
Welcome to TheCyberThrone cybersecurity week in review will be posted covering the important security happenings. This review is for the week ending Saturday, August 10, 2024.
Google Fixes Android Zeroday Vulnerability CVE-2024-36971
Google has released patches for 46 bugs affecting its Android operating system in its August 2024 security update. This includes an actively exploited kernel vulnerability tracked as CVE-2024-36971 affects the mobile operating system’s kernel, the central brain to the software.
Exploiting the flaw will allow the threat actor to remotely execute code with system privileges, paving a way to trigger an Android device into downloading and installing malware. Specifically, the flaw pertains to a kernel function called “__dst_negative_advice(),” which wasn’t enforcing a synchronization mechanism called Read-Copy Update or RCU that lead to use-after-free vulnerability……
CISA adds CVE-2018-0824 to its KEV Catalog
The U.S. CISA added a deserialization of untrusted data vulnerability in Microsoft COM for Windows, tracked as CVE-2018-0824 with a CVSS score of 7.5, to its Known Exploited Vulnerabilities (KEV) catalog.
A deserialization of untrusted data vulnerability arises when an application deserializes data from an untrusted source without proper validation. An attacker can trigger the issue by tricking the victim into visiting a website by clicking a link and then convincing the user to open the specially crafted file……
Apache Cloudstack fixes CVE-2024-42062 & CVE-2024-42222
The first vulnerability tracked as CVE-2024-42062, a Key Exposure Risk that stemmed due to an access permission validation issue, domain admin accounts can query all registered API and secret keys of account users, including those of root admins.
The second vulnerability tracked as CVE-2024-42222, an unauthorized Network Access that stemmed due to a regression in the network listing API in Apache CloudStack 4.19.1.0 could allow unauthorized users to access network details, posing a significant risk to tenant isolation and data confidentiality……
SUBSCRIBE TO OUR BLOG TODAY !
We understand the importance of staying on top of the latest threats and vulnerabilities that can harm your digital life. You’ll receive the latest cybersecurity news, insights, resources, offers and analysis straight to your inbox every day
Jenkins Patches Critical Vulnerability CVE-2024-43044
The critical one of the two vulnerabilities, tracked as CVE-2024-43044, allows attackers to execute arbitrary code remotely on Jenkins controllers. This vulnerability stems from a flaw in the Remoting library, which is used for communication between Jenkins controllers and agents.
The second vulnerability, tracked as CVE-2024-43045, allows unauthorized access to users’ “My Views,” which are personalized dashboards in Jenkins. This vulnerability could expose sensitive information and allow attackers to modify these views, potentially disrupting workflows or causing confusion. While not as severe as the critical RCE vulnerability, this issue still poses a significant risk to the privacy and integrity of Jenkins users’ data……
Apache InLong fixes Critical Vulnerability CVE-2024-36268
The Apache InLong project has issued a security advisory regarding a critical vulnerability discovered in its TubeMQ component, that could allow code injection flaw could allow remote attackers to execute arbitrary code on affected systems.
The vulnerability tracked as CVE-2024-36268 with a CVSS score of 9.8, resides in the TubeMQ Client, a crucial part of the InLong framework that facilitates communication with the TubeMQ message queue system. By exploiting this flaw, attackers could potentially gain control of the entire InLong infrastructure, compromising the integrity and confidentiality of sensitive data being processed……
This brings end of this week in review security coverage. Thanks for visiting TheCyberThrone. If you like us please follow us on Facebook, Twitter, Instagram



Very useful post.