Josef 'Corgi' Smidrkal

0 Followers
14 Following
21 Posts
Early October, I was invited as a guest to annual CERT-EU conference in Brussels. Happy 10th birthday, CERT-EU! Been there and got a T-Shirt! (and a nice board game)

Although I never thought it possible, I became FIRST.org Liaison in September.

Now on a mission to find a way how to be reasonably/sustainably useful to the community.

I attended the 72th TF-CSIRT in Prague this September, kindly hosted by CESNET and CSIRT.cz / CZ.NIC.

Even had something small to present. Thanks to all who survived 5 minutes of my mumbling about going outside of SOC process

https://tf-csirt.org/wp-content/uploads/2024/10/72TF-LT_20240926-Phishing-through-Dropbox-Paper.pdf

Allow me to introduce you to my workstation (or "battlestation") - it's a 5th year of ongoing evolution from "just two weeks lockdown" in early 2020.

Note: the corner monitors are portable dual screens "FlipGo" by JSAUX. The various threat maps are up just for this picture.

#workstation #workdesk #workfromhome #battlestation #secops #freelancing #outsourcing #homeoffice

Here goes Ivanti again.
CVE-2024-7593 on Virtual Traffic Manager (vTM), allowing remote unauthenticated attackers to bypass authentication and create admin accounts.

CVSSv2: 10, CVSSv3: 9.8

https://www.tenable.com/cve/CVE-2024-7593
https://www.cert.europa.eu/publications/security-advisories/2024-078/

CVE-2024-7593

Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.

Interesting read. "UnOAuthorized" Microsoft Entra ID Vulnerability allowed attackers to elevate privileges and persist within Microsoft environments through flaws in OAuth 2.0.

https://cybersecuritynews.com/microsoft-entra-id-vulnerability/

Microsoft Entra ID (Azure AD) Vulnerability Let Attackers Gain Global Admin Access

Microsoft's Entra ID Vulnerability (formerly Azure Active Directory), potentially allowing unauthorized actions beyond expected controls.

Cyber Security News

Microsoft July Patch Tuesday fixed several zero-days. Namely CVE-2024-38080 (Hyper-V) & CVE-2024-38112 (MSHTML) - both with detected exploitation in the wild.

https://krebsonsecurity.com/2024/07/microsoft-patch-tuesday-july-2024-edition/

https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days/

Microsoft Patch Tuesday, July 2024 Edition – Krebs on Security

If you are using Splunk Enterprise and related products, please consider recent patch release (contains 6 high severity fixes, including a RCE)

https://www.securityweek.com/splunk-patches-high-severity-vulnerabilities-in-enterprise-product/

Splunk Patches High-Severity Vulnerabilities in Enterprise Product

Splunk has patched multiple vulnerabilities in Splunk Enterprise, including high-severity remote code execution bugs.

SecurityWeek

regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server

https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server

https://security-tracker.debian.org/tracker/CVE-2024-6387

Warning of critical vulnerability CVE-2024-6387 OpenSSH (sshd) server on glibc-based Linux systems.
Exploiting vulnerabilities allows unauthorized root users to execute code remotely, which in turn can result in system compromising, installing malicious software, manipulating data, and creating backdors for continuous access.

OpenSSH must be updated to eliminate the threat. It is also recommended to filter access on SSH.

Src: https://cert.gov.ua/article/5436463

OpenSSH CVE-2024-6387 RCE Vulnerability: Risk & Mitigation | Qualys

CVE-2024-6387 exploit in OpenSSH poses remote unauthenticated code execution risks. Find out which versions are vulnerable and how to protect your systems.

Qualys
Juniper Networks Releases Critical Security Update for Routers

Juniper Networks has released critical security updates for routers to fix an authentication bypass vulnerability. Apply patches now to secure your de

The Hacker News