∗ Delta Electronics DOPSoft ∗∗∗
---------------------------------------------
This advisory contains mitigations for a Stack-based Buffer Overflow vulnerability in Delta Electronics DOPSoft HMI editing software
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-238-04
∗∗∗ SYSS-2021-035, SySS-2021-036, SySS-2021-037, SySS-2021-038, SySS-2021-039: Mehrere Schwachstellen im MIK.starlight-Server ∗∗∗
---------------------------------------------
Mehrere Funktionen im MIK.starlight-Server deserialisieren Daten auf unsichere Weise und erlauben einem Angreifer dadurch die Übernahme des Systems.
---------------------------------------------
https://www.syss.de/pentest-blog/syss-2021-035-syss-2021-036-syss-2021-037-…
∗∗∗ libssh: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0918
∗∗∗ Authenticated RCE in BSCW Server ∗∗∗
---------------------------------------------
https://sec-consult.com/de/vulnerability-lab/advisory/authenticated-rce-in-…
∗∗∗ XML Tag Injection in BSCW Server ∗∗∗
---------------------------------------------
https://sec-consult.com/de/vulnerability-lab/advisory/xml-tag-injection-in-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 25-08-2021 18:00 − Donnerstag 26-08-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Dimitri Robl
=====================
= News =
=====================
∗∗∗ Microsoft: ProxyShell bugs “might be exploited,” patch servers now! ∗∗∗
---------------------------------------------
Microsoft has finally published guidance today for the actively exploited ProxyShell vulnerabilities impacting multiple on-premises Microsoft Exchange versions.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/microsoft-proxyshell-bugs-m…
∗∗∗ Valuable Datasets to Analyze Network Infrastructure | Part 3 ∗∗∗
---------------------------------------------
In the final installment of this series, learn about Passive DNS and how it works, explore valuable artifacts for investigations, and study our handy cheat sheet.
---------------------------------------------
https://www.domaintools.com/resources/blog/valuable-datasets-to-analyze-net…
∗∗∗ Plug and Play: Adminrechte bekommt man auch mit Steelseries-Mäusen ∗∗∗
---------------------------------------------
Eine Maus einstecken und den dazugehörigen Installer für erweiterte Rechte ausnutzen: Das funktioniert bei Razer und auch bei Steelseries.
---------------------------------------------
https://www.golem.de/news/plug-and-play-adminrechte-bekommt-man-auch-mit-st…
∗∗∗ Secure PLC Coding Practices ∗∗∗
---------------------------------------------
In the world of operational technology, programmable logic controllers (PLCs) control physical elements such as a municipal water supply system, the room temperature in offices or a chocolate bar packaging machine.
---------------------------------------------
https://securityblog.switch.ch/2021/08/26/secure-plc-coding-practices/
∗∗∗ Engineering Workstations Are Concerning Initial Access Vector in OT Attacks ∗∗∗
---------------------------------------------
Organizations that use industrial control systems (ICS) and other operational technology (OT) are increasingly concerned about cyber threats, and while they have taken steps to address risks, many don’t know if they have suffered a breach, according to a survey conducted by the SANS Institute on behalf of industrial cybersecurity firm Nozomi Networks.
---------------------------------------------
https://www.securityweek.com/engineering-workstations-are-concerning-initia…
∗∗∗ Admin password re-use. Don’t do it ∗∗∗
---------------------------------------------
As a pentester, one of the most disappointing sights is see on a test is extensive local admin password reuse. I know others get excited as it means easy pwnage [...]
---------------------------------------------
https://www.pentestpartners.com/security-blog/admin-password-re-use-dont-do…
∗∗∗ Betrug mit angeblichen Nachrichten des Mobilfunkbetreibers ∗∗∗
---------------------------------------------
Erneut werden massenhaft betrügerische SMS ausgeschickt. Es soll sich um eine „Neue Nachricht des Mobilfunkbetreibers“ handeln. Für mehr Infos soll man einem Link folgen. Achtung: Der Link führt auf eine betrügerische Website mit Schadsoftware! Die Nachricht kommt nicht vom Netzbetreiber.
---------------------------------------------
https://www.watchlist-internet.at/news/betrug-mit-angeblichen-nachrichten-d…
=====================
= Vulnerabilities =
=====================
∗∗∗ Atlassian: Kritische Sicherheitslücke in Confluence ∗∗∗
---------------------------------------------
Nutzer, die die Wiki-Software Confluence von Atlassian selbst hosten, sind zum Update aufgefordert
---------------------------------------------
https://www.golem.de/news/atlassian-kritische-sicherheitsluecke-in-confluen…
∗∗∗ ZDI-21-1026: (0Day) D-Link DIR-2055 HNAP PrivateLogin Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-2055 routers. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1026/
∗∗∗ ZDI-21-1025: (0Day) D-Link DIR-2055 HNAP Incorrect Comparison Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-2055 routers. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-1025/
∗∗∗ Ethereum-Client Geth: Dringendes Update wegen schwerer Lücke ∗∗∗
---------------------------------------------
Eine schwerwiegende Lücke im verbreiteten Ethereum-Client Geth könnte damit betriebene Blockchain-Knoten lahmlegen. Eine gepatchte Version steht aber bereit.
---------------------------------------------
https://heise.de/-6174832
∗∗∗ Updates verfügbar: Cisco fixt unter anderem kritische Lücke in APIC & Cloud APIC ∗∗∗
---------------------------------------------
Für die Verwaltungskomponente von Ciscos Application Centric Infrastructure (ACI) und viele weitere Produkte stehen wichtige Aktualisierungen bereit.
---------------------------------------------
https://heise.de/-6174789
∗∗∗ Drupal: Updates sichern zwei Module gegen Angriffe ab ∗∗∗
---------------------------------------------
Die Module "Webform" und "Admin Toolbar" für das Content Management System Drupal waren unter bestimmten Voraussetzungen via Cross-Site-Scripting angreifbar.
---------------------------------------------
https://heise.de/-6175086
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (community-mysql, containerd, dotnet3.1, dotnet5.0, perl-Encode, and tor), Mageia (gpsd), openSUSE (cacti, cacti-spine, go1.16, jetty-minimal, libmspack, mariadb, openexr, and tor), SUSE (aspell, jetty-minimal, libesmtp, mariadb, and unrar), and Ubuntu (firefox and mongodb).
---------------------------------------------
https://lwn.net/Articles/867492/
∗∗∗ Synology-SA-21:24 OpenSSL ∗∗∗
---------------------------------------------
Multiple vulnerabilities allow remote attackers to conduct denial-of-service attack or execute arbitrary code via a susceptible version of Synology DiskStation Manager (DSM), Synology Router Manager (SRM), VPN Plus Server or VPN Server.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_21_24
∗∗∗ Kaseya Unitrends update ∗∗∗
---------------------------------------------
Mid July 2021 we opened case DIVD-2021-00014 tracking multiple vulnerabilities in Kaseya Unitrends. These vulnerabilities consited of: An authenticated remote code execution vulnerability on the server, a privilege escaltion vulnerability from read-only user to admin on the server and a (yet) undisclosed vulnerability on the client [...]
---------------------------------------------
https://csirt.divd.nl/2021/08/26/Kaseya-Unitrends-update/
∗∗∗ Teamviewer: August Updates - Security Patches ∗∗∗
---------------------------------------------
https://community.teamviewer.com/English/discussion/117794/august-updates-s…
∗∗∗ Security Bulletin: CVE-2020-2773 (deferred from Oracle Apr 2020 CPU) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cve-2020-2773-deferred-fr…
∗∗∗ VMSA-2021-0019 ∗∗∗
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0019.html
∗∗∗ PHOENIX CONTACT : Security Advisory for FL SWITCH SMCS series (UPDATE A) ∗∗∗
---------------------------------------------
https://cert.vde.com/de-de/advisories/vde-2021-023
∗∗∗ HP OfficeJet: Schwachstelle ermöglicht Cross-Site Scripting ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K21-0909
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 24-08-2021 18:00 − Mittwoch 25-08-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Medizin: Sicherheitslücken in Infusionspumpen entdeckt ∗∗∗
---------------------------------------------
Medizinische Infusionspumpen versorgen Patienten mit Medikamenten. Können Angreifer unbemerkt die Dosis manipulieren, kann das schwere Folgen haben.
---------------------------------------------
https://www.golem.de/news/medizin-sicherheitsluecken-in-infusionspumpen-ent…
∗∗∗ Sicherheitsupdates: Netzwerk-Equipment von F5 für Attacken anfällig ∗∗∗
---------------------------------------------
F5 hat mehrere gefährliche Sicherheitslücken in verschiedenen BIG-IP Appliances geschlossen.
---------------------------------------------
https://heise.de/-6174378
∗∗∗ Gefahr durch alte Schwachstellen ∗∗∗
---------------------------------------------
Trend Micro fordert Unternehmen dazu auf, sich bei ihren Patching-Maßnahmen auf die Schwachstellen zu fokussieren, von denen das größte Risiko für ihr Unternehmen ausgeht - auch wenn diese schon mehrere Jahre alt sind. Rund ein Viertel der im cyberkriminellen Untergrund gehandelten Exploits sind über drei Jahre alt.
---------------------------------------------
https://www.zdnet.de/88396365/gefahr-durch-alte-schwachstellen/
∗∗∗ Vorsicht vor angeblicher Ärztin aus Afghanistan, die Ihre Wohnung kaufen will! ∗∗∗
---------------------------------------------
Haben Sie derzeit eine Immobilie im Internet inseriert? Dann sollten Sie sich einer vermeintlichen Interessentin aus Afghanistan in Acht nehmen. Eine angebliche Ärztin schreibt derzeit willkürlich Menschen an, die eine Wohnung inseriert haben und gibt vor nach Europa ziehen zu wollen. Als Grund gibt sie an, dass sie unter den Taliban nicht als Ärztin arbeiten kann. Achtung Betrug! Hier nutzen Kriminelle die Not der Bevölkerung in Afghanistan aus.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-angeblicher-aerztin-aus…
∗∗∗ Ransomware gangs script shows exactly the files theyre after ∗∗∗
---------------------------------------------
A PowerShell script used by the Pysa ransomware operation gives us a sneak peek at the types of data they attempt to steal during a cyberattack.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/ransomware-gangs-script-show…
∗∗∗ FIN8 cybercrime gang backdoors US orgs with new Sardonic malware ∗∗∗
---------------------------------------------
A financially motivated cybercrime gang has breached and backdoored the network of a US financial organization with a new malware known dubbed Sardonic by Bitdefender researchers who first spotted it.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fin8-cybercrime-gang-backdoo…
∗∗∗ There may be (many) more SPF records than we might expect, (Wed, Aug 25th) ∗∗∗
---------------------------------------------
The Sender Policy Framework (SPF[1]) is a simple but fairly powerful mechanism that may be used (ideally in connection with DKIM[2] and DMARC[3]) to combat phishing to some degree. Basically, it allows a domain name owner to publish a special DNS TXT record containing a list of servers that are authorized to send e-mails for that domain.
---------------------------------------------
https://isc.sans.edu/diary/rss/27786
∗∗∗ 7 Ways to Secure Magento 1 ∗∗∗
---------------------------------------------
While unpatched installations of Magento 2 contain many vulnerabilities, I’m going to focus my attention on Magento 1 for this article. This is because Magento 2 provides regularly updated patches for many of the most common vulnerabilities targeting the platform. While Magento 1 also contains patches for many known vulnerabilities, those patches are not currently maintained. Magento 1 reached its end-of-support on June 30, 2020.
