Ivanti Patches 50 Vulnerabilities Across Several Products

November 13, 2024 at 08:03AM Ivanti has addressed numerous vulnerabilities by releasing fixes for Endpoint Manager, Avalanche, Connect Secure, Policy Secure, and Secure Access Client, enhancing security across these products. **Meeting Takeaways:** 1. **Release of Fixes:** Ivanti has issued fixes addressing multiple vulnerabilities. 2. **Affected Products:** The vulnerabilities were found in the following products: – … Read more

FBI, CISA, and NSA reveal most exploited vulnerabilities of 2023

November 12, 2024 at 11:54AM The FBI, NSA, and Five Eyes partners identified 15 top vulnerabilities exploited in 2023, urging immediate patching and management. Zero-day exploits increased, with 12 of the 15 vulnerabilities addressed last year. Notably, CVE-2023-3519 was widely targeted, emphasizing the need for proactive security measures to mitigate risks. ### Meeting Takeaways: 1. … Read more

HTTP your way into Citrix’s Virtual Apps and Desktops with fresh exploit code

November 12, 2024 at 11:14AM Researchers have revealed a proof of concept for a serious vulnerability in Citrix’s Virtual Apps and Desktops, allowing unauthenticated remote code execution through HTTP requests. This flaw lets attackers gain system privileges and impersonate users. Citrix disputes the severity and has issued hotfixes, urging customers to apply them immediately. ### … Read more

2023 Top Routinely Exploited Vulnerabilities

November 12, 2024 at 10:29AM The joint Cybersecurity Advisory highlights increased exploitation of zero-day vulnerabilities in 2023 by malicious cyber actors compared to 2022, urging vendors and end-users to adopt security measures. Recommendations include implementing secure software development practices and timely patch management to mitigate risks associated with routinely exploited vulnerabilities. ### Meeting Takeaways #### … Read more

Microsoft blames Windows Server 2025 automatic upgrades on 3rd-party tools

November 11, 2024 at 11:42AM Microsoft confirmed that some users of Windows Server 2019 and 2022 were unexpectedly upgraded to Windows Server 2025 due to third-party patch management tools. This issue, attributed to a procedural error, has been mitigated, but affected admins have no rollback option besides restoring from backups. Licensing confusion also arose with … Read more

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems

November 7, 2024 at 03:15AM Cisco has issued security updates to fix a critical vulnerability (CVE-2024-20418) in Ultra-Reliable Wireless Backhaul Access Points, allowing remote attackers to execute commands with elevated privileges. Affected devices need to update to software version 17.15.1, as earlier versions remain exposed but no active exploits have been reported. ### Meeting Takeaways … Read more

Cisco fixes VPN DoS flaw discovered in password spray attacks

October 24, 2024 at 02:13PM Cisco addressed a denial of service vulnerability (CVE-2024-20481) affecting its ASA and FTD software, discovered during large-scale brute-force attacks. This flaw allows unauthenticated remote attackers to exhaust resources of the RAVPN service. Cisco also issued advisories for 42 other vulnerabilities, urging immediate patching. ### Meeting Takeaways 1. **Vulnerability Fix:** – … Read more

Microsoft SharePoint RCE flaw exploits in the wild – you’ve had 3 months to patch

October 23, 2024 at 03:35PM A deserialization vulnerability in Microsoft SharePoint, CVE-2024-38094, is actively exploited, allowing attackers to inject code remotely. CISA added it to its catalog, urging timely remediation for all organizations. Microsoft previously patched the issue, emphasizing the need for swift action, especially for federal agencies by November 12. ### Meeting Takeaways 1. … Read more

VMware fixes critical RCE, make-me-root bugs in vCenter – for the second time

October 22, 2024 at 01:05PM VMware released a second patch for two critical vulnerabilities in vCenter Server: CVE-2024-38812 (heap overflow, CVSS 9.8) and CVE-2024-38813 (privilege escalation, CVSS 7.5). Both flaws could allow remote code execution and administrative access, prompting urgent patching. No known exploits exist, but attackers target VMware systems extensively. ### Meeting Takeaways 1. … Read more

VMware fixes bad patch for critical vCenter Server RCE flaw

October 22, 2024 at 10:13AM VMware has issued a critical security update for CVE-2024-38812, a remote code execution vulnerability in vCenter Server that was inadequately addressed in September 2024. Users must apply the new patches for vCenter 7.0.3, 8.0.2, and 8.0.3 urgently, as no effective workarounds exist. ### Meeting Notes Takeaways: 1. **Security Update Release**: … Read more