Vulnerabilities – The Cyber Express Trending Cybersecurity News, Updates, Magazine and More.
- Cyble Warns of Escalating Cyber Risks in IoT and WordPress Plugins Amid Phishing Surgeby Ashish Khaitan on November 4, 2024 at 12:13 pm
In the latest edition of Cyble’s weekly sensor intelligence report, cybersecurity experts revealed a concerning surge in attacks targeting the LightSpeed Cache and GutenKit WordPress plugins. As the report outlines, vulnerabilities in Internet of Things (IoT) devices and Virtual Network Computing (VNC) systems are escalating at an alarming rate, posing online risks to digital security. According to Cyble’s sensor intelligence report, the WordPress ecosystem remains a prime target for cybercriminals. This week, two high-severity vulnerabilities were highlighted: CVE-2024-44000 affecting LightSpeed Cache and CVE-2024-9234 affecting GutenKit. These vulnerabilities highlight the ongoing appeal of content management systems (CMS) to threat actors, who exploit weaknesses to execute their malicious activities. Cyble Sensor Intelligence Report: Vulnerabilities in WordPress Plugins LightSpeed Cache Vulnerability: CVE-2024-44000 The first notable vulnerability, CVE-2024-44000, pertains to the LiteSpeed Cache plugin, which is designed to enhance website performance and optimization for WordPress. This vulnerability is characterized by insufficiently protected credentials, enabling potential authentication bypass that could lead to account takeover. The vulnerability affects all versions of LiteSpeed Cache prior to 6.5.0.1. Exploitation of this flaw allows unauthenticated users to gain access to accounts of currently logged-in users, including those with administrator privileges. GutenKit Vulnerability: CVE-2024-9234 The second vulnerability, CVE-2024-9234, affects the GutenKit Page Builder Blocks, Patterns, and Templates plugin. This flaw allows arbitrary file uploads due to a missing capability check in the install_and_activate_plugin_from_external() function. All versions up to and including 2.1.0 are vulnerable, enabling unauthenticated attackers to not only install arbitrary plugins but also upload malicious files disguised as legitimate plugins. Cyberattacks and Phishing Attempts Cyble’s report does not stop at WordPress and IoT vulnerabilities. It also outlines persistent threats against various systems, including Linux, Java, and other programming frameworks. The attack landscape for PHP, GeoServer, and both Python and Spring Java frameworks continues to be active, posing additional risks to organizations relying on these technologies. In addition to the plugin vulnerabilities, Cyble’s sensors identified a surge in phishing campaigns, detecting thousands of new scams emails each week. In total, 385 new phishing email addresses were recorded, each linked to various scam attempts. The report provides details on several prominent scams, including fake refund claims and unrealistic investment offers, illustrating the diverse strategies employed by cybercriminals to deceive unsuspecting victims. Conclusion Cyble emphasizes the urgent need for organizations to adopt proactive security measures to counter the rising threats detailed in their latest sensor intelligence report. Key recommendations include prioritizing the patching of known vulnerabilities, closely monitoring network activity for unusual behavior, and implementing strong password protocols with regular updates. Additionally, organizations should block known malicious IP addresses and secure frequently targeted ports while conducting regular security audits to identify weaknesses. As cyber threats continue to evolve, maintaining vigilance and a proactive approach is essential for protecting digital assets from exploitation and breaches. By following these recommendations, organizations can enhance their defenses and protect sensitive information.
- New Vulnerabilities in Fortinet, SonicWall, and Grafana Pose Significant Risksby Ashish Khaitan on November 4, 2024 at 9:59 am
Cyble Research and Intelligence Labs (CRIL) has identified new IT vulnerabilities affecting Fortinet, SonicWall, Grafana Labs, and CyberPanel, among others. The report for the week of October 23-29 highlights seven IT vulnerabilities that require urgent attention from security teams, particularly given the sheer number of exposed devices involved. The latest findings indicate that vulnerabilities in Fortinet, SonicWall, and Grafana Labs impact over 1 million web-facing assets. Notably, two high-severity vulnerabilities in CyberPanel have already been leveraged in widespread ransomware attacks. Organizations are urged to quickly assess their environments for these vulnerabilities and implement necessary patches and mitigations. Major IT Vulnerabilities of the Week Here are the top vulnerabilities detailed by Cyble’s researchers, emphasizing the potential impact on IT security: CVE-2024-40766: SonicWall SonicOS Rated at 9.8 for severity, CVE-2024-40766 represents an improper access control vulnerability within the administrative interface of SonicWall’s SonicOS. This vulnerability has garnered the attention of managed security firms like Arctic Wolf, which report that ransomware groups such as Fog and Akira are exploiting it in SSL VPN environments to infiltrate networks. CVE-2024-47575 and CVE-2024-23113: Fortinet FortiOS and FortiManager Fortinet has been targeted by threat actors exploiting two vulnerabilities, both rated at 9.8. CVE-2024-47575, also known as “FortiJump,” allows attackers to execute arbitrary code through specially crafted requests in FortiManager. Concerns had arisen about Fortinet’s delay in disclosing this zero-day vulnerability prior to its public announcement on October 23. While Fortinet did notify some customers of a vulnerability in