Cyber Exposure Alerts https://www.tenable.com/ en CVE-2024-20353, CVE-2024-20359: Frequently Asked Questions About ArcaneDoor https://www.tenable.com/blog/cve-2024-20353-cve-2024-20359-frequently-asked-questions-about-arcanedoor <p><strong>Frequently asked questions about CVE-2024-20353 and CVE-2024-20359, two vulnerabilities associated with “ArcaneDoor,” the espionage-related campaign targeting Cisco Adaptive Security Appliances.</strong></p><h2>Background</h2><p>The Tenable Security Response Team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding an espionage campaign called ArcaneDoor.</p><h2>FAQ</h2><p><strong>What is ArcaneDoor?</strong></p><p>ArcaneDoor is the name given to an espionage-focused campaign <a href="https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/"><u>disclosed by researchers at Cisco Talos</u></a> on April 24. The campaign involves a reported state-sponsored actor who has been targeting vulnerable network devices including Cisco’s Adaptive Security Appliances (ASA). The campaign included the exploitation of at least two zero-day vulnerabilities.</p><p><strong>What are the vulnerabilities associated with ArcaneDoor?</strong></p><p>As of April 25, the following vulnerabilities are attributed to the ArcaneDoor campaign:</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>CVE</strong></th><th><strong>Description</strong></th><th><strong>CVSSv3</strong></th></tr></thead><tbody><tr><td><a href="https://www.tenable.com/cve/CVE-2024-20353"><u>CVE-2024-20353</u></a></td><td>Cisco ASA and Firepower Threat Defense (FTD) Software Web Services Denial of Service Vulnerability</td><td>8.6</td></tr><tr><td><a href="https://www.tenable.com/cve/CVE-2024-20359"><u>CVE-2024-20359</u></a></td><td>Cisco ASA and FTD Software Persistent Local Code Execution Vulnerability</td><td>6.0</td></tr></tbody></table></div><p><strong>Who is the group behind ArcaneDoor?</strong></p><p>The group has been labeled UAT4356 by Cisco and STORM-1849 by Microsoft. Cisco attributes this activity with “high confidence” to a state-sponsored actor, though it is unconfirmed which state the group is associated with.</p><p><strong>What is the initial access vector for ArcaneDoor?</strong></p><p>As of April 25, the initial access vector for the ArcaneDoor campaign is <strong>unknown</strong>. The investigation into ArcaneDoor is ongoing. We will update this blog post once additional information becomes available.</p><p><strong>When did the ArcaneDoor campaign begin?</strong></p><p>Cisco says UAT4356 began the development and testing phase for this campaign back in July 2023, setting up the infrastructure for the campaign in November 2023. However, malicious activity associated with ArcaneDoor occurred between December 2023 and early January 2024.</p><p><strong>Is any malware associated with ArcaneDoor?</strong></p><p>Yes, it appears that UAT4356 deployed two types of malware in the ArcaneDoor campaign:</p><ul><li>Line Dancer: in-memory malware for executing commands and evading analysis</li><li>Line Runner: backdoor malware to maintain persistence</li></ul><p>For analysis of Line Dancer and Line Runner, please refer to the <a href="https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/"><u>Cisco Talos blog post</u></a>.</p><p><strong>Are there any other good sources of information about ArcaneDoor?</strong></p><p>Yes, the Canadian Centre for Cyber Security (Cyber Centre) <a href="https://www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns"><u>published an article</u></a> providing additional insights into the malicious activity associated with ArcaneDoor. In it, the Cyber Centre says that Cisco ASA series ASA55xx running firmware versions 9.12 and 9.14 have been targeted by malicious actors that “established unauthorized access through WebVPN sessions,” which are “commonly associated with Clientless SSLVPN services.”</p><p><strong>Are patches available for the vulnerabilities associated with ArcaneDoor?</strong></p><p>Yes, Cisco released patches for affected versions of ASA and FTD. For more information, refer to the individual advisory pages for <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-websrvs-dos-X8gNucD2"><u>CVE-2024-20353</u></a> and <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h"><u>CVE-2024-20359</u></a>.</p><p><strong>Cisco published an advisory CVE-2024-20358. Is this CVE associated with ArcaneDoor?</strong></p><p>No. While this vulnerability affects the same products and was published alongside the advisories for CVE-2024-20353 and CVE-2024-20359, it was reportedly discovered by Cisco during internal security testing and is not associated with ArcaneDoor.</p><p><strong>Are there indicators of compromise (IOCs) associated with ArcaneDoor?</strong></p><p>Yes, Cisco published <a href="https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/#indicators-of-compromise-iocs"><u>IOCs for ArcaneDoor in its blog post</u></a> and on <a href="https://github.com/Cisco-Talos/IOCs/tree/main/2024/04"><u>GitHub</u></a>.</p><p><strong>Has Tenable released any product coverage for these vulnerabilities?</strong></p><p>A list of Tenable plugins for these vulnerabilities can be found on the individual CVE pages as they’re released:</p><ul><li><a href="https://www.tenable.com/cve/CVE-2024-20353/plugins"><u>CVE-2024-20353</u></a></li><li><a href="https://www.tenable.com/cve/CVE-2024-20359/plugins"><u>CVE-2024-20359</u></a></li></ul><p>This link will display all available plugins for these vulnerabilities, including upcoming plugins in our <a href="https://www.tenable.com/plugins/pipeline"><u>Plugins Pipeline</u></a>.</p><h3>Get more information</h3><ul><li><a href="https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/"><u>ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices</u></a></li><li><a href="https://www.cyber.gc.ca/en/news-events/cyber-activity-impacting-cisco-asa-vpns"><u>Canadian Centre for Cyber Security: Cyber Activity Impacting CISCO ASA VPNs</u></a></li></ul><p><em><strong>Join </strong></em><a href="https://community.tenable.com/s/group/0F9f2000000fyxyCAA/cyber-exposure-alerts"><em><strong><u>Tenable's Security Response Team</u></strong></em></a><em><strong> on the Tenable Community.</strong></em><br /><em><strong>Learn more about </strong></em><a href="https://www.tenable.com/products/tenable-one"><em><strong><u>Tenable One</u></strong></em></a><em><strong>, the Exposure Management Platform for the modern attack surface.</strong></em></p> Thu, 25 Apr 2024 20:01:44 Satnam Narang https://www.tenable.com/209165 CVE-2024-4040: CrushFTP Virtual File System (VFS) Sandbox Escape Vulnerability Exploited https://www.tenable.com/blog/cve-2024-4040-crushftp-virtual-file-system-vfs-sandbox-escape-vulnerability-exploited <p><strong>A zero-day vulnerability in CrushFTP was exploited in the wild against multiple U.S. entities prior to fixed versions becoming available as the vendor recommends customers upgrade as soon as possible.</strong></p><h2>Background</h2><p>On April 19, CrushFTP published an <a href="https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update"><u>advisory</u></a> for a zero-day vulnerability in its file transfer tool which bears the same name.</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>CVE</strong></th><th><strong>Description</strong></th><th><strong>CVSSv3</strong></th><th><strong>Severity</strong></th></tr></thead><tbody><tr><td>CVE-2024-4040</td><td>CrushFTP VFS Sandbox Escape Vulnerability</td><td>7.7</td><td>High</td></tr></tbody></table></div><p>No CVE identifier was initially assigned for this vulnerability. However, on April 22, h4sh, a security engineer and founder of DirectCyber, an Australian Cyber Security Incident Response Team (CSIRT), <a href="https://infosec.exchange/@h4sh/112316550866303546"><u>assigned a CVE for this flaw</u></a>.</p><h2>Analysis</h2><p><a href="https://www.tenable.com/cve/CVE-2024-4040"><u>CVE-2024-4040</u></a> is an improper input validation vulnerability in CrushFTP. An authenticated attacker with low privileges could exploit this vulnerability on a vulnerable CrushFTP server to escape the <a href="https://www.crushftp.com/crush10wiki/Wiki.jsp?page=VFS"><u>virtual file system (VFS)</u></a> sandbox. Successful exploitation would allow an attacker to download system files.</p><p><strong>Zero-day exploitation of VFS sandbox escape flaw</strong></p><p>According to researchers at CrowdStrike, CVE-2024-4040 has <a href="https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/"><u>been exploited in the wild as a zero-day</u></a>. Specifically, its report notes that these attacks are targeted in nature and that intrusions have been discovered at “multiple U.S. entities” with a focus on “intelligence-gathering” that is “possibly politically motivated.” No further details about attribution of these targeted attacks are available as of April 23.</p><p><strong>Attackers are probing for vulnerable CrushFTP servers</strong></p><p>In a statement to <a href="https://therecord.media/crushftp-file-transfer-vulnerability-patch-asap"><u>The Record</u></a>, an official from CrushFTP says that they have seen “a customer who was already patched who was probed for the vulnerability” adding that if the patch had not been applied “important config info would have been stolen.” This official stressed that customers “need to update ASAP.”</p><p><strong>Over 7,100 CrushFTP servers publicly accessible and potentially vulnerable</strong></p><p>Based on a shodan query in a <a href="https://github.com/directcyber/checkers/blob/main/nuclei-templates/CVE-2024-4040-crushftp-potentially-unpatched.yaml"><u>Nuclei template</u></a> created by h4sh to identify potentially vulnerable CrushFTP servers, there are reportedly over <a href="https://www.shodan.io/search/report?query=http.favicon.hash%3A-1022206565"><u>7,100 CrushFTP servers publicly accessible</u></a>. It is unclear how many of these systems are potentially vulnerable.</p><img src="https://www.tenable.com/sites/default/files/images/blog/599a606f-8fa8-4b71-b65b-b3058a08ab35.png" alt="A screenshot from the Shodan.io website showing the total results of publicly accessible CrushFTP instances that may potentially be vulnerable to CVE-2024-4040. It includes a world map with color coding and a list of countries with the associated number of results. United States with 2,889, Germany with 550, Canada with 402, United Kingdom with 358 and Japan with 283." referrerpolicy="no-referrer" /><p><em>Shodan query results as of April 22 for publicly accessible CrushFTP servers</em></p><h2>Proof of concept</h2><p>On April 23, a public proof-of-concept (PoC) for this vulnerability was <a href="https://github.com/airbus-cert/CVE-2024-4040"><u>posted to GitHub</u></a>. It was created by Simon Garrelou of Airbus Community Emergency Response Team (CERT), who is credited with discovering and reporting CVE-2024-4040 to CrushFTP.</p><p>Additionally, it is important to highlight that it is common practice for attackers to seed fake PoCs on public source code repositories like GitHub in an effort to target both researchers and would-be attackers looking for exploit code. In the case of CVE-2024-4040, we’ve seen a repository published to GitHub directing users to a third-party site called SatoshiDisk that requests a payment of 0.00735 Bitcoin ($513.30 USD as of April 22).</p><img src="https://www.tenable.com/sites/default/files/images/blog/55cc2498-959b-4a0c-b338-5e8532750d77.png" alt="A screenshot of a GitHub repository that claims to offer an exploit for CVE-2024-4040. It includes a link to an external website called SatoshiDisk that asks users to pay $500 USD in Bitcoin to purchase the exploit." referrerpolicy="no-referrer" /><p><em>Example repository on GitHub seeking Bitcoin payment for a fake exploit for CVE-2024-4040</em></p><p>It is unlikely that the exploit code will work and we do not expect it to be malicious in nature. Instead, it is more likely that the attackers are seeking to make money from the interest in the exploit code for this vulnerability.