Snapshot
June 29, 2024 - July 5, 2024
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2024-20399 | Cisco NX-OS contains a command injection vulnerability in the command line interface (CLI) that could allow an authenticated, local attacker to execute commands as root on the underlying operating system of an affected device. | MEDIUM | Cisco | July 2, 2024 |
Newswires |
||||
Cisco Patches NX-OS Zero-Day Exploited by Chinese Threat Actor Velvet Ant
Cisco Systems has rectified a zero-day vulnerability in its NX-OS software that was exploited by threat actors in attacks that took place in April. |
July 1, 2024 |
|||
Unauthenticated OpenSSH RCE Vulnerability 'regreSSHion' Threatens Linux Servers
A new unauthenticated remote code execution (RCE) vulnerability in OpenSSH, known as 'regreSSHion', has been identified, which can provide root privileges on glibc-based Linux systems. |
July 1, 2024 |
|||
Emergency Security Update Released by Juniper Networks for Maximum Severity Authentication Bypass Flaw
Juniper Networks, a major provider of networking solutions, has urgently rolled out an update to remediate a high severity vulnerability that could allow authentication bypass in its Session Smart Router (SSR), Session Smart Conductor, and WAN Assurance Router products. |
June 30, 2024 |
|||
Malicious PowerShell Scripts Posed as Windows Fixes by Fake IT Support Sites
Fake IT support websites are distributing harmful PowerShell scripts disguised as solutions to common Windows errors, such as the 0x80070643 error, to infect devices with malware that steals information. |
June 30, 2024 |
|||
Critical Vulnerability in D-Link DIR-859 WiFi Routers Exploited by Hackers
Hackers have found a way to exploit a critical vulnerability in all D-Link DIR-859 WiFi routers to gather account information, including passwords. |
June 29, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-2973 (5) | An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router or conduct... | CRITICAL |
Actively Exploited Remote Code Execution |
|
CVE-2024-38366 (3) | trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. | CRITICAL |
Remote Code Execution Public Exploits Available |
|
CVE-2023-2071 (4) | Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows u... | CRITICAL | Rockwellautomation |
Remote Code Execution |
CVE-2024-0769 (3) | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. | CRITICAL | Dlink |
Actively Exploited Remote Code Execution |
CVE-2024-38368 (3) | trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. | CRITICAL | Risk Context N/A | |
CVE-2024-38367 (3) | trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. | HIGH | Risk Context N/A | |
CVE-2024-6387 (12) | A security regression was discovered in OpenSSH's server . | HIGH | Redhat, Freebsd, Openbsd, Netbsd, Canonical, Netapp, Debian, Suse, Amazon |
Remote Code Execution Public Exploits Available |
CVE-2006-5051 (9) | Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service , and possibly execu... | HIGH | Debian, Openbsd, Apple | Risk Context N/A |
CVE-2024-20399 (6) | A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands... | MEDIUM | Cisco |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2008-4109 (4) | A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions s... | MEDIUM | Openbsd, Debian | Risk Context N/A |
CISA Known Exploited Vulnerabilities
CISA added one vulnerability to the known exploited vulnerabilities list.
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-2973 |
CRITICAL CVSS 10.00 EPSS Score 0.09 EPSS Percentile 39.30 |
Actively Exploited Remote Code Execution |
Published: June 27, 2024 |
An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router or conductor running with a redundant peer allows a network based attacker to bypass authentication and take full control of the device. Only routers or conductors that are running in high-availability redundant configurations are affected by this vulnerability. No other Juniper Networks products or platforms are affected by this issue. This issue affects: Session Smart Router: * All versions before 5.6.15, * from 6.0 before 6.1.9-lts, * from 6.2 before 6.2.5-sts. Session Smart Conductor: * All versions before 5.6.15, * from 6.0 before 6.1.9-lts, * from 6.2 before 6.2.5-sts. WAN Assurance Router: * 6.0 versions before 6.1.9-lts, * 6.2 versions before 6.2.5-sts. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-38366 |
CRITICAL CVSS 10.00 EPSS Score 0.04 EPSS Percentile 15.82 |
Remote Code Execution Public Exploits Available |
Published: July 1, 2024 |
trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. The part of trunk which verifies whether a user has a real email address on signup used a rfc-822 library which executes a shell command to validate the email domain MX records validity. It works via an DNS MX. This lookup could be manipulated to also execute a command on the trunk server, effectively giving root access to the server and the infrastructure. This issue was patched server-side with commit 001cc3a430e75a16307f5fd6cdff1363ad2f40f3 in September 2023. This RCE triggered a full user-session reset, as an attacker could have used this method to write to any Podspec in trunk. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2023-2071 |
CRITICAL CVSS 9.80 EPSS Score 0.07 EPSS Percentile 32.57 |
Remote Code Execution |
Published: Sept. 12, 2023 |
Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets. The device has the functionality, through a CIP class, to execute exported functions from libraries. There is a routine that restricts it to execute specific functions from two dynamic link library files. By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function. |
Vendor Impacted: Rockwellautomation |
Products Impacted: Factorytalk View, Panelview Plus |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-0769 |
CRITICAL CVSS 9.80 EPSS Score 0.21 EPSS Percentile 59.53 |
Actively Exploited Remote Code Execution |
Published: Jan. 21, 2024 |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. |
Vendor Impacted: Dlink |
Products Impacted: Dir-859 Firmware, Dir-859 |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-38368 |
CRITICAL CVSS 9.30 EPSS Score 0.04 EPSS Percentile 15.77 |
Risk Context N/A |
Published: July 1, 2024 |
trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. A vulnerability affected older pods which migrated from the pre-2014 pull request workflow to trunk. If the pods had never been claimed then it was still possible to do so. It was also possible to have all owners removed from a pod, and that made the pod available for the same claiming system. This was patched server-side in commit 71be5440906b6bdfbc0bcc7f8a9fec33367ea0f4 in September 2023. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-38367 |
HIGH CVSS 8.20 EPSS Score 0.04 EPSS Percentile 15.77 |
Risk Context N/A |
Published: July 1, 2024 |
trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. Prior to commit d4fa66f49cedab449af9a56a21ab40697b9f7b97, the trunk sessions verification step could be manipulated for owner session hijacking Compromising a victim’s session will result in a full takeover of the CocoaPods trunk account. The threat actor could manipulate their pod specifications, disrupt the distribution of legitimate libraries, or cause widespread disruption within the CocoaPods ecosystem. This was patched server-side with commit d4fa66f49cedab449af9a56a21ab40697b9f7b97 in October 2023. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-6387 |
HIGH CVSS 8.10 EPSS Score 4.85 EPSS Percentile 92.81 |
Remote Code Execution Public Exploits Available |
Published: July 1, 2024 |
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. |
Vendors Impacted: Redhat, Freebsd, Openbsd, Netbsd, Canonical, Netapp, Debian, Suse, Amazon |
Products Impacted: Enterprise Linux Server Aus, Enterprise Linux For Arm 64 Eus, Enterprise Linux Eus, Linux 2023, Freebsd, Linux Enterprise Micro, Ontap Tools, Enterprise Linux For Ibm Z Systems Eus, Debian Linux, Openshift Container Platform, Ubuntu Linux, Enterprise Linux For Arm 64, Netbsd, Enterprise Linux, Enterprise Linux For Power Little Endian, Enterprise Linux For Ibm Z Systems, Ontap Select Deploy Administration Utility, Enterprise Linux For Power Little Endian Eus, E-Series Santricity Os Controller, Openssh |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2006-5051 |
HIGH CVSS 8.10 EPSS Score 79.14 EPSS Percentile 98.30 |
Risk Context N/A |
Published: Sept. 27, 2006 |
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free. |
Vendors Impacted: Debian, Openbsd, Apple |
Products Impacted: Mac Os X Server, Debian Linux, Openssh, Mac Os X |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-20399 |
MEDIUM CVSS 6.70 EPSS Score 0.25 EPSS Percentile 65.55 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: July 1, 2024 |
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root. Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. |
Vendor Impacted: Cisco |
Products Impacted: Nexus 3172tq, Nexus 9200yc, Nexus 9800, Nexus 92300yc, Nexus 3100v, Nexus 7000 18-Slot, Nexus 9516, Nexus 93128, Nexus 5010, Nexus 7000 4-Slot, Nexus 93180yc-Fx-24, Nx-Os, Nexus 7000, Nexus 9316d-Gx, Nexus 3200, Nexus 3232, Nexus 7009, Nexus 9372tx, Nexus 9500 Supervisor A, Mds 9134, Nexus 9804, Nexus 9332pq, Nexus 9364c-Gx, Nexus 3064t, Nexus 9716d-Gx, Nexus 9000 In Standalone, Nexus 93240yc-Fx2, Nexus 3400, Nexus 92348gc-X, Nexus 7000 Supervisor 2, Nexus 9000, Nexus 3464c, Nexus 3408-S, Nexus 5672up, Nexus 31108tc-V, Nexus 92160yc-X, Nexus 93180yc-Fx3, Mds 9216, Nexus 3548-X\/xl, Nexus 9536pq, Mds 9396t, Nexus 3132c-Z, Nexus 3600, Nexus 9272q, Nexus 9500 16-Slot, Nexus 9332d-H2r, Nexus 9000 In Aci Mode, Nexus 93108tc-Fx3p, Nexus 7710, Nexus 9336c-Fx2-E, Nexus 9808, Nexus 5648q, Nexus 31108pv-V, Nexus 93108tc-Fx-24, Mds 9216a, Nexus 9504, Nexus 93180tc-Ex, Nexus 9336pq Aci Spine, Nexus 9200, Nexus 93180yc-Ex, Nexus 9396tx, Mds 9148t, Nexus 3132q-X, Nexus 93180yc-Ex-24, Nexus 9372tx-E, Nexus 5548p, Nexus... |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2008-4109 |
MEDIUM CVSS 5.00 EPSS Score 7.61 EPSS Percentile 94.19 |
Risk Context N/A |
Published: Sept. 18, 2008 |
A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051. |
Vendors Impacted: Openbsd, Debian |
Products Impacted: Linux, Openssh |
Quotes
|
Headlines |
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.