In this week's Security Advisory:
VMware has released a security update for its Fusion hypervisor to address a high-severity vulnerability that exposes users to code execution exploits. Tracked as CVE-2024-38811 (CVSS score 8.8 out of 10), it could be exploited to execute code within the Fusion environment, potentially leading to a complete system compromise.
Affected Versions
More Reading/Information
Zyxel has patched numerous vulnerabilities in its networking devices, including critical flaw CVE-2024-7261 (CVSS score of 9.8 out of 10), that could allow unauthenticated attackers to execute OS commands on various Zyxel access points (APs) and security routers by sending a specially crafted cookie to the vulnerable devices
Affected Versions
More Reading/Information
Google has announced a new set of Android security updates that address thirty-five (35) vulnerabilities. Including CVE-2024-32896 (CVSS score of 7.8 out of 10), is a high severity issue that could allow a local attacker to elevate privileges. This vulnerability does require access to the device.
More Reading/InformationFortra has issued a warning about a critical hardcoded password vulnerability in FileCatalyst Workflow, which could allow attackers to gain unauthorized access to an internal database, steal data, and obtain administrator privileges. This vulnerability is tracked as CVE-2024-6633 (CVSS score 9.8 out of 10).
Affected Versions
More Reading/Information
Google Chrome has issued security updates addressing eight (8) vulnerabilities, with six (6) classified as "High" severity. These vulnerabilities impact Windows, Mac, and Linux operating systems.
Mozilla released security updates to address vulnerabilities in Firefox and Firefox ESR versions that could lead to arbitrary code execution. These vulnerabilities impact Firefox versions prior to 130 and Firefox ESR versions prior to 115.15
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.