Latest Common Vulnerabilities & Exploits
Vulnerability of the Week
This vulnerability is slightly different, as it looks at how an active team of Cybercriminals have accidently shared personal information about their identity. 8Base, a rising cyber criminal group, were caught out through a verbose error message displayed on a chat service operated by the Laravel web application framework.
Who are 8Base?: 8Base were responsible for contributing to a 25% rise in ransomware attacks this May, and consider themselves simple pen-testers that call out companies that are neglecting their employees and clients privacy.
Tagline: ‘YOUR DATA IS NOT SAFE’
Activity from: They formed in 2022, but showed a spike of activity in May/June of 2023.
Fancy learning more?: They have a twitter page called @8BASEHOME they regularly update!
References: KrebsOnSecurity and CyberNews have been brilliant for information and references on this topic, and offer further details on the technicalities of the attack.
Zero day Round-Up
To address the significant number of zero-days released last week from well-known software vendors, we decided to look at the bigger picture as to how much zero-days have affected the cyber security industry this year.
What is a zero-day?: A zero-day refers to a security risk that is unknown to the vendors and the public, that hackers discover.
Timeline: A zero-day is discovered. This may be by a bug bounty hunter who will report the vulnerability to the vendor, or by a hacker that may choose to exploit it. It then takes around 2 weeks for the vulnerability to be made public (on a typical timeline!), and a further 60-120~ days for the vendor to patch it. (Source – Microsoft)
·?????? Zero day exploits account for 3% of all cybersecurity threats. (Source – IBM)
·?????? 76% of applications have vulnerabilities, which could be a result of 97% of developers using open-source libraries, most of which host codes with unknown exploits and vulnerabilities. (Source – Veracode)
The TARGET of the week
NVIDIA: A US Based Technology Company
NVIDIA DGX H100 BMC – Improper authentication issue (CVE-2023-31015)
NVIDIA Geoforce for Android – Information disclosure, Denial of Service, Code Execution (CVE-2023-31014)
NVIDIA DGX H100 BMC – Improper input validation (CVE-2023-31013, CVE-2023-31012, CVE-2023-31011, CVE-2023-31010, CVE-2023-31009, CVE-2023-25534, CVE-2023-25533, CVE-2023-25530)
NVIDIA DGX H100 BMC – Insufficient protection of credentials (CVE-2023-25532, CVE-2023-25531)
NVIDIA DGX H100 BMC – Leak of a session token (CVE-2023-25529)
NVIDIA DGX H100 BMC – Vulnerable web server plug-in (CVE-2023-25528)
NVIDIA DGX H100 BMC – Possible corruption of Kernel memory (CVE-2023-25527)
NVIDIA Cumulus Linux – Crafted packet injection on an adjacent network (CVE-2023-25526)
NVIDIA Cumulus Linux – Incorrect packet forwarding (CVE-2023-25525)
That’s 17 CVEs!..
Ones to watch…
·?????? Microsoft (Chromium): Elevation of privilege vulnerability. (CVE-2023-36562, CVE-2023-36735)
·?????? WithSecure: Infinite loop in a scanning engine via unspecified file type. (CVE-2023-42524)
·?????? CISA: Incorrect management of a session means credentials can be accessed remotely through the user management section. (CVE-2023-39452)
·?????? Glib (GNOME): Denial of Service vulnerability through a slowdown issue where excessive processing can occur (CVE-2023-32665). Also affected the resolution to CVE-2023-29499, where additional input validation was added that can cause DoS.
·?????? WS Facebook Like Box Widget (WordPress plugin): Insufficient input sanitisation has left versions vulnerable to stored XSS. (CVE-2023-4963)
·?????? I-doit (IT management software): Specific versions were found to be configured with insecure default administrator credential, and lack a strong password policy. (CVE-2023-37756, CVE-2023-37755)
·?????? Super Store Finder PHP Script v.3.6: A critical (9.8!) SQL vulnerability through a payload to the username parameter. (CVE-2023-38912)
·?????? Razer Synapse: Specific versions allow for privilege escalation due to improper management and unsafe installation path. (CVE-2023-47631)
·?????? Froala Editor V4.0.1 to v.4.1.1: Reported to have an XSS vulnerability. (CVE-2023-41592)
Have any questions? Need expert advice? Contact us today and find out more.