In this week's Security Advisory:
Cisco released a patch for a critical vulnerability in their Cisco Secure Email Gateway product. Assigned CVE-2024-20401, and rated as a CVSS score of 9.8 out of 10, it allows an unauthenticated remote attacker to send a specially crafted email attachment to a vulnerable device which results in overwriting of files on the system. To exploit this vulnerability, both "File Analysis" and "Content filters" must be enabled within Secure Email Gateway and is running a vulnerable release of Cisco AsyncOS. Successful exploitation could lead to arbitrary code execution by the attacker, potentially granting them elevated privileges on the affected system.
Cisco also patched their Cisco Smart Software Manager On-Prem (SSM On-Prem). Assigned CVE-2024-22262, and rated at a CVSS score of 10 out of 10, allows an unauthenticated, remote attacker to change the password of any user, including administrative users.
Affected Products
CVE-2024-20401 affects Cisco Secure Email Gateway if it is running a vulnerable release of Cisco AsyncOS and both of the following conditions are met:
CVE-2024-20419 affects Cisco SSM On-Prem and Cisco Smart Software Manager Satellite.
More Reading/Information
SolarWinds has addressed eight critical vulnerabilities in its Access Rights Manager (ARM) software, six of which permitted attackers to achieve remote code execution (RCE) on susceptible devices. Access Rights Manager is a vital tool for enterprises, enabling administrators to manage and audit access rights across their organization's IT infrastructure to reduce the impact of threats.
The RCE vulnerabilities (CVE-2024-23469, CVE-2024-23466, CVE-2024-23467, CVE-2024-28074, CVE-2024-23471, and CVE-2024-23470), all with severity scores of 9.6/10, allowed attackers without privileges to perform actions on unpatched systems by executing code or commands, with or without SYSTEM privileges, depending on the specific flaw exploited.
There are currently no reports of these vulnerabilities being exploited in the wild.
More Reading/Information
Ivanti has released patches that address critical vulnerabilities found in Ivanti Endpoint Manager (EPM) and Ivanti Endpoint Manager for Mobile (EPMM). Ivanti has resolved a SQL Injection vulnerability in its Endpoint Management (EPM) software. This vulnerability, identified as CVE-2024-37381 with a CVSS score of 8.4, could have allowed authenticated attackers within the same network to execute arbitrary code on affected systems. Ivanti also released patches for four vulnerabilities affecting all versions of its Endpoint Manager for Mobile (EPMM) product. Three of the flaws, identified as CVE-2024-36130, CVE-2024-36131, and CVE-2024-36132, are high-severity bugs. EPMM (Core) versions 11.12.0.3, 12.0.0.3 and 12.1.0.1 address these security flaws.
Ivanti says it is not aware of this vulnerability being exploited in the wild.
More Reading/Information
Atlassian has released updates for Bamboo Data Center and Server that address two high-severity bugs, tracked as CVE-2024-22262 rated at a CVSS score of 8.1 out of 10, which could allow an unauthenticated attacker to perform a server-side request forgery (SSRF) attack.
The second issue tracked as CVE-2024-21687 rated at a CVSS score of 8.1 out of 10, allows an authenticated attacker to make the application display the contents of a local file or execute a different file already stored on the server. This has a high impact on confidentiality and integrity, no impact on availability, and requires no user interaction.
Affected Versions
More Reading/Information
There were security updates released for vulnerabilities found in Google Chrome and Oracle Products.
Google Chrome has issued a security update addressing twenty-four (24) vulnerabilities that impact Windows, Mac, and Linux operating systems.
Oracle released 386 patches in their quarterly update, which fixed vulnerabilities in several of their products. It is recommended to update all affected products to their latest version. The full list of affected Oracle products can be found here: : https://www.oracle.com/security-alerts/cpujul2024.html
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.