Calenderweek 47 – WafdogBlog http://192.168.11.11 Fri, 29 Mar 2024 13:15:51 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 http://192.168.11.11/wp-content/uploads/2023/11/logo_fav.png Calenderweek 47 – WafdogBlog http://192.168.11.11 32 32 Critical Vulnerabilities Exploited: Sophos and Windows Security Flaws Highlighted by CISA http://192.168.11.11/critical-vulnerabilities-exploited-sophos-and-windows-security-flaws-highlighted-by-cisa/ Wed, 28 Feb 2024 14:37:59 +0000 http://192.168.11.11/?p=1131 Critical Vulnerabilities Exploited: Sophos and Windows Security Flaws Highlighted by CISA Read More »

]]>
The agency has identified a critical flaw in Sophos products, CVE-2023-1671, which has been exploited by attackers allowing arbitrary code execution. Sophos released patches in April and informed customers that the affected appliance would reach its end of life on July 20, 2023.

Although no public reports have described attacks exploiting CVE-2023-1671, Sophos was unable to provide clarifications to SecurityWeek at the time of publication.

Sophos product vulnerabilities are frequently targeted by threat actors. Some attacks, attributed to a Chinese APT group, have targeted government and other organizations in South Asia. CISA’s Known Exploited Vulnerabilities (KEV) list currently includes four other vulnerabilities in Sophos products discovered in 2020 and 2022.

Another vulnerability added to the KEV list, CVE-2020-2551, affects Oracle WebLogic Server, allowing unauthenticated attackers to seize control of affected servers. This vulnerability was one of four targeted for initial compromise by a Chinese threat actor, according to a blog post by EclecticIQ.

Additionally, CVE-2023-36584 has been added to CISA’s KEV catalog, enabling attackers to bypass the Mark of the Web (MotW) security feature in Windows. Although Palo Alto Networks discovered this flaw during an analysis of attacks by a Russia-linked APT, exploitation details are not clear.

Sophos has released a statement acknowledging the patch released in April 2023 for all Sophos Web Appliances and recommending users upgrade to Sophos Firewall for optimal security.

Palo Alto Networks confirmed that they have not observed exploitation of the new MotW bypass vulnerability, CVE-2023-36584, and clarified its discovery process and communication with Microsoft regarding the vulnerability.

]]>
Intel Releases Microcode Updates to Address Critical Security Vulnerability http://192.168.11.11/intel-releases-microcode-updates-to-address-critical-security-vulnerability/ Wed, 28 Feb 2024 14:36:09 +0000 http://192.168.11.11/?p=1129 Intel Releases Microcode Updates to Address Critical Security Vulnerability Read More »

]]>
The CPU manufacturer Intel recently released microcode updates to address a security vulnerability registered as CVE-2023-23583, which has been classified as highly severe. This vulnerability affects various desktop, server, and mobile processors and could potentially allow authenticated attackers with local access to escalate their privileges, steal information, and execute DoS attacks.

The security flaw, referred to by Intel as the “Redundant Prefix Issue,” specifically pertains to the execution of an instruction (REP MOVSB) that, under certain microarchitectural conditions, could lead to unpredictable system behavior. This could result in system crashes and, in some cases, privilege escalation.

Although Intel rates the problem as serious, with a severity score of 8.8 out of 10, the company does not anticipate it occurring in practice with non-malicious software. Nevertheless, updated microcodes have already been released for some affected CPUs, including Alder Lake, Raptor Lake, and Sapphire Rapids, prior to November 2023. Motherboard manufacturers are expected to provide BIOS updates for affected CPUs.

The vulnerability was independently discovered by several Google security researchers and given the name “Reptar.” According to Google Cloud CISO Phil Venables, the issue stems from how redundant prefixes are interpreted by the CPU. The impact can be significant, particularly in virtualized environments, where an attack on a guest computer could lead to the host computer crashing, resulting in denial of service for other guest computers, as well as privilege escalation and data theft.

]]>
VMware Cloud Director Vulnerability: Critical Security Bypass Exposed http://192.168.11.11/vmware-cloud-director-vulnerability-critical-security-bypass-exposed/ Wed, 28 Feb 2024 14:27:55 +0000 http://192.168.11.11/?p=1127 VMware Cloud Director Vulnerability: Critical Security Bypass Exposed Read More »

]]>
VMware has disclosed a critical security vulnerability affecting its Cloud Director (VCD) software, which could allow attackers to bypass authentication on vulnerable systems. Tracked as CVE-2023-34060 and rated with a CVSS score of 9.8, the flaw impacts VCD-Appliances that have been upgraded from an older version to Version 10.5. However, newly installed Version 10.5 appliances are reportedly not vulnerable to this exploit.

The vulnerability allows malicious actors with network access to bypass login restrictions on Port 22 (SSH) and Port 5480 (Appliance Management Console) but not on Port 443, used for provider and tenant login. VMware emphasizes that this vulnerability arises due to the usage of an affected version of sssd from the underlying Photon OS.

Although VMware has yet to release a patch for CVE-2023-34060, it has provided a workaround in the form of a shell script (“WA_CVE-2023-34060.sh”), allowing administrators to mitigate the issue temporarily. This workaround does not disrupt the functionality of Cloud Director installations and does not require any downtime or system restart.

The company advises administrators to manually intervene until a patch becomes available. They can utilize provided scripts to check for vulnerability and apply the workaround if necessary. It’s worth noting that Dustin Hartle from Ideal Integrations discovered and reported the vulnerability.

This disclosure comes in the wake of recent security concerns surrounding VMware, including the patching of critical flaws in vCenter Server (CVE-2023-34048) and ESXi, the latter of which was exploited by cybercriminals for ransomware attacks on various organizations.

]]>