jeudi 28 mai 2020    || Inscription
BanniereAlertes
 
 

Notre sélection d'alertes et avis SSI.
Sources : US Cert, Cert EU, Cert FR, Cnil, VulDB.

UPDATE Critical Vulnerability in Cisco Adaptive Security Appliance (CERT-EU Security Advisory 2018-004)

On the 29nd of January 2018, CISCO published a security advisory for a remote code execution and denial of service vulnerability affecting Cisco Adaptive Security Appliance (ASA). The vulnerability is located in the Secure Sockets Layer (SSL) VPN...
Auteur: Cert EU

Critical Vulnerability in Electron on Windows (CERT-EU Security Advisory 2018-003)

On the 22nd of January 2018, GitHub published a fix for a remote code execution vulnerability affecting Electron applications that use custom protocol handlers. An attacker could exploit the vulnerability by providing to the victim a specifically...
Auteur: Cert EU

INTEL AMT Security Issue (CERT-EU Security Advisory 2018-002)

On January 12th 2018, F-Secure reported a security issue affecting laptops supporting Intel’s Active Management Technology (AMT). The issue allows an attacker with physical access to the laptop to bypass the need to enter credentials, including...
Auteur: Cert EU

UPDATE Meltdown and Spectre Critical Vulnerabilities (CERT-EU Security Advisory 2018-001)

Design flaws in modern computer processors allow programs to steal data processed on the computer. The hardware design deficiencies leaded to the development of two attack scenarios: Meltdown, melts security boundaries normally enforced by the...
Auteur: Cert EU

Multiple Security Vulnerabilities Affecting VMware Products (CERT-EU Security Advisory 2017-027)

On the 19th of December 2017, VMware released updates to address multiple security vulnerabilities in ESXi, vCenter Server Appliance, Workstation and Fusion. The most serious of the vulnerabilities could allow remote arbitrary code execution in a...
Auteur: Cert EU

UPDATE Unauthenticated Root Access in macOS High Sierra (CERT-EU Security Advisory 2017-026)

On November 28th, a security researcher Lemi Orhan Ergin has notified Apple about a serious security issue in macOS Hight Sierra. It appears that anyone can login as root by providing an empty password. The bypass works by putting the word root...
Auteur: Cert EU

Critical Vulnerabilities Affecting Intel Firmware (CERT-EU Security Advisory 2017-025)

On the 20th of November 2017, Intel reported that it has identified security vulnerabilities that could impact Intel Management Engine, Intel Trusted Execution Engine, and Intel Server Platform Services. As the result, an attacker could gain...
Auteur: Cert EU

Increased Use of Browser Cryptojacking (CERT-EU Security Advisory 2017-024)

Since summer 2017 -- mostly due to significant increase of the price of Bitcoin -- browser-based mining services have increased their popularity. By providing easy to use JavaScript libraries they allow website owners to increase their revenues...
Auteur: Cert EU

UPDATE RSA Key Generation Prone to Factorization Attack (CERT-EU Security Advisory 2017-023)

A vulnerability (CVE-2017-15361) in the procedure of RSA key generation used by a software library allows a practical factorization attack. As a result it is possible to compute the private part of an RSA key based only on its public part. The...
Auteur: Cert EU

Actively Exploited Critical Zero-Day Vulnerability in Adobe Flash (CERT-EU Security Advisory 2017-022)

On 16th of October 2017, Adobe has released a security update for Adobe Flash Player for Windows, MacOS, Linux, and Chrome OS. This update addresses a critical type confusion vulnerability that could lead to code execution (CVE-2017-11292). Adobe...
Auteur: Cert EU

KRACK - Key Reinstallation Attacks: Breaking WPA2 (CERT-EU Security Advisory 2017-021)

Researchers in the KU Leuven University have discovered a serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within the range of the Wi-Fi of the victim can exploit these weaknesses using key...
Auteur: Cert EU

Critical Vulnerabilities Impacting Dnsmasq (CERT-EU Security Advisory 2017-020)

On October 2nd, 2017, Google published a blog post detailing severalcritical vulnerabilities impacting dnsmasq. Dnsmasq is widely used in Linux and BSD distributions, Android devices and proprietary firmwares for for serving DNS, DHCP, router...
Auteur: Cert EU

