Patch Tuesday: Critical Flaws in Adobe Commerce, Photoshop, InDesign, Illustrator

Adobe patches critical-severity bugs in multiple products, including the Adobe Commerce and Magento Open Source platforms.

The post Patch Tuesday: Critical Flaws in Adobe Commerce, Photoshop, InDesign, Illustrator appeared first on SecurityWeek.

SecurityWeek – ​Read More

Surge in exploits of zero-day vulnerabilities is ‘new normal’ warns Five Eyes alliance

In a co-authored advisory, the agencies list the top 15 most routinely exploited vulnerabilities of 2023, with CVE-2023-3519 — an issue affecting Citrix’s networking product NetScalers — being the most widely used.

The Record from Recorded Future News – ​Read More

Citrix ‘Recording Manager’ Zero-Day Bug Allows Unauthenticated RCE

The unpatched security vulnerability, which doesn’t have a CVE yet, is due to an exposed Microsoft Message Queuing (MSMQ) instance and the use of the insecure BinaryFormatter.

darkreading – ​Read More

GitLoker Strikes Again: New “Goissue” Tool Targets GitHub Developers and Corporate Supply Chains

GoIssue is a new tool for cybercriminals that allows attackers to extract email addresses from GitHub profiles and send bulk emails to users.

The post GitLoker Strikes Again: New “Goissue” Tool Targets GitHub Developers and Corporate Supply Chains appeared first on SecurityWeek.

SecurityWeek – ​Read More

The Power of the Purse: How to Ensure Security by Design

CISA should make its recommended goals mandatory and perform audits to ensure compliance.

darkreading – ​Read More

Bitdefender vs. Malwarebytes: Which antivirus is best?

Bitwarden offers feature-rich antivirus at a competitive price, while Malwarebytes focuses on protection against malware. Here’s how to decide between the two.

Latest stories for ZDNET in Security – ​Read More

Ahold Delhaize Cybersecurity Incident Impacts Giant Food, Hannaford

Cybersecurity incident impacts Giant Food, Hannaford, and other Ahold Delhaize USA brands, including pharmacies and e-commerce services.

The post Ahold Delhaize Cybersecurity Incident Impacts Giant Food, Hannaford appeared first on SecurityWeek.

SecurityWeek – ​Read More

New GitLoker-Linked GoIssue Tool Targets GitHub Users for Phishing

SlashNext researchers have discovered a new, sophisticated phishing tool GoIssue targeting GitHub developers. Learn about its capabilities, the…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

HPE Aruba Access Points have Critical Command Injection Vulnerabilities

Vulnerabilities

Overview

Hewlett Packard Enterprise (HPE) Aruba Networking has identified multiple critical security vulnerabilities affecting its Access Points running Instant AOS-8 and AOS-10.

The vulnerabilities, tracked under several CVEs including CVE-2024-42509 and CVE-2024-47460, could allow unauthenticated attackers to remotely execute commands on the device, potentially compromising the underlying operating system. HPE has issued patches to address these issues, and users are urged to upgrade as soon as possible.

These vulnerabilities impact widely deployed HPE Aruba Access Points and pose significant risks to network security, with certain devices remaining unpatched due to their end-of-maintenance (EoM) status.

Vulnerabilities Summary

  • Advisory ID: HPESBNW04722
  • CVE IDs:
    • CVE-2024-42509
    • CVE-2024-47460
    • CVE-2024-47461
    • CVE-2024-47462
    • CVE-2024-47463
    • CVE-2024-47464

  • Severity: Critical to Medium
  • Affected Software Versions:
    • AOS-10.4.x.x: Versions up to 10.4.1.4
    • Instant AOS-8.12.x.x: Versions up to 8.12.0.2
    • Instant AOS-8.10.x.x: Versions up to 8.10.0.13

  • Unaffected Products: HPE Aruba Mobility Conductor, Mobility Controllers, SD-WAN Gateways, and InstantOn Access Points

Detailed Breakdown of Vulnerabilities

  1. CVE-2024-42509: Unauthenticated Command Injection via PAPI Protocol
    • Impact: Allows unauthenticated remote attackers to execute arbitrary commands as a privileged user via specially crafted packets sent to Aruba’s PAPI (UDP port 8211).
    • Severity: Critical (CVSS 9.8)
    • Mitigation: For Instant AOS-8, enabling cluster security via the cluster-security command can prevent exploitation. For AOS-10 devices, network administrators should block UDP/8211 from untrusted networks.

  2. CVE-2024-47460: Command Injection via CLI Service through PAPI Protocol
    • Impact: Similar to CVE-2024-42509, this vulnerability allows command injection by sending packets to the PAPI protocol, leading to unauthorized command execution.
    • Severity: Critical (CVSS 9.0)
    • Mitigation: Enabling cluster security for Instant AOS-8 or restricting access to UDP/8211 for AOS-10.

  3. CVE-2024-47461: Authenticated Remote Command Execution (RCE)
    • Impact: An authenticated attacker could execute commands with elevated privileges on affected devices, compromising the underlying OS.
    • Severity: High (CVSS 7.2)
    • Mitigation: Restrict CLI and web-based management to a dedicated VLAN and firewall policies to limit access.

  4. CVE-2024-47462 and CVE-2024-47463: Authenticated Arbitrary File Creation Leading to RCE
    • Impact: Authenticated attackers can create arbitrary files, potentially leading to remote code execution.
    • Severity: High (CVSS 7.2)
    • Mitigation: Limit access to the CLI and web-based management interfaces as described for CVE-2024-47461.

  5. CVE-2024-47464: Authenticated Path Traversal
    • Impact: Allows attackers with valid credentials to copy arbitrary files to a readable location, leading to potential unauthorized access to sensitive files.
    • Severity: Medium (CVSS 6.8)
    • Mitigation: Restrict access to management interfaces to secure segments and implement firewall policies.

Mitigations and Recommendations

HPE Aruba has released patches for the impacted AOS-8 and AOS-10 versions to mitigate these vulnerabilities. Users should upgrade to the latest available versions immediately to secure their systems:

  • AOS-10.7.x.x: 10.7.0.0 and above
  • AOS-10.4.x.x: 10.4.1.5 and above
  • Instant AOS-8.12.x.x: 8.12.0.3 and above
  • Instant AOS-8.10.x.x: 8.10.0.14 and above

Additional Recommendations:

  • Enable Cluster Security: For AOS-8 devices, enabling cluster security via the cluster-security command can effectively mitigate certain command injection vulnerabilities.
  • Restrict Access to Management Ports: For AOS-10 devices, block PAPI protocol (UDP port 8211) from untrusted networks to limit potential attack vectors.
  • Network Segmentation: Segregate management interfaces on a dedicated VLAN and enforce strict access control policies using firewall rules.
  • Regular Monitoring: Conduct regular vulnerability assessments and monitor system logs for unusual activity.

Devices Not Receiving Patches

Some affected software versions have reached their end-of-maintenance (EoM) status and will not receive updates. This includes versions AOS-10.3.x.x and below, as well as Instant AOS-8.11.x.x and older.

For these devices, HPE recommends isolating them from untrusted networks or replacing them with supported models.

Conclusion

The critical vulnerabilities in HPE Aruba Networking’s Instant AOS-8 and AOS-10 software call for urgent patching. By promptly applying these updates and enforcing network access controls, organizations can significantly reduce the risk of unauthorized command execution and data breaches. For legacy devices beyond maintenance, adopting network isolation and considering device upgrades are key steps toward minimizing potential exposure.

Sources:

https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04722en_us&docLocale=en_US

The post HPE Aruba Access Points have Critical Command Injection Vulnerabilities appeared first on Cyble.

Blog – Cyble – ​Read More

Form I-9 Compliance Data Breach Impacts Over 190,000 People

The impact of a data breach suffered by Form I-9 Compliance is growing, with the number of affected individuals reaching 190,000.

The post Form I-9 Compliance Data Breach Impacts Over 190,000 People appeared first on SecurityWeek.

SecurityWeek – ​Read More