In this week's Security Advisory:
CISA has warned that CVE-2024-7593 (CVSS 9.8/10), affecting its Virtual Traffic Manager (vTM), is now being actively exploited. This vulnerability allows unauthenticated remote attackers to bypass authentication on exposed vTM panels. This was previously included in the Security Advisory sent on August 14th. Ivanti also announced that another vulnerability CVE-2024-8963 (CVSS 9.4/10) for their Cloud Service Appliance is being exploited. Attackers are combining this vulnerability along with CVE-2024-8910 to bypass admin authentication and execute arbitrary commands on unpatched appliances.
Affected Versions
More Reading/Information
Atlassian has updated its security bulletin identifying four new vulnerabilities in multiple products, all of which have a CVSS score of 7.5 out of 10. Each vulnerability allows an attacker to cause denial of service (DoS) conditions in a multitude of ways. The affected products include Bamboo Data Center and Server, Bitbucket Data Center and Server, Confluence Data Center and Server, and Crowd Data Center and Server.
Affected Versions
More Reading/Information
A critical vulnerability was found in Microchip Technology's Advanced Software Framework (ASF) that could lead to remote code execution through a buffer overflow if exploited. The vulnerability is tracked as CVE-2024-7490 (CVSS 9.5/10). This software is currently no longer supported by Microchip. Due to this, there is not expected to be a patch on the way.
Affected Versions
More Reading/Information
ESET has released patches for two vulnerabilities allow privilege escalation. The first, tracked as CVE-2024-7400, affects the Windows OS and allows an attacker with low privileges to delete arbitrary files and escalate their permissions. The second, CVE-2024-6654, affects MacOS and allows an authenticated user to perform a DoS attack which could disable the protection of the endpoint.
Affected Versions
More Reading/Information
Google Chrome released updates to address four vulnerabilities. A successful exploitation of the most severe of these could allow for remote code execution. The full list of vulnerabilities includes CVE-2024-9120, CVE-2024-9121, CVE-2024-9122, and CVE-2024-9123.
Mozilla Firefox has released an update for CVE-2024-8897 Firefox for Android. This vulnerability can allow an attacker to make a malicious site appear to have the same URL as a trusted site.
Affected Versions
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.