home.social

#eitw — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #eitw, aggregated by home.social.

  1. @campuscodi Kudos to @h4sh for assigning the CVE to the actively exploited CrushFTP zero-day: infosec.exchange/@h4sh/1123165

    According to his analysis and patch diffing, the CVSSv3 score for CVE-2024-4040 is 7.7 HIGH: Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

    Did some patch diffing on the new #crushFTP bug, and it does look like the bug has 2 components and at least one of them need some form of authentication to exploit (need creation of something).
    After the first stage, the reading of the file outside of VFS sandbox might not need authentication. I am not sure.

    #CrushFTP #zeroday #vulnerability #CVE_2024_4040 #eitw #activeexploitation

  2. Shoutout to @h4sh for getting a CVE ID assigned to this actively exploited zero-day CrushFTP vulnerability: CVE-2024-4040 (reported by Simon Garrelou, of Airbus CERT). cve.org/CVERecord?id=CVE-2024-

    VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.

    #zeroday #eitw #activeexploitation #CrushFTP #vulnerability #CVE_2024_4040

  3. Microsoft reported that APT28 (Fancy Bear, Forest Blizzard) used a custom tool to elevate privileges and steal credentials in compromised networks. This GooseEgg tool leveraged CVE-2022-38028 (7.8 high, disclosed 11 October 2022 by Microsoft; Windows Print Spooler Elevation of Privilege Vulnerability) as a zero-day since at least June 2020 (possibly as early as April 2019) which was 2 years 4 months. APT28 is publicly attributed to Russian General Staff Main Intelligence Directorate (GRU). IOC provided. 🔗 microsoft.com/en-us/security/b

    cc: @serghei @campuscodi @briankrebs @jwarminsky

    #APT28 #cyberespionage #Russia #FancyBear #ForestBlizzard #CVE_2022_38028 #eitw #activeexploitation #GooseEgg

  4. Palo Alto Networks released additional details about CVE-2024-3400: the fact that it is a combination of two bugs in PAN-OS; how an attacker was exploiting it; how disabling telemetry initially worked; and how they fixed it. The timeline from discovery to remediation encompasses the whole blog post. Overall a comprehensive after-action review from a company that notified the public almost immediately of an exploited zero-day. 🔗paloaltonetworks.com/blog/2024

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #PANOS #IOC

  5. Bleeping Computer: GreyNoise and ShadowServer Foundation are reporting active exploitation of CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog, has Proof of Concept). The good news is that all hotfixes for vulnerable versions of PAN-OS are now released. 🔗 bleepingcomputer.com/news/secu

    #CVE_2024_3400 #PaloAltoNetworks #activeexploitation #eitw #kev

  6. Zscaler observed exploitation of the Palo Alto Networks PAN-OS command injection zero-day vulnerability CVE-2024-3400 following the release of the PoC exploit code. Zscaler provides an attack flow diagram, and a technical analysis of the Upstyle backdoor and its layers. IOC provided. 🔗 zscaler.com/blogs/security-res

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #threatintel #IOC

  7. Microsoft reports that financially motivated attackers are exploiting several OpenMetadata vulnerabilities to gain access to Kubernetes workloads for cryptomining activity. CVE-2024-28255, CVE-2024-28847, CVE-2024-28253, CVE-2024-28848, CVE-2024-28254 could be exploited by attackers to bypass authentication and achieve remote code execution. "Since the beginning of April, we have observed exploitation of this vulnerability in Kubernetes environments." Microsoft describes the attack flow and provides IOC 🔗 microsoft.com/en-us/security/b

    #threatintel #eitw #OpenMetadata #activeexploitation #CVE_2024_28255 #CVE_2024_28847 #CVE_2024_28253 #CVE_2024_28848 #CVE_2024_28254 #IOC

  8. TrustedSec CTO Justin Elze shared CVE-2024-3400 exploit in the wild on Twitter yesterday, reports that 149.28.194.95 was attempting to exploit CVE-2024-3400

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #threatintel #IOC

  9. In case you missed it, Palo Alto Networks updated their security advisory in terms of product and mitigation guidance, exploit status, and PAN-OS fix availability: 🔗 security.paloaltonetworks.com/

    • Exploitation status: Proof of concepts for this vulnerability have been publicly disclosed by third parties.
    • Workarounds and mitigations: In earlier versions of this advisory, disabling device telemetry was listed as a secondary mitigation action. Disabling device telemetry is no longer an effective mitigation. Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.
    • Solution:
      • - 10.2.6-h3 (Released 4/16/24)
      • - 11.0.3-h10 (Released 4/16/24)
      • - 11.0.2-h4 (Released 4/16/24)
      • - 11.1.0-h3 (Released 4/16/24)

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept

  10. Fortinet warns that multiple botnets continue exploiting CVE-2023-1389 (8.8 high, disclosed 15 March 2023, added to CISA's KEV Catalog 01 May 2023) TP-Link command injection for wide-scale spread. Botnets include Moobot, Miroi, the Golang-based agent “AGoent,” and the Gafgyt Variant. The blog post explores their infection traffic patterns and offer insights into these botnets. 🔗 fortinet.com/blog/threat-resea

    #CVE_2023_1389 #TPLink #eitw #activeexploitation #botnet #moobot #miroi #agoent #mirai #gafgyt #threatintel #IOC

  11. watchTowr may have successfully replicated CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, CWE-77: Command Injection; OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog). Instead of releasing a Proof of Concept, they provided a "detection artefact generator tool" 🔗 labs.watchtowr.com/palo-alto-p

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #threatintel #IOC

  12. @jullrich of SANS ISC warns that the widely shared GitHub exploit is almost certainly fake (cc: @mttaggart ) and two IP addresses were attempting CVE-2024-3400 exploitation: 173.255.223.159 and 146.70.192.174 🔗 isc.sans.edu/diary/rss/30838

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #threatintel #IOC

  13. Happy hotfix day from Palo Alto Networks who released 3 hotfixes for CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 as an exploited zero-day) with 15 more hotfixes expected in the coming days: 🔗 security.paloaltonetworks.com/

    • PAN-OS 10.2:
      • 10.2.9-h1 (Released 14 April)
      • 10.2.8-h3 (Released 15 April)
      • 10.2.7-h8 (Released 15 April)
      • 10.2.6-h3 (Released 16 April)
      • 10.2.5-h6 (Released 16 April)
      • 10.2.3-h13 (Released 18 April)
      • 10.2.1-h2 (Released 18 April)
      • 10.2.2-h5 (Released 18 April)
      • 10.2.0-h3 (Released 18 April)
      • 10.2.4-h16 (Released 18 April)
    • PAN-OS 11.0:
      • 11.0.4-h1 (Released 14 April)
      • 11.0.4-h2 (Released 17 April)
      • 11.0.3-h10 (Released: 16 April)
      • 11.0.2-h4 (Released 16 April)
      • 11.0.1-h4 (Released 18 April)
      • 11.0.0-h3 (Released 18 April)
    • PAN-OS 11.1:
      • 11.1.2-h3 (Released 14 April)
      • 11.1.1-h1 (Released 16 April)
      • 11.1.0-h3 (Released: 16 April)

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #threatintel #IOC

  14. It should come as no surprise that Palo Alto Networks did not release hotfixes* for affected versions of PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11 by the self-imposed deadline of Sunday 14 April 2024 like they estimated in their security advisory. 48 hours to develop/test/release is a tight delivery window with the whole infosec community breathing down their necks.

    EDIT: A hotfix is now available for select affected versions of PAN-OS: security.paloaltonetworks.com/

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #threatintel #IOC

  15. Just to make it easier to read through the various reports (saying almost the same exact thing), I've assembled a Palo Alto Networks zero-day MEGA list:

    UPDATE: Volexity and Unit 42 talk about the threat actor, campaign, and include indicators of compromise:

    Here's the rest of the related reporting:

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #threatintel #IOC

  16. Hot off the press! CISA adds CVE-2024-3400 (10.0 critical, disclosed 12 April 2024, PAN-OS: OS Command Injection Vulnerability in GlobalProtect Gateway) to the Known Exploited Vulnerabilities (KEV) Catalog 🔗 cisa.gov/news-events/alerts/20

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability

  17. @jerry Dunno about any other issue, but the cybersecurity community is finding out about CVE-2024-3400, an actively exploited and unpatched zero-day in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions. security.paloaltonetworks.com/

    #CVE_2024_3400 #zeroday #eitw #activeexploitation

  18. CERT-EU warns of an exploited zero-day for Palo Alto Networks: CVE-2024-3400 (10.0 critical, disclosed 12 April 2024) command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software. Affected versions are PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1. This zero-day is NOT patched yet, and hotfix releases will be made available starting 14 April 2024. 🔗 cert.europa.eu/publications/se and original Palo Alto Networks security advisory: security.paloaltonetworks.com/

    #CVE_2024_3400 #PaloAltoNetworks #eitw #activeexploitation #vulnerability #zeroday

  19. @jgreig of The Record writes that CISA confirmed reports by cybersecurity companies and researchers that some older D-Link devices are being exploited by threat actors, and added CVE-2024-3273 and CVE-2024-3272 to its Known Exploited Vulnerabilities list on Thursday 🔗 therecord.media/dlink-devices-

    #CVE_2024_3272 #CVE_2024_3273 #eitw #activeexploitation #CISA #KEV #KnownExploitedVulnerabilitiesCatalog #DLink

  20. Hot off the press! CISA adds D-Link vulnerabilities CVE-2024-3273 (7.3 high, Command Injection) and CVE-2024-3272 (9.8 critical, Hard-coded Credentials), both disclosed 03 April 2024, to the Known Exploited Vulnerabilities (KEV) Catalog 🔗 cisa.gov/news-events/alerts/20

    #CVE_2024_3272 #CVE_2024_3273 #eitw #activeexploitation #CISA #KEV #KnownExploitedVulnerabilitiesCatalog #DLink

  21. Red Canary reported that in late March 2024, threat actors exploited CVE-2023-48788 (9.8 critical, disclosed 12 March 2024 by Fortinet, Proof of Concept by Horizon3) in FortiClient enterprise management servers (FortiClient EMS) to install unauthorized remote management and monitoring (RMM) tools and PowerShell backdoors. While no IOC are listed, they provide detection methods for post-exploitation activity. 🔗 redcanary.com/blog/cve-2023-48

    #threatintel #CVE_2023_48788 #Fortinet #CISA #KEV #eitw #activeexploitation #KnownExploitedVulnerabilitiesCatalog

  22. @TheDustinChilds of Zero Day Initiative alleges that CVE-2024-29988 (8.8 high) was also exploited in the wild and should be marked an exploited zero-day 🔗 zerodayinitiative.com/blog/202

    This is an odd one, as a ZDI threat researcher found this vulnerability being in the wild, although Microsoft currently doesn’t list this as exploited. I would treat this as in the wild until Microsoft clarifies. The bug itself acts much like CVE-2024-21412 – it bypasses the Mark of the Web (MotW) feature and allows malware to execute on a target system. Threat actors are sending exploits in a zipped file to evade EDR/NDR detection and then using this bug (and others) to bypass MotW.

    cc:@todb

    #zeorday #CVE_2024_29988 #PatchTuesday #Microsoft #vulnerability #eitw #activeexploitation #motw

  23. @jullrich of SANS ISC is on top of the new information from Sophos, and correctly identifies CVE-2024-26234 as an exploited zero-day in the Patch Tuesday summary. 🔗 isc.sans.edu/diary/rss/30822

    #PatchTuesday #CVE_2024_26234 #zeroday #eitw #activeexploitation #vulnerability

  24. Sophos X-Ops reported a backdoored "LaiXi Android Screen Mirroring" installer that they discovered in December 2023 was signed with a valid Microsoft Hardware Publisher Certificate. The campaign (unidentified threat actor) has been in development since at least January 2023. The incident was reported to Microsoft is tracked as CVE-2024-26234, and is the lone exploited zero-day for April 2024's Patch Tuesday! IOC provided. 🔗 news.sophos.com/en-us/2024/04/

    #threatintel #IOC #backdoor #LaiXi #backdoor #CVE_2024_26234 #eitw #activeexploitation

  25. Happy Patch Tuesday from Microsoft: 155 vulnerabilities.
    EDIT: 1 vulnerability was updated to say Exploited and Publicly Disclosed: CVE-2024-26234 (6.7 medium) THIS IS AN EXPLOITED ZERO-DAY! See Sophos article for information on a malicious executable signed by a valid Microsoft Hardware Publisher Certificate: news.sophos.com/en-us/2024/04/

    Updated CVE to correct exploit status. This is an informational update only.

    cc: @campuscodi @briankrebs @todb @serghei

    #PatchTuesday #Microsoft #MSRC #Vulnerability #CVE_2024_26234 #eitw #activeexploitation

  26. Thinking about car theft and vulnerabilities, @todb you know what would freak people out? If CISA added CVE-2023-29389 (6.5 medium, disclosed 05 April 2023) to the Known Exploited Vulnerabilities (KEV) Catalog.

    Toyota RAV4 2021 vehicles automatically trust messages from other ECUs on a CAN bus, which allows physically proximate attackers to drive a vehicle by accessing the control CAN bus after pulling the bumper away and reaching the headlight connector, and then sending forged "Key is validated" messages via CAN Injection, as exploited in the wild in (for example) July 2022.

    #CVE_2023_29389 #KEV #eitw #activeexploitation #Toyota #RAV4

  27. Why you should care about the exploitation of CVE-2024-20720:
    A similar Adobe Commerce and Magento Open Source vulnerability CVE-2022-24086 (9.8 critical, disclosed 13 February 2024 by Adobe as a zero-day; improper input validation) was "exploited in the wild in very limited attacks targeting Adobe Commerce merchants." CVE-2022-24086 was added to CISA's KEV Catalog on 15 February 2024, so there is a strong possibility that they would consider CVE-2024-20720. 🔗 helpx.adobe.com/security/produ

    #CVE_2024_20720 #Adobe #Commerce #Magento #eitw #activeexploitation #threatintel #IOC

  28. Sansec reports active exploitation of CVE-2024-20720 (9.1 critical, disclosed 13 February 2024 by Adobe; Adobe Commerce/Magento Open Source OS command injection) to inject a fake Stripe payment skimmer, which would copy payment data to a compromised Magento store. IOC provided. 🔗 sansec.io/research/magento-xml

    #CVE_2024_20720 #Adobe #Commerce #Magento #eitw #threatintel #activeexploitation #IOC

  29. SonicWall alleges that CVE-2024-1212 (CVSS: 10.0 critical, disclosed 08 February 2024 by Progress) is being exploited in the wild. "SonicWall sensors have confirmed active exploitation of these vulnerabilities." 🔗 blog.sonicwall.com/en-us/2024/

    cc: @buherator @campuscodi

    EDIT: SonicWall took down the blog post as of 1300 US Eastern 28 March 2024.

    #CVE_2024_1212 #eitw #activeexploitation #vulnerability #Kemp #LoadMaster #Progress