---------------------------------------------
https://blog.sucuri.net/2021/08/securing-magento-1.html
∗∗∗ RiskIQ Analysis Links EITest and Gootloader Campaigns, Once Thought to Be Disparate ∗∗∗
---------------------------------------------
As RiskIQ tracks malware families to identify infrastructure patterns and common threads between threat campaigns via our Internet Intelligence Graph, we often surface strong links between seemingly disparate threat campaigns. In the case of EITest and GootLoader, these campaigns may have turned out to be one and the same.
---------------------------------------------
https://www.riskiq.com/blog/external-threat-management/eitest-gootloader/
∗∗∗ The SideWalk may be as dangerous as the CROSSWALK ∗∗∗
---------------------------------------------
Meet SparklingGoblin, a member of the Winnti family
---------------------------------------------
https://www.welivesecurity.com/2021/08/24/sidewalk-may-be-as-dangerous-as-c…
∗∗∗ CISA Releases Five Pulse Secure-Related MARs ∗∗∗
---------------------------------------------
As part of CISA’s ongoing response to Pulse Secure compromises, CISA has analyzed five malware samples related to exploited Pulse Secure devices. CISA encourages users and administrators to review the following five malware analysis reports (MARs) for threat actor tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs), and review CISA’s Alert, Exploitation of Pulse Connect Secure Vulnerabilities, for more information.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/08/24/cisa-releases-fiv…
∗∗∗ North Korean BLUELIGHT Special: InkySquid Deploys RokRAT ∗∗∗
---------------------------------------------
In a recent blog post, Volexity disclosed details on a portion of the operations by a North Korean threat actor it tracks as InkySquid. This threat actor compromised a news portal to use recently patched browser exploits to deliver a custom malware family known as BLUELIGHT. This follow-up post describes findings from a recent investigation undertaken by Volexity in which the BLUELIGHT malware was discovered being delivered to a victim alongside RokRAT (aka DOGCALL).
---------------------------------------------
https://www.volexity.com/blog/2021/08/24/north-korean-bluelight-special-ink…
=====================
= Vulnerabilities =
=====================
∗∗∗ BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021 ∗∗∗
---------------------------------------------
On August 17, 2021, BlackBerry released a security advisory, QNX-2021-001, that disclosed an integer overflow vulnerability in the following BlackBerry software releases:
- QNX Software Development Platform (SDP) - 6.5.0SP1 and earlier
- QNX OS for Medical - 1.1 and earlier
- QNX OS for Safety - 1.0.1 and earlier
A successful exploit could allow an attacker to execute arbitrary code or cause a denial of service (DoS).
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco NX-OS Software Python Parser Privilege Escalation Vulnerability ∗∗∗
---------------------------------------------
Update from August 25, 2021: Cisco found that this vulnerability was present in additional releases of Cisco NX-OS Software with the introduction of Python 3 support. For more information, see the Fixed Software section of this advisory.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ VMSA-2021-0018 ∗∗∗
---------------------------------------------
VMware vRealize Operations updates address multiple security vulnerabilities (CVE-2021-22022, CVE-2021-22023, CVE-2021-22024, CVE-2021-22025, CVE-2021-22026, CVE-2021-22027)
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0018.html
∗∗∗ Critical Authentication Bypass Vulnerability Patched in Booster for WooCommerce ∗∗∗
---------------------------------------------
On July 30, 2021 the Wordfence Threat Intelligence team initiated the responsible disclosure process for a vulnerability that we discovered in Booster for WooCommerce, a WordPress plugin installed on over 80,000 sites. This flaw made it possible for an attacker to log in as any user, as long as certain options were enabled in the [...]
---------------------------------------------
https://www.wordfence.com/blog/2021/08/critical-authentication-bypass-vulne…
∗∗∗ Nested Pages Patches Post Deletion Vulnerability ∗∗∗
---------------------------------------------
On August 13, 2021, the Wordfence Threat Intelligence team responsibly disclosed two vulnerabilities in Nested Pages, a WordPress plugin installed on over 80,000 sites that provides drag and drop functionality to manage your page structure and post ordering. These vulnerabilities included a Cross-Site Request Forgery vulnerability that allowed posts and pages to be deleted, unpublished [...]
---------------------------------------------
https://www.wordfence.com/blog/2021/08/nested-pages-patches-post-deletion-v…
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (openssl), openSUSE (libspf2, openssl-1_0_0, and openssl-1_1), Oracle (libsndfile), SUSE (nodejs10, nodejs12, openssl, openssl-1_0_0, openssl-1_1, and openssl1), and Ubuntu (openssl).
---------------------------------------------
https://lwn.net/Articles/867354/
∗∗∗ Hitachi ABB Power Grids TropOS ∗∗∗
---------------------------------------------
This advisory contains mitigations for Injection, Inadequate Encryption Strength, Missing Authentication for Critical Function, Improper Authentication, Improper Validation of Integrity Check Value, and Improper Input Validation vulnerabilities in Hitachi ABB Power Grids TropOS firmware.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-236-01
∗∗∗ Hitachi ABB Power Grids Utility Retail Operations and CSB Products ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Insufficiently Protected Credentials vulnerability in Retail Operations and Counterparty Settlement Billing (CSB) utility usage and billing software products.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-236-02
∗∗∗ Delta Electronics TPEditor ∗∗∗
---------------------------------------------
This advisory contains mitigations for a Heap-based Buffer Overflow vulnerability in Delta Electronics TPEditor programming software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-236-03
∗∗∗ Vembu BDR Full Disclosure ∗∗∗
---------------------------------------------
On 15 May 2021 we published case DIVD-2020-00011, which dealt with four vulnerabilities in Vembu BDR and related products. These four vulnerabilities here confidentially reported to Vembu in November 2020 and again in Februari 2021. Current status: From recent scan data we know that the three most damaging vulnerabilities have practically seized to be present on the internet, therefore we have decided to release the full technical details on these vulnerabilities.
---------------------------------------------
https://csirt.divd.nl/2021/08/25/Vembu-BDR-Full-Disclosure/
∗∗∗ Xen Security Advisory CVE-2021-28700 / XSA-383 ∗∗∗
---------------------------------------------
xen/arm: No memory limit for dom0less domUs
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-383.html
∗∗∗ Xen Security Advisory CVE-2021-28699 / XSA-382 ∗∗∗
---------------------------------------------
inadequate grant-v2 status frames array bounds check
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-382.html
∗∗∗ Xen Security Advisory CVE-2021-28698 / XSA-380 ∗∗∗
---------------------------------------------
long running loops in grant table handling
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-380.html
∗∗∗ Xen Security Advisory CVE-2021-28697 / XSA-379 ∗∗∗
---------------------------------------------
grant table v2 status pages may remain accessible after de-allocation
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-379.html
∗∗∗ Xen Security Advisory CVE-2021-28694,CVE-2021-28695,CVE-2021-28696 / XSA-378 ∗∗∗
---------------------------------------------
IOMMU page mapping issues on x86
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-378.html
∗∗∗ The installers of multiple Sony products may insecurely load Dynamic Link Libraries ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN80288258/
∗∗∗ QEMU: Schwachstelle ermöglicht Denial of Service ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0908
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 23-08-2021 18:00 − Dienstag 24-08-2021 18:00
Handler: Dimitri Robl
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Triada Trojan in WhatsApp MOD ∗∗∗
---------------------------------------------
We discovered that the Trojan Triada snook into one of modified versions of the WhatsApp messenger called FMWhatsapp 16.80.0 together with the advertising software development kit (SDK).
---------------------------------------------
https://securelist.com/triada-trojan-in-whatsapp-mod/103679/
∗∗∗ Effective Threat-Hunting Queries in a Redacted World ∗∗∗
---------------------------------------------
Chad Anderson, senior security researcher for DomainTools, demonstrates how seemingly disparate pieces of infrastructure information can form perfect fingerprints for tracking cyberattackers infrastructure.
---------------------------------------------
https://threatpost.com/effective-threat-hunting-queries/168864/
∗∗∗ Attackers Hunting For Twilio Credentials, (Tue, Aug 24th) ∗∗∗
---------------------------------------------
Twilio is a popular service used to send/receive SMS messages and phone calls.
---------------------------------------------
https://isc.sans.edu/diary/rss/27782
∗∗∗ Power-Apps-Portale von Microsoft: 38 Millionen Datensätze lagen offen ∗∗∗
---------------------------------------------
Sicherheitsforscher haben in Power-Apps-Portalen 38 Millionen Datensätze mit teils sensiblen Daten entdeckt – laut Microsoft aufgrund von Konfigurationsfehlern.
---------------------------------------------
https://heise.de/-6173306
∗∗∗ Vorsicht vor EU Compensation E-Mail! ∗∗∗
---------------------------------------------
Aktuell werden betrügerische E-Mails von „EU Compensation“ versendet. Eine ominöse europäische Behörde behauptet, Betrugsopfer mit einer hohen Geldsumme zu entschädigen.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-eu-compensation-e-mail/
∗∗∗ Ransomware Groups to Watch: Emerging Threats ∗∗∗
---------------------------------------------
Emerging ransomware groups to watch, according to Unit 42 researchers: AvosLocker, Hive Ransomware, HelloKitty and LockBit 2.0.
---------------------------------------------
https://unit42.paloaltonetworks.com/emerging-ransomware-groups/
∗∗∗ FBI sends its first-ever alert about a ‘ransomware affiliate’ ∗∗∗
---------------------------------------------
The US Federal Bureau of Investigations has published today its first-ever public advisory detailing the modus operandi of a "ransomware affiliate."
---------------------------------------------
https://therecord.media/fbi-sends-its-first-ever-alert-about-a-ransomware-a…
=====================
= Vulnerabilities =
=====================
∗∗∗ New zero-click iPhone exploit used to deploy NSO spyware ∗∗∗
---------------------------------------------
Digital threat researchers at Citizen Lab have uncovered a new zero-click iMessage exploit used to deploy NSO Groups Pegasus spyware on devices belonging to Bahraini activists.
---------------------------------------------
https://www.bleepingcomputer.com/news/apple/new-zero-click-iphone-exploit-u…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (ledgersmb, tnef, and tor), Fedora (nodejs-underscore and tor), openSUSE (aws-cli, python-boto3, python-botocore,, fetchmail, firefox, and isync), SUSE (aws-cli, python-boto3, python-botocore, python-service_identity, python-trustme, python-urllib3 and python-PyYAML), and Ubuntu (linux-aws-5.8, linux-azure-5.8, linux-gcp-5.8, linux-oracle-5.8).
---------------------------------------------
https://lwn.net/Articles/867247/
∗∗∗ [20210801] - Core - Insufficient access control for com_media deletion endpoint ∗∗∗
---------------------------------------------
https://developer.joomla.org/security-centre/861-20210801-core-insufficient…
∗∗∗ Security Bulletin: CVE-2020-2773 (deferred from Oracle Apr 2020 CPU) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cve-2020-2773-deferred-fr…
∗∗∗ Security Bulletin: Apache CXF (Publicly disclosed vulnerability) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-apache-cxf-publicly-discl…
∗∗∗ Security Bulletin: XStream (Publicly disclosed vulnerability) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-xstream-publicly-disclose…
∗∗∗ Security Bulletin: Multiple security vulnerabilities have been identified in IBM® Java SDK that affect IBM Security Directory Suite ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnera…
∗∗∗ Security Bulletin: Update Secure Gateway Client in IBM DataPower Gateway to address several CVEs ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-update-secure-gateway-cli…
∗∗∗ Security Bulletin: Vulnerabilities in IBM Java Runtime affect IBM Integration Bus and IBM App Connect Enterpise v11, v12 (CVE-2020-27221) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-ibm-ja…
∗∗∗ Security Bulletin: IBM Resilient Disaster Recovery (DR) system allows connections over TLS 1.0 (CVE-2021-29704) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-resilient-disaster-re…
∗∗∗ Security Bulletin: CVE-2020-14781 (deferred from Oracle Oct 2020 CPU for Java 8) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cve-2020-14781-deferred-f…
∗∗∗ OpenSSL: SM2 Decryption Buffer Overflow (CVE-2021-3711) ∗∗∗
---------------------------------------------
https://openssl.org/news/secadv/20210824.txt
∗∗∗ Overview of F5 vulnerabilities (August 2021) ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K50974556
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 20-08-2021 18:00 − Montag 23-08-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ ProxyShell: Massive Angriffswelle auf ungepatchte Exchange-Server ∗∗∗
---------------------------------------------
Die Lücken sind bekannt, Patches da - trotzdem sind tausende Exchange-Server angreifbar. Nun rollt eine massive Angriffswelle, die die Schwachstellen ausnutzt.
---------------------------------------------
https://heise.de/-6171597
∗∗∗ SynAck ransomware decryptor lets victims recover files for free ∗∗∗
---------------------------------------------
Emsisoft has released a decryptor for the SynAck Ransomware, allowing victims to decrypt their encrypted files for free.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/synack-ransomware-decryptor-…
∗∗∗ Kubernetes hardening: Drilling down on the NSA/CISA guidance ∗∗∗
---------------------------------------------
Kubernetes has become the de facto choice for container orchestration. Some studies report that up to 88% of organizations are using Kubernetes for their container orchestration needs and 74% of that occurring in production environments. That said, security remains a critical concern with as many as 94% of organizations reporting at least one security incident in their Kubernetes environments in the last 12 months.
---------------------------------------------
https://www.csoonline.com/article/3629049/kubernetes-hardening-drilling-dow…
∗∗∗ Gaming-related cyberthreats in 2020 and 2021 ∗∗∗
---------------------------------------------
In this report, you will find statistics and other information about gaming-related malware, phishing schemes and other threats in 2020 and the first half of 2021.
---------------------------------------------
https://securelist.com/game-related-cyberthreats/103675/
∗∗∗ Web Censorship Systems Can Facilitate Massive DDoS Attacks ∗∗∗
---------------------------------------------
Systems are ripe for abuse by attackers who can abuse systems to launch DDoS attacks.
---------------------------------------------
https://threatpost.com/censorship-systems-ddos-attacks/168853/
∗∗∗ Out of Band Phishing. Using SMS messages to Evade Network Detection, (Thu, Aug 19th) ∗∗∗
---------------------------------------------
Many companies have extensive security tools to monitor employee computers. But these precautions often fail for "out of band" access that uses cellular networks instead of Ethernet/WiFi networks. Our reader Isabella sent us this phishing email that they received: [...]
---------------------------------------------
https://isc.sans.edu/diary/rss/27768
∗∗∗ Researchers Detail Modus Operandi of ShinyHunters Cyber Crime Group ∗∗∗
---------------------------------------------
ShinyHunters, a notorious cybercriminal underground group thats been on a data breach spree since last year, has been observed searching companies GitHub repository source code for vulnerabilities that can be abused to stage larger scale attacks, an analysis of the hackers modus operandi has revealed.
---------------------------------------------
https://thehackernews.com/2021/08/researchers-detail-modus-operandi-of.html
∗∗∗ Details Disclosed for Critical Vulnerability in Sophos Appliances ∗∗∗
---------------------------------------------
Organizations using security appliances from Sophos have been advised to make sure their devices are up to date after a researcher disclosed the details of a critical vulnerability patched last year.
---------------------------------------------
https://www.securityweek.com/details-disclosed-critical-vulnerability-sopho…
∗∗∗ LockFile: Ransomware Uses PetitPotam Exploit to Compromise Windows Domain Controllers ∗∗∗
---------------------------------------------
Previously unseen ransomware hit at least 10 organizations in ongoing campaign.
---------------------------------------------
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lo…
=====================
= Vulnerabilities =
=====================
∗∗∗ Das Anstecken einer Razer-Maus macht Angreifer zu Windows-10-Admins ∗∗∗
---------------------------------------------
Eine Schwachstelle in der Konfigurationssoftware Synapse von Razer gefährdet Windows-PCs. Ein Sicherheitspatch steht noch aus.
---------------------------------------------
https://heise.de/-6171968
∗∗∗ Attackers Actively Exploiting Realtek SDK Flaws ∗∗∗
---------------------------------------------
Multiple vulnerabilities in software used by 65 vendors under active attack.
---------------------------------------------
https://threatpost.com/attackers-exploiting-realtek/168856/
∗∗∗ Top 15 Vulnerabilities Attackers Exploited Millions of Times to Hack Linux Systems ∗∗∗
---------------------------------------------
Close to 14 million Linux-based systems are directly exposed to the Internet, making them a lucrative target for an array of real-world attacks that could result in the deployment of malicious web shells, coin miners, ransomware, and other trojans. Thats according to an in-depth look at the Linux threat landscape published by U.S.-Japanese cybersecurity firm Trend Micro, detailing the top [...]
---------------------------------------------
https://thehackernews.com/2021/08/top-15-vulnerabilities-attackers.html
∗∗∗ Micropatching MSHTML Remote Code Execution Issue (CVE-2021-33742) ∗∗∗
---------------------------------------------
June 2021 Windows Updates brought a fix for CVE-2021-33742, a remote code execution in the MSHTML component, exploitable via Microsoft browsers and potentially other applications using this component, e.g. via a malicious Microsoft Word document. Discovery of this issue was attributed to Clément Lecigne of Google’s Threat Analysis Group, while Googles security researcher Maddie Stone wrote a detailed analysis.
---------------------------------------------
https://blog.0patch.com/2021/08/micropatching-mshtml-remote-code.html
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (ffmpeg, ircii, and scrollz), Fedora (kernel, krb5, libX11, and rust-actix-http), Mageia (kernel and kernel-linus), openSUSE (aspell, chromium, dbus-1, isync, java-1_8_0-openjdk, krb5, libass, libhts, libvirt, prosody, systemd, and tor), SUSE (cpio, dbus-1, libvirt, php7, qemu, and systemd), and Ubuntu (inetutils).
---------------------------------------------
https://lwn.net/Articles/867149/
∗∗∗ Planned Vembu Full Disclosure ∗∗∗
---------------------------------------------
If you are using Vembu BDR version 3.7.0, 3.9.1 Update 1, 4.2.0 or 4.2.0.1 and have your instances exposed to public internet, you are strongly advices to upgrade to Vembu BDR v4.2.0.2. On the 25th of August we plan to release the full details of the following CVEs: CVE-2021-26471, CVE-2021-26472, and CVE-2021-26473 All of these vulnerabilities are unauthenticated remote code execution vulnerabilities.
---------------------------------------------
https://csirt.divd.nl/2021/08/20/Planned-Vembu-Full-Disclosure/
∗∗∗ Security Bulletin: Vulnerabilities in IBM Java Runtime affect IBM Integration Bus and IBM App Connect Enterpise v11, v12 (CVE-2020-27221) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-ibm-ja…
∗∗∗ F-Secure Produkte: Schwachstelle ermöglicht Denial of Service ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0898
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 19-08-2021 18:00 − Freitag 20-08-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Securing Machine (Non-Human) Identities ∗∗∗
---------------------------------------------
We spend considerable time and focus on securing identities used by individuals and groups within our environment. While these are essential activities, we sometimes lose sight of a whole other set of identities, often highly privileged, that are just beneath the surface.
---------------------------------------------
https://www.beyondtrust.com/blog/entry/securing-machine-non-human-identities
∗∗∗ You can post LinkedIn jobs as almost ANY employer — so can attackers ∗∗∗
---------------------------------------------
Anyone can create a job listing on the leading recruitment platform LinkedIn on behalf of any employer—no verification needed. And worse, the employer cannot easily take these down.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/you-can-post-linkedin-jobs-a…
∗∗∗ Pegasus iPhone hacks used as lure in extortion scheme ∗∗∗
---------------------------------------------
A new extortion scam is underway that attempts to capitalize on the recent Pegasus iOS spyware attacks to scare people into paying a blackmail demand.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/pegasus-iphone-hacks-used-as…
∗∗∗ Waiting for the C2 to Show Up, (Fri, Aug 20th) ∗∗∗
---------------------------------------------
Keep this in mind: "Patience is key". Sometimes when you are working on a malware sample, you depend on online resources. I'm working on a classic case: a Powershell script decodes then injects a shellcode into a process.
---------------------------------------------
https://isc.sans.edu/diary/rss/27772
∗∗∗ Project Zero: Understanding Network Access in Windows AppContainers ∗∗∗
---------------------------------------------
Being able to bypass network restrictions in AppContainer sandboxes is interesting as it expands the attack surface available to the application, such as being able to access services on localhost, as well as granting access to intranet resources in an Enterprise.
---------------------------------------------
https://googleprojectzero.blogspot.com/2021/08/understanding-network-access…
∗∗∗ Gefährliche Liebschaften – Love Scammer brechen nicht nur Herzen ∗∗∗
---------------------------------------------
Mit diesen Maschen versuchen Online-Betrüger Geld aus der Partnersuche auf Dating-Plattformen herauszuschlagen.
---------------------------------------------
https://www.welivesecurity.com/deutsch/2021/08/19/gefaehrliche-liebschaften…
∗∗∗ How to install Frida into an Android application ∗∗∗
---------------------------------------------
On a recent job I was testing a rather interesting piece of technology that had several server side checks but they wanted to add some additional security on the client side.
---------------------------------------------
https://www.pentestpartners.com/security-blog/how-to-install-frida-into-an-…
∗∗∗ Unternehmen aufgepasst: Ignorieren Sie Fax von Branchen-Stadtplan! ∗∗∗
---------------------------------------------
UnternehmerInnen erhalten derzeit ein Fax von „Branchen-Stadtplan. Handel – Gewerbe – Industrie – Vereine & Co.“. Die Unternehmen werden aufgefordert ihre Firmendaten zu überprüfen oder zu ergänzen und das Fax unterschrieben zurückzusenden.
---------------------------------------------
https://www.watchlist-internet.at/news/unternehmen-aufgepasst-ignorieren-si…
∗∗∗ RansomClave project uses Intel SGX enclaves for ransomware attacks ∗∗∗
---------------------------------------------
Academics have developed a proof-of-concept ransomware strain that uses highly secure Intel SGX enclaves to hide and keep encryption keys safe from the prying eyes of security tools.
---------------------------------------------
https://therecord.media/ransomclave-project-uses-intel-sgx-enclaves-for-ran…
∗∗∗ Cloudflare says it mitigated a record-breaking 17.2M rps DDoS attack ∗∗∗
---------------------------------------------
Internet infrastructure company Cloudflare disclosed today that it mitigated the largest volumetric distributed denial of service (DDoS) attack that was recorded to date.
---------------------------------------------
https://therecord.media/cloudflare-says-it-mitigated-a-record-breaking-17-2…
∗∗∗ Mozi botnet gains the ability to tamper with its victims’ traffic ∗∗∗
---------------------------------------------
A new version of Mozi, a botnet that targets routers and IoT devices, is now capable of tampering with the web traffic of infected systems via techniques such as DNS spoofing and HTTP session hijacking, a capability that could be abused to redirect users to malicious sites.
---------------------------------------------
https://therecord.media/mozi-botnet-gains-the-ability-to-tamper-with-its-vi…
=====================
= Vulnerabilities =
=====================
∗∗∗ New unofficial Windows patch fixes more PetitPotam attack vectors ∗∗∗
---------------------------------------------
A second unofficial patch for the Windows PetitPotam NTLM relay attack has been released to fix further issues not addressed by Microsofts official security update.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-unofficial-windows-patch…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (libtpms and mingw-exiv2), openSUSE (389-ds, aspell, c-ares, fetchmail, firefox, go1.15, go1.16, haproxy, java-1_8_0-openjdk, krb5, libass, libmspack, libsndfile, openexr, php7, qemu, and tor), Oracle (compat-exiv2-023 and compat-exiv2-026), and SUSE (389-ds, aspell, djvulibre, fetchmail, firefox, go1.15, go1.16, java-1_8_0-openjdk, krb5, libass, libmspack, nodejs8, openexr, postgresql10, qemu, and spice-vdagent).
---------------------------------------------
https://lwn.net/Articles/866906/
∗∗∗ AVEVA SuiteLink Server ∗∗∗
---------------------------------------------
This advisory contains mitigations for Heap-based Buffer Overflow, Null Pointer Dereference, and Improper Handling of Exceptional Conditions vulnerabilities in AVEVA SuiteLink Server system management software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-231-01
∗∗∗ Security Bulletin: Vulnerabilities in IBM Java Runtime affect IBM Integration Bus and IBM App Connect Enterpise v11, v12 (CVE-2020-27221) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-ibm-ja…
∗∗∗ Synology-SA-21:23 ISC BIND ∗∗∗
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_21_23
∗∗∗ MISP: Schwachstelle ermöglicht SQL-Injection ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K21-0894
∗∗∗ Mehrere Schwachstellen in NetModule Router Software (NRSW) ∗∗∗
---------------------------------------------
https://sec-consult.com/de/vulnerability-lab/advisory/mehrere-schwachstelle…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 18-08-2021 18:00 − Donnerstag 19-08-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Cisco meldet gefährliche Remote-Angriffsmöglichkeiten auf Small Business-Router ∗∗∗
---------------------------------------------
Ein aktuelles Advisory von Cisco beschreibt eine kritische Sicherheitslücke, die mehrere Small Business-Router betrifft. Updates wird es nicht geben.
---------------------------------------------
https://heise.de/-6169343
∗∗∗ Ransomware-Attacken nehmen dramatisch zu ∗∗∗
---------------------------------------------
Mehr Ransomware-Angriffe, höhere Lösegeldforderungen und eine effizientere Verteilung - die Entwicklung der Datenerpressungsbranche ist besorgniserregend.
---------------------------------------------
https://heise.de/-6169583
∗∗∗ A Short History of Essay Spam (How We Got from Pills to Plagiarism) ∗∗∗
---------------------------------------------
>From answering beginner questions like 'What is SEO spam?' to breaking down the spammers' code and exactly how they hide their injections in compromised websites, we have written regularly about spam at Sucuri. If you’ve ever operated a WordPress website you will have certainly seen, at the very least, a litany of spam comments posted on your comments section.
---------------------------------------------
https://blog.sucuri.net/2021/08/a-short-history-of-essay-spam-how-we-got-fr…
∗∗∗ Oh, Behave! Figuring Out User Behavior ∗∗∗
---------------------------------------------
I decided to embark on a journey to understand user behavior without knowing exactly how I would gather details about user activity as a research topic. A major component of this research is finding a way to gather data on user behavior without making too much noise or triggering detections in a live environment.
---------------------------------------------
https://www.trustedsec.com/blog/oh-behave-figuring-out-user-behavior/
∗∗∗ How to spot a DocuSign phish and what to do about it ∗∗∗
---------------------------------------------
Phishing scammers love well known brand names, particularly if youre expecting to hear from them.
---------------------------------------------
https://blog.malwarebytes.com/social-engineering/2021/08/how-to-spot-a-docu…
∗∗∗ Health authorities in 40 countries targeted by COVID‑19 vaccine scammers ∗∗∗
---------------------------------------------
Fraudsters impersonate vaccine manufacturers and authorities overseeing vaccine distribution efforts, INTERPOL warns
---------------------------------------------
https://www.welivesecurity.com/2021/08/18/health-authorities-40-countries-t…
∗∗∗ CISA Provides Recommendations for Protecting Information from Ransomware-Caused Data Breaches ∗∗∗
---------------------------------------------
CISA has released the fact sheet Protecting Sensitive and Personal Information from Ransomware-Caused Data Breaches to address the increase in malicious cyber actors using ransomware to exfiltrate data and then threatening to sell or leak the exfiltrated data if the victim does not pay the ransom. These data breaches, often involving sensitive or personal information, can cause financial loss to the victim organization and erode customer trust.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/08/18/cisa-provides-rec…
∗∗∗ Cisco: Security devices are vulnerable to SNIcat data exfiltration technique ∗∗∗
---------------------------------------------
Networking equipment vendor Cisco said today that some of its security products fail to detect and stop traffic to malicious servers that abuse a technique called SNIcat to covertly steal data from inside corporate networks.
---------------------------------------------
https://therecord.media/cisco-security-devices-are-vulnerable-to-snicat-dat…
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Security Advisories 2021-08-18 ∗∗∗
---------------------------------------------
2 critical, 5 medium severity
---------------------------------------------
https://tools.cisco.com/security/center/Search.x?publicationTypeIDs=1&secur…
∗∗∗ SSA-816035: Code Execution Vulnerability in SINEMA Remote Connect Client ∗∗∗
---------------------------------------------
The latest update for SINEMA Remote Connect Client fixes a vulnerability that could allow a local attacker to escalate privileges or even allow remote code execution under certain circumstances.
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-816035.txt
∗∗∗ VMSA-2021-0017 ∗∗∗
---------------------------------------------
VMware Workspace ONE UEM console patches address a denial of service vulnerability (CVE-2021-22029)
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0017.html
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (exiv2, firefox, and thunderbird), Fedora (libsndfile, python-docx, and xscreensaver), openSUSE (haproxy), and SUSE (haproxy).
---------------------------------------------
https://lwn.net/Articles/866753/
∗∗∗ Positive Technologies helps to fix dangerous vulnerability in CODESYS ICS software ∗∗∗
---------------------------------------------
[...] This high-severity vulnerability (CVE-2021-36764) was discovered in the CODESYS V3 Runtime System software package (version 3.15.9.10). By exploiting it, an attacker can disable the PLC and disrupt the technological process. The vulnerability (NULL Pointer Dereference) was found in the CmpGateway component. An attacker with network access to the industrial controller can send a specially formed TCP packet and interrupt the operation of the PLC. Also, it has been found that this software contains another vulnerability (Local Privilege Escalation), which is currently being reviewed by the vendor.
---------------------------------------------
https://www.ptsecurity.com/ww-en/about/news/positive-technologies-helps-to-…
∗∗∗ Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0892
∗∗∗ Internet Systems Consortium BIND: Schwachstelle ermöglicht Denial of Service ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0890
∗∗∗ Kritische Schwachstellen in Altus Sistemas de Automacao Produkten ∗∗∗
---------------------------------------------
https://sec-consult.com/de/vulnerability-lab/advisory/kritische-schwachstel…
∗∗∗ Security Bulletin: IBM Cloud Pak for Multicloud Management Monitoring has applied security fixes for its use of Golang Go ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-multicl…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affects WebSphere Application Server July 2021 CPU that is bundled with IBM WebSphere Application Server Patterns ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple Vulnerabilities in IBM® Java SDK affect WebSphere Application Server July 2021 CPU ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: IBM Cloud Pak for Multicloud Management Monitoring has applied security fixes for its use of Apache HttpClient ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-multicl…
∗∗∗ Security Bulletin: Multiple vulnerabilities may affect IBM® SDK, Java™ Technology Edition ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Directory Server ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Linux kernel eBPF vulnerability CVE-2021-3490 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K43346111
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 17-08-2021 18:00 − Mittwoch 18-08-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Kritische Lücke in Blackberry QNX OS gefährdet medizinische Geräte ∗∗∗
---------------------------------------------
Blackberry hat in seinem Echtzeitbetriebssystem QNX einer gefährliche Schwachstelle geschlossen.
---------------------------------------------
https://heise.de/-6168793
∗∗∗ Kritische Sicherheitslücke: Angreifer könnten Millionen IoT-Geräte belauschen ∗∗∗
---------------------------------------------
Sicherheitsforscher warnen vor einer Schwachstelle, die etwa Millionen Babyphones und IP-Kameras gefährdet. Geräte lassen sich nicht ohne Weiteres schützen.
---------------------------------------------
https://heise.de/-6168381
∗∗∗ Fortinet: Wichtiges Sicherheitsupdate für FortiWeb OS in Vorbereitung ∗∗∗
---------------------------------------------
Für eine Lücke mit High-Einstufung liegt Exploit-Code vor, Fixes kommen aber erst Ende August. Betreiber von FortiWeb WAFs sollten Vorsichtsmaßnahmen treffen.
---------------------------------------------
https://heise.de/-6168205
∗∗∗ Vorsicht! Kostenloses Antivirenprogramm „Total AV“ entpuppt sich als Kostenfalle ∗∗∗
---------------------------------------------
Immer wieder melden uns verunsicherte LeserInnen das Antivirenprogramm „Total AV“. Der Grund dafür sind nicht-transparente Kosten sowie Probleme beim Kündigen des Abo-Vertrags. Gleichzeitig wird „Total AV“ auf vielen Seiten als das beste kostenlose Antivirenprogramm beworben. Wir haben uns das Programm genauer angesehen.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-kostenloses-antivirenprogra…
∗∗∗ Sicherheitswarnung für Synology DiskStation Manager und UC SkyNAS ∗∗∗
---------------------------------------------
Der Hersteller Synology hat eine Sicherheitswarnung für seinen DiskStation Manager (Version <6.2.4-25556-2 ; 7.0) herausgegeben. In der Firmware der Geräte gibt es gleich mehrere Sicherheitslücken. Gefährdet sind auch UC SkyNAS-Einheiten. Von Synology gibt es bereits erste Firmware-Updates. Von der Ransomware eCh0raix gibt es eine neue Variante, die einen neuen Bug in QNAP und Synology NAS Devices ausnutzen kann.
---------------------------------------------
https://www.borncity.com/blog/2021/08/18/sicherheitswarnung-fr-synology-dis…
∗∗∗ Diavol ransomware sample shows stronger connection to TrickBot gang ∗∗∗
---------------------------------------------
A new analysis of a Diavol ransomware sample shows a more clear connection with the gang behind the TrickBot botnet and the evolution of the malware.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/diavol-ransomware-sample-sho…
∗∗∗ Kerberos Authentication Spoofing: Don’t Bypass the Spec ∗∗∗
---------------------------------------------
Yaron Kassner, CTO at Silverfort, discusses authentication-bypass bugs in Cisco ASA, F5 Big-IP, IBM QRadar and Palo Alto Networks PAN-OS.
---------------------------------------------
https://threatpost.com/kerberos-authentication-spoofing/168767/
∗∗∗ 5 Things to Consider Before Moving Back to the Office, (Wed, Aug 18th) ∗∗∗
---------------------------------------------
Many readers will likely continue to enjoy working from home. Having not worked out of an office for about 20 years myself, I can certainly understand the appeal of working from home. But for some, this isn't an option and probably not even the preferred way to work. Having likely worked from home for over a year now, there are some things that you need to "readjust" as you are moving back.
---------------------------------------------
https://isc.sans.edu/diary/rss/27762
∗∗∗ Detecting Embedded Content in OOXML Documents ∗∗∗
---------------------------------------------
On Advanced Practices, we are always looking for new ways to find malicious activity and track adversaries over time. Today we’re sharing a technique we use to detect and cluster Microsoft Office documents - specifically those in the Office Open XML (OOXML) file format. Additionally, we’re releasing a tool so analysts and defenders can automatically generate YARA rules using this technique.
---------------------------------------------
https://www.fireeye.com/blog/threat-research/2021/08/detecting-embedded-con…
∗∗∗ WordPress Malware Camouflaged As Code ∗∗∗
---------------------------------------------
In today’s post we discuss emerging techniques that attackers are using to hide the presence of malware. In the example we discuss below, the attacker’s goal is to make everything look routine to an analyst so that they do not dig deeper and discover the presence of malware and what it is doing.
---------------------------------------------
https://www.wordfence.com/blog/2021/08/wordpress-malware-camouflaged-as-cod…
∗∗∗ IT Risk Team Discovers Previously Unknown Vulnerability in Autodesk Software During Client Penetration Test ∗∗∗
---------------------------------------------
During a recent client engagement, the DGC penetration testing team identified a previously unknown vulnerability affecting the Autodesk Licensing Service, a software component bundled with nearly all licensed Autodesk products. The vulnerability exists in a software component common to most Autodesk products and impacts nearly all organizations using licensed Autodesk software in any capacity.
---------------------------------------------
https://www.tripwire.com/state-of-security/security-data-protection/risk-te…
∗∗∗ Houdini Malware Returns and Amazons Sidewalk Enter Corporate Networks ∗∗∗
---------------------------------------------
The nature of a secure access service edge (SASE) platform provides visibility into a large number of internet data flows - and the larger the platform, the more dataflows can be analyzed. An analysis of more than 250 billion network flows during Q2 2021 shows increasing threats, a new use of an old malware, and the growing incidence of consumer devices in the workplace.
---------------------------------------------
https://www.securityweek.com/houdini-malware-returns-and-amazons-sidewalk-e…
∗∗∗ Breaking the Android Bootloader on the Qualcomm Snapdragon 660 ∗∗∗
---------------------------------------------
This post is a companion to the DEF CON 29 video available here. A few months ago I purchased an Android phone to do some research around a specific series [...]
---------------------------------------------
https://www.pentestpartners.com/security-blog/breaking-the-android-bootload…
∗∗∗ Dumpster diving is a filthy business ∗∗∗
---------------------------------------------
One man's trash is another man's treasure - here's why you should think twice about what you toss in the recycling bin
---------------------------------------------
https://www.welivesecurity.com/2021/08/17/dumpster-diving-is-filthy-busines…
∗∗∗ Cobalt Strike: Detect this Persistent Threat ∗∗∗
---------------------------------------------
Cobalt Strike is a penetration testing tool created by Raphael Mudge in 2012. To this day, it remains extremely popular in red team activities and used for malicious purposes by threat actors.
---------------------------------------------
https://www.intezer.com/blog/malware-analysis/cobalt-strike-detect-this-per…
=====================
= Vulnerabilities =
=====================
∗∗∗ Adobe sichert Photoshop & Co. außer der Reihe ab ∗∗∗
---------------------------------------------
Der Softwarehersteller Adobe schließt unter anderem in Bridge, Media Encoder und XMP Toolkit SDK Sicherheitslücken.
---------------------------------------------
https://heise.de/-6168132
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (haproxy), Fedora (c-ares, hivex, kernel, libtpms, newsflash, python-django, rust-gettext-rs, and rust-gettext-sys), openSUSE (c-ares and libsndfile), Scientific Linux (cloud-init, edk2, exiv2, firefox, kernel, kpatch-patch, microcode_ctl, sssd, and thunderbird), SUSE (c-ares, fetchmail, haproxy, kernel, libmspack, libsndfile, rubygem-puma, spice-vdagent, and webkit2gtk3), and Ubuntu (exiv2, haproxy, linux, linux-aws, linux-aws-5.4, linux-azure, [...]
---------------------------------------------
https://lwn.net/Articles/866669/
∗∗∗ ThroughTek Kalay P2P SDK ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Improper Access Control vulnerability in the ThroughTek Kalay P2P SDK software kit.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-229-01
∗∗∗ Advantech WebAccess/NMS ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Improper Authentication vulnerability in Advantech WebAccess/NMS network management systems.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-229-02
∗∗∗ xArrow SCADA ∗∗∗
---------------------------------------------
This advisory contains mitigations for Cross-site Scripting, and Improper Input Validation vulnerability in the xArrow SCADA human-machine interface.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-229-03
∗∗∗ Huawei EchoLife HG8045Q vulnerable to OS command injection ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN41646618/
∗∗∗ Firefox & Thunderbird: Security-Fixes für Browser und Mail-Client verfügbar ∗∗∗
---------------------------------------------
https://heise.de/-6168771
∗∗∗ glibc vulnerability CVE-2021-35942 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K98121587
∗∗∗ Atlassian Jira Software: Schwachstelle ermöglicht Offenlegung von Informationen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0880
∗∗∗ QEMU: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0885
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 16-08-2021 18:00 − Dienstag 17-08-2021 18:00
Handler: Dimitri Robl
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Malware dev infects own PC and data ends up on intel platform ∗∗∗
---------------------------------------------
A malware developer unleashed their creation on their system to try out new features and the data ended up on a cybercrime intelligence platform, exposing a glimpse of the cybercriminal endeavor.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/malware-dev-infects-own-pc-a…
∗∗∗ Copyright scammers turn to phone numbers instead of web links ∗∗∗
---------------------------------------------
Forewarned is forearmed. Here's our advice on dealing with "copyright infringement" scammers.
---------------------------------------------
https://nakedsecurity.sophos.com/2021/08/16/copyright-scammers-turn-to-phon…
∗∗∗ Laravel (<=v8.4.2) exploit attempts for CVE-2021-3129 (debug mode: Remote code execution), (Tue, Aug 17th) ∗∗∗
---------------------------------------------
The vulnerability and this PoC exploit are well documented as CVE-2021-3129. The vulnerability takes advantage of the Ignition "Solutions." Solutions enable the developer to inject code snippets to aid in debugging.
---------------------------------------------
https://isc.sans.edu/diary/rss/27758
∗∗∗ Vorsicht vor Fake-Zahlungsbestätigungen von Kriminellen auf bazar.at ∗∗∗
---------------------------------------------
Wer auf bazar.at Waren zum Verkauf anbietet, muss sich momentan vor kriminellen InteressentInnen in Acht nehmen! Diese fragen nach der Verfügbarkeit und behaupten, die Zahlung über bazar.at abzuwickeln. Achtung: bazar.at bietet keine solche Zahlungsart und die Bestätigungsseiten sind gefälscht!
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-fake-zahlungsbestaetigu…
∗∗∗ Thoughts on Detection ∗∗∗
---------------------------------------------
After helping with many clients with numerous detection rules, I observed one consistent theme that kept popping up, many of the rules were written in a way that seemed to be missing a large portion of the potential detection opportunities.
---------------------------------------------
https://posts.specterops.io/thoughts-on-detection-3c5cab66f511
∗∗∗ 1Password Secret Retrieval — Methodology and Implementation ∗∗∗
---------------------------------------------
1Password is a password manager developed by AgileBits Inc., providing a place for users to store various passwords, software licenses, and other sensitive information in a virtual vaults secured with a PBKDF2 master password.
---------------------------------------------
https://posts.specterops.io/1password-secret-retrieval-methodology-and-impl…
∗∗∗ Personal VPN and Its Evasions: Risk Factors and How to Maintain Network Visibility ∗∗∗
---------------------------------------------
Personal VPN usage on organizations’ networks can obscure network visibility and open the door to cybercrime such as data exfiltration.
---------------------------------------------
https://unit42.paloaltonetworks.com/person-vpn-network-visibility/
∗∗∗ ProxyShell in Österreich ∗∗∗
---------------------------------------------
In seinem Talk auf der BlackHat US 2021 stellte Sicherheitsforscher Orange Tsai eine weitere Kombination von Lücken vor, die es AngreiferInnen ermöglicht, beliebige Befehle als NT Authority\System über das Netzwerk auszuführen, ohne sich authentifizieren zu müssen.
---------------------------------------------
https://cert.at/de/aktuelles/2021/8/proxyshell-in-osterreich
∗∗∗ New HolesWarm botnet targets Windows and Linux servers ∗∗∗
---------------------------------------------
A new botnet named HolesWarm has been slowly growing in the shadows since June this year, exploiting more than 20 known vulnerabilities to break into Windows and Linux servers and then deploy cryptocurrency-mining malware.
---------------------------------------------
https://therecord.media/new-holeswarm-botnet-targets-windows-and-linux-serv…
=====================
= Vulnerabilities =
=====================
∗∗∗ Fortinet patches bug letting attackers takeover servers remotely ∗∗∗
---------------------------------------------
Fortinet has released security updates to address a command injection vulnerability that can let attackers take complete control of servers running vulnerable FortiWeb web application firewall (WAF) installations.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fortinet-patches-bug-letting…
∗∗∗ Security: Glibc-Bugfix machte Lücke einfacher ausnutzbar ∗∗∗
---------------------------------------------
Das Beheben von Sicherheitslücken ist nicht immer so einfach, wie es anfangs scheint, was nun auch das Team der Glibc erfahren musste.
---------------------------------------------
https://www.golem.de/news/security-glibc-bugfix-machte-luecke-einfacher-aus…
∗∗∗ ZDI-21-971: (Pwn2Own) Zoom Heap based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Zoom Clients. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-971/
∗∗∗ Sicherheitsupdate für Google Chrome beseitigt Angriffsmöglichkeiten ∗∗∗
---------------------------------------------
Für die Desktop-Fassungen des Chrome-Browsers (Win, macOS & Linux) ist eine Aktualisierung verfügbar, die mehrere Schwachstellen beseitigt.
---------------------------------------------
https://heise.de/-6167542
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (firefox), openSUSE (cpio and rpm), Oracle (compat-exiv2-026, exiv2, firefox, kernel, kernel-container, qemu, sssd, and thunderbird), Red Hat (cloud-init, edk2, kernel, kpatch-patch, microcode_ctl, and sssd), and SUSE (cpio, firefox, and libcares2).
---------------------------------------------
https://lwn.net/Articles/866567/
∗∗∗ Millions of IoT Devices Exposed to Attacks Due to Cloud Platform Vulnerability ∗∗∗
---------------------------------------------
Researchers at FireEye’s threat intelligence and incident response unit Mandiant have identified a critical vulnerability that exposes millions of IoT devices to remote attacks.
---------------------------------------------
https://www.securityweek.com/millions-iot-devices-exposed-attacks-due-cloud…
∗∗∗ iCloud for Windows 12.5 ∗∗∗
---------------------------------------------
https://support.apple.com/kb/HT212607
∗∗∗ Security Bulletin: Vulnerabilities in Node.js in IBM DataPower Gateway ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-node-j…
∗∗∗ Security Bulletin: IBM Security Privileged Identity Manager is affected by security vulnerabilities (CVE-2020-1971, CVE-2020-15999, CVE-2017-12652) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-privileged-i…
∗∗∗ Security Bulletin: IBM DataPower Gateway potentially vulnerable to CSRF attack ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-datapower-gateway-pot…
∗∗∗ Security Bulletin: IBM API Connect on cloud is impacted by HTTP header injection vulnerability (CVE-2020-4706) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-api-connect-on-cloud-…
∗∗∗ Security Bulletin: Prototype pollution flaw in y18n in IBM DataPower Gateway ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-prototype-pollution-flaw-…
∗∗∗ Security Bulletin: IBM API Connect is impacted by a vulnerability in Golang (CVE-2021-27919) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-api-connect-is-impact…
∗∗∗ Security Bulletin: Multiple vulnerabilities in AngularJS ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Potential DoS in IBM DataPower Gateway ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-potential-dos-in-ibm-data…
∗∗∗ Security Bulletin: IBM DataPower Gateway vulnerable to a DoS ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-datapower-gateway-vul…
∗∗∗ Synology-SA-21:22 DSM ∗∗∗
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_21_22
∗∗∗ Apache HTTP Server: Schwachstelle ermöglicht Denial of Service ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K21-0878
∗∗∗ Integer Overflow to RCE — ManageEngine Asset Explorer Agent (CVE-2021–20082) ∗∗∗
---------------------------------------------
https://medium.com/tenable-techblog/integer-overflow-to-rce-manageengine-as…
∗∗∗ Stored XSS to RCE Chain as SYSTEM in ManageEngine ServiceDesk Plus ∗∗∗
---------------------------------------------
https://medium.com/tenable-techblog/stored-xss-to-rce-chain-as-system-in-ma…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 13-08-2021 18:00 − Montag 16-08-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Keine Panik nach Ransomware-Angriff ∗∗∗
---------------------------------------------
Sieben Maßnahmen, die Opfer während oder nach einem erfolgreichen Ransomware-Angriff ergreifen sollten, schildert Daniel Clayton, Vice President of Global Services and Support bei Bitdefender, in einem Gastbeitrag.
---------------------------------------------
https://www.zdnet.de/88396234/keine-panik-nach-ransomware-angriff/
∗∗∗ USA: 100 Millionen T-Mobile-Kunden von Datenleck betroffen ∗∗∗
---------------------------------------------
Kriminelle haben Server von T-Mobile gehackt und umfangreiche Kundendaten kopiert. Diese bieten sie nun zum Verkauf an.
---------------------------------------------
https://www.golem.de/news/usa-100-millionen-t-mobile-kunden-von-datenleck-b…
∗∗∗ Microsoft Teams korrekt absichern – Teil 2 ∗∗∗
---------------------------------------------
Wie die Absicherung der beliebten Kollaborations-Software am besten gelingt, schildert Bert Skorupski, Senior Manager Sales Engineering bei Quest Software, im zweiten Teil seines Gastbeitrages.
---------------------------------------------
https://www.zdnet.de/88396232/microsoft-teams-korrekt-absichern-teil-2/
∗∗∗ Firewalls and middleboxes can be weaponized for gigantic DDoS attacks ∗∗∗
---------------------------------------------
In an award-winning paper today, academics said they discovered a way to abuse the TCP protocol, firewalls, and other network middleboxes to launch giant distributed denial of service (DDoS) attacks against any target on the internet.
---------------------------------------------
https://therecord.media/firewalls-and-middleboxes-can-be-weaponized-for-gig…
∗∗∗ The sextortion Scams: The Numbers Show That What We Have Is A Failure Of Education ∗∗∗
---------------------------------------------
Subject: Your account was under attack! Change your credentials! [...] Did you receive a message phrased more or less like that, which then went on to say that they have a video of you performing an embarrasing activity while visiting an "adult" site, which they will send to all your contacts unless you buy Bitcoin and send to a specific ID? The good news is that the video does not exist. I know this, because neither does our friend Adnan here.
---------------------------------------------
https://bsdly.blogspot.com/2020/02/the-sextortion-scams-numbers-show-that.h…
∗∗∗ Windows 365 exposes Microsoft Azure credentials in plaintext ∗∗∗
---------------------------------------------
A security researcher has figured out a way to dump a users unencrypted plaintext Microsoft Azure credentials from Microsofts new Windows 365 Cloud PC service using Mimikatz.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/windows-365-exposes-microso…
∗∗∗ Colonial Pipeline reports data breach after May ransomware attack ∗∗∗
---------------------------------------------
Colonial Pipeline, the largest fuel pipeline in the United States, is sending notification letters to individuals affected by the data breach resulting from the DarkSide ransomware attack that hit its network in May.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/colonial-pipeline-reports-da…
∗∗∗ Simple Tips For Triage Of MALWARE Bazaars Daily Malware Batches, (Sun, Aug 15th) ∗∗∗
---------------------------------------------
I was asked for tips to triage MALWARE Bazaar's daily malware batches. On Linux / macOS, you can unzip a malware batch and triage it with the file command. There is no file command on Windows, but there are Windows versions you can install, and you can also use my file-magic tool (it's a Python tool that uses Python module python-magic-bin).
---------------------------------------------
https://isc.sans.edu/diary/rss/27750
∗∗∗ Discovering CAPTCHA Protected Phishing Campaigns ∗∗∗
---------------------------------------------
CAPTCHA-protected phishing campaigns are becoming more popular. We share techniques to detect malicious content despite these evasions.
---------------------------------------------
https://unit42.paloaltonetworks.com/captcha-protected-phishing/
∗∗∗ Trickbot Deploys a Fake 1Password Installer ∗∗∗
---------------------------------------------
Over the past years, Trickbot has established itself as modular and multifunctional malware. Initially focusing on bank credential theft, the Trickbot operators have extended its capabilities.
---------------------------------------------
https://thedfirreport.com/2021/08/16/trickbot-deploys-a-fake-1password-inst…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security Advisories for COMMAX Products ∗∗∗
---------------------------------------------
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5667.phphttps://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5666.phphttps://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5665.phphttps://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5664.phphttps://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5663.phphttps://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5662.phphttps://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5661.phphttps://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5660.php
---------------------------------------------
https://www.zeroscience.mk/en/vulnerabilities/
∗∗∗ Advisory: Multiple Issues in Realtek SDK Affects Hundreds of Thousands of Devices Down the Supply Chain ∗∗∗
---------------------------------------------
At least 65 vendors affected by severe vulnerabilities that enable unauthenticated attackers to fully compromise the target device and execute arbitrary code with the highest level of privilege.
---------------------------------------------
https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot…
∗∗∗ XSS Vulnerability Patched in SEOPress Affects 100,000 sites ∗∗∗
---------------------------------------------
On July 29, 2021 the Wordfence Threat Intelligence team initiated the responsible disclosure process for a vulnerability that we discovered in SEOPress, a WordPress plugin installed on over 100,000 sites. This flaw made it possible for an attacker to inject arbitrary web scripts on a vulnerable site which would execute anytime a user accessed the [...]
---------------------------------------------
https://www.wordfence.com/blog/2021/08/xss-vulnerability-patched-in-seopres…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (c-ares, firefox, fossil, gitlab, jupyterlab, loki, lynx, opera, prosody, and vivaldi), Debian (amd64-microcode, exiv2, ffmpeg, thunderbird, and trafficserver), Fedora (libsndfile, rust-argh, rust-argh_derive, rust-argh_shared, rust-askalono-cli, rust-asyncgit, rust-bugreport, rust-crosstermion, rust-diskonaut, rust-dua-cli, rust-fancy-regex, rust-fedora-update-feedback, rust-filetreelist, rust-git-version, rust-git-version-macro, rust-gitui, [...]
---------------------------------------------
https://lwn.net/Articles/866473/
∗∗∗ PEPPERL+FUCHS: WirelessHART-Gateway - Vulnerability may allow remote attackers to cause a Denial Of Service ∗∗∗
---------------------------------------------
PEPPERL+FUCHS: Critical vulnerabilities have been discovered in the product and in the utilized components jQuery by jQuery Team and TLS Version 1.0/1.1.
---------------------------------------------
https://cert.vde.com/de-de/advisories/vde-2021-027
∗∗∗ Security Bulletin: Multiple Vulnerabilities in IBM® Java SDK affect WebSphere Application Server July 2021 CPU ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: IBM Transparent Cloud Tiering is affected by a vulnerability in Apache Commons IO ( CVE-2021-29425) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-transparent-cloud-tie…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 12-08-2021 18:00 − Freitag 13-08-2021 18:00
Handler: Dimitri Robl
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Angreifer kombinieren ProxyShell-Lücken und attackieren Microsoft Exchange ∗∗∗
---------------------------------------------
Nach gezielten Scans gibt es nun erste Attacken auf Exchange Server. In Deutschland gibt es tausende verwundbare Systeme. Patches sind verfügbar.
---------------------------------------------
https://heise.de/-6164957
∗∗∗ Unseriöse Shops kopieren Webseiten von beliebten Schuhmarken! ∗∗∗
---------------------------------------------
Wer Dr. Marten- oder Skecher-Schuhe in einem Online-Shop kaufen will, sollte sich vorher vergewissern, ob der Shop auch seriös ist. Denn derzeit werden der Watchlist Internet vermehrt Markenfälscher-Shops gemeldet, die unglaublich günstige Markenschuhe anbieten. Wenn das Impressum fehlt und die Schuhe zu unglaublichen Preisen angeboten werden, sollten Sie lieber Abstand von einem Einkauf nehmen.
---------------------------------------------
https://www.watchlist-internet.at/news/unserioese-shops-kopieren-webseiten-…
∗∗∗ SynAck ransomware releases decryption keys after El_Cometa rebrand ∗∗∗
---------------------------------------------
The SynAck ransomware gang released the master decryption keys for their operation after rebranding as the new El_Cometa group.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/synack-ransomware-releases-d…
∗∗∗ WordPress Sites Abused in Aggah Spear-Phishing Campaign ∗∗∗
---------------------------------------------
The Pakistan-linked threat groups campaign uses compromised WordPress sites to deliver the Warzone RAT to manufacturing companies in Taiwan and South Korea.
---------------------------------------------
https://threatpost.com/aggah-wordpress-spearphishing/168657/
∗∗∗ Example of Danabot distributed through malspam, (Fri, Aug 13th) ∗∗∗
---------------------------------------------
Danabot is an information stealer known for targeting banking data on infected Windows hosts. According to Proofpoint, Danabot version 4 started appearing in the wild in October 2020. We recently discovered a Danabot sample during an infection kicked off by an email attachment sent on Thursday 2021-08-12. Today's diary reviews this Danabot infection.
