VMSA-2024-0007
CVSSv3 Range: 4.3
Issue Date: 2024-03-07
CVE(s): CVE-2024-22256
Synopsis:
VMware Cloud Director updates address a partial information disclosure vulnerability (CVE-2024-22256).
Impacted Products
VMware Cloud Director
Introduction
A partial information disclosure vulnerability in VMware Cloud Director was privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.
https://www.vmware.com/security/advisories/VMSA-2024-0007.html
CVSSv3 Range: 4.3
Issue Date: 2024-03-07
CVE(s): CVE-2024-22256
Synopsis:
VMware Cloud Director updates address a partial information disclosure vulnerability (CVE-2024-22256).
Impacted Products
VMware Cloud Director
Introduction
A partial information disclosure vulnerability in VMware Cloud Director was privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.
https://www.vmware.com/security/advisories/VMSA-2024-0007.html
VMware
VMSA-2024-0007
VMware Cloud Director updates address a partial information disclosure vulnerability (CVE-2024-22256).
Cybersecurity and Infrastructure Security Agency (CISA)
You are subscribed to Cybersecurity Advisories for Cybersecurity and Infrastructure Security Agency. This information has recently been updated, and is now available.
Apple Released Security Updates for Multiple Products
03/08/2024 01:00 PM EST
Apple released security updates to address vulnerabilities in Safari, macOS, watchOS, tvOS, and visionOS. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following advisories and apply the necessary updates:
Safari 17.4
macOS Sonoma 14.4
macOS Ventura 13.6.5
macOS Monterey 12.7.4
watchOS 10.4
tvOS 17.4
visionOS 1.1
https://www.cisa.gov/news-events/alerts/2024/03/08/apple-released-security-updates-multiple-products
You are subscribed to Cybersecurity Advisories for Cybersecurity and Infrastructure Security Agency. This information has recently been updated, and is now available.
Apple Released Security Updates for Multiple Products
03/08/2024 01:00 PM EST
Apple released security updates to address vulnerabilities in Safari, macOS, watchOS, tvOS, and visionOS. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following advisories and apply the necessary updates:
Safari 17.4
macOS Sonoma 14.4
macOS Ventura 13.6.5
macOS Monterey 12.7.4
watchOS 10.4
tvOS 17.4
visionOS 1.1
https://www.cisa.gov/news-events/alerts/2024/03/08/apple-released-security-updates-multiple-products
Critical Fortinet flaw may impact 150,000 exposed devices
Scans on the public web show that approximately 150,000 Fortinet FortiOS and FortiProxy secure web gateway systems are vulnerable to CVE-2024-21762, a critical security issue that allows executing code without authentication.
https://www.bleepingcomputer.com/news/security/critical-fortinet-flaw-may-impact-150-000-exposed-devices/
Scans on the public web show that approximately 150,000 Fortinet FortiOS and FortiProxy secure web gateway systems are vulnerable to CVE-2024-21762, a critical security issue that allows executing code without authentication.
https://www.bleepingcomputer.com/news/security/critical-fortinet-flaw-may-impact-150-000-exposed-devices/
BleepingComputer
Critical Fortinet flaw may impact 150,000 exposed devices
Scans on the public web show that approximately 150,000 Fortinet FortiOS and FortiProxy secure web gateway systems are vulnerable to CVE-2024-21762, a critical security issue that allows executing code without authentication.
Security ID : QSA-24-09
Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, and myQNAPcloud
Release date : March 9, 2024
CVE identifier : CVE-2024-21899 | CVE-2024-21900 | CVE-2024-21901
Affected products: QTS 5.1.x, 4.5.x; QuTS hero h5.1.x, h4.5.x; QuTScloud c5.x; myQNAPcloud 1.0.x
https://www.qnap.com/en/security-advisory/qsa-24-09
Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, and myQNAPcloud
Release date : March 9, 2024
CVE identifier : CVE-2024-21899 | CVE-2024-21900 | CVE-2024-21901
Affected products: QTS 5.1.x, 4.5.x; QuTS hero h5.1.x, h4.5.x; QuTScloud c5.x; myQNAPcloud 1.0.x
https://www.qnap.com/en/security-advisory/qsa-24-09
QNAP Systems, Inc. - Network Attached Storage (NAS)
Multiple Vulnerabilities in QTS, QuTS hero, QuTScloud, myQNAPcloud, and myQNAPcloud Link (PWN2OWN 2023) - Security Advisory
QNAP designs and delivers high-quality network attached storage (NAS) and professional network video recorder (NVR) solutions to users from home, SOHO to small, medium businesses.
