Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

GitLab ‘Perfect 10’ Bug Gets a CISA Warning: PATCH NOW

3 May 2024 at 13:05
Extreme closeup of “TEN” on US$10 note

Password reset FAILURE: The U.S. Cybersecurity and Infrastructure Security Agency warns GitLab users of a 100-day-old, maximum severity vulnerability.

The post GitLab ‘Perfect 10’ Bug Gets a CISA Warning: PATCH NOW appeared first on Security Boulevard.

A Closer Look at Top 5 Vulnerabilities of April 2024 – Source: securityboulevard.com

a-closer-look-at-top-5-vulnerabilities-of-april-2024-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Shubham Jha Keeping pace with the latest cybersecurity threats is vital for organizations of all sizes. Here at Strobes, our security team has assembled a list of the top 5 most critical Common Vulnerabilities and Exposures (CVEs) discovered in April 2024. By staying informed about these vulnerabilities, you can take steps […]

La entrada A Closer Look at Top 5 Vulnerabilities of April 2024 – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Maximum-severity GitLab flaw allowing account hijacking under active exploitation

2 May 2024 at 15:02
Maximum-severity GitLab flaw allowing account hijacking under active exploitation

Enlarge

A maximum severity vulnerability that allows hackers to hijack GitLab accounts with no user interaction required is now under active exploitation, federal government officials warned as data showed that thousands of users had yet to install a patch released in January.

A change GitLab implemented in May 2023 made it possible for users to initiate password changes through links sent to secondary email addresses. The move was designed to permit resets when users didn’t have access to the email address used to establish the account. In January, GitLab disclosed that the feature allowed attackers to send reset emails to accounts they controlled and from there click on the embedded link and take over the account.

While exploits require no user interaction, hijackings work only against accounts that aren’t configured to use multifactor authentication. Even with MFA, accounts remained vulnerable to password resets, but the attackers ultimately are unable to access the account, allowing the rightful owner to change the reset password. The vulnerability, tracked as CVE-2023-7028, carries a severity rating of 10 out of 10.

Read 9 remaining paragraphs | Comments

Adobe Adds Content Credentials and Firefly to Bug Bounty Program

1 May 2024 at 10:55

Adobe is providing incentives for bug bounty hackers to report security flaws in its implementation of Content Credentials and Adobe Firefly.

The post Adobe Adds Content Credentials and Firefly to Bug Bounty Program appeared first on SecurityWeek.

The State of Ransomware 2024 – Source: news.sophos.com

the-state-of-ransomware-2024-–-source:-newssophos.com

Source: news.sophos.com – Author: Sally Adam PRODUCTS & SERVICES Our fifth annual report reveals how ransomware experiences have changed over the last year, plus brand-new insights into the business impact of an attack. The fifth Sophos State of Ransomware Report reveals the real-world ransomware experiences of 5,000 organizations around the globe, from root cause through […]

La entrada The State of Ransomware 2024 – Source: news.sophos.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover

30 April 2024 at 12:56

Three vulnerabilities in the Judge0 open source service could allow attackers to escape the sandbox and obtain root privileges on the host.

The post Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover appeared first on SecurityWeek.

Multiple Apache HTTP Server Vulnerabilities Fixed in Ubuntu

30 April 2024 at 05:00

The Ubuntu security team recently addressed several Apache HTTP Server vulnerabilities in Ubuntu 23.10, Ubuntu 23.04, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 16.04, and Ubuntu 18.04. These vulnerabilities could potentially allow attackers to disrupt server functionality or even inject malicious code. Let’s break down the issues and how to stay secure.   Apache HTTP […]

The post Multiple Apache HTTP Server Vulnerabilities Fixed in Ubuntu appeared first on TuxCare.

The post Multiple Apache HTTP Server Vulnerabilities Fixed in Ubuntu appeared first on Security Boulevard.

Vulnerability in R Programming Language Could Fuel Supply Chain Attacks

30 April 2024 at 09:07

A vulnerability (CVE-2024-27322) in the R programming language implementation can be exploited to execute arbitrary and be used as part of a supply chain attack.

The post Vulnerability in R Programming Language Could Fuel Supply Chain Attacks appeared first on SecurityWeek.

