MatsurikaGaming, to infosec German
@MatsurikaGaming@troet.cafe avatar

Und jetzt nochmal für alle zum Mitklatschen:

MAN 👏
ZEIGT 👏
MENSCHEN 👏
NICHT 👏
FÜR 👏
DAS 👏
MELDEN 👏
VON 👏
SICHERHEITSLÜCKEN 👏
AN! 👏

Man bedankt sich und fixt seinen Scheiß zeitnah.

Koelnmesse vs IT-Student: Sicherheitsbehörde will ’schlichten‘
https://www.gameswirtschaft.de/gamescom/koelnmesse-gamescom-bsi-sicherheitsluecke-030524/

chiefgyk3d, to infosec
@chiefgyk3d@social.chiefgyk3d.com avatar

Another day, another false positive reported to Tenable... There has got to be a much easier to grab multiple Scan DB files from multiple effected assets. Takes too long to grab just 3 files. I should be able to grab multiple databases at once.

CVE_Program, to Cybersecurity

GNU C Library is now a CVE Numbering Authority (CNA) assigning CVE IDs for security issues & vulnerabilities in the GNU C Library

https://cve.org/Media/News/item/news/2024/02/06/GNU-C-Library-Added-as-CNA

rfwaveio, to Cybersecurity
@rfwaveio@mstdn.ca avatar

Juniper has released software updates to address vulnerabilities in its SRX and EX Series devices. The vulnerabilities are CVE-2024-21619 and CVE-2024-21620, and exist in the J-Web management interface. When exploited, it can allow an attacker to take control of the device. Administrators are advised to patch ASAP.

https://thehackernews.com/2024/01/juniper-networks-releases-urgent-junos.html

rfwaveio, to Cybersecurity
@rfwaveio@mstdn.ca avatar

Fortra is warning of a new vulnerability in GoAnywhere MFT. The vulnerability is tracked as CVE-2024-0204, and when exploited, can allow an unauthorized user to create admin users. The vulnerability affects MFT 6.x and 7.4.0 and earlier. Administrators are advised to patch ASAP.

https://www.bleepingcomputer.com/news/security/fortra-warns-of-new-critical-goanywhere-mft-auth-bypass-patch-now/

CVE_Program, to opensource

Tod Beardsley of Austin Hackers Anonymous has joined the CVE Board. Tod is also currently the CNA Board Liaison.
https://cve.org/Media/News/item/news/2024/01/23/New-CVE-Board-Member-Austin-Hackers-Anonymous

rfwaveio, to Cybersecurity
@rfwaveio@mstdn.ca avatar

Citrix is warning of active exploitation of two zero-day vulnerabilities in its Netscaler ADC and Gateway appliances. The vulnerabilities are tracked as CVE-2023-6548 and CVE-2023-6549, and when exploited, can lead to remote code execution and denial of service. Administrators are advised to not expose management interface to the Internet, and patch ASAP.

https://www.bleepingcomputer.com/news/security/citrix-warns-of-new-netscaler-zero-days-exploited-in-attacks/

CVE_Program, to Cybersecurity

curl is now a CVE Numbering Authority (CNA) assigning CVE IDs for all for all products made and managed by the curl project. This includes curl, libcurl, and trurl.

https://cve.org/Media/News/item/news/2024/01/16/curl-Added-as-CNA

rfwaveio, to Cybersecurity
@rfwaveio@mstdn.ca avatar

Security researchers have revealed two vulnerabilities POST SMTP Mailer WordPress plugin. The more severe vulnerability is tracked as CVE-2023-6875, and when exploited, allows an attacker to take control of the Wordpress installation. Administrators are advised to patch ASAP.

https://www.bleepingcomputer.com/news/security/over-150k-wordpress-sites-at-takeover-risk-via-vulnerable-plugin/

CVE_Program, to opensource

Check out this OpenSSF guide about becoming a Numbering Authority () as an project and why you should consider it. Great stuff!

https://openssf.org/blog/2023/11/27/openssf-introduces-guide-to-becoming-a-cve-numbering-authority-as-an-open-source-project/

rfwaveio, to Cybersecurity
@rfwaveio@mstdn.ca avatar

Fortinet has released software updates to FortiSIEM that addresses a command injection vulnerability. The vulnerability is tracked as CVE-2023-36553, and may allow a remote unauthenticated attacker to execute commands. FortiSIEM 4.7 to 5.4 are affected. Administrators are advised to upgrade ASAP to a fixed version.

https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-command-injection-bug-in-fortisiem/

CVE_Program, to random

New on the CVE Blog:
“CVE Records Keep Getting Better and Better”

An introduction to the new Record format with a real-world example + how this new structured format benefits the worldwide community.

https://medium.com/

rfwaveio, to Cybersecurity
@rfwaveio@mstdn.ca avatar

Mozilla released software patches today to fix a zero-day vulnerability in Firefox and Thunderbird being exploited in the wild. The vulnerability is tracked as CVE-2023-4863, and exists in the WebP image processing library. Exploiting the vulnerability can lead to arbitrary code execution. Users are advised to apply the patches ASAP.

https://www.bleepingcomputer.com/news/security/mozilla-patches-firefox-thunderbird-against-zero-day-exploited-in-attacks/

markuswet, to random German
seanthegeek, to random
greenbone, to greenbone
@greenbone@floss.social avatar

Hi! We have another Community Video :) In this one Joseph Lee from the Greenbone Community demonstrates how to do a quick first scan using the scan wizard to scan a local network IP and go over basic scan report formatting and other features.

https://www.youtube.com/watch?v=MH4vVhHPm4s

wade, to infosec

For two decades, I've heard security professionals urging organizations to "just patch your stuff" as though they don't already know that and/or it's as simple as saying those words. This is where real data and "thought leaders" differ. The data acknowledges that things aren’t so simple in the real world because vulnerability remediation is a moving target (new vulns are found as old ones are fixed).

We measured the remediation capacity of hundreds of organizations over a 12-month period. To do this, we calculated the total number of open (unremediated) vulnerabilities in the environment and the total number closed each month. We then averaged that over the active timeframe to get a monthly open-to-closed ratio for each organization and created a log-log regression model. The results are recorded in the figure below, where each organization is plotted along the grid. And those results are INSANE!

The R2 statistic for this log-log regression model is 0 .93, meaning that it’s very strong and captures most of the variability around vulnerability closure rates. You can see this visually in the figure because all the points—which represent the remediation capacity for each firm—fit tightly along the regression line.

Strong models are great, but there’s something else we learned that’s greater still. Notice first that each axis is presented on a log scale, increasing by multiples of 10. Now, follow the regression line from the bottom left to upper right . See how every tenfold increase in open vulnerabilities is met with a roughly tenfold increase in closed vulnerabilities?

That, in a nutshell, is why it feels like your vulnerability management program always struggles to keep up. And why "just patch it, stupid" is ignorant and unhelpful advice. A typical organization will have the capacity to remediate about one out of every 10 vulnerabilities in their environment within a given month. That seems to hold true for firms large, small, and anywhere in between.

So is there no hope? Are vulnerability management programs destined to slowly drown in a quagmire of their own making? No! We did observe organizations that managed to drive down risky vulns in their environment over time...but that's another story for another post. Follow / stay tuned for their secret (hint: it doesn't require buying a product).


This chart comes from Prediction to Prioritization, Volume 3 - a joint study published 4 years ago between @cyentiainst and Kenna Security (now Cisco). You can view it for free here: https://learn-cloudsecurity.cisco.com/vulnerability-management-resources/vmc/prioritization-to-prediction-volume-3


wade, to random

Did you know that following the advice of several security standards to remediate all vulnerabilities with a CVSS score of 7 or above would barely address half of those known to be exploited and almost 70% of that effort would be wasted on things that don't represent real risk right now?

Seem impossible to believe? Check our math in Prioritization to Prediction, Volume 1: https://lnkd.in/eyKzzX25


Coverage measures the completeness of remediation. Of all vulnerabilities that should be remediated, what percentage was correctly identified for remediation?

Efficiency measures the precision of remediation. Of all vulnerabilities identified for remediation, what percentage should have been remediated?

goncalor, to random

Does anyone have a way to remotely confirm the service running on port 1801 is ? I've tested and it seems it cannot identify the service.

goncalor,

I've managed to figure out a packet that if sent to a server results in a response that can be fingerprinted.

If you send this packet and the response contains LIOR and a bunch of ZZZZ this indicates the service is probably MSMQ.

I can't guarantee this works for all versions, but it works at least for recent ones.

I'm going to try to write a service probe for this service.

echo -ne '\x10\x00\x0b\x00\x4c\x49\x4f\x52\x3c\x02\x00\x00\xff\xff\xff\xff\x00\x00\x02\x00\x06\x55\x3d\x51\x36\xdf\xc7\x40\x96\x43\x17\x5c\x3c\xe7\x6c\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' | ncat -v 127.0.0.1 1801 | hd

goncalor,

@VitorHSSousa and myself have developed a service probe to identify whether a service on port 1801 is .

I've just published it on the URL below. We can't guarantee this will successfully detect every version, but we've tested with a few Windows Server and non-server versions and it seems to work across at least recent ones.

We hope this helps defenders identify exposed MSMQ so they can mitigate the risk from .

https://gist.github.com/goncalor/a01ba66927c0dc704000d7bf1327d36e

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • rosin
  • thenastyranch
  • ethstaker
  • DreamBathrooms
  • osvaldo12
  • magazineikmin
  • tacticalgear
  • Youngstown
  • everett
  • mdbf
  • slotface
  • ngwrru68w68
  • kavyap
  • provamag3
  • Durango
  • InstantRegret
  • GTA5RPClips
  • tester
  • cubers
  • cisconetworking
  • normalnudes
  • khanakhh
  • modclub
  • anitta
  • Leos
  • megavids
  • lostlight
  • All magazines