Insights | Resources by Cybersafe Solutions

Cybersafe Solutions Security Advisory Bulletin November 15, 2024

Written by Cybersafe Solutions | Nov 15, 2024 3:00:00 PM

In this week's Security Advisory:

  • Microsoft Releases November Patch Tuesday Addressing Multiple Zero Days
  • Cisco Patches Critical Command Injection Vulnerability in November Patch Cycle
  • Ivanti Patches Eight Critical Vulnerabilities in Multiple Products
  • Citrix Patches High Severity Vulnerability in NetScaler ADC and Gateway
  • Siemens Releases Patches for Seven Critical Vulnerabilities
  • Fortinet Releases Updates for Multiple Vulnerabilities
  • Veeam Releases Hotfix for Backup Enterprise Manager Vulnerability
  • SAP Releases Patches for Multiple Products
  • Security Updates Released for Google Chrome, Adobe Products, and Zoom
Microsoft Releases November Patch Tuesday Addressing Multiple Zero Days

Tuesday Microsoft announced patches for ninety-one (91) vulnerabilities, including four zero days, two of which are under active exploitation. The two being actively exploited are CVE-2024-43451 and CVE-2024-49039, the first of which can expose NTLM hashes and allow an attacker to authenticate as the affected user. The second is a medium severity vulnerability that can lead to a privilege escalation.

Affected Versions

  • A full list of affected versions can be found here

More Reading/Information

Cisco Patches Critical Command Injection Vulnerability in November Patch Cycle

Cisco announced patches for fifteen (15) vulnerabilities, the most critical is CVE-2024-20418 (CVSS 10/10). This vulnerability allows an unauthenticated remote attacker to inject commands into the operating system. A successful exploitation of this vulnerability would allow an attacker to execute these commands with root privileges. This patch cycle also addressed two high and twelve medium severity vulnerabilities.

Affected Versions

  • A full list of affected Cisco Devices can be found here

More Reading/Information

Ivanti Patches Eight Critical Vulnerabilities in Multiple Products

Ivanti released patches for fifty (50) total vulnerabilities including eight critical. The most concerning is CVE-2024-50330 (CVSS 9.8/10), this vulnerability can allow an unauthenticated remote attacker to execute code remotely into the Ivanti Endpoint Manager via an SQL injection. The seven other critical vulnerabilities require at least admin permissions to be executed.

Affected Versions

  • A full list can be found here

More Reading/Information

Citrix Patches High Severity Vulnerability in NetScaler ADC and Gateway

Citrix released patches for multiple vulnerabilities affecting its NetScaler ADC and NetScaler Gateway, the most severe is a high-severity vulnerability which could lead to memory corruption or denial-of-service. This only impacts gateways with the RDP feature enabled, have an RDP proxy server, or are configured as an auth server with RDP enabled.

Affected Versions

  • NetScaler ADC and NetScaler Gateway 14.1 before 14.1-29.72.
  • NetScaler ADC and NetScaler Gateway 13.1 before 13.1-55.34.
  • NetScaler ADC 13.1-FIPS before 13.1-37.207.
  • NetScaler ADC 12.1-FIPS before 12.1-55.321.
  • NetScaler ADC 12.1-NDcPP before 12.1-55.321.

More Reading/Information

Siemens Releases Patches for Seven Critical Vulnerabilities

Siemens has released patches for twenty-six (26) total vulnerabilities, including seven (7) critical severity vulnerabilities. These affect several products, but the most severe is a Deserialization Vulnerability in TeleControl Server Basic. This vulnerability has a CVSS 10/10 and allows an unauthenticated remote attacker to execute arbitrary code on the device.

Affected Versions

A full list can be found here

More Reading/Information

Fortinet Releases Updates for Multiple Vulnerabilities

Fortinet released patches for eleven (11) vulnerabilities, two (2) of which were high severity. The first vulnerability, CVE-2023-50176 (CVSS 7.1/10), could allow an unauthenticated attacker to hijack user sessions in FortiOS by phishing SAML link. The second, CVE-2024-23666 (CVSS 7.1/10) could allow an authenticated attacker with at least read-only permissions the ability to execute requests on multiple Fortinet products.

Affected Versions

A full list of affected versions can be found here

More Reading/information

Veeam Releases Hotfix for Backup Enterprise Manager Vulnerability

Veeam has announced a hotfix for its Backup Enterprise Manager to mitigate vulnerability CVE-2024-40715 (CVSS 7.7). This vulnerability allows a remote attacker to bypass authentication by performing a Man-in-the-Middle attack. Veeam's advisory makes note that the hotfix will not change the build number, but it does include details of how you can ensure the hotfix was run successfully.

Affected Versions

Veeam Backup Enterprise Manager 12.2.0.334 and earlier.

More Reading/Information

SAP Releases Patches for Multiple Products

SAP announced patches for multiple vulnerabilities, the two (2) most severe affect its Web Dispatcher and PDCE. The first vulnerability, CVE-2024-47590 (CVSS 8.8/10), allows an unauthenticated attacker to compromise the Web Dispatcher server via cross-site scripting and allow them to execute arbitrary code. The second vulnerability, CVE-2024-39592 (CVSS 7.7/10), could allow an authenticated remote attacker to escalate their privileges within the system.

Affected Versions

A full list of affected versions can be found here

More Reading/Information

Security Updates Released for Google Chrome, Adobe Products, and Zoom

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. There are currently no reports of these vulnerabilities being exploited in the wild.

Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. There are currently no reports of these vulnerabilities being exploited in the wild.

Zoom released patches for multiple vulnerabilities, the most severe is CVE-2024-45421 (CVSS 8.5/10) which could lead to a buffer overflow allowing an authenticated user to escalate their privileges.

Affected Versions

  • Chrome prior to 131.0.6778.70 for Windows and Mac
  • Chrome prior to 131.0.6778.69 for Linux
  • A full list of affected Adobe products can be found here
  • A full list of affected Zoom products can be found here

More Reading/Information

Recommendations

Please review your environment to ensure the above-mentioned issues are patched in a timely manner.  It is security best practice to regularly update and/or patch software to the latest versions.  The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only.  This dramatically increases the likelihood that new vulnerabilities have a patch issued for them.  Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.