</p><h2>Solution</h2><p>On April 23, CrushFTP released fixes for version 10 and version 11 of CrushFTP:</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>Affected Versions</strong></th><th><strong>Fixed Version</strong></th></tr></thead><tbody><tr><td>11.0.1</td><td>11.1.0</td></tr><tr><td>10.0.0 through 10.6.1</td><td>10.7.1</td></tr><tr><td>Below 10.0.0</td><td>Upgrade to 11.1.0</td></tr></tbody></table></div><p>Previously, reports suggested that if CrushFTP was behind a <a href="https://www.crushftp.com/crush11wiki/Wiki.jsp?page=DMZ"><u>demilitarized zone (DMZ)</u></a> then users would be protected against this flaw. However, as of April 22, CrushFTP disputed this claim, noting that a DMZ “does not fully protect you.” Customers using a vulnerable version of CrushFTP are advised to update to a fixed version as soon as possible.</p><p>Garrelou also <a href="https://github.com/airbus-cert/CVE-2024-4040/blob/main/scan_logs.py"><u>developed a script to scan CrushFTP logs</u></a> to search for potential indicators of compromise.</p><h2>Identifying affected systems</h2><p>A list of Tenable plugins for this vulnerability can be found on the individual CVE page for <a href="https://www.tenable.com/cve/CVE-2024-4040/plugins"><u>CVE-2024-4040</u></a> as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our <a href="https://www.tenable.com/plugins/pipeline"><u>Plugins Pipeline</u></a>.</p><h3>Get more information</h3><ul><li><a href="https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update"><u>CrushFTP Wiki Page for CrushFTP 11 (Advisory)</u></a></li><li><a href="https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/"><u>SITUATIONAL AWARENESS // 2024-04-19 // CrushFTP Virtual Filesystem Escape Vulnerability in the Wild</u></a></li><li><a href="https://therecord.media/crushftp-file-transfer-vulnerability-patch-asap"><u>The Record News: CrushFTP urges customers to patch file transfer tool ‘ASAP’</u></a></li></ul><p><em><strong>Join </strong></em><a href="https://community.tenable.com/s/group/0F9f2000000fyxyCAA/cyber-exposure-alerts"><em><strong><u>Tenable's Security Response Team</u></strong></em></a><em><strong> on the Tenable Community.</strong></em><br /><em><strong>Learn more about </strong></em><a href="https://www.tenable.com/products/tenable-one"><em><strong><u>Tenable One</u></strong></em></a><em><strong>, the Exposure Management Platform for the modern attack surface.</strong></em></p> Tue, 23 Apr 2024 12:56:43 Satnam Narang https://www.tenable.com/209163 Oracle April 2024 Critical Patch Update Addresses 239 CVEs https://www.tenable.com/blog/oracle-april-2024-critical-patch-update-addresses-239-cves <p><strong>Oracle addresses 239 CVEs in its second quarterly update of 2024 with 441 patches, including 38 critical updates.</strong></p><h2>Background</h2><p>On April 16, Oracle released its <a href="https://www.oracle.com/security-alerts/cpuapr2024.html"><u>Critical Patch Update (CPU) for April 2024</u></a>, the second quarterly update of the year. This CPU contains fixes for 239 CVEs in 441 security updates across 30 Oracle product families. Out of the 441 security updates published this quarter, 8.6% of patches were assigned a critical severity. Medium severity patches accounted for the bulk of security patches at 44.4%, followed by high severity patches at 42.6%.</p><img src="https://www.tenable.com/sites/default/files/images/blog/bbbe784b-28e3-4bb2-bd76-100c6b2ead54.png" referrerpolicy="no-referrer" title="Chart" /><p>This quarter’s update includes 38 critical patches across 21 CVEs.</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>Severity</strong></th><th><strong>Issues Patched</strong></th><th><strong>CVEs</strong></th></tr></thead><tbody><tr><td>Critical</td><td>38</td><td>21</td></tr><tr><td>High</td><td>188</td><td>79</td></tr><tr><td>Medium</td><td>196</td><td>122</td></tr><tr><td>Low</td><td>19</td><td>17</td></tr><tr><td><strong>Total</strong></td><td>441</td><td>239</td></tr></tbody></table></div><h2>Analysis</h2><p>This quarter, the Oracle Commerce product family contained the highest number of patches at 93, accounting for 21.1% of the total patches, followed by Oracle Financial Services Applications at 51 patches, which accounted for 11.6% of the total patches.</p><p>A full breakdown of the patches for this quarter can be seen in the following table, which also includes a count of vulnerabilities that can be exploited over a network without authentication.</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>Oracle Product Family</strong></th><th><strong>Number of Patches</strong></th><th><strong>Remote Exploit without Authentication</strong></th></tr></thead><tbody><tr><td>Oracle Commerce</td><td>93</td><td>71</td></tr><tr><td>Oracle Financial Services Applications</td><td>51</td><td>35</td></tr><tr><td>Oracle E-Business Suite</td><td>49</td><td>30</td></tr><tr><td>Oracle Communications</td><td>47</td><td>43</td></tr><tr><td>Oracle Insurance Applications</td><td>36</td><td>9</td></tr><tr><td>Oracle Supply Chain</td><td>22</td><td>16</td></tr><tr><td>Oracle TimesTen In-Memory Database</td><td>14</td><td>10</td></tr><tr><td>Oracle Hyperion</td><td>13</td><td>10</td></tr><tr><td>Oracle Systems</td><td>13</td><td>1</td></tr><tr><td>Oracle Food and Beverage Applications</td><td>12</td><td>5</td></tr><tr><td>Oracle Construction and Engineering</td><td>11</td><td>7</td></tr><tr><td>Oracle Java SE</td><td>10</td><td>5</td></tr><tr><td>Oracle MySQL</td><td>10</td><td>9</td></tr><tr><td>Oracle Database Server</td><td>8</td><td>3</td></tr><tr><td>Oracle GoldenGate</td><td>8</td><td>6</td></tr><tr><td>Oracle Communications Applications</td><td>7</td><td>4</td></tr><tr><td>Oracle Hospitality Applications</td><td>6</td><td>2</td></tr><tr><td>Oracle Retail Applications</td><td>6</td><td>3</td></tr><tr><td>Oracle Siebel CRM</td><td>6</td><td>6</td></tr><tr><td>Oracle Enterprise Manager</td><td>4</td><td>2</td></tr><tr><td>Oracle Analytics</td><td>3</td><td>1</td></tr><tr><td>Oracle Fusion Middleware</td><td>2</td><td>0</td></tr><tr><td>Oracle HealthCare Applications</td><td>2</td><td>0</td></tr><tr><td>Oracle Support Tools</td><td>2</td><td>2</td></tr><tr><td>Oracle Autonomous Health Framework</td><td>1</td><td>1</td></tr><tr><td>Oracle Big Data Spatial and Graph</td><td>1</td><td>1</td></tr><tr><td>Oracle Essbase</td><td>1</td><td>1</td></tr><tr><td>Oracle Global Lifecycle Management</td><td>1</td><td>1</td></tr><tr><td>Oracle Health Sciences Applications</td><td>1</td><td>1</td></tr><tr><td>Oracle PeopleSoft</td><td>1</td><td>0</td></tr></tbody></table></div><h2>Solution</h2><p>Customers are advised to apply all relevant patches in this quarter’s CPU. Please refer to the <a href="https://www.oracle.com/security-alerts/cpuapr2024.html"><u>April 2024 advisory</u></a> for full details.</p><h2>Identifying affected systems</h2><p>A list of Tenable plugins to identify these vulnerabilities will appear <a href="https://www.tenable.com/plugins/search?q=%22%28April+2024+CPU%29%22&amp;sort=&amp;page=1"><u>here</u></a> as they’re released. This link uses a search filter to ensure that all matching plugin coverage will appear as it is released.</p><h3>Get more information</h3><ul><li><a href="https://www.oracle.com/security-alerts/cpuapr2024.html"><u>Oracle Critical Patch Update Advisory - April 2024</u></a></li><li><a href="https://www.oracle.com/security-alerts/cpuapr2024verbose.html"><u>Oracle April 2024 Critical Patch Update Risk Matrices</u></a></li><li><a href="https://www.oracle.com/security-alerts/public-vuln-to-advisory-mapping.html"><u>Oracle Advisory to CVE Map</u></a></li></ul><p><em><strong>Join </strong></em><a href="https://community.tenable.com/s/group/0F9f2000000fyxyCAA/cyber-exposure-alerts"><em><strong><u>Tenable's Security Response Team</u></strong></em></a><em><strong> on the Tenable Community.</strong></em></p><p><em><strong>Learn more about </strong></em><a href="https://www.tenable.com/products/tenable-one"><em><strong><u>Tenable One</u></strong></em></a><em><strong>, the Exposure Management Platform for the modern attack surface.</strong></em></p> Wed, 17 Apr 2024 09:03:48 Scott Caveza https://www.tenable.com/209154 CVE-2024-3400: Zero-Day Vulnerability in Palo Alto Networks PAN-OS GlobalProtect Gateway Exploited in the Wild https://www.tenable.com/blog/cve-2024-3400-zero-day-vulnerability-in-palo-alto-networks-pan-os-globalprotect-gateway <p><strong>A critical severity command injection vulnerability in Palo Alto Networks PAN-OS has been exploited in limited targeted attacks. While a fix is not yet available, patches are expected to be released on April 14 and mitigation steps are available.</strong></p><div class="blog-update"><div class="col-sm-12"><p><strong>Update April 26:</strong> The Solution section has been updated to include a link to a Palo Alto Networks knowledge base article with remediation instructions.</p><p><a class="blog-update-view-log">View Change Log</a></p></div></div><h2>Background</h2><p>On April 12, Palo Alto Networks released a <a href="https://security.paloaltonetworks.com/CVE-2024-3400"><u>security advisory</u></a> for a critical command injection vulnerability affecting PAN-OS, the custom operating system (OS) Palo Alto Networks (PAN) uses in their next-generation firewalls.</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>CVE</strong></th><th><strong>Description</strong></th><th><strong>CVSSv3</strong></th><th><strong>Severity</strong></th></tr></thead><tbody><tr><td>CVE-2024-3400</td><td>Command Injection Vulnerability in the GlobalProtect Gateway feature of PAN-OS</td><td>10.0</td><td>Critical</td></tr></tbody></table></div><h2>Analysis</h2><p><a href="https://www.tenable.com/cve/CVE-2024-3400"><u>CVE-2024-3400</u></a> is a critical command injection vulnerability affecting the GlobalProtect Gateway feature of PAN-OS. An unauthenticated, remote attacker could exploit this vulnerability to execute code on an affected firewall with root privileges. According to the advisory, this vulnerability impacts PAN-OS versions 10.2, 11 and 11.1 only when both GlobalProtect gateway and device telemetry are enabled. On April 16, Palo Alto updated the security advisory to reflect that firewalls with GlobalProtect gateway or GlobalProtect portal (or both) configured are impacted by this vulnerability. The advisory went further to note that device telemetry does not have to be enabled in order to be vulnerable to CVE-2024-3400.</p><p><strong>Palo Alto Networks reports limited exploitation in the wild</strong></p><p>According to the advisory, Palo Alto Networks confirmed that this vulnerability has been exploited in-the-wild in a “limited number of attacks.” While no specific details about these attacks were available at the time this blog was published, researchers at Volexity are credited with discovering the flaw. Steven Adair, President at Volexity, <a href="https://twitter.com/stevenadair/status/1778725825849831434"><u>posted</u></a> that exploitation was observed “at multiple customers” and that his team discovered in-the-wild exploitation “just two days ago.”</p><p> </p><blockquote class="twitter-tweet" data-conversation="none" data-dnt="true"><p lang="en" dir="ltr" xml:lang="en">We have seen limited exploitation but impact at multiple customers. We first detected this just two days ago. Impressive response from the Palo Alto Networks team, as they quickly worked with us and have now pushed a Threat Protection signature with a fix to come April 14.</p><p>— Steven Adair (@stevenadair) <a href="https://twitter.com/stevenadair/status/1778725825849831434?ref_src=twsrc%5Etfw">April 12, 2024</a></p></blockquote><p> </p><p>On April 12, Volexity published a <a href="https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/"><u>blog post</u></a> detailing the observations they made from one of their customers who was impacted by CVE-2024-3400. According to Volexity, exploitation was observed on April 10 and attributed to a threat actor they track as UTA0218. The threat actor pivoted from the compromised device to move laterally on the victims network. As their investigation continued, they discovered other customers impacted as far back as March 26. For more information on the threat actor activity observed, we recommend reviewing Volexity's blog post.</p><p>Palo Alto Networks Unit 42 also <a href="https://unit42.paloaltonetworks.com/cve-2024-3400/"><u>published a blog</u></a> on April 12, noting that they are actively tracking exploitation activity that they are calling <strong>Operation MidnightEclipse</strong>. According to Unit 42, the exploitation they've analyzed appears to be limited to a "single threat actor," however they do not rule out that other threat actors may attempt to exploit this flaw soon.</p><p><strong>Historical exploitation of PAN-OS flaws</strong></p><p>Network edge devices are frequently targeted by attackers. <a href="https://www.tenable.com/blog/cve-2020-2021-palo-alto-networks-pan-os-vulnerable-to-critical-authentication-bypass">CVE-2020-2021</a>, a critical authentication bypass vulnerability in PAN-OS, which also received a CVSSv3 score of 10.0, was highlighted as a frequently exploited vulnerability by advanced persistent threat (APT) actors in a joint <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-283a">Cyber Security Advisory</a> from the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI).</p><p><a href="https://www.tenable.com/blog/cve-2019-1579-critical-pre-authentication-vulnerability-in-palo-alto-networks-globalprotect-ssl">CVE-2019-1579</a>, a remote code execution vulnerability affecting PAN-OS devices, is another frequently exploited vulnerability by APT attackers as the <a href="https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/1982939/nsa-cybersecurity-advisory-malicious-cyber-actors-leveraging-vpn-vulnerabilitie/">National Security Agency (NSA) warned</a> on October 7, 2019.</p><p>In addition to APT actors, both CVE-2020-2021 and CVE-2019-1579 have been exploited in the wild by ransomware groups, which was highlighted in our <a href="https://www.tenable.com/cyber-exposure/a-look-inside-the-ransomware-ecosystem">Ransomware Ecosystem</a> report.</p><h2>Proof of concept</h2><p>At the time this blog post was published on April 12, no public proof-of-concept (PoC) exploit for CVE-2024-3400 was available. On April 16, watchTowr released a <a href="https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/">blog post</a> detailing how they were able to reproduce the vulnerability, providing detailed steps on how to verify the command injection vulnerability. In addition, a post on X from Justin Elze, Chief Technology Officer at TrustedSec shows a payload observed in-the-wild:</p><p> </p><blockquote class="twitter-tweet"><p lang="en" dir="ltr" xml:lang="en">Since it's out there now this is what I caught in wild CVE-2024-3400<br /><br />GET /global-protect/login.esp HTTP/1.1 Host: X User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Accept-Encoding: gzip, deflate, br…</p><p>— Justin Elze (@HackingLZ) <a href="https://twitter.com/HackingLZ/status/1780239802496864474?ref_src=twsrc%5Etfw">April 16, 2024</a></p></blockquote><script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><p>With details around the exploitation of this flaw publicly released and multiple PoC exploits publicly available, it's likely we will see an uptick in attacks very soon.</p><h2>Solution</h2><p>As of when this blog was published on April 12, Palo Alto Networks had not released patches for this vulnerability. However hotfix releases of PAN-OS were released on April 14 and additional hotfix versions are expected to be released between April 14 and April 19.</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>Affected Version</strong></th><th><strong>Hotfix Release Version</strong></th><th><strong>Expected Release Date</strong></th></tr></thead><tbody><tr><td rowspan="10">PAN-OS 10.2</td><td>PAN-OS 10.2.9-h1</td><td>Released on April 14</td></tr><tr><td>PAN-OS 10.2.8-h3</td><td>Released on April 15</td></tr><tr><td>PAN-OS 10.2.7-h8</td><td>Released on April 15</td></tr><tr><td>PAN-OS 10.2.6-h3 </td><td>Released on April 16</td></tr><tr><td>PAN-OS 10.2.5-h6</td><td>Released on April 16</td></tr><tr><td>PAN-OS 10.2.3-h13</td><td>April 17</td></tr><tr><td>PAN-OS 10.2.1-h2</td><td>April 17</td></tr><tr><td>PAN-OS 10.2.2-h5</td><td>April 18</td></tr><tr><td>PAN-OS 10.2.0-h3</td><td>April 18</td></tr><tr><td>PAN-OS 10.2.4-h16</td><td>April 19</td></tr><tr><td rowspan="5">PAN-OS 11.0</td><td>PAN-OS 11.0.4-h1</td><td>Released on April 14</td></tr><tr><td>PAN-OS 11.0.3-h10</td><td>Released on April 16</td></tr><tr><td>PAN-OS 11.0.2-h4</td><td>Released on April 16</td></tr><tr><td>PAN-OS 11.0.1-h4</td><td>April 17</td></tr><tr><td>PAN-OS 11.0.0-h3</td><td>April 18</td></tr><tr><td rowspan="3">PAN-OS 11.1</td><td>PAN-OS 11.1.2-h3</td><td>Released on April 14</td></tr><tr><td>PAN-OS 11.1.1-h1</td><td>Released on April 16</td></tr><tr><td>PAN-OS 11.1.0-h3</td><td>Released on April 16</td></tr></tbody></table></div><p>If immediate patching cannot be completed, Palo Alto Networks does provide the following mitigation options:</p><ul><li>Threat ID 95187, 95189, and 95191 can block attacks for those customers who have a Threat Prevention subscription</li><li>Additionally, <a href="https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184">vulnerability protection</a> must be applied to the GlobalProtect interface to prevent exploitation</li></ul><p>If the Threat Protection mitigation cannot be applied, Palo Alto Networks recommends <a href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/device-telemetry/device-telemetry-configure/device-telemetry-disable">disabling device telemetry</a> until the patch can be applied. However in an update to their security advisory on April 16, Palo Alto notes that "disabling device telemetry is no longer an effective mitigation." As these mitigations may be updated in the future, we recommend reviewing the <a href="https://security.paloaltonetworks.com/CVE-2024-3400">advisory</a> for the most up-to-date mitigation guidance.<br /><br />On April 23, Palo Alto Networks published a <a href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CrO6CAK">knowledge base article titled "How to Remedy CVE-2024-3400"</a> and it was updated on April 25 with additional remediation instructions. The article lists four scenarios and provides suggested remediation guidance, including if potential exfiltration has occurred. In this scenario, customers are instructed to update to one of the latest hotfix versions and <a href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008XrDCAU">perform a Private Data Reset</a>.</p><h2>Identifying affected systems</h2><p>A list of Tenable plugins for this vulnerability can be found on the individual CVE page for <a href="https://www.tenable.com/cve/CVE-2024-3400/plugins">CVE-2024-3400</a> as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our <a href="https://www.tenable.com/plugins/pipeline">Plugins Pipeline</a>.</p><div class="blog-change-log" id="blog-change-log"><div class="blog-change-log-head"><h3>Change Log</h3></div><div class="col-sm-12 blog-change-log-content"><p><strong>Update April 26:</strong> The Solution section has been updated to include a link to a Palo Alto Networks knowledge base article with remediation instructions.</p><p><strong>Update April 17:</strong> The Analysis and Solution sections have been updated to reflect updates in Palo Alto's security advisory.</p><p><strong>Update April 16:</strong> The Proof of Concept section has been updated to include newly released exploit details.</p><p><strong>Update April 15:</strong> The Solution section has been updated to include the currently released hotfixes and additional upcoming hotfix releases.</p><p><strong>Update April 12:</strong> The Analysis section has been updated to include an additional information about in-the-wild exploitation.</p></div></div><h3>Get more information</h3><ul><li><a href="https://security.paloaltonetworks.com/CVE-2024-3400">Palo Alto Networks security advisory for CVE-2024-3400</a></li><li>Volexity blog: <a href="https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/">Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)</a></li><li>Palo Alto's Unit 42 blog: <a href="https://unit42.paloaltonetworks.com/cve-2024-3400/">Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400</a></li></ul><p><em><strong>Join </strong></em><a href="https://community.tenable.com/s/group/0F9f2000000fyxyCAA/cyber-exposure-alerts"><em><strong>Tenable's Security Response Team</strong></em></a><em><strong> on the Tenable Community.</strong></em></p><p><em><strong>Learn more about </strong></em><a href="https://www.tenable.com/products/tenable-one"><em><strong>Tenable One</strong></em></a><em><strong>, the Exposure Management Platform for the modern attack surface.</strong></em></p> Fri, 12 Apr 2024 12:42:33 Scott Caveza https://www.tenable.com/209150 Microsoft’s April 2024 Patch Tuesday Addresses 147 CVEs (CVE-2024-29988) https://www.tenable.com/blog/microsofts-april-2024-patch-tuesday-addresses-147-cves-cve-2024-29988 <ol class="blog-severity-badges"><li class="blog-severity-badges critical"><span class="number">3</span>Critical</li><li class="blog-severity-badges important"><span class="number">142</span>Important</li><li class="blog-severity-badges moderate"><span class="number">2</span>Moderate</li><li class="blog-severity-badges low"><span class="number">0</span>Low</li></ol><p><strong>Microsoft addresses 147 CVEs in its April 2024 Patch Tuesday release with three critical</strong> <strong>vulnerabilities</strong> <strong>and</strong> <strong>no zero-day or publicly disclosed vulnerabilities.</strong></p><div class="blog-update"><div class="col-sm-12"><p><strong>Update April 10:</strong> The blog has been updated to include reference to exploitation for CVE-2024-29988 and the addition of CVE-2024-26234.</p><p><a class="blog-update-view-log">View Change Log</a></p></div></div><p>Microsoft patched 147 CVEs in its April 2024 Patch Tuesday release, with three rated critical, 142 rated as important, and two rated as moderate.