Multiple PHP 7.4 Vulnerabilities Addressed in Debian 11

29 April 2024 at 05:00

Debian 11 was first released on August 14th, 2021 with PHP version 7.4, which has already reached the end of life. This means PHP 7.4 will no longer receive official updates and security fixes from the PHP development team. However, the Debian security team provides fixes for PHP 7.4 as Debian 11 still uses PHP […]

The post Multiple PHP 7.4 Vulnerabilities Addressed in Debian 11 appeared first on TuxCare.

The post Multiple PHP 7.4 Vulnerabilities Addressed in Debian 11 appeared first on Security Boulevard.

Privacy Challenges in Relationships, Phishing Down but Vulnerabilities Up?

By: Tom Eston
29 April 2024 at 00:00

In episode 327 Tom, Scott, and Kevin discuss the findings from Mandiant’s M-Trends 2024 report, highlighting a significant rise in traditional vulnerability exploitation by attackers while observing a decline in phishing. Despite phishing’s decreased prevalence, it remains the second most popular method for gaining initial network access. Discussions include the impact of high-profile vulnerabilities and […]

The post Privacy Challenges in Relationships, Phishing Down but Vulnerabilities Up? appeared first on Shared Security Podcast.

The post Privacy Challenges in Relationships, Phishing Down but Vulnerabilities Up? appeared first on Security Boulevard.

💾

Hackers Exploit WP-Automatic Plugin Vulnerability, Threatening WordPress Site Security

WP-Automatic Plugin Vulnerability

Hackers have honed in on a critical WP-Automatic plugin vulnerability, aiming to infiltrate WordPress websites by creating unauthorized admin accounts, according to recent reports. The flaw, identified in versions preceding 3.9.2.0 of the WP Automatic plugin, has prompted cybersecurity experts to issue urgent warnings to website owners and administrators. The vulnerability, flagged under the identifier "CVE-2024-27956," has been characterized as a high-severity issue with a CVSS score of 9.8. It pertains to a SQL injection flaw within the plugin's user authentication mechanism, which essentially enables threat actors to circumvent security measures and gain administrative privileges. 

Decoding WP-Automatic Plugin Vulnerability

[caption id="attachment_65416" align="alignnone" width="1172"]WP-Automatic Plugin Vulnerability Source: WordPress[/caption] Exploiting this vulnerability grants hackers the ability to implant backdoors within websites, ensuring prolonged unauthorized access. Reports indicate that hackers have been actively exploiting this vulnerability, capitalizing on the widespread use of the WP Automatic plugin across more than 30,000 websites. The exploit allows them to execute various malicious activities, including the creation of admin accounts, uploading of corrupted files, and executing SQL injection attacks. Cybersecurity researchers have observed a surge in exploit attempts, with over 5.5 million recorded attacks since the vulnerability was publicly disclosed. The threat landscape escalated rapidly, peaking on March 31st, underscoring the urgency for website owners to take immediate action to secure their online assets.

The Technical Side of the WP-Automatic Plugin Vulnerabilities

The Automatic Plugin, developed by ValvePress, faces an challenge beyond comprehension since the vulnerability effects thousands of users who downloaded the plugin through WordPress and other WP plugin markets. The vulnerability stemmed from the inc/csv.php file, which allowed unauthenticated users to supply and execute arbitrary SQL queries. Despite initial checks using wp_automatic_trim() function, bypassing them was feasible by providing an empty string as the authentication parameter ($auth) and crafting the MD5 hash of the SQL query to subvert integrity checks. Furthermore, the vulnerability lied within the downloader.php file, where unauthenticated users could provide arbitrary URLs or even local files via the $_GET['link'] parameter for fetching through cURL. This flaw facilitated server-side request forgery (SSRF) attacks. To mitigate the vulnerabilities, the vendor enacted several measures. For the SQL Execution vulnerability, the entire inc/csv.php file was removed. For the File Download and SSRF vulnerability, a nonce check was implemented, coupled with validation checks on the $link variable.

