Plus récents

(CVE-2021-22156) BlackBerry QNX Real Time Operating System (RTOS) is affected by a « BadAlloc » vulnerability. A remote attacker could exploit it to cause a Denial-of-Service (DoS) condition or execute arbitrary code (RCE) on affected devices

us-cert.cisa.gov/ncas/alerts/a

said that « it's a non-issue and they will not fix it » then, after further analysis, had decided to take this EoP problem seriously

threatpost.com/windows-eop-bug

TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot and keylog callback data, which allows you to tweak the fix for the « HotCobalt » vulnerability

blog.cobaltstrike.com/2021/08/

Charlie Bromberg's mindmap for common attacks operated on Active Directory authentication protocols (NTLM, Kerberos) : Pass-the-hash, Pass-the-key, Pass-the-ticket, Pass-the-cache, Overpass-the-hash, Golden ticket, Silver ticket, ASPREProast, Kerberoast, relayed captured,..

thehacker.recipes/

(CVE-2020-29015) An OS command injection vulnerability in FortiWeb's management interface (version 6.3.11 and prior) can allow a remote, authenticated attacker to execute arbitrary commands on the system, via the SAML server configuration page

rapid7.com/blog/post/2021/08/1

(CVE-2021-28372) Critical Vulnerability That Affects Millions of internet-of-things () that use the ThroughTek « Kalay » network - one that exposes live video and audio streams to eavesdropping threat actors and which could enable attackers to take over control of devices, including security webcams and connected baby monitors

fireeye.com/blog/threat-resear

(CVE-2021-21832) Memory corruption vulnerability in Daemon Tools Pro can cause memory corruption in the application if the user opens an adversary-created ISO file that causes an integer overflow. This vulnerability exists in the way the application parses ISOs.

blog.talosintelligence.com/202

Multiple Issues in Realtek SDK Affects Hundreds of Thousands of Devices Down the Chain : At least 65 vendors affected by severe vulnerabilities that enable unauthenticated attackers to fully compromise the target device and execute arbitrary code with the highest level of privilege. chipsets are found in many embedded in the IoT space. RTL8xxx SoCs – which provide capabilities – are very common.

  • CVE-2021-35392 ( Simple Config’ stack buffer overflow via UPnP)
  • CVE-2021-35393 (WiFi Simple Config’ heap buffer overflow via SSDP)
  • CVE-2021-35394 (MP Daemon diagnostic tool command injection)
  • CVE-2021-35395 (management web interface multiple vulnerabilities

iot-inspector.com/blog/advisor

(CVE-2021-34473) Finding exposed OWA servers vulnerable to proxyshell - A new set of critical vulnerabilities popped-up at this year's BlackHat edition regarding Exchange exploitable via Outlook Web Access. This set of vulnerabilities as been dubbed proxyshell

onyphe.io/blog/finding-exposed

PetitPotam code have been updated to use one unpatched Encrypting File System Remote (EFSRPC) functions if needed + added the structs and nearly all RPC calls that can be used to elicit authentication or do other interesting thing

github.com/topotam/PetitPotam

Last month, security researcher 🇫🇷 GILLES Lionel disclosed a new method called PetitPotam that forces a Windows machine, including a domain controller, to authenticate against a threat actor's malicious NTLM relay server using the Microsoft Encrypting File System Remote Protocol (EFSRPC). This weekend, 🇺🇸 Craig Kirby shared a NETSH RPC filter that blocks remote access to the MS-EFSRPC API, effectively blocking the unauthenticated PetitPotam attack vector. According to security researcher 🇫🇷 Benjamin Delpy, you can use this filter by copying the following contents [...] 's response to recent vulnerabilities, such as PetitPotam, SeriousSAM, and PrintNightmare have been very concerning for security researchers who feel that Microsoft is not doing enough to protect its customers

bleepingcomputer.com/news/micr

PwnedPiper : 9 vulnerabilities in critical infrastructure used by 80% of major hospitals in North America. Swisslog's Translogic Pneumatic Tube System (PTS), a solution that plays a crucial role in patient , found vulnerable to devastating attack. This research sheds light on systems that are hidden in plain sight but are nevertheless a crucial building block to modern-day . Understanding that patient care depends not only on , but also on the operational of a is an important milestone to securing healthcare environments.

armis.com/research/pwnedpiper

Velociraptor - Windows.NTFS.MFT.HiveNightmare : This artifact uses Windows.NTFS.MFT to find several files created as part of the POC tooling for « HiveNightmare » (CVE-2021-36934)

docs.velociraptor.app/exchange

Plus anciens