In this week's Security Advisory:
The first vulnerability, CVE-2024-42448 (CVSS 9.9/10), allows an attacker to exploit arbitrary code on the server. The second vulnerability, CVE-2024-42449 (CVSS 7.1/10), allows an attacker to steal the NTLM hash of the server to gain access to remove current files on the server. Both vulnerabilities can only be exploited if the management agent is authorized on the server.
Affected Versions
More Reading/Information
Android published its December Security Bulletin, which addressed fourteen (14) vulnerabilities in multiple products. The most severe vulnerability, CVE-2024-43767 could lead to remote code execution with no additional privileges needed. The vulnerabilities affect several components such as Imagination Technologies, MediaTek, and Qualcomm. Google made no mention of these vulnerabilities being exploited in the wild.
Affected Versions
More Reading/Information
The vulnerability, CVE-2024-42327 (CVSS 9.9/10), can be exploited by any user with a role that has access to the API. This could allow an authenticated attacker to escalate privileges and gain complete control of a vulnerable server. The patches for this were released in July, though the advisory was released this week.
Affected Versions
More Reading/Information
This vulnerability CVE-2024-11667 (CVSS 7.5/10) can allow an attacker to gain unauthorized access to the system. This vulnerability affects Zyxel ATP, USG FLEX, and USG20(W)-VPN devices. The initial patch was released early in September. If you have not upgraded to that version, it is recommended to do so immediately.
Affected Versions
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.