Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
10 résultats taggé Flaw  ✕
Official Root Cause Analysis (RCA) for SentinelOne Global Service Interruption https://www.sentinelone.com/blog/update-on-may-29-outage/#heading-1
02/06/2025 20:55:09
QRCode
archive.org
thumbnail

On May 29, 2025, SentinelOne experienced a global service disruption affecting multiple customer-facing services. During this period, customer endpoints remained protected, but security teams were unable to access the management console and related services, which significantly impacted their ability to manage their security operations and access important data. We apologize for the disruption caused by this service interruption.

The root cause of the disruption was a software flaw in an infrastructure control system that removed critical network routes, causing widespread loss of network connectivity within the SentinelOne platform. It was not a security-related event. The majority of SentinelOne services experienced full or partial downtime due to this sudden loss of network connectivity to critical components in all regions.

We’d like to assure our commercial customers that their endpoints were protected throughout the duration of the service disruption and that no SentinelOne security data was lost during the event. Protected endpoint systems themselves did not experience downtime due to this incident. A core design principle of the SentinelOne architecture is to ensure protection and prevention capabilities continue uninterrupted without constant cloud connectivity or human dependency for detection and response – even in the case of service interruptions, of any kind, including events like this one.

sentinelone EN 2025 incident root-cause RCA Global Service Interruption software flaw
OneDrive File Picker OAuth Flaw Exposes Full Drive Access https://www.oasis.security/resources/blog/onedrive-file-picker-security-flaw-oasis-research
29/05/2025 10:33:47
QRCode
archive.org

Oasis Security's research team uncovered a flaw in Microsoft's OneDrive File Picker that allows websites to access a user’s entire OneDrive content, rather than just the specific files selected for upload via OneDrive File Picker. Researchers estimate that hundreds of apps are affected, including ChatGPT, Slack, Trello, and ClickUp–meaning millions of users may have already granted these apps access to their OneDrive. This flaw could have severe consequences, including customer data leakage and violation of compliance regulations.

Upon discovery, Oasis reported the flaw to Microsoft and advised vendors using OneDrive File Picker of the issue. In response, Microsoft is considering future improvements, including more precise alignment between what OneDrive File Picker does and the access it requires.

Below are details of the flaw and mitigation strategies. You can read the Oasis Security Research team’s full report here.

The Flaws
Excessive Permissions in the OneDrive File Picker
The official OneDrive File Picker implementation requests read access to the entire drive – even when uploading just a single file – due to the lack of fine-grained OAuth scopes for OneDrive.

While users are prompted to provide consent before completing an upload, the prompt’s vague and unclear language does not communicate the level of access being granted, leaving users open to unexpected security risks.

The lack of fine-grained scopes makes it impossible for users to distinguish between malicious apps that target all files and legitimate apps that ask for excessive permissions simply because there is no other secure option.

Insecure Storage of Sensitive Secrets
Sensitive secrets used for this access are often stored insecurely by default.

The latest version of OneDrive File Picker (8.0) requires developers to take care of the authentication themselves, typically using the Microsoft Authentication Library (MSAL) and most likely using the Authorization Flow.

Security risks ensue:

MSAL stores sensitive Tokens in the browser’s session storage in plain text.
With Authorization Flows a Refresh Token may also be issued, which lengthens the access period, providing ongoing access to the user's data.
Notably, OpenAI uses version 8.0.

Mitigation Steps
The lack of fine-grained OAuth scopes combined with Microsoft’s vague user prompt is a dangerous combination that puts both personal and enterprise users at risk. Oasis Security recommends that individuals and technology leaders review the third-party access they’ve granted to their account to mitigate the potential risks raised by these issues.

