SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
Microsoft Patch Tuesday December 2023
Published: 2023-12-12
Last Updated: 2023-12-12 18:25:35 UTC
by Johannes Ullrich (Version: 1)
Microsoft had a rather light patch Tuesday for us today. Today's set includes 4 critical, 30 important, and one moderate vulnerability. In addition, Microsoft included five Chromium patches that are part of Edge. Only one vulnerability was made public before today. No exploited vulnerabilities are patched today.
This will hopefully make for a not-too-stressful holiday patch month.
Read the full entry:
https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+December+2023/30480/
Apple Patches Everything
Published: 2023-12-11
Last Updated: 2023-12-11 19:14:53 UTC
by Johannes Ullrich (Version: 1)
Apple today released updates for iOS, macOS, tvOS and watchOS. This updates 43 vulnerabilities. Two of the vulnerabilities are already being exploited. Last week, these two vulnerabilities received patches for current versions of iOS and macOS. This new update covers older iOS and macOS versions as well.
Read the full entry:
https://isc.sans.edu/diary/Apple+Patches+Everything/30474/
IPv4-mapped IPv6 Address Used For Obfuscation
Published: 2023-12-09
Last Updated: 2023-12-12 15:17:28 UTC
by Didier Stevens (Version: 1)
A reader submitted an unusual URL...
Notice the format of the hostname: ::ffff:a.b.c.d
I had to look this up: this is a IPv4-mapped IPv6 address. It is a format to describe an IPv4 address using a IPv6 address format.
Read the full entry:
https://isc.sans.edu/diary/IPv4mapped+IPv6+Address+Used+For+Obfuscation/30466/
Malicious Python Script with a TCL/TK GUI (2023.12.13)
https://isc.sans.edu/diary/Malicious+Python+Script+with+a+TCLTK+GUI/30478/
What is sitemap.xml, and Why a Pentester Should Care (2023.12.11)
https://isc.sans.edu/diary/What+is+sitemapxml+and+Why+a+Pentester+Should+Care/30472/
Honeypots: From the Skeptical Beginner to the Tactical Enthusiast (2023.12.10)
https://isc.sans.edu/diary/Honeypots+From+the+Skeptical+Beginner+to+the+Tactical+Enthusiast/30468/
5Ghoul: Impacts, Implications and Next Steps (2023.12.07)
https://isc.sans.edu/diary/5Ghoul+Impacts+Implications+and+Next+Steps/30462/
Revealing the Hidden Risks of QR Codes [Guest Diary] (2023.12.06)
https://isc.sans.edu/diary/Revealing+the+Hidden+Risks+of+QR+Codes+Guest+Diary/30458/
The list is assembled by pulling recent vulnerabilities from NIST NVD, Microsoft, Twitter mentions of vulnerabilities, ISC Diaries and Podcast, and the CISA list of known exploited vulnerabilities. There are also some unscored, but significant, vulnerabilities at the end. This includes vulnerabilities that have not been added to the NVD yet.