Vulnerabilidad de subida de ficheros sin restricción en ManageEngine Desktop Central
Fecha 11/03/2024
Importancia 5 - Crítica
Recursos Afectados
ManageEngine Desktop Central, versión 9, build 90055.
Descripción
INCIBE ha coordinado la publicación de una vulnerabilidad de severidad critica que afecta a ManageEngine Desktop Central (ahora conocida como Endpoint Central), una solución de seguridad y gestión de endpoints unificada que ayuda a administrar equipos de escritorio, portátiles, servidores, dispositivos móviles y tablets desde una ubicación central, la cual ha sido descubierta por Rafael Pedrero.
A esta vulnerabilidad se le ha asignado el siguiente código, puntuación base CVSS v3.1, vector del CVSS y tipo de vulnerabilidad CWE:
CVE-2024-2370: 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | CWE-434.
https://www.incibe.es/incibe-cert/alerta-temprana/avisos/vulnerabilidad-de-subida-de-ficheros-sin-restriccion-en-manageengine-desktop
Fecha 11/03/2024
Importancia 5 - Crítica
Recursos Afectados
ManageEngine Desktop Central, versión 9, build 90055.
Descripción
INCIBE ha coordinado la publicación de una vulnerabilidad de severidad critica que afecta a ManageEngine Desktop Central (ahora conocida como Endpoint Central), una solución de seguridad y gestión de endpoints unificada que ayuda a administrar equipos de escritorio, portátiles, servidores, dispositivos móviles y tablets desde una ubicación central, la cual ha sido descubierta por Rafael Pedrero.
A esta vulnerabilidad se le ha asignado el siguiente código, puntuación base CVSS v3.1, vector del CVSS y tipo de vulnerabilidad CWE:
CVE-2024-2370: 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | CWE-434.
https://www.incibe.es/incibe-cert/alerta-temprana/avisos/vulnerabilidad-de-subida-de-ficheros-sin-restriccion-en-manageengine-desktop
www.incibe.es
Vulnerabilidad de subida de ficheros sin restricción en ManageEngine Desktop Central
INCIBE ha coordinado la publicación de una vulnerabilidad de severidad critica que afe
Arcserve Unified Data Protection 9.2 Multiple Vulnerabilities
Synopsis
Multiple vulnerabilities exist in Arcserve Unified Data Protection (UDP) 9.2.
CVE-2024-0799 - wizardLogin Authentication Bypass (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
An authentication bypass vulnerability exists in edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.EdgeLoginServiceImpl.doLogin(). When a NULL password is passed to the method, a UUID is used for authentication
https://www.tenable.com/security/research/tra-2024-07
Synopsis
Multiple vulnerabilities exist in Arcserve Unified Data Protection (UDP) 9.2.
CVE-2024-0799 - wizardLogin Authentication Bypass (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
An authentication bypass vulnerability exists in edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.EdgeLoginServiceImpl.doLogin(). When a NULL password is passed to the method, a UUID is used for authentication
https://www.tenable.com/security/research/tra-2024-07
Tenable®
Arcserve Unified Data Protection 9.2 Multiple Vulnerabilities
Multiple vulnerabilities exist in Arcserve Unified Data Protection (UDP) 9.2.
Critical RCE Vulnerability in Fortra FileCatalyst Workflow Threatens File Transfer Security (CVE-2024-25153)
https://socradar.io/rce-vulnerability-fortra-filecatalyst-workflow/
https://socradar.io/rce-vulnerability-fortra-filecatalyst-workflow/
SOCRadar® Cyber Intelligence Inc.
