In this week's Security Advisory:
A critical vulnerability was discovered in Ivanti's Standalone Sentry (formerly MobileIron Sentry) and Neurons for ITSM. CVE-2023-41724 presents a flaw within the Standalone Sentry, rated at 9.6 out of 10 on the CVSS scale. The vulnerability allows attackers to remotely execute code directly onto the operating system. This effects systems running Ivanti Sentry versions 9.19 and earlier.
CVE-2023-46808 is another critical vulnerability affecting Ivanti Neurons for ITSM, scoring 9.9 out of 10 on the CVSS scale. This flaw can allow threat actors to modify files within the ITSM server. If exploited, attackers can manipulate crucial directories to further compromise the host with a sequence of malicious commands. Ivanti has announced that a patch has been deployed to all Neuron for ITSM cloud environments; however, on-premise systems would still require an immediate update.
It's worth noting that these vulnerabilities are not related to previously disclosed vulnerabilities in Ivanti's PulseSecure devices.
Affected Versions:
More Reading/Information
Apple has issued security updates for modules in it's CoreMedia and WebRTC frameworks across portions of its entire product lineup. CoreMedia, an Apple-designed toolkit, streamlines application integration for iOS and MacOS developers. WebRTC is a suite of APIs that allow for real-time web communication and is used by several Apple applications to enable seamless communication functionalities. Successful exploitation of these vulnerabilities can impact an organization by allowing an attacker to execute remote scripts on any of the affected devices.
This vulnerability is currently being tracked as CVE-2024-1580 with a CVSS score of 5.9 out of a possible 10. Discovery was credited to a security researcher at Google, who published an explanation earlier this month as well as a POC in unison with Apples latest patch.
Affected Versions:
More Reading/Information
Google released a security update to fix seven (7) vulnerabilities in its Chrome Desktop Browser for Windows, Mac, and Linux with one (1) receiving a severity rating of "Critical" and three (3) receiving a severity of 'High'.
The critical vulnerability, known as CVE-2024-2883, involves a memory allocation issue that occurs when the program attempts to access memory that has been freed, potentially leading to unpredictable behavior or security risks.
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.