Internet Storm Center Spotlight


INTERNET STORM CENTER SPOTLIGHT

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html

The .zip gTLD: Risks and Opportunities

Published: 2023-05-12

Last Updated: 2023-05-12 20:35:34 UTC

by Johannes Ullrich (Version: 1)

About ten years ago, ICANN started the "gTLD" program. "Generic TLDs" allows various brands to register their own trademark as a TLD. Instead of "google.com", you now can have ".google"! Applying for a gTLD isn't cheap, and success isn't guaranteed. But since its inception, dozens of new gTLDs have been approved and started to be used.

The reputation of these new gTLDs has been somewhat mixed. On one end, several very cheap TLDs emerged from the process that are often abused. For example, .xyz or .top are often used for cheap "throw-away" domains. But we also had some large companies, for example, Google, use it (try: domains.google). Google submitted applications for several different gTLDs.

One of the more interesting gTLDs Google obtained is ".zip". This gTLD was approved in 2014, and has not seen much use since then. The current zone file for ".zip" contains only 1230 names. To access the zone files for many of the gTLDs, ICANN operates the "Centralized Zone Data Service" at czds.icann.org.

So what is the danger here?

Read the complete entry:

https://isc.sans.edu/diary/The+zip+gTLD+Risks+and+Opportunities/29838/

Ongoing Facebook phishing campaign without a sender and (almost) without links

Published: 2023-05-15

Last Updated: 2023-05-15 07:25:31 UTC

by Jan Kopriva (Version: 1)

At the Internet Storm Center, we often receive examples of current malspam and phishing e-mails from our readers. Most of them are fairly uninteresting, but some turn out to be notable for one reason or another. This was the case with several messages that Charlie, one of our readers, has submitted to us since the beginning of 2023.

At first glance, the messages appear to be fairly straightforward Facebook phishing e-mails. The HTML body of each message appears to always be the same – it states that a user just logged into the recipient’s Facebook account from a new device and requests that the recipient verifies whether the login was legitimate.

The overall layout of the message seems to mirror legitimate e-mails from Facebook (actually, it seems clear that the author of the phishing message began its development by copying a legitimate message and modifying it, but we’ll get to that later).

Read the complete entry:

https://isc.sans.edu/diary/Ongoing+Facebook+phishing+campaign+without+a+sender+and+almost+without+links/29848/

Increase in Malicious RAR SFX files

Published: 2023-05-17

Last Updated: 2023-05-17 04:19:08 UTC

by Xavier Mertens (Version: 1)

This isn't a new attack vector, but I’ve found many malicious RAR SFX files in the wild for a few weeks. An “SFX” file is a self-extracting archive that contains compressed files and is wrapped up with some executable code to decompress them on the fly. The final user receives an executable file (PE file) that can be launched with the need to install a specific tool to decompress the content. This technique has been used for a while by attackers, and even more interesting, the self-decompression routine can launch any executable (another executable, a script, …)

Most of the time, these files aren’t detected as a known threat because payloads (the files) are compressed (sometimes encrypted too - if a password is used). But they are generally detected as “suspicious”. I wrote a simple YARA rule to detect such files...

Read the complete entry:

https://isc.sans.edu/diary/Increase+in+Malicious+RAR+SFX+files/29852/

Internet Storm Center Entries


Signals Defense With Faraday Bags & Flipper Zero (2023.05.16)

https://isc.sans.edu/diary/Signals+Defense+With+Faraday+Bags+Flipper+Zero/29840/

DShield Sensor Update (2023.05.14)

https://isc.sans.edu/diary/DShield+Sensor+Update/29844/

Geolocating IPs is harder than you think (2023.05.11)

https://isc.sans.edu/diary/Geolocating+IPs+is+harder+than+you+think/29834/

Recent CVEs


The list is assembled by pulling recent vulnerabilities from NIST NVD, Microsoft, Twitter mentions of vulnerabilities, ISC Diaries and Podcast, and the CISA list of known exploited vulnerabilities. There are also some unscored, but significant, vulnerabilities at the end. This includes vulnerabilities that have not been added to the NVD yet.



