In this week's Security Advisory:
Apple released updates to address three (3) zero-days being actively exploited in Apple devices. The first zero-day, CVE-2023-41993, allows an attacker to execute arbitrary code when processing specially crafted web content. CVE-2023-41992 received a CVSS score of 9.8 out of a possible 10. The second zero-day, CVE-2023-41992, allows a local attacker to elevate their privileges. CVE-2023-41992 received a CVSS score of 7.8 out of a possible 10. The third zero-day, CVE-2023-41991, allows a malicious app to bypass signature validation and gain arbitrary code execution. CVE-2023-41991 received a CVSS score of 5.5 out of a possible 10. There are reports of these vulnerabilities being actively exploited against versions of iOS before iOS 16.7.
The following products are affected:
More Reading/Information
On September 12, 2023, Google disclosed a critical zero-day (CVE-2023-4863) affecting the WebP code library (libwebp) that could allow for arbitrary code execution or a denial-of-service attack. However, new information indicates that this vulnerability is not just in Google products but in libwebp, which is in many applications. The zero-day is now being tracked as CVE-2023-5129 and received a new CVSS score of 10 out of 10, the highest score a vulnerability can receive.
The following versions are affected:
More Reading/Information
A proof-of-concept exploit has been released for a critical vulnerability (CVE-2023-29357) affecting Microsoft SharePoint Server. CVE-2023-29357 was previously disclosed by Microsoft as part of their June 2023 Patch Tuesday rollout. This vulnerability could allow an unauthenticated attacker to gain administrator-level privileges. Researchers have also found a way to chain this with another remote code execution vulnerability to severely compromise the SharePoint server.
The following versions are affected:
More Reading/Information
Cybersafe wants to ensure organizations that utilize Okta are aware of their recent release of additional security measures that customers should review to protect their environment against social engineering campaigns. Okta customers have experienced an uptick in social engineering attacks against their IT service desk personnel, which has led to attackers gaining access to highly privileged Okta Super Administrator accounts. This access has allowed attackers to impersonate users and compromise the entire organization. Okta has outlined several security measures to protect against these attacks and has asked customers to implement as they see fit. To review the list of recommendations, navigate to the following link: https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe Solutions strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.