Mitigation Against the WP-Automatic Plugin Vulnerability

To safeguard against potential compromises, cybersecurity analysts recommend the following measures, including regularly updating the WP-Automatic plugin to its latest version is crucial to patch known vulnerabilities and bolster security measures. Regular audits of WordPress user accounts help identify and remove unauthorized or suspicious admin users, reducing the risk of unauthorized access. Employing robust security monitoring tools aids in detecting and responding promptly to malicious activities, improving threat detection capabilities. It's essential to maintain up-to-date backups of website data to enable swift restoration in case of compromise, minimizing downtime and data loss. Website administrators should watch out for indicators of compromise, including admin accounts with names starting with "xtw," renamed vulnerable file paths, and dropped SHA1 hashed files in the site's filesystem. The exploitation of WP-Automatic plugin vulnerabilities highlights the ongoing cybersecurity threats within WordPress ecosystems. By promptly implementing suggested mitigations and staying alert for potential indicators of compromise, website owners can strengthen their defenses against malicious actors aiming to exploit these vulnerabilities. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Local Privilege Escalation Vulnerability in Ant Media Server (CVE-2024-32656)

26 April 2024 at 13:45

Overview In an effort to safeguard our customers, we perform proactive vulnerability research with the goal of identifying zero-day vulnerabilities that are likely to impact the security of leading organizations. Recently, we decided to take a look at Ant Media Server with the goal of identifying any vulnerabilities within the application. We performed testing against […]

The post Local Privilege Escalation Vulnerability in Ant Media Server (CVE-2024-32656) appeared first on Praetorian.

The post Local Privilege Escalation Vulnerability in Ant Media Server (CVE-2024-32656) appeared first on Security Boulevard.

State Spies Exploited Cisco Zero-Days to Intrude Government Networks

25 April 2024 at 07:40

Cisco zero-days

Networking giant Cisco warned that a group of state-sponsored hackers exploited zero-days in its firewall appliances to spy on government networks over the last several months. Cisco in a Wednesday warning said that two zero-day vulnerabilities in Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) firewalls were exploited by a state-backed hacking group since November 2023 to infiltrate government networks globally. Identified as UAT4356 by Cisco Talos and STORM-1849 by Microsoft, the hackers initiated their cyber-espionage campaign, dubbed “ArcaneDoor,” through targeting of vulnerable edge devices in early November 2023.
“This actor utilized bespoke tooling that demonstrated a clear focus on espionage and an in-depth knowledge of the devices that they targeted, hallmarks of a sophisticated state-sponsored actor,” Cisco Talos said.

Discovery and Details of the Two Cisco Zero-Days

Despite the absence of an identified initial attack vector, Cisco detected and rectified two security flaws - CVE-2024-20353, a denial-of-service bug and CVE-2024-20359, a persistent local code execution bug - which the threat actors used as zero-days. Cisco became aware of the ArcaneDoor campaign earlier this year but said the attackers had been testing and developing exploits for the two zero-days since at least July 2023. “The investigation that followed identified additional victims, all of which involved government networks globally,” Cisco Talos added. [caption id="attachment_64982" align="aligncenter" width="997"]Cisco zero-days, Cisco zero-days exploitation timeline Cisco Zero-Days Exploitation Timeline. Credit: Cisco Talos[/caption] The exploited vulnerabilities facilitated the deployment of previously unknown malware, allowing threat actors to establish persistence on compromised ASA and FTD devices. One such malware implant dubbed “Line Dancer,” acted as an in-memory shellcode loader, enabling the execution of arbitrary shellcode payloads to disable logging, provide remote access, and exfiltrate captured packets. The second implant, a persistent backdoor known as “Line Runner,” included various defense evasion mechanisms to evade detection and enable the execution of arbitrary Lua code on compromised systems. Perimeter network devices like the ASA and FTD firewall appliances “are the perfect intrusion point for espionage-focused campaigns,” Cisco said. “Gaining a foothold on these devices allows an actor to directly pivot into an organization, reroute or modify traffic and monitor network communications.” The networking and security giant said it had observed a “dramatic and sustained” increase in the targeting of these devices in the past two years, especially those deployed in the telecommunications and energy sectors as “critical infrastructure entities are likely strategic targets of interest for many foreign governments,” Cisco explained.

What Cybersecurity Agencies Said

A joint advisory published today by the UK's National Cyber Security Centre (NCSC), the Canadian Centre for Cyber Security (Cyber Centre), and the Australian Cyber Security Centre outlined additional activity undertaken by the threat actors: - They generated text versions of the device’s configuration file for exfiltration through web requests. - They controlled the enabling and disabling of the devices syslog service to obfuscate additional commands. - They modified the authentication, authorization, and accounting (AAA) configuration to provide access to specific actor-controlled devices within the impacted environment. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) also added the zero-day bugs to its Known Exploited Vulnerabilities Catalog and encouraged users to apply the necessary updates, hunt for malicious activity, and report any positive findings to the agency. Cisco released security updates on Wednesday to address the two zero-days and recommended all customers to upgrade their devices to the fixed software version to mitigate potential attacks. Cisco asked administrators to monitor system logs for signs of unscheduled reboots, unauthorized configuration changes, or suspicious credential activity. The company also provided instructions on verifying the integrity of ASA or FTD devices in the advisory.

Espionage Actors Increasingly Using Edge Device Zero-Days

Although no attribution was made for the ArcaneDoor campaign a recent trends report from Google security firm Mandiant fingered Chinese hackers for increasingly targeting edge devices like VPN appliances, firewalls, routers, and IoT tools in espionage attacks. Mandiant observed a more than 50% growth in zero-day usage compared to 2022, both by espionage groups as well as financially motivated hackers.
“China-nexus attackers have gained access to edge devices via exploitation of vulnerabilities, particularly zero-days, and subsequently deployed custom malware ecosystems,“ Mandiant said.
The security firm added that it is likely to see continued deployment of custom malware ecosystems from Chinese espionage groups that are tailored for the device and operation at hand. “This approach provides several advantages such as the increased ability to remain undetected, reduced complexity and increased reliability, and a reduced malware footprint.“ Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Cisco Raises Alarm for ‘ArcaneDoor’ Zero-Days Hitting ASA Firewall Platforms

24 April 2024 at 13:25

Cisco warns that nation state-backed hackers are exploiting at least two zero-day vulnerabilities in its ASA firewall platforms to plant malware on telecommunications and energy sector networks.

The post Cisco Raises Alarm for ‘ArcaneDoor’ Zero-Days Hitting ASA Firewall Platforms appeared first on SecurityWeek.

Secure-by-Design Software in DevSecOps

24 April 2024 at 11:00

In this new series, CJ May shares his expertise in implementing secure-by-design software processes. The second part of his DevSecOps program is all about implementing secure-by-design software pipelines.

The post Secure-by-Design Software in DevSecOps appeared first on Security Boulevard.

Multiple Squid Vulnerabilities Fixed in Ubuntu

24 April 2024 at 05:00

The Ubuntu security team has recently rolled out critical security updates aimed at addressing several vulnerabilities identified in Squid, a widely used web proxy cache server. These vulnerabilities, if left unaddressed, could potentially expose systems to denial-of-service attacks. Let’s delve into the specifics of these vulnerabilities and understand their implications.   Recent Squid Vulnerabilities Fixed […]

The post Multiple Squid Vulnerabilities Fixed in Ubuntu appeared first on TuxCare.

The post Multiple Squid Vulnerabilities Fixed in Ubuntu appeared first on Security Boulevard.

Nothing Admits to 2022 Data Breach Exposing Community Emails

Nothing data breach

The Nothing community is once again facing concerns over security as news of a data breach from 2022 resurfaces. The Nothing data breach was reported on social media platforms, and eventually led to the organization confirming the breach — shedding light on the unpredictable vulnerabilities within the Nothing ecosystem. Confirming the Nothing data leak to Android Authority, the UK-based phone manufacturer acknowledged that the data of 2,250 community members had been compromised, primarily consisting of email addresses. Although no sensitive information like passwords was accessible, the exposure of user emails raised concerns about the privacy and security of the community members. 

Rediscovering the 2022 Nothing Data Breach in 2024

Recently, reports emerged on social media, notably on X (formerly Twitter), highlighting the discovery of personal information associated with Nothing Community accounts in an online database. While much of the leaked data, such as usernames, was already publicly available, the inclusion of private email addresses raised suspicions among the community members.    [caption id="attachment_64648" align="alignnone" width="756"]Nothing data breach Source: X[/caption] At the time of writing this, reports and tweets related to the Nothing data breach were removed to prevent further exploitation. Although investigations confirmed the existence of the leaked database, there was no evidence suggesting the compromise of user account passwords. However, official emails of Nothing employees were also found in the database, further exacerbating the security concerns. Despite efforts to obtain confirmation from Nothing regarding the data breach and potential implications of the leaked data, The Cyber Express has not yet received an official statement or response at the time of writing. Moreover, several community members and tech reporters removed the sample data and any other information from their social media accounts within 72 hours of reporting. 

Immediate Action and Enhanced Security Measures

Nothing responded to inquiries, acknowledging the breach and tracing it back to a vulnerability identified in December 2022. The phone manufacturer confirmed that while email addresses were affected, no other sensitive information such as names, addresses, passwords, or payment details were compromised. Immediate action was taken to address the vulnerability and enhance security measures. "In December 2022, Nothing discovered a vulnerability, which impacted email addresses belonging to community members at the time," the company said. "No names, personal addresses, passwords, or payment information were compromised. Upon this discovery nearly a year and half ago, Nothing took immediate action to remedy the situation and bolster its security features”, stated a Nothing spokesperson to Android Authority. Despite efforts to contain the situation, concerns lingered regarding the extent of the breach and its impact on community members. Although the breach is relatively minor, it adds to the series of security incidents surrounding Nothing, including the infamous Nothing Chats debacle wherein the phone company received backlash on inadequate security of its message systems.  While users may experience an increase in spam emails with this data breach, the overall impact on Nothing Community users is expected to be limited. However, users are advised to remain vigilant and consider changing their passwords as a precautionary measure, although no account passwords were compromised in this breach. Notably, there were no indications that Nothing reached out to affected users regarding the breach, raising questions about communication and transparency. Nonetheless, internal changes were implemented to safeguard user data in the future. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Microsoft DRM Hack Could Allow Movie Downloads From Popular Streaming Services

23 April 2024 at 05:52

Microsoft PlayReady vulnerabilities that could allow rogue subscribers to illegally download movies from popular streaming services.

The post Microsoft DRM Hack Could Allow Movie Downloads From Popular Streaming Services appeared first on SecurityWeek.

Windows vulnerability reported by the NSA exploited to install Russian malware

22 April 2024 at 16:36
Windows vulnerability reported by the NSA exploited to install Russian malware

Enlarge (credit: Getty Images)

Kremlin-backed hackers have been exploiting a critical Microsoft vulnerability for four years in attacks that targeted a vast array of organizations with a previously undocumented tool, the software maker disclosed Monday.

When Microsoft patched the vulnerability in October 2022—at least two years after it came under attack by the Russian hackers—the company made no mention that it was under active exploitation. As of publication, the company’s advisory still made no mention of the in-the-wild targeting. Windows users frequently prioritize the installation of patches based on whether a vulnerability is likely to be exploited in real-world attacks.

Exploiting CVE-2022-38028, as the vulnerability is tracked, allows attackers to gain system privileges, the highest available in Windows, when combined with a separate exploit. Exploiting the flaw, which carries a 7.8 severity rating out of a possible 10, requires low existing privileges and little complexity. It resides in the Windows print spooler, a printer-management component that has harbored previous critical zero-days. Microsoft said at the time that it learned of the vulnerability from the US National Security Agency.

Read 8 remaining paragraphs | Comments

MITRE Hit in Massive Supply Chain Attack: State-Backed Hackers Exploit Zero-Days

MITRE Data Breach

The MITRE Corporation revealed on April 19 that it was one of over 1700 organizations compromised by a state-backed hacking group in January 2024. The MITRE data breach, which involved chaining two Ivanti VPN zero-days, highlights the evolving nature of cyber threats and the challenges organizations face in defending against them.

The MITRE data breach was detected after suspicious activity was noticed on MITRE's Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified collaborative network used for research and development. [caption id="attachment_63933" align="aligncenter" width="609"]MITRE Data Breach Source: X[/caption]

