TheCyberThrone CyberSecurity Newsletter Top 5 Articles – September, 2024

TheCyberThrone CyberSecurity Newsletter Top 5 Articles – September, 2024


A security researcher from Conviso Labs published the technical details and a proof-of-concept (PoC) exploit for a critical vulnerability in Jenkin.

The vulnerability tracked as CVE-2024-43044 is classified as an arbitrary file read vulnerability, which allows an agent to read files from the Jenkins controller. The root cause lies in the Jenkins feature that permits the controller to transmit JAR files to its agents. The vulnerability exists because the ClassLoaderProxy#fetchJar method, invoked on the controller, fails to restrict the file paths that agents can request. This lack of restriction enables unauthorized file access on the controller’s file system……

Advertisements

Ivanti fixed a critical vulnerability in its Endpoint Management software (EPM) that can let attackers achieve remote code execution on the core server

The vulnerability tracked as CVE-2024-29847 with a CVSS score of 10, in its Endpoint Management software (EPM) is a deserialization of untrusted data issue that resides in the agent portal, attackers can exploit the flaw to achieve remote code execution on the core server……

Microsoft has confirmed the exploitation of a Windows Kernel vulnerability, identified as CVE-2024-37985, in the wild. This vulnerability, first released on July 9, 2024, and last updated on September 17, 2024, poses a significant risk due to its potential for information disclosure.

The vulnerability has a CVSS score of 5.9 and stems from a weakness identified as CWE-1037: Processor Optimization Removal or Modification of Security-critical Code, which will lead to unauthorized information disclosure…..

SUBSCRIBE TO OUR BLOG TODAY !

We understand the importance of staying on top of the latest threats and vulnerabilities that can harm your digital life. You’ll receive the latest cybersecurity news, insights, resources, offers and analysis straight to your inbox every day

GitLab has released security patches  for a critical vulnerability that affects both GitLab Community Edition (CE) and Enterprise Edition (EE) that allows a threat actor to bypass authentication checks and gain access to sensitive GitLab projects, including source code repositories, without needing to supply valid credentials.

The flaw, identified as CVE-2024-45409, with a CVSS score of 10, stems from improper signature verification in certain versions of the Ruby-SAML library (<=12.2 and 1.13.0 through 1.16.0). This flaw allows an unauthenticated attacker to forge a SAML response, effectively granting them access to GitLab as any arbitrary user……

Advertisements

Several critical vulnerabilities have been discovered in Veeam Service Provider Console and Veeam Backup & Replication could allow attackers to gain unauthorized access, execute malicious code, and potentially compromise sensitive data.

  • CVE-2024-38650 with a CVSS score of 9.9 is a vulnerability enabling low-privileged attackers to access the NTLM hash of the service account on the Veeam Service Provider Console server, paving the way for potential lateral movement and further system compromise.
  • CVE-2024-39714 with a CVSS score of 9.9 flaw permits low-privileged users to upload arbitrary files to the server, ultimately leading to remote code execution and granting attacker’s full control.
  • CVE-2024-40711 with a CVSS 9.8 is a flaw in Veeam Backup & Replication allows unauthenticated attackers to execute code remotely, granting them full control over the affected system. Organizations relying on Veeam Backup & Replication for data protection are strongly urged to apply the latest patch (Veeam Backup & Replication 12.2 build 12.2.0.334) immediately.
  • CVE-2024-39715 with a CVSS 8.5, like the previous vulnerability, this one allows low-privileged users with REST API access to remotely upload arbitrary files, again leading to remote code execution.
  • CVE-2024-38651 with a CVSS 8.5, enables low-privileged users to overwrite files on the Veeam Service Provider Console server, which can also facilitate remote code execution.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.