Monday , January 6 2025
CISA

CISA Flags 3 Actively Exploited Vulnerabilities in KEV

CISA has issued an alert about three critical security vulnerabilities that are currently being exploited. These issues are now part of CISA’s Known Exploited Vulnerabilities (KEV) catalog and require urgent action from organizations and individuals to avoid potential risks.

Vulnerability Breakdown:

India releases draft Digital Personal Data Protection Rules

On Friday, the Indian government released the draft Digital Personal Data Protection Rules, requiring social media and online platforms to...
Read More
India releases draft Digital Personal Data Protection Rules

Microsoft to invest $80 Billion in AI Data Center

Microsoft recently shared a vision for the future of American technology and economic competitiveness, highlighting Artificial Intelligence (AI) as central...
Read More
Microsoft to invest $80 Billion in AI Data Center

3.3 Million Email Server Expose User Passwords and Messages in Plain Text

Around 3.3 million servers are running POP3/IMAP email services without encryption (TLS) enabled, the Shadowserver Foundation, a nonprofit security organization,...
Read More
3.3 Million Email Server Expose User Passwords and Messages in Plain Text

Memory-Dump-UEFI
Researcher dumping memory to bypass BitLocker on Windows 11

Researchers have demonstrated a method to bypass Windows 11’s BitLocker encryption, enabling the extraction of Full Volume Encryption Keys (FVEKs)...
Read More
Memory-Dump-UEFI  Researcher dumping memory to bypass BitLocker on Windows 11

CVE-2024-49112
PoC Exploit Released for Zero-Click vulnerability in Windows

SafeBreach Labs revealed a zero-click vulnerability in the Windows Lightweight Directory Access Protocol (LDAP) service, dubbed “LDAP Nightmare”. This critical...
Read More
CVE-2024-49112  PoC Exploit Released for Zero-Click vulnerability in Windows

Financial Threat Assessment 2024
BCSI marks Bangladeshi 28 banks high, 10 medium for cyber attack

Bangladesh Cyber Security Intelligence (BCSI) has published Financial Threat Assessment report for 2024. In an era where financial institutions and...
Read More
Financial Threat Assessment 2024  BCSI marks Bangladeshi 28 banks high, 10 medium for cyber attack

Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster

Cybersecurity researchers have uncovered three security weaknesses in Microsoft's Azure Data Factory Apache Airflow integration that, if successfully exploited, could...
Read More
Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster

US Treasury says it was hacked by China via third party: Beijing denies

The US Treasury Department said on Monday that Chinese-linked hackers were able to gain access to ‘unclassified documents’ after compromising...
Read More
US Treasury says it was hacked by China via third party: Beijing denies

PoC Exploited Released for Oracle Weblogic Server Vul

Security researchers have warned that a Proof-of-Concept (PoC) exploit has been publicly released for a critical vulnerability affecting Oracle WebLogic...
Read More
PoC Exploited Released for Oracle Weblogic Server Vul

Microsoft warn dev urgently to update .NET installer link

Microsoft is forcing .NET developers to quickly update their apps and developer pipelines so they do not use 'azureedge.net' domains...
Read More
Microsoft warn dev urgently to update .NET installer link

CVE-2023-45727 (CVSS 7.5): A vulnerability in Proself Enterprise/Standard Edition, Proself Gateway Edition, and Proself Mail Sanitize Edition (versions before 5.63, 1.66, and 1.08) allows remote, unauthenticated attackers to perform XML External Entity (XXE) attacks. Exploiting this could give them unauthorized access to sensitive account information on affected servers.

CVE-2024-11680 (CVSS 9.8): A critical vulnerability in ProjectSend (versions before r1720) allows remote, unauthenticated attackers to alter the application’s settings through specially crafted HTTP requests. This can result in unauthorized account creation, web shell uploads, and malicious JavaScript injection, giving attackers control over compromised systems. Public exploits, including Nuclei templates and Metasploit modules, have led to widespread exploitation. Research from Vulncheck shows that 99% of ProjectSend instances are still vulnerable, with active exploitation noted since September. Censys reported 4,026 publicly accessible ProjectSend instances, mostly (40%) in the United States, and about 9% using CloudFlare’s infrastructure.

CVE-2024-11667 (CVSS 7.5): A directory traversal vulnerability affects Zyxel ATP, USG FLEX, and USG20(W)-VPN series firmware versions V5.00 to V5.38. It allows attackers to download or upload files via specially crafted URLs, risking sensitive data and system integrity. This vulnerability is associated with the Helldown ransomware, particularly impacting German organizations.

CISA’s Call to Action:

CISA advises all users and organizations to quickly patch affected systems to reduce risks from actively exploited vulnerabilities. Federal Civilian Executive Branch agencies have until December 24, 2024, to apply these patches to protect their networks.

Check Also

Azure

Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster

Cybersecurity researchers have uncovered three security weaknesses in Microsoft’s Azure Data Factory Apache Airflow integration …

Leave a Reply

Your email address will not be published. Required fields are marked *