FortiManager with recommended mitigations, reports indicate that not all customers received this communication, highlighting a potential gap in the advisory process. Furthermore, CVE-2024-23113 affects multiple versions of FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager, allowing remote, unauthenticated attackers to execute arbitrary code. CVE-2024-9264: Grafana Labs The vulnerability, rated at 9.4, CVE-2024-9264, concerns the SQL Expressions feature in Grafana Labs’ open-source analytics and monitoring platform. This vulnerability allows for command injection and local file inclusion due to insufficient sanitization of user input in ‘duckdb’ queries. CVE-2024-51567 and CVE-2024-51568: CyberPanel CyberPanel has recently faced severe vulnerabilities rated at 10.0, CVE-2024-51567, and CVE-2024-51568. The first vulnerability allows attackers to bypass authentication and execute arbitrary commands, leading to significant exploitation in recent ransomware attacks. The second vulnerability involves a command injection flaw that poses serious risks to server management. CVE-2024-46483: Xlight FTP Server This critical integer overflow vulnerability affects the Xlight FTP Server, potentially allowing attackers to exploit packet parsing logic leading to heap overflows. With the availability of public Proof of Concepts (PoCs), this vulnerability could be weaponized in various attack campaigns. Recommendations and Mitigations To mitigate the risks posed by these vulnerabilities, organizations are encouraged to adopt the following best practices: Ensure all software and hardware systems receive the latest patches from official vendors. Implement an organized approach to inventory management, patch assessment, testing, deployment, and verification. Isolate critical assets using firewalls, VLANs, and access controls to reduce the attack surface. Create and maintain an incident response plan, testing it regularly to adapt to emerging threats. Employ comprehensive monitoring solutions to detect and analyze suspicious activities in real-time. Keep abreast of advisories from vendors, CERTs, and other sources to quickly address vulnerabilities. Engage in vulnerability assessments and penetration testing to identify and remediate weaknesses. Conclusion The vulnerabilities identified this week highlight the need for organizations to prioritize the patching of critical IT vulnerabilities. With the increasing chatter about these exploits on dark web forums, security teams must remain vigilant and proactive. Implementing better security practices is essential to safeguard sensitive data and maintain the integrity of systems against online threats. The vulnerabilities in Fortinet, SonicWall, and Grafana Labs represent just a fraction of the risks that IT environments face today, making immediate action imperative.
- IoT Vulnerabilities Exposed: Philips Smart Bulbs Pose Risks to Home Wi-Fi Securityby Samiksha Jain on October 28, 2024 at 6:03 am
In an era where the Internet of Things (IoT) promises convenience and efficiency, the rapid adoption of smart home technology comes with hidden security risks. From smart fridges to light bulbs, IoT devices have transformed our homes into connected hubs controlled via smartphones. However, a recent report on vulnerabilities in Philips smart lighting products reveals just how easily hackers can exploit these devices to gain unauthorized access to home networks, raising concerns about the security of everyday tech. CERT-In’s Warning: Vulnerabilities in Philips Smart Lighting Products On October 25, 2024, India’s Computer Emergency Response Team (CERT-In) issued a high-severity vulnerability in Philips smart lighting products (CIVN-2024-0329). The advisory highlighted the risks associated with storing sensitive Wi-Fi credentials in plain text within the devices’ firmware. The affected devices include Philips Smart Wi-Fi LED Batten, LED T Beamer, and a range of Smart Bulb and T-Bulb models, all using firmware versions prior to 1.33.1. Smart light bulbs, such as Philips’ Wi-Fi-enabled models, have grown popular among tech-savvy consumers. These bulbs connect to home Wi-Fi networks, allowing users to control brightness, color, and other settings from anywhere in the world through a phone app. Configuration is simple: after installation, the bulb can be toggled on and off multiple times to enter setup mode, transforming the device into a temporary Wi-Fi access point that connects to a smartphone for configuration. However, this ease of use also provides an entry point for hackers. If a hacker gains physical access to these devices, they could extract the firmware and obtain sensitive data by analyzing the binary code. Storing Wi-Fi credentials in plain text not only simplifies the setup process but also makes these credentials easily accessible to potential attackers. Once Wi-Fi credentials are obtained, hackers can connect to the home network, potentially gaining access to other connected devices and private information. CERT-In strongly recommends that users upgrade their firmware to version 1.33.1 to mitigate this vulnerability in Philips smart lighting products. Source: CERT-In Weak Authentication and Network Impersonation: A Recipe for Intrusion A study examining the security weaknesses in IoT light bulbs like Philips smart bulbs revealed further vulnerabilities during the setup process. When entering configuration mode, the bulb lacks a secure authentication standard, allowing attackers to create a fake access point that the user may mistakenly connect to instead of the light bulb. This unauthorized access, known as “man-in-the-middle” interference, allows attackers to intercept the communication between the user’s app and the device. The method used to authenticate devices during the setup