Overview
Cyble’s December 19 IT vulnerability report back to shoppers highlighted 9 vulnerabilities at excessive threat of assault, together with 5 underneath lively dialogue on darkish internet boards.
Cyble vulnerability intelligence and darkish internet researchers additionally famous risk actor claims of zero-day vulnerabilities on the market affecting Palo Alto Networks units and Chrome and Edge browsers.
In whole, Cyble researchers examined 13 vulnerabilities and eight darkish internet exploits to reach on the listing of vulnerabilities that safety groups ought to prioritize for patching. At-risk merchandise embrace Apache Struts, Qualcomm digital sign processors (DSPs), a WordPress plugin, a Bluetooth flaw affecting Ubuntu, and extra.
The Week’s High Vulnerabilities
CVE-2024-53677: This file add logic vulnerability within the Apache Struts internet utility framework has been rated 9.5 severity by the Apache Software program Basis however remains to be present process NVD evaluation. An attacker may exploit the vulnerability to govern file add parameters to allow path traversal and doubtlessly add a malicious file that may very well be used to carry out distant code execution. Lately, researchers disclosed that risk actors are trying to take advantage of the vulnerability utilizing public proof-of-concept exploits to permit distant code execution, and exploitation has additionally been mentioned on darkish internet boards. Cyble additionally revealed a separate weblog on this vulnerability.
Cyble researchers famous that there are almost 200,000 weak Apache Struts situations uncovered to the web (picture under):
CVE-2024-43047: This vulnerability impacts Qualcomm’s Digital Sign Processor (DSP) service, which is utilized in lots of Android units. It permits for privilege escalation and arbitrary code execution, posing important dangers to affected techniques. Google Undertaking Zero marked the vulnerability as actively exploited in October 2024 and obtained a repair on Android in November 2024. Researchers additionally noticed that the Serbian authorities exploited Qualcomm zero-days, together with CVE-2024-43047, to unlock and infect Android units with a brand new spyware and adware household named “NoviSpy.”
CVE-2024-11972: The CVE for this vulnerability has been reserved however has not but been created. The flaw impacts the Hunk Companion WordPress plugin, which is designed to boost performance and construct visually interesting web sites with out in depth coding information. The vulnerability permits attackers to carry out unauthenticated plugin set up by means of unauthorized POST requests, enabling them to put in and activate different plugins which will include identified vulnerabilities. In response to researchers, attackers are exploiting the vulnerability to put in outdated plugins with identified flaws from the WordPress.org repository. This enables them to entry vulnerabilities that may result in distant code execution (RCE), SQL injection, cross-site scripting (XSS), or the creation of backdoor admin accounts, posing important dangers to website safety.
CVE-2023-45866: This medium-severity vulnerability impacts Bluetooth HID Hosts in techniques using BlueZ, notably in Ubuntu 22.04 LTS with the BlueZ 5.64-0ubuntu1 bundle. This vulnerability permits an unauthenticated peripheral HID gadget to provoke an encrypted connection, doubtlessly enabling the injection of Human Interface System (HID) messages with out consumer interplay.
Vulnerabilities and Exploits on Underground Boards
Cyble Analysis and Intelligence Labs (CRIL) researchers additionally recognized the next exploits and vulnerabilities mentioned on Telegram channels and cybercrime boards, elevating the chance that they are going to be exploited in assaults.
CVE-2024-28059: This crucial safety vulnerability, which was recognized within the MyQ Print Server in variations prior to eight.2 (patch 43), permits distant attackers to realize elevated privileges on the goal server.
CVE-2024-38819: This high-severity path traversal vulnerability within the Spring Framework particularly impacts functions that make the most of WebMvc.fn or WebFlux.fn purposeful internet frameworks.
CVE-2024-35250: This high-severity privilege escalation vulnerability within the Microsoft Home windows working system particularly impacts the kernel-mode driver.
CVE-2024-40711: This crucial vulnerability recognized in Veeam Backup & Replication software program permits for unauthenticated distant code execution (RCE) on account of deserialization of untrusted knowledge.
CVE-2023-27997: This heap-based buffer overflow vulnerability in sure FortiOS and FortiProxy variations could permit a distant attacker to execute arbitrary code or instructions through particularly crafted requests, particularly affecting SSL VPNs.
Menace actors had been additionally noticed providing a zero-day exploit weaponizing a vulnerability claimed to be current on Palo Alto Community’s PAN-OS VPN-supported units (asking value: $60,000) and a zero-day exploit weaponizing a vulnerability allegedly current in Chrome and Edge (asking value: $100,000).
Cyble Suggestions
To guard towards these vulnerabilities and exploits, organizations ought to implement the next finest practices:
- To mitigate vulnerabilities and defend towards exploits, commonly replace all software program and {hardware} techniques with the most recent patches from official distributors.
- Develop a complete patch administration technique that features stock administration, patch evaluation, testing, deployment, and verification. Automate the method the place potential to make sure consistency and effectivity.
- Divide your community into distinct segments to isolate crucial belongings from much less safe areas. Use firewalls, VLANs, and entry controls to restrict entry and scale back the assault floor uncovered to potential threats.
- Create and preserve an incident response plan that outlines procedures for detecting, responding to, and recovering from safety incidents, together with ransomware-resistant backups. Recurrently check and replace the plan to make sure its effectiveness and alignment with present threats.
- Implement complete monitoring and logging options to detect and analyze suspicious actions. Use SIEM (Safety Data and Occasion Administration) techniques to mixture and correlate logs for real-time risk detection and response.
- Subscribe to safety advisories and alerts from official distributors, CERTs, and different authoritative sources. Recurrently evaluate and assess the influence of those alerts in your techniques and take applicable actions.
- Conduct common vulnerability evaluation and penetration testing (VAPT) workout routines to establish and remediate vulnerabilities in your techniques. Complement these workout routines with periodic safety audits to make sure compliance with safety insurance policies and requirements.
Conclusion
These vulnerabilities spotlight the pressing want for safety groups to prioritize patching exploitable vulnerabilities in delicate merchandise and vulnerabilities that may very well be weaponized as entry factors for wider assaults. With growing dialogue of those exploits on darkish internet boards, organizations should keep vigilant and proactive.
Implementing sturdy safety practices is important for shielding delicate knowledge and sustaining system integrity. A complete risk intelligence resolution like Cyble can monitor for threats and leaks particular to your atmosphere, permitting you to reply rapidly to occasions and forestall them from turning into wider incidents.