A critical security issue, identified as CVE-2024-0394, has been disclosed, affecting Rapid7 Minerva Armor, a product designed to protect against malware, ransomware, and advanced cyber attacks. This vulnerability, known as a privilege escalation issue, allows users with lower-level access to gain higher-level privileges, potentially leading to unauthorized actions or data breaches.

The vulnerability is rooted in how Minerva Armor uses the OpenSSL library, a crucial tool for secure communications and cryptographic functions. Specifically, the issue arises from the way Minerva Armor configures the OPENSSLDIR parameter, which points to the location of the OpenSSL configuration file (openssl.cnf). This parameter was mistakenly set to a path that could be accessed by users with limited privileges, such as C:\git\vcpkg\packages\openssl_x86-windows-static-vs2019-static\openssl.cnf.

An attacker could exploit this vulnerability by creating a malicious openssl.cnf file that directs the OpenSSL library to load a harmful engine library. This engine library could then execute arbitrary code with SYSTEM privileges when the Minerva Armor service starts. Essentially, any authenticated user could potentially execute harmful actions on the system.

Rapid7 has addressed this vulnerability by releasing a fix in version 4.5.5 of Minerva Armor. Users are strongly advised to update to this version to mitigate the risk. The vulnerability was disclosed by Will Dormann of Vul Labs, who was acknowledged by Rapid7 for their contribution to enhancing security.

https://www.rapid7.com/blog/post/2024/04/03/cve-2024-0394-rapid7-minerva-armor-privilege-escalation-fixed/

#cybersecurity #rapid7 #vulnerability #minerva_armor #privilegeescalation #openssl #cve #malware #ransomware #vul_labs #willdormann

CVE-2024-0394: Rapid7 Minerva Armor Privilege Escalation (FIXED) | Rapid7 Blog

Rapid7
Microsoft Patch Tuesday, December 2022 Edition – Krebs on Security

Microsoft Patch Tuesday, December 2022 Edition – Krebs on Security

Microsoft Patch Tuesday, December 2022 Edition - Microsoft has released its final monthly batch of security updates for 2022, fixin... https://krebsonsecurity.com/2022/12/microsoft-patch-tuesday-december-2022-edition/ #microsoftpatchtuesdaydecember2022 #trendmicroszerodayinitiative #latestwarnings #cve-2022-41076 #cve-2022-44698 #cve-2022-44710 #cve-2022-44713 #securitytools #applezero-day #immersivelabs #timetopatch #gregwiseman #willdormann #kevinbreen #powershell #windows #rapid7
Microsoft Patch Tuesday, December 2022 Edition – Krebs on Security

When Your Smart ID Card Reader Comes With Malware – Krebs on Security

When Your Smart ID Card Reader Comes With Malware - Millions of U.S. government employees and contractors have been issued a secure sm... https://krebsonsecurity.com/2022/05/when-your-smart-id-card-reader-comes-with-malware/ #u.s.generalservicesadministration #alittlesunshine #michaeldanberry #militarycac.com #thecomingstorm #willdormann #daviddixon #cacreader #cert/cc #saicoo
When Your Smart ID Card Reader Comes With Malware – Krebs on Security

Cryptic Rumblings Ahead of First 2020 Patch Tuesday - Sources tell KrebsOnSecurity that Microsoft Corp. is slated to release a software update on Tuesday ... more: https://krebsonsecurity.com/2020/01/cryptic-rumblings-ahead-of-first-2020-patch-tuesday/ #patchtuesdayjanuary2020 #certcoordinationcenter #nationalsecurityagency #microsoftcryptoapi #anneneuberger #timetopatch #crypt32.dll #willdormann #microsoft #cert-cc #windows #nsa
Cryptic Rumblings Ahead of First 2020 Patch Tuesday — Krebs on Security