CVE-2023-25717 - Ruckus Wireless Admin through 10.4 allows remote code execution via unauthenticated HTTP GET Request.

Product: Ruckus Wireless Admin through 10.4

CVSS Score: 0

** KEV since 2023-05-12 **

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-25717

ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8494




CVE-2023-1389 - TP-Link Archer AX21 firmware versions prior to 1.1.4 Build 20230219 have a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint, allowing an attacker to run commands as root.

Product: TP-Link Archer

CVSS Score: 0

** KEV since 2023-05-01 **

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-1389

ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8498




CVE-2023-29336 - Win32k Elevation of Privilege Vulnerability

Product: Microsoft Windows 10 1507

CVSS Score: 7.8

** KEV since 2023-05-09 **

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-29336

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336




CVE-2023-24902 - Win32k Elevation of Privilege Vulnerability

Product: Microsoft Windows 11 21H2

CVSS Score: 7.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24902

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24902




CVE-2023-24941 - Windows Network File System Remote Code Execution Vulnerability

Product: Microsoft Windows Server 2012

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24941

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24941




CVE-2023-24901 - Windows NFS Portmapper Information Disclosure Vulnerability

Product: Microsoft Windows 10 1507

CVSS Score: 7.5

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24901

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24901




CVE-2023-24943 - Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

Product: Microsoft Windows 10 1507

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24943

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24943




CVE-2023-24940 - Windows Pragmatic General Multicast (PGM) Denial of Service Vulnerability

Product: Microsoft Windows 10 1507

CVSS Score: 7.5

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24940

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24940




CVE-2023-30744 - SAP AS NetWeaver JAVA versions SERVERCORE 7.50, J2EE-FRMW 7.50, and CORE-TOOLS 7.50 allow unauthenticated attackers to read or change the state of existing services through open naming and directory API.

Product: SAP Netweaver Application Server For Java

CVSS Score: 9.1

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-30744

NVD References: 

- https://launchpad.support.sap.com/#/notes/3317453

- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html




CVE-2023-32113 - SAP GUI for Windows versions 7.70 and 8.0 allow unauthorized attackers to gain NTLM authentication info and potentially modify sensitive information by tricking victims into clicking a prepared shortcut file.

Product: Sap Gui For Windows

CVSS Score: 9.3

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-32113

NVD References: 

- https://launchpad.support.sap.com/#/notes/3320467

- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html




CVE-2023-27407 - SCALANCE LPE9403 (All versions < V2.1) is vulnerable to command injection due to improper user input validation, which could allow an authenticated remote attacker to access the operating system as root.

Product: Siemens Scalance Lpe9403

CVSS Score: 9.9 NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-27407

NVD References: https://cert-portal.siemens.com/productcert/pdf/ssa-325383.pdf




CVE-2023-2594 - SourceCodester Food Ordering Management System 1.0 is vulnerable to remote SQL injection via username parameter in Registration.

Product: Food Ordering Management System Project 

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-2594

NVD References: 

- https://vuldb.com/?ctiid.228396

- https://vuldb.com/?id.228396




CVE-2023-2595 - SourceCodester Billing Management System 1.0 is vulnerable to critical SQL injection through the drop_services parameter in the ajax_service.php file.

Product: Billing Management System Project 

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-2595

NVD References: 

- https://github.com/Yastar/bug_report/blob/main/SQLi-1.md

- https://vuldb.com/?ctiid.228397

- https://vuldb.com/?id.228397




CVE-2023-2596 - The SourceCodester Online Reviewer System 1.0 is vulnerable to SQL injection through user manipulation of the 'user_id' argument.

Product: Online Reviewer System Project 

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-2596

NVD References: 

- https://github.com/rick13795/bug_report/blob/main/SQLi-1.md

- https://vuldb.com/?ctiid.228398

- https://vuldb.com/?id.228398




CVE-2023-2619 - SourceCodester Online Tours & Travels Management System 1.0 allows remote SQL injection via manipulation of the "id" argument in disapprove_delete.php (VDB-228549).