Critical RCE Vulnerability in Fortra FileCatalyst Workflow Threatens File Transfer Security (CVE-2024-25153) - SOCRadar® Cyber…
Fortra FileCatalyst Workflow, a trusted enterprise file transfer solution, is under severe threat due to the disclosure of a critical Remote Code...
Múltiples vulnerabilidades en productos de Atlassian
Fecha 20/03/2024
Importancia 5 - Crítica
Recursos Afectados
Bamboo Data Center and Server
Bitbucket Data Center and Server
Confluence Data Center and Server
Jira Software Data Center and Server
Descripción
Atlassian ha publicado un boletín de seguridad para marzo de 2024 que incluye 1 vulnerabilidad de severidad crítica y 24 altas. La explotación de estas vulnerabilidades podría permitir a un atacante realizar inyección de SQL, denegación de servicio, acceder a directorios restringidos y ejecutar código remoto.
https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-productos-de-atlassian-1
Fecha 20/03/2024
Importancia 5 - Crítica
Recursos Afectados
Bamboo Data Center and Server
Bitbucket Data Center and Server
Confluence Data Center and Server
Jira Software Data Center and Server
Descripción
Atlassian ha publicado un boletín de seguridad para marzo de 2024 que incluye 1 vulnerabilidad de severidad crítica y 24 altas. La explotación de estas vulnerabilidades podría permitir a un atacante realizar inyección de SQL, denegación de servicio, acceder a directorios restringidos y ejecutar código remoto.
https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-productos-de-atlassian-1
www.incibe.es
Múltiples vulnerabilidades en productos de Atlassian
Atlassian ha publicado un boletín de seguridad para marzo de 2024 que incluye 1 vulnerabilidad de seve
Múltiples vulnerabilidades en el sistema CIGESv2
Fecha 20/03/2024
Importancia 5 - Crítica
Recursos Afectados
CIGESv2
https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-el-sistema-cigesv2
Fecha 20/03/2024
Importancia 5 - Crítica
Recursos Afectados
CIGESv2
https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-el-sistema-cigesv2
www.incibe.es
Múltiples vulnerabilidades en el sistema CIGESv2
INCIBE ha coordinado la publicación de 7 vulnerabilidades, 3 de severidad crítica, 1 d
Ivanti Releases Security Updates for Neurons for ITSM and Standalone Sentry
Release DateMarch 21, 2024
Ivanti has released security advisories to address vulnerabilities in Ivanti Neurons for ITSM and Standalone Sentry. A cyber threat actor could exploit these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following Ivanti advisories and apply the necessary updates:
CVE-2023-46808 (Authenticated Remote File Write) for Ivanti Neurons for ITSM
CVE-2023-41724 (Remote Code Execution) for Ivanti Standalone Sentry
https://www.cisa.gov/news-events/alerts/2024/03/21/ivanti-releases-security-updates-neurons-itsm-and-standalone-sentry
https://forums.ivanti.com/s/article/SA-CVE-2023-46808-Authenticated-Remote-File-Write-for-Ivanti-Neurons-for-ITSM
https://forums.ivanti.com/s/article/CVE-2023-41724-Remote-Code-Execution-for-Ivanti-Standalone-Sentry
Release DateMarch 21, 2024
Ivanti has released security advisories to address vulnerabilities in Ivanti Neurons for ITSM and Standalone Sentry. A cyber threat actor could exploit these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following Ivanti advisories and apply the necessary updates:
CVE-2023-46808 (Authenticated Remote File Write) for Ivanti Neurons for ITSM
CVE-2023-41724 (Remote Code Execution) for Ivanti Standalone Sentry
https://www.cisa.gov/news-events/alerts/2024/03/21/ivanti-releases-security-updates-neurons-itsm-and-standalone-sentry
https://forums.ivanti.com/s/article/SA-CVE-2023-46808-Authenticated-Remote-File-Write-for-Ivanti-Neurons-for-ITSM
https://forums.ivanti.com/s/article/CVE-2023-41724-Remote-Code-Execution-for-Ivanti-Standalone-Sentry
Ivanti
SA: CVE-2023-46808 (Authenticated Remote File Write) for Ivanti Neurons for ITSM
<p><strong><u><span style="color: #e74c3c;">Please note: The patch has been applied to all Ivanti Neurons for ITSM Cloud landscapes</span></u><span style="color: #e74c3c;">. </span></strong>
