SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
Vulnerability Symbiosis: vSphere's CVE-2024-38812 and CVE-2024-38813 [Guest Diary]
Published: 2024-12-11. Last Updated: 2024-12-11 01:56:21 UTC
by Guy Bruneau (Version: 1)
[This is a Guest Diary by Jean-Luc Hurier, an ISC intern as part of the SANS.edu BACS program]
Background
In April 2020, at the height of the global pandemic, virtualization was in high demand. During that time, vSphere 7.0 was released. With that release, had two unknown vulnerabilities – a match made in heaven for threat actors. It wasn’t until June 2024 that China’s TZL security researchers revealed CVE-2024-38812 and CVE-2024-38813 at China’s 2024 Matrix Cup – a hacking contest. Since then, both vulnerabilities were published and patched in September, however one of those patches required a hotfix just a month later (CVE-2024-38812).
Findings
The reason that this is a topic of conversation is because I noticed an intermittent pattern of reconnaissance of possible vSphere related web traffic over the course of the last 3.5 months ...
Read the complete entry:
Microsoft Patch Tuesday: December 2024
Published: 2024-12-10.
Last Updated: 2024-12-10 18:39:33 UTC
by Johannes Ullrich (Version: 1)
Microsoft today released patches for 71 vulnerabilities. 16 of these vulnerabilities are considered critical. One vulnerability (CVE-2024-49138) has already been exploited, and details were made public before today's patch release.
Significant Vulnerabilities
CVE-2024-49138: This vulnerability affects the Windows Common Log File System Driver, a subsystem affected by similar privilege escalation vulnerabilities in the past. The only reason I consider this "significant" is that it is already being exploited.
Windows Remote Desktop Services: 9 of the 16 critical vulnerabilities affect Windows Remote Desktop Services. Exploitation may lead to remote code execution. Microsoft considers the exploitation of these vulnerabilities less likely. Even without considering these vulnerabilities, Windows Remote Desktop Service should not be exposed to the internet.
LDAP: Remote code execution vulnerabilities in the LDAP service are always "interesting" given the importance of LDAP as part of Active Directory. Two critical vulnerabilities are patched for LDAP. One with a CVSS score of 9.8. A third critical vulnerability affects the LDAP client.
CVE-2024-49126: LSASS vulnerabilities always make me reminisce of the "Blaster" worm and the related vulnerability back in the day. This one does involve a race condition, which will make exploitation more difficult. It could become an interesting lateral movement vulnerability if a reliable exploit materializes ...
Read the complete entry:
https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+December+2024/31508/
CURLing for Crypto on Honeypots (2024.12.09)
https://isc.sans.edu/diary/CURLing+for+Crypto+on+Honeypots/31502/
[Guest Diary] Business Email Compromise (2024.12.05)
https://isc.sans.edu/diary/Guest+Diary+Business+Email+Compromise/31474/
The list is assembled by pulling recent vulnerabilities from NIST NVD, Microsoft, Twitter mentions of vulnerabilities, ISC Diaries and Podcast, and the CISA list of known exploited vulnerabilities. There are also some unscored, but significant, vulnerabilities at the end. This includes vulnerabilities that have not been added to the NVD yet.
Product: VMware vCenter Server
CVSS Score: 0
** KEV since 2024-11-20 **
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-38812
ISC Diary: https://isc.sans.edu/diary/31510
Product: VMware vCenter Server
CVSS Score: 0
** KEV since 2024-11-20 **
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-38813
ISC Diary: https://isc.sans.edu/diary/31510
Product: Microsoft Windows Task Scheduler
CVSS Score: 0
** KEV since 2024-11-12 **
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-49039
ISC Podcast: https://isc.sans.edu/podcastdetail/9240
Product: Windows Microsoft Windows Common Log File System (CLFS) driver
CVSS Score: 7.8
** KEV since 2024-12-10 **
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-49138
CVE Record: https://www.cve.org/CVERecord?id=CVE-2024-49138
ISC Diary: https://isc.sans.edu/diary/31508
ISC Podcast: https://isc.sans.edu/podcastdetail/9250
MSRC References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49138
Product: Ivanti CSA
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-11639
ISC Podcast: https://isc.sans.edu/podcastdetail/9250
NVD References:
CVE-2024-11772 - Ivanti CSA before version 5.0.3 is vulnerable to command injection, enabling a remote authenticated attacker with admin privileges to execute remote code.
Product: Ivanti CSA
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-11772
ISC Podcast: https://isc.sans.edu/podcastdetail/9250
NVD References: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CSA-CVE-2024-11639-CVE-2024-11772-CVE-2024-11773
CVE-2024-11772 - Ivanti CSA before version 5.0.3 is vulnerable to command injection, enabling a remote authenticated attacker with admin privileges to execute remote code.
