TheCyberThrone Security Week In Review – December 23, 2023

TheCyberThrone Security Week In Review – December 23, 2023


PoC Exploit for SharePoint RCE – CVE-2023-29357 & CVE-2023-24955

Jang a security researcher has unveiled an exploit chain linking two distinct vulnerabilities in Microsoft SharePoint Server: CVE-2023-29357 and CVE-2023-24955 during Pwn2Own Vancouver March 2023 edition. This chain was not just a theoretical exercise; it enabled remote code execution (RCE) against the server, a feat that captured the attention of cybersecurity enthusiasts and professionals alike.

Later during the month of September 2023, Jang detailed out this exploit chain, followed by the release of a proof-of-concept (PoC) on GitHub for CVE-2023-29357. The authors of the PoC took an ethical stance, ensuring that RCE wasn’t achievable with the current PoC.

Terrapin Attack in OpenSSH

Security researchers have identified a new threat targeting the integrity of Secure Shell (SSH) communications called as the Terrapin Attack.

The Terrapin Attack is a prefix truncation assault against the SSH protocol, disrupting the security of the SSH channel. By adjusting sequence numbers during the handshake process, attackers can covertly remove crucial messages from either the client or server, undetected. This vulnerability not only jeopardizes the channel’s integrity but also downgrades connection security, potentially leading to the use of less secure client authentication algorithms and disabling vital countermeasures against keystroke timing attacks.

  • General Protocol Flaw
  • Rogue Extension Negotiation Attack in AsyncSSH
  • Rogue Session Attack in AsyncSSH
Advertisements

Delta Dental suffers a Data Breach

Delta Dental of California has disclosed a data breach following security incidents linked to the vulnerability in MOVEit file transfer software by Progress Software. According to a breach notification filed with the Maine Attorney General on December 14, unauthorized actors accessed protected health information.

The exposed data includes individuals’ names coupled with a mix of addresses, Social Security numbers, driver’s license numbers, state identification numbers, passport details, financial account information, tax identification numbers, individual health insurance policy numbers and/or health-related information.

SUBSCRIBE TO OUR BLOG TODAY !

We understand the importance of staying on top of the latest threats and vulnerabilities that can harm your digital life. You’ll receive the latest cybersecurity news, insights, resources, offers and analysis straight to your inbox every day

Texas ESO Solutions is affected by data breach

ESO Solutions, a texas based medical software solution company, has suffered a ransomware attack that has exposed personal details and healthcare information belonging to 2.7 million U.S. patients.

ESO Solutions has informed the state regulators that it “detected and stopped a sophisticated ransomware incident” on Sept. 28, but not before the attackers were able to encrypt some of the company’s systems. FBI investigation determined, on Oct. 23, that personal data on one of its affected systems had been exfiltrated during the breach.

Google fixes eighth zeroday in Chrome -CVE-2023-7024

Google has released updates to address a new zero-day vulnerability, tracked as CVE-2023-7024, in its web browser Chrome.

As per the advisory, CVE-2023-7024: Heap buffer overflow in WebRTC. Reported by Clément Lecigne and Vlad Stolyarov of Google’s Threat Analysis Group on 2023-12-19.Google is aware that an exploit for CVE-2023-7024 exists in the wild.

Advertisements

Nissan Australia suffers a cyber attack, Akira claims responsibility

The Akira ransomware group has claimed to have breached Nissan Australia and to have stolen around 100GB of files. Nissan Oceania refers to the regional operations of the Nissan Motor Company in the Oceania region, which includes Australia and New Zealand.

Earlier this month, Nissan Oceania, the regional division of the multinational carmaker, announced it had suffered a cyber attack and launched an investigation into the incident. Nissan already notified the Australian Cyber Security Center and the New Zealand National Cyber Security Center.

1 Comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.