CVE-2023-23397

KEV
Microsoft Office LTSC 2021

14 Mar 2023
Published
14 Dec 2023
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
92.64%

  • 2 Posts
  • 8 Interactions

CVE Info

Microsoft Outlook Elevation of Privilege Vulnerability

Fediverse

Profile picture

Russian hackers have used a zero-day exploit to target Kevin Kühnert, General Secretary of the Social Democratic Party. (We're talking about CVE-2023-23397). Happened back in December 2022 and was just last week attributed officially (€)

Logs are not going back long enough, so nobody has an idea if/what data was exfiltrated

spiegel.de/netzwelt/web/kevin-

  • 2
  • 3
  • 9 hours ago
Profile picture

Der Spiegel: Kevin Kühnerts Postfach von russischen Hackern angegriffen (German, paywall)
Der Spiegel reports that Social Democratic Party of Germany (SPD) General Secretary Kevin Kühnert was one of the main victims of the APT28 2023 cyberattacks with his email inbox being targeted. "the attack occurred in December 2022, earlier than previously known."
While CVE-2023-23397 (9.8 critical, disclosed 14 March 2023 by Microsoft) is not explicitly mentioned in the article, they state "The vulnerability was rated 9.8 out of 10 and has apparently been exploited since April 2022." Hakan Tanriverdi (@hatr) also references it in his toot.
Der Spiegel said digital forensics turned up nothing due to the length of time passed: "However, according to SPIEGEL information, it was apparently no longer possible to find and analyze sufficient log files to accurately reconstruct the case."

  • 1
  • 2
  • 8 hours ago

CVE-2024-33655

Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

  • 2 Posts
  • 30 Interactions

CVE Info

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Fediverse

Profile picture

Today we released Unbound 1.20.0. This release has a fix for the DNSBomb issue CVE-2024-33655, which had a low severity for our #DNS resolver. nlnetlabs.nl/news/2024/May/08/

  • 19
  • 10
  • 21 hours ago
Profile picture

Unbound 1.20.0

This release has a fix for the DNSBomb issue CVE-2024-33655. This has a
low severity for Unbound, since it makes Unbound complicit in targeting
others, but does not affect Unbound so much.

  • 1
  • 0
  • 21 hours ago

CVE-2024-31497

Pending

15 Apr 2024
Published
01 May 2024
Updated

CVSS
Pending
EPSS
Pending

  • 2 Posts
  • 4 Interactions

CVE Info

In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an attacker to recover a user's NIST P-521 secret key via a quick attack in approximately 60 signatures. This is especially important in a scenario where an adversary is able to read messages signed by PuTTY or Pageant. The required set of signed messages may be publicly readable because they are stored in a public Git service that supports use of SSH for commit signing, and the signatures were made by Pageant through an agent-forwarding mechanism. In other words, an adversary may already have enough signature information to compromise a victim's private key, even if there is no further use of vulnerable PuTTY versions. After a key compromise, an adversary may be able to conduct supply-chain attacks on software maintained in Git. A second, independent scenario is that the adversary is an operator of an SSH server to which the victim authenticates (for remote login or file copy), even though this server is not fully trusted by the victim, and the victim uses the same private key for SSH connections to other services operated by other entities. Here, the rogue server operator (who would otherwise have no way to determine the victim's private key) can derive the victim's private key, and then use it for unauthorized access to those other services. If the other services include Git services, then again it may be possible to conduct supply-chain attacks on software maintained in Git. This also affects, for example, FileZilla before 3.67.0, WinSCP before 6.3.3, TortoiseGit before 2.15.0.1, and TortoiseSVN through 1.14.6.

Fediverse

Profile picture

Allarme Sicurezza: Una Vulnerabilità critica su XenCenter di Citrix mette a rischio i sistemi
poliverso.org/display/0477a01e
Allarme Sicurezza: Una Vulnerabilità critica su XenCenter di Citrix mette a rischio i sistemi Una nuova vulnerabilità support.citrix.com/article/CTX è stata scoperta nelle versioni di XenCenter per Citrix Hypervisor 8.2 CU1 LTSR che potrebbe mettere a rischio la sicurezza

  • 1
  • 0
  • 9 hours ago
Profile picture

unexpected Citrix security advisory: Citrix Hypervisor Security Update for CVE-2024-31497
Citrix confirms that versions of XenCenter for Citrix Hypervisor 8.2 CU1 LTSR included PuTTY vulnerable to CVE-2024-31497 (CVSS score pending, disclosed 15 April 2024 by MITRE): In versions of PuTTY prior to version 0.81; when used in conjunction with XenCenter, this issue may, in some scenarios, allow an attacker who controls a guest VM to determine the SSH private key of a XenCenter administrator who uses that key to authenticate to that guest VM while using an SSH connection. Citrix recommends updated version (with a version number of at least 0.81) or removing PuTTY component completely (Note that versions of XenCenter for XenServer 8 have never included PuTTY.)

See related Bleeping Computer article about CVE-2024-31497: PuTTY SSH client flaw allows recovery of cryptographic private keys

  • 1
  • 2
  • 13 hours ago

CVE-2024-29212

Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

  • 3 Posts
  • 4 Interactions

CVE Info

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Fediverse

Profile picture

Veeam security advisory: Veeam Service Provider Console Vulnerability ( CVE-2024-29212 )
CVE-2024-29212 (8.8 high) Under certain conditions, an unsafe deserialization method in Veeam Service Provider Console (VSPC) server allows for remote code execution. Fixed in 7.0.0.18899 and 8.0.0.19236. No mention of exploitation.

  • 2
  • 2
  • 16 hours ago
Profile picture

Veeam Service Provider Console Affected by Severe RCE Vulnerability: CVE-2024-29212

socradar.io/veeam-service-prov

  • 0
  • 0
  • 18 hours ago
Profile picture

Resumen de las últimas 24 horas en seguridad informática: Nuevo ataque "TunnelVision" compromete VPN, hackers crean admins en WordPress, DocGo sufre ciberataque, vulnerabilidad RCE en Veeam y hackeo al chatbot de Microsoft. Exposición de datos en Ministerio de Defensa del Reino Unido y peligros tecnológicos en Apache Guacamole. Descubre estos detalles y más en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 08/05/24 📆 |====

🔒 NUEVO ATAQUE FILTRA TRÁFICO DE VPN

Descubre cómo el ataque "TunnelVision" puede comprometer la seguridad de tu conexión VPN, permitiendo a los atacantes espiar tu tráfico no cifrado. ¡Asegura tu privacidad en línea! 👉 djar.co/YRPUFw

🧨 HACKERS CREAN ADMINISTRADORES DE WORDPRESS

Conoce cómo los hackers están aprovechando una vulnerabilidad en LiteSpeed Cache para tomar el control de sitios web en WordPress. Protege tu página con las últimas actualizaciones ahora mismo. 👉 djar.co/DhsfAk

💉 DOCGO SUFRE CIBERATAQUE

DocGo confirma el robo de datos de salud de pacientes tras un ciberataque. ¿Estás protegiendo tus datos médicos de forma adecuada? Descubre más detalles aquí. 👉 djar.co/fjKkG

🚨 VULNERABILIDAD RCE DE VEEAM

La CVE-2024-29212 expone servicios de protección de datos al riesgo de ejecución remota de código. ¡Entérate de los detalles y toma medidas preventivas ahora! 👉 djar.co/eeDa5

🔓 HACKERS VULNERAN CHATBOT DE MICROSOFT

Lee cómo se logró hackear el chatbot de atención médica de Microsoft y las medidas tomadas para proteger la información sensible de los usuarios. ¡Descubre cómo evitar posibles vulnerabilidades! 👉 djar.co/PbCE7

🇬🇧 EXPOSICIÓN DE DATOS DEL MINISTERIO DE DEFENSA

El Reino Unido confirma una brecha de datos donde se expusieron datos de nómina del Ministerio de Defensa. Asegura la privacidad de tus datos personales. 👉 djar.co/bW7a9N

🔍 PELIGROS DE LA VARIEDAD TECNOLÓGICA

Descubre los desafíos de la interoperabilidad de código en la vulnerabilidad detectada en la pasarela de escritorio remoto Apache Guacamole. Mantente informado sobre los riesgos actuales en tecnología. 👉 djar.co/ZXlSzc

  • 0
  • 0
  • 17 hours ago

CVE-2024-26026

F5 BIG-IP Next Central Manager

08 May 2024
Published
08 May 2024
Updated

CVSS v3.1
HIGH (7.5)
EPSS
Pending

  • 3 Posts
  • 7 Interactions

CVE Info

An SQL injection vulnerability exists in the BIG-IP Next Central Manager API (URI).  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Fediverse