A vulnerability has been discovered that impacts all supported…
A vulnerability has been discovered that impacts all supported…
Forwarded from Una al día
Microsoft confirma problema en Windows Server detrás de los bloqueos de controladores de dominio
https://unaaldia.hispasec.com/2024/03/microsoft-confirma-problema-en-windows-server-detras-de-los-bloqueos-de-controladores-de-dominio.html?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-confirma-problema-en-windows-server-detras-de-los-bloqueos-de-controladores-de-dominio
https://unaaldia.hispasec.com/2024/03/microsoft-confirma-problema-en-windows-server-detras-de-los-bloqueos-de-controladores-de-dominio.html?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-confirma-problema-en-windows-server-detras-de-los-bloqueos-de-controladores-de-dominio
Una al Día
Microsoft confirma problema en Windows Server detrás de los bloqueos de controladores de dominio
Microsoft confirma que un problema en Windows Server está detrás de los bloqueos de los controladores de dominio.
170K+ Python Developers GitHub Accounts Hacked in Supply Chain Attack
https://gbhackers.com/170k-user-accounts-hacked/
https://gbhackers.com/170k-user-accounts-hacked/
GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
170K+ Python Developers GitHub Accounts Hacked in Supply Chain Attack
Over 170,000 users have fallen victim to a meticulously orchestrated scheme exploiting the Python software supply chain.
SysAdmin 24x7
170K+ Python Developers GitHub Accounts Hacked in Supply Chain Attack https://gbhackers.com/170k-user-accounts-hacked/
Checkmarx.com
Attack Using Fake Python Infrastructure
Checkmarx uncovered an attack on software supply chains, using tactics like stolen cookies and malicious code in PyPi packages. Learn how they did it
Exposing a New BOLA Vulnerability in Grafana
Executive Summary
Unit 42 researchers have discovered a new Broken Object Level Authorization (BOLA) vulnerability that impacts Grafana versions from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5. Grafana is a popular open-source data observability and visualization platform with over 20 million users worldwide and almost 60,000 stars on GitHub.
This vulnerability, assigned as CVE-2024-1313 with a CVSS score of 6.5
https://unit42.paloaltonetworks.com/new-bola-vulnerability-grafana/
Executive Summary
Unit 42 researchers have discovered a new Broken Object Level Authorization (BOLA) vulnerability that impacts Grafana versions from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5. Grafana is a popular open-source data observability and visualization platform with over 20 million users worldwide and almost 60,000 stars on GitHub.
This vulnerability, assigned as CVE-2024-1313 with a CVSS score of 6.5
https://unit42.paloaltonetworks.com/new-bola-vulnerability-grafana/
Unit 42
Exposing a New BOLA Vulnerability in Grafana
Unit 42 researchers discovered CVE-2024-1313, a broken object level authorization (BOLA) vulnerability in open-source data visualization platform Grafana.
New GoFetch Vulnerability in Apple’s M Chips Allows Secret Keys Leak on Compromised Computers
The GoFetch vulnerability, which affects Apple's M series of chips, allows an attacker to steal secret keys from the Mac under certain conditions. Read tips on mitigating the GoFetch security threat.
https://www.techrepublic.com/article/gofetch-vulnerability-apple-m-chips/
https://gofetch.fail/
The GoFetch vulnerability, which affects Apple's M series of chips, allows an attacker to steal secret keys from the Mac under certain conditions. Read tips on mitigating the GoFetch security threat.
https://www.techrepublic.com/article/gofetch-vulnerability-apple-m-chips/
https://gofetch.fail/
TechRepublic
New GoFetch Vulnerability in Apple's M Chips Allows Secret Keys Leak on Compromised Computers
The GoFetch vulnerability, which affects Apple's M series of chips, allows an attacker to steal secret keys from the Mac under certain conditions. Learn more.
Cisco Releases Security Updates for Multiple Products
03/28/2024 12:46 PM EDT
Cisco released security updates to address vulnerabilities in Cisco IOS, IOS XE, and AP software. A cyber threat actor could exploit some of these vulnerabilities to cause a denial-of-service.
CISA encourages users and administrators to review the following advisories and apply the necessary updates:
Cisco Event Response: March 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication
Cisco Access Point Software Secure Boot Bypass Vulnerability
Cisco Access Point Software Denial of Service Vulnerability
https://www.cisa.gov/news-events/alerts/2024/03/28/cisco-releases-security-updates-multiple-products
03/28/2024 12:46 PM EDT
Cisco released security updates to address vulnerabilities in Cisco IOS, IOS XE, and AP software. A cyber threat actor could exploit some of these vulnerabilities to cause a denial-of-service.
CISA encourages users and administrators to review the following advisories and apply the necessary updates:
Cisco Event Response: March 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication
Cisco Access Point Software Secure Boot Bypass Vulnerability
Cisco Access Point Software Denial of Service Vulnerability
https://www.cisa.gov/news-events/alerts/2024/03/28/cisco-releases-security-updates-multiple-products
CVE-2024-3094
Public on 29 de marzo de 2024
Critical Impact
CVSS Score 10.0
Description
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
https://access.redhat.com/security/cve/CVE-2024-3094
Public on 29 de marzo de 2024
Critical Impact
CVSS Score 10.0
Description
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
https://access.redhat.com/security/cve/CVE-2024-3094
Splunk Authentication Token Exposure in Debug Log in Splunk Enterprise
Advisory ID: SVD-2024-0301
CVE ID: CVE-2024-29945
Published: 2024-03-27
Description
In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure could happen when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level. Normally, Splunk Enterprise runs with debug mode and token authentication turned off, as well as the JsonWebToken process configured at the INFO logging level.
https://advisory.splunk.com/advisories/SVD-2024-0301
Advisory ID: SVD-2024-0301
CVE ID: CVE-2024-29945
Published: 2024-03-27
Description
In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure could happen when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level. Normally, Splunk Enterprise runs with debug mode and token authentication turned off, as well as the JsonWebToken process configured at the INFO logging level.
https://advisory.splunk.com/advisories/SVD-2024-0301
Splunk Vulnerability Disclosure
Splunk Authentication Token Exposure in Debug Log in Splunk Enterprise
In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure could happen when either Splunk Enterprise runs in debug mode or the `JsonWebToken` component…
VMSA-2024-0008
CVSSv3 Range: 7.4-4.8
Issue Date: 2024-04-02
CVE(s): CVE-2024-22246, CVE-2024-22247, CVE-2024-22248
Synopsis:
VMware SD-WAN Edge and SD-WAN Orchestrator updates address multiple security vulnerabilities.
Impacted Products
VMware SD-WAN Edge
VMware SD-WAN Orchestrator
2. Introduction
Multiple vulnerabilities in VMware SD-WAN were privately reported to VMware. Patches and instructions are available to remediate the vulnerabilities in affected VMware products.
https://www.vmware.com/security/advisories/VMSA-2024-0008.html
CVSSv3 Range: 7.4-4.8
Issue Date: 2024-04-02
CVE(s): CVE-2024-22246, CVE-2024-22247, CVE-2024-22248
Synopsis:
VMware SD-WAN Edge and SD-WAN Orchestrator updates address multiple security vulnerabilities.
Impacted Products
VMware SD-WAN Edge
VMware SD-WAN Orchestrator
2. Introduction
Multiple vulnerabilities in VMware SD-WAN were privately reported to VMware. Patches and instructions are available to remediate the vulnerabilities in affected VMware products.
https://www.vmware.com/security/advisories/VMSA-2024-0008.html
VMware
VMSA-2024-0008