Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 2
27 résultats taggé advisory  ✕
Security Advisory SNWLID-2025-0002 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002
24/01/2025 16:42:03
QRCode
archive.org

Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.

IMPORTANT: SonicWall PSIRT has been notified of possible active exploitation of the referenced vulnerability by threat actors. We strongly advises users of the SMA1000 product to upgrade to the hotfix release version to address the vulnerability.

Please note that SonicWall Firewall and SMA 100 series products are not affected by this vulnerability.

SonicWall EN 2025 CVE-2025-23006 advisory
Rsync contains six vulnerabilities https://kb.cert.org/vuls/id/952657
22/01/2025 22:38:41
QRCode
archive.org

Rsync, a versatile file-synchronizing tool, contains six vulnerabilities present within versions 3.3.0 and below. Rsync can be used to sync files between remote and local computers, as well as storage devices. The discovered vulnerabilities include heap-buffer overflow, information leak, file leak, external directory file-write,–safe-links bypass, and symbolic-link race condition.

cert.org EN 2025 CVE-2024-12084 advisory CVE-2024-12747 CVE-2024-12085 CVE-2024-12088 CVE-2024-12086 CVE-2024-12087
2024-12 Reference Advisory: Session Smart Router: Mirai malware found on systems when the default password remains unchanged https://supportportal.juniper.net/s/article/2024-12-Reference-Advisory-Session-Smart-Router-Mirai-malware-found-on-systems-when-the-default-password-remains-unchanged?
22/12/2024 20:48:48
QRCode
archive.org

n Wednesday, December 11, 2024, several customers reported suspicious behavior on their Session Smart Network (SSN) platforms. These systems have been infected with the Mirai malware and were subsequently used as a DDOS attack source to other devices accessible by their network. The impacted systems were all using default passwords. Any customer not following recommended best practices and still using default passwords can be considered compromised as the default SSR passwords have been added to the virus database.

juniper EN 2024 advisory SessionSmart Router SSN Mirai default-password
UN, international orgs create advisory body for submarine cables after incidents | The Record from Recorded Future News https://therecord.media/un-international-orgs-create-advisory-body-submarine-cables
02/12/2024 13:12:09
QRCode
archive.org
thumbnail

On Friday, the United Nations Agency for Digital Technologies said it is partnering with the International Telecommunication Union (ITU) and International Cable Protection Committee (ICPC) to create the International Advisory Body for Submarine Cable Resilience.

therecord.media EN 2024 UN submarine cables advisory body ICPC Resilience
Multiple Vulnerabilities Discovered in PHP, Prompting Urgent Security Updates https://securityonline.info/multiple-vulnerabilities-discovered-in-php-prompting-urgent-security-updates/
02/10/2024 13:10:46
QRCode
archive.org
thumbnail

Stay updated on the latest PHP vulnerability advisory. Learn about the potential log tampering, file inclusion, and data integrity violations.

securityonline EN 2024 PHP advisory CVE-2024-9026 CVE-2024-8927 CVE-2024-8926
GitLab Critical Patch Release: 17.3.3, 17.2.7, 17.1.8, 17.0.8, 16.11.10 https://about.gitlab.com/releases/2024/09/17/patch-release-gitlab-17-3-3-released/
20/09/2024 11:39:40
QRCode
archive.org
thumbnail

Learn more about GitLab Critical Patch Release: 17.3.3, 17.2.7, 17.1.8, 17.0.8, 16.11.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).

gitlab EN 2024 patch advisory CVE-2024-45409 SAML critical
Security Advisory CVE-2024-40766 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0015
22/08/2024 23:34:35
QRCode
archive.org

An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash.

This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions.

sonicwall EN 2024 Advisory CVE-2024-40766
Jenkins Security Advisory 2024-08-07 CVE-2024-43044 CVE-2024-43045 https://www.jenkins.io/security/advisory/2024-08-07/#jenkins-security-advisory-2024-08-07
08/08/2024 10:13:13
QRCode
archive.org

Jenkins – an open source automation server which enables developers around the world to reliably build, test, and deploy their software

jenkins EN 2024 advisory security-advisory
APT40 Advisory PRC MSS tradecraft in action https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/apt40-advisory-prc-mss-tradecraft-in-action
10/07/2024 17:39:38
QRCode
archive.org

This advisory, authored by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the United States Cybersecurity and Infrastructure Security Agency (CISA), the United States National Security Agency (NSA), the United States Federal Bureau of Investigation (FBI), the United Kingdom National Cyber Security Centre (NCSC-UK), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NCSC-NZ), the German Federal Intelligence Service (BND) and Federal Office for the Protection of the Constitution (BfV), the Republic of Korea's National Intelligence Service (NIIS) and NIS’ National Cyber Security Center, and Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) and National Police Agency (NPA) – hereafter referred to as the “authoring agencies” – outlines a People’s Republic of China (PRC) state-sponsored cyber group and their current threat to Australian networks. The advisory draws on the authoring agencies’ shared understanding of the threat as well as ASD’s ACSC incident response investigations.

cyber.gov.au EN 2024 advisory APT40 Kryptonite-Panda GINGHAM-TYPHOON, Leviathan Bronze-Mohawk
Security Advisory YSA-2024-01 https://www.yubico.com/support/security-advisories/ysa-2024-01/
10/04/2024 09:05:30
QRCode
archive.org
thumbnail

A security issue has been identified in YubiKey Manager GUI which could lead to unexpected privilege escalation on Windows. If a user runs the YubiKey Manager GUI as Administrator, browser windows opened by YubiKey Manager GUI may be opened as Administrator which could be exploited by a local attacker to perform actions as Administrator. Under this circumstance, some browsers like Edge for example, have additional mitigations to prevent opening as Administrator.

yubico EN 2024 Advisory YubiKey-Manager privilege-escalation YSA-2024-01
Bundesamt für Verfassungsschutz - Counter-intelligence - Joint Cyber Security Advisory https://www.verfassungsschutz.de/SharedDocs/kurzmeldungen/EN/2024/2024-02-19-joint-cyber-security-advisory.html
28/02/2024 11:51:48
QRCode
archive.org

Warning of North Korean cyber threats targeting the Defense Sector

verfassungsschutz EN 2024 Advisory North North-Korea Counter-intelligence Defense-Sector
Threat Actor Leverages Compromised Account of Former Employee to Access State Government Organization | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-046a
16/02/2024 09:29:11
QRCode
archive.org

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) conducted an incident response assessment of a state government organization’s network environment after documents containing host and user information, including metadata, were posted on a dark web brokerage site. Analysis confirmed that an unidentified threat actor compromised network administrator credentials through the account of a former employee—a technique commonly leveraged by threat actors—to successfully authenticate to an internal virtual private network (VPN) access point, further navigate the victim’s on-premises environment, and execute various lightweight directory access protocol (LDAP) queries against a domain controller.[1] Analysis also focused on the victim’s Azure environment, which hosts sensitive systems and data, as well as the compromised on-premises environment. Analysis determined there were no indications the threat actor further compromised the organization by moving laterally from the on-premises environment to the Azure environment.

CISA EN 2024 Compromised Account Former-Employee advisory
CVE-2024-22024 (XXE) for Ivanti Connect Secure and Ivanti Policy Secure https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US
08/02/2024 21:24:51
QRCode
archive.org

As part of our ongoing investigation into the vulnerabilities impacting Ivanti Connect Secure, Ivanti Policy Secure and ZTA gateways, we have discovered a new vulnerability. This vulnerability only affects a limited number of supported versions – Ivanti Connect Secure (version 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2 and 22.5R1.1), Ivanti Policy Secure version 22.5R1.1 and ZTA version 22.6R1.3.
A patch is available now for Ivanti Connect Secure (versions 9.1R14.5, 9.1R17.3, 9.1R18.4, 22.4R2.3, 22.5R1.2, 22.5R2.3 and 22.6R2.2), Ivanti Policy Secure (versions 9.1R17.3, 9.1R18.4 and 22.5R1.2) and ZTA gateways (versions 22.5R1.6, 22.6R1.5 and 22.6R1.7).

ivanti EN advisory CVE-2024-22024
Zyxel VPN Series Pre-auth Remote Command Execution https://ssd-disclosure.com/ssd-advisory-zyxel-vpn-series-pre-auth-remote-command-execution/
04/02/2024 14:03:43
QRCode
archive.org
thumbnail

Summary Chaining of three vulnerabilities allows unauthenticated attackers to execute arbitrary command with root privileges on Zyxel VPN firewall (VPN50, VPN100, VPN300, VPN500, VPN1000). Due to recent attack surface changes in Zyxel, the chain described below broke and become unusable – we have decided to disclose this even though it is no longer exploitable. Credit … SSD Advisory – Zyxel VPN Series Pre-auth Remote Command Execution Read More »

ssd-disclosure EN 2024 Advisory Zyxel VPN Series Pre-auth RCE
Jenkins Security Advisory 2024-01-24 https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314
29/01/2024 15:10:01
QRCode
archive.org

Arbitrary file read vulnerability through the CLI can lead to RCE

jenkins EN 2024 CVE-2024-23897 advisory
IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a
04/12/2023 18:10:49
QRCode
archive.org

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Environmental Protection Agency (EPA), and the Israel National Cyber Directorate (INCD)—hereafter referred to as "the authoring agencies"—are disseminating this joint Cybersecurity Advisory (CSA) to highlight continued malicious cyber activity against operational technology devices by Iranian Government Islamic Revolutionary Guard Corps (IRGC)-affiliated Advanced Persistent Threat (APT) cyber actors.

cisa US EN 2023 FBI IRGC Iran PLC CyberAv3ngers Advisory Critical-infrastructure
CVE-2023-45498: RCE in VinChin Backup https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/
27/10/2023 13:47:49
QRCode
archive.org
thumbnail

CVE-2023-45498/CVE-2023-45499 advisory

leakix EN 2023 advisory RCE VinChin Backup CVE-2023-45498 CVE-2023-4549
VMSA-2023-0023 https://www.vmware.com/security/advisories/VMSA-2023-0023.html
25/10/2023 23:47:03
QRCode
archive.org
thumbnail

VMware vCenter Server updates address out-of-bounds write and information disclosure vulnerabilities

vmware EN 2023 vulnerability VMSA-2023-0023 CVE-2023-34048 advisory
Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-131a
12/05/2023 22:05:56
QRCode
archive.org

The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint Cybersecurity Advisory (CSA) in response to the active exploitation of CVE-2023-27350. This vulnerability occurs in certain versions of PaperCut NG and PaperCut MF and enables an unauthenticated actor to execute malicious code remotely without credentials. PaperCut released a patch in March 2023.

cisa EN 2023 PaperCut CVE-2023-27350 advisory
CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks | CISA https://www.cisa.gov/news-events/alerts/2023/02/28/cisa-red-team-shares-key-findings-improve-monitoring-and-hardening-networks
09/03/2023 18:44:03
QRCode
archive.org

Today, CISA released a Cybersecurity Advisory, CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks. This advisory describes a red team assessment of a large critical infrastructure organization with a mature cyber posture. CISA is releasing this Cybersecurity Advisory (CSA) detailing the red team’s tactics, techniques, and procedures (TTPs) and key findings to provide network defenders proactive steps to reduce the threat of similar activity from malicious cyber actors.

cisa US 2023 Advisory Improve Monitoring Hardening
page 1 / 2
4372 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio