In this week's Security Advisory:
Ivanti has warned that vulnerabilities to its Cloud Service Appliance, Virtual Traffic Manager, and Endpoint Manager are being actively exploited in the wild. The vulnerabilities range from authentication bypass to arbitrary code execution Ivanti CSA (Cloud Services Appliance) versions 5.0.1 and prior.
Affected Versions
More Reading/Information
On September 19th Cybersafe Solutions advised against upgrading the macOS Sequoia 15 due to significant network issues that affected the functionality of multiple vendor security tools. That has since been addressed in macOS Sequoia 15.0.1. Many of the affected software providers have now released statements confirming this as well.
More Reading/InformationThe October 8th release of Microsoft's patch Tuesday includes updates to one hundred eighteen (118) vulnerabilities, five (5) of which are zero days, and two (2) that are being actively exploited. Three critical vulnerabilities were addressed, all three are remote code execution execution vulnerabilities.
The two under active exploitation include:
More Reading/Information
Okta has released a patch for Okta Classic which allows an attacker to bypass specific conditions set in the sign-on policies if they have valid user credentials. Okta recommended customers review logs to identify unauthorized authentication events, failed authentication events, and any unusual behavior (geolocations, timestamps, etc.).
Affected Versions
More Reading/Information
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. A successful exploitation of the most severe vulnerability could lead to a compromised user account, which could then lead to privilege escalation attempts.
Affected Versions
Android OS patch levels before 2024-10-05, a full list can be found here.
More Reading/Information
Apple has released an iOS upgrade that patches two vulnerabilities allowing attackers to expose users' passwords and audio snippets. The first, CVE-2024-44204, could enable voiceover to read user's passwords aloud. The second, CVE-2024-44207, allowed for audio messages to be captured before the microphone was shown to be activated.
Affected Versions
More Reading/Information
Jenkins has released patches for multiple vulnerabilities. The high-severity vulnerabilities (CVE-2024-47806 and CVE-2024-47807) affect the Jenkins OpenID Connect Authentication Plugin where the plugin does not check the token ID claim during the authentication. This could allow attackers to bypass the authentication workflow. Two other medium-severity vulnerabilities affecting Jenkins weekly, and Jenkins LTS were also addressed with patches.
Affected Versions
More Reading/Information
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. There are currently no reports of these vulnerabilities being exploited in the wild.
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. There are currently no reports of these vulnerabilities being exploited in the wild.
Mozilla Firefox patched a critical vulnerability that allowed an attacker to execute code within its content process. Mozilla has received reports of this vulnerability being exploited in the wild.
Affected Versions
More Reading/Information
SAP has released patches for six new vulnerabilities as well as updates to 7 previously released ones. The most severe of the vulnerabilities involves a missing authorization check in the BusinessObjects Business Intelligence platform. If SSO is enabled for the enterprise authentication, an attacker can gain access to a logon token.
Affected Versions
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.