In this week's Security Advisory:
7-zip recently patched vulnerability CVE-2024-11477 which allows remote attackers to execute arbitrary code on affected versions of 7-zip. Interaction with the library is required to exploit the vulnerability but attack vectors can vary. This specific flaw exists within the implementation of Zstandard decompression.
Affected Versions
More Reading/Information
VMware released a high-severity bulletin on Tuesday that contained patches for five new vulnerabilities. Two of these, CVE-2024-38830 and CVE-2024-38831, are privilege escalation vulnerabilities that someone with local admin privileges can exploit. Currently, there are no workarounds, so users are urged to apply the patches.
Affected Versions
More Reading/Information
Two vulnerabilities, tracked as CVE-2024-10542 and CVE-2024-10781 (CVSS 9.8/10), were patched by CleanTalk. Both affect its Spam Protection, Anti-Spam, and Firewall plugin and both can be exploited remotely by an unauthenticated user. Two of the check functions in the plugin check for the originating IP address and DNS, but they are vulnerable to spoofing, which can then allow an attacker to bypass authentication.
Affected Versions
More Reading/Information
QNAP released a security bulletin this week that addressed multiple vulnerabilities including three critical severity vulnerabilities. These vulnerabilities affect multiple different QNAP applications.
Affected Versions
More Reading/Information
Mozilla has released updates to Firefox and Thunderbird to address multiple vulnerabilities, most severe of which can lead to remote code execution. There are currently no reports of these being exploited in the wild.
Affected Versions
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.