Product: Online Tours & Travels Management System Project 

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-2619

NVD References: 

- https://blog.csdn.net/weixin_43864034/article/details/130596916

- https://vuldb.com/?ctiid.228549

- https://vuldb.com/?id.228549




CVE-2023-31126 - XWiki's org.xwiki.commons:xwiki-commons-xml allows cross-site scripting attacks via invalid data attributes in the HTML sanitizer introduced in version 14.6-rc-1, and has been patched in versions 14.10.4 and 15.0 RC1.

Product: Xwiki 

CVSS Score: 9.6

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-31126

NVD References: 

- https://github.com/xwiki/xwiki-commons/commit/0b8e9c45b7e7457043938f35265b2aa5adc76a68

- https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-pv7v-ph6g-3gxv

- https://jira.xwiki.org/browse/XCOMMONS-2606




CVE-2023-32071 - XWiki Platform versions 2.2-milestone-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1 allow users to execute javascript via a special URL targeting a page with an attachment.

Product: Xwiki 

CVSS Score: 9.0

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-32071

NVD References: 

- https://app.intigriti.com/company/submissions/e95a7ad5-7029-4627-abf0-3e3e3ea0b4ce/XWIKI-E93DFEYK

- https://github.com/xwiki/xwiki-platform/commit/28905f7f518cc6f21ea61fe37e9e1ed97ef36f01

- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-j9h5-vcgv-2jfm

- https://jira.xwiki.org/browse/XWIKI-20340




CVE-2023-32070 - XWiki Platform is vulnerable to XSS attacks via attributes and link URLs in prior versions to 14.6-rc-1 due to unverified HTML rendering which has been patched.

Product: XWiki Platform 

CVSS Score: 9.0

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-32070

NVD References: 

- https://github.com/xwiki/xwiki-rendering/commit/c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1

- https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-6gf5-c898-7rxp

- https://jira.xwiki.org/browse/XRENDERING-663




CVE-2023-31975 - yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c.

Product: Tortall Yasm

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-31975

NVD References: https://github.com/yasm/yasm/issues/210




CVE-2023-29460 - Rockwell Automation's Arena Simulation software is vulnerable to arbitrary code execution through a memory buffer overflow that could result in a total loss of confidentiality, integrity, and availability.

Product: Rockwellautomation Arena Simulation

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-29460

NVD References: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139391




CVE-2023-29461 - Rockwell Automation's Arena Simulation software has an arbitrary code execution vulnerability that could lead to a complete loss of confidentiality, integrity, and availability due to a memory buffer overflow.

Product: Rockwellautomation Arena Simulation

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-29461

NVD References: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139391




CVE-2023-1834 - Rockwell Automation Kinetix 5500 drives manufactured between May 2022 and January 2023 and running v7.13 have open telnet and FTP ports, potentially granting unauthorized access to attackers.

Product: Rockwell Automation Kinetix 5500 drives

CVSS Score: 9.4

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-1834

NVD References: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139441




CVE-2023-31143 - Mage-ai prior to version 0.8.72 with user authentication enabled allows non-logged in or unpermitted users to access the terminal.

Product:  Mage-Ai

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-31143

NVD References: 

- https://github.com/mage-ai/mage-ai/commit/f63cd00f6a3be372397d37a4c9a49bfaf50d7650

- https://github.com/mage-ai/mage-ai/security/advisories/GHSA-c6mm-2g84-v4m7




CVE-2023-32569 - Veritas InfoScale Operations Manager is susceptible to SQL injection attacks, granting malicious actors the ability to manipulate sensitive data in the back-end database.

Product: Veritas Infoscale Operations Manager

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-32569

NVD References: https://www.veritas.com/content/support/en_US/security/VTS23-007




CVE-2023-30194 - Prestashop posstaticfooter <= 1.0.0 is vulnerable to SQL Injection via posstaticfooter::getPosCurrentHook().

Product: Prestashop posstaticfooter

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-30194

NVD References: 

- https://friends-of-presta.github.io/security-advisories/modules/2023/05/09/posstaticfooter.html

- https://themeforest.net/user/posthemes/portfolio




CVE-2023-30192 - Prestashop possearchproducts 1.7 is vulnerable to SQL Injection via PosSearch::find().

Product: Prestashop possearchproducts 1.7

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-30192

NVD References: 

- https://friends-of-presta.github.io/security-advisories/modules/2023/05/11/possearchproducts.html

- https://themeforest.net/user/posthemes/portfolio




CVE-2023-30189 - Prestashop posstaticblocks <= 1.0.0 is vulnerable to SQL Injection via posstaticblocks::getPosCurrentHook().

Product: Prestashop posstaticblocks

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-30189

NVD References: https://friends-of-presta.github.io/security-advisories/modules/2023/04/27/posstaticblocks.html




CVE-2023-31148 - The Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface is vulnerable to remote code execution due to improper input validation.

Product: Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC)

CVSS Score: 9.1

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-31148

NVD References: 

- https://selinc.com/support/security-notifications/external-reports/

- https://www.nozominetworks.com/blog/




CVE-2023-31149 - The Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface is vulnerable to arbitrary code execution via an Improper Input Validation flaw.

Product: Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC)

CVSS Score: 9.1

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-31149

NVD References: 

- https://selinc.com/support/security-notifications/external-reports/

- https://www.nozominetworks.com/blog/




CVE-2022-29842 - Western Digital My Cloud OS 5 devices before 5.26.119 allow command injection, leading to code execution by an attacker as root user.

Product: Western Digital My Cloud OS 5

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2022-29842

NVD References: https://www.westerndigital.com/support/product-security/wdc-23002-my-cloud-firmware-version-5-26-119




CVE-2023-32080 - Wings, the server control plane for Pterodactyl Panel, is vulnerable to code execution attacks that can compromise the host system if an install script is modified or executed with untrusted user data.

Product: Pterodactyl Panel Wings

CVSS Score: 9.0

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-32080

NVD References: 

- https://github.com/pterodactyl/wings/releases/tag/v1.11.6

- https://github.com/pterodactyl/wings/releases/tag/v1.17.5

- https://github.com/pterodactyl/wings/security/advisories/GHSA-p744-4q6p-hvc2




CVE-2023-0851 -  Canon Office / Small Office Multifunction Printers and Laser Printers may allow an attacker to execute arbitrary code through a buffer overflow in CPCA Resource Download process.

Product: Canon Office/Small Office Multifunction Printers and Laser Printers

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-0851

NVD References: 

- https://canon.jp/support/support-info/230414vulnerability-response

- https://psirt.canon/advisory-information/cp2023-001/

- https://www.canon-europe.com/support/product-security-latest-news/

- https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediation-Against-Buffer-Overflow




CVE-2023-0852 - Canon Office/Small Office Multifunction Printers and Laser Printers firmware Ver.11.04 and earlier sold in Japan, US, and Europe have a buffer overflow vulnerability in the Address Book of Mobile Device function that may allow an attacker to execute arbitrary code.

Product: Canon Office / Small Office Multifunction Printers and Laser Printers

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-0852

NVD References: 

- https://canon.jp/support/support-info/230414vulnerability-response

- https://psirt.canon/advisory-information/cp2023-001/

- https://www.canon-europe.com/support/product-security-latest-news/

- https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediation-Against-Buffer-Overflow




CVE-2023-0853 - Canon Office and Small Office Multifunction Printers and Laser Printers may allow an attacker on the network segment to execute arbitrary code through a buffer overflow in the mDNS NSEC record registering process.