</p><img src="https://www.tenable.com/sites/default/files/images/blog/f8afebb3-0bc7-4ba5-9d72-bd0b7b4a7e44.png" alt="A pie chart showing the severity distribution across the Patch Tuesday CVEs patched in April 2024." referrerpolicy="no-referrer" /><p>This month’s update includes patches for:</p><ul><li>.NET and Visual Studio</li><li>Azure</li><li>Azure AI Search</li><li>Azure Arc</li><li>Azure Compute Gallery</li><li>Azure Migrate</li><li>Azure Monitor</li><li>Azure Private 5G Core</li><li>Azure SDK</li><li>Intel</li><li>Internet Shortcut Files</li><li>Microsoft Azure Kubernetes Service</li><li>Microsoft Brokering File System</li><li>Microsoft Defender for IoT</li><li>Microsoft Edge (Chromium-based)</li><li>Microsoft Install Service</li><li>Microsoft Office Excel</li><li>Microsoft Office Outlook</li><li>Microsoft Office SharePoint</li><li>Microsoft WDAC ODBC Driver</li><li>Microsoft WDAC OLE DB provider for SQL</li><li>Role: DNS Server</li><li>Role: Windows Hyper-V</li><li>SQL Server</li><li>Windows Authentication Methods</li><li>Windows BitLocker</li><li>Windows Compressed Folder</li><li>Windows Cryptographic Services</li><li>Windows DHCP Server</li><li>Windows DWM Core Library</li><li>Windows Defender Credential Guard</li><li>Windows Distributed File System (DFS)</li><li>Windows File Server Resource Management Service</li><li>Windows HTTP.sys</li><li>Windows Internet Connection Sharing (ICS)</li><li>Windows Kerberos</li><li>Windows Kernel</li><li>Windows Local Security Authority Subsystem Service (LSASS)</li><li>Windows Message Queuing</li><li>Windows Mobile Hotspot</li><li>Windows Proxy Driver</li><li>Windows Remote Access Connection Manager</li><li>Windows Remote Procedure Call</li><li>Windows Routing and Remote Access Service (RRAS)</li><li>Windows Secure Boot</li><li>Windows Storage</li><li>Windows Telephony Server</li><li>Windows USB Print Driver</li><li>Windows Update Stack</li><li>Windows Virtual Machine Bus</li><li>Windows Win32K - ICOMP</li></ul><img src="https://www.tenable.com/sites/default/files/images/blog/9695e230-ca99-4d5e-92f0-cb561bba88ec.png" alt="A bar chart showing the count by impact of CVEs patched in the April 2024 Patch Tuesday release." referrerpolicy="no-referrer" /><p>Remote code execution (RCE) vulnerabilities accounted for 45.6% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 21.1%.</p><div class="blog-severity-alert"><div class="col-sm-2 nopad"><div class="blog-severity-badge important">Important</div></div><div class="col-sm-10"><h2>CVE-2024-29988 | SmartScreen Prompt Security Feature Bypass Vulnerability</h2></div><div class="col-sm-12"><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29988"><u>CVE-2024-29988</u></a> is a security feature bypass vulnerability in Microsoft Defender SmartScreen. It was assigned a CVSSv3 score of 8.8 and is rated as important. An attacker could exploit this vulnerability by convincing a target to open a specially crafted file using social engineering tactics such as an external link or malicious attachment sent over email, instant messages or social media. This flaw was reported to Microsoft by some of the same researchers that disclosed CVE-2024-21412, an Internet Shortcut Files security feature bypass that was associated <a href="https://www.trendmicro.com/en_us/research/24/c/cve-2024-21412--darkgate-operators-exploit-microsoft-windows-sma.html"><u>with a DarkGate campaign using fake installer files</u></a> impersonating Apple iTunes, Notion, NVIDIA and others.</p><p>The Zero Day Initiative (ZDI) says one of the researchers credited with reporting this flaw through ZDI <a href="https://www.zerodayinitiative.com/blog/2024/4/9/the-april-2024-security-updates-review"><u>discovered it being exploited in the wild as a zero-day</u></a>. However, Microsoft has yet to update its advisory to reflect this finding. We will update this blog once Microsoft confirms exploitation.</p></div></div><div class="blog-severity-alert"><div class="col-sm-2 nopad"><div class="blog-severity-badge important">Important</div></div><div class="col-sm-10"><h2>CVE-2024-26234 | Proxy Driver Spoofing Vulnerability</h2></div><div class="col-sm-12"><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26234"><u>CVE-2024-26234</u></a> is a spoofing vulnerability in the Proxy Driver of Microsoft Windows. It was assigned a CVSSv3 score of 6.7 and is rated as important. Initially, Microsoft did not flag this as being exploited. However, researchers at Sophos <a href="https://news.sophos.com/en-us/2024/04/09/smoke-and-screen-mirrors-a-strange-signed-backdoor/"><u>published a blog post that confirmed exploitation,</u></a> which is now reflected in the Microsoft advisory for this vulnerability. According to Sophos, this was bundled as part of a fake Android Screen Mirroring application, LaiXi, which was signed using the Microsoft Windows Hardware Compatibility Program (WHCP). It has now been added to the <a href="https://support.microsoft.com/en-gb/topic/kb5029033-notice-of-additions-to-the-windows-driver-stl-revocation-list-d330efa5-3fb7-4903-9f0b-3230d31fca38"><u>Windows Driver.STL revocation list.</u></a></p></div></div><div class="blog-severity-alert"><div class="col-sm-2 nopad"><div class="blog-severity-badge important">Important</div></div><div class="col-sm-10"><h2>CVE-2024-29990 | Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability</h2></div><div class="col-sm-12"><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29990"><u>CVE-2024-29990</u></a> is an EoP vulnerability in the Azure Kubernetes Service <a href="https://learn.microsoft.com/en-us/azure/aks/confidential-containers-overview"><u>Confidential Containers</u></a> (AKSCC). It was assigned a CVSSv3 score of 9 and is rated important. Exploitation of this flaw hinges on the preparation of a target environment by an attacker. Successful exploitation would enable an attacker to “steal credentials and affect resources beyond the security scope managed by AKSCC.” This includes taking over both “confidential guests and containers beyond the network stack it might be bound to.”</p><p>This is the third month in a row that a flaw in AKSCC was patched as part of Patch Tuesday:</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>CVE</strong></th><th><strong>Description</strong></th><th><strong>CVSSv3</strong></th><th><strong>Patch Tuesday</strong></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21400"><u>CVE-2024-21400</u></a></td><td>Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability</td><td>9</td><td>March 2024</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21376"><u>CVE-2024-21376</u></a></td><td>Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability</td><td>9</td><td>February 2024</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21403"><u>CVE-2024-21403</u></a></td><td>Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability</td><td>9</td><td>February 2024</td></tr></tbody></table></div><p>All four of these vulnerabilities were reported to Microsoft by Yuval Avrahami of Palo Alto Networks.</p></div></div><div class="blog-severity-alert"><div class="col-sm-2 nopad"><div class="blog-severity-badge important">Important</div></div><div class="col-sm-10"><h2>41 CVEs | Microsoft ODBC Driver, WDAC OLE DB Driver and OLE DB Driver for SQL Server Remote Code Execution Vulnerability</h2></div><div class="col-sm-12"><p>This month's release included 41 CVEs affecting multiple drivers for SQL Server, the Open Database Connectivity (ODBC) driver, WDAC OLE DB Driver and OLE DB driver. All but one of these CVEs received CVSSv3 scores of 8.8, with the lone exception, CVE-2024-29045 receiving a 7.5. All were rated as “Exploitation Less Likely” according to the <a href="https://www.microsoft.com/en-us/msrc/exploitability-index"><u>Microsoft Exploitability Index</u></a>, with none being publicly disclosed or exploited in the wild. A full list of the CVEs is included in the table below.</p><div class="table-responsive"><table class="table"><thead><tr><th>CVE</th><th>Description</th><th>CVSSv3</th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28929"><u>CVE-2024-28929</u></a></td><td>Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28930"><u>CVE-2024-28930</u></a></td><td>Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28931"><u>CVE-2024-28931</u></a></td><td>Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28932"><u>CVE-2024-28932</u></a></td><td>Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28933"><u>CVE-2024-28933</u></a></td><td>Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28934"><u>CVE-2024-28934</u></a></td><td>Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28935"><u>CVE-2024-28935</u></a></td><td>Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28936"><u>CVE-2024-28936</u></a></td><td>Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28937"><u>CVE-2024-28937</u></a></td><td>Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28938"><u>CVE-2024-28938</u></a></td><td>Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28941"><u>CVE-2024-28941</u></a></td><td>Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28943"><u>CVE-2024-28943</u></a></td><td>Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29043"><u>CVE-2024-29043</u></a></td><td>Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28906"><u>CVE-2024-28906</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28908"><u>CVE-2024-28908</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28909"><u>CVE-2024-28909</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28910"><u>CVE-2024-28910</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28911"><u>CVE-2024-28911</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28912"><u>CVE-2024-28912</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28913"><u>CVE-2024-28913</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28914"><u>CVE-2024-28914</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28915"><u>CVE-2024-28915</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28926"><u>CVE-2024-28926</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28927"><u>CVE-2024-28927</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28939"><u>CVE-2024-28939</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28940"><u>CVE-2024-28940</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28942"><u>CVE-2024-28942</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28944"><u>CVE-2024-28944</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28945"><u>CVE-2024-28945</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29044"><u>CVE-2024-29044</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29045"><u>CVE-2024-29045</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>7.5</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29047"><u>CVE-2024-29047</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29048"><u>CVE-2024-29048</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29982"><u>CVE-2024-29982</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29983"><u>CVE-2024-29983</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29984"><u>CVE-2024-29984</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29985"><u>CVE-2024-29985</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26210"><u>CVE-2024-26210</u></a></td><td>Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26214"><u>CVE-2024-26214</u></a></td><td>Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26244"><u>CVE-2024-26244</u></a></td><td>Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29046"><u>CVE-2024-29046</u></a></td><td>Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability</td><td>8.8</td></tr></tbody></table></div></div></div><div class="blog-severity-alert"><div class="col-sm-2 nopad"><div class="blog-severity-badge important">Important</div></div><div class="col-sm-10"><h2>24 CVEs | Secure Boot Security Feature Bypass Vulnerability</h2></div><div class="col-sm-12"><p>Microsoft patched 24 CVEs in Windows Secure Boot in as part of the April 2024 Patch Tuesday release. All are rated as “Exploitation Less Likely” and vary in CVSSv3 scores from 4.1 to 8.0.</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>CVE</strong></th><th><strong>Description</strong></th><th><strong>CVSSv3</strong></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26240"><u>CVE-2024-26240</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26189"><u>CVE-2024-26189</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28925"><u>CVE-2024-28925</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26180"><u>CVE-2024-26180</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29061"><u>CVE-2024-29061</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>7.