[CERT-daily] Tageszusammenfassung - 01.04.2021

Daily end-of-shift report team at cert.at
Thu Apr 1 18:51:45 CEST 2021


=====================
= End-of-Day report =
=====================

Timeframe:   Mittwoch 31-03-2021 18:00 − Donnerstag 01-04-2021 18:00
Handler:     Stephan Richter
Co-Handler:  n/a

=====================
=       News        =
=====================

∗∗∗ Sicherheitslücke: Datenleck bei Ubiquiti war deutlich umfassender ∗∗∗
---------------------------------------------
Laut einem Bericht konnten die Angreifer auf Quellcode und Credentials von Ubiquiti zugreifen. Der Netzwerkgerätehersteller widerspricht nicht.
---------------------------------------------
https://www.golem.de/news/sicherheitsluecke-datenleck-bei-ubiquiti-war-deutlich-umfassender-2104-155440-rss.html


∗∗∗ Who Contains the Containers? ∗∗∗
---------------------------------------------
This is a short blog post about a research project I conducted on Windows Server Containers that resulted in four privilege escalations which Microsoft fixed in March 2021. In the post, I describe what led to this research, my research process, and insights into what to look for if you’re researching this area.
---------------------------------------------
https://googleprojectzero.blogspot.com/2021/04/who-contains-containers.html


∗∗∗ Changes in Sinkhole and Honeypot Report Types and Formats ∗∗∗
---------------------------------------------
Over the years, Shadowserver’s report list has grown considerably from when we originally started. When some of these reports were originally set up, the requirements were different to those needed today. We have therefore decided to implement changes with some of the existing report types, especially those related to our sinkholes and honeypots, as well as remove some legacy reports. Changes will come into effect on 2021-06-01.
---------------------------------------------
https://www.shadowserver.org/news/changes-in-sinkhole-and-honeypot-report-types-and-formats/


∗∗∗ The Importance of Website Backups ∗∗∗
---------------------------------------------
Today is World Backup Day. This date was created to remind people of the importance of having backups set up for everything that matters. I am pretty sure your website falls into the category of precious digital assets
---------------------------------------------
https://blog.sucuri.net/2021/03/the-importance-of-website-backups.html


∗∗∗ Back in a Bit: Attacker Use of the Windows Background IntelligentTransfer Service ∗∗∗
---------------------------------------------
Microsoft introduced the Background Intelligent Transfer Service (BITS) with Windows XP to simplify and coordinate downloading and uploading large files. Applications and system components, most notably Windows Update, use BITS to deliver operating system and application updates so they can be downloaded with minimal user disruption. [...] As is the case with many technologies, BITS can be used both by legitimate applications and by attackers. When malicious applications create BITS jobs, files are downloaded or uploaded in the context of the service host process. This can be useful for evading firewalls that may block malicious or unknown processes, and it helps to obscure which application requested the transfer.
---------------------------------------------
https://www.fireeye.com/blog/threat-research/2021/03/attacker-use-of-windows-background-intelligent-transfer-service.html


∗∗∗ DoS-Lücke in Virtualisierungsplattform Citrix Hypervisor geschlossen ∗∗∗
---------------------------------------------
Abgesicherte Versionen von Citrix Hypervisor verhindern Zugriffe auf Host-Systeme.
---------------------------------------------
https://heise.de/-6003757


∗∗∗ Report: USB threats to ICS systems have nearly doubled ∗∗∗
---------------------------------------------
The latest Honeywell USB Threat Report 2020 indicates that the number of threats specifically targeting Operational Technology systems has nearly doubled from 16% to 28%, while the number of threats capable of disrupting those systems rose from 26% to 59% over the same period.
---------------------------------------------
https://www.tripwire.com/state-of-security/ics-security/report-usb-threats-to-ics-systems-have-nearly-doubled/


∗∗∗ Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations. (arXiv:2103.17028v1 [cs.CR]) ∗∗∗
---------------------------------------------
The number of cyber attacks has increased tremendously in the last few years. This resulted into both human and financial losses at the individual and organization levels. Recently, cyber-criminals are leveraging new skills and capabilities by employing anti-forensics activities, techniques and tools to cover their tracks and evade any possible detection. ---------------------------------------------
http://arxiv.org/abs/2103.17028


