The CyberThrone Most Exploited Vulnerabilities Top 10 – October 2024

The CyberThrone Most Exploited Vulnerabilities Top 10 – October 2024


An out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests.

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.

Advertisements

A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets. This issue arises due to the use of externally-controlled format strings, enabling attackers to execute unauthorized code or commands via specially crafted packets. Successful exploitation of this vulnerability could lead to serious security implications for organizations using these Fortinet products. Users are advised to update their systems as soon as possible to mitigate this risk.

A stored XSS vulnerability affecting Roundcube email client versions before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4. An attacker can exploit this flaw by sending an HTML email with a crafted SVG document. The vulnerable component, rcube_washtml.php, fails to properly sanitize user-supplied data, allowing the attacker to inject and execute arbitrary JavaScript code upon victim’s interaction with the email. This could potentially lead to unauthorized account takeover, data theft, or further exploitation.

A vulnerability affecting Roundcube webmail versions before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3. This issue allows Cross-Site Scripting (XSS) attacks through text/plain e-mail messages containing specially crafted links.  The vulnerability lies in the behavior of Roundcube string replacer, located in program/lib/Roundcube/rcube_string_replacer.php, which fails to properly sanitize user input. Successful exploitation could result in the execution of malicious scripts within the webmail interface. Users are advised to update to the latest version as soon as possible to address this security risk.CVE-2024-26198: Microsoft Exchange Server Remote Code Execution Vulnerability.

Advertisements

A remote code execution vulnerability affecting Microsoft Exchange Servers. An attacker can exploit this flaw by sending specially crafted emails to targets, potentially gaining control over the affected system. Successful exploitation could allow the attacker to install programs, view, change, or delete data, and create new accounts with full user rights. Organizations using Microsoft Exchange Server are advised to apply the available patches as soon as possible to mitigate this risk.

A vulnerability affecting Jenkins 2.441 and earlier, as well as LTS 2.426.2 and earlier. This issue lies in Jenkins’ CLI command parser, which fails to disable a feature that interprets ‘@’ followed by a file path in an argument as a command to read the file’s contents. As a result, unauthenticated attackers can exploit this vulnerability to read arbitrary files on the Jenkins controller file system. This can potentially lead to exposure of sensitive information. Jenkins users are advised to upgrade to a patched version as soon as possible to mitigate this risk.

A vulnerability affecting VMware ESXi, a popular hypervisor for enterprise environments. The issue allows an attacker with sufficient Active Directory (AD) permissions to bypass authentication and gain unauthorized full access to an ESXi host. By recreating the configured AD group, ‘ESXi Admins’ by default, an attacker can exploit this vulnerability despite the group being deleted from AD.

Advertisements

The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands.

A critical vulnerability in Microsoft Exchange Server that enables remote code execution (RCE). This vulnerability affects multiple versions of Microsoft Exchange Server including 2013, 2016, and 2019. The flaw arises from improper handling of deserialization of untrusted data, leading to potential exploitation by malicious actors.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.