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28920"><u>CVE-2024-28920</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>7.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26175"><u>CVE-2024-26175</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>7.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28896"><u>CVE-2024-28896</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>7.5</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26194"><u>CVE-2024-26194</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>7.4</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-20688"><u>CVE-2024-20688</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>7.1</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-29062"><u>CVE-2024-29062</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>7.1</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-20689"><u>CVE-2024-20689</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>7.1</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28897"><u>CVE-2024-28897</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>6.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26168"><u>CVE-2024-26168</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>6.8</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28919"><u>CVE-2024-28919</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>6.7</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26250"><u>CVE-2024-26250</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>6.7</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-20669"><u>CVE-2024-20669</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>6.7</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28924"><u>CVE-2024-28924</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>6.7</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26171"><u>CVE-2024-26171</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>6.7</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28921"><u>CVE-2024-28921</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>6.7</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28923"><u>CVE-2024-28923</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>6.4</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28898"><u>CVE-2024-28898</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>6.3</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-28922"><u>CVE-2024-28922</u></a></td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>4.1</td></tr></tbody></table></div><p>Four of the 24 CVEs were assigned a CVSSv3 score of 8.0. They include CVE-2024-26240, CVE-2024-26189, CVE-2024-28925 and CVE-2024-26180. Exploitation of all of these flaws do require an attacker to have either physical access or local administrator privileges on the vulnerable device.</p><p>These 24 CVEs are the first bundle of Secure Boot vulnerabilities we’ve seen since May 2023, when Microsoft patched <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-24932"><u>CVE-2023-24932</u></a>, another security feature bypass flaw in Secure Boot that was exploited in the wild as part of the <a href="https://support.microsoft.com/en-us/topic/kb5025885-how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d"><u>BlackLotus UEFI bootkit</u></a>.</p></div></div><h2>Tenable Solutions</h2><p>A list of all the plugins released for Tenable’s April 2024 Patch Tuesday update can be found <a href="https://www.tenable.com/plugins/search?q=%22April+2024%22+AND+script_family%3A(%22Windows%22+OR+%22Windows+%3A+Microsoft+Bulletins%22)&amp;sort=&amp;page=1"><u>here</u></a>. As always, we recommend patching systems as soon as possible and regularly scanning your environment to identify those systems yet to be patched.</p><p>For more specific guidance on best practices for vulnerability assessments, please refer to our blog post on <a href="http://www.tenable.com/blog/how-to-perform-efficient-vulnerability-assessments-with-tenable"><u>How to Perform Efficient Vulnerability Assessments with Tenable</u></a>.</p><div class="blog-change-log" id="blog-change-log"><div class="blog-change-log-head"><h3>Change Log</h3></div><div class="col-sm-12 blog-change-log-content"><p><strong>Update April 10:</strong> The blog has been updated to include reference to exploitation for CVE-2024-29988 and the addition of CVE-2024-26234.</p></div></div><h2>Get more information</h2><ul><li><a href="https://msrc.microsoft.com/update-guide/en-us/releaseNote/2024-Apr"><u>Microsoft's April 2024 Security Updates</u></a></li><li><a href="https://www.tenable.com/plugins/search?q=%22April+2024%22+AND+script_family%3A(%22Windows%22+OR+%22Windows+%3A+Microsoft+Bulletins%22)&amp;sort=&amp;page=1"><u>Tenable plugins for Microsoft April 2024 Patch Tuesday Security Updates</u></a></li></ul><p><em><strong>Join </strong></em><a href="https://community.tenable.com/s/group/0F9f2000000fyxyCAA/cyber-exposure-alerts"><em><strong><u>Tenable's Security Response Team</u></strong></em></a><em><strong> on the Tenable Community.</strong></em></p><p><em><strong>Learn more about </strong></em><a href="https://www.tenable.com/products/tenable-one"><em><strong><u>Tenable One</u></strong></em></a><em><strong>, the Exposure Management Platform for the modern attack surface.</strong></em></p> Tue, 09 Apr 2024 14:06:20 Tenable Security Response Team https://www.tenable.com/209136 Frequently Asked Questions About CVE-2024-3094, A Backdoor in XZ Utils https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils <p><strong>Frequently asked questions about CVE-2024-3094, a supply-chain attack responsible for a backdoor in XZ Utils, a widely used library found in multiple Linux distributions.</strong></p><div class="blog-update"><div class="col-sm-12"><p><strong>Update April 1:</strong> The "What Linux distributions are affected?" section has been updated to include additional affected and not affected distributions. In addition, updates to the "Has Tenable released any product coverage for these vulnerabilities?" section have been made.</p><p><a class="blog-update-view-log">View Change Log</a></p></div></div><h2>Background</h2><p>The Tenable Security Response Team has put together this blog to answer Frequently Asked Questions (FAQ) regarding CVE-2024-3094, a backdoor in XZ Utils, a widely used compression library found in multiple Linux distributions.</p><h2>FAQ</h2><p><strong>What is XZ Utils and what is the library used for?</strong></p><p>XZ is a type of lossless data compression on Unix-like operating systems, which is often compared to other common data compression formats such as gzip and bzip2. XZ Utils is a command line tool that contains functionality for both compression and decompression of XZ files and <a href="https://xz.tukaani.org/xz-utils/liblzma-api/"><u>liblzma</u></a>, a zlib-like API used for data compression and also supports the legacy .lzma format.</p><p><strong>How was this backdoor discovered?</strong></p><p>On March 29, Andres Freund, a PostgreSQL developer at Microsoft, posted on the <a href="https://www.openwall.com/lists/oss-security/2024/03/29/4"><u>Open Source Security Mailing List</u></a> that he had discovered a supply-chain compromise involving obfuscated malicious code in the XZ package while investigating SSH performance issues. According to both Freund and RedHat, the malicious code is not present in the Git distribution for XZ and only in the full download package.</p><p><strong>Which versions of the library are affected?</strong></p><p>According to Freund, XZ Utils versions 5.6.0 and 5.6.1 are impacted.</p><p><strong>Has this backdoor code been exploited?</strong></p><p>No information regarding exploitation has been observed for this backdoor code as of March 29. Because this situation is still developing, we anticipate more information will come to light in the coming days and weeks. We will update this portion of the FAQ once such information is available.</p><p><strong>What is the impact of this backdoor?</strong></p><p>According to Red Hat, the malicious code modifies functions within the liblzma code, which is part of the XZ Utils package. This modified code can then be used by any software linked to the XZ library and allow for the interception and modification of data used with the library. In the example observed by Freund, under certain conditions, this backdoor could allow a malicious actor to “break sshd authentication,” allowing the attacker to gain access to an affected system.</p><p><strong>Is there a CVE assigned for this issue?</strong></p><p>Yes, Red Hat assigned <a href="https://www.tenable.com/cve/CVE-2024-3094"><u>CVE-2024-3094</u></a> for this issue and it has been given a CVSSv3 score of 10.0.</p><p><strong>How was this backdoor inserted into the code?</strong></p><p>At the time this blog was published, it’s unclear how this backdoor code was placed into the affected builds of XZ utils. According to Freund, it's likely the individual who made the code commits is directly involved with the XZ project or had their system or developer account compromised.</p><p><strong>What Linux distributions are affected?</strong></p><p>As of the time this blog was published on March 29, the following distributions are known to be affected:</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>Distribution</strong></th><th><strong>Advisory</strong></th><th><strong>Notes</strong></th></tr></thead><tbody><tr><td>Fedora Rawhide</td><td><a href="https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users"><u>https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users</u></a></td><td>Fedora Rawhide is the development distribution of Fedora Linux</td></tr><tr></tr><tr><td>Fedora 40 Beta</td><td><a href="https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users"><u>https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users</u></a></td><td>Fedora Linux 40 beta does contain two affected versions of xz libraries, however does not appear to be affected. All Fedora 40 beta users are still encouraged to revert to 5.4.x versions of XZ.</td></tr><tr><td>Fedora 41</td><td><a href="https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users"><u>https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users</u></a></td><td> </td></tr><tr><td>Debian testing, unstable and experimental distributions versions 5.5.1alpha-0.1 to 5.6.1-1.</td><td><p><a href="https://lists.debian.org/debian-security-announce/2024/msg00057.html"><u>https://lists.debian.org/debian-security-announce/2024/msg00057.html</u></a></p><p><a href="https://security-tracker.debian.org/tracker/CVE-2024-3094"><u>https://security-tracker.debian.org/tracker/CVE-2024-3094</u></a></p></td><td> </td></tr><tr><td>openSUSE Tumbleweed and openSUSE MicroOS</td><td><a href="https://news.opensuse.org/2024/03/29/xz-backdoor/"><u>https://news.opensuse.org/2024/03/29/xz-backdoor/</u></a></td><td>Backdoored version of xz was included in Tumbelweed and MicroOS between March 7 and March 28</td></tr><tr><td>Kali Linux</td><td><a href="https://www.kali.org/blog/about-the-xz-backdoor/"><u>https://www.kali.org/blog/about-the-xz-backdoor/</u></a></td><td>Backdoored version of xz was included in Kali Linux (xz-utils 5.6.0-0.2) between March 26 and March 28</td></tr><tr><td>Arch Linux</td><td><a href="https://archlinux.org/news/the-xz-package-has-been-backdoored/"><u>https://archlinux.org/news/the-xz-package-has-been-backdoored//</u></a></td><td><p>The following release artifacts contain the compromised xz: </p><ul><li>installation medium 2024.03.01</li><li>virtual machine images 20240301.218094 and 20240315.221711 </li><li>container images created between and including 2024-02-24 and 2024-03-28</li></ul></td></tr></tbody></table></div><p>The following Linux distributions are confirmed to not be affected:</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>Distribution</strong></th><th><strong>Advisory</strong></th><th><strong>Notes</strong></th></tr></thead><tbody><tr><td>Fedora Linux 40</td><td><a href="https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users"><u>https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users</u></a></td><td>RedHat recommends that users downgrade to a 5.4 build of XZ as a precaution</td></tr><tr><td>Red Hat Enterprise Linux (RHEL)</td><td><a href="https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users"><u>https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users</u></a></td><td>No versions of RHEL are affected.</td></tr><tr><td>Debian</td><td><a href="https://lists.debian.org/debian-security-announce/2024/msg00057.html"><u>https://lists.debian.org/debian-security-announce/2024/msg00057.html</u></a></td><td>No Debian <strong>stable</strong> versions are known to be affected.</td></tr><tr><td>Amazon Linux</td><td><a href="https://aws.amazon.com/security/security-bulletins/AWS-2024-002/"><u>https://aws.amazon.com/security/security-bulletins/AWS-2024-002/</u></a></td><td>Amazon Linux customers are not affected and AWS Infrastructure and services do not utilize xz.</td></tr><tr><td>SUSE Linux Enterprise and Leap</td><td><a href="https://news.opensuse.org/2024/03/29/xz-backdoor/"><u>https://news.opensuse.org/2024/03/29/xz-backdoor/</u></a></td><td>Both Enterprise and Leap are isolated from OpenSUSE and are unaffected.</td></tr><tr><td>Alpine Linux</td><td><a href="https://twitter.com/alpinelinux/status/1773781993844519408"><u>https://twitter.com/alpinelinux/status/1773781993844519408</u></a></td><td>No Alpine Linux xz binary is affected.</td></tr><tr><td>Gentoo Linux</td><td><a href="https://security.gentoo.org/glsa/202403-04"><u>https://security.gentoo.org/glsa/202403-04</u></a></td><td>Based on the current understanding of the backdoor, Gentoo is not affected.</td></tr><tr><td>Ubuntu</td><td><a href="https://ubuntu.com/security/CVE-2024-3094"><u>https://ubuntu.com/security/CVE-2024-3094</u></a></td><td>No released versions of Ubuntu are affected.</td></tr></tbody></table></div><p>Additionally, the macOS Homebrew package manager reverted its version of xz from 5.6.x to 5.4.6. Bo Anderson, a member of the technical steering committee and a maintainer of Homebrew, <a href="https://github.com/orgs/Homebrew/discussions/5243"><u>confirmed</u></a> that they do not believe Homebrew’s builds “were compromised” but because these versions of xz are not considered trustworthy, they have chosen to force downgrades “as a precaution.”</p><p>As this is a developing situation, we anticipate we will have further clarity for additional Linux distributions soon and will continue to update this blog as necessary.</p><p><strong>Are patches or mitigations available?</strong></p><p>Both developers and users of XZ Utils are advised to downgrade to known, unaffected versions of XZ Utils, such as 5.4.6 Stable. However, in addition to downgrading, it is strongly advised that developers and users conduct incident response to determine if they have been impacted as a result of this backdoor and to share “positive findings” with agencies like the Cybersecurity and Infrastructure Security Agency (<a href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094"><u>CISA</u></a>). You can check your installed version by running the command <em><strong>strings which xz` | egrep '\(XZ Utils\) </strong></em>or to determine if you have an affected version installed, you can run<em><strong> strings `which xz` | grep '5\.6\.[01]'</strong></em></p><img src="https://www.tenable.com/sites/default/files/images/blog/xz_utils.jpg" alt="Example command line output to check which versions of XZ Utils and liblzma are installed." referrerpolicy="no-referrer" /><p>In the above image, our second command does not return a result as the affected version is not installed on this host.</p><p><strong>Has Tenable released any product coverage for these vulnerabilities?</strong></p><p>Tenable Research released product coverage on March 29 and additional coverage is expected to be released as its available. A list of Tenable plugins for this vulnerability can be found on the individual CVE page for <a href="https://www.tenable.com/cve/CVE-2024-3094/plugins"><u>CVE-2024-3094</u></a> as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our <a href="https://www.tenable.com/plugins/pipeline"><u>Plugins Pipeline</u></a>.</p><div class="blog-change-log" id="blog-change-log"><div class="blog-change-log-head"><h3><strong>Change Log</strong></h3></div><div class="col-sm-12 blog-change-log-content"><p><strong>Update April 1:</strong> The "What Linux distributions are affected?" section has been updated to include additional affected and not affected distributions. In addition, updates to the "Has Tenable released any product coverage for these vulnerabilities?" section have been made.</p><p><strong>Update March 29:</strong> The "What Linux distributions are affected?" section has been updated to include additional affected and not affected distributions and a note about the Homebrew package manager.</p></div></div><h3><strong>Get more information</strong></h3><ul><li><a href="https://www.openwall.com/lists/oss-security/2024/03/29/4"><u>Open Source Security Mailing List post by Andres Freund</u></a></li><li>Red Hat: <a href="https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users"><u>Urgent security alert for Fedora Linux 40 and Fedora Rawhide users</u></a></li><li>Debian: <a href="https://lists.debian.org/debian-security-announce/2024/msg00057.html"><u>xz-utils security update</u></a></li><li>CISA Alert: <a href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094"><u>Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094</u></a></li></ul><p><strong>Join </strong><a href="https://community.tenable.com/s/group/0F9f2000000fyxyCAA/cyber-exposure-alerts"><strong><u>Tenable's Security Response Team</u></strong></a><strong> on the Tenable Community.</strong><br /><strong>Learn more about </strong><a href="https://www.tenable.com/products/tenable-one"><strong><u>Tenable One</u></strong></a><strong>, the Exposure Management Platform for the modern attack surface.</strong></p> Fri, 29 Mar 2024 17:17:27 Satnam Narang, Scott Caveza https://www.tenable.com/209119 CVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability https://www.tenable.com/blog/cve-2023-48788-critical-fortinet-forticlientems-sql-injection-vulnerability <p><strong>Fortinet warns of a critical SQL Injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code on vulnerable FortiClientEMS software.</strong></p><div class="blog-update"><div class="col-sm-12"><p><strong>Update March 21:</strong> The Analysis section has been updated to include confirmation by Fortinet that in-the-wild exploitation of this flaw has been observed.</p><p><a class="blog-update-view-log">View Change Log</a></p></div></div><h2>Background</h2><p>On March 12, Fortinet published an advisory (<a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-007"><u>FG-IR-24-007</u></a>) to address a critical flaw in its FortiClient Enterprise Management Server (FortiClientEMS), a solution which enables centralized management of multiple endpoints.</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>CVE</strong></th><th><strong>Description</strong></th><th><strong>CVSSv3</strong></th><th><strong>Severity</strong></th></tr></thead><tbody><tr><td><a href="https://www.tenable.com/cve/CVE-2023-48788"><u>CVE-2023-48788</u></a></td><td>Critical SQL Injection Vulnerability (or Improper neutralization of special elements in an SQL command)</td><td>9.3</td><td>Critical</td></tr></tbody></table></div><p>At the time this blog was published, Fortinet’s advisory assigned a CVSSv3 score of 9.3 to this flaw, while the entry on the <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48788"><u>National Vulnerability Database (NVD)</u></a> lists the CVSSv3 score as 9.8 and also links to an advisory that is not currently available. This blog will be updated to reflect the correct CVSSv3 score if the advisory or NVD record are updated.</p><h2>Analysis</h2><p>CVE-2023-48788 is a critical SQL injection vulnerability that could allow an unauthenticated, remote attacker to execute commands or arbitrary code through specifically crafted requests. At the time this blog was published, Fortinet’s advisory did not include any messaging about known exploitation of this vulnerability. However, due to prior targeting of Fortinet devices and word of an upcoming proof-of-concept (PoC) exploit for the flaw, in-the-wild exploitation is likely to occur.</p><p>Researchers at GreyNoise have <a href="https://viz.greynoise.io/tags/fortinet-forticlientems-cve-2023-48788-sql-injection-attempt?days=10"><u>published a tag for CVE-2023-48788</u></a> on the GreyNoise platform that can be used to monitor for in-the-wild exploitation attempts.</p><p>On March 21, Fortinet <a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-007"><u>updated its advisory</u></a> with a note confirming this vulnerability "is exploited in the wild." However, no further details were shared outside of this update and we are not aware of any other confirmations of in-the-wild exploitation.</p><p><strong>Historical exploitation of Fortinet devices</strong></p><p>Fortinet devices have been frequently targeted by attackers with several noteworthy flaws observed since 2019.</p><p>Fortinet’s FortiOS and FortiProxy have been popular targets for threat actors, including <a href="https://www.tenable.com/blog/cve-2023-27997-heap-based-buffer-overflow-in-fortinet-fortios-and-fortiproxy-ssl-vpn-xortigate"><u>CVE-2023-27997, a critical heap-based buffer overflow</u></a> and <a href="https://www.tenable.com/blog/cve-2022-40684-critical-authentication-bypass-in-fortios-and-fortiproxy"><u>CVE-2022-40684, a critical authentication bypass vulnerability</u></a>. Other vulnerabilities in Fortinet devices have <a href="https://www.tenable.com/blog/aa23-250a-multiple-nation-state-threat-actors-exploit-cve-2022-47966-and-cve-2022-42475"><u>attracted the attention of multiple nation-state threat actors</u></a> and <a href="https://www.tenable.com/blog/contileaks-chats-reveal-over-30-vulnerabilities-used-by-conti-ransomware-affiliates"><u>ransomware groups like Conti</u></a>. Fortinet vulnerabilities have been included as <a href="https://www.tenable.com/blog/aa23-215a-2022s-top-routinely-exploited-vulnerabilities"><u>part of the top routinely exploited vulnerability lists</u></a> in recent years.</p><p>Last month, Fortinet released an advisory and patch for <a href="https://www.tenable.com/blog/cve-2024-21762-critical-fortinet-fortios-out-of-bound-write-ssl-vpn-vulnerability"><u>CVE-2024-21762, an out-of-bound write vulnerability</u></a> which had been exploited in the wild as a zero-day. Just days prior to that announcement, the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA) and Federal Bureau of Investigation (FBI) issued a cybersecurity advisory (CSA) warning of state-sponsored threat actors from the People’s Republic of China (PRC) <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a"><u>pre-positioning themselves</u></a> in United States networks across critical infrastructure using vulnerabilities in Fortinet devices as well as other SSL VPN devices from other vendors. In the CSA, <a href="https://www.tenable.com/blog/cve-2022-42475-fortinet-patches-zero-day-in-fortios-ssl-vpns"><u>CVE-2022-42475</u></a>, a heap-based buffer overflow in FortiOS, was specifically mentioned based on observed exploitation of the flaw, highlighting the continued use of vulnerabilities affecting Fortinet devices by a variety of threat actors.