In this week's Security Advisory:
A newly disclosed remote code execution vulnerability in the Apache OFBiz open-source enterprise resource planning (ERP) system could allow unauthenticated threat actors to compromise vulnerable systems. Apache OFBiz is an open-source enterprise resource planning (ERP) framework that includes web applications to meet common business needs. This vulnerability is being tracked as CVE-2024-38856 with a CVSS score of 9.8 out of 10. Cybersafe is unaware of this being exploited in the wild.
Affected Versions
More Reading/Information
A remote code execution vulnerability in the Acronis Cyber Infrastructure is currently being exploited in the wild. Identified as CVE-2023-45249 with a CVSS score of 9.8 out of 10.
Affected Versions
More Reading/Information
A security flaw in Rockwell Automation's Logix controllers has been identified. This security bypass vulnerability, tracked as CVE-2024-6242 with a CVSS score 8.4 out of 10, impacts various models within the Logix family of programmable logic controllers (PLCs) and poses a significant risk to industrial automation systems globally. Successful exploitation will result in the execution of remote commands or reconfiguration of vulnerable devices.
Affected Products
More Reading/Information
This month's Android security updates address 46 vulnerabilities, including a high-severity remote code execution (RCE) flaw that has been exploited in targeted attacks. Tracked as CVE-2024-36971 with a CVSS score of 7.8 out of 10, it has been identified as a high severity issue in the kernel that can be exploited for remote code execution with system execution privileges required.
Affected Versions
More Reading/Information
Google Chrome has issued a security update addressing six vulnerabilities that impact Windows, Mac, and Linux operating systems. Mozilla released security updates to address vulnerabilities in Firefox that could lead to arbitrary code execution. There was a total of fourteen (14) vulnerabilities that affects Firefox prior to 129. Google and Mozilla are currently not aware of these vulnerabilities being exploited in the wild.
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.