In this week's Security Advisory:
The issue tracked as CVE-2024-0132 (CVSS 9/10), allows an attacker to break out of a container and gain full access to the underlying host. After breaking out of the container, the attacker could then attempt to execute commands and steal sensitive information. Details of the exploit are currently private, but it is expected the researchers will release more details soon. Patching should be done as soon as you are able.
Affected Versions
More Reading/Information
A vulnerability has been discovered in Zimbra Collaboration which could allow for remote code execution by an unauthenticated user. This is being tracked as CVE-2024-45519 and a proof of concept has been released. There are reports of it being exploited in the wild.
Affected Versions
More Reading/Information
Multiple vulnerabilities have been found in PHP, the most severe of these vulnerabilities could allow for remote code execution by an unauthenticated attacker. Successful exploitation could allow an attacker to gain privileges of the affected service account. Depending on the privileges associated with the service account, an attacker could then install programs; view, change, or delete data or create new accounts with full user rights.
Affected Versions
More Reading/Information
Cisco has released patches for eleven vulnerabilities, seven of which are high-severity and affect its IOS Software and IOS XE Software. Most of these vulnerabilities allow for an unauthenticated remote attacker the ability to exploit them. Cisco has stated they are currently unaware of any of these vulnerabilities being exploited in the wild.
Affected Versions
More Reading/Information
Multiple vulnerabilities have been discovered in Foxit PDF Reader and Editor, the most severe of which could result in arbitrary code execution. A successful exploitation of the most severe vulnerability could lead to a compromised user account, which could lead to privilege escalation attempts. There are currently no reports of these vulnerabilities being exploited in the wild.
Affected Versions
More Reading/Information
Multiple vulnerabilities have been discovered in Google Chrome and successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. There are currently no reports of these vulnerabilities being exploited in the wild.
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. The level of severity is dependent upon the user's privileges.
Affected Versions
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.