Ivanti: Patch new Connect Secure auth bypass bug immediately

February 8, 2024 at 02:53PM Ivanti warns of authentication bypass vulnerability (CVE-2024-22024) in Connect Secure, Policy Secure, and ZTA gateways, allowing remote access to unpatched appliances. No evidence of customer exploitation, but immediate action is recommended. Over 20,000 ICS VPN gateways tracked online. Ivanti devices targeted in zero-day attacks. Security patches released. CISA orders disconnection … Read more

Fortinet warns of new FortiSIEM RCE bugs in confusing disclosure

February 7, 2024 at 07:57PM Fortinet warns of two unpatched patch bypasses, tracked as CVE-2024-23108 and CVE-2024-23109, for the critical remote code execution vulnerability in FortiSIEM. Originally considered duplicates, Fortinet now confirms they are valid variants of the original flaw, CVE-2023-34992. Upcoming FortiSIEM versions will address these vulnerabilities, so immediate upgrading is strongly recommended. Based … Read more

Fortinet snafu: Critical FortiSIEM CVEs are duplicates, issued in error

February 7, 2024 at 08:32AM NVD published two advisories regarding critical command injection vulnerabilities in Fortinet’s FortiSIEM products. However, it was revealed that the CVEs were duplicates of a known vulnerability issued in error. Fortinet has acknowledged this as a system-level error and is working on rectifying and withdrawing the erroneous entries. MITRE and other … Read more

JetBrains urges swift patching of latest critical TeamCity flaw

February 7, 2024 at 07:37AM JetBrains urges all TeamCity (on-prem) users to upgrade to the latest version due to a critical vulnerability (CVE-2024-23917) with a 9.8 CVSS score, allowing unauthenticated remote attackers to seize control of vulnerable servers. This affects versions from 2017.1 to 2023.11.2, patched in 2023.11.3. Admins are advised to upgrade immediately or … Read more

Critical JetBrains TeamCity On-Premises Flaw Exposes Servers to Takeover – Patch Now

February 7, 2024 at 04:02AM JetBrains warns of critical security flaw (CVE-2024-23917) in TeamCity On-Premises software, allowing unauthenticated attackers to gain administrative control. Users advised to update to version 2023.11.3 or use a security patch plugin. Vulnerability affects versions from 2017.1 to 2023.11.2. No known exploits, but caution urged due to past similar incidents. Key … Read more

JetBrains warns of new TeamCity auth bypass vulnerability

February 6, 2024 at 12:36PM JetBrains has issued a critical security alert, urging customers to patch their TeamCity On-Premises servers to address a vulnerability (CVE-2024-23917) allowing attackers to gain admin privileges through remote code execution attacks. Customers are advised to update to version 2023.11.3 immediately. An earlier flaw (CVE-2023-42793) has been exploited by various threat … Read more

Experts Detail New Flaws in Azure HDInsight Spark, Kafka, and Hadoop Services

February 6, 2024 at 10:10AM Three new security vulnerabilities have been identified in Azure HDInsight’s Apache Hadoop, Kafka, and Spark services, enabling privilege escalation and denial-of-service attacks. Specific flaws include XML External Entity Injection Elevation of Privilege and Java Database Connectivity Injection Elevation of Privilege. Microsoft has released fixes following responsible disclosure. Orca previously found … Read more

Recent SSRF Flaw in Ivanti VPN Products Undergoes Mass Exploitation

February 6, 2024 at 03:15AM A server-side request forgery (SSRF) vulnerability in Ivanti products is being widely exploited, leading to mass attacks from over 170 unique IP addresses. The exploit allows unauthorized access to restricted resources. Security firm Rapid7 released a proof-of-concept exploit, and outdated open-source components in Ivanti VPN appliances pose further security risks. … Read more

Newest Ivanti SSRF zero-day now under mass exploitation

February 5, 2024 at 11:00AM Ivanti Connect Secure and Policy Secure are being exploited through an SSRF vulnerability, tracked as CVE-2024-21893, allowing attackers to bypass authentication and access restricted resources on vulnerable devices. The exploitation volume is significantly high, leading to U.S. CISA’s directive for federal agencies to disconnect and upgrade affected appliances to the … Read more

FritzFrog Botnet Exploits Log4Shell on Overlooked Internal Hosts

February 1, 2024 at 02:52PM The new variant of the botnet “FritzFrog” utilizes Log4Shell to target unpatched internal network assets. Unlike traditional Log4Shell attacks, it spreads through weak SSH passwords and Log4Shell vulnerabilities internally. This sophisticated botnet also exploits CVE-2021-4034 and employs stealth tactics, resulting in over 20,000 attacks since 2020. Mitigation involves strengthening passwords … Read more