process is also weak. The checksum, a security code embedded within the bulb’s firmware, can be obtained through decompilation and brute force, especially since it’s only 32 bits. With current computing power, it takes just over two hours on average to crack this code, enabling attackers to mimic the device and intercept user credentials, such as the Wi-Fi password and manufacturer portal login. Beyond the vulnerability of the authentication process, the study also noted weaknesses in the encryption used for communication between the bulb and the app. Philips smart bulbs employ AES-128-CBC, a cryptographic algorithm, to secure data. While AES-128-CBC is generally reliable, the way it’s implemented in these devices opens the door for potential breaches. Determined attackers could potentially decipher the encrypted data, thereby accessing sensitive information sent between the bulb and the app. Credential Stuffing and the Ripple Effect of Poor IoT Security When attackers successfully extract Wi-Fi credentials from a compromised device, they can potentially conduct “credential stuffing” attacks. Credential stuffing involves using one set of stolen credentials to try to access multiple accounts, as many users reuse the same password across platforms. Thus, a hacker who compromises a Philips smart bulb and obtains its credentials might use this information to access the user’s social media, email, or even financial accounts if the user relies on similar passwords. The example of Philips smart bulbs sheds light on a broader issue in IoT security. Weak security measures in one device can affect a range of other systems connected to the same network. Security Vulnerabilities in the ZigBee Protocol: The Philips Hue Case Philips smart bulbs are not the only IoT lighting products to be scrutinized. A prior security analysis of the Philips Hue smart bulbs identified vulnerabilities in the ZigBee protocol, which is used to manage IoT devices remotely. The flaw, designated as CVE-2020-6007, allowed hackers to gain control over the bulb and install malware, with a severity score of 7.9 on the CVSS scale, indicating a high-risk vulnerability. ZigBee’s protocol vulnerability enabled hackers to infiltrate the user’s network via the smart bulb, spreading malware or exploiting other IoT devices connected to the network. This incident highlights the broader security concerns across IoT lighting products, as hackers can leverage one device’s weakness to penetrate larger home networks. Steps Toward a Secure IoT Ecosystem While the convenience of smart lighting and other IoT devices is undeniable, these benefits come at the cost of potential security weaknesses. For users, it is crucial to take proactive steps, such as installing firmware updates, using unique passwords for each platform, and securing their Wi-Fi networks with strong passwords. Manufacturers, on the other hand, need to adopt robust security standards and make device security a priority from the outset. For Philips users, CERT-In recommends upgrading to firmware version 1.33.1 for all affected devices to reduce the risk of unauthorized access. Philips and other IoT manufacturers are being urged to enhance security measures to protect consumers from these vulnerabilities.
- Critical Vulnerabilities Found in Siemens and Schneider Electric Productsby Ashish Khaitan on October 25, 2024 at 8:18 am
Cyble Research & Intelligence Labs (CRIL) has shared its weekly ICS vulnerability report, highlighting multiple vulnerabilities affecting industrial control systems (ICS). This weekly industrial control system vulnerability blog emphasizes the critical need for quick action in mitigating these threats. The findings were released by the Cybersecurity and Infrastructure Security Agency (CISA) for the week of October 15 to October 21, 2024, detailing 13 vulnerabilities spanning several well-known manufacturers, including Siemens and Schneider Electric. ICS Vulnerability Report Sheds Light on Major Flaws During the specified period, CISA published seven security advisories that spotlighted vulnerabilities across multiple companies, namely Siemens, Schneider Electric, Elvaco, Mitsubishi Electric, HMS Networks, Kieback&Peter, and LCDS – Leão Consultoria e Desenvolvimento de Sistemas Ltda ME. Among these, Elvaco reported four vulnerabilities, while Kieback&Peter highlighted three. Particular attention is drawn to vulnerabilities impacting the Elvaco CMe3100 and Kieback&Peter DDC4000 Series. The Elvaco CMe3100, a compact communication gateway designed for remote energy meter reading, has been exposed online in numerous instances—1,186 to be exact – primarily located in Sweden, according to Cyble’s ODIN scanner. In contrast, Kieback&Peter’s DDC4000 Series, utilized predominantly in HVAC management, has shown eight instances that require immediate action. Detailed Vulnerability Insights The vulnerabilities reported offer essential insights that organizations should prioritize when planning their patching efforts. Among the critical vulnerabilities identified are: CVE-2024-3506: This medium-severity vulnerability affects Siemens’ Siveillance Video Camera. All versions prior to V13.2 are susceptible to a classic buffer overflow, potentially compromising physical access controls and CCTV operations. CVE-2023-8531: Schneider Electric’s Data Center Expert is vulnerable in versions 8.1.1.3 and earlier. This high-severity flaw involves improper verification of cryptographic signatures, impacting various control systems including DCS, SCADA, and BMS. CVE-2024-49396 and CVE-2024-49398: Elvaco’s CMe3100, particularly version 1.12.1, faces critical risks from insufficiently protected credentials (CVE-2024-49396) and the unrestricted upload of dangerous file types (CVE-2024-49398). CVE-2024-41717: Kieback&Peter’s DDC4002 and related versions encounter a critical path traversal vulnerability, which could significantly impact field controllers and IoT devices. These findings highlight a troubling trend in the ICS sector, where high-severity vulnerabilities are increasingly prevalent. Organizations must remain vigilant and adopt robust mitigation strategies in response to these flaws highlighted in the weekly ICS vulnerability report. Recommendations for Enhanced Cybersecurity In light of the vulnerabilities highlighted in the weekly industrial control system vulnerability blog, Cyble Research & Intelligence Labs (CRIL) recommends that organizations actively monitor security advisories, adopt a risk-based vulnerability management approach with a Zero-Trust framework, and enhance patch management by tracking critical vulnerabilities in CISA’s Known Exploited Vulnerabilities (KEV) catalog. Additionally, organizations should develop comprehensive patch strategies that include inventory management, assessment, testing, deployment, and verification of patches, employing automation for greater efficiency. Effective network segmentation is essential to limit lateral movement of attackers, while ongoing audits, vulnerability assessments, and penetration testing are crucial for identifying and addressing security gaps. Establishing continuous monitoring and logging capabilities will allow for early detection of network anomalies, and leveraging a Software Bill of Materials (SBOM) can improve visibility into software components and their vulnerabilities. With significant threats facing major vendors like Siemens and Schneider Electric, it is important for businesses to adopt these proactive measures to enhance their cybersecurity and protect critical infrastructure.
- Cisco Patches Critical Vulnerability Affecting VPN Servicesby Ashish Khaitan on October 25, 2024 at 6:18 am
Cisco Systems released a critical advisory regarding a vulnerability in the Remote Access VPN (RAVPN) service associated with its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. This vulnerability could allow an unauthenticated, remote attacker to execute a denial of service (DoS) attack against the RAVPN service, impacting organizations relying on these essential security tools. The Common Vulnerability Scoring System (CVSS) score for this issue is 5.8. This vulnerability is identified by the CVE identifier CVE-2024-20481 and falls under the CWE classification of CWE-772. Decoding Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software The investigation into these Cisco vulnerabilities revealed that they stem from resource exhaustion. An attacker could exploit this weakness by sending many VPN authentication requests to an affected device. Source: CISCO Such an assault could exhaust system resources, resulting in a complete denial of service for the RAVPN service. In the event of a successful exploitation, the affected device may need to be rebooted to restore functionality. Importantly, services unrelated to the VPN remain unaffected by this vulnerability. Cisco’s security research team recently highlighted the rising trend of brute-force attacks targeting VPNs and SSH services that leverage commonly used login credentials. These advisory highlights the critical need for better security measures in network environments. Impacted Products At the time of the advisory’s publication, Cisco ASA and FTD software running vulnerable releases with the RAVPN service enabled were at risk. Organizations using these products should verify their software version against the advisory’s guidelines to determine vulnerability status. Notably, there are currently no workarounds available to mitigate this specific vulnerability, making immediate action essential for affected users. Cisco has confirmed that several of its products are not affected by the identified vulnerability. The products that are considered non-vulnerable include IOS Software, IOS XE Software, and Meraki products. Additionally, NX-OS Software and Secure Firewall Management Center (FMC) Software are also confirmed to be unaffected. Organizations can check if the SSL VPN feature is enabled on their devices by executing the command: show running-config webvpn | include ^ enable. If the command returns output, it indicates that SSL VPN is active; conversely, no output confirms that it is not enabled and therefore not vulnerable. For example, if the command returns the output enable outside, it signifies that the SSL VPN feature is enabled, which may indicate potential vulnerability for the device. Recommendations for Mitigation Cisco emphasizes the importance of upgrading to the latest software versions to address a vulnerability, as there are no direct workarounds available. Organizations should regularly consult Cisco’s security advisories to stay informed and ensure they are using updated software. When upgrading Cisco ASA or FTD devices, it’s crucial to check for sufficient memory and compatibility with current hardware. After upgrading, organizations should review the “Configure Threat Detection for VPN Services” section in the Cisco Secure Firewall ASA CLI Configuration Guide to enhance protections against various VPN-related attacks. The advisory highlights the urgent need for organizations using Cisco Adaptive Security Appliance and Firepower Threat Defense Software to respond promptly to the identified vulnerability affecting the Remote Access VPN service. Proactive monitoring, timely upgrades, and strong security practices are essential for safeguarding network infrastructures. For further details, organizations can refer to the full advisory linked in the original document. It’s vital to implement recommended actions to mitigate risks and remain vigilant against online threats.
