Snapshot
Sept. 21, 2024 - Sept. 27, 2024
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2024-7593 | Ivanti Virtual Traffic Manager contains an authentication bypass vulnerability that allows a remote, unauthenticated attacker to create a chosen administrator account. | CRITICAL | Ivanti | Sept. 24, 2024 |
Newswires |
||||
Storm-0501 Ransomware Threat Actor Expands Attacks to Hybrid Cloud Environments
Storm-0501, a ransomware threat actor, has changed its attack tactics and is now targeting hybrid cloud environments, according to Microsoft. |
Sept. 27, 2024 |
|||
Critical Unpatched Vulnerabilities in CUPS Open-Source Printing System Risk Linux Systems
Prominent cybersecurity researcher Simone Margaritelli, known as @evilsocket, has revealed technical specifics of a yet-to-be-patched vulnerability affecting Linux systems. |
Sept. 27, 2024 |
|||
HPE Aruba Addresses Severe Vulnerabilities in Access Points
HPE Aruba Networking, a subsidiary of Hewlett Packard Enterprise (HPE), has patched three severe vulnerabilities in the Command Line Interface (CLI) service of its Aruba Access Points. |
Sept. 26, 2024 |
|||
'SloppyLemming' APT Targets Government and Law Enforcement Agencies via Cloudflare
The Advanced Persistent Threat (APT) group 'SloppyLemming' is exploiting Cloudflare Worker cloud services and other tools to conduct espionage against government and law enforcement targets in and around the Indian subcontinent. |
Sept. 26, 2024 |
|||
Critical Ivanti vTM Authentication Bypass Vulnerability Now Actively Exploited
A critical security vulnerability in Ivanti's Virtual Traffic Manager (vTM) software, tracked as CVE-2024-7593, is currently being exploited by threat actors. |
Sept. 24, 2024 |
|||
Twelve Hacktivist Group Resurfaces, Targets Russian Entities
The hacktivist group Twelve, known for its activities since April 2023, has resurfaced, primarily targeting Russian entities. |
Sept. 23, 2024 |
|||
China's 'Earth Baxia' Cyber Espionage Group Targets APAC via GeoServer Exploitation
A cyber-espionage group linked to China, dubbed 'Earth Baxia', has been attacking government agencies in Taiwan, the Philippine and Japanese military, and energy companies in Vietnam. |
Sept. 23, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-45066 (4) | A specially crafted POST request to the ProGauge MAGLINK LX CONSOLE IP sub-menu can allow a remote attacker to inject arbitr... | CRITICAL | Risk Context N/A | |
CVE-2024-43693 (4) | A specially crafted POST request to the ProGauge MAGLINK LX CONSOLE UTILITY sub-menu can allow a remote attacker to inject a... | CRITICAL | Risk Context N/A | |
CVE-2024-7593 (7) | Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote un... | CRITICAL | Ivanti |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-43423 (4) | The web application for ProGauge MAGLINK LX4 CONSOLE contains an administrative-level user account with a password that cann... | CRITICAL | Risk Context N/A | |
CVE-2024-42507 (4) | Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sendin... | CRITICAL |
Remote Code Execution |
|
CVE-2024-42506 (4) | Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sendin... | CRITICAL |
Remote Code Execution |
|
CVE-2024-42505 (4) | Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sendin... | CRITICAL |
Remote Code Execution |
|
CVE-2024-0132 (3) | NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use vulnerability when used with default configu... | CRITICAL |
Remote Code Execution |
|
CVE-2024-47076 (4) | CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `... | HIGH |
Remote Code Execution |
|
CVE-2024-47176 (5) | CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including,... | HIGH |
Remote Code Execution Public Exploits Available |
CISA Known Exploited Vulnerabilities
CISA added one vulnerability to the known exploited vulnerabilities list.
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-45066 |
CRITICAL CVSS 10.00 EPSS Score 0.04 EPSS Percentile 9.60 |
Risk Context N/A |
Published: Sept. 25, 2024 |
A specially crafted POST request to the ProGauge MAGLINK LX CONSOLE IP sub-menu can allow a remote attacker to inject arbitrary commands. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-43693 |
CRITICAL CVSS 10.00 EPSS Score 0.04 EPSS Percentile 9.60 |
Risk Context N/A |
Published: Sept. 25, 2024 |
A specially crafted POST request to the ProGauge MAGLINK LX CONSOLE UTILITY sub-menu can allow a remote attacker to inject arbitrary commands. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-7593 |
CRITICAL CVSS 9.80 EPSS Score 97.33 EPSS Percentile 99.91 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Aug. 13, 2024 |
Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel. |
Vendor Impacted: Ivanti |
Products Impacted: Virtual Traffic Management, Virtual Traffic Manager |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-43423 |
CRITICAL CVSS 9.80 EPSS Score 0.04 EPSS Percentile 9.60 |
Risk Context N/A |
Published: Sept. 25, 2024 |
The web application for ProGauge MAGLINK LX4 CONSOLE contains an administrative-level user account with a password that cannot be changed. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-42507 |
CRITICAL CVSS 9.80 EPSS Score 0.04 EPSS Percentile 9.60 |
Remote Code Execution |
Published: Sept. 25, 2024 |
Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-42506 |
CRITICAL CVSS 9.80 EPSS Score 0.04 EPSS Percentile 9.60 |
Remote Code Execution |
Published: Sept. 25, 2024 |
Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-42505 |
CRITICAL CVSS 9.80 EPSS Score 0.04 EPSS Percentile 9.60 |
Remote Code Execution |
Published: Sept. 25, 2024 |
Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-0132 |
CRITICAL CVSS 9.00 EPSS Score 0.04 EPSS Percentile 9.60 |
Remote Code Execution |
Published: Sept. 26, 2024 |
NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-47076 |
HIGH CVSS 8.60 EPSS Score 0.04 EPSS Percentile 10.91 |
Remote Code Execution |
Published: Sept. 26, 2024 |
CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-47176 |
HIGH CVSS 8.30 EPSS Score 0.04 EPSS Percentile 14.88 |
Remote Code Execution Public Exploits Available |
Published: Sept. 26, 2024 |
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. Due to the service binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.