Check Whether or Not You’ve Previously Granted Access to a Vendor
‍
How to for Private Accounts
Log in to your Microsoft Account.
In the left or top pane, click on "Privacy".
Under "App Access", select the list of apps that have access to your account.
Review the list of apps, and for each app, click on “Details” to view the specific scopes and permissions granted.
You can “Stop Sharing” at any time. Consider that an Access Token takes about an hour to expire regardless of when you clicked stopped sharing. This would however revoke a Refresh Token if present.

oasis.security EN 2025 OneDrive File Picker OAuth Flaw MSAL
Palo Alto Releases Patch for PAN-OS DoS Flaw https://thehackernews.com/2024/12/palo-alto-releases-patch-for-pan-os-dos.html
27/12/2024 10:54:12
QRCode
archive.org

Palo Alto Networks has disclosed a high-severity vulnerability impacting PAN-OS software that could cause a denial-of-service (DoS) condition on susceptible devices.

The flaw, tracked as CVE-2024-3393 (CVSS score: 8.7), impacts PAN-OS versions 10.X and 11.X, as well as Prisma Access running PAN-OS versions. It has been addressed in PAN-OS 10.1.14-h8, PAN-OS 10.2.10-h12, PAN-OS 11.1.5, PAN-OS 11.2.3, and all later PAN-OS versions.

thehackernews EN 2024 PaloAlto PAN-OS DoS Flaw CVE-2024-3393
Critical Vulnerability in Apache OFBiz Requires Immediate Patching - Infosecurity Magazine https://www.infosecurity-magazine.com/news/fla-apache-ofbiz-requires-patching/?ref=metacurity.com
07/08/2024 10:18:18
QRCode
archive.org
thumbnail

SonicWall discovered the Apache OFBiz flaw, identifying it as a critical issue enabling unauthenticated remote code execution

infosecurity-magazine. EN 2024 SonicWall Apache OFBiz flaw critical CVE-2024-38856
Microsoft Refused to Fix Flaw Years Before SolarWinds Hack https://www.propublica.org/article/microsoft-solarwinds-golden-saml-data-breach-russian-hackers
17/06/2024 13:20:05
QRCode
archive.org
thumbnail

Former employee says software giant dismissed his warnings about a critical flaw because it feared losing government business. Russian hackers later used the weakness to breach the National Nuclear Security Administration, among others.

propublica EN 2024 Microsoft problem critical flaw losing government business SolarWinds
Safari Flaw Can Expose iPhone Users in the EU to Tracking https://www.mysk.blog/2024/04/28/safari-tracking/
09/05/2024 13:38:14
QRCode
archive.org

Apple's implementation of installing marketplace apps from Safari is heavily flawed and can allow a malicious marketplace to track users across websites

mysk EN 2024 ios macos safari Flaw iPhone EU Tracking
New Black Basta decryptor exploits ransomware flaw to recover files https://www.bleepingcomputer.com/news/security/new-black-basta-decryptor-exploits-ransomware-flaw-to-recover-files/
31/12/2023 10:18:20
QRCode
archive.org
thumbnail

Researchers have created a decryptor that exploits a flaw in Black Basta ransomware, allowing victims to recover their files for free.

bleepingcomputer EN 2023 Black-Basta Decryptor Encryption Flaw Ransomware XOR
TETRA Radio Code Encryption Has a Flaw: A Backdoor https://www.wired.com/story/tetra-radio-encryption-backdoor/
30/07/2023 21:08:14
QRCode
archive.org
thumbnail

A secret encryption cipher baked into radio systems used by critical infrastructure workers, police, and others around the world is finally seeing sunlight. Researchers say it isn’t pretty.

wired EN 2023 TETRA encryption cipher Flaw Backdoor police
Data-leak flaw in Qualcomm, HiSilicon-based Wi-Fi AP chips https://www.theregister.com/2023/04/07/wifi_access_icmp/
10/04/2023 18:55:48
QRCode
archive.org
thumbnail

WPA stands for will-provide-access, if you can successfully exploit a target's setup

theregister EN 2023 Qualcomm Data-leak flaw Wi-Fi AP chips CVE-2022-25667
Unrar Path Traversal Vulnerability affects Zimbra Mail https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/
29/06/2022 21:15:52
QRCode
archive.org
thumbnail

We discovered a vulnerability in Zimbra Enterprise Email that allows an unauthenticated, remote attacker fully take over Zimbra instances via a flaw in unrar.

sonarsource Pathtraversal EN 2022 Zimbra flaw unrar CVE-2022-30333
4372 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio