Snapshot
April 22, 2023 - April 28, 2023
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
No issues added to the CISA Known Exploited Vulnerability list. | ||||
Newswires |
||||
FDA and CISA Alert: Illumina Medical Devices at Risk of Remote Hacking
The US government, through the Food and Drug Administration (FDA) and the Cybersecurity and Infrastructure Security Agency (CISA), has issued public notifications to healthcare providers and lab personnel regarding serious vulnerabilities in a component used by several Illumina medical devices that could enable remote hacking. |
April 28, 2023 |
|||
Critical Vulnerability in Zyxel Firewalls Allows Remote Command Execution
Taiwanese network equipment manufacturer Zyxel has released patches for a critical-severity vulnerability affecting its ATP, USG FLEX, VPN, and ZyWALL/USG firewalls. |
April 28, 2023 |
|||
Clop and LockBit Ransomware Gangs Target PaperCut Servers
Microsoft has recently revealed that the Clop and LockBit ransomware gangs are responsible for the attacks on PaperCut servers, exploiting vulnerabilities to steal corporate data. |
April 26, 2023 |
|||
FIN7 Hackers Exploit Veeam Backup & Replication Vulnerability
Russian cybercrime group FIN7, also known as Anunak and Carbanak, has been spotted exploiting a Veeam Backup & Replication vulnerability that was patched in March 2023. |
April 26, 2023 |
|||
Exposed Apache Superset Installs Vulnerable to RCE Attacks
Apache Superset, an open-source data visualization and data exploration platform, has over 3000 instances exposed to the internet, leaving them vulnerable to remote code execution (RCE) attacks. |
April 26, 2023 |
|||
New SLP Bug Enables Massive 2,200x DDoS Amplification Attacks
A new vulnerability in the Service Location Protocol (SLP) allows threat actors to launch massive denial-of-service attacks with an amplification factor of 2,200 times. |
April 25, 2023 |
|||
PaperCut Flaw Exploited to Hijack Servers: Patch Urged
Attackers are exploiting two severe vulnerabilities (CVE-2023-27350 and CVE-2023-27351) in the widely-used PaperCut MF/NG print management software to install Atera remote management software and take over servers. |
April 24, 2023 |
|||
Critical Vulnerability in Inea ICS Product Exposes Industrial Firms to Remote Attacks
A critical vulnerability has been discovered in a remote terminal unit (RTU) produced by Slovenia-based industrial automation company Inea, potentially exposing industrial organizations to remote hacker attacks. |
April 24, 2023 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2023-27350 (19) | This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 . | CRITICAL | Papercut |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CVE-2023-27524 (5) | Session Validation attacks in Apache Superset versions up to and including 2.0.1. | HIGH |
Remote Code Execution Public Exploits Available |
|
CVE-2023-1389 (4) | TP-Link Archer AX21 firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country... | HIGH | Tp-Link |
Actively Exploited Remote Code Execution |
CVE-2023-27351 (14) | This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 . | HIGH | Risk Context N/A | |
CVE-2023-27532 (3) | Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be... | HIGH | Veeam |
Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2023-29552 (9) | The Service Location Protocol allows an unauthenticated, remote attacker to register arbitrary services. | N/A |
Actively Exploited Remote Code Execution |
|
CVE-2023-20870 (7) | VMware Workstation and Fusion contain an out-of-bounds read vulnerability that exists in the functionality for sharing host B... | N/A | Risk Context N/A | |
CVE-2023-20869 (7) | VMware Workstation and VMware Fusion contain a stack-based buffer-overflow vulnerability that exists in the functionality f... | N/A | Risk Context N/A | |
CVE-2023-20872 (6) | VMware Workstation and Fusion contain an out-of-bounds read/write vulnerability in SCSI CD/DVD device emulation. | N/A | Risk Context N/A | |
CVE-2023-20871 (6) | VMware Fusion contains a local privilege escalation vulnerability. | N/A | Risk Context N/A |
CISA Known Exploited Vulnerabilities
CISA added 0 vulnerabilities to the known exploited vulnerabilities list.
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2023-27350 |
CRITICAL CVSS 9.80 |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: April 20, 2023 |
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987. |
Vendor Impacted: Papercut |
Product Impacted: Mf/ng |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-27524 |
HIGH CVSS 8.90 |
Remote Code Execution Public Exploits Available |
Published: April 24, 2023 |
Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-1389 |
HIGH CVSS 8.80 |
Actively Exploited Remote Code Execution |
Published: March 15, 2023 |
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request. |
Vendor Impacted: Tp-Link |
Products Impacted: Archer Ax21, Archer Ax21 Firmware |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-27351 |
HIGH CVSS 8.20 |
Risk Context N/A |
Published: April 20, 2023 |
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SecurityRequestFilter class. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19226. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-27532 |
HIGH CVSS 7.50 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: March 10, 2023 |
Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts. |
Vendor Impacted: Veeam |
Product Impacted: Backup \& Replication |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2023-29552 |
CVSS Not Assigned |
Actively Exploited Remote Code Execution |
Published: April 25, 2023 |
The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-20870 |
CVSS Not Assigned |
Risk Context N/A |
Published: April 25, 2023 |
VMware Workstation and Fusion contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-20869 |
CVSS Not Assigned |
Risk Context N/A |
Published: April 25, 2023 |
VMware Workstation (17.x) and VMware Fusion (13.x) contain a stack-based buffer-overflow vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-20872 |
CVSS Not Assigned |
Risk Context N/A |
Published: April 25, 2023 |
VMware Workstation and Fusion contain an out-of-bounds read/write vulnerability in SCSI CD/DVD device emulation. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-20871 |
CVSS Not Assigned |
Risk Context N/A |
Published: April 25, 2023 |
VMware Fusion contains a local privilege escalation vulnerability. A malicious actor with read/write access to the host operating system can elevate privileges to gain root access to the host operating system. |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.