LLMs Are a New Type of Insider Adversary
The inherent intelligence of large language models gives them unprecedented capabilities like no other enterprise tool before.
darkreading – Read More
The inherent intelligence of large language models gives them unprecedented capabilities like no other enterprise tool before.
darkreading – Read More
Splunk has released patches for multiple vulnerabilities in Splunk Enterprise, including two high-severity remote code execution flaws.
The post Splunk Enterprise Update Patches Remote Code Execution Vulnerabilities appeared first on SecurityWeek.
SecurityWeek – Read More
Nearly half of respondents blamed remote work for these incidents.
Security | TechRepublic – Read More
On September 10, 2024, a critical vulnerability, CVE-2024-45409, was identified by ahacker1 of SecureSAML. The vulnerability was then patched in the Ruby-SAML library, which is widely used for implementing SAML (Security Assertion Markup Language) authorization.
This flaw affects Ruby-SAML versions up to 1.12.2 and between 1.13.0 and 1.16.0 and stems from an incorrect XPath selector that prevents the proper verification of the SAML Response signature. An unauthenticated attacker with access to a signed SAML document from a legitimate identity provider (IdP) can exploit this vulnerability by forging a SAML Response or Assertion. This allows the attacker to bypass the authentication mechanism and potentially gain unauthorized access to sensitive data and critical systems.
SAML is widely used in web applications, especially those that implement Single Sign-On (SSO) mechanisms for user authentication across different platforms or services. It is also used in multiple versions of GitLab Community Edition (CE) and Enterprise Edition (EE).
On September 17, 2024, GitLab issued an important update to address the critical vulnerability identified in the Ruby-SAML library. This update impacts multiple versions of GitLab Community Edition (CE) and Enterprise Edition (EE), specifically those released prior to 17.3.3, 17.2.7, 17.1.8, 17.0.8, and 16.11.10. Users are strongly encouraged to upgrade to these patched versions to protect from potential exploitation of this vulnerability.
Following GitLab’s patch, researchers from ProjectDiscovery provided a detailed analysis of the SAML vulnerability and demonstrated how it could be exploited to gain unauthorized access to GitLab accounts. The figure below shows the video demonstration of POC gaining unauthorized access to a GitLab account.
Amid these findings, Cyble Global Sensor Intelligence (CGSI) identified a scanning attempt associated with CVE-2024-45409.
On October 8, 2024, Cyble Global Sensor Intelligence (CGSI) identified attempts to exploit the newly disclosed vulnerability, CVE-2024-45409. Analysis of the detected URL patterns suggests that threat actors may be actively scanning for vulnerable GitLab accounts to exploit this particular flaw. This activity suggests a possible ongoing campaign aimed at exploiting CVE-2024-45409, potentially involving systematic probing of GitLab instances to identify entry points.
Authentication bypass
CVSSv3.1
9.8
Severity
Critical
Vulnerable Software Versions
Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0
Description
The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as an arbitrary user within the vulnerable system.
SAML is a widely adopted protocol for exchanging authentication and authorization data between identity providers (IdPs) and service providers (SPs). A vital aspect of securing this exchange is verifying data integrity and authenticity through digital signatures and digest verification.
CVE-2024-45409 introduces a vulnerability that enables attackers to circumvent the signature validation process, provided they obtain the SAML Response issued by the identity provider. An attacker with access to any signed SAML document can forge a SAML Response or Assertion by inserting their own digest value within the samlp:extensions element. This alteration tricks the XPath parser, causing it to extract the smuggled DigestValue from the samlp:extensions element rather than the one in the SignedInfo block.
As a result, the attacker bypasses the signature verification, enabling them to authenticate their own forged assertion and effectively bypass the authentication mechanism.
CVE-2024-45409 presents a significant risk in the Ruby-SAML library. It enables attackers to forge SAML Responses and gain unauthorized access to systems due to inadequate verification of the SAML Response signature. This vulnerability highlights the urgent need for action, particularly as GitLab, a widely used platform, is especially susceptible to this issue. Furthermore, the recent detection of exploitation attempts by CGSI further underscores the severity of this threat.
GitLab advises self-managed users to implement two mitigation measures to lessen the risk of exploitation:
Enable two-factor authentication for all user accounts on the self-managed GitLab instance. (Note: Activating multi-factor authentication on the identity provider does not address this vulnerability.)
Disable the SAML two-factor bypass option within GitLab.
Update the Ruby-SAML library to the latest version, where the vulnerability has been patched.
Ensure multi-factor authentication (MFA) is enabled on your accounts to add an extra layer of security.
Organizations should conduct regular security awareness and information security training for employees.
https://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass
https://github.com/advisories/GHSA-jw9c-mfg7-9rx2
https://about.gitlab.com/releases/2024/09/17/patch-release-gitlab-17-3-3-released
The post Active Exploitation of SAML Vulnerability CVE-2024-45409 Detected by Cyble Sensors appeared first on Cyble.
Blog – Cyble – Read More
Automattic has rolled out updates for 101 Jetpack versions released over the past eight years to resolve a critical vulnerability.
The post Critical Vulnerability Patched in 101 Releases of WordPress Plugin Jetpack appeared first on SecurityWeek.
SecurityWeek – Read More
Bots that “remove clothes” from images have run rampant on the messaging app, allowing people to create nonconsensual deepfake images even as lawmakers and tech companies try to crack down.
Security Latest – Read More
Global Intelligence claims its Cybercheck technology can help cops find key evidence to nail a case. But a WIRED investigation reveals the smoking gun often appears far less solid.
Security Latest – Read More
Intel and AMD respond to new attack methods named TDXDown and CounterSEVeillance that can be used against TDX and SEV technology.
The post New CounterSEVeillance and TDXDown Attacks Target AMD and Intel TEEs appeared first on SecurityWeek.
SecurityWeek – Read More
Entry points in packages across multiple programming languages are susceptible to exploitation in supply chain attacks.
The post Open Source Package Entry Points May Lead to Supply Chain Attacks appeared first on SecurityWeek.
SecurityWeek – Read More
Cyble researchers have identified high-priority vulnerabilities in products from Ivanti, Microsoft, Qualcomm, Zimbra, and the Common Unix Printing System (CUPS).
Microsoft’s Patch Tuesday included five new zero-day vulnerabilities, two of which are being actively exploited – and Cyble researchers have observed threat actors discussing the other three zero-days on cybercrime forums.
Cyble also detected 14 vulnerability exploits discussed on dark web forums, suggesting that they may soon be under attack, if not already.
Cyble Research and Intelligence Labs (CRIL) investigated 22 vulnerabilities during the week of Oct. 2-8 and identified six products that security teams should prioritize for patching and mitigation.
Additionally, Cyble researchers detected 14 vulnerabilities and exploits shared on cybercrime forums that security analysts should also prioritize – including the three Microsoft zero-days not yet under active exploitation.
Cyble’s weekly IT vulnerability report covering the period of Oct. 2-8 also offered best practices that all security teams should follow.
CRIL researchers identified eight vulnerabilities in six products that security teams should prioritize; three affect Ivanti Cloud Services Appliances (CSA).
These three critical vulnerabilities impact Ivanti Cloud Services Appliance (CSA), an internet appliance designed to facilitate secure communication and management of devices over the internet. It serves as a bridge between the core server and managed devices, enabling them to communicate even when they are behind firewalls or using proxies.
CVE-2024-9379 is an SQL injection flaw that a remote authenticated attacker with admin privileges can trigger. CVE-2024-9380 is an OS command injection vulnerability that allows a remote authenticated attacker with admin privileges to achieve remote code execution. CVE-2024-9381 is a path traversal vulnerability that allows a remote authenticated attacker with admin privileges to bypass restrictions. In a recent advisory, Ivanti disclosed attackers’ exploitation of CVE-2024- 9379, CVE-2024-9380, or CVE-2024-9381, chained with CVE-2024-8963. CISA also issued an advisory urging security teams to patch the flaws.
This vulnerability impacts the Common Unix Printing System, an open-source printing system designed for Linux and other Unix-like operating systems, providing a standardized framework for managing and controlling printers, enabling computers to act as print servers that accept print jobs from client machines, process them, and send them to the appropriate printer. Recently, researchers disclosed that threat actors can exploit vulnerabilities to launch distributed denial-of-service (DDoS) attacks with a 600x amplification factor. Under certain conditions, attackers can chain the set of vulnerabilities in multiple components of CUPS to execute arbitrary code remotely on vulnerable machines. Cyble researchers had warned about the CUPS vulnerability the previous week and reiterated the warning as new exploits emerged.
This 9.8-severity vulnerability impacts Zimbra Collaboration Suite (ZCS), an integrated communication and collaboration platform designed for businesses and organizations, integrating various tools for email, calendaring, contact management, and document sharing. Unauthenticated users can exploit the flaw to execute commands. Recently, researchers disclosed that attackers are actively exploiting the RCE vulnerability that can be triggered simply by sending specially crafted emails with commands to execute in the CC field, which are then executed when the postjournal service processes the email. Cyble researchers also observed multiple discussions of the vulnerability on the dark web (see Dark Web section below).
This zero-day vulnerability in the Digital Signal Processor (DSP) service that impacts dozens of Qualcomm chipsets can also be leveraged in spyware campaigns targeting Android devices. Cyble published a report and has highlighted the exploitation of CVE-2024-43047 in targeted attacks. OEMs are encouraged to apply the provided patches immediately. Users concerned about their devices should reach out to manufacturers for specific patch details.
Microsoft’s October 2024 Patch Tuesday included security updates for 118 flaws, including five publicly disclosed zero-days, two of which are being actively exploited: CVE-2024-43572, a Remote Code Execution vulnerability in Windows Management Console, and CVE-2024-43573, a spoofing vulnerability in the Windows MSHTML Platform.
Cyble researchers observed cybercrime exploit discussions on the other zero days reported by Microsoft (see Dark Web section below): CVE-2024-38200, a Microsoft Office Spoofing vulnerability; CVE-2024-29050, a Remote Code Execution (RCE) flaw in Windows 10 for x32- and x64-based Systems; and CVE-2024-6769, a Privilege Escalation vulnerability in Windows 10, Windows 11 – 10.0.0, Windows Server 2016, Windows Server 2019 – 10.0.0.
CRIL observed multiple Telegram channels and cybercrime forums sharing or discussing exploits weaponizing different vulnerabilities. The vulnerabilities under discussion included:
CVE-2024-38200: A critical vulnerability affecting multiple versions of Microsoft Office that arises from improper handling of certain document properties within Microsoft Office applications. It could potentially expose sensitive information such as NTLM hashes.
CVE-2024-29050: A Windows Cryptographic Services Remote Code Execution (RCE) vulnerability that arises from truncation errors that occur when a primitive data type is cast to a smaller size, resulting in potential data loss during conversion.
CVE-2024-6769: A vulnerability affecting multiple versions of Microsoft Windows, including Windows 10, Windows 11, and various Windows Server editions. The vulnerability exploits a combination of DLL Hijacking and Activation Cache Poisoning, allowing an attacker to elevate privileges from a medium to a high-integrity process without triggering a User Account Control (UAC) prompt.
CVE-2024-7479: A critical security vulnerability affecting TeamViewer’s Remote Client and Remote Host products for Windows. The vulnerability arises from improper verification of cryptographic signatures during the installation of VPN drivers, allowing attackers with local, unprivileged access to escalate their privileges and execute arbitrary code.
CVE-2024-7481: A critical security vulnerability affecting TeamViewer’s Remote Client and Remote Host products for Windows. The vulnerability arises from improper verification of cryptographic signatures during the installation of printer drivers, allowing attackers with local, unprivileged access to escalate their privileges and execute arbitrary code.
CVE-2024-36435: A critical vulnerability in the Baseboard Management Controller (BMC) firmware of several Supermicro enterprise products. The vulnerability allows unauthenticated attackers to exploit a buffer overflow, leading to remote code execution (RCE).
CVE-2024-38816: A high-severity path traversal vulnerability discovered in the Spring Framework and VMWare Tanzu Spring platform, affecting multiple versions. This vulnerability allows attackers to exploit improper handling of static resources, potentially gaining unauthorized access to sensitive files on the server.
CVE-2024-45519: Proofs of Concept (PoCs) of this widely reported Zimbra vulnerability are shared on multiple Telegram channels. It is a critical Remote Code Execution (RCE) vulnerability that was discovered in the postjournal service of the Zimbra Collaboration Suite, a widely used email and collaboration platform.
CVE-2024-45409: A critical vulnerability affecting the Ruby SAML and OmniAuth SAML libraries. This flaw allows unauthenticated attackers to bypass Security Assertion Markup Language (SAML) authentication mechanisms by exploiting weaknesses in the signature verification process of SAML responses. Cyble honeypot sensors detected active attacks on this vulnerability.
CVE-2024-26304: A critical vulnerability affecting HPE Aruba Devices, classified as an unauthenticated buffer overflow vulnerability in the L2/L3 Management Service accessed via the PAPI Protocol. The vulnerability allows attackers to send specially crafted packets to the PAPI UDP port (8211), potentially enabling them to execute arbitrary code as a privileged user on the affected system.
CVE-2024-5830: A critical security vulnerability was discovered in Google Chrome’s V8 JavaScript engine, affecting versions prior to 126.0.6478.54. This vulnerability is a type confusion bug, which an attacker can exploit to execute arbitrary code within the Chrome renderer sandbox simply by enticing a victim to visit a malicious website.
CVE-2024-44193: This is a vulnerability affecting Apple iTunes for Windows, specifically versions prior to 12.13.3. The vulnerability allows local attackers to elevate their privileges on affected systems, posing significant security risks.
CVE-2024-8275: A threat actor (TA) shared a PoC on a forum for a critical SQL injection vulnerability discovered in the Events Calendar Plugin for WordPress. The vulnerability affects all versions up to and including 6.6.4 and arises from insufficient input validation in specific functions.
CVE-2024-43363: A TA on a forum shared a PoC for a high-severity vulnerability affecting Cacti, a fault management framework. The vulnerability allows attackers to exploit the system remotely, potentially compromising sensitive data and system integrity.
To protect against these vulnerabilities and exploits, organizations should implement the following best practices:
To mitigate vulnerabilities and protect against exploits, regularly update all software and hardware systems with the latest patches from official vendors.
Develop a comprehensive patch management strategy that includes inventory management, patch assessment, testing, deployment, and verification. Automate the process where possible to ensure consistency and efficiency.
Divide your network into distinct segments to isolate critical assets from less secure areas. Use firewalls, VLANs, and access controls to limit access and reduce the attack surface exposed to potential threats.
Create and maintain an incident response plan that outlines procedures for detecting, responding to, and recovering from security incidents. Regularly test and update the plan to ensure its effectiveness and alignment with current threats.
Implement comprehensive monitoring and logging solutions to detect and analyze suspicious activities. Use SIEM (Security Information and Event Management) systems to aggregate and correlate logs for real-time threat detection and response.
Subscribe to security advisories and alerts from official vendors, CERTs, and other authoritative sources. Regularly review and assess the impact of these alerts on your systems and take appropriate actions.
Conduct regular vulnerability assessment and penetration testing (VAPT) exercises to identify and remediate vulnerabilities in your systems. Complement these exercises with periodic security audits to ensure compliance with security policies and standards.
These vulnerabilities highlight the urgent need for security teams to prioritize patching critical vulnerabilities in major products. With increasing discussions of these exploits on dark web forums, organizations must stay vigilant and proactive. Implementing strong security practices is essential to protect sensitive data and maintain system integrity.
The post Weekly IT Vulnerability Report: Cyble Urges Fixes for Ivanti, Microsoft Dark Web Exploits appeared first on Cyble.
Blog – Cyble – Read More