TheCyberThrone Security BiWeekly Review – December 14, 2024

TheCyberThrone Security BiWeekly Review – December 14, 2024


Welcome to TheCyberThrone cybersecurity week in review will be posted covering the important security happenings. This review is for the weeks ending Saturday, November 30, 2024.

Jenkins fixes multiple vulnerabilities

Jenkins has addressed multiple vulnerabilities impacting both its core system and associated plugins. These flaws, ranging from denial of service to cross-site scripting, pose significant risks to Jenkins users if left unpatched.

The XSS vulnerability tracked as CVE-2024-54003 with a CVSS 8.0. The DoS vulnerability tracked as CVE-2024-47855 with a CVSS 7.5. The path traversal vulnerability tracked as CVE-2024-54004 with a CVSS score of 4.3….

Apache Arrow affected by CVE-2024-52338 code execution flaw

The Apache Arrow R package has been identified with a critical security vulnerability impacting versions 4.0.0 through 16.1.0, could allow attackers to execute arbitrary code on systems processing maliciously crafted data files.

The flaw tracked as CVE-2024-52338 with a CVSS score of 9.8 stems from insecure deserialization of data in IPC and Parquet readers within the affected versions of the R package. Applications reading Arrow IPC, Feather, or Parquet files from untrusted sources, such as user-supplied input files, are particularly vulnerable…..

Exploit Code Released for Microsoft CVE-2024-38193

A critical use-after-free vulnerability, tracked as CVE-2024-38193 with a CVSS score of 7.8, has been discovered in the afd.sys Windows driver that allows attackers to escalate privileges and execute arbitrary code. This vulnerability has been fixed during the August 2024 patch on Tuesday.

Security researchers from Gen Digita discovered and reported the vulnerability to Microsoft, stated that this flaw allows attackers to bypass normal security restrictions and access sensitive system areas that are typically inaccessible to most users and administrator This attack is both complex and cunning, potentially worth hundreds of thousands of dollars on the black market……

PoC Exploit for Microsoft bug CVE-2024-38054 released

Security researcher ‘Frost’ has released proof-of-concept exploit code for the high-severity vulnerability in the Kernel Streaming WOW Thunk Service Driver could enable local attackers to escalate privileges to SYSTEM level by exploiting a heap-based buffer overflow.

The vulnerability tracked as CVE-2024-38054, with a CVSS score of 7.8, stems from a boundary error within the Kernel Streaming WOW Thunk Service Driver, triggering a heap-based buffer overflow and can be exploited to escalate privileges, potentially giving the attacker SYSTEM-level access…..

Zabbix tool affected by CVE-2024-42327

Zabbix, an open-source application monitoring tool, is warning its customers of a new critical vulnerability that could lead to full system compromise.

The vulnerability tracked as CVE-2024-42327 with a CVSS score of 9.9, the SQL injection bug can be exploited by users with API access. A non-admin user account on the Zabbix frontend with the default user role, or with any other role that gives API access, can exploit this vulnerability.

This brings the end of this week in review security coverage. Thanks for visiting TheCyberThrone. If you like us, please follow us on FacebookTwitterInstagram

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.