This week saw some repeat products from previous vulnerability recaps, such as Ivanti Policy Secure and JetBrains TeamCity servers.
Make sure your security teams consistently check vendor bulletins for vulnerability announcements so your business can stay on top of all threats.
Type of vulnerability: Authentication bypass by an unauthenticated attacker.
The problem: JetBrains has discovered yet another vulnerability, affecting multiple TeamCity on-premises servers.
This vulnerability can allow an unauthenticated attacker who has HTTP(S) TeamCity server access to bypass authentication checks and gain administrative control of that TeamCity server, according to JetBrains.
The fix: According to JetBrains, the vulnerability affects TeamCity on-prem versions 2017.1 through 2023.11.2.
The problem: Linux distributions have seen a new vulnerability, a remote code execution in the Shim software Secure Boot process.
The RCE vulnerability is tracked as CVE-2023-40547 and has a severity rating of 8.3.
This is not to be confused with last week's heap-based buffer overflow vulnerability.
Attackers can use man-in-the-middle techniques to exploit the vulnerability.
The problem: Microsoft Azure's HDInsight product has multiple third-party services with recently discovered vulnerabilities, including Apache Spark, Kafka, and Hadoop.
Orca Security published a blog post about the vulnerabilities - its researchers discovered and reported the issues in Fall 2023, and Microsoft quickly patched them.
The fix: Microsoft has released patches for all three vulnerabilities - CVE-2023-36419, CVE-2023-38156, and the Regex DoS vulnerability, which doesn't have an assigned CVE number.
Type of vulnerability: Arbitrary code execution by an unauthenticated user.
The problem: Fortinet disclosed a vulnerability in its SSL VPN feature within FortiOS, the operating system that manages its next-generation firewall products.
The vulnerability is an out-of-bounds write issue that, when exploited, could permit a remote unauthenticated attacker to execute arbitrary code through specific HTTP requests.
The vulnerability is tracked as CVE-2024-21762 and has a critical severity rating.
Type of vulnerability: Resource access by an unauthenticated attacker.
The problem: Ivanti's encountered multiple issues the last couple of months, and now a new Connect Secure and Policy Secure vulnerability has reared its head. The vulnerability allows an unauthenticated attacker to access restricted resources through an XML external entity or XXE vulnerability in the SAML component of the affected versions of Policy Secure, Connect Secure, and ZTA gateways.
The vulnerability is tracked as CVE-2024-22024 and has a CVSS severity rating of 8.3.
This Cyber News was published on www.esecurityplanet.com. Publication date: Mon, 12 Feb 2024 23:13:04 +0000