by CIRT Team
A Vulnerability in macOS Big Sur, iOS and iPadOS Could Allow for Arbitrary Code Execution
DESCRIPTION:A vulnerability has been discovered in macOS Big Sur, iOS and iPadOS,which could allow for arbitrary code execution. * iOS is a mobile operating system for mobile devices, including theiPhone, iPad, and iPod touch.* iPadOS is the successor to iOS 12 and is a mobile operating system foriPads.* macOS Big Sur is the 17th and current major release of macOS. Successful exploitation of this vulnerability...
Read More
by CIRT Team
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...
Read More
by CIRT Team
Oracle Quarterly Critical Patches Issued July 20, 2021
DESCRIPTION:Multiple vulnerabilities have been discovered in Oracle products, whichcould allow for remote code execution. SYSTEM AFFECTED:* Oracle Database Server, versions 12.1.0.2, 19c* Big Data Spatial and Graph, versions prior to 2.0, prior to 23.1* Essbase, version 21.2* Essbase Analytic Provider Services, versions 11.1.2.4, 21.2* Hyperion Essbase Administration Services, versions 11.1.2.4, 21.2* Oracle Commerce Guided Search / Oracle Commerce Experience Manager,version 11.3.1.5* Oracle Communications Billing and...
Read More
by CIRT Team
A Vulnerability in HP, Xerox, and Samsung Printer Drivers Could Allow Attackers to Gain Administrator Rights on a System
DESCRIPTION:A vulnerability has been discovered HP, Xerox, and Samsung printerdrivers, which could result in local privilege escalation. A printerdriver is a piece of system software that allows your computer tointeract with your printer. This vulnerability specifically deals withan old printer driver from 2005 called SSPORT.SYS which affects hundredsof millions of devices and millions of users worldwide. Successfullyexploitation of this vulnerability might allow attackers to potentiallyinstall...
Read More
by CIRT Team
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...
Read More
by CIRT Team
A Vulnerability in Schneider Electric Modicon PLCs Could Allow for Remote Code Execution
DESCRIPTION:A vulnerability has been discovered in Schneider Electric Modicon PLCs,which could result in remote code execution. A Programmable LogicController, or PLC, is a ruggedized computer used for industrialautomation. These controllers can automate a specific process, machinefunction, or even an entire production line. Successful exploitation ofthis vulnerability could allow for remote code execution within thecontext of a privileged process. Depending on the privileges associatedwith this application,...
Read More
by CIRT Team
Critical Patches Issued for Microsoft Products, July 13, 2021
DESCRIPTION:Multiple vulnerabilities have been discovered in Microsoft products, themost severe of which could allow for arbitrary code execution in thecontext of the logged on user. Depending on the privileges associatedwith the user, an attacker could then install programs; view, change, ordelete data; or create new accounts with full user rights. Users whoseaccounts are configured to have fewer user rights on the system could beless impacted...
Read More
by CIRT Team
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
DESCRIPTION:Multiple vulnerabilities have been discovered in Adobe Products, themost severe of which could allow for arbitrary code execution. * Dimension is a 3D rendering and design software.* Illustrator is a vector graphics editor and design program.* Adobe Framemaker is a document processing software used to write andedit large or complex documents.* Acrobat and Reader is a family of application software and Webservices mainly used to...
Read More
by CIRT Team
Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution
DESCRIPTION:Multiple vulnerabilities have been discovered in Mozilla Firefox andFirefox Extended Support Release (ESR), the most severe of which couldallow for arbitrary code execution. Mozilla Firefox is a web browserused to access the Internet. Mozilla Firefox ESR is a version of the webbrowser intended to be deployed in large organizations. Successfulexploitation of these vulnerabilities could allow for arbitrary codeexecution. Depending on the privileges associated with the...
Read More
by CIRT Team
PetitPotam: Microsoft Windows Server NTLM Relay Attacks on Active Directory Certificate Services (AD CS)
Description:A new NTLM relay attack called PetitPotam has been discovered that allows threat actors to take over a domain controller, and thus an entire Windows domain.Many organizations utilize Microsoft Active Directory Certificate Services, which is a public key infrastructure (PKI) server that can be used to authenticate users, services, and machines on a Windows domain.PetitPotam’ that performs an NTLM relay attack that does not rely...
Read More