Profile picture

F5 security advisories:

  • K000138732: BIG-IP Next Central Manager OData Injection vulnerability CVE-2024-21793 (7.5 high)
  • K000138733: BIG-IP Next Central Manager SQL Injection vulnerability CVE-2024-26026 (7.5 high)

Eclypsium helpfully provided proofs of concept: Big Vulnerabilities in Next-Gen BIG-IP

See related Bleeping Computer reporting: New BIG-IP Next Central Manager bugs allow device takeover

  • 2
  • 3
  • 10 hours ago
Profile picture

F5 has released software updates to fix two security vulnerabilities in its BIG-IP Next Central Manager software.

The vulnerabilities are tracked as CVE-2024-26026 and CVE-2024-21793, and when exploited, can allow an attacker to take admin control of the software.

Administrators are advised to update ASAP.

#cybersecurity #F5 #vulnerabilitymanagement

bleepingcomputer.com/news/secu

  • 0
  • 0
  • 4 hours ago
Profile picture

Why you should care about the new F5 BIG-IP vulnerabilities CVE-2024-21793 and CVE-2024-26026:

cc: @todb

  • 0
  • 2
  • 8 hours ago

CVE-2024-21793

F5 BIG-IP Next Central Manager

08 May 2024
Published
08 May 2024
Updated

CVSS v3.1
HIGH (7.5)
EPSS
Pending

  • 3 Posts
  • 7 Interactions

CVE Info

An OData injection vulnerability exists in the BIG-IP Next Central Manager API (URI).  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Fediverse

Profile picture

F5 security advisories:

  • K000138732: BIG-IP Next Central Manager OData Injection vulnerability CVE-2024-21793 (7.5 high)
  • K000138733: BIG-IP Next Central Manager SQL Injection vulnerability CVE-2024-26026 (7.5 high)

Eclypsium helpfully provided proofs of concept: Big Vulnerabilities in Next-Gen BIG-IP

See related Bleeping Computer reporting: New BIG-IP Next Central Manager bugs allow device takeover

  • 2
  • 3
  • 10 hours ago
Profile picture

F5 has released software updates to fix two security vulnerabilities in its BIG-IP Next Central Manager software.

The vulnerabilities are tracked as CVE-2024-26026 and CVE-2024-21793, and when exploited, can allow an attacker to take admin control of the software.

Administrators are advised to update ASAP.

#cybersecurity #F5 #vulnerabilitymanagement

bleepingcomputer.com/news/secu

  • 0
  • 0
  • 4 hours ago
Profile picture

Why you should care about the new F5 BIG-IP vulnerabilities CVE-2024-21793 and CVE-2024-26026:

cc: @todb

  • 0
  • 2
  • 8 hours ago

CVE-2024-3661

IETF DHCP

06 May 2024
Published
08 May 2024
Updated

CVSS v3.1
HIGH (7.6)
EPSS
0.05%

  • 1 Post
  • 1 Interaction

CVE Info

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.

Fediverse

Profile picture

Na toll! Ich hatte auf einen entspannten Vor-Feiertags-Tag gesetzt und dann das: CVE-2024-3661

😩

  • 0
  • 1
  • 21 hours ago

CVE-2023-24069

Pending

23 Jan 2023
Published
Pending
Updated

CVSS v3.1
LOW (3.3)
EPSS
Pending

  • 1 Post

CVE Info

** DISPUTED ** Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to obtain potentially sensitive attachments sent in messages from the attachments.noindex directory. Cached attachments are not effectively cleared. In some cases, even after a self-initiated file deletion, an attacker can still recover the file if it was previously replied to in a conversation. (Local filesystem access is needed by the attacker.) NOTE: the vendor disputes the relevance of this finding because the product is not intended to protect against adversaries with this degree of local access.

