December Cybersecurity News Roundup: Key Highlights and Update
WordPress Breach
Malicious GitHub Repository: A now-removed repository pretending to offer a WordPress tool facilitated the theft of over 390,000 credentials.
Attack Tactics: The threat actor, identified as MUT-1244, used phishing campaigns and trojanized repositories with fake proof-of-concept code.
Stolen Data: Sensitive credentials such as SSH private keys and AWS access keys were exfiltrated, posing serious risks to affected users.
Microsoft Vulnerabilities
Office and Excel Flaws:
CVE-2024-49059: A privilege escalation vulnerability in Microsoft Office (CVSS 7.0). Exploited through a race condition, it allows attackers to gain SYSTEM-level access under complex conditions.
CVE-2024-49069: A remote code execution (RCE) flaw in Microsoft Excel (CVSS 7.8), stemming from a Use After Free issue. Attackers could execute arbitrary code.
Microsoft Advisory: Users are urged to install December’s updates to mitigate risks.
Google Updates
Chrome Browser Patches:
Critical Vulnerabilities: Two high-severity memory safety flaws in the V8 JavaScript engine were patched. One researcher was awarded $55,000 for their findings.
Android Security Update:
Patches: Addressed 14 vulnerabilities, including an RCE flaw in the System component (CVE-2024-43767). Google emphasized the importance of upgrading to newer Android versions for enhanced security.
Vanir Tool:
Purpose: Open-sourced to help Android developers detect and fix missing security patches efficiently.
Impact: Aimed at scaling patch management for diverse Android devices with complex update requirements.
Apple Patches
Updates: iOS 18.2 and macOS Sequoia 15.2 addressed critical issues across various components, such as Kernel and WebKit.
Notable Fix: CVE-2024-45490 in libexpat allowed remote attackers to execute arbitrary code. Apple encouraged users to update their devices promptly.
WordPress Plugin Exploits
Vulnerabilities:
Hunk Companion (CVE-2024-9707): Allowed unauthorized plugin activation, leading to potential RCE.
WP Query Console (CVE-2024-50498): A critical code injection flaw affecting all versions. The plugin has since been removed.
Recommendations: Administrators should update plugins and review for unauthorized installations.
Ivanti, Atlassian, and Splunk Patches
Ivanti:
Critical Bugs: Authentication bypass (CVSS 10.0) and command injection vulnerabilities in Connect Secure and Cloud Services Application were fixed.
Urgent Updates: Ivanti credited CrowdStrike for uncovering the issues and urged users to apply patches immediately.
Atlassian:
Fixed high-severity vulnerabilities in Bamboo Data Center, Bitbucket, and Confluence, mostly related to third-party dependencies.
Splunk:
Resolved multiple vulnerabilities, including a deserialization flaw (CVSS 8.8) in the Secure Gateway app.
Healthcare and Corporate Breaches
Major Incidents:
Byte Federal: A GitLab flaw led to the exposure of data from 58,000 individuals.
Atrium Health: A breach linked to online tracking affected 585,000 individuals.
Chemonics International: A year-old breach exposed data of 260,000 people.
Employee Data Leak:
A hacker released over 760,000 employee records from major organizations, including Bank of America and Nokia.
Germany Neutralizes BADBOX Malware
Action Taken:
The German BSI disrupted the BADBOX operation by sinkholing malicious domains, severing communication with infected devices.
Over 30,000 internet-connected devices, preloaded with the malware, were affected.
Broader Implications:
The malware operation highlighted significant supply chain vulnerabilities and risks posed by compromised devices.
AWS Launches Security Incident Response
Features:
Automates incident triaging, prioritization, and alert delivery to security teams.
Includes a dashboard with metrics like mean time to resolution (MTTR).
Integrates with AWS Organizations for centralized event management.
Halcyon Secures $100M Funding
Mission: The company aims to combat ransomware with advanced tools and strategies.
Valuation: Halcyon is now valued at $1 billion after its Series C funding round, led by Evolution Equity Partners.
Adobe Patches for High-Risk ColdFusion Vulnerability
Summary: Adobe released updates to address a ColdFusion vulnerability that allows attackers to exploit a path traversal issue to read arbitrary files on affected systems.
Details:
Vulnerability: CVE-2024-53961, CVSS 7.4
Impact: Attackers can access sensitive files, manipulate system data, or cause data breaches.
Affected Versions: ColdFusion 2023 (update 11 and earlier) and ColdFusion 2021 (update 17 and earlier).
Mitigation: Update to ColdFusion 2023 update 12 and ColdFusion 2021 update 18.
Additional Context: This is similar to a previously patched vulnerability (CVE-2023-26360) that allowed code execution and targeted federal systems.
Cisco’s ASA Vulnerability
Summary: A cross-site scripting (XSS) vulnerability in Cisco Adaptive Security Appliance (ASA) products continues to be exploited.
Details:
Vulnerability: CVE-2014-2120 (medium severity).
Impact: Exploitation of the WebVPN login page could allow attackers to steal credentials or deliver malicious scripts.
Exploitation Attempts: Increased activity in 2024, particularly by botnets like Androxgh0st.
Mitigation: Cisco urges customers to upgrade to fixed software versions.
Fortinet Patches for Severe FortiWLM
Summary: Fortinet addressed a critical path traversal flaw in its Wireless Manager (FortiWLM) product.
Details:
Vulnerability: CVE-2023-34990, CVSS 9.6
Impact: Remote attackers could read sensitive files and potentially execute code.
Exploitation: Attackers could hijack administrative sessions using session tokens retrieved from logs.
Mitigation: Update to FortiWLM versions 8.6.6 and 8.5.5.
Chrome 131 Memory Bugs Fixed
Summary: Google released Chrome 131 to address several high-severity vulnerabilities, including memory safety issues.
Details:
Key Vulnerabilities:
CVE-2024-12692: Type confusion in V8 JavaScript engine ($55,000 bounty).
CVE-2024-12693: Out-of-bounds memory access in V8 ($20,000 bounty).
CVE-2024-12694: Use-after-free vulnerability in Compositing.
CVE-2024-12695: Out-of-bounds write in V8.
Mitigation: Users should update to versions 131.0.6778.204/.205 for Windows/macOS and 131.0.6778.204 for Linux.
Palo Alto Networks Firewall Vulnerability
Summary: A high-severity vulnerability in PAN-OS software powering Palo Alto firewalls could trigger a denial-of-service (DoS) condition.
Details:
Vulnerability: CVE-2024-3393
Impact: Crafted DNS packets could cause firewalls to reboot and enter maintenance mode.