101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

490
active users

#remotecodeexecution

0 posts0 participants0 posts today

Critical Vulnerabilities in VMware vCenter Server

Date: June 18, 2024
CVE: CVE-2024-37079, CVE-2024-37080, CVE-2024-37081
Vulnerability Type: Buffer Overflow, Memory Corruption
CWE: [[CWE-787]], [[CWE-416]], [[CWE-125]]
Sources: SecurityWeek, Cybersecurity News, Broadcom VMware advisory

Synopsis

Multiple critical vulnerabilities in VMware vCenter Server have been identified, potentially allowing remote code execution (RCE). These issues, detailed in VMware's security advisory VMSA-2024-0012, include CVE-2023-34048, which affects the DCE/RPC protocol implementation. The DCE/RPC (Distributed Computing Environment / Remote Procedure Call) protocol is a network protocol developed by the Open Group. It enables communication between client and server applications by allowing a program to request services from a program located on another computer within a network. DCE/RPC is based on the concept of remote procedure calls (RPC), which facilitate the execution of code on a remote system as if it were local.

Issue Summary

VMware vCenter Server, a key management component for VMware environments, contains several critical vulnerabilities. If exploited, these could allow attackers to execute arbitrary code remotely. The most critical of these, CVE-2023-34048, has been rated with a CVSS score of 9.8, indicating high severity.

Technical Key Findings

The vulnerabilities primarily involve memory corruption issues such as heap overflow and use-after-free errors in the DCE/RPC protocol. These can be exploited by sending specially crafted packets to the vCenter Server, leading to remote code execution and potential system compromise.

Vulnerable Products

  • vCenter Server 8.0
  • vCenter Server 7.0
  • VMware Cloud Foundation versions 4.x and 5.x

**Response Matrix:

| VMware Product | Version | Running On | CVE | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
| ------------------ | ----------- | -------------- | ---------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------ | ----------------------------------------------------------------------------------------------------------------- | --------------- | ------------------------------------------------------------------------ |
| vCenter Server | 8.0 | Any | CVE-2024-37079, CVE-2024-37080, CVE-2024-37081 | 9.89.87.8 | Critical | 8.0 U2d | None | FAQ |
| vCenter Server | 8.0 | Any | CVE-2024-37079, CVE-2024-37080 | 9.89.8 | Critical | 8.0 U1e | None | FAQ |
| vCenter Server | 7.0 | Any | CVE-2024-37079, CVE-2024-37080, CVE-2024-37081 | 9.89.87.8 | Critical | 7.0 U3r | None | FAQ |

**

Impacted Product Suites that Deploy Response Matrix 3a and 3b Components:

*

| VMware Product | Version | Running On | CVE | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
| --------------------------------- | ----------- | -------------- | ---------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------ | ------------------------------------------------------------------------- | --------------- | ------------------------------------------------------------------------ |
| Cloud Foundation (vCenter Server) | 5.x | Any | CVE-2024-37079, CVE-2024-37080, CVE-2024-37081 | 9.89.87.8 | Critical | KB88287 | None | FAQ |
| Cloud Foundation (vCenter Server) | 4.x | Any | CVE-2024-37079, CVE-2024-37080, CVE-2024-37081 | 9.89.87.8 | Critical | KB88287 | None | FAQ |

Impact Assessment

Successful exploitation of these vulnerabilities could result in complete control over the affected systems, allowing attackers to perform any action, including data theft, service disruption, and further network compromise.

Patches or Workarounds

VMware has released patches to address these vulnerabilities. Administrators are advised to update to the fixed versions (8.0 U2d, 7.0 U3r) . There are no available workarounds.

Tags

#VMware #vCenterServer #CVE-2023-34048 #RemoteCodeExecution #PatchManagement #Cybersecurity

Cyber Security News · Multiple VMware vCenter Server Flaws Allow Remote Code ExecutionVMware has released a critical security advisory, VMSA-2024-0012, addressing multiple vulnerabilities in VMware vCenter Server, a core component of VMware vSphere and VMware Cloud Foundation products.

Critical Vulnerability in Fluent Bit: CVE-2024-4323

Date: May 20, 2024
CVE: CVE-2024-4323
Vulnerability Type: Memory Corruption
CWE: [[CWE-787]], [[CWE-119]]
Sources: Tenable

Issue Summary

Tenable Research has identified a critical memory corruption vulnerability in Fluent Bit, designated CVE-2024-4323, within its built-in HTTP server. This vulnerability, termed "Linguistic Lumberjack," affects versions 2.0.7 through 3.0.3 and allows potential denial of service, information disclosure, or remote code execution. The issue has been fixed in the main branch and will be included in the upcoming 3.0.4 release.

Technical Key Findings

The vulnerability is rooted in improper handling of data types in the "inputs" array of the /api/v1/traces endpoint. When non-string values, such as integers or negative integers, are passed, it can lead to memory corruption. Exploits could include crashes from wild copies, heap overwrites, and disclosure of adjacent memory, potentially leading to remote code execution under specific conditions.

Vulnerable Products

  • Fluent Bit versions 2.0.7 to 3.0.3

Impact Assessment

Exploitation of CVE-2024-4323 can result in significant disruptions such as service crashes, leakage of sensitive information, and in severe cases, remote code execution, which can compromise entire systems relying on Fluent Bit for logging and monitoring.

Patches or Workarounds

Users should upgrade to Fluent Bit version 3.0.4 or later. If upgrading is not immediately feasible, restricting access to the vulnerable endpoints is recommended to mitigate potential exploitation.

Tags

#CVE-2024-4323 #FluentBit #MemoryCorruption #CloudSecurity #RemoteCodeExecution #VulnerabilityManagement

Tenable® · Linguistic Lumberjack: Attacking Cloud Services via Logging Endpoints (Fluent Bit - CVE-2024-4323)Tenable Research has discovered a critical memory corruption vulnerability dubbed Linguistic Lumberjack in Fluent Bit, a core component in the monitoring infrastructure of many cloud services.

Foxit PDF Reader Users Targeted by Malicious PDF Exploit

Date: May 15, 2024
CVE: CVE-2023-36033
Vulnerability Type: Remote Code Execution (RCE)
CWE: [[CWE-20]], [[CWE-78]], [[CWE-94]]
Sources: GBHackers, Checkpoint Research

Issue Summary

Researchers have identified a critical vulnerability in Foxit PDF Reader that allows attackers to execute malicious code on users' systems by exploiting a design flaw in the application's security warnings. The flaw makes it easy for attackers to trick users into approving malicious actions, leading to unauthorized access and data theft.

Technical Key Findings

The vulnerability stems from Foxit Reader's handling of security warnings, which default to an "OK" option. This flaw enables attackers to craft malicious PDFs that, when opened, prompt the user to approve actions unknowingly. Once approved, these actions can download and execute malicious code from a remote server, bypassing standard security detections.

Vulnerable Products

  • Foxit Reader

Impact Assessment

Exploitation of this vulnerability can lead to severe consequences, including unauthorized access to sensitive data, remote control of the affected device, and the ability to deploy various malware such as VenomRAT, Agent-Tesla, and others. This can result in data breaches, espionage, and further propagation of malware.

Patches or Workarounds

Foxit has acknowledged the issue and that it would be resolved in version 2024 3.

Tags

#FoxitPDF #CVE2023-36033 #RemoteCodeExecution #Malware #CyberSecurity #APT #VulnerabilityPatch #DataBreach

GBHackers on Security | #1 Globally Trusted Cyber Security News Platform · Hackers Attacking Foxit PDF Reader Users To steal Sensitive DataResearchers identified a PDF exploit targeting Foxit Reader users that uses a design flaw that presents security warnings with a default "OK"

Google Chrome Zero-day Vulnerability (CVE-2024-4947)

Date: May 16, 2024

CVE: CVE-2024-4947

Vulnerability Type: Type Confusion

CWE: [[CWE-843]]

Sources: Cybersecurity News Chrome release Blog

Issue Summary

Google has released an emergency update for Chrome to address a high-severity zero-day vulnerability, CVE-2024-4947. Discovered by Kaspersky researchers, this flaw is being actively exploited in the wild and affects the V8 JavaScript engine. The vulnerability allows attackers to perform remote code execution by exploiting a type confusion bug.

Technical Key Findings

CVE-2024-4947 is a type confusion bug in the V8 JavaScript engine, leading to heap corruption. Attackers can craft malicious HTML pages to exploit this flaw, enabling arbitrary code execution on the victim’s system.

Vulnerable Products

  • Google Chrome versions before 125.0.6422.60 on Linux
  • Google Chrome versions before 125.0.6422.60/.61 on Windows and Mac

Impact Assessment

If exploited, this vulnerability can lead to remote code execution, allowing attackers to gain control of the affected system. This poses significant security risks, including potential data breaches and system compromise.

Patches or Workaround

Google has released patches for this vulnerability. Users are advised to update to Chrome version 125.0.6422.60 or later on Linux and 125.0.6422.60/.61 or later on Windows and Mac.

Tags

#CVE-2024-4947 #GoogleChrome #ZeroDay #TypeConfusion #RemoteCodeExecution #CyberSecurity #BrowserSecurity #Patches

Cyber Security News · Google Chrome Zero-day Vulnerability (CVE-2024-4947) Actively Exploited in The WildGoogle has released update for its Chrome to patch a high-severity vulnerability that is being actively exploited by attackers in the wild.

"🚨 Critical Vulnerabilities Alert in ConnectWise Software 🚨"

Two vulnerabilities have been identified in ConnectWise's remote desktop software, ScreenConnect, affecting versions 23.9.7 and prior. The first vulnerability (CVE-2024-1708) is a path-traversal issue allowing potential remote code execution or access to sensitive data, rated with a high severity score of 8.4.

The second (CVE-2024-1709) is an authentication bypass, considered critical with a severity score of 10.0, and is easily exploitable with existing proof-of-concept exploits. ConnectWise has issued updates for cloud-hosted instances, but self-hosted deployments need immediate patching. The exposure is global, with significant concentrations in the United States, and it's expected that cybercriminals and nation-state actors will actively exploit these vulnerabilities.

| ---- | ---- | ---- |
| CVE Number | Description | *CVSS Severity* |
| CVE-2024-1708 | ScreenConnect 23.9.7 and prior are affected by a path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems. | 8.4 High |
| CVE-2024-1709 | ConnectWise ScreenConnect 23.9.7 and prior are affected by an authentication bypass using an alternate path or channel vulnerability, which may allow an attacker direct access to confidential information or critical systems. | 10.0 Critical |

Professionals using ConnectWise must urgently patch their systems to mitigate these vulnerabilities. The discovery underscores the importance of rigorous security practices in protecting IT infrastructures.

🛡️💻🔐

Tags: #CyberSecurity #VulnerabilityAlert #ConnectWise #CVE2024_1708 #CVE2024_1709 #PatchManagement #ITSecurity #RemoteCodeExecution #PrivilegeEscalation

Source: Unit42 by Palo Alto Networks

nvd.nist.govNVD - CVE-2024-1708

"Critical RCE Flaw Uncovered in SolarWinds Access Rights Manager 🚨 #CVE2023-40057"

A newly discovered deserialization vulnerability in SolarWinds Access Rights Manager (versions up to 2023.2.2) poses a severe risk, enabling remote code execution. Classified as very critical with a CVSS score of 8.9, this flaw (CVE-2023-40057) could allow authenticated users to execute arbitrary code remotely. Despite its high impact on confidentiality, integrity, and availability, no exploit is currently available. The vulnerability underscores the importance of validating deserialized data to prevent unauthorized access. No mitigation measures have been identified yet, emphasizing the need for heightened vigilance and potential product alternatives.

Stay informed: CVE-2023-40057 Details

Tags: #CyberSecurity #Vulnerability #SolarWinds #RemoteCodeExecution #RCE #Deserialization #CVE2023-40057 #InfoSec 🛡️💡🔒

nvd.nist.govNVD - CVE-2023-40057

🚨 Breaking News: "PixieFail" UEFI Vulnerabilities Exposed! 🚨

A critical discovery named "PixieFail" has put millions at risk! Quarkslab's team has identified nine severe vulnerabilities in the UEFI's TianoCore EFI Development Kit II. These flaws can lead to Denial of Service (DoS), DNS cache poisoning, and potential data breaches. Major firms like AMI, Intel, Insyde, and Phoenix Technologies are impacted. Immediate patching is advised! 🛡️💻

The vulnerabilities, ranging from CVE-2023-45229 to CVE-2023-45237, have CVSS scores peaking at 8.3. The risks include DNS/DHCP attacks, information exposure, and more. Urging users to remain alert!

