One of the best daily newsletters to stay on top of security. Short, sweet and to the point. https://lnkd.in/dutVjmtB
Here is today's as an example.
=
Security observations
=
None in particular.
=
Vulnerabilities
=
[2024-11-12] FortiOS - SSLVPN session hijacking using SAML authentication
-
Fortinet disclosed a critical vulnerability (CVE-2023-50176, CVSS 7.1) in FortiOS SSLVPN on November 12, 2024. This flaw allows attackers to hijack active VPN sessions if the victim uses SAML authentication and interacts with a malicious link, potentially distributed via email. While no public exploits or active exploitation have been reported, Fortinet recommends immediate updates to secure devices. Affected versions are patched in FortiOS 7.4.4, 7.2.8, and 7.0.14, which have been available prior to the public disclosure.
https://lnkd.in/daaBn4wU
https://lnkd.in/dfEuxDkz
[2024-11-14] Critical Vulnerabilities Disclosed in Rockwell FactoryTalk Updater: Mitigation Required
--
Rockwell Automation has identified critical vulnerabilities in its FactoryTalk Updater software, including insecure storage of sensitive information (CVE-2024-10943, CVSS 9.1), improper input validation (CVE-2024-10944, CVSS 8.4), and flawed security checks allowing local privilege escalation (CVE-2024-10945, CVSS 7.3). Exploitation risks include authentication bypass, remote code execution, and local privilege escalation. Affected versions include FactoryTalk Updater-Web Client 4.00.00 and all versions of its Client and Agent.
https://lnkd.in/dW9HyU9F
[2024-11-14] CISA warns of more Palo Alto Networks vulnerabilities exploited in the wild
--
The Cybersecurity and Infrastructure Security Agency (CISA) added two vulnerabilities related to Palo Alto Networks Expedition to its Known Exploited Vulnerabilities Catalog: CVE-2024-9463 (OS Command Injection) and CVE-2024-9465 (SQL Injection).
The vulnerability potentially allows attackers to access sensitive data like usernames, passwords, and firewall configurations. The issues are resolved in Expedition version 1.2.96 or later. Organizations are advised to update, restrict network access, and rotate credentials to mitigate risks. Further guidance is available from CISA and Palo Alto Networks.
https://lnkd.in/djyghzV9
[2024-11-14] Active exploitation of previously reported Palo Alto Management Interface vulnerability
--
Palo Alto Networks report that the previously published (see mnemonic daily newsletter 11th of November) PAN-OS RCE vulnerability now has been observed exploited in the wild.
As previously, recommendations are to ensure management interface access is correctly configured according to best practices and only accessible from trusted internal IPs.
https://lnkd.in/dT9V6USC
Penetration Tester | Bug Hunter | offensive Security Engineer | Software Engineer
6moCan you explain the clickjacking mechanism you use it , not disclosure any thing, just the tips of clickjacking, cause i want to know more about it . and you done an amazing work