Product: Ivanti CSA
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-11772
ISC Podcast: https://isc.sans.edu/podcastdetail/9250
NVD References: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CSA-CVE-2024-11639-CVE-2024-11772-CVE-2024-11773
CVE-2024-11773 - Ivanti CSA before version 5.0.3 is vulnerable to SQL injection in the admin web console, enabling a remote attacker with admin privileges to execute arbitrary SQL queries.
Product: Ivanti CSA
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-11773
ISC Podcast: https://isc.sans.edu/podcastdetail/9250
NVD References: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CSA-CVE-2024-11639-CVE-2024-11772-CVE-2024-11773
Product: Ivanti Connect Secure
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-11633
NVD References: https://forums.ivanti.com/s/article/December-2024-Security-Advisory-Ivanti-Connect-Secure-ICS-and-Ivanti-Policy-Secure-IPS-Multiple-CVEs
Product: Ivanti Connect Secure
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-11634
NVD References: https://forums.ivanti.com/s/article/December-2024-Security-Advisory-Ivanti-Connect-Secure-ICS-and-Ivanti-Policy-Secure-IPS-Multiple-CVEs
Product: ABB ASPECT Enterprise
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-11317
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: ABB ASPECT Enterprise
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-48839
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: ABB ASPECT Enterprise
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-48840
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: ABB ASPECT Enterprise
CVSS Score: 9.4
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-48845
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: ABB ASPECT Enterprise
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-51545
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: ABB ASPECT Enterprise
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-51548
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: ABB ASPECT Enterprise
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-51549
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: ABB ASPECT Enterprise
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-51550
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: ABB ASPECT
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-51551
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: ABB ASPECT
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-51554
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: ABB ASPECT
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-51555
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: ABB ASPECT Enterprise
CVSS Score: 9.6
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-6515
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: ABB ASPECT Enterprise
CVSS Score: 9.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-6516
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: ABB ASPECT Enterprise
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-6784
NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch
Product: Mitel MiCollab
CVSS Score: 0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-35286
ISC Podcast: https://isc.sans.edu/podcastdetail/9244
Product: Mitel MiCollab
CVSS Score: 0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-41713
ISC Podcast: https://isc.sans.edu/podcastdetail/9244
Product: Open Robotics Robotic Operating System 2 (ROS2)
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-37861
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-37863
NVD References:
- https://github.com/GoesM/ROS-CVE-CNVDs
- https://github.com/ros-navigation/navigation2/issues/4005
- https://github.com/ros-navigation/navigation2/issues/4335
Product: Open Robotics Robotic Operating System 2 (ROS2)
CVSS Score: 9.1 AtRiskScore 30
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-38920
NVD References:
- https://github.com/GoesM/ROS-CVE-CNVDs
Product: Open Robotics Robotic Operating System 2
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-41647
NVD References:
- https://github.com/GoesM/ROS-CVE-CNVDs
Product: ClipBucket-V5
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-54135
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-54136
NVD References:
- https://github.com/MacWarrior/clipbucket-v5/commit/76a829c088f0813ab3244a3bd0036111017409b0
- https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-4523-mqmv-wrqx
- https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-vxvf-5cmq-5f78
Product: Drupal Core
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-55636
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-55637
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-55638
NVD References: https://www.drupal.org/sa-core-2024-006
NVD References: https://www.drupal.org/sa-core-2024-007
NVD References: https://www.drupal.org/sa-core-2024-008
Product: SailPoint IdentityIQ
CVSS Score: 0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-10905
ISC Podcast: https://isc.sans.edu/podcastdetail/9242
Product: DPtech DP Service
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-52544
NVD References:
Product: Adobe Document Service
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-47578
NVD References:
Product: Adobe Connect
CVSS Score: 9.3
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-54032
NVD References: https://helpx.adobe.com/security/products/connect/apsb24-99.html
Product: socat readline.sh
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-54661
NVD References: https://repo.or.cz/socat.git/blob/6ff391324d2d3b9f6bfb58e7d16a20be43b47af7:/readline.sh#l29
Product: Joomla Convert Forms
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-40744
NVD References: https://www.tassos.gr/joomla-extensions/convert-forms
Product: Django
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-53908
NVD References:
- https://docs.djangoproject.com/en/dev/releases/security/
Product: Dell PowerFlex
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-37143
NVD References: https://www.dell.com/support/kbdoc/en-us/000258342/dsa-2024-405-security-update-for-dell-products-for-multiple-vulnerabilities
Product: Armv8 Arm processors
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-5660
NVD References: https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-5660
Product: MOBATIME Network Master Clock - DTS 4801
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-12286
NVD References: https://www.cisa.gov/news-events/ics-advisories/icsa-24-345-01
Product: Lopalopa E-Learning Management System
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-54920
NVD References: https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20Signup%20teacher.pdf
Product: MailCleaner
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-55560
NVD References:
- https://github.com/MailCleaner/MailCleaner/commit/28d913eaa044b689eb114f72ebe92d48cb4aaca7
- https://github.com/MailCleaner/MailCleaner/wiki/Watchdogs#host_keys
Product: Perl POSIX::2008
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-55564
NVD References: https://metacpan.org/dist/POSIX-2008/changes
Product: WAVLINK WN531P3
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-54747
NVD References:
Product: Ubiquiti U6-LR
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-54750
NVD References: https://colorful-meadow-5b9.notion.site/U6-LR_HardCode_vuln-14bc216a1c30806487ebdda3bb984e91?pvs=4
Product: Ruijienetworks Reyee OS
CVSS Score: 9.4
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-47547
NVD References: https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01
Product: Ruijienetworks Reyee OS
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-48874
NVD References: https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01
Product: Ruijienetworks Reyee OS
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-52324
NVD References: https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01
Product: Planet WGS-804HPT: Version v1.305b210531
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-48871
NVD References:
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-340-02
- https://www.planet.com.tw/en/support/downloads?method=keyword&keyword=v1.305b241111
Product: Comodo Dome Firewall
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-52320
NVD References:
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-340-02
- https://www.planet.com.tw/en/support/downloads?method=keyword&keyword=v1.305b241111
Product: Siemens syngo.plaza
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-52335
NVD References: https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-160244
Product: Hikvision IP cameras
CVSS Score: 9.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-10773
NVD References:
- https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF
- https://www.cisa.gov/resources-tools/resources/ics-recommended-practices
- https://www.first.org/cvss/calculator/3.1
- https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0006.json
- https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0006.pdf
Product: Wordfence SV100 Companion plugin
Active Installations: This plugin has been closed as of December 5, 2024 and is not available for download. This closure is temporary, pending a full review.
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-12155
NVD References:
Product: Owen Cutajar & Hyder Jaffari WordPress Auction Plugin
Active Installations: This plugin has been closed as of Disambor 2, 2024 and is not available for download. This closure is temporary, pending a full review.
CVSS Score: 9.3
Product: WP Sharks s2Member Pro
Active Installations: 10,000+
CVSS Score: 9.0
Product: Najeeb Ahmad Simple User Registration
Active Installations: 400+
CVSS Score: 9.1
Product: The WP Umbrella Update Backup Restore & Monitoring plugin
Active Installations: 30,000+
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-12209
NVD References:
- https://plugins.trac.wordpress.org/browser/wp-health/tags/v2.16.4/src/Actions/RestoreRouter.php#L45
Product: SoftLab Integrate Google Drive
Active Installations: 7,000+
CVSS Score: 9.8
Product: Genetech Pie Register Premium
Active Installations: 2,000+
CVSS Score: 10.0
Product: Roninwp FAT Services Booking
Active Installations: unknown
CVSS Score: 9.3
Product: Envato Revy
Active Installations: unknown
CVSS Score: 10.0
Product: Envato Revy
Active Installations: unknown
CVSS Score: 9.3
Product: Envato Sweet Date
Active Installations: unknown
CVSS Score: 9.8
Hampered by incomplete visibility of your assets? Inundated with a high volume of vulnerabilities? Overwhelmed with manual prioritization processes? You’re not alone. A staggering 60% of breaches happen because vulnerabilities go unpatched—even when a fix is available. Learn how to shift to a more proactive, risk-based approach to vulnerability management in this white paper.
Survey: 2025 ICS Security Budget vs. Modern Risk: Optimizing Cybersecurity Investments for ICS/OT and Critical Infrastructure | With this survey, SANS is looking to understand how organizations in critical infrastructure sectors are allocating resources to defend their ICS/OT environments. Complete the survey by December 30 for a chance to win a $250 Amazon gift card!
Survey: 2025 ICS Security Budget vs. Modern Risk: Optimizing Cybersecurity Investments for ICS/OT and Critical Infrastructure | With this survey, SANS is looking to understand how organizations in critical infrastructure sectors are allocating resources to defend their ICS/OT environments. Complete the survey by December 30 for a chance to win a $250 Amazon gift card!
Survey: 2025 ICS Security Budget vs. Modern Risk: Optimizing Cybersecurity Investments for ICS/OT and Critical Infrastructure | With this survey, SANS is looking to understand how organizations in critical infrastructure sectors are allocating resources to defend their ICS/OT environments. Complete the survey by December 30 for a chance to win a $250 Amazon gift card!