---------------------------------------------
https://isc.sans.edu/diary/rss/27744
∗∗∗ Using AI to Scale Spear Phishing ∗∗∗
---------------------------------------------
The problem with spear phishing it that it takes time and creativity to create individualized enticing phishing emails. Researchers are using GPT-3 to attempt to solve that problem: The researchers used OpenAI's GPT-3 platform in conjunction with other AI-as-a-service products focused on personality analysis to generate phishing emails tailored to their colleagues' backgrounds and traits.
---------------------------------------------
https://www.schneier.com/blog/archives/2021/08/using-ai-to-scale-spear-phis…
∗∗∗ Phishing campaign goes old school, dusts off Morse code ∗∗∗
---------------------------------------------
Sometimes new technology just doesnt get the job done.
---------------------------------------------
https://blog.malwarebytes.com/reports/2021/08/phishing-campaign-goes-old-sc…
∗∗∗ Examining threats to device security in the hybrid workplace ∗∗∗
---------------------------------------------
As employees split their time between office and off-site work, there's a greater potential for company devices and data to fall into the wrong hands
---------------------------------------------
https://www.welivesecurity.com/2021/08/12/examining-threats-device-security…
∗∗∗ Hackers tried to exploit two zero-days in Trend Micro's Apex One EDR platform ∗∗∗
---------------------------------------------
Cyber-security firm Trend Micro said hackers tried to exploit two zero-day vulnerabilities in its Apex One EDR platform in an attempt to go after its customers in attacks that took place earlier this year.
---------------------------------------------
https://therecord.media/hackers-tried-to-exploit-two-zero-days-in-trend-mic…
=====================
= Vulnerabilities =
=====================
∗∗∗ Drupal core - Moderately critical - Third-party libraries - SA-CORE-2021-005 ∗∗∗
---------------------------------------------
The Drupal project uses the CKEditor, library for WYSIWYG editing. CKEditor has released a security update that impacts Drupal. Vulnerabilities are possible if Drupal is configured to allow use of the CKEditor library for WYSIWYG editing.
---------------------------------------------
https://www.drupal.org/sa-core-2021-005
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (commons-io, curl, and firefox-esr), Fedora (perl-Encode), openSUSE (golang-github-prometheus-prometheus, grafana, and python-reportlab), Oracle (.NET Core 2.1, 389-ds:1.4, cloud-init, go-toolset:ol8, nodejs:12, nodejs:14, and rust-toolset:ol8), SUSE (aspell, firefox, kernel, and rpm), and Ubuntu (linux, linux-aws, linux-kvm, linux-lts-xenial and postgresql-10, postgresql-12, postgresql-13).
---------------------------------------------
https://lwn.net/Articles/866185/
∗∗∗ Cognex In-Sight OPC Server ∗∗∗
---------------------------------------------
This advisory contains mitigations for a Deserialization of Untrusted Data vulnerability in Cognex In-Sight OPC Server industrial software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-224-01
∗∗∗ Horner Automation Cscape ∗∗∗
---------------------------------------------
This advisory contains mitigations for Out-of-bounds Write, Access of Uninitialized Pointer, and Out-of-bounds Read vulnerabilities in Horner Automation Cscape control system application programming software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-224-02
∗∗∗ Sensormatic Electronics C-CURE 9000 (Update A) ∗∗∗
---------------------------------------------
This updated advisory is a follow-up to the original advisory titled ICSA-21-182-02 Sensormatic Electronics C-CURE 9000 that was published July 1, 2021, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for an Improper Input Validation vulnerability in Sensormatic Electronics C-CURE 9000 industrial software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-182-02
∗∗∗ Security Bulletin: De-serialization Vulnerability Affects IBM Partner Engagement Manager (CVE-2021-29781) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-de-serialization-vulnerab…
∗∗∗ Security Bulletin: IBM QRadar SIEM is vulnerable to possible information disclosure in a multi-domain deployment. (CVE-2021-29880) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-is-vulner…
∗∗∗ Security Bulletin: Vulnerability in self-service console affects IBM Cloud Pak System (CVE-2021-20478) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-self-ser…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 11-08-2021 18:00 − Donnerstag 12-08-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ PrintNightmare: Schon wieder eine Drucker-Lücke in Windows ohne Patch ∗∗∗
---------------------------------------------
Microsoft kriegt seine Druckerverwaltung offensichtlich nicht in den Griff, Angreifer könnten sich erneut System-Rechte verschaffen.
---------------------------------------------
https://heise.de/-6163743
∗∗∗ Accenture Opfer der Lockbit Ransomware ∗∗∗
---------------------------------------------
Das IT-Beratungsunternehmen Accenture ist wohl Opfer eines Cyber-Angriffs mit der Lockbit-Ransomware geworden. Das Unternehmen hat den Angriff inzwischen eingestanden. Bei dem Ransomware-Befall scheinen auch Daten abgezogen worden zu sein. Hier einige Informationen, was inzwischen bekannt ist.
---------------------------------------------
https://www.borncity.com/blog/2021/08/12/accenture-opfer-der-lockbit-ransom…
∗∗∗ QR Code Scammers Get Creative with Bitcoin ATMs ∗∗∗
---------------------------------------------
Threat actors are targeting everyone from job hunters to Bitcoin traders to college students wanting a break on their student loans, by exploiting the popular technologys trust relationship with users.
---------------------------------------------
https://threatpost.com/qr-code-scammers-bitcoin-atms/168621/
∗∗∗ 7 ways to harden your environment against compromise ∗∗∗
---------------------------------------------
Here at the global Microsoft Compromise Recovery Security Practice (CRSP), we work with customers who have experienced disruptive security incidents to restore trust in identity systems and remove adversary control. During 2020, the team responded to many incidents involving ransomware and the deployment of crypto-mining tools.
---------------------------------------------
https://www.microsoft.com/security/blog/2021/08/11/7-ways-to-harden-your-en…
∗∗∗ Best Practices for Web Form Security ∗∗∗
---------------------------------------------
Web form security — the set of tools and practices intended to protect web forms from attacks and abuse — is one of the most critical aspects of overall website security. Web forms allow users to interact with your site and enable a lot of useful functionality. However, once a user can interact with your site to do something useful there is a new attack surface for a hacker to exploit.
---------------------------------------------
https://blog.sucuri.net/2021/08/best-practices-for-web-form-security.html
∗∗∗ Experts Shed Light On New Russian Malware-as-a-Service Written in Rust ∗∗∗
---------------------------------------------
A nascent information-stealing malware sold and distributed on underground Russian underground forums has been written in Rust, signalling a new trend where threat actors are increasingly adopting exotic programming languages to bypass security protections, evade analysis, and hamper reverse engineering efforts.
---------------------------------------------
https://thehackernews.com/2021/08/experts-shed-light-on-new-russian.html
∗∗∗ Signed MSI files, Raccoon and Amadey are used for installing ServHelper RAT ∗∗∗
---------------------------------------------
Group TA505 has been active for at least seven years, making wide-ranging connections with other threat actors involved in ransomware, stealing credit card numbers and exfiltrating data. One of the common tools in TA505s arsenal is ServHelper.
---------------------------------------------
https://blog.talosintelligence.com/2021/08/raccoon-and-amadey-install-servh…
∗∗∗ Why No HTTPS? The 2021 Version ∗∗∗
---------------------------------------------
More than 3 years ago now, Scott Helme and I launched a little project called Why No HTTPS? It listed the worlds largest websites that didnt properly redirect insecure requests to secure ones. We updated it December before last and pleasingly, noted that more websites than [...]
---------------------------------------------
https://www.troyhunt.com/why-no-https-the-2021-version/
∗∗∗ August 2021 ICS Patch Tuesday: Siemens, Schneider Address Over 50 Flaws ∗∗∗
---------------------------------------------
Siemens and Schneider Electric on Tuesday released 18 security advisories addressing a total of more than 50 vulnerabilities affecting their products. The vendors have provided patches, mitigations, and general security recommendations for reducing the risk of attacks.
---------------------------------------------
https://www.securityweek.com/august-2021-ics-patch-tuesday-siemens-schneide…
∗∗∗ IISerpent: Malware‑driven SEO fraud as a service ∗∗∗
---------------------------------------------
The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites
---------------------------------------------
https://www.welivesecurity.com/2021/08/11/iiserpent-malware-driven-seo-frau…
∗∗∗ Affiliates Unlocked: Gangs Switch Between Different Ransomware Families ∗∗∗
---------------------------------------------
The demise of Sodinokibi has led to a surge in LockBit activity, while there’s evidence affiliates are using multiple ransomware families to achieve their goals.
---------------------------------------------
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ra…
∗∗∗ CobaltSpam tool can flood Cobalt Strike malware servers ∗∗∗
---------------------------------------------
A security researcher has published this week a tool to flood Cobalt Strike servers—often used by malware gangs—with fake beacons in order to corrupt their internal databases of infected systems.
---------------------------------------------
https://therecord.media/cobaltspam-tool-can-flood-cobalt-strike-malware-ser…
=====================
= Vulnerabilities =
=====================
∗∗∗ Intel schließt Sicherheitslücken in Laptops, Linux-Treibern & Co. ∗∗∗
---------------------------------------------
Angreifer könnten Intel-PCs attackieren und im schlimmsten Fall die volle Kontrolle über Computer erlangen. Sicherheitsupdates sind verfügbar.
---------------------------------------------
https://heise.de/-6163478
∗∗∗ JavaScript-Framework: Next.js 11.1 behebt eine Open-Redirect-Sicherheitslücke ∗∗∗
---------------------------------------------
Das React-Framework Next.js erhält knapp zwei Monate nach der letzten Hauptversion ein Update auf Version 11.1, um mögliche Open Redirects zu verhindern.
---------------------------------------------
https://heise.de/-6163575
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (java-1.8.0-openjdk), Debian (firefox-esr, libspf2, and openjdk-11-jre-dcevm), Fedora (bluez, fetchmail, and prosody), Oracle (edk2, glib2, kernel, and libuv), Red Hat (.NET Core 3.1), SUSE (cpio), and Ubuntu (firefox and openssh).
---------------------------------------------
https://lwn.net/Articles/866076/
∗∗∗ Plone vulnerable to open redirect ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN50804280/
∗∗∗ Security Bulletin: IBM Maximo Asset Management is vulnerable to CSV Injection (CVE-2021-20509) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-maximo-asset-manageme…
∗∗∗ Security Vulnerabilities fixed in Thunderbird 91 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2021-36/
∗∗∗ TRUMPF Laser GmbH: multiple products prone to codesys runtime vulnerabilities ∗∗∗
---------------------------------------------
https://cert.vde.com/de-de/advisories/vde-2021-033
∗∗∗ Node.js: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0866
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 10-08-2021 18:00 − Mittwoch 11-08-2021 18:00
Handler: Dimitri Robl
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Kaseyas universal REvil decryption key leaked on a hacking forum ∗∗∗
---------------------------------------------
The universal decryption key for REvils attack on Kaseyas customers has been leaked on hacking forums allowing researchers their first glimpse of the mysterious key.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/kaseyas-universal-revil-decr…
∗∗∗ New AdLoad malware variant slips through Apples XProtect defenses ∗∗∗
---------------------------------------------
A new AdLoad malware variant is slipping through Apples YARA signature-based XProtect built-in antivirus tech to infect Macs.