Product: Canon Office / Small Office Multifunction Printers and Laser Printers

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-0853

NVD References: 

- https://canon.jp/support/support-info/230414vulnerability-response

- https://psirt.canon/advisory-information/cp2023-001/

- https://www.canon-europe.com/support/product-security-latest-news/

- https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediation-Against-Buffer-Overflow




CVE-2023-0854 - Canon Office/Small Office Printers are vulnerable to a buffer overflow in NetBIOS QNAME registering and communication process, allowing attackers to cause unresponsiveness or execute arbitrary code.

Product: Canon Office / Small Office Multifunction Printers and Laser Printers

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-0854

NVD References: 

- https://canon.jp/support/support-info/230414vulnerability-response

- https://psirt.canon/advisory-information/cp2023-001/

- https://www.canon-europe.com/support/product-security-latest-news/

- https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediation-Against-Buffer-Overflow




CVE-2023-0855 - Canon Office/Small Office Multifunction Printers and Laser Printers may allow an attacker to execute arbitrary code through IPP number-up attribute process.

Product: Canon Office / Small Office Multifunction Printers and Laser Printers

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-0855

NVD References: 

- https://canon.jp/support/support-info/230414vulnerability-response

- https://psirt.canon/advisory-information/cp2023-001/

- https://www.canon-europe.com/support/product-security-latest-news/

- https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediation-Against-Buffer-Overflow




CVE-2023-0856 - The Canon Office/Small Office Multifunction and Laser Printers sold in specific regions are vulnerable to a buffer overflow in IPP sides attribute process, allowing attackers to trigger unresponsiveness or execute arbitrary code on affected products.

Product: Canon Office / Small Office Multifunction Printers and Laser Printers

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-0856

NVD References: 

- https://canon.jp/support/support-info/230414vulnerability-response

- https://psirt.canon/advisory-information/cp2023-001/

- https://www.canon-europe.com/support/product-security-latest-news/

- https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Vulnerabilities-Remediation-Against-Buffer-Overflow




CVE-2023-32243 - WPDeveloper Essential Addons for Elementor allows privilege escalation via improper authentication from version 5.4.0 to 5.7.1.

Product: WPDeveloper Essential Addons for Elementor

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-32243

NVD References: 

- https://patchstack.com/articles/critical-privilege-escalation-in-essential-addons-for-elementor-plugin-affecting-1-million-sites?_s_id=cve

- https://patchstack.com/database/vulnerability/essential-addons-for-elementor-lite/wordpress-essential-addons-for-elementor-plugin-5-4-0-5-7-1-unauthenticated-privilege-escalation-vulnerability?_s_id=cve




CVE-2023-2499 - RegistrationMagic plugin for WordPress up to version 5.2.1.0 allows unauthenticated attackers to log in as any existing user via Google social login with access to the email.

Product: RegistrationMagic plugin WordPress

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-2499

NVD References: 

- https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/tags/5.2.0.4/services/class_rm_user_services.php#L791

- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2912481%40custom-registration-form-builder-with-submission-manager&new=2912481%40custom-registration-form-builder-with-submission-manager&sfp_email=&sfph_mail=

- https://www.wordfence.com/threat-intel/vulnerabilities/id/87ec5542-b6e7-4b18-a3ec-c258e749d32e?source=cve




CVE-2023-1934 - PnPSCADA system by SDG Technologies CC is vulnerable to critical unauthenticated PostgreSQL Injection, allowing attackers to seamlessly access sensitive information.

Product: SDG Technologies CC PnPSCADA system

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-1934

NVD References: https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-12




CVE-2023-1698 - WAGO products have a vulnerability that allows remote attackers to create new users and change configuration, leading to DoS and system compromise.

Product: WAGO multiple products

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-1698

NVD References: https://cert.vde.com/en/advisories/VDE-2023-007/




CVE-2023-32314 - VM2 sandbox allows remote code execution due to a sandbox escape vulnerability up to version 3.9.17 that was patched in version 3.9.18 with no known workarounds.

Product: vm2 sandbox

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-32314

NVD References: 

- https://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac

- https://github.com/patriksimek/vm2/commit/d88105f99752305c5b8a77b63ddee3ec86912daf

- https://github.com/patriksimek/vm2/releases/tag/3.9.18

- https://github.com/patriksimek/vm2/security/advisories/GHSA-whpj-8f3w-67p5




CVE-2023-32956 - Synology Router Manager (SRM) versions before 1.2.5-8227-6 and 1.3.1-9346-3 are vulnerable to OS command injection.

Product: Synology Router Manager (SRM)

CVSS Score: 9.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-32956

NVD References: https://www.synology.com/en-global/security/advisory/Synology_SA_22_25




CVE-2023-24898 - Windows SMB Denial of Service Vulnerability

Product: Microsoft Windows Server 2022

CVSS Score: 7.5

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24898

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24898




CVE-2023-24899 - Windows Graphics Component Elevation of Privilege Vulnerability

Product: Microsoft Windows 11 21H2

CVSS Score: 7.0

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24899

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24899




CVE-2023-24903 - Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

Product: Microsoft Windows 10 1507

CVSS Score: 8.1

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24903

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24903




CVE-2023-24904 - Windows Installer Elevation of Privilege Vulnerability

Product: Microsoft Windows Server 2008

CVSS Score: 7.1

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24904

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24904




CVE-2023-24905 - Remote Desktop Client Remote Code Execution Vulnerability

Product: Microsoft Windows 10 20H2

CVSS Score: 7.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24905

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24905




CVE-2023-24939 - Server for NFS Denial of Service Vulnerability

Product: Microsoft Windows 10 1507

CVSS Score: 7.5

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24939

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24939




CVE-2023-24942 - Remote Procedure Call Runtime Denial of Service Vulnerability

Product: Microsoft Windows 10 1507

CVSS Score: 7.5

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24942

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24942

NVD References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24942




CVE-2023-24946 - Windows Backup Service Elevation of Privilege Vulnerability

Product: Microsoft Windows 10 1507

CVSS Score: 7.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24946

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24946




CVE-2023-24947 - Windows Bluetooth Driver Remote Code Execution Vulnerability

Product: Microsoft Windows 10 1607

CVSS Score: 8.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24947

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24947




CVE-2023-24948 - Windows Bluetooth Driver Elevation of Privilege Vulnerability

Product: Microsoft Windows 10 1507

CVSS Score: 7.4

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24948

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24948




CVE-2023-24949 - Windows Kernel Elevation of Privilege Vulnerability

Product: Microsoft Windows 10 1809

CVSS Score: 7.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24949

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24949




CVE-2023-24953 - Microsoft Excel Remote Code Execution Vulnerability

Product: Microsoft 365 Apps

CVSS Score: 7.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24953

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24953




CVE-2023-24955 - Microsoft SharePoint Server Remote Code Execution Vulnerability

Product: Microsoft Sharepoint Enterprise Server

CVSS Score: 7.2

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-24955

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24955




CVE-2023-28283 - Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability

Product: Microsoft Windows 10 1507

CVSS Score: 8.1

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-28283

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28283




CVE-2023-29325 - Windows OLE Remote Code Execution Vulnerability

Product: Microsoft Windows 10 1507

CVSS Score: 8.1

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-29325

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29325




CVE-2023-29335 - Microsoft Word Security Feature Bypass Vulnerability

Product: Microsoft Windows 10 1507

CVSS Score: 7.5

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-29335

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29335




CVE-2023-29340 - AV1 Video Extension Remote Code Execution Vulnerability

Product: Microsoft Av1 Video Extension

CVSS Score: 7.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-29340

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29340




CVE-2023-29341 - AV1 Video Extension Remote Code Execution Vulnerability

Product: Microsoft Av1 Video Extension

CVSS Score: 7.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-29341

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29341




CVE-2023-29343 - SysInternals Sysmon for Windows Elevation of Privilege Vulnerability

Product: Microsoft Windows Sysmon

CVSS Score: 7.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-29343

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29343




CVE-2023-29344 - Microsoft Office Remote Code Execution Vulnerability

Product: Microsoft Office

CVSS Score: 7.8

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-29344

MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29344