More CyberWatch

December 6, 2023

Atlassian Patches Several Critical Vulnerabilities

Atlassian has released four security advisories and patches fixing remote code execution flaws in several Atlassian products. The CVEs mentioned are CVE-2022-1471, CVE-2023-22523, CVE-2023-22524, and CVE-2023-22522 each having a CVSS 3.1 score ranging from 9.0 – 9.8 according to Atlassian and the National Vulnerability Database.

Read more
December 5, 2023

Use-After-Free Vulnerability Present in Linux Kernel

A Use-After-Free (UAF) vulnerability has been identified in the Linux kernel which is identified as CVE-2023-40283 with a CVSS 3.1 score of 7.8 HIGH. The issue was discovered in l2cap_sock_release in /net/Bluetooth/l2cap_sock.c in versions of the linux kernel before 6.4.10. This is one of several recent vulnerabilities associated with the Linux kernel which all allow for a Secure Boot Bypass. The collection of vulnerabilities dubbed LogoFAIL leverages the UEFI BIOs capabilities of displaying images during boot to achieve arbitrary code execution and compromise the security of the entire system.

Read more
December 4, 2023

Double Threat: Examining Henry Schein’s Second Attack In 2 Weeks

Henry Schein, a Fortune 500 healthcare company, faced a severe cybersecurity incident, falling prey to the 'BlackCat/ALPHV' ransomware gang for the second time in a month. The most recent attack, detected on November 22, targeted critical systems, causing disruptions to the organization's applications and e-commerce platform. This recurrence underscores the persistence posed by the threat actor, necessitating a comprehensive response to safeguard the company's operations and sensitive data.

Read more
November 29, 2023

Chrome Zero Day Alert, Integer Overflow in Skia

Google Chrome versions prior to 119.0.6045.199 are vulnerable to CVE-2023-6345 (CVSS v3: 8.8) a vulnerability with evidence of active exploitation. An integer overflow exists in Skia which allows a remote attacker who had compromised the renderer process to potentially perform a sandbox escape with a malicious file.

Read more
November 27, 2023

Critical Vulnerability Discovered in ownCloud

A vulnerability was discovered in ownCloud, a tool used to share and sync data collaboratively, classified as CVE-2023-49103. MITRE has designated this vulnerability with a CVSS score of 10.0. It is related to the graphapi portion of the application. Because the graphapi relys on a third-party library to provide a URL that contains the phpinfo, the viewing of sensitive data such as ownCloud admin password, mail server credentials, and license key is allowed.

Read more
November 27, 2023

Fidelity National Financial Battles Against Cyber Intrusion

Fidelity National Financial (FNF), a prominent title insurance giant, finds itself in the throes of a significant cyberattack, resulting in disruptive service interruptions. This incident has a far-reaching impact on critical services, including title insurance, escrow, mortgage transaction services, and technology supporting the real estate and mortgage industries. The cyberattack has prompted FNF to take down multiple systems in an urgent bid to contain and neutralize the threat. Detected just before Thanksgiving, the incident raises concerns about the potential compromise of sensitive data and critical systems. The notorious Alphv/BlackCat ransomware group has claimed responsibility, further emphasizing the severity of the situation and the need for a comprehensive response.

Read more
November 22, 2023

Looney Tunables Now Actively Exploited

A high severity (CVSS: 7.8) vulnerability has been identified in the GNU C Library. Identified as CVE-2023-4911, nicknamed Looney Tunables, it was recently added to CISA’s Known Exploited Vulnerabilities catalogue because it is now being actively exploited. This buffer overflow vulnerability makes use of a flaw within the libraries’ dynamic loader and GLIBC_TUNABLES environment variable. This can allow a local attacker to use specifically crafted GLIBC_TUNABLES environment variables while launching binaries with SUID permission to execute code with elevated privileges.

Read more
November 20, 2023

Critical Vulnerability Identified in Fortinet SIEM Tool

A vulnerability has been discovered internally by Adham El Karn of the Fortinet Product Security team. Identified as CVE-2023-36553 (CVSS 9.8), this Critical vulnerability affects all versions of FortiSIEM 4.7, 4.9, 4.10, 5.0, 5.1, 5.2, 5.3, and 5.4. According to Fortiguard, it has to do with an improper neutralization of special elements used in an OS Command vulnerability in FortiSIEM report server. This can allow a remote, unauthenticated attacker to execute unauthorized commands via specifically crafted API requests.

Read more
November 15, 2023

Microsoft November 2023 Patch Tuesday: Multiple Zero-day Fixes

Every second Tuesday of the month, Microsoft releases many security fixes to several of its software solutions. This is known as “Patch Tuesday.” This time, several critical vulnerabilities and zero-days have been remediated. A total of five zero-day vulnerabilities, three critical vulnerabilities, and more than 50 other vulnerabilities of varying severity were addressed. This report covers only the most critical and notable vulnerabilities.

Read more