SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
Scans for Ivanti Connect "Secure" VPN Vulnerability (CVE-2023-46805, CVE-2024-21887)
Published: 2024-01-16
Last Updated: 2024-01-16 12:53:48 UTC
by Johannes Ullrich (Version: 1)
Last week, Volexity published a blog describing two vulnerabilities in Ivanti's Connect "Secure" VPN. These vulnerabilities have been exploited in limited, targeted attacks. At this point, Ivanti released a configuration workaround but no patch for this vulnerability. The configuration can be applied in the form of an encrypted XML file.
Watchtowr, a company in the vulnerability scanning business, investigated the configuration change created by Ivanti and shared how it detects if an Ivanti instance had the configuration change applied. After the change is applied, requests to a specific REST API URL (/api/v1/configuration/users/user-roles/user-role/rest-userrole1/web/web-bookmarks/bookmark) will include a complete HTML body. Before the patch is applied, only headers are received from the device.
Starting on Sunday, our honeypots detected the first scans for this URL. This is likely due to attackers building target lists while working on the exploit. Neither Volexity nor Watchtowr have released exploits for the vulnerability. Ivanti delivers the Connect "Secure" VPN as a virtual appliance with an obfuscated disk image. Still, the obfuscation is easily bypassed, and exploits are likely available to a wider and wider group of attackers. Ransomware attackers are likely already taking advantage of the vulnerability.
Read the full entry:
One File, Two Payloads
Published: 2024-01-12
Last Updated: 2024-01-12 06:12:18 UTC
by Xavier Mertens (Version: 1)
It has been a while since I discussed obfuscation techniques in malicious scripts. I found a VB script that pretends to be a PDF file. As usual, it was delivered through a phishing email with a zip archive. The filename is ...
The script starts with a strange trick: It lists the available Windows services, builds a string containing all the services names, and searches for the substring “Microsoft” across them.
Read the full entry: https://isc.sans.edu/diary/One+File+Two+Payloads/30558/
New YouTube Video Series: Hacker Tools Origin Stories
Published: 2024-01-11
Last Updated: 2024-01-11 12:40:31 UTC
by Johannes Ullrich (Version: 1)
I remembered that I should have mentioned this in today's podcast, so here it goes as a quick post. The amazing Mark Baggett stepped away from his Python console and started a new series of YouTube videos about the origin stories of various hacker tools. The first one he covers is Security Onion. These videos interview the creators of the tools to learn more about why and how they were created.
Read the full entry: https://isc.sans.edu/diary/New+YouTube+Video+Series+Hacker+Tools+Origin+Stories/30554/
Number Usage in Passwords (2024.01.17)
https://isc.sans.edu/diary/Number+Usage+in+Passwords/30540/
Microsoft January 2024 Patch Tuesday (2024.01.10)
https://isc.sans.edu/diary/Microsoft+January+2024+Patch+Tuesday/30548
The list is assembled by pulling recent vulnerabilities from NIST NVD, Microsoft, Twitter mentions of vulnerabilities, ISC Diaries and Podcast, and the CISA list of known exploited vulnerabilities. There are also some unscored, but significant, vulnerabilities at the end. This includes vulnerabilities that have not been added to the NVD yet.
CVE-2023-46805-Authentication-Bypass-
CVE-2023-46805-Authentication-Bypass-
Product: Kyocera Device ManagerCVSS Score: 0NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-50916ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8804NVD References: - https://www.kyoceradocumentsolutions.us/en/about-us/pr-and-award-certifications/press/kyocera-device-manager-cve-2023-50196-vulnerability-solution-update.html- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/- https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-001_kyocera-v2.txtCVE-2024-0519 - Chromium: CVE-2024-0519 Out of bounds memory access in V8Product: Google ChromeCVSS Score: 0** KEV since 2024-01-17 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-0519MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0519NVD References: - https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html- https://crbug.com/1517354CVE-2023-6548 - Authenticated Remote Code Execution in Citrix Netscaler ADC Version 12.1 and laterProduct - Citrix Netscaler ADC Version 12.1 and laterCVSS Score: 5.5** KEV since 2024-01-17 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-6548NVD References: https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549CVE-2023-6549 - Denial of Service Vulnerability in Citrix Netscaler ADC Version 12.1 and laterProduct - Citrix Netscaler ADC Version 12.1 and laterCVSS Score: 8.2** KEV since 2024-01-17 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-6549NVD References: https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549CVE-2023-29357 - Microsoft SharePoint Server contains an unspecified vulnerability that allows an unauthenticated attacker, who has gained access to spoofed JWT authentication tokens, to use them for executing a network attack. This attack bypasses authentication, enabling the attacker to gain administrator privileges.Product: Microsoft SharePoint ServerCVSS Score: 9.8** KEV since 2024-01-10 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-29357MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29357CVE-2024-21318 - Microsoft SharePoint Server Remote Code Execution VulnerabilityProduct: Microsoft Sharepoint ServerCVSS Score: 8.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-21318MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21318CVE-2023-50643 - Evernote for MacOS v.10.68.2 allows remote code execution via certain components.Product: Evernote CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-50643NVD References: - http://evernote.com- https://github.com/V3x0r/CVE-2023-50643CVE-2024-21646 - Azure uAMQP, a general purpose C library for AMQP 1.0, is vulnerable to remote code execution due to an integer overflow or wraparound or memory safety issue when receiving crafted binary type data, but has been patched in release 2024-01-01.Product: Microsoft Azure uAMQPCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-21646NVD References: - https://github.com/Azure/azure-uamqp-c/commit/12ddb3a31a5a97f55b06fa5d74c59a1d84ad78fe- https://github.com/Azure/azure-uamqp-c/security/advisories/GHSA-j29m-p99g-7hpvCVE-2023-26999 - NetScout nGeniusOne v.6.3.4 allows remote code execution and denial of service through a crafted file.Product: Netscout nGeniusOneCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-26999NVD References: - http://netscout.com- http://ngeniusone.com- https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/CVE-2023-49238 - Gradle Enterprise before 2023.1 allows remote attackers to gain access to a new installation due to a non-unique initial system user password, potentially enabling unauthorized login before the legitimate administrator logs in.Product: Gradle EnterpriseCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49238NVD References: - https://security.gradle.com- https://security.gradle.com/advisory/2023-01CVE-2023-51717 - Dataiku DSS before 11.4.5 and 12.4.1 has Incorrect Access Control that could lead to a full authentication bypass.Product: Dataiku Data Science StudioCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-51717NVD References: - https://dataiku.com- https://doc.dataiku.com/dss/latest/security/advisories/dsa-2023-010.htmlCVE-2024-21737 - The SAP Application Interface Framework File Adapter - version 702 allows a high privilege user to execute OS commands, potentially compromising the application's confidentiality, integrity, and availability.Product: SAP Application Interface FrameworkCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-21737NVD References: - https://me.sap.com/notes/3411869- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.htmlCVE-2023-49235 - TRENDnet TV-IP1314PI 5.5.3 200714 devices are vulnerable to bypassing validation and executing a shell command due to mishan…
CVE-2024-0519 Out of bounds memory access in V8Product: Google ChromeCVSS Score: 0** KEV since 2024-01-17 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-0519MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0519NVD References: - https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html- https://crbug.com/1517354CVE-2023-6548 - Authenticated Remote Code Execution in Citrix Netscaler ADC Version 12.1 and laterProduct - Citrix Netscaler ADC Version 12.1 and laterCVSS Score: 5.5** KEV since 2024-01-17 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-6548NVD References: https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549CVE-2023-6549 - Denial of Service Vulnerability in Citrix Netscaler ADC Version 12.1 and laterProduct - Citrix Netscaler ADC Version 12.1 and laterCVSS Score: 8.2** KEV since 2024-01-17 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-6549NVD References: https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549CVE-2023-29357 - Microsoft SharePoint Server contains an unspecified vulnerability that allows an unauthenticated attacker, who has gained access to spoofed JWT authentication tokens, to use them for executing a network attack. This attack bypasses authentication, enabling the attacker to gain administrator privileges.Product: Microsoft SharePoint ServerCVSS Score: 9.8** KEV since 2024-01-10 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-29357MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29357CVE-2024-21318 - Microsoft SharePoint Server Remote Code Execution VulnerabilityProduct: Microsoft Sharepoint ServerCVSS Score: 8.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-21318MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21318CVE-2023-50643 - Evernote for MacOS v.10.68.2 allows remote code execution via certain components.Product: Evernote CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-50643NVD References: - http://evernote.com- https://github.com/V3x0r/CVE-2023-50643CVE-2024-21646 - Azure uAMQP, a general purpose C library for AMQP 1.0, is vulnerable to remote code execution due to an integer overflow or wraparound or memory safety issue when receiving crafted binary type data, but has been patched in release 2024-01-01.Product: Microsoft Azure uAMQPCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-21646NVD References: - https://github.com/Azure/azure-uamqp-c/commit/12ddb3a31a5a97f55b06fa5d74c59a1d84ad78fe- https://github.com/Azure/azure-uamqp-c/security/advisories/GHSA-j29m-p99g-7hpvCVE-2023-26999 - NetScout nGeniusOne v.6.3.4 allows remote code execution and denial of service through a crafted file.Product: Netscout nGeniusOneCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-26999NVD References: - http://netscout.com- http://ngeniusone.com- https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/CVE-2023-49238 - Gradle Enterprise before 2023.1 allows remote attackers to gain access to a new installation due to a non-unique initial system user password, potentially enabling unauthorized login before the legitimate administrator logs in.Product: Gradle EnterpriseCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49238NVD References: - https://security.gradle.com- https://security.gradle.com/advisory/2023-01CVE-2023-51717 - Dataiku DSS before 11.4.5 and 12.4.1 has Incorrect Access Control that could lead to a full authentication bypass.Product: Dataiku Data Science StudioCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-51717NVD References: - https://dataiku.com- https://doc.dataiku.com/dss/latest/security/advisories/dsa-2023-010.htmlCVE-2024-21737 - The SAP Application Interface Framework File Adapter - version 702 allows a high privilege user to execute OS commands, potentially compromising the application's confidentiality, integrity, and availability.Product: SAP Application Interface FrameworkCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-21737NVD References: - https://me.sap.com/notes/3411869- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.htmlCVE-2023-49235 - TRENDnet TV-IP1314PI 5.5.3 200714 devices are vulnerable to bypassing validation and executing a shell command due to mishandling of debug information filtering in libremote_dbg.so.Product: TRENDnet TV-IP1314PICVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49235NVD References: - https://drive.google.com/file/d/1lTloBkH_7zAz1ZbFVSZnfpoPd81aPaHx/view?usp=sharing- https://github.com/pcsle37/TRENDnet/blob/main/TRENDnet_vul.pdfCVE-2023-49236 - TRENDnet TV-IP1314PI 5.5.3 200714 devices are susceptible to a stack-based buffer overflow, allowing arbitrary command execution due to insufficient length validation during an sscanf operation of a use…
Product: Cassia Networks XC1000CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-31446NVD References: - https://github.com/Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution- https://www.cassianetworks.comCVE-2024-0360 - PHPGurukul Hospital Management System 1.0 is vulnerable to SQL injection via the doctorspecilization argument in admin/edit-doctor-specialization.php, potentially exploited due to the public disclosure of the exploit (VDB-250127).Product: PHPGurukul Hospital Management SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-0360NVD References: - https://github.com/laoquanshi/PHPGurukul-Hospital-Management-System/blob/main/PHPGurukul%20Hospital%20Management%20System%20SQL4.docx- https://vuldb.com/?ctiid.250127- https://vuldb.com/?id.250127CVE-2024-0361 - PHPGurukul Hospital Management System 1.0 allows SQL injection via the mobnum argument in admin/contact.php, potentially causing critical damage, as identified by VDB-250128.Product: PHPGurukul Hospital Management SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-0361NVD References: - https://github.com/laoquanshi/PHPGurukul-Hospital-Management-System/blob/main/PHPGurukul%20Hospital%20Management%20System%20SQL7.docx- https://vuldb.com/?ctiid.250128- https://vuldb.com/?id.250128CVE-2024-0362 - PHPGurukul Hospital Management System 1.0 is vulnerable to SQL injection in the admin/change-password.php file due to the manipulation of the cpass argument, allowing for potential exploitation.Product: PHPGurukul Hospital Management SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-0362NVD References: - https://github.com/laoquanshi/PHPGurukul-Hospital-Management-System/blob/main/PHPGurukul%20Hospital%20Management%20System%20SQL8.docx- https://vuldb.com/?ctiid.250129- https://vuldb.com/?id.250129CVE-2024-0363 - PHPGurukul Hospital Management System 1.0 is vulnerable to SQL injection in the file admin/patient-search.php through the manipulation of the searchdata argument (CVE-ID: VDB-250130).Product: PHPGurukul Hospital Management SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-0363NVD References: - https://github.com/laoquanshi/PHPGurukul-Hospital-Management-System/blob/main/PHPGurukul%20Hospital%20Management%20System%20SQL10.docx- https://vuldb.com/?ctiid.250130- https://vuldb.com/?id.250130CVE-2024-0364 - PHPGurukul Hospital Management System 1.0 is susceptible to a critical SQL injection vulnerability via the adminremark parameter in admin/query-details.php, allowing public disclosure and potential exploitation, identified as VDB-250131.Product: PHPGurukul Hospital Management SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-0364NVD References: - https://github.com/laoquanshi/PHPGurukul-Hospital-Management-System/blob/main/PHPGurukul%20Hospital%20Management%20System%20SQL11.docx- https://vuldb.com/?ctiid.250131- https://vuldb.com/?id.250131CVE-2020-26629 - Hospital Management System V4.0 allows unauthenticated attackers to upload any file to the server due to a JQuery Unrestricted Arbitrary File Upload vulnerability.Product: PHPGurukul Hospital Management SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2020-26629NVD References: https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.htmlCVE-2023-50585 - Tenda A18 v15.13.07.09 was discovered to contain a stack overflow via the devName parameter in the formSetDeviceName function.Product: Tenda A18CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-50585NVD References: https://github.com/LaPhilosophie/IoT-vulnerable/blob/main/Tenda/A18/formSetDeviceName.mdCVE-2022-46025 - Totolink N200RE_V5 V9.3.5u.6255_B20211224 allows remote attackers to obtain Wi-Fi system information without authentication.Product: Totolink N200RE V5CVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2022-46025NVD References: https://pastebin.com/aan5jT40CVE-2023-48245, CVE-2023-48250, CVE-2023-48251, CVE-2023-48262 through CVE-2023-48266 - Multiple vulnerabilities in Bosch Nexo cordless nutrunnerProduct: Bosch NEXO-OSCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-48245NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-48250NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-48251NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-48262NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-48263NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-48264NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-48265NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-48266NVD References: https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.htmlCVE-2023-51952 through CVE-2023-51972 - Tenda AX1803 v1.0.0.1 contains multiple vulnerabilitiesProduct: Tenda AX1803CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-51952NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-51953NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-51954NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-51955NVD: ht…
Product: LaravelCVSS Score: 0** KEV since 2024-01-16 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2018-15133CVE-2024-0056 - Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass VulnerabilityProduct: Microsoft.Data.SqlclientCVSS Score: 8.7NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-0056MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0056CVE-2024-20652 - Windows HTML Platforms Security Feature Bypass VulnerabilityProduct: Microsoft Windows 10 1507CVSS Score: 7.5NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20652MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20652CVE-2024-20653 - Microsoft Common Log File System Elevation of Privilege VulnerabilityProduct: Microsoft Windows 10 1507CVSS Score: 7.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20653MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20653CVE-2024-20654 - Microsoft ODBC Driver Remote Code Execution VulnerabilityProduct: Microsoft Windows 10 1507CVSS Score: 8.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20654MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20654CVE-2024-20656 - Visual Studio Elevation of Privilege VulnerabilityProduct: Microsoft Visual StudioCVSS Score: 7.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20656MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20656CVE-2024-20657 - Windows Group Policy Elevation of Privilege VulnerabilityProduct: Microsoft Windows 10 1507CVSS Score: 7.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20657MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20657CVE-2024-20658 - Microsoft Virtual Hard Disk Elevation of Privilege VulnerabilityProduct: Microsoft Windows 10 1507CVSS Score: 7.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20658MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20658CVE-2024-20661 - Microsoft Message Queuing Denial of Service VulnerabilityProduct: Microsoft Windows 10 1507CVSS Score: 7.5NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20661MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20661CVE-2024-20672 - .NET Denial of Service VulnerabilityProduct: Microsoft .NETCVSS Score: 7.5NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20672MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20672CVE-2024-20674 - Windows Kerberos Security Feature Bypass VulnerabilityProduct: Microsoft Windows 10 1507CVSS Score: 8.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20674MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20674CVE-2024-20676 - Azure Storage Mover Remote Code Execution VulnerabilityProduct: Microsoft Azure Storage MoverCVSS Score: 8.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20676MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20676CVE-2024-20677 - Microsoft Office Remote Code Execution VulnerabilityProduct: Microsoft 365 AppsCVSS Score: 7.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20677MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20677CVE-2024-20681 - Windows Subsystem for Linux Elevation of Privilege VulnerabilityProduct: Microsoft Windows 10 21H2CVSS Score: 7.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20681MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20681CVE-2024-20682 - Windows Cryptographic Services Remote Code Execution VulnerabilityProduct: Microsoft Windows 10 1507CVSS Score: 7.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20682MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20682CVE-2024-20683 - Win32k Elevation of Privilege VulnerabilityProduct: Microsoft Windows 10 1507CVSS Score: 7.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20683MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20683CVE-2024-20686 - Win32k Elevation of Privilege VulnerabilityProduct: Microsoft Windows Server 2022 23H2CVSS Score: 7.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20686MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20686CVE-2024-20687 - Microsoft AllJoyn API Denial of Service VulnerabilityProduct: Microsoft Windows 10 1507CVSS Score: 7.5NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20687MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20687CVE-2024-20696 - Windows Libarchive Remote Code Execution VulnerabilityProduct: Microsoft Windows 10 1809CVSS Score: 7.3NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20696MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20696CVE-2024-20697 - Windows Libarchive Remote Code Execution VulnerabilityProduct: Microsoft Windows 11 22H2CVSS Score: 7.3NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-20697MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20697CVE-2024-2…
Sponsored By Corelight[Webinar] Defend with Endpoint and Network Telemetry | What happens on the endpoint doesn’t stay on the endpoint. Join Corelight and Cribl on Jan. 25 to learn how to defend against advanced threats and lateral movement by unifying endpoint and network telemetry. Register for the live webinar:
Do You Know Where Your Data Is? SANS and CrashPlan have teamed up to survey our audience about user endpoints and what strategies organizations are using to protect against the loss of data. We invite you to complete this survey for a chance to win a $250 Amazon gift card!
Automating Vulnerability Management with BreachLock | Tune in on Tue, February 27 as Dave Shackleford takes a solutions deep dive with BreachLock’s attack surface management and penetration testing as a service offering. | Register now:
A SANS Survey: The Future of Network Security Technology | Join Matt Bromiley and invited guest speakers from Palo Alto Networks on Wed, February 28 as they dive into spending habits, priorities, and decision-making processes when it comes to security technology. | Register now: