Brett :cheers: · @brett
512 followers · 359 posts · Server mas.town

If you can't answer whether you have in your environment, now is the time to engage all elements of your IT team. There are two recently assigned :

-2023-35036 (June 9, 2023)
-2023-34362 (May 31, 2023)

If you identify unpatched instances of MOVEit in your environment, you may want to consider moving to the detect/assess phase of the Incident Response framework.

Details and here:

progress.com/security/moveit-t

#moveit #cves #cve #nist #iocs #cybersecurity

Last updated 2 years ago

Marko Jahnke · @markojahnke
113 followers · 361 posts · Server bonn.social

-- Nomen est omen.

Why give a company a name that sounds pretty close to the biggest political scandal in the US in the 1970s?

Probably to make it more robust against all possible fails and scandals.

If you count the critical in their products, this obviously worked pretty well.

bleepingcomputer.com/news/secu

#fortigate #rce #infosec #cves

Last updated 2 years ago

Alessandro Rossi · @kubealex
13 followers · 52 posts · Server mastodon.uno

Security flaws can be overwhelming, but don't despair! Learn more about patching, and with 's @vdanen in the latest Security Detail video. sprou.tt/1SaIqJaqVVV

#cves #cvss #redhat #security #opensource

Last updated 2 years ago

ArNi 🇩🇪 🔐 · @varni
23 followers · 441 posts · Server mastodon.social

Außerdem wird empfohlen den OpenSLP Service der Hosts zu deaktivieren. Dieser ist ab Version 7.0 U2c per default deaktiviert.

Ist gar nicht schlecht sich auch persönlich von per oder zu neuen benachrichtigen zu lassen (siehe vmware.com/security/advisories)
So kann man schnell auf neue Sicherheitslücken reagieren.

#esxi #vmware #mail #rss #cves

Last updated 2 years ago

Why are in 2023 starting in the 20k range? CVE-2023-22809 for example.

cve.mitre.org/cgi-bin/cvename.

#cves

Last updated 2 years ago

iCyberFighter · @iCyberFighter
271 followers · 212 posts · Server infosec.exchange

💻​From 💻​

CISA added two new to its Known Exploitable Catalog
- CVE-2022-41080: Microsoft Exchange Server Privilege Escalation

- CVE-2023-21674: Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability.

CISA also released 2 Industrial Control Systems Advisories:
 ICSA-23-010-01 Black Box KVM
 ICSA-22-298-07 Delta electronics InfraSuite Device Master (Update A).

#cisa #cves #vulnerability #infosec #criticalinfrastructure #cybersecurity #patchmanagement #riskmanagement #industrialcontrols #icssecurity

Last updated 2 years ago

Brett :cheers: · @brett
246 followers · 322 posts · Server mas.town

A new Cybersecurity Advisory provides the top used by People’s Republic of China (PRC) state-sponsored cyber actors as assessed by the , , & , to actively target U.S. and allied networks as well as software and hardware companies to steal intellectual property and develop access into sensitive networks.

Available here:

media.defense.gov/2022/Oct/06/

#cves #fbi #NSA #CISA #cybersecurity #cyber #PRC #China

Last updated 2 years ago

timbo · @timbo
8 followers · 10 posts · Server infosec.exchange

So how are we handling here? What's the preferred format? ? ?

#vulnerability #cve #cves #cve_2022_37958 #cve202237958

Last updated 2 years ago

abyssal_dk · @abyssal_dk
28 followers · 57 posts · Server infosec.exchange

In addition to duplicate CVEs, 'the industry' also has some amusing CVE mis-assignment.

Recently CVE-2017-9833 and CVE-2021-33558 were brought up as attack vectors in a campaign against liquified natural gas victims.

Both CVEs, it turns out, are mis-attributed to the open source Boa webserver. I am pretty darned confident that neither CVE actually applies to the Boa codebase. And I'm not the only one to notice (see all the way at the end, some actually famous infosec friend noticed one of them).

Let's take a look:

CVE-2017-9833 is stated to be a vulnerability in Boa webserver 0.94.14rc21. The vulnerability description ( nvd.nist.gov/vuln/detail/CVE-2 ) is very odd though: apparently it is a directory traversal in a specific CGI handler called /cgi-bin/wapopen . The variable itself is called 'FILECAMERA'. This appears to be a vulnerability in a specific IP camera, not Boa itself. To wit, you can retrieve the original source package for Boa 0.94.14rc21 and search all of the files for the variable 'FILECAMERA' and there is no mention of this variable. Of course it would be very odd for a generic web server to include any cgi handlers — sure you’d expect a generic mechanism to bolt on your own CGI applications but unless there is some ‘test’ application for demonstrating CGI, we wouldn’t expect such a vulnerability to be in the web server itself. A quick check of exposed webservers for the /cgi-bin/wapopen URL shows that they 404 (as we’d expect).

CVE-2021-33558 is likewise very odd. It is stated to be a vulnerability in Boa webserver 0.94.13. The minimal writeup and public proof of concept just indicate that a few HTML and JS files are exposed without authentication. Again, these are files that are on some specific device firmware. Boa itself does not include a ‘backup.html’ or a ‘preview.html’ or ‘js/log.js’, or any of the files included in the advisory. This is a mistake in one particular device, not in Boa itself. And again if we try to load some of these files on generic Boa webservers, we get a 404.

Fixing all of this in the public literature is likely an impossible task since we are not the original researchers? First we have to identify exactly what devices the researchers were looking at, and then get those researchers to publish new advisories I guess. In the case of CVE-2017-9833, the researcher has no public point of contact, which is unfortunate. In the case of CVE-2021-33558, our friend attrition (does anyone know if he’s on some mastodon instance?) already tried to get some confirmation because they spotted the same thing we did. There doesn’t seem to be any update though ( github.com/mdanzaruddin/CVE-20 ).

The bigger picture? If we toss a firmware with Boa into a vulnerability scanning tool, or even run a network scanning tool against a device with Boa, it’s probably going to flag the web server as vulnerable even though it isn’t. And that’s almost not the scanning tool’s fault: it’s really a problem with CVE mis-assignment.

If you made it this far, thanks for listening to my rant. ⭐

#vulnerabilities #cves #threatintel #SBOM

Last updated 2 years ago

Sasha Romanosky · @SashaRomanosky
33 followers · 23 posts · Server techhub.social

@DavidJBianco Thanks! We think so. And btw, probability scores for all are updated daily, and free for everyone. Just check the data page.

#cves

Last updated 2 years ago

mkolsek · @mkolsek
214 followers · 74 posts · Server infosec.exchange

#cves

Last updated 2 years ago

Ron Bowes · @iagox86
861 followers · 123 posts · Server infosec.exchange

Hey folks! Since we have this fun new platform, I thought I'd post a position that we're for! The role is "Lead Security Reacher - Emergent Threats Response" at (that's my team!)

The position is , but we strongly prefer timezones that are compatible with North America (since I'm US west coast).

You'd be working side-by-side with me (and working for the amazing @catc0n), doing and deep-dive analyses of public / / / etc that impact lots of folks. Sometimes it's stuff that others found (which might be testing PoCs or patches), and sometimes it's our own research.

The skills we want are a deep understanding of vulnerabilities (ideally, you'd be conversant in not just memory corruption, but other vulnerability classes), strong technical writing / presenting / explaining, and some degree of leadership as we shape the vulnerability discussion within Rapid7 and the internet as a whole!

If you're interested, apply here (or, if we know each other well, ping me for a referral :) ): rapid7.com/careers/jobs/detail

#hiring #rapid7 #remote #research #vulnerabilities #cves #exploits #reverseengineering

Last updated 2 years ago

openSUSE Linux · @opensuse
3455 followers · 1325 posts · Server fosstodon.org

grep gets some important notifications & several are handled this week in Tumbleweed snapshots, including one for news.opensuse.org/2022/09/21/v

#cves #opensuse #python

Last updated 2 years ago

openSUSE Linux · @opensuse
3456 followers · 1325 posts · Server fosstodon.org

Learn about issues & see examples on how to prevent at the @opensuse Conference. Sign up and register before next week. events.opensuse.org/conference

#cves #security

Last updated 4 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online

Adobe issues emergency fix for file-munching bug - Adobe has released another security patch outside of its usual routine, to deal with a bug that al... more: nakedsecurity.sophos.com/2020/

#cves #bugs #patch #adobe #reader #acrobat #patching #dataloss #photoshop #vulnerability #securitythreats

Last updated 5 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online

Cisco issues urgent fixes for SD-WAN router flaws - Cisco has patched a clutch of high-priority vulnerabilities in its SD-WAN routes and their managem... more: nakedsecurity.sophos.com/2020/ -wan

#wan #cves #patch #flaws #cisco #sd #vmanage #routers #patches #patching #vulnerability #wideareanetwork #securitythreats

Last updated 5 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online