Fediverse

Profile picture

@das_menschy hängt vom Einsatzszenario ab, denn wenn ein User Signal-Desktop verwendet, sind dort die „Angänge“ nicht verschlüsselt gespeichert, was imho somit unsicher ist.
Weiter fies daran ist, dass der Sendende nicht weiss ob der Empfänger dies mit der Desktop-App abruft. Die mit Desktop-App empfangenen „Anhänge“ lassen sich auch manipulieren.
Ergo mit Signal niemals vertrauliche oder privacy-relevante Dateien senden.

johnjhacking.com/blog/cve-2023

  • 0
  • 0
  • 8 hours ago

CVE-2023-24068

Pending

23 Jan 2023
Published
Pending
Updated

CVSS v3.1
HIGH (7.8)
EPSS
Pending

  • 1 Post

CVE Info

** DISPUTED ** Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to modify conversation attachments within the attachments.noindex directory. Client mechanisms fail to validate modifications of existing cached files, resulting in an attacker's ability to insert malicious code into pre-existing attachments or replace them completely. A threat actor can forward the existing attachment in the corresponding conversation to external groups, and the name and size of the file will not change, allowing the malware to masquerade as another file. NOTE: the vendor disputes the relevance of this finding because the product is not intended to protect against adversaries with this degree of local access.

Fediverse

Profile picture

@das_menschy hängt vom Einsatzszenario ab, denn wenn ein User Signal-Desktop verwendet, sind dort die „Angänge“ nicht verschlüsselt gespeichert, was imho somit unsicher ist.
Weiter fies daran ist, dass der Sendende nicht weiss ob der Empfänger dies mit der Desktop-App abruft. Die mit Desktop-App empfangenen „Anhänge“ lassen sich auch manipulieren.
Ergo mit Signal niemals vertrauliche oder privacy-relevante Dateien senden.

johnjhacking.com/blog/cve-2023

  • 0
  • 0
  • 8 hours ago

CVE-2024-23706

Google Android

07 May 2024
Published
07 May 2024
Updated

CVSS
Pending
EPSS
Pending

  • 1 Post

CVE Info

In multiple locations, there is a possible bypass of health data permissions due to an improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Fediverse

Profile picture

The bug, tracked as CVE-2024-23706 and impacting Android 14, could allow attackers to escalate their privileges on vulnerable devices, Google notes in its advisory. securityweek.com/android-updat

  • 0
  • 0
  • 17 hours ago

CVE-2023-46747

KEV
F5 BIG-IP

26 Oct 2023
Published
06 Nov 2023
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
Pending

  • 1 Post
  • 2 Interactions

CVE Info

Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Fediverse

Profile picture

Why you should care about the new F5 BIG-IP vulnerabilities CVE-2024-21793 and CVE-2024-26026:

cc: @todb

  • 0
  • 2
  • 8 hours ago

CVE-2020-5902

KEV
BIG-IP

01 Jul 2020
Published
14 Nov 2023
Updated

CVSS
Pending
EPSS
Pending

  • 1 Post
  • 2 Interactions

CVE Info

In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.

Fediverse

Profile picture

Why you should care about the new F5 BIG-IP vulnerabilities CVE-2024-21793 and CVE-2024-26026:

cc: @todb

  • 0
  • 2
  • 8 hours ago

CVE-2022-1388

KEV
F5 BIG-IP

05 May 2022
Published
18 Oct 2023
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
Pending

  • 1 Post
  • 2 Interactions

CVE Info

On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Fediverse

Profile picture

Why you should care about the new F5 BIG-IP vulnerabilities CVE-2024-21793 and CVE-2024-26026:

cc: @todb

  • 0
  • 2
  • 8 hours ago

CVE-2023-46748

KEV
F5 BIG-IP

26 Oct 2023
Published
06 Nov 2023
Updated

CVSS v3.1
HIGH (8.8)
EPSS
Pending

  • 1 Post
  • 2 Interactions

CVE Info

An authenticated SQL injection vulnerability exists in the BIG-IP Configuration utility which may allow an authenticated attacker with network access to the Configuration utility through the BIG-IP management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Fediverse

Profile picture

Why you should care about the new F5 BIG-IP vulnerabilities CVE-2024-21793 and CVE-2024-26026:

cc: @todb

  • 0
  • 2
  • 8 hours ago

CVE-2021-22986

KEV
BIG-IP; BIG-IQ

31 Mar 2021
Published
02 Apr 2021
Updated

CVSS
Pending
EPSS
Pending

  • 1 Post
  • 2 Interactions

CVE Info

On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

Fediverse

Profile picture

Why you should care about the new F5 BIG-IP vulnerabilities CVE-2024-21793 and CVE-2024-26026:

cc: @todb

  • 0
  • 2
  • 8 hours ago