Joomla! Super User Password Leak (CERT-EU Security Advisory 2017-019)

A previously unknown LDAP injection vulnerability could allow remote attackers to leak the super user password with blind injection techniques and to fully take over any affected Joomla! installation.
Auteur: Cert EU

BlueBorne Attack against Bluetooth (CERT-EU Security Advisory 2017-018)

A new attack vector endangering major mobile, desktop, and IoT operating systems and the devices using them - including Android, iOS, Windows, and Linux - has been revealed. The new attack is dubbed BlueBorne, as it spreads through the air...
Auteur: Cert EU

Remote Code Execution Attack Against Apache Struts REST Plugin (CERT-EU Security Advisory 2017-017)

On August 16th 2017, a new vulnerability affecting Apache Struts 2 (CVE-2017-9805) was published. This vulnerability allows remote code execution attacks, when the Struts REST plugin is used with XStreamHandler to handle XML payloads. It is...
Auteur: Cert EU

CISCO WebEx Browser Extension Remote Code Execution Vulnerability (CERT-EU Security Advisory 2017-016)

A vulnerability in CISCO WebEx browser extensions could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on a targeted system. This vulnerability affects the browser extensions for...
Auteur: Cert EU

Cisco SNMP Remote Code Execution Vulnerabilities (CERT-EU Security Advisory 2017-015)

The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, attacker to remotely execute code on an affected system or cause an affected system to...
Auteur: Cert EU

Petya-Like Malware Campaign (CERT-EU Security Advisory 2017-014)

A large malware campaign broke out on Tuesday, 27/06/2017 and was widely reported in the news. The malware used -- which appears to be similar to Petya -- has been augmented with efficient local network spreading mechanisms, which resulted in a...
Auteur: Cert EU

Privileges Escalation Vulnerabilities in Unix Operating Systems (CERT-EU Security Advisory 2017-013)

On 19th of June 2017, Qualys Research Team published a blog post and a security advisory about vulnerabilities in the memory management of several UNIX operating systems. These vulnerabilities can lead to privilege escalation on these systems, by...
Auteur: Cert EU

UPDATE! WannaCry Ransomware Campaign Exploiting SMB Vulnerability (CERT-EU Security Advisory 2017-012)

A large ransomware campaign has been observed since Friday, May 12th, 2017. The payload delivered is a variant of ransomware malware called WannaCry. It appears to infect computers through a recent SMB vulnerability in Microsoft Windows operating...
Auteur: Cert EU

Critical Microsoft Scripting Engine Memory Corruption Vulnerability (CERT-EU Security Advisory 2017-011)

A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file leading to memory corruption. An attacker who successfully exploits this vulnerability could execute...
Auteur: Cert EU

UPDATE Critical Privileges Escalation Vulnerability in Intel AMT Service (CERT-EU Security Advisory 2017-010)

On 1st of May 2017, Intel reported that there is "an escalation of privilege vulnerability in Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM), and Intel® Small BusinessTechnology that can allow an unprivileged...
Auteur: Cert EU

UPDATE Critical zero-day vulnerability in Microsoft Office actively exploited (CERT-EU Security Advisory 2017-009)

A vulnerability in Microsoft Office is actively exploited to distribute Dridex banking Trojan.
Auteur: Cert EU

Broadcom Critical Wi-Fi SoC Vulnerability in iOS and Android (CERT-EU Security Advisory 2017-008)

The vulnerability resides in a widely used Wi-Fi chipset manufactured by Broadcom and used in both iOS and Android devices. An attacker within range may be able to execute arbitrary code on the Wi-Fi chip. Google Project Zero researcher Gal...
Auteur: Cert EU

UPDATE Critical Vulnerabilities in VMWare ESXi, Workstation, and Fusion (CERT-EU Security Advisory 2017-007)

VMWare released an advisory for VMWare ESXi, Workstation, and Fusion products [1]. The advisory addresses critical and moderate security issues that may allow a guest system to execute code on the host system (CVE-2017-4902, CVE-2017-4903, and...
Auteur: Cert EU
12345678910Last

Événements SSI