---------------------------------------------
https://www.bleepingcomputer.com/news/apple/new-adload-malware-variant-slip…
∗∗∗ TA551 (Shathak) continues pushing BazarLoader, infections lead to Cobalt Strike, (Wed, Aug 11th) ∗∗∗
---------------------------------------------
TA551 (also known as Shathak) represents a threat actor behind malspam that has pushed different families of malware over the past few years.
---------------------------------------------
https://isc.sans.edu/diary/rss/27738
∗∗∗ Das Conti-Leak: Bedienungsanleitung für Ransomware ∗∗∗
---------------------------------------------
In den Handbüchern für Affiliates beschreiben die Kriminellen minutiös, wie man ein Netz auskundschaftet, Zugang ausweitet und schließlich Daten verschlüsselt.
---------------------------------------------
https://heise.de/-6160551
∗∗∗ Anonym im Internet: Sicherheitsupdates für Tor Browser und Tails OS erschienen ∗∗∗
---------------------------------------------
Die Entwickler haben Komponenten von Tor Browser und Tails aktualisiert, um die Sicherheit aufrechtzuerhalten.
---------------------------------------------
https://heise.de/-6161195
∗∗∗ 5 Costly Mistakes in Cyber Incident Response Preparation ∗∗∗
---------------------------------------------
Even with the best preparation and retainers, incident response is rarely an inexpensive endeavor in terms of money, people, operational disruption, or time.
---------------------------------------------
https://www.dragos.com/blog/industry-news/5-costly-mistakes-in-cyber-incide…
∗∗∗ Conducting Architecture Reviews in Light of the New TSA Directives ∗∗∗
---------------------------------------------
TSA, the sector-specific agency for pipelines, released its first directive to the pipeline industry on May 27th and followed up with a second directive on July 20th.
---------------------------------------------
https://www.dragos.com/blog/industry-news/conducting-architecture-reviews-i…
∗∗∗ Why Are Ransomware Attacks Against OT Increasing? ∗∗∗
---------------------------------------------
Most discussions around cybersecurity understandably focus on information technology (IT). Assets like cloud services and data centers are typically what companies spend the most time and effort securing. Recently, though, operational technology (OT) has come under increasing scrutiny from leading security experts in both the private and public sectors.
---------------------------------------------
https://www.tripwire.com/state-of-security/ics-security/why-are-ransomware-…
∗∗∗ Hacker kapern Instagram-Profil und erpressen Opfer ∗∗∗
---------------------------------------------
BetrügerInnen haben es auf Instagram-Accounts mit vielen FollowerInnen abgesehen: Sie hacken deren Konten und verlangen anschließend Lösegeld. Wird nicht bezahlt, drohen die Hacker, das Profil zu löschen.
---------------------------------------------
https://www.watchlist-internet.at/news/hacker-kapern-instagram-profil-und-e…
=====================
= Vulnerabilities =
=====================
∗∗∗ VU#608209: NicheStack embedded TCP/IP has vulnerabilities ∗∗∗
---------------------------------------------
HCC Embeddeds software called InterNiche stack (NicheStack) and NicheLite, which provides TCP/IP networking capability to embedded systems, is impacted by multiple vulnerabilities.
---------------------------------------------
https://kb.cert.org/vuls/id/608209
∗∗∗ Patchday: Microsoft meldet abermals Attacken auf Windows ∗∗∗
---------------------------------------------
Es gibt wichtige Sicherheitsupdates für unter anderem kritische Lücken in Azure, Edge und verschiedenen Windows-Versionen.
---------------------------------------------
https://heise.de/-6160526
∗∗∗ Free Micropatches for "PetitPotam" (CVE-2021-36942) ∗∗∗
---------------------------------------------
Update 8/11/2021-B: Neither Microsofts August fix nor our micropatch seem to have covered all PetitPotam affected code. Both fixed the anonymous attack vector but we're investigating additional authenticated paths now and looking for the best way to patch that too.
---------------------------------------------
https://blog.0patch.com/2021/08/free-micropatches-for-petitpotam.html
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (ceph), Fedora (buildah, containernetworking-plugins, and podman), openSUSE (chromium, kernel, php7, python-CairoSVG, python-Pillow, seamonkey, and transfig), Red Hat (microcode_ctl), SUSE (kernel and libcares2), and Ubuntu (c-ares).
---------------------------------------------
https://lwn.net/Articles/865978/
∗∗∗ Intel Releases Multiple Security Updates ∗∗∗
---------------------------------------------
Intel has released security updates to address vulnerabilities multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/08/10/intel-releases-mu…
∗∗∗ iTunes 12.11.4 for Windows ∗∗∗
---------------------------------------------
https://support.apple.com/kb/HT212609
∗∗∗ Security Bulletin: IBM Security Guardium is affected by an Improper Restriction of Excessive Authentication Attempts vulnerability (CVE-2021-20427) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by an OpenLDAP vulnerability (CVE-2020-25692) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Disconnected Log Collector is vulnerable to using components with known vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-disconnected-log-coll…
∗∗∗ Security Bulletin: Vulnerability in npm affects IBM VM Recovery Manager DR ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-npm-affe…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a Reliance on Untrusted Inputs in Security Descision ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a Weak Password Policy vulnerability (CVE-2021-20418) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: A vulnerability was identified and remediated in the IBM MaaS360 Cloud Extender (V2.103.000.051) and Modules ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-was-ident…
∗∗∗ VMSA-2021-0016 ∗∗∗
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0016.html
∗∗∗ AMD Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K21-0852
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 09-08-2021 18:00 − Dienstag 10-08-2021 18:00
Handler: Dimitri Robl
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ eCh0raix ransomware now targets both QNAP and Synology NAS devices ∗∗∗
---------------------------------------------
A newly discovered eCh0raix ransomware variant has added support for encrypting both QNAP and Synology Network-Attached Storage (NAS) devices.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/ech0raix-ransomware-now-targ…
∗∗∗ Team Cymru’s Threat Hunting Maturity Model Explained ∗∗∗
---------------------------------------------
In this four part series we’ll be looking at Team Cymru’s Threat Hunting Maturity Model.
---------------------------------------------
https://team-cymru.com/blog/2021/08/09/team-cymrus-threat-hunting-maturity-…
∗∗∗ Chaos Malware Walks Line Between Ransomware and Wiper ∗∗∗
---------------------------------------------
The dangerous malware has been rapidly developed since June and could be released into the wild soon.
---------------------------------------------
https://threatpost.com/chaos-malware-ransomware-wiper/168520/
∗∗∗ Vulnerability Management Resources ∗∗∗
---------------------------------------------
SANS Vulnerability Management Resources collected in one place for easy access.
---------------------------------------------
https://www.sans.org/blog/vulnerability-management-resources
∗∗∗ XLSM Malware with MacroSheets ∗∗∗
---------------------------------------------
Excel-based malware has been around for decades and has been in the limelight in recent years.
---------------------------------------------
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/xlsm-malware-with-macr…
∗∗∗ Gefälschtes E-Mail der Post im Umlauf ∗∗∗
---------------------------------------------
Sie warten auf ein Paket? Dann nehmen Sie sich vor gefälschten Benachrichtigungen der Post in Acht. BetrügerInnen behaupten in einer E-Mail, dass Ihr Paket nicht zugestellt werden konnte und Sie über einen Link einen weiteren Zustellversuch anfordern müssen.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschtes-e-mail-der-post-im-umla…
=====================
= Vulnerabilities =
=====================
∗∗∗ Root-Lücke in VPN-Lösung Pulse Connect Secure als Schadcode-Schlupfloch ∗∗∗
---------------------------------------------
Ein wichtiges Sicherheitsupdates schließt Schwachstellen in der Fernzugriff-Software Pulse Connect Secure.
---------------------------------------------
https://heise.de/-6159492
∗∗∗ Firefox und Firefox ESR gegen verschiedene Attacken abgesichert ∗∗∗
---------------------------------------------
Mozilla hat mehrere Sicherheitslücken in seinem Webbrowser Firefox geschlossen.
---------------------------------------------
https://heise.de/-6160037
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (flatpak and microcode_ctl), Debian (c-ares, lynx, openjdk-8, and tomcat9), Fedora (kernel), openSUSE (apache-commons-compress, aria2, djvulibre, fastjar, kernel, libvirt, linuxptp, mysql-connector-java, nodejs8, virtualbox, webkit2gtk3, and wireshark), Oracle (kernel, kernel-container, and microcode_ctl), Red Hat (glib2, kernel, kernel-rt, kpatch-patch, and rust-toolset-1.52 and rust-toolset-1.52-rust), Scientific Linux (microcode_ctl), [...]
---------------------------------------------
https://lwn.net/Articles/865872/
∗∗∗ Adobe Releases Security Updates for Multiple Products ∗∗∗
---------------------------------------------
Adobe has released security updates to address vulnerabilities in multiple Adobe products.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/08/10/adobe-releases-se…
∗∗∗ WordPress Plugin "Quiz And Survey Master" vulnerable to cross-site scripting ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN65388002/
∗∗∗ SSA-938030: DGN and PAR File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2.0.2 ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-938030.txt
∗∗∗ SSA-865327: Incorrect Authorization Vulnerability in Industrial Products ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-865327.txt
∗∗∗ SSA-830194: Missing Authentication Vulnerability in S7-1200 Devices ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-830194.txt
∗∗∗ SSA-818688: Multiple Vulnerabilities in Solid Edge before SE2021MP7 ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-818688.txt
∗∗∗ SSA-756744: OS Command Injection Vulnerability in SINEC NMS ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-756744.txt
∗∗∗ SSA-679335: Multiple Vulnerabilities in Embedded FTP Server of SIMATIC NET CP Modules ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-679335.txt
∗∗∗ SSA-553445: DNS "Name:Wreck" Vulnerabilities in Multiple Siemens Energy AGT and SGT solutions ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-553445.txt
∗∗∗ SSA-365397: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2.0.1 ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-365397.txt
∗∗∗ SSA-309571: IPU 2021.1 Vulnerabilities in Siemens Industrial Products using Intel CPUs (June 2021) ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-309571.txt
∗∗∗ SSA-158827: Denial-of-Service Vulnerability in Automation License Manager ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-158827.txt
∗∗∗ Security Bulletin: A vulnerability in glibc impacts IBM Watson™ Speech Services ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-glibc-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a jackson-databind vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a kernel vulnerability (CVE-2020-25705, CVE-2020-28374) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: A Vulnerability in IBM Java Runtime Affects IBM Sterling Connect:Direct File Agent ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-ibm-ja…
∗∗∗ Security Bulletin: IBM Planning Analytics Spreadsheet Services is affected by security vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-planning-analytics-sp…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a Spring Framework vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by a Oracle MySQL vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: Vulnerability in self-service console affects IBM Cloud Pak System (CVE-2021-20478) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-self-ser…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by multiple vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ XSA-357 ∗∗∗
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-357.html
∗∗∗ TYPO3 Core: Schwachstelle ermöglicht Cross-Site Scripting ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K21-0842
∗∗∗ SAP Patchday August 2021: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K21-0847
∗∗∗ Citrix ShareFile storage zones controller security update ∗∗∗
---------------------------------------------
https://support.citrix.com/article/CTX322787
∗∗∗ XML External Entity Expansion in MobileTogether Server ∗∗∗
---------------------------------------------
https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-002/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily