CISA Expands Vulnerabilities Catalog With Old, Exploited Flaws

The Cybersecurity and Infrastructure Security Agency (CISA) has added six known flaws to its Known Exploited Vulnerabilities Catalog on September 15, 2022. “These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose a significant risk to the federal enterprise,” the Agency wrote. The six issues include three that affect the

Vulnerabilities Found in Airplane WiFi Devices, Passengers’ Data Exposed

Two critical vulnerabilities were found in wireless LAN devices that are allegedly used to provide internet connectivity in airplanes. The flaws were discovered by Thomas Knudsen and Samy Younsi of Necrum Security Labs and affected the Flexlan FX3000 and FX2000 series wireless LAN devices made by Contec. “After performing reverse engineering of the firmware, we

High Severity Vulnerabilities Found in HP Enterprise Devices

The Binarly security research team has disclosed six high–severity firmware vulnerabilities the company found over the course of the year. First discussed at the Black Hat 2022 conference, the flaws affect HP EliteBook devices and have Common Vulnerability Scoring System (CVSS) scores between 7.5 and 8.2. “A firmware implant is the final goal for an

Oxeye Discovers Several High Severity IDOR Vulnerabilities in Harbor

The Oxeye security research team found several high–severity insecure direct object reference (IDOR) vulnerabilities in Harbor, an open–source artifact registry developed by the Cloud Native Computing Foundation (CNCF) and VMWare. The company explained that the five flaws were discovered despite Harbor having implemented role–based access control (RBAC) on most HTTP endpoints. One of them reportedly

Rapid7 Discusses SIGMA Spectrum Infusion Pump and Wi-Fi Battery Vulnerabilities

On April 20, 2022, Rapid7 discovered vulnerabilities in two TCP/IP–enabled medical devices produced by Baxter Healthcare. The flaws, four in total, affected the company’s SIGMA Spectrum Infusion Pump and SIGMA WiFi Battery. Almost five months after Rapid7 first reported the issues to Baxter, the companies are now revealing they have worked together to discuss the

Iran-Based MuddyWater Targets Log4j 2 Vulnerabilities in SysAid Apps in Israel

Iran-based threat actor MuddyWater (tracked by Microsoft as MERCURY) has been leveraging the exploitation of Log4j 2 vulnerabilities in SysAid applications to target organizations in Israel. The news comes from a new advisory from Microsoft’s security researchers, who said on Thursday they could assess with high confidence that MERCURY’s observed activity was affiliated with Iran’s Ministry

VMware fixes privilege escalation vulnerabilities in VMware Tools

Virtualization technology software firm VMware released patches to fix a severe security flaw in its VMware Tools suite of utilities. The company made the announcement in an advisory on Tuesday August 23, saying the vulnerability (tracked CVE-2022-31676) could be exploited by threat actors with local non-administrative access to the Guest OS and used to escalate privileges

Why patching quality, vendor info on vulnerabilities are declining

Those who apply security patches are finding that it’s becoming harder to time updates and determine the impact of patching on their organizations. Dustin Childs of the ZDI Zero Day Initiative and Trend Micro brought this problem to light at the recent Black Hat security conference: Patch quality has not increased and in fact is

Cybersecurity Vulnerabilities And Their Types

The importance of cybersecurity in sustaining business operations has increased significantly as the value of data increases every day. Organizations must successfully prevent employee and customer data breaches if they want to develop new business connections and sustain long-term relationships. A thorough awareness of cybersecurity vulnerabilities and the techniques used by threat actors to access

Google and Apple both release patches against zero‑day vulnerabilities – Week in security with Tony Anscombe

Zero-day vulnerabilities are super active and Google and Apple are acting to patch these vulnerabilities, some of which seen on-the-wild. Google and Apple are both release patches for zero-day vulnerabilities that have already been exploited in the wild. ESET cybersecurity expert Tony Anscombe explains what those vulnerabilities are in simpler words, and reiterate the importance