Details of the vulnerabilities:

  • CVE-2023-45229 (CVSS: 6.5) - Integer underflow in DHCPv6 Advertise messages processing (IA_NA/IA_TA options).
  • CVE-2023-45230 (CVSS: 8.3) - Buffer overflow in DHCPv6 client via extended Server ID option.
  • CVE-2023-45231 (CVSS: 6.5) - Out-of-bounds read in truncated options of ND Redirect messages.
  • CVE-2023-45232 (CVSS: 7.5) - Infinite loop caused by unknown options in Destination Options header.
  • CVE-2023-45233 (CVSS: 7.5) - Infinite loop from PadN option parsing in Destination Options header.
  • CVE-2023-45234 (CVSS: 8.3) - Buffer overflow from DNS Servers option processing in DHCPv6 Advertise messages.
  • CVE-2023-45235 (CVSS: 8.3) - Buffer overflow in Server ID option handling from DHCPv6 proxy Advertise messages.
  • CVE-2023-45236 (CVSS: 5.8) - Predictable TCP Initial Sequence Numbers.
  • CVE-2023-45237 (CVSS: 5.3) - Weak pseudorandom number generator usage.

For more, visit The Hacker News.

Tags: #CyberSecurity #UEFI #Vulnerabilities #RemoteCodeExecution #DoS #DataTheft #FirmwareSecurity 🌐🔐🛠️🔍

The Hacker NewsPixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data TheftMultiple vulnerabilities, known as PixieFail, have been discovered in widely used UEFI firmware, putting modern computers at risk.

"⚠️ Alert: Androxgh0st Botnet Targets AWS & Microsoft Credentials! 🚨"

The cybersecurity realm is on high alert with the emergence of Androxgh0st, a botnet malware exploiting vulnerabilities to steal AWS and Microsoft credentials. It's a Python-scripted threat, targeting sensitive .env files and leveraging SMTP for credential scanning and web shell deployment. Key vulnerabilities exploited include CVE-2017-9841, CVE-2018-15133, and CVE-2021-41773, allowing remote code execution and file uploads. This critical development warrants immediate attention and proactive defense strategies.

Tags: #CyberSecurity #Botnet #Androxgh0st #Vulnerability #AWS #Microsoft #SMTP #PHP #CVE20179841 #CVE201815133 #CVE202141773 #RemoteCodeExecution #CyberAttack

Sources:

Mitre - CVE-2017-9841
Mitre - CVE-2018-15133
Mitre - CVE-2021-41773

GBHackers on Security | #1 Globally Trusted Cyber Security News Platform · Hackers Deploying Androxgh0st Botnet Malware that Steals AWS, Microsoft CredentialsFBI and CISA recently discovered that hackers are actively deploying Androxgh0st botnet malware that steals AWS, and Microsoft credentials.

"⚠️ Critical Apache Struts Vulnerability Alert! CVE-2023-50164 🚨"

Hackers are exploiting a critical vulnerability in Apache Struts (CVE-2023-50164), a popular Java EE web app framework used widely in various industries. This flaw allows unauthorized remote code execution, posing a severe threat to organizations using Struts versions 2.0.0 through 2.5.32 and 6.0.0 through 6.3.0.1. Attackers can manipulate file upload parameters for path traversal, leading to malicious file uploads and potentially gaining control over the server. An immediate upgrade to Struts 2.5.33 or 6.3.0.2 is vital to mitigate this risk.

Source: BleepingComputer, [trganda.github.io](trganda.github.io/notes/securi, Qualys ThreatPROTECT

Author Credits: Bill Toulas (BleepingComputer), Diksha Ojha (Qualys ThreatPROTECT)

Tags: #CyberSecurity #ApacheStruts #Vulnerability #CVE2023-50164 #RemoteCodeExecution #InfoSec

"🚨 Exim Mail Servers Under Siege: New Critical Flaws Unearthed 🚨"

A recent disclosure has unveiled multiple security vulnerabilities in the Exim mail transfer agent, posing a significant threat to information disclosure and remote code execution. The flaws, reported anonymously in June 2022, include:

  • CVE-2023-42114 (CVSS score: 3.7) - Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability
  • CVE-2023-42115 (CVSS score: 9.8) - Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability
  • CVE-2023-42116 (CVSS score: 8.1) - Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability
  • CVE-2023-42117 (CVSS score: 8.1) - Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability
  • CVE-2023-42118 (CVSS score: 7.5) - Exim libspf2 Integer Underflow Remote Code Execution Vulnerability
  • CVE-2023-42119 (CVSS score: 3.1) - Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability

The most severe among these is CVE-2023-42115, enabling remote, unauthenticated attackers to execute arbitrary code on affected Exim installations. The Exim maintainers have already provided fixes for some of these vulnerabilities, while discussions are ongoing regarding the remaining issues.

This disclosure follows a history of security flaws in Exim, including the notorious 21Nails vulnerabilities and a critical Exim vulnerability (CVE-2019-10149, CVSS score: 9.8) exploited by the state-sponsored Sandworm group from Russia.

Source: The Hacker News

Tags: #Exim #CyberSecurity #Vulnerabilities #RemoteCodeExecution #InformationDisclosure #CVE202342115 #CVE202342116 #CVE202342117 #CVE202342118 #CVE202342119 #CVE202342114 🛡️💻🔓

The Hacker NewsNew Critical Security Flaws Expose Exim Mail Servers to Remote Attacks📢 Attention IT Admins! Multiple vulnerabilities in Exim mail agent exposed. Find out how unauthenticated attackers could exploit these vulnerabilitie

"🚨 Juniper Firewalls Under Siege: Over 12,000 Vulnerable Devices Exposed! 🔥"

New research reveals nearly 12,000 internet-facing Juniper firewall devices are susceptible to a recently disclosed remote code execution flaw. The vulnerability, identified as CVE-2023-36845, allows an unauthenticated remote attacker to execute arbitrary code without creating a file on the system. This medium-severity flaw in the J-Web component of Junos OS can be weaponized by adversaries to control certain environment variables. Juniper Networks patched this alongside other vulnerabilities last month. A proof-of-concept (PoC) exploit by watchTowr combined CVE-2023-36846 and CVE-2023-36845 to upload malicious PHP files and achieve code execution. Jacob Baines points out, "Firewalls are interesting targets to APT as they help bridge into the protected network and can serve as useful hosts for C2 infrastructure." Juniper has acknowledged the vulnerability but is unaware of any successful exploits against its customers. However, they've detected exploitation attempts in the wild, urging users to apply necessary patches. 🛡️

Source: The Hacker News

Tags: #Juniper #Firewall #Cybersecurity #Vulnerability #CVE202336845 #RemoteCodeExecution #JunosOS #APT #ThreatLandscape 🌐🔐🔍

The Hacker NewsOver 12,000 Juniper Firewalls Found Vulnerable to Recently Disclosed RCE VulnerabilityNearly 12,000 Juniper firewall devices exposed on the internet are vulnerable to a recently disclosed remote code execution flaw.

"⚠️ #KubernetesAlert: High-Severity Flaws Target Windows Endpoints! ⚠️"

Three critical vulnerabilities have been unearthed in Kubernetes, enabling remote code execution on Windows nodes within clusters. These flaws, identified as CVE-2023-3676, CVE-2023-3893, and CVE-2023-3955, boast CVSS scores of 8.8. Akamai's Tomer Peled, who responsibly disclosed these issues, emphasized, "Attackers only need to apply a malicious YAML file on the cluster to exploit." Major cloud platforms like AWS, Google Cloud, and Microsoft Azure have all issued advisories. The root cause? A glaring oversight in input sanitization in the Windows-specific Kubelet porting.

Source: The Hacker News

Tags: #Kubernetes #Cybersecurity #Vulnerability #WindowsNodes #RemoteCodeExecution #CloudSecurity #Akamai #AWS #GoogleCloud #Azure #Kubelet

🔗 MITRE CVE-2023-3676
🔗 MITRE CVE-2023-3893
🔗 MITRE CVE-2023-3955

The Hacker NewsAlert: New Kubernetes Vulnerabilities Enable Remote Attacks on Windows EndpointsCritical security flaws discovered in Kubernetes could lead to remote code execution with elevated privileges on Windows endpoints within a cluster