In this week's Security Advisory:
Atlassian released a patch to fix a critical vulnerability in its Confluence Data Center and Server. The critical vulnerability is being tracked as CVE-2023-22518 and is an improper authorization vulnerability that could lead to significant data loss if exploited. CVE-2023-22518 received a CVSS score of 9.1 out of a possible 10. This vulnerability affects on-premise instances of Confluence Data Center and Server. Atlassian Cloud sites are not affected.
The following versions of Confluence Data Center and Server (on-premise) are affected:
Organizations that cannot apply the patch immediately should strict access to Confluence Server and Data Center from the internet or disable external access.
More Reading/Information:
New information suggests that the critical vulnerability (CVE-2023-4966) affecting Citrix NetScaler ADC and NetScaler Gateway is now under mass exploitation. This significant rise in exploitation is due to researchers releasing a proof-of-concept last week. It is recommended to apply the latest patch released on October 10th to avoid potential compromise.
https://www.theregister.com/2023/10/31/mass_exploitation_citrix_bleed/
https://www.helpnetsecurity.com/2023/10/30/cve-2023-4966-exploited/
Updated Security Advisory - October 18th, 2023
New information suggests that a critical vulnerability (CVE-2023-4966) affecting NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) has been actively exploited in the wild since late August 2023. It is recommended to apply the latest patches to the affected systems immediately to avoid potential compromise.
https://www.mandiant.com/resources/blog/remediation-netscaler-adc-gateway-cve-2023-4966
Original Security Advisory - October 11th, 2023
Two vulnerabilities were found in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) that could allow for the disclosure of sensitive information. The vulnerabilities are being tracked as CVE-2023-4966 and CVE-2023-4967 and have been given CVSS scores of 9.4 and 8.2 out of possible 10, respectively. CVE-2023-4966 can lead to the disclosure of sensitive information while CVE-2023-4967 can cause a denial-of-service (DoS) on vulnerable devices.
To exploit either vulnerability, the appliance must be configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.
The following versions are affected:
Of note, NetScaler ADC and NetScaler Gateway version 12.1 reached End-of-Life and is vulnerable. Citrix cloud-based management services have been updated. Customers who use these cloud services do not need to take any further action.
More Reading/Information
F5 released a patch to fix a critical vulnerability in its BIG-IP that could lead to remote code execution. The critical vulnerability, CVE-2023-46747, is in the Traffic Management User Interface (TMUI), also known as the Configuration utility, and could allow an unauthenticated attacker with network access to the BIG-IP system to execute remote code. CVE-2023-46747 can only be exploited if the Traffic Management User Interface (TMUI) is exposed to the internet. CVE-2023-46747 received a CVSS score of 9.8 out of a possible 10.
The following versions are affected:
More Reading/Information
There were security updates released for Google Chrome Desktop Browser and Apple products. The most severe could lead to arbitrary code execution.
Google Chrome addressed fifteen (15) vulnerabilities, with three (3) given a severity rating of "High". These vulnerabilities affect Windows, Mac, and Linux.
Apple addressed at least sixty-five (65) vulnerabilities in several of its products. The following versions are affected:
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.