Product: Atlassian CompanionCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-22524NVD References: - https://confluence.atlassian.com/security/cve-2023-22524-rce-vulnerability-in-atlassian-companion-app-for-macos-1319249492.html- https://jira.atlassian.com/browse/CONFSERVER-93518CVE-2023-48849 - Ruijie EG Series Routers version EG_3.0(1)B11P216 and before allows unauthenticated attackers to remotely execute arbitrary code due to incorrect filtering.Product: Ruijie RG-EG1000CCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-48849NVD References: https://github.com/delsploit/CVE-2023-48849CVE-2023-46773 - Permission management vulnerability in the PMS module. Successful exploitation of this vulnerability may cause privilege escalation.Product: Huawei EmuiCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-46773NVD References: - https://consumer.huawei.com/en/support/bulletin/2023/12/- https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245CVE-2023-6458 - Mattermost webapp fails to validate route parameters in/<TEAM_NAME>/channels/<CHANNEL_NAME> allowing an attacker to perform a client-side path traversal.Product: Mattermost ServerCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-6458NVD References: https://mattermost.com/security-updatesCVE-2023-36655 - ProLion CryptoSpike 3.0.15P2 allows a remote blocked user to login and obtain an authentication token by exploiting case sensitivity in the username.Product: ProLion CryptoSpikeCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36655NVD References: - https://prolion.com/cryptospike/- https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36655CVE-2023-46353 - Ticons before 1.8.4 from MyPresta.eu for PrestaShop allows guest users to perform SQL injection via sensitive SQL calls in the TiconProduct::getTiconByProductAndTicon() method, easily exploitable with a trivial http call.Product: Mypresta Product Tag Icons ProCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-46353NVD References: https://security.friendsofpresta.org/modules/2023/11/28/ticons.htmlCVE-2023-41913 - strongSwan before 5.9.12 is vulnerable to buffer overflow and potential remote code execution through a crafted IKE_SA_INIT message, due to a DH public value exceeding the internal buffer in charon-tkm's DH proxy.Product: StrongSwan CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-41913NVD References: - https://github.com/strongswan/strongswan/releases- https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.htmlCVE-2023-48823 - GaatiTrack Courier Management System 1.0 allows unauthenticated attackers to exploit an Blind SQL injection vulnerability via the email parameter during login.Product: Mayurik Courier Management SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-48823NVD References: http://packetstormsecurity.com/files/176030CVE-2023-48860 - TOTOLINK N300RT version 3.2.4-B20180730.0906 allows post-authentication remote code execution (RCE) due to incorrect access control, enabling bypass of front-end security and execution of arbitrary code.Product: Totolink N300RTCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-48860NVD References: https://github.com/xieqiang11/security_research/blob/main/TOTOLINK-N300RT-RCE.mdCVE-2023-35039 - Be Devious Web Development Password Reset with Code for WordPress REST API allows authentication abuse due to improper restriction of excessive authentication attempts.Product: Be Devious Password Reset With Code For Wordpress Rest APICVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35039NVD References: https://patchstack.com/database/vulnerability/bdvs-password-reset/wordpress-password-reset-with-code-for-wordpress-rest-api-plugin-0-0-15-privilege-escalation-due-to-weak-pin-generation-vulnerability?_s_id=cveCVE-2023-39172 - The affected devices transmit sensitive information unencrypted allowing a remote unauthenticated attacker to capture and modify network traffic.Product: EnBW SENEC Storage BoxCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-39172NVD References: https://seclists.org/fulldisclosure/2023/Nov/4CVE-2023-39169 - The affected devices use publicly available default credentials with administrative privileges.Product: EnBW SENEC Storage BoxCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-39169NVD References: https://seclists.org/fulldisclosure/2023/Nov/3CVE-2023-49424 through CVE-2023-49426, CVE-2023-49428, CVE-2023-49437 - Tenda AX12 V22.03.01.46 was discovered to contain multiple stack overflow and command injection vulnerabilitiesProduct: Tenda AX12CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49424NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49425NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49426NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49428NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49437NVD References: https://git…
Product: ProLion CryptoSpikeCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36655NVD References: - https://prolion.com/cryptospike/- https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36655CVE-2023-46353 - Ticons before 1.8.4 from MyPresta.eu for PrestaShop allows guest users to perform SQL injection via sensitive SQL calls in the TiconProduct::getTiconByProductAndTicon() method, easily exploitable with a trivial http call.Product: Mypresta Product Tag Icons ProCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-46353NVD References: https://security.friendsofpresta.org/modules/2023/11/28/ticons.htmlCVE-2023-41913 - strongSwan before 5.9.12 is vulnerable to buffer overflow and potential remote code execution through a crafted IKE_SA_INIT message, due to a DH public value exceeding the internal buffer in charon-tkm's DH proxy.Product: StrongSwan CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-41913NVD References: - https://github.com/strongswan/strongswan/releases- https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.htmlCVE-2023-48823 - GaatiTrack Courier Management System 1.0 allows unauthenticated attackers to exploit an Blind SQL injection vulnerability via the email parameter during login.Product: Mayurik Courier Management SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-48823NVD References: http://packetstormsecurity.com/files/176030CVE-2023-48860 - TOTOLINK N300RT version 3.2.4-B20180730.0906 allows post-authentication remote code execution (RCE) due to incorrect access control, enabling bypass of front-end security and execution of arbitrary code.Product: Totolink N300RTCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-48860NVD References: https://github.com/xieqiang11/security_research/blob/main/TOTOLINK-N300RT-RCE.mdCVE-2023-35039 - Be Devious Web Development Password Reset with Code for WordPress REST API allows authentication abuse due to improper restriction of excessive authentication attempts.Product: Be Devious Password Reset With Code For Wordpress Rest APICVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35039NVD References: https://patchstack.com/database/vulnerability/bdvs-password-reset/wordpress-password-reset-with-code-for-wordpress-rest-api-plugin-0-0-15-privilege-escalation-due-to-weak-pin-generation-vulnerability?_s_id=cveCVE-2023-39172 - The affected devices transmit sensitive information unencrypted allowing a remote unauthenticated attacker to capture and modify network traffic.Product: EnBW SENEC Storage BoxCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-39172NVD References: https://seclists.org/fulldisclosure/2023/Nov/4CVE-2023-39169 - The affected devices use publicly available default credentials with administrative privileges.Product: EnBW SENEC Storage BoxCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-39169NVD References: https://seclists.org/fulldisclosure/2023/Nov/3CVE-2023-49424 through CVE-2023-49426, CVE-2023-49428, CVE-2023-49437 - Tenda AX12 V22.03.01.46 was discovered to contain multiple stack overflow and command injection vulnerabilitiesProduct: Tenda AX12CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49424NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49425NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49426NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49428NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49437NVD References: https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetVirtualServerCfg.mdNVD References: https://github.com/ef4tless/vuln/blob/master/iot/AX12/setMacFilterCfg.mdNVD References: https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetStaticRouteCfg.mdNVD References: https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetOnlineDevName.mdNVD References: https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetNetControlList-3.mdCVE-2023-49429 through CVE-2023-49436 - Tenda AX9 V22.03.01.46 is susceptible to multiple SQL command injection and stack overflow vulnerabilitiesProduct: Tenda AX9CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49429NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49430NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49431NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49432NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49433NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49434NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49435NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49436NVD References: https://github.com/ef4tless/vuln/blob/master/iot/AX9/setDeviceInfo.mdNVD References: https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetStaticRouteCfg.mdNVD References: https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetOnlineDevName.mdNVD References: https://github.com/ef4tless/vuln/blob/master/iot/AX9/setMacFilterCfg.mdNVD References: https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetVirtualServerCfg.mdNVD References: https://github.com/ef4tless/vuln…
Product: Quarkus CVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-6394NVD References: - https://access.redhat.com/security/cve/CVE-2023-6394- https://bugzilla.redhat.com/show_bug.cgi?id=2252197CVE-2023-46932 - GPAC version 2.3-DEV-rev617-g671976fcc-master experiences a heap buffer overflow vulnerability in the str2ulong class in src/media_tools/avilib.c, enabling attackers to execute arbitrary code and cause a denial of service (DoS) in gpac/MP4Box.Product: GPAC CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-46932NVD References: https://github.com/gpac/gpac/issues/2669CVE-2023-47254 - DrayTek Vigor167 version 5.2.2 suffers from an OS Command Injection vulnerability, enabling remote attackers to execute system commands and elevate privileges through the web interface account.Product: DrayTek Vigor167CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-47254NVD References: - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-023.txt- https://www.syss.de/pentest-blog/command-injection-via-cli-des-draytek-vigor167-syss-2023-023CVE-2023-6648 - PHPGurukul Nipah Virus Testing Management System 1.0 is susceptible to remote SQL injection via manipulation of the argument username in the password-recovery.php file.Product: Phpgurukul Nipah Virus Testing Management SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-6648NVD References: - https://github.com/dhabaleshwar/niv_testing_sqliforgotpassword/blob/main/exploit.md- https://vuldb.com/?ctiid.247341- https://vuldb.com/?id.247341CVE-2023-6651 - Matrimonial Site 1.0 is vulnerable to remote SQL injection via username parameter in /auth/auth.php?user=1, allowing attackers to exploit the vulnerability disclosed publicly as VDB-247344.Product: Carmelogarcia Matrimonial SiteCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-6651NVD References: - https://github.com/850362564/BugHub/blob/main/Matrimonial%20Site%20System%20auth.php%20has%20Sqlinjection.pdf- https://vuldb.com/?ctiid.247344- https://vuldb.com/?id.247344CVE-2023-6652 - The Matrimonial Site 1.0 is vulnerable to remote sql injection in the register function of the register.php file, posing a critical threat with the disclosure of an exploit.Product: Carmelogarcia Matrimonial SiteCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-6652NVD References: - https://github.com/sweatxi/BugHub/blob/main/Matrimonial%20Site%20System%20functions.php%20%20has%20Sqlinjection.pdf- https://vuldb.com/?ctiid.247345- https://vuldb.com/?id.247345CVE-2023-50245 - OpenEXR-viewer prior to version 0.6.1 allows a memory overflow vulnerability.Product: OpenEXR-viewerCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-50245NVD References: - https://github.com/afichet/openexr-viewer/commit/d0a7e85dfeb519951fb8a8d70f73f30d41cdd3d9- https://github.com/afichet/openexr-viewer/security/advisories/GHSA-99jg-r3f4-rpxjCVE-2023-49583 - The SAP BTP Security Services Integration Library ([Node.js] @sap/xssec) versions < 3.6.0 allow an unauthenticated attacker to escalate privileges and gain arbitrary permissions within the application.Product: SAP BTP Security Services Integration LibraryCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49583NVD References: - https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.htmlCVE-2023-50422 - The SAP BTP Security Services Integration Library (cloud-security-services-integration-library) below version 2.17.0 and from version 3.0.0 to before 3.3.0 allows an unauthenticated attacker to escalate privileges and gain arbitrary permissions within the application.Product: SAP BTP Security Services Integration LibraryCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-50422NVD References: - https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.htmlCVE-2023-50423 - The SAP BTP Security Services Integration Library ([Python] sap-xssec) versions < 4.1.0 allows unauthenticated attackers to escalate privileges and obtain arbitrary permissions within the application.Product: SAP BTP Security Services Integration LibraryCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-50423NVD References: - https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.htmlCVE-2023-50424 - The SAP BTP Security Services Integration Library allows an unauthenticated attacker to escalate privileges and obtain arbitrary permissions within the application in versions < 0.17.0.Product: SAP BTP Security Services Integration LibraryCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-50424NVD References: - https://blogs.sap.com/2023/12/12/unveiling-crit…
Sponsored By CorelightWebcast: Charting the New Frontier of Incident ResponseAs cyber threats grow in sophistication, traditional defenses are becoming increasingly inadequate. Hear what tech elite responders are using to defend their organizations from sophisticated adversary tactics and techniques in this Corelight and Mandiant webcast. Watch now:
The Journey to Operational Security Effectiveness and Maturity: Frameworks, Tools and Techniques | Join Dave Shackleford on Dec 20 at 1:00pm ET to discuss the frameworks, tools, and other techniques that organizations use to measure and assess their security programs. | Register now:
Identify, Evaluate & Prioritize Industrial Cyber Risk | Join Dean Parsons on Jan 10 at 1:00pm ET as he evaluates PAS Cyber Integrity, a new offering from PAS Hexagon designed to harden OT assets against cyber-threats, identify critical endpoint vulnerabilities and risks, enable rapid recovery, and more. | Register now:
Free Virtual Event on Tue, Jan 30 at 10am ET: CTI Summit Solutions Track 2024 | SANS Senior Instructor Ismael Valenzuela and invited guest speakers will dive into cutting-edge CTI case studies while highlighting how the integration of AI technologies can provide unprecedented insights and advantages. Register now: