Tag: flaw
-
FortiClient VPN Flaw Enables Undetected Brute-Force Attacks
by
in SecurityNewsA design flaw in the logging mechanism of Fortinet’s VPN servers has been uncovered, allowing attackers to conduct brute-force attacks without detection. This vulnerability, disclosed by cybersecurity researchers at Pentera, highlights a critical gap in Fortinet’s ability to log successful authentication attempts during brute-force attacks, leaving enterprises vulnerable to potential breaches. The issue lies in…
-
‘Alarming’ security bugs lay low in Linux’s needrestart server utility for 10 years
by
in SecurityNewsUpdate now: Qualys says flaws give root to local users, are ‘easily exploitable’ First seen on theregister.com Jump to article: www.theregister.com/2024/11/21/qualys_ubuntu_server_vulnerabilities/
-
Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign
As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as part of a campaign abusing the newly disclosed security flaws that have come under active exploitation in the wild.According to statistics shared by the Shadowserver Foundation, a majority of the infections have been reported in the U.S. (554) and India…
-
Zero-Click Flaw Exposes Potentially Millions of Popular Storage Devices to Attack
by
in SecurityNewsA vulnerability categorized as critical in a photo app installed by default on Synology network-attached storage devices could give attackers the abil… First seen on wired.com Jump to article: www.wired.com/story/synology-zero-click-vulnerability/
-
Google OSS-Fuzz Harnesses AI to Expose 26 Hidden Security Vulnerabilities
by
in SecurityNewsOne of these flaws detected using LLMs was in the widely used OpenSSL library First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/google-oss-fuzz-ai-expose-26/
-
Ubuntu Affected By 10-Year-Old Flaws In needrestart Package
by
in SecurityNews
Tags: flawFirst seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/36624/Ubuntu-Affected-By-10-Year-Old-Flaws-In-needrestart-Package.html
-
Fortinet VPN design flaw hides successful brute-force attacks
by
in SecurityNewsA design flaw in the Fortinet VPN server’s logging mechanism can be leveraged to conceal the successful verification of credentials during a brute-force attack without tipping off defenders of compromised logins. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fortinet-vpn-design-flaw-hides-successful-brute-force-attacks/
-
Decade-old local privilege escalation bugs impacts Ubuntu needrestart package
by
in SecurityNewsDecade-old flaws in the needrestart package in Ubuntu Server could allow local attackers to gain root privileges without user interaction. The Qualys Threat Research Unit (TRU) discovered five Local Privilege Escalation (LPE) decade-old security vulnerabilities in the needrestart package that could allow a local attacker to gain root privileges without requiring user interaction. The needrestart…
-
Google’s AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects
by
in SecurityNewsGoogle has revealed that its AI-powered fuzzing tool, OSS-Fuzz, has been used to help identify 26 vulnerabilities in various open-source code repositories, including a medium-severity flaw in the OpenSSL cryptographic library.”These particular vulnerabilities represent a milestone for automated vulnerability finding: each was found with AI, using AI-generated and enhanced fuzz targets,” First seen on thehackernews.com…
-
Ubuntu Linux impacted by decade-old ‘needrestart’ flaw that gives root
by
in SecurityNewsFive local privilege escalation (LPE) vulnerabilities have been discovered in the needrestart utility used by Ubuntu Linux, which was introduced over 10 years ago in version 21.04. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ubuntu-linux-impacted-by-decade-old-needrestart-flaw-that-gives-root/
-
Five Privilege Escalation Flaws Found in Ubuntu needrestart
by
in SecurityNewsFive LPE flaws in Ubuntu’s needrestart utility enable attackers to gain root access in versions prior to 3.8 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/5-privilege-escalation-flaws/
-
Decades-Old Security Vulnerabilities Found in Ubuntu’s Needrestart Package
by
in SecurityNewsMultiple decade-old security vulnerabilities have been disclosed in the needrestart package installed by default in Ubuntu Server (since version 21.04) that could allow a local attacker to gain root privileges without requiring user interaction.The Qualys Threat Research Unit (TRU), which identified and reported the flaws early last month, said they are trivial to exploit, necessitating…
-
Trend Micro Deep Security Vulnerable to Command Injection Attacks
by
in SecurityNewsTrend Micro has released a critical update addressing a remote code execution (RCE) vulnerability (CVE-2024-51503) in its Trend Micro Deep Security 20 Agent. This vulnerability, identified as a manual scan command injection flaw, allows attackers to execute arbitrary code on affected machines, potentially leading to privilege escalation across the domain. This vulnerability affects the manual…
-
Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities
by
in SecurityNewsApple has released security updates for iOS, iPadOS, macOS, visionOS, and its Safari web browser to address two zero-day flaws that have come under active exploitation in the wild.The flaws are listed below -CVE-2024-44308 – A vulnerability in JavaScriptCore that could lead to arbitrary code execution when processing malicious web contentCVE-2024-44309 – A cookie management…
-
Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation
by
in SecurityNewsOracle is warning that a high-severity security flaw impacting the Agile Product Lifecycle Management (PLM) Framework has been exploited in the wild.The vulnerability, tracked as CVE-2024-21287 (CVSS score: 7.5), could be exploited sans authentication to leak sensitive information.”This vulnerability is remotely exploitable without authentication, i.e., it may be exploited over a network First seen on…
-
EPA IG Office: ‘High-Risk’ Security Flaws in Hundreds of Water Systems
by
in SecurityNewsThe watchdog for the EPA found that, of 1,062 U.S. drinking water systems it assessed, 97 had “critical” or “high-risk” security flaws and another 211 had less dangerous vulnerabilities, risking threats from stolen data to disrupted service. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/epa-ig-office-high-risk-security-flaws-in-hundreds-of-water-systems/
-
CISA tags Progress Kemp LoadMaster flaw as exploited in attacks
by
in SecurityNewsThe U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added three new flaws in its Known Exploited Vulnerabilities (KEV) catalog, including a critical OS command injection impacting Progress Kemp LoadMaster. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-tags-progress-kemp-loadmaster-flaw-as-exploited-in-attacks/
-
Attackers set sights on pair of VMware vCenter Server flaws
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/attackers-set-sights-on-pair-of-vmware-vcenter-server-flaws
-
Helldown Ransomware Group Tied to Zyxel’s Firewall Exploits
by
in SecurityNewsFirewall Vendor Warns Attackers Using Valid Credentials They Previously Stole. Attackers wielding an emerging strain of ransomware called Helldown have been gaining a foothold in victims’ networks by exploiting a previously unknown flaw in their Zyxel firewalls, security researchers warn. Zyxel has warned attackers may be using valid credentials they previously stole. First seen on…
-
Oracle warns of Agile PLM file disclosure flaw exploited in attacks
Oracle has fixed an unauthenticated file disclosure flaw in Oracle Agile Product Lifecycle Management (PLM) tracked as CVE-2024-21287, which was actively exploited as a zero-day to download files. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/oracle-warns-of-agile-plm-file-disclosure-flaw-exploited-in-attacks/
-
D-Link urges users to retire VPN routers impacted by unfixed RCE flaw
by
in SecurityNewsD-Link is warning customers to replace end-of-life VPN router models after a critical unauthenticated, remote code execution vulnerability was discovered that will not be fixed on these devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/d-link-urges-users-to-retire-vpn-routers-impacted-by-unfixed-rce-flaw/
-
Helldown ransomware exploits Zyxel VPN flaw to breach networks
by
in SecurityNewsThe new ‘Helldown’ ransomware operation is believed to target vulnerabilities in Zyxel firewalls to breach corporate networks, allowing them to steal data and encrypt devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/helldown-ransomware-exploits-zyxel-vpn-flaw-to-breach-networks/
-
Critical Windows Kerberos Flaw Exposes Millions of Servers to Attack
by
in SecurityNewsA critical vulnerability in the Windows Kerberos authentication protocol poses a significant risk to millions of servers. Microsoft… First seen on hackread.com Jump to article: hackread.com/windows-kerberos-flaw-millions-of-servers-attack/
-
WordPress Plug-In Vulnerability Threatens 4 Million Sites
by
in SecurityNewsCritical Authentication Flaw Impacts Both Free and Pro Users. A widely deployed five-in-one security plug-in for WordPress websites contained a flaw that hackers could automate into a large-scale takeover campaign. The critical authentication bypass vulnerability takes advantage of a now-patched flaw in the Really Simple Security plug-in. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/wordpress-plug-in-vulnerability-threatens-4-million-sites-a-26843
-
Warning: VMware vCenter and Kemp LoadMaster Flaws Under Active Exploitation
by
in SecurityNewsNow-patched security flaws impacting Progress Kemp LoadMaster and VMware vCenter Server have come under active exploitation in the wild, it has emerged.The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added CVE-2024-1212 (CVSS score: 10.0), a maximum-severity security vulnerability in Progress Kemp LoadMaster to its Known Exploited Vulnerabilities (KEV) catalog. It was First seen…
-
CISA Alert: Active Exploitation of VMware vCenter and Kemp LoadMaster Flaws
by
in SecurityNewsNow-patched security flaws impacting Progress Kemp LoadMaster and VMware vCenter Server have come under active exploitation in the wild, it has emerged.The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added CVE-2024-1212 (CVSS score: 10.0), a maximum-severity security vulnerability in Progress Kemp LoadMaster to its Known Exploited Vulnerabilities (KEV) catalog. It was First seen…
-
Microsoft SharePoint RCE flaw exploits in the wild you’ve had 3 months to patch
by
in SecurityNewsFirst seen on theregister.com Jump to article: www.theregister.com/2024/10/23/microsoft_sharepoint_rce_exploited/
-
WordPress Plugin Vulnerability Threatens 4 Million Sites
by
in SecurityNewsCritical Authentication Flaw Impacts Both Free and Pro Users. A widely deployed five-in-one security plugin for WordPress websites contained a flaw that hackers could automate into a large-scale takeover campaign. The critical authentication bypass vulnerability takes advantage of a now-patched flaw in the Really Simple Security plugin. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/wordpress-plugin-vulnerability-threatens-4-million-sites-a-26843
-
Report: Over 100M Americans Rely on Vulnerable Water Systems
by
in SecurityNewsInspector General Report Reveals 97 Water Systems with Critical Cybersecurity Risks. The Environmental Protection Agency inspector general said over 100 million Americans depend on drinking water systems exposed to cybersecurity flaws that could allow hackers to disrupt service or cause irreparable physical damage to drinking water infrastructure. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/report-over-100m-americans-rely-on-vulnerable-water-systems-a-26841
-
Critical WordPress Plug-in Flaw Exposes 4M Sites to Takeover
by
in SecurityNewsA vulnerability found in the Really Simple Security plug-in allows an attacker to remotely gain access to any account on an affected website, including the administrator, when 2FA is enabled. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/critical-wordpress-plugin-flaw-4m-sites-takeover