∗∗∗ Is your dishwasher trying to kill you? ∗∗∗
---------------------------------------------
Does every device in your home really need to be connected to the internet? And could it be turned against you?
---------------------------------------------
https://www.welivesecurity.com/2021/04/01/is-your-dishwasher-trying-kill-you/


∗∗∗ CISA Releases Supplemental Direction on Emergency Directive for Microsoft Exchange Server Vulnerabilities ∗∗∗
---------------------------------------------
CISA has issued supplemental direction to Emergency Directive (ED) 21-02: Mitigate Microsoft Exchange On-Premises Product Vulnerabilities providing additional forensic triage and server hardening, requirements for federal agencies. Specifically, this update directs federal departments and agencies to run newly developed tools - Microsoft’s Test-ProxyLogon.ps1 script and Safety Scanner MSERT - to investigate whether their Microsoft Exchange [...]
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/03/31/cisa-releases-supplemental-direction-emergency-directive-microsoft



=====================
=  Vulnerabilities  =
=====================

∗∗∗ ZDI-21-399: (0Day) D-Link DIR-882 HNAP Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-882 routers. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-399/


∗∗∗ Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021 ∗∗∗
---------------------------------------------
On March 25, 2021, the OpenSSL Project released a security advisory, OpenSSL Security Advisory [25 March 2021], that disclosed two vulnerabilities. Exploitation of these vulnerabilities could allow an attacker to use a valid non-certificate authority (CA) certificate to act as a CA and sign a certificate for an arbitrary organization, user or device, or to cause a denial of service (DoS) condition.This advisory will be updated as additional information becomes available.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd


∗∗∗ Cisco IOS XE Software Fast Reload Vulnerabilities ∗∗∗
---------------------------------------------
Version: 1.1 
Description: Added Catalyst 3650 switches as affected products.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5


∗∗∗ SECURITY BULLETIN: March 2021 Security Bulletin for Trend Micro Apex One and Apex One as a Service ∗∗∗
---------------------------------------------
Trend Micro has released new patches for Trend Micro Apex One (On Premise) and Apex One as a Service (SaaS). These patches resolve multiple vulnerabilities related to improper access control and incorrect permission assignment privilege escalation as well as insecure file permissions.
---------------------------------------------
https://success.trendmicro.com/solution/000286019


∗∗∗ VMSA-2021-0005 ∗∗∗
---------------------------------------------
VMware Carbon Black Cloud Workload appliance update addresses incorrect URL handling vulnerability (CVE-2021-21982)
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0005.html


∗∗∗ VMSA-2021-0004.1 - VMware vRealize Operations updates address Server Side Request Forgery and Arbitrary File Write vulnerabilities (CVE-2021-21975, CVE-2021-21983) ∗∗∗
---------------------------------------------
2021-03-31: VMSA-2021-0004.1 - Updated advisory with information on vROps 7.0.0 workarounds.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0004.html


∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (underscore), Fedora (busybox, linux-firmware, and xmlgraphics-commons), Oracle (kernel and kernel-container), Slackware (curl and seamonkey), SUSE (firefox and opensc), and Ubuntu (spamassassin).
---------------------------------------------
https://lwn.net/Articles/851381/


∗∗∗ Rockwell Automation FactoryTalk AssetCentre ∗∗∗
---------------------------------------------
This advisory contains mitigations for OS Command Injection, Deserialization of Untrusted Data, SQL Injection, and Improperly Restricted Functions vulnerabilities in Rockwell Automation FactoryTalk AssetCentre automation software products.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-091-01


∗∗∗ Security Advisory - Out of Bounds Write Vulnerability in Huawei Smartphone ∗∗∗
---------------------------------------------
https://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20210331-01-p30-en


∗∗∗ Security Advisory - Arbitrary Memory Write Vulnerability in Huawei Smart Phone ∗∗∗
---------------------------------------------
https://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20210331-01-smartphone-en


∗∗∗ March 31, 2021   TNS-2021-06   [R1] Tenable.sc 5.18.0 Fixes One Third-party Vulnerability ∗∗∗
---------------------------------------------
https://www.tenable.com/security/tns-2021-06


∗∗∗ Atlassian Jira Software: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0334

-- 
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily




More information about the Daily mailing list