MITRE DATA Breach Discovery and Response

Following the detection, MITRE promptly took NERVE offline and launched an investigation with the assistance of both internal and external cybersecurity experts. "Following detection of the incident, MITRE took prompt action to contain the incident, including taking the NERVE environment offline, and quickly launched an investigation with the support of in-house and leading third-party experts. The investigation is ongoing, including to determine the scope of information that may be involved," reads the Official notice. MITRE CEO Jason Providakes emphasized that "no organization is immune from this type of cyber attack, not even one that strives to maintain the highest cybersecurity possible." Providakes highlighted the importance of disclosing the incident in a timely manner to promote best practices and enhance enterprise security. “We are disclosing this incident in a timely manner because of our commitment to operate in the public interest and to advocate for best practices that enhance enterprise security as well as necessary measures to improve the industry’s current cyber defense posture. The threats and cyber attacks are becoming more sophisticated and require increased vigilance and defense approaches. As we have previously, we will share our learnings from this experience to help others and evolve our own practices,” said Providakes. Charles Clancy, MITRE's Chief Technology Officer, provided additional insights, explaining that the threat actor compromised the Ivanti Connect Secure appliance used to provide connectivity into trusted networks. Clancy stressed the need for the industry to adopt more sophisticated cybersecurity solutions in response to increasingly advanced threats. MITRE outlined four key recommendations:
  1. Advance Secure by Design Principles: Hardware and software should be inherently secure.
  2. Operationalize Secure Supply Chains: Utilize software bill of materials to understand threats in upstream software systems.
  3. Deploy Zero Trust Architectures: Implement micro-segmentation of networks in addition to multi-factor authentication.
  4. Adopt Adversary Engagement: Make adversary engagement a routine part of cyber defense to provide detection and deterrence.
MITRE has a long history of contributing to cybersecurity research and development in the public interest. The organization has developed frameworks like ATT&CK®, Engage™, D3FEND™, and CALDERA™, which are used by the global cybersecurity community.

Details of the MITRE Data Breach

The MITRE data breach involved two zero-day vulnerabilities: an authentication bypass (CVE-2023-46805) and a command injection (CVE-2024-21887). These vulnerabilities allowed threat actors to bypass multi-factor authentication defenses and move laterally through compromised networks using hijacked administrator accounts. The attackers utilized sophisticated webshells and backdoors to maintain access to hacked systems and harvest credentials. Since early December, the vulnerabilities have been exploited to deploy multiple malware families for espionage purposes. Mandiant has attributed these attacks to an advanced persistent threat (APT) known as UNC5221, while Volexity has reported signs of Chinese state-sponsored actors exploiting the zero-days. Volexity discovered over 2,100 compromised Ivanti appliances, affecting organizations of various sizes globally, including Fortune 500 companies. The scale and severity of the attacks prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue an emergency directive on January 19, instructing federal agencies to mitigate the Ivanti zero-days immediately. MITRE's disclosure serves as a reminder of the ongoing threat posed by cyber adversaries and the critical need for organizations to continually enhance their cybersecurity defenses. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Trust Wallet Urges Caution for Apple Users Amid Reports of Apple iMessage Zero-Day Exploit

iMessage vulnerability

Trust Wallet, a leading provider of crypto wallets, has issued an advisory to Apple users regarding potential iMessage vulnerability. The warning stems from credible intelligence indicating the presence of a zero-day exploit in the iOS iMessage platform, available for purchase on the dark web for a staggering $2 million. According to Trust Wallet, this iMessage zero-day exploit poses a threat as it allows hackers to gain control of iPhones without any interaction from the user. Unlike traditional exploits that require clicking on malicious links or downloading infected files, this exploit operates seamlessly, making it especially threatening for high-value targets.

Trust Wallet Issues Warning about iOS iMessage Vulnerability

[caption id="attachment_63036" align="alignnone" width="1080"]iMessage vulnerability (1) Source: Eowync.eth on X[/caption] While Trust Wallet's alert has raised questions about iOS security, with some probing the authenticity of the intelligence shared by CEO Eowyn Chen, the company stands by its warning. Trust Wallet emphasizes that the information is sourced from its security team and trusted partners, highlighting the urgency of the situation amidst growing concerns about cybersecurity, particularly within the blockchain ecosystem. The advisory advises iOS users to take immediate action to safeguard their devices by disabling iMessage until Apple addresses the vulnerability with a security patch. Disabling iMessage can be done through the Settings menu, under Messages, by toggling the iMessage option off. Trust Wallet reassures users that their security remains a top priority, urging vigilance until the issue is resolved. [caption id="attachment_63042" align="alignnone" width="680"]iOS iMessage Vulnerability Source: X[/caption] CEO Eowyn Chen has shared a screenshot purportedly depicting the zero-day exploit for sale, highlighting the gravity of the situation. The Cyber Express has also reached out to Apple to learn more about this iMessage vulnerability. However, at the time of writing this, no official statement or response has been received regarding the iMessage vulnerability.

The Recent Apple Vulnerabilities

In light of these developments, users are advised to exercise caution and remain vigilant against potential threats, particularly as hackers continue to exploit these Apple vulnerabilities Previously, academic researchers from five different universities revealed a newly discovered vulnerability in Apple’s M-series chips, allowing attackers to extract secret keys from Macs during cryptographic operations.  This flaw, inherent in the silicon's design, cannot be directly patched. Instead, it requires third-party cryptographic software defenses, potentially slowing M-series performance. The vulnerability stems from the chips' prefetcher, which predicts data access, inadvertently leaking key material.  Dubbed "GoFetch," the attack can extract various key types in relatively short timeframes. Exploiting normal user privileges, GoFetch mines secrets while running alongside targeted applications.  Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Lighttpd Bug Continues to Expose Vulnerabilities in End-of-Life Intel and Lenovo Hardware Firmware

16 April 2024 at 05:53

httpd bug

A vulnerability had been discovered in the devices of several prominent manufacturers within the Lighttpd open-web server component. Lighttpd is recognized for its 'secure, fast, standards compliant, and flexible web server optimized for high-performance environments.' These features make it a popular choice for incorporating into various projects and tools, and it had been previously used to power sites such as Youtube and Wikipedia. This vulnerability existing for at least six-years within Lighttpd, affects over 2000 devices deployed by vendors such as American Megatrends International (AMI), Intel, Lenovo, and Supermicro. Researchers caution that any hardware that incorporates certain generations of baseboard management controllers made by Duluth, Georgia-based AMI or Taiwan-based AETN are also affected. BMCs are built into servers to allow cloud centers as well as their clients to remotely manage servers. They enable administrative actions such as OS management, installation of apps, and control over different aspects of servers even while they are powered off. Over the years, BMCs from multiple manufacturers have incorporated vulnerable versions of lighttpd.

Lighttpd Bug Had Been Identified but Not Disclosed as Vulnerability

[caption id="attachment_62950" align="alignnone" width="1000"]lighttpd bug lenovo intel (Source: Shutterstock)[/caption] The vulnerability had been discovered and patched in 1.4.51 of the software, described as fixing 'various use-after-free scenarios' while being marked as consisting of 'security fixes' in the change logs. The MITRE corporation describes this category of bugs as that 'can have any number of adverse consequences, ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw'. Researchers from Binarly who discovered the flaw's existence on Lenovo and Intel sold devices,  noted that the update did not describe the issue as a “vulnerability” or include a CVE vulnerability number. Such action they claim might have affected 'proper handling of these fixes down both the firmware and software supply chains'. While the bug is of moderate severity on its own, it could be chained with other vulnerabilities to access the read memory of a lighttpd Web Server process and exfiltrate sensitive data and  potentially bypass memory-protection techniques such as ASLR (Address space layout randomization). The ASLR memory protection is implemented in software to protect against buffer overflow or out-of-bounds memory attacks.

Vendors Plan Not to Release Lighttpd Bug Fix As They No Longer Support Hardware

[caption id="attachment_62955" align="alignnone" width="1000"]lighttpd bug (Source: Shutterstock)[/caption] The vulnerability is present in any hardware that uses lighttpd versions 1.4.35, 1.4.45, and 1.4.51. Both Intel and Lenovo have reportedly stated that they had no plans to release fixes as they no longer support the hardware where these flaws may perist.  Supermicro, has however stated support for versions of its hardware still relying on lighttpd.
A Lenovo spokesman reportedly stated to ArsTechnica that 'Lenovo is aware of the AMI MegaRAC concern identified by Binarly. We are working with our supplier to identify any potential impacts to Lenovo products. ThinkSystem servers with XClarity Controller (XCC) and System x servers with Integrated Management Module v2 (IMM2) do not use MegaRAC and are not affected.'
It’s worth mentioning explicitly, however, that the severity of the lighttpd bug is only moderate and is of no value unless an attacker has a working exploit for a much more severe vulnerability. In general, BMCs should be enabled only when needed and locked down carefully, as they allow for extraordinary control of entire fleets of servers with simple HTTP requests sent over the Internet. Chip giant Intel previously issued an advisory in 2018 warning customers about over 13 security bugs discovered in its version of the baseboard management controller (BMC) firmware for Intel Server products while conducting internal evaluation.  The reported flaws included including one critical flaw that could be exploited to leak sensitive data or allow attackers to escalate privileges. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Delinea Scrambles to Patch Critical Flaw After Failed Responsible Disclosure Attempt

16 April 2024 at 05:50

PAM company Delinea over the weekend rushed to patch a critical authentication bypass vulnerability after it apparently ignored the researcher who found the flaw.

The post Delinea Scrambles to Patch Critical Flaw After Failed Responsible Disclosure Attempt appeared first on SecurityWeek.

Palo Alto Networks Warns Customers of Actively-Exploited PAN-OS vulnerability

15 April 2024 at 00:35

Palo Alto CVE-2024-3400

Palo Alto, a leading American cybersecurity firm, has flagged a critical vulnerability in its PAN-OS 'GlobalProtect' feature. This flaw allows remote code execution (RCE) with root privileges targeting the command-injection vulnerability (CVE-2024-3400). The company released an advisory disclosing that certain specific PAN-OS configurations could enable an unauthorized attacker the ability to execute remote arbitrary code with root privileges. Palo Alto has urged its customers to implement temporary fixes to mitigate the flaw.

Palo Alto Acknowledges Exploitation of PAN-OS Vulnerability

[caption id="attachment_62393" align="alignnone" width="1024"]Palo Alto versions CVE-2024-3400 PAN-OS vulnerability Source: paloaltonetworks.com[/caption] The advisory states that versions PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 of Palo Alto's are vulnerable to exploitation and that the issue would be fixed in hotfix releases 'PAN-OS 10.2.9-h1 (, PAN-OS 11.0.4-h1, and PAN-OS 11.1.2-h3' that would be subsequently released on 14th April. CVE-2024-3400 is an 'Improper Neutralization of Special Elements used in a Command' form of vulnerability according to the MITRE framework with a CVSS score of 4.0 and a Base Score of 10 in Severity. Only firewalls that have both the GlobalProtect gateway and device telemetry enabled can be exploited through this flaw. Users can access their GlobalProtect gateway configurations by checking their firewall web interface (Network > GlobalProtect > Gateways) and verifying if they have device telemetry enabled by checking your firewall web interface (Device > Setup > Telemetry).

Palo Alto Recommends Temporary Workarounds for Mitigation

[caption id="attachment_62396" align="alignnone" width="784"]Palo Alto Firewall PAN-OS vulnerability Source: Firewall Firm[/caption] Palo Alto has advised users on temporary workarounds and mitigations to deal with existence of the flaw (CVE-2024-3400). Palo Alto customers with a Threat Prevention subscription were instructed to combat this vulnerability by enabling Threat ID 95187 (introduced in Applications and Threats content version 8833-8682). To protect against potential exploitation on their device, customers can verify that vulnerability protection has been implemented on their GlobalProtect interface. Further, users and administrators could mitigate the impact of the vulnerability by temporarily disabling device telemetry until the device has been updated to a patched version of PAN-OS. The advisory comes two days after another high-severity vulnerability (CVE-2024-3385) affecting the PA-5400 and PA-7000 Series firewalls were discovered in PAN-OS. The Firewall Denial of Service (DoS) allowed remote attackers to potentially reboot hardware-based firewalls to induce a denial of service (DoS) attack or force the firewall to enter maintenance mode. However unlike the more recent flaw, Palo Alto did not observe this vulnerability being actively exploited but encountered by two customers in normal production usage. These vulnerabilities are the latest in a series of Firewall related vulnerabilities that have been reported recently with several prominent companies reporting vulnerabilities in their Firewall offerings. These victims include Fortinet, SonicWall and Junpier and exposed hundreds of devices relying on them for security to various forms of attacks. These incidents demonstrate issues with the steady patching of vulnerable systems as well as the attacks they may be exposed to such as the exploit of Fortinet devices by Chinese-linked threat actors which drew attention from CISA. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
❌
❌