Mandiant has found a new vulnerability in Azure Kubernetes Services (AKS) called “WireServing.” This flaw could have let attackers increase their privileges in a compromised cluster and access sensitive credentials without authorization. Kubernetes is a complex platform known for security challenges. A vulnerability in AKS clusters using “Azure CNI” and …
Read More »CISA adds SolarWinds flow to its KEV catalog
The US Cybersecurity and Infrastructure Security Agency (CISA) has included a vulnerability in SolarWinds Web Help Desk, known as CVE-2024-28986 (with a CVSS score of 9.8), in its catalog of Known Exploited Vulnerabilities (KEV). This week, SolarWinds fixed a vulnerability in its Web Help Desk solution for customer support. The …
Read More »
CVE-2024-33533 to 33536
Zimbra Users at Risk of XSS and LFI Attacks
Zimbra Collaboration revealed three new security vulnerabilities identified as CVE-2024-33533, CVE-2024-33535, and CVE-2024-33536, affecting versions 9.0 and 10.0, which could put users at risk of cross-site scripting and local file inclusion attacks. Technical Breakdown of the Vulnerabilities: CVE-2024-33533: The Zimbra webmail admin interface has a vulnerability. It doesn’t properly validate …
Read More »Critical Vulnerabilities in IBM QRadar Lets Attackers Trigger ACR
IBM has released a security bulletin about several vulnerabilities in its QRadar Suite Software. The company has fixed these vulnerabilities in the most recent software update. IBM QRadar Suite Software is a cybersecurity platform that combines SIEM, SOAR, network traffic analysis, and vulnerability management. It helps in detecting threats, responding …
Read More »Palo Alto released advisories, urges updates amidst 34 vuls
Palo Alto Networks has warned its users about 34 vulnerabilities in their products and released four security advisories. They haven’t found any attacks yet, but it’s important for users to update their systems quickly. Certain Palo Alto products, specifically PAN-OS and GlobalProtect App, are affected by vulnerabilities. Some of these …
Read More »Fortinet Patches Multiple Vulnerabilities including FortiOS & Other
Fortinet has fixed vulnerabilities in its products FortiOS, FortiProxy, FortiPAM, FortiSwitchManager, FortiManager, and FortiAnalyzer. The vulnerabilities could be used to gain unauthorized access and increase privileges, posing a major threat to affected systems. Vulnerability Details: CVE-2022-45862 The graphical user interface (GUI) of FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager was identified as …
Read More »Microsoft Tuesday fixed 90 flaws, including 10 zero days
Microsoft on Tuesday fixed a total of 90 security flaws, including 10 zero-days, of which six have come under active exploitation in the wild. Of the 90 bugs, seven are rated Critical, 79 are rated Important, and one is rated Moderate in severity. This is also in addition to 36 …
Read More »
(CVE-2024-7569 and CVE-2024-7570)
Ivanti flags Critical Fixes for ITSM Vulnerabilities
Ivanti issued a security advisory about two important vulnerabilities in its Neurons for IT Service Management (ITSM) platform. Customers using the on-premise version should act quickly. The vulnerabilities (CVE-2024-7569 and CVE-2024-7570) affect Ivanti Neurons for ITSM versions 2023.4 and older, putting them at risk of unauthorized data access and system …
Read More »Microsoft discloses an unpatched Office zero-day
A high-severity zero-day vulnerability has been found affecting Office 2016 and later. Microsoft is currently working on a patch to fix this issue. The vulnerability, known as CVE-2024-38200, could let unauthorized people access protected data like system status, configuration data, personal information, or connection metadata. This zero-day affects different 32-bit …
Read More »0.0.0.0 Day: Exploiting Localhost APIs From the Browser
A recent study found a vulnerability in major internet browsers that has existed for 18 years. This vulnerability makes private and corporate networks open to cyberattacks. Researchers from Oligo Security discovered that hackers can take advantage of how browsers handle requests to the IP address 0.0.0.0 by redirecting them to …
Read More »