CERT-Bund · @certbund
1712 followers · 24 posts · Server social.bund.de

Eine im Entpacken von Archiven in WinRAR wurde von Angreifenden ausgenutzt, um Schadware zu verbreiten. Das Öffnen sowie Extrahieren von nicht vertrauenswürdigen Dateien stellt eine Gefahr dar. Die Schwachstellen wurden geschlossen.
heise.de/news/WinRAR-Luecke-we

#schwachstelle #PatchNOW

Last updated 2 years ago

AKG_de_IT · @MK
117 followers · 1692 posts · Server troet.cafe

RT @certbund: Eine Schwachstelle im Entpacken von Archiven in WinRAR wurde von Angreifenden ausgenutzt, um Schadware zu verbreiten. Das Öffnen sowie Extrahieren von nicht vertrauenswürdigen Dateien stellt eine Gefahr dar. Die Schwachstellen wurden geschlossen.
t.co/picO6CyHiy

#PatchNOW

Last updated 2 years ago

CERT-Bund · @certbund
1453 followers · 17 posts · Server social.bund.de

❗️ ❗️
In Microsoft Office gibt es eine , zu der bislang kein Patch zur Verfügung steht. Weitere aktiv ausgenutzte Sicherheitslücken wurden mit dem Juli von Microsoft geschlossen.
bsi.bund.de/SharedDocs/Cybersi

#CERTWarnung #zeroday #schwachstelle #patchday #PatchNOW

Last updated 2 years ago

CERT-Bund · @certbund
1368 followers · 14 posts · Server social.bund.de

In dem Datenübertragunsdienst MOVEit befindet sich erneut eine kritische . Der Hersteller arbeitet an einem Update, solange wird empfohlen den HTTP(s) Verkehr zur MOVEit-Umgebung als Workaround zu blockieren.
Weitere Informationen: community.progress.com/s/artic

#schwachstelle #PatchNOW

Last updated 2 years ago

CERT-Bund · @certbund
1366 followers · 11 posts · Server social.bund.de

❗️ ❗️
Mit dem Juni schließt Microsoft wieder zahlreiche Sicherheitslücken. Von besonderer Relevanz für Organisationen könnte dabei eine kritische in SharePoint Server sein bsi.bund.de/SharedDocs/Cybersi

#CERTWarnung #patchday #schwachstelle #PatchNOW

Last updated 2 years ago

CERT-Bund · @certbund
1312 followers · 8 posts · Server social.bund.de

❗️ ❗️
In
@Cisco
Switches wurden mehrere kritische geschlossen, zu denen bereits PoC Exploit-Code existiert
Einige EoL-Produkte erhalten aber keine Patches mehr - vom Einsatz raten wir ab!
Mehr Infos: bsi.bund.de/SharedDocs/Cybersi

#CERTWarnung #schwachstellen #PatchNOW

Last updated 2 years ago

iCyberFighter · @iCyberFighter
325 followers · 325 posts · Server infosec.exchange

[] Microsoft has released a patch for a critical elevation of privilege that has purportedly been used by threat actors linked to Russian Military Intelligence to compromise multiple European organizations over the past year.

According to Microsoft, "The attacker could exploit this vulnerability by sending a specially crafted email which triggers automatically when it is retrieved and processed by the Outlook client. This could lead to exploitation BEFORE the email is viewed in the Preview Pane."

(External attackers could send specially crafted emails that will cause a connection from the victim to an external UNC location of attackers' control. This will leak the Net-NTLMv2 hash of the victim to the attacker who can then relay this to another service and authenticate as the victim.)

All supported versions of Microsoft for Windows are vulnerable. Online versions of Microsoft Outlook such as Android, iOS, Mac, as well as Outlook on the web and other M365 services are not affected.

There is a script to help determine if your organization was targeted by actors attempting to use this vulnerability.

Bottom line: Test and patch this ASAP if your org uses Outlook.

Links to more info: exchange.xforce.ibmcloud.com/v

msrc.microsoft.com/update-guid

#PatchNOW #zeroday #vulnerability #outlook #ntlmrelay #passthehash

Last updated 2 years ago

CERT-Bund · @certbund
1187 followers · 2 posts · Server social.bund.de

❗️ ❗️
Im Rahmen des März-Patchdays hat unter anderem eine bereits ausgenutzte Schwachstelle in geschlossen. Diese könnte für NTLM-Relay Angriffe missbraucht werden: bsi.bund.de/SharedDocs/Cybersi

Zeit für einen Wechsel zu Kerberos.

#CERTWarnung #microsoft #outlook #PatchNOW

Last updated 2 years ago

CTIN · @ctin
203 followers · 384 posts · Server infosec.exchange
An exploit of the ZK Framework | #PatchNOW | https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw/

#PatchNOW

Last updated 3 years ago

on Monday rolled out security updates for iOS, iPadOS, macOS, and Safari to address a flaw that it said has been actively exploited in the wild.

Tracked as CVE-2023-23529, the issue relates to a type confusion bug in the browser engine that could be activated when processing maliciously crafted web content, culminating in arbitrary code execution.

thehackernews.com/2023/02/patc

#PatchNOW #apple #zeroday #webkit #cybersecurity #infosec

Last updated 3 years ago

iCyberFighter · @iCyberFighter
284 followers · 242 posts · Server infosec.exchange

[] [Vuln] Critical Vulnerabilities in Aria Operations for Logs: VMware released software to remediate four security vulnerabilities affecting Log Insight (aka for Logs) that could expose users to remote code execution attacks.

Tracked as CVE-2022-31706 and CVE-2022-31704, the directory traversal and broken access control issues could be exploited by a threat actor to achieve remote code execution irrespective of the difference in the attack pathway.

thehackernews.com/2023/01/vmwa |

#fysa #vmware #vrealize #ariaoperations #infosec #patchmanagement #PatchNOW #vulnerabilitymanagement

Last updated 3 years ago

iCyberFighter · @iCyberFighter
271 followers · 211 posts · Server infosec.exchange

🚀​January 2023 Patch Tuesday addresses a massive 98 fixes!! That included 2 flaws but only one of them is known to be actively exploited, which is the critical Windows flaw, tracked as CVE-2023-21674. This flaw allows an attacker with local privileges to elevate to system, the highest level of privileges. It has a CVSSv3 severity score of 8.8 out of 10. zdnet.com/article/microsofts-f |

#zeroday #infosec #patchtuesday #PatchNOW #cybersecurity #patchmanagement

Last updated 3 years ago

ToolsWatch · @toolswatch
-1 followers · 10 posts · Server infosec.exchange

[WARNING] Unauthenticated remote arbitrary code execution in Application Delivery Controller (ADC) and Gateway (CVE-2022-27518) is widely exploited !!!

#citrix #PatchNOW

Last updated 3 years ago

Bob Carver · @cybersecboardrm
44 followers · 38 posts · Server infosec.exchange

Samba has released software updates to remediate multiple vulnerabilities that, if successfully exploited, could allow an attacker to take control of affected systems. thehackernews.com/2022/12/samb

#cybersecurity #samba #PatchNOW

Last updated 3 years ago

🚨VPN and Remote Access solutions by Fortinet and Citrix are being actively targeted again. Check out our new advisory + how we recently handled similar cases: secuinfra.com/en/techtalk/vera
, before Christmas 🎅

#PatchNOW

Last updated 3 years ago

iCyberFighter · @iCyberFighter
246 followers · 153 posts · Server infosec.exchange

[] [] [] Back in September 2022 a critical Microsoft vulnerability in the SPNEGO Extended Negotiation () Security Mechanism was disclosed.

Most recently, IBM X-Force Security Researcher, Valentina Palmiotti (@chompie), discovered that exploitation of this vulnerability could allow an attacker to remotely execute arbitrary code.

Due to that discovery, Microsoft has now classified this vulnerability as “Critical.” Test and patch ASAP. Original CVE: CVE-2022-37958 | cve.mitre.org/cgi-bin/cvename.

#vuln #spengo #PatchNOW #negoex

Last updated 3 years ago

Ab5al0m · @Ab5al0m
10 followers · 52 posts · Server noc.social

Seems like this community is way more Information Technology (IT) savvy than folks in the Twitter space. But, just in case - it's Microsoft Patch Tuesday, all. This set includes fixes for 6 zero-day exploits. Time to patch if you run Windows.

bleepingcomputer.com/news/micr

#Windowsisavirus #cyber #cybersecurity #exploits #patch #PatchNOW

Last updated 3 years ago

Ascendor · @Ascendor
145 followers · 3142 posts · Server social.tchncs.de

RT @certbund@twitter.com

❗️ ❗️

2 (CVE-2021-39237 & CVE-2021-39238) in HP-Multifunktionsdruckern ermöglichen XSP-Angriffe, wodurch Angreifende die Kontrolle über die Drucker erlangen, Informationen stehlen oder Netzwerke infiltrieren können.

bsi.bund.de/SharedDocs/Cybersi

🐦🔗: twitter.com/certbund/status/14

#PatchNOW #schwachstellen #CERTWarnung

Last updated 4 years ago

Christian Krösch · @ckroesch
124 followers · 1011 posts · Server legal.social

RT @certbund@twitter.com

Am 02.03. (Veröffentlichung der Patches) gab es in Deutschland rund 65.000 Server mit offen aus dem Internet erreichbarem .
Nach aktuellem Kenntnisstand sind davon heute ca. 5.000 nicht mehr aus dem Internet erreichbar und ca. 25.000 weiterhin verwundbar. !

🐦🔗: twitter.com/certbund/status/13

#exchange #owa #PatchNOW

Last updated 5 years ago

Boris Pohler · @boris_pohler
677 followers · 2726 posts · Server bildung.social

RT @HonkHase@twitter.com

Lolwhut?!? 😳

Microsoft saß seit 5.1.2021 schon auf dem Cyber-Armageddon...

Wie lang es dann wohl vorher schon im Untergrund bekannt war? O_o

@briankrebs@twitter.com liefert die Timeline

krebsonsecurity.com/2021/03/a-

🐦🔗: twitter.com/HonkHase/status/13

#exchange #PatchNOW

Last updated 5 years ago