The Holiday Season is Upon Us, and So Too Are a New Wave of Cyber Attacks and Threats
In this edition of Cyderes Intel, we’re arming you with the biggest takeaways from November 2024, and how to continue to maintain your organization's cybersecurity posture in 2025.
TOP CYBERSECURITY TRENDS OF 2025
Based on current developments and emerging technologies, we've compiled some cybersecurity predictions for 2025.
Article contributed by George Innes
Increased Use of Artificial Intelligence (AI) and Machine Learning (ML)
Quantum Computing and Post-Quantum Encryption
Zero Trust Architecture (ZTA)
Supply Chain Security
IoT and 5G Security
Ransomware and Extortion
Cloud Security
These trends will likely shape the cybersecurity landscape in 2025 and beyond.
Organizations must stay informed about these developments, and adapt their security strategies to protect themselves from emerging cyber threats.
SOC CONVOS: NATIONAL VULNERABILITY DATABASE
The National Vulnerability Database (NVD) is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP).
This data enables the automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security related software flaws, misconfigurations, product names, and impact metrics.??
?
Critical Vulnerabilities
CVE-2024-42327 (Base Score: 9.9)
Description: A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
References:?https://support.zabbix.com/browse/ZBX-25623
…
CVE-2024-42330 (Base Score: 9.1)
Description: The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects.
References:?https://support.zabbix.com/browse/ZBX-25626
?
High Vulnerabilities
CVE-2024-52323 (Base Score: 8.1)
Description: Zohocorp ManageEngine Analytics Plus versions below 6100 are vulnerable to authenticated sensitive data exposure which allows the users to retrieve sensitive tokens associated to the org-admin account.
…
CVE-2024-36467 (Base Score: 7.5)
Description: An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.
References:?https://support.zabbix.com/browse/ZBX-25614
…
CVE-2024-11667 (Base Score: 7.5)
Description: A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL.
…
CVE-2024-52323 (Base Score: 7.5)
Description: Zohocorp ManageEngine Analytics Plus versions below 6100 are vulnerable to authenticated sensitive data exposure which allows the users to retrieve sensitive tokens associated to the org-admin account.
…
CVE-2024-53603 (Base Score: 7.3)
Description: A SQL Injection vulnerability was found in /covid-tms/password-recovery.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the contactno POST request parameter.
Thank you for being part of our cybersecurity community!
Please leave your comments and share this knowledge with your network.
Together, we can stay one step ahead of the cyber threats we all face.
To our secure future,
The Cyderes Team