Snapshot
Jan. 27, 2024 - Feb. 2, 2024
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2024-21893 | Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure), Ivanti Policy Secure, and Ivanti Neurons contain a server-side request forgery (SSRF) vulnerability in the SAML component that allows an attacker to access certain restricted resources without authentication. | HIGH | Ivanti | Jan. 31, 2024 |
CVE-2022-48618 | Apple iOS, iPadOS, macOS, tvOS, and watchOS contain an improper authentication vulnerability that allows an attacker with read and write capabilities to bypass Pointer Authentication. | HIGH | Apple | Jan. 31, 2024 |
Newswires |
||||
Russian APT28 Hackers Launch NTLM Relay Attacks on High-Value Global Targets
From April 2022 to November 2023, Russian state-sponsored hackers, identified as APT28, have been conducting NTLM v2 hash relay attacks on high-value organizations worldwide. |
Feb. 2, 2024 |
|||
CISA Instructs Federal Agencies to Disconnect Ivanti VPN Instances Amidst Zero-Day Exploits
For the first time in its history, the Cybersecurity and Infrastructure Security Agency (CISA) has mandated federal agencies to disconnect all instances of Ivanti Connect Secure and Ivanti Policy Secure products within a 48-hour window. |
Feb. 1, 2024 |
|||
FritzFrog Botnet Targets Unpatched Internal Hosts via Log4Shell Exploitation
A new variant of the advanced FritzFrog botnet has been exploiting the Log4Shell vulnerability to infiltrate internal network assets that organizations often neglect to patch. |
Feb. 1, 2024 |
|||
Apple Addresses Vision Pro Security Flaw, CISA Highlights iOS Vulnerability Exploitation
Apple has introduced the first security update for its recently launched Vision Pro virtual reality headset. |
Feb. 1, 2024 |
|||
Global Container Escapes Enabled by 'Leaky Vessels' Cloud Bugs
A set of four vulnerabilities in container engine components, known as 'Leaky Vessels,' has been revealed by researchers. |
Jan. 31, 2024 |
|||
Public Release of Exploit for Android Privilege Elevation Flaw Affecting Seven OEMs
A proof-of-concept exploit for a local privilege elevation flaw that affects a minimum of seven Android original equipment manufacturers (OEMs) has been made publicly accessible on GitHub. |
Jan. 31, 2024 |
|||
CISA Issues Warning over Actively Exploited iPhone Kernel Bug
The Cybersecurity and Infrastructure Security Agency (CISA) has warned of an actively exploited kernel security flaw affecting a range of Apple devices. |
Jan. 31, 2024 |
|||
Critical Vulnerability in GNU C Library Could Grant Full Root Access
Qualys researchers have discovered a critical vulnerability in Linux’s GNU C Library (glibc), which could potentially enable attackers to gain full root access to a system. |
Jan. 31, 2024 |
|||
Ivanti Alerts on Two New High-Severity Vulnerabilities, One Currently Under Active Exploitation
Ivanti has alerted its users about two new high-risk vulnerabilities in its Connect Secure and Policy Secure solutions, identified as CVE-2024-21888 and CVE-2024-21893, with CVSS scores of 8.8 and 8.2 respectively. |
Jan. 31, 2024 |
|||
Ivanti's Zero-Day Vulnerabilities Remain Unpatched as 'KrustyLoader' Attacks Increase
Attackers are exploiting two severe zero-day vulnerabilities in Ivanti VPNs to implement a set of Rust-based backdoors, which subsequently download a backdoor malware known as 'KrustyLoader'. |
Jan. 30, 2024 |
|||
Critical Vulnerability Exposes 45k Jenkins Servers to RCE Attacks
Researchers have discovered around 45,000 instances of Jenkins servers that are exposed online, making them susceptible to the critical remote code execution (RCE) flaw, CVE-2023-23897. |
Jan. 29, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-21887 (20) | A command injection vulnerability in web components of Ivanti Connect Secure and Ivanti Policy Secure allows an authentica... | CRITICAL | Ivanti |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CVE-2024-21888 (13) | A privilege escalation vulnerability in web component of Ivanti Connect Secure and Ivanti Policy Secure allows a user to el... | HIGH | Ivanti | Risk Context N/A |
CVE-2024-23222 (7) | A type confusion issue was addressed with improved checks. | HIGH | Apple |
CISA Known Exploited Actively Exploited |
CVE-2024-23898 (5) | Jenkins 2.217 through 2.441 , LTS 2.222.1 through 2.426.2 does not perform origin validation of requests made through the CL... | HIGH | Jenkins | Risk Context N/A |
CVE-2024-23651 (5) | BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. | HIGH |
Remote Code Execution |
|
CVE-2024-21626 (6) | runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. | HIGH |
Remote Code Execution Public Exploits Available |
|
CVE-2023-46805 (19) | An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote ... | HIGH | Ivanti |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CVE-2024-21893 (15) | A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure and Ivanti Policy Secure and Iva... | HIGH | Ivanti |
CISA Known Exploited Remote Code Execution |
CVE-2023-6246 (6) | A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. | HIGH | Fedoraproject, Gnu |
Remote Code Execution |
CVE-2024-23897 (9) | Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' ... | HIGH | Jenkins |
Actively Exploited Remote Code Execution Public Exploits Available |
CISA Known Exploited Vulnerabilities
CISA added two vulnerabilities to the known exploited vulnerabilities list.
Apple — Multiple Products |
CVE-2022-48618 / Added: Jan. 31, 2024 |
HIGH CVSS 7.80 EPSS Score 0.69 EPSS Percentile 78.14 |
Apple iOS, iPadOS, macOS, tvOS, and watchOS contain an improper authentication vulnerability that allows an attacker with read and write capabilities to bypass Pointer Authentication. |
Headlines
|
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-21887 |
CRITICAL CVSS 9.10 EPSS Score 96.42 EPSS Percentile 99.48 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 12, 2024 |
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. |
Vendor Impacted: Ivanti |
Products Impacted: Connect Secure And Policy Secure, Connect Secure, Policy Secure |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21888 |
HIGH CVSS 8.80 |
Risk Context N/A |
Published: Jan. 31, 2024 |
A privilege escalation vulnerability in web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows a user to elevate privileges to that of an administrator. |
Vendor Impacted: Ivanti |
Products Impacted: Connect Secure, Policy Secure |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-23222 |
HIGH CVSS 8.80 EPSS Score 0.18 EPSS Percentile 55.21 |
CISA Known Exploited Actively Exploited |
Published: Jan. 23, 2024 |
A type confusion issue was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. |
Vendor Impacted: Apple |
Products Impacted: Iphone Os, Macos, Multiple Products, Tvos, Safari, Ipados |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-23898 |
HIGH CVSS 8.80 EPSS Score 0.09 EPSS Percentile 38.41 |
Risk Context N/A |
Published: Jan. 24, 2024 |
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller. |
Vendor Impacted: Jenkins |
Product Impacted: Jenkins |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-23651 |
HIGH CVSS 8.70 |
Remote Code Execution |
Published: Jan. 31, 2024 |
BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21626 |
HIGH CVSS 8.60 |
Remote Code Execution Public Exploits Available |
Published: Jan. 31, 2024 |
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-46805 |
HIGH CVSS 8.20 EPSS Score 93.05 EPSS Percentile 98.87 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 12, 2024 |
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. |
Vendor Impacted: Ivanti |
Products Impacted: Connect Secure And Policy Secure, Connect Secure, Policy Secure |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21893 |
HIGH CVSS 8.20 |
CISA Known Exploited Remote Code Execution |
Published: Jan. 31, 2024 |
A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication. |
Vendor Impacted: Ivanti |
Products Impacted: Neurons For Zero-Trust Access, Connect Secure, Policy Secure, And Neurons, Connect Secure, Policy Secure |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-6246 |
HIGH CVSS 7.80 |
Remote Code Execution |
Published: Jan. 31, 2024 |
A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer. |
Vendors Impacted: Fedoraproject, Gnu |
Products Impacted: Fedora, Glibc |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-23897 |
HIGH CVSS 7.50 EPSS Score 11.94 EPSS Percentile 94.86 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 24, 2024 |
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system. |
Vendor Impacted: Jenkins |
Product Impacted: Jenkins |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.