Snapshot
April 6, 2024 - April 12, 2024
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2024-3400 | Palo Alto Networks PAN-OS GlobalProtect feature contains a command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall. | CRITICAL | Palo Alto Networks | April 12, 2024 |
CVE-2024-3272 | D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contains a hard-coded credential that allows an attacker to conduct authenticated command injection, leading to remote, unauthorized code execution. | CRITICAL | D-Link | April 11, 2024 |
CVE-2024-3273 | D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contain a command injection vulnerability. When combined with CVE-2024-3272, this can lead to remote, unauthorized code execution. | HIGH | D-Link | April 11, 2024 |
Newswires |
||||
Palo Alto Networks Alert: Active Exploitation of Zero-Day Vulnerability in PAN-OS Firewall
Palo Alto Networks has issued an alert about an unpatched severe command injection vulnerability in its PAN-OS firewall software that is currently being exploited in attacks. |
April 12, 2024 |
|||
CISA Adds D-Link NAS Devices Bugs to Known Exploited Vulnerabilities Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added several flaws found in D-Link multiple NAS devices to its Known Exploited Vulnerabilities (KEV) catalog. |
April 11, 2024 |
|||
Critical Remote Code Execution Vulnerability in FortiClientLinux Patched by Fortinet
Fortinet, a leading cybersecurity solutions provider, has recently patched a series of vulnerabilities in its multiple products. |
April 10, 2024 |
|||
Microsoft Addresses Two Exploited Zero-Days in April 2024 Patch Tuesday
Microsoft has remedied two zero-day vulnerabilities that were being actively leveraged in malware attacks. |
April 9, 2024 |
|||
Microsoft's Record-Breaking Patch Tuesday: 147 New CVEs, No Zero-Days, but an Active Exploit
Microsoft's April Patch Tuesday update was a record-breaker, with the tech giant addressing 147 new Common Vulnerabilities and Exposures (CVEs). |
April 9, 2024 |
|||
Over 92,000 D-Link NAS Devices Vulnerable to Backdoor Exploitation
A security researcher known as 'Netsecfish' has revealed a new security vulnerability in multiple discontinued models of D-Link Network Attached Storage (NAS) devices. |
April 6, 2024 |
|||
Cisco Issues Warning About XSS Vulnerability in End-of-Life Small Business Routers
Cisco has issued a warning about a medium severity Cross-Site scripting (XSS) flaw that affects its Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 routers. |
April 6, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-3400 (9) | A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS vers... | CRITICAL | Palo Alto Networks |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-24576 (7) | Rust is a programming language. | CRITICAL |
Remote Code Execution Public Exploits Available |
|
CVE-2024-29988 (13) | SmartScreen Prompt Security Feature Bypass Vulnerability | HIGH |
Actively Exploited Remote Code Execution Public Exploits Available |
|
CVE-2024-29053 (5) | Microsoft Defender for IoT Remote Code Execution Vulnerability | HIGH |
Remote Code Execution |
|
CVE-2024-21323 (5) | Microsoft Defender for IoT Remote Code Execution Vulnerability | HIGH |
Remote Code Execution |
|
CVE-2024-21412 (6) | Internet Shortcut Files Security Feature Bypass Vulnerability | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-3273 (9) | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS... | HIGH | D-Link |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-21322 (5) | Microsoft Defender for IoT Remote Code Execution Vulnerability | HIGH |
Remote Code Execution |
|
CVE-2024-26234 (11) | Proxy Driver Spoofing Vulnerability | MEDIUM |
Actively Exploited Remote Code Execution |
CISA Known Exploited Vulnerabilities
CISA added three vulnerabilities to the known exploited vulnerabilities list.
D-Link — Multiple NAS Devices |
CVE-2024-3272 / Added: April 11, 2024 |
CRITICAL CVSS 9.80 EPSS Score 0.18 EPSS Percentile 54.28 |
D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contains a hard-coded credential that allows an attacker to conduct authenticated command injection, leading to remote, unauthorized code execution. |
Headlines |
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-3400 |
CRITICAL CVSS 10.00 EPSS Score 0.37 EPSS Percentile 72.34 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: April 12, 2024 |
A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. |
Vendor Impacted: Palo Alto Networks |
Product Impacted: Pan-Os |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-24576 |
CRITICAL CVSS 10.00 EPSS Score 0.04 EPSS Percentile 12.05 |
Remote Code Execution Public Exploits Available |
Published: April 9, 2024 |
Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected.
The `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument.
On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted.
One exception though is `cmd.exe` (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution.
Due to the complexity of `cmd.exe`, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API gua...
|
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-29988 |
HIGH CVSS 8.80 EPSS Score 0.07 EPSS Percentile 27.52 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: April 9, 2024 |
SmartScreen Prompt Security Feature Bypass Vulnerability |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-29053 |
HIGH CVSS 8.80 EPSS Score 0.04 EPSS Percentile 8.02 |
Remote Code Execution |
Published: April 9, 2024 |
Microsoft Defender for IoT Remote Code Execution Vulnerability |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21323 |
HIGH CVSS 8.80 EPSS Score 0.04 EPSS Percentile 8.02 |
Remote Code Execution |
Published: April 9, 2024 |
Microsoft Defender for IoT Remote Code Execution Vulnerability |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21412 |
HIGH CVSS 8.10 EPSS Score 0.36 EPSS Percentile 72.00 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Feb. 13, 2024 |
Internet Shortcut Files Security Feature Bypass Vulnerability |
Vendor Impacted: Microsoft |
Products Impacted: Windows Server 2022, Windows Server 2019, Windows 11 22h2, Windows, Windows Server 2022 23h2, Windows 11 21h2, Windows 10 22h2, Windows 10 1809, Windows 10 21h2, Windows 11 23h2 |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-3273 |
HIGH CVSS 7.30 EPSS Score 0.47 EPSS Percentile 75.28 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: April 4, 2024 |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. |
Vendor Impacted: D-Link |
Product Impacted: Multiple Nas Devices |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21322 |
HIGH CVSS 7.20 EPSS Score 0.04 EPSS Percentile 8.02 |
Remote Code Execution |
Published: April 9, 2024 |
Microsoft Defender for IoT Remote Code Execution Vulnerability |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-26234 |
MEDIUM CVSS 6.70 EPSS Score 0.04 EPSS Percentile 8.02 |
Actively Exploited Remote Code Execution |
Published: April 9, 2024 |
Proxy Driver Spoofing Vulnerability |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.