End-of-Day report
Timeframe: Mittwoch 20-11-2024 18:00 - Donnerstag 21-11-2024 18:00
Handler: Alexander Riepl
Co-Handler: n/a
News
Fortinet VPN design flaw hides successful brute-force attacks
A design flaw in the Fortinet VPN servers logging mechanism can be leveraged to conceal the successful verification of credentials during a brute-force attack without tipping off defenders of compromised logins.
https://www.bleepingcomputer.com/news/security/fortinet-vpn-design-flaw-hides-successful-brute-force-attacks/
Wegen Sicherheitslücke: D-Link drängt auf Entsorgung älterer Router
Mehrere D-Link-Router, von denen einige erst vor wenigen Monaten den EOL-Status erreicht haben, sind angreifbar. Patches gibt es nicht.
https://www.golem.de/news/wegen-sicherheitsluecke-d-link-draengt-auf-entsorgung-aelterer-router-2411-191007.html
Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation
Authored by: M. Authored by: M, Mohanasundaram and Neil Tyagi In today-s rapidly evolving cyber landscape, malware threats ..
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation/
Azure Key Vault Tradecraft with BARK
This post details the existing and new functions in BARK that support adversarial tradecraft research relevant to the Azure Key Vault service. The latter part of the post shows an example of how a red team operator may use these commands during the course of an assessment.
https://posts.specterops.io/azure-key-vault-tradecraft-with-bark-24163abc8de3
-Free Hugs- - What to be Wary of in Hugging Face - Part 2
Enjoy Threat Modeling? Try Threats in Models! Previously- In part 1 of this 4-part blog, we discussed Hugging Face, the potentially dangerous trust relationship between Hugging Face users and the ReadMe file, exploiting users who ..
https://checkmarx.com/blog/free-hugs-what-to-be-wary-of-in-hugging-face-part-2/
New Report Reveals Hidden Risks: How Internet-Exposed Systems Threaten Critical Infrastructure
A new Censys report found 145,000 exposed ICSs and thousands of insecure human-machine interfaces (HMIs), providing attackers with an accessible path to disrupt critical operations. Real-world examples underscore the danger, with Iranian and Russian-backed hackers exploiting HMIs to manipulate water systems in Pennsylvania and Texas. GreyNoise research ..
https://www.greynoise.io/blog/new-report-reveals-hidden-risks-how-internet-exposed-systems-threaten-critical-infrastructure
Finding Bugs in Chrome with CodeQL
This blog post discusses how to use a static analysis tool called CodeQL to search for vulnerabilities in Chrome.
https://bughunters.google.com/blog/5085111480877056/finding-bugs-in-chrome-with-codeql
Spelunking in Comments and Documentation for Security Footguns
Join us as we explore seemingly safe but deceptively tricky ground in Elixir, Python, and the Golang standard library. We cover officially documented, or at least previously discussed, code functionality that could unexpectedly introduce vulnerabilities. Well-documented behavior is not always what it appears!
https://blog.includesecurity.com/2024/11/spelunking-in-comments-and-documentation-for-security-footguns/
Azure Detection Engineering: Log idiosyncrasies you should know about
We share a few inconsistencies found in Azure logs which make detection engineering more challenging.
https://tracebit.com/blog/azure-detection-engineering-log-idiosyncrasies-you-should-know-about
Vulnerabilities
Security updates for Thursday
Security updates have been issued by AlmaLinux (kernel, NetworkManager-libreswan, and openssl), Fedora (chromium and llvm-test-suite), Mageia (thunderbird), and Ubuntu (linux-aws-6.8, linux-azure, linux-azure-6.8, linux-oracle-6.8,, linux-azure, and ruby2.7).
https://lwn.net/Articles/998949/
Progress Kemp LoadMaster OS Command Injection Vulnerability
FortiGuard network sensors detect attack attempts targeting the Progress Kemp LoadMaster. Successful exploitation of the CVE-2024-1212 vulnerability allows unauthenticated remote attackers to access the system through the management interface, potentially leading to data breaches, service disruptions, or further attacks
https://fortiguard.fortinet.com/outbreak-alert/kemp-loadmaster-os-command-injection
ZDI-24-1532: 7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-24-1532/
Drupal core - Moderately critical - Gadget chain - SA-CORE-2024-008
https://www.drupal.org/sa-core-2024-008
Drupal core - Moderately critical - Gadget chain - SA-CORE-2024-007
https://www.drupal.org/sa-core-2024-007
Drupal core - Critical - Cross Site Scripting - SA-CORE-2024-005
https://www.drupal.org/sa-core-2024-005
Drupal core - Moderately critical - Access bypass - SA-CORE-2024-004
https://www.drupal.org/sa-core-2024-004
Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2024-003
https://www.drupal.org/sa-core-2024-003
Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2024-003
https://www.drupal.org/sa-core-2024-003