- Hackers Can Be Heroes: The Importance of Responsible Disclosureby Samiksha Jain on October 24, 2024 at 5:39 am
Cybersecurity professionals, often working independently, search for weaknesses in software, networks, and hardware to fix issues before cybercriminals can exploit them. Despite the importance of their work, many organizations respond with hesitation, misunderstanding, or even hostility when approached by these researchers. This reaction can harm not only the researchers but also the overall security of digital systems that we all rely on. The Department of Homeland Security (DHS) runs a well-known campaign called “See Something, Say Something” to encourage people to report suspicious activities. In cybersecurity, the same concept applies. The Cybersecurity and Infrastructure Security Agency (CISA) encourages security researchers to report potential flaws in systems, similar to how an alert citizen might report something unusual in their neighborhood. These researchers help protect critical systems from being attacked by criminals or foreign hackers by uncovering vulnerabilities early. Usually, when a researcher finds a vulnerability, they reach out to the responsible organization to fix it. The ideal outcome is that the company or government agency welcomes the report and fixes the issue. For this process to work smoothly, researchers need to feel safe when they come forward, without worrying about being punished for their good-faith efforts. CISA’s Support for Vulnerability Reporting CISA actively promotes the responsible disclosure of vulnerabilities in federal agencies through policies like the Binding Operational Directive 20-01. This policy requires federal agencies to have a Vulnerability Disclosure Policy (VDP) and publish a contact person for security issues on every .gov website. These agencies are also expected to make clear that they won’t take legal action against researchers who are acting in good faith to report vulnerabilities. The purpose of such policies is to encourage transparency and trust between organizations and researchers. It sets a clear path for researchers to report problems and ensures that their contributions to improving security are acknowledged. How Vulnerability Disclosure Works When a vulnerability is reported, the process typically follows several steps: Identification and Reporting: A researcher discovers a vulnerability and contacts the affected organization through its listed security channels. However, reaching the right people can often be a significant challenge for researchers. Acknowledgment: The organization acknowledges the report and provides a timeline for further communication. They may ask for more information to better understand the problem. Assessment and Validation: The organization then investigates the vulnerability to see how serious it is. This may involve conversations with the researcher to clarify how the vulnerability can be exploited. Systems like the Common Vulnerability Scoring System (CVSS) help determine the severity. Remediation: Once the vulnerability is verified, the organization works to fix it. They may also test the fix to ensure no new problems arise. Researchers often help validate these fixes. Public Disclosure: Finally, both the organization and the researcher agree on when and how to make the vulnerability public. The goal is to inform users and other stakeholders while balancing the need for security. Effective Crisis Communication When a vulnerability or security breach is discovered, how an organization communicates about it can have a lasting impact. Seeking legal counsel is common to manage potential liabilities, but organizations should focus on clear and responsible communication to maintain public trust. Here are some key points for handling a security issue: Acknowledge the Problem: Even if all the details are not available, it’s important to let the public know that you are aware of the issue and working on a solution. Work with Researchers: Security researchers are allies, not adversaries. Their discovery helps protect your systems and your users. Stay Transparent: Regular updates about the issue build trust. Even sharing bad news can be reassuring if the organization shows it’s actively addressing the problem. Avoid Blaming the Researcher: Threatening legal action against researchers is counterproductive. It discourages others from reporting future vulnerabilities and can damage the organization’s reputation. By following these practices, organizations can handle security incidents more effectively while strengthening their relationships with the cybersecurity community. Encouraging Bug Bounties and Disclosure Programs Forward-thinking organizations are already adopting bug bounty programs, which offer rewards to researchers for discovering and reporting vulnerabilities. Companies like Google, Microsoft, and Amazon have benefited greatly from these programs. They not only enhance security but also build goodwill with the research community. Government agencies can also benefit from engaging with security researchers. With so much critical infrastructure at risk, public entities must encourage vulnerability reporting by establishing clear processes. A well-defined Vulnerability Disclosure Program (VDP) helps researchers feel confident that their findings will be treated fairly. Fostering Collaboration in Cybersecurity To truly protect our digital infrastructure, organizations must adopt a “See Something, Say Something” approach. Security researchers should be viewed as partners, not threats. While legal input is often necessary, the overall response should focus on fixing the issue and maintaining public trust. Collaboration between researchers and organizations is essential for strengthening cybersecurity. CISA encourages this by promoting coordinated vulnerability disclosure (CVD) and welcomes public reports of security issues. For those interested in playing an even more active role, CISA offers the opportunity to join its CVE Numbering Authority program, which helps coordinate the disclosure of vulnerabilities worldwide. By fostering a culture of collaboration, organizations, government agencies, and researchers can work together to create a safer digital environment for everyone. As cybersecurity threats evolve, so too must our efforts to build trust and improve defenses across the board.
- Cyble Sensors Uncover Cyberattacks on Java Framework and IoT Devicesby Ashish Khaitan on October 23, 2024 at 8:05 am
Cyble vulnerability intelligence unit has shared a report, detailing the recent cyberattacks on the Spring Java framework and hundreds of thousands of Internet of Things (IoT) devices. The report sheds light on over 30 active attack campaigns targeting well-known vulnerabilities. Among these, a focus has emerged on CVE-2024-38816, a critical vulnerability affecting the Spring Java framework. Furthermore, the report highlights that more than 400,000 attacks exploit a vulnerability linked to IoT devices. Cyble Vulnerability Intelligence Unit Highlights Key Flaws in Multiple Systems CVE-2024-38816: Exploitation of the Spring Java Framework CVE-2024-38816 represents a severe path traversal vulnerability within the widely used Spring Java framework, currently under assessment by the National Vulnerability Database (NVD). This vulnerability allows attackers to craft malicious HTTP requests, potentially accessing sensitive files on the system where the Spring application is running. Specifically, applications using RouterFunctions to serve static resources while configured with a FileSystemResource location are particularly at risk. Importantly, certain defenses can block these malicious requests. If the Spring Security HTTP Firewall is enabled, or if the application is hosted on platforms like Tomcat or Jetty, these attacks can be effectively mitigated. CVE-2020-11899: Treck TCP/IP Stack Vulnerability The vulnerability intelligence report also identifies CVE-2020-11899, a medium-severity out-of-bounds read vulnerability in the Treck TCP/IP stack, which impacts versions prior to 6.0.1.66. This vulnerability is part of the “Ripple20” series, which poses serious risks, including data theft and unauthorized device control. Cyble’s sensors detected a staggering 411,000 attacks exploiting this vulnerability between October 9 and 15, 2024, aimed at gaining administrative privileges. Moreover, attacks against additional “Ripple20” vulnerabilities, such as CVE-2020-11900, were also noted, emphasizing the need for organizations operating IoT environments to assess their exposure and implement necessary mitigations. Ongoing Threats to Systems Beyond vulnerabilities in the Java framework and IoT devices, Cyble’s vulnerability intelligence report reveals that threats to Linux systems persist, with cybercriminals using advanced methods to deploy malware through package managers. Active threats, including CoinMiner, Mirai, and IRCBot, remain prevalent. Additionally, previously identified vulnerabilities in PHP (CVE-2024-4577), GeoServer (CVE-2024-36401), and AVTECH IP cameras (CVE-2024-7029) continue to attract the attention of threat actors, highlighting the urgent need for vigilant cybersecurity measures. In a noteworthy development, the Cyble vulnerability intelligence report reported a sharp increase in phishing attempts, identifying 478 new phishing email addresses this week—an all-time high. The vulnerability intelligence report details various scam campaigns, including fake refund claims and lottery scams, which illustrate the diverse tactics used by cybercriminals to exploit unsuspecting individuals. The report also outlines several brute-force attacks detected across various global locations. The most targeted ports include 22, 3389, and 445, with notable activity originating from Vietnam and the United States. Security analysts are urged to protect defenses by blocking suspicious IP addresses and securing the targeted ports. Recommendations for Mitigation To mitigate such threats, organizations should adopt several proactive security measures, including blocking malicious URLs and email addresses associated with recent scams, promptly patching open vulnerabilities while routinely monitoring internal network alerts, and consistently checking for suspicious ASNs and IPs to block known brute-force sources. Additionally, it’s essential to change default usernames and passwords to prevent brute-force attempts and to enforce regular password updates, alongside employing complex passwords for servers and sensitive applications. By implementing these recommendations, businesses can enhance their defenses against the active threats identified in Cyble’s vulnerability intelligence report, particularly those targeting the Spring Java framework and IoT devices.
- High-Risk ICS Vulnerability Exposes ICONICS and Mitsubishi Electric Products to Data Breachesby Samiksha Jain on October 23, 2024 at 6:31 am
The Cybersecurity and Infrastructure Security Agency (CISA), on October 22, 2024, issued a new advisory targeting Industrial Control Systems (ICS). One of the most significant vulnerabilities highlighted in the advisory involves the product suites from ICONICS and Mitsubishi Electric. These advisories are designed to inform ICS users and administrators of security vulnerabilities, exploits, and emerging threats that may affect their critical infrastructure. Executive Summary of the ICS Advisory The vulnerability in question is categorized under CVE-2024-7587 with a CVSS v3.1 base score of 7.8, reflecting its high severity. With a low complexity of attack, this vulnerability presents a serious concern for users of ICONICS Suite, including products like GENESIS64, Hyper Historian, AnalytiX, and MobileHMI (version 10.97.3 and earlier), as well as Mitsubishi Electric’s MC Works64 across all versions. If successfully exploited, this vulnerability could lead to data breaches, unauthorized data tampering, and in the worst-case scenario, denial-of-service (DoS) conditions. Understanding the ICONICS and Mitsubishi Electric Vulnerability At the core of the issue is incorrect default permissions (CWE-276), which allow unauthorized users to gain access to critical data. This could result in the disclosure of confidential information, manipulation of sensitive data, or potential denial-of-service events due to misconfigured access permissions. While this vulnerability is not exploitable remotely, meaning it requires local access to the system, the impact is considerable, especially given that both ICONICS and Mitsubishi Electric products are widely deployed across industries worldwide, particularly within the critical manufacturing sector. Affected Products The advisory lists specific products impacted by this vulnerability: ICONICS Suite, which includes the products GENESIS64, Hyper Historian, AnalytiX, and MobileHMI, version 10.97.3 and earlier. Mitsubishi Electric MC Works64, which is affected across all versions. Risk Evaluation The vulnerability presents a moderate to high risk due to the potential for critical consequences. While the vulnerability is not exploitable remotely and does require local access, the incorrect default permissions open the door to data tampering, information disclosure, and service interruptions. Given the growing reliance on ICS across industries, such vulnerabilities can pose serious challenges to operational continuity and data integrity. Technical Breakdown The issue stems from default permissions being improperly assigned. Specifically, unauthorized users could potentially gain excessive access to directories that store critical data. This poses a threat not just to individual systems but also to interconnected ICS environments where even localized breaches can ripple across entire infrastructures. The assigned CVSS vector string for this vulnerability is (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). This breakdown reflects the fact that the attack requires local access (AV) and has a low complexity (AC), with the potential to significantly compromise the system’s confidentiality, integrity, and availability. Mitigations To address this vulnerability, ICONICS and Mitsubishi Electric recommend several mitigation strategies for their users. For ICONICS products, the following steps are critical: Use Version 10.97.3 CFR1 or Later: For new systems, upgrade to this version or later, which is not vulnerable to the issue. For Existing Systems: If using version 10.97.3 or earlier, avoid installing the included GenBroker32. Instead, download and install the latest version of GenBroker32 from ICONICS. Verify and Correct Folder Permissions: Administrators should review the permissions for the C:\ProgramData\ICONICS folder. If the folder provides access to the “Everyone” group, remove this permission by following a step-by-step process outlined in the advisory. For Mitsubishi Electric MC Works64, the same principles of permissions review and security patching apply. Administrators are encouraged to: Regularly apply security patches as they become available. Continuously monitor access permissions and ensure that overly broad permissions (like “Everyone” access) are removed. Proactive Defense Recommendations from CISA CISA offers a wealth of resources to help ICS users defend against vulnerabilities like CVE-2024-7587. It is critical for organizations to take a proactive approach to cybersecurity, incorporating defense-in-depth strategies that include: Conducting a risk assessment and proper impact analysis before deploying mitigation strategies. Regularly reviewing and implementing best practices for ICS cybersecurity, such as those outlined in CISA’s Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies document. Monitoring the ICS webpage at CISA for the latest security advisories, guidance, and technical resources. Importance of Reporting and Vigilance While no public exploitation of this vulnerability has been reported to CISA so far, the agency urges organizations to remain vigilant. Should any malicious activity be suspected, organizations are advised to follow their established incident response procedures and report findings to CISA for correlation and tracking. Early detection and quick action can significantly reduce the potential impact of vulnerabilities within critical infrastructure systems. By following the steps outlined in this advisory, users can reduce the risk of exploitation and ensure the resilience of their ICS infrastructure against potential threats.
- Multiple High-Severity Vulnerabilities Found in Bitdefender Products: Patch Nowby Ashish Khaitan on October 23, 2024 at 6:27 am
Bitdefender has recently alerted users to critical vulnerabilities within Bitdefender Total Security and SafePay, necessitating immediate action to protect against online threats. These Bitdefender vulnerabilities are classified as high-severity risks. Utilizing the Common Vulnerability Scoring System (CVSS), these Bitdefender vulnerabilities have been categorized based on their severity, ranging from Critical (9.0-10) to Low (0.0-3.9). The advisory identifies six high-severity vulnerabilities, each linked to a unique CVE ID: CVE-2023-6055, CVE-2023-6056, CVE-2023-6057, CVE-2023-6058, CVE-2023-49567, and CVE-2023-49570. Patches for these vulnerabilities are available through automatic updates. Major Bitdefender Vulnerabilities The first Bitdefender vulnerability, CVE-2023-6055, relates to improper certificate validation within Bitdefender Total Security and has a CVSS score of 8.6. This flaw allows attackers to conduct Man-in-the-Middle (MITM) attacks by exploiting the software’s failure to validate HTTPS website certificates properly. An automatic update to version 27.0.25.115 is recommended to mitigate this risk. Another significant Bitdefender vulnerability, CVE-2023-6056, scored 8.6, arises from the software’s undue trust in self-signed certificates, particularly those using the RIPEMD-160 hashing algorithm. This flaw can enable attackers to establish SSL connections to arbitrary sites, necessitating the installation of the latest update to counter this threat. The third vulnerability, CVE-2023-6057, is found within the HTTPS scanning functionality of Bitdefender Total Security. Like the previous vulnerabilities, it carries a severity score of 8.6, stemming from inadequate checking of the certificate chain for DSA-signed certificates, potentially allowing for MITM attacks. Users should apply the automatic update to version 27.0.25.115 to address this issue. Additionally, CVE-2023-6058 impacts Bitdefender SafePay, where the vulnerability also has a high severity score of 8.6. This issue occurs when SafePay blocks a connection due to an untrusted server certificate but allows users to add exceptions, which can later be exploited. Users are advised to install the automatic update to secure their transactions. CVE-2023-49567 is another critical vulnerability with a CVSS score of 8.6, caused by the software trusting certificates issued using the MD5 and SHA1 collision hash functions. This flaw can enable the creation of counterfeit certificates, making it crucial for users to update to the latest version. Similarly, CVE-2023-49570 poses a risk by allowing Bitdefender to trust certificates from unauthorized entities, which can lead to potential MITM attacks. To protect against this vulnerability, users should ensure they install the automatic update. Mitigation and Workarounds To mitigate the risks associated with the Bitdefender vulnerabilities, users and organizations must prioritize timely software updates and establish a structured patch management approach. Implementing effective network segmentation, maintaining a tested incident response plan, and utilizing comprehensive monitoring solutions will enhance security. Additionally, organizations should proactively manage End-of-Life products to minimize risks. Ultimately, staying informed and promptly addressing these Bitdefender vulnerabilities is essential for maintaining a strong cybersecurity posture and protecting digital assets from online threats.
- Splunk’s Recent Security Advisory: Addressing Vulnerabilities in Splunk Enterpriseby Ashish Khaitan on October 22, 2024 at 11:44 am
Splunk has recently issued a security advisory aimed at addressing multiple vulnerabilities within its Splunk Enterprise software. The advisory categorizes these Splunk vulnerabilities into three main classifications based on their Common Vulnerability Scoring System (CVSS) base scores, highlighting two critical high-risk issues, eight medium-risk vulnerabilities, and one low-risk vulnerability. The advisory details a total of eleven vulnerabilities associated with various CVE IDs, including CVE-2024-45731 through CVE-2024-45741. Among these, two vulnerabilities are marked as high severity, indicating a critical risk to users. The remaining vulnerabilities fall into the medium and low categories, reflecting a range of potential threats that organizations using Splunk need to address urgently. Splunk has confirmed that patches are available for all identified vulnerabilities and has urged users to implement these updates promptly to mitigate any associated risks. This guidance is crucial, as neglecting to apply these patches could expose organizations to significant threats, including unauthorized access and potential data breaches. Overview of Splunk Vulnerabilities One of the most pressing concerns highlighted in the advisory is CVE-2024-45731, which addresses a critical remote code execution vulnerability. This high-severity vulnerability carries a CVSS score of 8.0 and affects versions of Splunk Enterprise for Windows below 9.3.1, 9.2.3, and 9.1.6. A low-privileged attacker can exploit this vulnerability by writing a file to the Windows system root directory if Splunk is installed on a separate drive, potentially allowing the attacker to load a malicious DLL and execute code remotely. Users are advised to avoid installing Splunk on a separate disk to mitigate this risk. Another notable vulnerability, CVE-2024-45733, also poses a significant threat, with a CVSS score of 6.5. This vulnerability affects Splunk Enterprise for Windows in versions below 9.2.3 and 9.1.6, allowing for remote code execution due to insecure session storage configurations. Organizations are encouraged to disable Splunk Web on indexers in distributed environments where logins are unnecessary to prevent exploitation. Additionally, CVE-2024-45734 and CVE-2024-45735 both score 4.3 and present medium-risk vulnerabilities. CVE-2024-45734 can be exploited through the PDF export feature, enabling users to view local images from the machine running Splunk. Users are advised to disable Splunk Web to mitigate this risk. Meanwhile, CVE-2024-45735 allows low-privileged users to access sensitive deployment configurations within the Splunk Secure Gateway App. Users should disable this app if it is not needed or ensure that proper security settings are in place. CVE-2024-45736, scoring 6.5, involves uncontrolled resource consumption, which could cause the Splunk daemon to crash if a crafted search query is executed. Organizations are recommended to implement monitoring solutions to detect unusual search query behaviors that may indicate an exploitation attempt. Among the low-severity vulnerabilities, CVE-2024-45737, with a score of 3.5, allows an attacker to exploit cross-site request forgery (CSRF) to alter the maintenance mode state of the App Key Value Store. Again, turning off Splunk Web may serve as a temporary workaround for this risk. Finally, CVE-2024-45738 and CVE-2024-45739, both scoring 4.9, pose medium risks by potentially exposing sensitive HTTP parameters and plaintext passwords due to overly verbose logging configurations. Users should adjust logging levels and ensure sensitive logs are removed from internal indexes to mitigate these Splunk vulnerabilities. Conclusion In response to vulnerabilities in Splunk, organizations should adopt key practices such as regularly updating software with the latest vendor patches, developing comprehensive security strategies, isolating critical assets using firewalls and access controls, maintaining up-to-date incident response plans, implementing robust monitoring tools, and proactively assessing systems for necessary upgrades. These measures are crucial to safeguard against risks like unauthorized access and data breaches, ensuring that users of Splunk Enterprise remain vigilant and secure.