GreyNoise Detects Active Exploitation of CVEs Mentioned in Black Basta’s Leaked Chat Logs

Ransomware group Black Basta’s chat logs were leaked, revealing 62 mentioned CVEs. GreyNoise identified 23 of these CVEs as actively exploited, with some targeted in the last 24 hours.

"VulnCheck's CTO examines CVE-2023-36845, revealing a new path to code execution that doesn't require a file upload and outlining how the vulnerability alone can achieve remote, unauthenticated code execution."

https://vulncheck.com/blog/juniper-cve-2023-36845

#hacking #pentesting #redteam #juniper #cve202336845 #cve_2023_36845

Fileless Remote Code Execution on Juniper Firewalls - Blog - VulnCheck

Learn about VulnCheck's development of an exploit for CVE-2023-36845, leading to stealthy code execution on Juniper firewalls, while also assessing the prevalence of unpatched systems in the wild.

VulnCheck
As @iagox86 has pointed out for weeks now, the #Juniper RCE headlines on #CVE_2023-36844 and #CVE_2023_36845 consistently miss a pretty important point: All the known exploits land you in a restrictive BSD jail with no meaningful OS access. Rapid7 details one method for breakout in our analysis from early September, but oddly, nobody else seems to be acknowledging the caveat to exploitation (at least with known PoCs): https://attackerkb.com/topics/1PKX0CCXkX/cve-2023-36844/rapid7-analysis
rbowes-r7's assessment of CVE-2023-36844 | AttackerKB

The work done by watchTowr and later VulnCheck is super cool, and outlines different great ways to exploit the vulnerability (we based the Rapid7 Analysis on w…

AttackerKB