TheCyberThrone CyberSecurity Newsletter Top 5 Articles – July, 2024

TheCyberThrone CyberSecurity Newsletter Top 5 Articles – July, 2024


RegreSSHion Vulnerability -CVE-2024-6387

Qualys has revealed details about a security vulnerability they have discovered within the OpenSSH server that could lead to remote, unauthenticated code execution. They have dubbed the vulnerability as “RegreSSHion” as a play on “SSH” and “regression”. The vulnerability tracked as CVE-2024-6387 is related to  OpenSSH servers running with the GNU C Library (glibc) in Linux environments.

The Qualys Threat Research Unit (TRU) has discovered the Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH’s server (sshd) in glibc-based Linux systems. The issue is due to a signal handler race condition, Qualys researchers state that the flaw poses a considerable risk because it affects sshd in its default configuration…….

Advertisements

CrowdStrike Strikes Microsoft – Aftermath

CrowdStrike a major cybersecurity platform, is facing an outage. Many users across India, Japan, Canada, Australia and many other countries have been affected by the issue.

The Blue Screen of Death (BSOD), officially known as stop error by Microsoft, is a critical system error on Windows operating systems. It indicates a severe issue that requires urgent fix. When a system experiences BSOD, all operations are halted to prevent further damage, often resulting in the loss of unsaved work. Despite its seemingly small nature, the blue screen of death is a significant problem, ranked closely to cyber issues like malware or ransomware.

Whenever a Windows system encounters a BSOD, the main screen turns off and a blue screen with white text appears, detailing the error. The BSOD issue is typically caused at the Windows kernel level and can be due to hardware or software issues…….

SUBSCRIBE TO OUR BLOG TODAY !

We understand the importance of staying on top of the latest threats and vulnerabilities that can harm your digital life. You’ll receive the latest cybersecurity news, insights, resources, offers and analysis straight to your inbox every day

Type your email…

CISA Intrudes One of FCEB and remains Persisted for five months

he US CISA led red team exercise at one of federal agencies (unnamed) in 2023 revealed a string of security failings that exposed its most critical assets.

CISA calls this assessment as SILENTSHIELD, in which the red team picks an FCEB agency to probe and does so without prior notice, where it simulates the maneuvers of a long term hostile nation-state threat group.

The initial access was gained by exploiting a vulnerability CVE-2022-21587 that has a CVSS score of 9.8 in the target agency’s Oracle Solaris enclave, leading to what it said was a full compromise……

ServiceNow Fixes Critical Vulnerabilities -CVE-2024-4879 and CVE-2024-5217

ServiceNow, has recently disclosed three critical security vulnerabilities that could have severe consequences for organizations worldwide. These vulnerabilities, identified as CVE-2024-4879, CVE-2024-5217, and CVE-2024-5178, affect various versions of the Now Platform, including Washington D.C., Vancouver, and Utah releases.

The most alarming of these flaws are CVE-2024-4879 with a CVSSv4 score of 9.3 and CVE-2024-5217 with a CVSSv4 score of 9.2, respectively. These vulnerabilities enable unauthenticated remote attackers to execute arbitrary code within the Now Platform, potentially leading to complete system compromise, data theft, and disruption of critical business operations……

Advertisements

Apache releases new HTTP Server version fixes CVE-2024-39884

Apache Software Foundation has released Apache HTTP Server version 2.4.61, a crucial update that addresses a severe source code disclosure vulnerability that could expose sensitive server-side information to malicious actors.

The vulnerability tracked as CVE-2024-39884 resides from a regression in the handling of legacy content-type based configurations. Specifically, the “AddType” directive and similar settings, when used under specific circumstances, could inadvertently reveal the source code of files intended to be processed. This could include server-side scripts, configuration files, or other sensitive data.

The Apache team urges all users of Apache HTTP Server 2.4.60 to immediately upgrade to version 2.4.61. This update not only patches the source code disclosure flaw but also addresses several other vulnerabilities and bugs discovered in the previous version…….




Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.