</p><h2>Proof of concept</h2><p>At the time this blog was published, no public proof-of-concept had been identified for this vulnerability, however, the Horizon3 Attack Team has stated a PoC will be published next week along with indicators of compromise (IoCs). On March 21, the Horizon3 Attack Team <a href="https://www.horizon3.ai/attack-research/attack-blogs/cve-2023-48788-fortinet-forticlientems-sql-injection-deep-dive/"><u>released their PoC code</u></a> along with a detailed write-up about how they reproduced the issue and developed a functional exploit that demonstrates the vulnerability without allowing for remote code execution.</p><p>As exploit code has been released and with past abuse of Fortinet flaws by threat actors, including advanced persistent threat (APT) actors and nation-state groups, we highly recommend remediating this vulnerability as soon as possible.</p><blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr" xml:lang="en">The recent <a href="https://twitter.com/hashtag/Fortinet?src=hash&amp;ref_src=twsrc%5Etfw">#Fortinet</a> <a href="https://twitter.com/hashtag/FortiClient?src=hash&amp;ref_src=twsrc%5Etfw">#FortiClient</a> Endpoint Management Server (EMS) SQL injection vulnerability, CVE-2023-48788, allows an unauth attacker to obtain RCE as SYSTEM on the server.<br /><br />IOCs, POC, and deep-dive blog to be released next week. In the meantime, check DAS service logs for… <a href="https://t.co/57ps2WiY8R">pic.twitter.com/57ps2WiY8R</a></p><p>— Horizon3 Attack Team (@Horizon3Attack) <a href="https://twitter.com/Horizon3Attack/status/1767965754744312161?ref_src=twsrc%5Etfw">March 13, 2024</a></p></blockquote><script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><h2>Solution</h2><p>Fortinet has released patches to address this SQL injection vulnerability as outlined in the table below:</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>Affected Product</strong></th><th><strong>Affected Version</strong></th><th><strong>Fixed Version</strong></th></tr></thead><tbody><tr><td>FortiClientEMS 7.2</td><td>7.2.0 through 7.2.2</td><td>7.2.3 or above</td></tr><tr><td>FortiClientEMS 7.0</td><td>7.0.1 through 7.0.10</td><td>7.0.11 or above</td></tr></tbody></table></div><h2>Identifying affected systems</h2><p>A list of Tenable plugins for this vulnerability can be found on the individual CVE page for <a href="https://www.tenable.com/cve/CVE-2023-48788/plugins"><u>CVE-2023-48788</u></a> as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our <a href="https://www.tenable.com/plugins/pipeline"><u>Plugins Pipeline</u></a>.</p><div class="blog-change-log" id="blog-change-log"><div class="blog-change-log-head"><h3>Change Log</h3></div><div class="col-sm-12 blog-change-log-content"><p><strong>Update March 21:</strong> The Analysis section has been updated to include confirmation by Fortinet that in-the-wild exploitation of this flaw has been observed.</p><p><strong>Update March 21:</strong> The Proof of Concept section has been updated to reflect that exploit code has been released.</p></div></div><h3>Get more information</h3><ul><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-007"><u>Fortinet PSIRT Advisory for CVE-2023-48788 (FG-IR-24-007)</u></a></li><li>Horizon3.ai Blog: <a href="https://www.horizon3.ai/attack-research/attack-blogs/cve-2023-48788-fortinet-forticlientems-sql-injection-deep-dive/"><u>CVE-2023-48788: Fortinet FortiClient EMS SQL Injection Deep Dive</u></a></li></ul><p><em><strong>Join </strong></em><a href="https://community.tenable.com/s/group/0F9f2000000fyxyCAA/cyber-exposure-alerts"><em><strong><u>Tenable's Security Response Team</u></strong></em></a><em><strong> on the Tenable Community.</strong></em><br /><em><strong>Learn more about </strong></em><a href="https://www.tenable.com/products/tenable-one"><em><strong><u>Tenable One</u></strong></em></a><em><strong>, the Exposure Management Platform for the modern attack surface.</strong></em></p> Thu, 14 Mar 2024 13:19:45 Chris Boyd https://www.tenable.com/209089 Microsoft’s March 2024 Patch Tuesday Addresses 59 CVEs (CVE-2024-21407) https://www.tenable.com/blog/microsofts-march-2024-patch-tuesday-addresses-59-cves-cve-2024-21407 <ol class="blog-severity-badges"><li class="blog-severity-badges critical"><span class="number">2</span>Critical</li><li class="blog-severity-badges important"><span class="number">57</span>Important</li><li class="blog-severity-badges moderate"><span class="number">0</span>Moderate</li><li class="blog-severity-badges low"><span class="number">0</span>Low</li></ol><p><strong>Microsoft addresses 59 CVEs in its March</strong> <strong>2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities.</strong></p><p>Microsoft patched 59 CVEs in its March 2024 Patch Tuesday release, with 2 rated critical and 57 rated as important.</p><img src="https://www.tenable.com/sites/default/files/images/blog/6b289856-bd0a-462e-a97e-270fb764ea77.png" referrerpolicy="no-referrer" /><p>This month’s update includes patches for:</p><ul><li>.NET</li><li>Azure Data Studio</li><li>Azure SDK</li><li>Microsoft Authenticator</li><li>Microsoft Azure Kubernetes Service</li><li>Microsoft Dynamics</li><li>Microsoft Edge for Android</li><li>Microsoft Exchange Server</li><li>Microsoft Graphics Component</li><li>Microsoft Intune</li><li>Microsoft Office</li><li>Microsoft Office SharePoint</li><li>Microsoft QUIC</li><li>Microsoft Teams for Android</li><li>Microsoft WDAC ODBC Driver</li><li>Microsoft WDAC OLE DB provider for SQL</li><li>Microsoft Windows SCSI Class System File</li><li>Open Management Infrastructure</li><li>Outlook for Android</li><li>Role: Windows Hyper-V</li><li>Skype for Consumer</li><li>Software for Open Networking in the Cloud (SONiC)</li><li>SQL Server</li><li>Visual Studio Code</li><li>Windows AllJoyn API</li><li>Windows Cloud Files Mini Filter Driver</li><li>Windows Composite Image File System</li><li>Windows Compressed Folder</li><li>Windows Defender</li><li>Windows Error Reporting</li><li>Windows Hypervisor-Protected Code Integrity</li><li>Windows Installer</li><li>Windows Kerberos</li><li>Windows Kernel</li><li>Windows NTFS</li><li>Windows ODBC Driver</li><li>Windows OLE</li><li>Windows Print Spooler Components</li><li>Windows Standards-Based Storage Management Service</li><li>Windows Telephony Server</li><li>Windows Update Stack</li><li>Windows USB Hub Driver</li><li>Windows USB Print Driver</li><li>Windows USB Serial Driver</li></ul><img src="https://www.tenable.com/sites/default/files/images/blog/1289ce36-d47d-4bfd-a0b5-7b9c0c7b95f3.png" referrerpolicy="no-referrer" /><p>Elevation of privilege (EoP) vulnerabilities accounted for 40.7% of the vulnerabilities patched this month, followed by Remote code execution (RCE) at 30.5%.</p><div class="blog-severity-alert"><div class="col-sm-2 nopad"><div class="blog-severity-badge important">Important</div></div><div class="col-sm-10"><h2>CVE-2024-21334 | Open Management Infrastructure (OMI) Remote Code Execution Vulnerability</h2></div><div class="col-sm-12"><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21334"><u>CVE-2024-21334</u></a> is a RCE affecting the open-source Open Management Infrastructure (OMI) management server. It was assigned a CVSSv3 score of 9.8 and is rated important. To exploit this vulnerability, a remote unauthenticated attacker could use a specially crafted request to trigger a use-after-free vulnerability. In addition, OMI received another patch this month, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21330"><u>CVE-2024-21330</u></a> to address an EoP vulnerability.</p><p>In 2022, Microsoft patched two EoP flaws in OMI (<a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-33640"><u>CVE-2022-33640</u></a> and <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-29149"><u>CVE-2022-29149</u></a>), as well as an information disclosure vulnerability (<a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36043"><u>CVE-2023-36043</u></a>) in November 2023. This RCE is a first for OMI and despite the critical CVSS score, Microsoft rates this vulnerability as “Exploitation Less Likely” according to the <a href="https://www.microsoft.com/en-us/msrc/exploitability-index"><u>Microsoft Exploitability Index</u></a>.</p></div></div><div class="blog-severity-alert"><div class="col-sm-2 nopad"><div class="blog-severity-badge critical">Critical</div></div><div class="col-sm-10"><h2>CVE-2024-21407 | Windows Hyper-V Remote Code Execution Vulnerability</h2></div><div class="col-sm-12"><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21407"><u>CVE-2024-21407</u></a> is a RCE vulnerability in Windows Hyper-V. This vulnerability was assigned a CVSSv3 score of 8.1 and is rated critical. Successful exploitation of this vulnerability requires that an attacker be authenticated and gather information about the target environment in order to craft their exploit. While the attack complexity is high, exploitation could result in code execution on the host server.</p><p>Including this month, nine RCE vulnerabilities affecting Windows Hyper-V have been disclosed since 2022, with seven of them rated as Critical. While these flaws generally are more difficult to exploit, successfully breaking out of a VM and executing code on the host is a significant risk and these flaws should be remediated quickly to avoid any potential misuse.</p></div></div><div class="blog-severity-alert"><div class="col-sm-2 nopad"><div class="blog-severity-badge important">Important</div></div><div class="col-sm-10"><h2>CVE-2024-21433 | Windows Print Spooler Elevation of Privilege Vulnerability</h2></div><div class="col-sm-12"><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21433"><u>CVE-2024-21433</u></a> is an EoP vulnerability in Windows Print Spooler. This vulnerability is rated as ”Exploitation More Likely,” and was assigned a CVSSv3 score of 7.0. Exploitation of this vulnerability would require an attacker to win a race condition which could grant the attacker SYSTEM privileges.</p><p>Over the last few years, we’ve seen a sharp decline in the number of Print Spooler related vulnerabilities patched as part of Patch Tuesday since the disclosure of CVE-2021-34527, the original <a href="https://www.tenable.com/blog/cve-2021-34527-microsoft-releases-out-of-band-patch-for-printnightmare-vulnerability-in-windows"><u>PrintNightmare vulnerability</u></a> and the <a href="https://www.tenable.com/blog/the-printnightmare-continues-another-zero-day-in-print-spooler-awaits-patch-cve-2021-36958"><u>torrent of Print Spooler vulnerabilities that followed</u></a>. In 2023, there were only four Print Spooler related bugs patched, including <a href="https://www.tenable.com/cve/CVE-2023-35325"><u>CVE-2023-35325</u></a>, an information disclosure vulnerability in Print Spooler disclosed in July 2023, as well as three Print Spooler EoP vulnerabilities disclosed in January 2023. In 2022, there were 35 Print Spooler related vulnerabilities patched as part of Patch Tuesday, with the biggest concentration of disclosures occurring in April 2022, with 15 Print Spooler vulnerabilities patched.</p><div class="table-responsive"><table class="table"><thead><tr><th>CVE</th><th>Description</th><th>Patch Tuesday Release</th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-35325"><u>CVE-2023-35325</u></a></td><td>Windows Print Spooler Information Disclosure Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-july-2023-patch-tuesday-addresses-130-cves-cve-2023-36884"><u>Jul 2023</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21678"><u>CVE-2023-21678</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-january-2023-patch-tuesday-addresses-98-cves-cve-2023-21674"><u>Jan 2023</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21765"><u>CVE-2023-21765</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-january-2023-patch-tuesday-addresses-98-cves-cve-2023-21674"><u>Jan 2023</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21760"><u>CVE-2023-21760</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-january-2023-patch-tuesday-addresses-98-cves-cve-2023-21674"><u>Jan 2023</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-44681"><u>CVE-2022-44681</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-december-2022-patch-tuesday-addresses-48-cves-cve-2022-44698"><u>Dec 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-44678"><u>CVE-2022-44678</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-december-2022-patch-tuesday-addresses-48-cves-cve-2022-44698"><u>Dec 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41073"><u>CVE-2022-41073</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-november-2022-patch-tuesday-addresses-62-cves-cve-2022-41073"><u>Nov 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-38028"><u>CVE-2022-38028</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-october-2022-patch-tuesday-addresses-84-cves-cve-2022-41033"><u>Oct 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-38005"><u>CVE-2022-38005</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-september-2022-patch-tuesday-addresses-62-cves-cve-2022-37969"><u>Sep 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35755"><u>CVE-2022-35755</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-august-2022-patch-tuesday-addresses-118-cves-cve-2022-34713"><u>Aug 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35793"><u>CVE-2022-35793</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-august-2022-patch-tuesday-addresses-118-cves-cve-2022-34713"><u>Aug 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-22022"><u>CVE-2022-22022</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-july-2022-patch-tuesday-addresses-84-cves-cve-2022-22047"><u>Jul 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-22041"><u>CVE-2022-22041</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-july-2022-patch-tuesday-addresses-84-cves-cve-2022-22047"><u>Jul 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30206"><u>CVE-2022-30206</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-july-2022-patch-tuesday-addresses-84-cves-cve-2022-22047"><u>Jul 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30226"><u>CVE-2022-30226</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-july-2022-patch-tuesday-addresses-84-cves-cve-2022-22047"><u>Jul 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-29104"><u>CVE-2022-29104</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-may-2022-patch-tuesday-addresses-73-cves-cve-2022-26925"><u>May 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-29132"><u>CVE-2022-29132</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-may-2022-patch-tuesday-addresses-73-cves-cve-2022-26925"><u>May 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-29114"><u>CVE-2022-29114</u></a></td><td>Windows Print Spooler Information Disclosure Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-may-2022-patch-tuesday-addresses-73-cves-cve-2022-26925"><u>May 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-29140"><u>CVE-2022-29140</u></a></td><td>Windows Print Spooler Information Disclosure Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-may-2022-patch-tuesday-addresses-73-cves-cve-2022-26925"><u>May 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26796"><u>CVE-2022-26796</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26802"><u>CVE-2022-26802</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26795"><u>CVE-2022-26795</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26801"><u>CVE-2022-26801</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26791"><u>CVE-2022-26791</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26790"><u>CVE-2022-26790</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26794"><u>CVE-2022-26794</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26793"><u>CVE-2022-26793</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26786"><u>CVE-2022-26786</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26789"><u>CVE-2022-26789</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26797"><u>CVE-2022-26797</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26798"><u>CVE-2022-26798</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26792"><u>CVE-2022-26792</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26787"><u>CVE-2022-26787</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26803"><u>CVE-2022-26803</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-april-2022-patch-tuesday-addresses-117-cves-cve-2022-24521"><u>Apr 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-23284"><u>CVE-2022-23284</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-march-2022-patch-tuesday-addresses-71-cves-cve-2022-23277-cve-2022-24508"><u>Mar 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-22718"><u>CVE-2022-22718</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-february-2022-patch-tuesday-addresses-48-cves-cve-2022-21989"><u>Feb 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21999"><u>CVE-2022-21999</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-february-2022-patch-tuesday-addresses-48-cves-cve-2022-21989"><u>Feb 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21997"><u>CVE-2022-21997</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-february-2022-patch-tuesday-addresses-48-cves-cve-2022-21989"><u>Feb 2022</u></a></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-22717"><u>CVE-2022-22717</u></a></td><td>Windows Print Spooler Elevation of Privilege Vulnerability</td><td><a href="https://www.tenable.com/blog/microsofts-february-2022-patch-tuesday-addresses-48-cves-cve-2022-21989"><u>Feb 2022</u></a></td></tr></tbody></table></div></div></div><div class="blog-severity-alert"><div class="col-sm-2 nopad"><div class="blog-severity-badge important">Important</div></div><div class="col-sm-10"><h2>CVE-2024-21443, CVE-2024-26173, CVE-2024-26176, CVE-2024-26178 and CVE-2024-26182 | Windows Kernel Elevation of Privilege Vulnerability</h2></div><div class="col-sm-12"><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21443"><u>CVE-2024-21443</u></a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26173"><u>CVE-2024-26173</u></a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26176"><u>CVE-2024-26176</u></a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26178"><u>CVE-2024-26178</u></a> and <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26182"><u>CVE-2024-26182</u></a> are EoP vulnerabilities affecting the Windows Kernel. These vulnerabilities are all rated as important, and each was assigned a CVSSv3 score of 7.8 with the exception of CVE-2024-21443 which was scored as 7.3. CVE-2024-26182 was the only Windows Kernel EoP rated as “Exploitation More Likely.” Successful exploitation of these vulnerabilities could lead to an attacker gaining SYSTEM privileges.</p></div></div><div class="blog-severity-alert"><div class="col-sm-2 nopad"><div class="blog-severity-badge important">Important</div></div><div class="col-sm-10"><h2>CVE-2024-21441, CVE-2024-21444, CVE-2024-21450, CVE-2024-26161 and CVE-2024-26166 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability</h2></div><div class="col-sm-12"><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21441"><u>CVE-2024-21441</u></a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21444"><u>CVE-2024-21444</u></a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21450"><u>CVE-2024-21450</u></a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26161"><u>CVE-2024-26161</u></a> and <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-26166"><u>CVE-2024-26166</u></a> are RCE vulnerabilities affecting the Microsoft WDAC OLE DB provider for SQL Server. These vulnerabilities are rated as important, and were assigned CVSSV3 scores of 8.8. Successful exploitation requires an authenticated user to be enticed to connect to a malicious SQL database. Once a connection is made, specially crafted replies can be sent to the client in order to exploit the vulnerability and allow the execution of arbitrary code.</p></div></div><h2>Tenable Solutions</h2><p>A list of all the plugins released for Tenable’s March 2024 Patch Tuesday update can be found <a href="https://www.tenable.com/plugins/search?q=%22March+2024%22+AND+script_family%3A%28%22Windows%22+OR+%22Windows+%3A+Microsoft+Bulletins%22%29&amp;sort=&amp;page=1"><u>here</u></a>. As always, we recommend patching systems as soon as possible and regularly scanning your environment to identify those systems yet to be patched.</p><p>For more specific guidance on best practices for vulnerability assessments, please refer to our blog post on <a href="http://www.tenable.com/blog/how-to-perform-efficient-vulnerability-assessments-with-tenable"><u>How to Perform Efficient Vulnerability Assessments with Tenable</u></a>.</p><h2>Get more information</h2><ul><li><a href="https://msrc.microsoft.com/update-guide/en-us/releaseNote/2024-Mar"><u>Microsoft's March 2024 Security Updates</u></a></li><li><a href="https://www.tenable.com/plugins/search?q=%22March+2024%22+AND+script_family%3A%28%22Windows%22+OR+%22Windows+%3A+Microsoft+Bulletins%22%29&amp;sort=&amp;page=1"><u>Tenable plugins for Microsoft March 2024 Patch Tuesday Security Updates</u></a></li></ul><p><em><strong>Join </strong></em><a href="https://community.tenable.com/s/group/0F9f2000000fyxyCAA/cyber-exposure-alerts"><em><strong><u>Tenable's Security Response Team</u></strong></em></a><em><strong> on the Tenable Community.</strong></em></p><p><em><strong>Learn more about </strong></em><a href="&lt;a href=" https:="" www.tenable.com="" products=""><em><strong><u>https://www.tenable.com/products/tenable-one</u></strong></em></a><em><strong>"&gt;<u>Tenable One</u>, the Exposure Management Platform for the modern attack surface.</strong></em></p> Tue, 12 Mar 2024 14:03:18 Tenable Security Response Team https://www.tenable.com/209087 CVE-2024-27198, CVE-2024-27199: Two Authentication Bypass Vulnerabilities in JetBrains TeamCity https://www.tenable.com/blog/cve-2024-27198-cve-2024-27199-two-authentication-bypass-vulnerabilities-in-jetbrains-teamcity <p><strong>Two vulnerabilities with publicly available exploit code in JetBrains TeamCity on-premises software could result in attackers bypassing authentication and achieving code execution.</strong></p><div class="blog-update"><div class="col-sm-12"><p><strong>Update March 7:</strong> The blog has been updated to include information in-the-wild exploitation of CVE-2024-27198.</p><p><a class="blog-update-view-log">View Change Log</a></p></div></div><h2>Background</h2><p>On March 4, JetBrains <a href="https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/"><u>published</u></a> a blog post regarding two security issues affecting <a href="https://www.jetbrains.com/help/teamcity/how-to.html"><u>TeamCity On-Premises</u></a>, a software solution for build management. The issues were <a href="https://blog.jetbrains.com/teamcity/2024/03/our-approach-addressing-recently-discovered-vulnerabilities-in-teamcity-on-premises/"><u>disclosed</u></a> to JetBrains in February by the researchers who discovered these vulnerabilities. In the March 4 <a href="https://www.jetbrains.com/help/teamcity/teamcity-2023-11-4-release-notes.html"><u>release notes</u></a>, no mention was made of what security issues were patched, however later in the day, a blog post regarding the release of TeamCity 2023.11.4 was published which included details about the two vulnerabilities.</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>CVE</strong></th><th><strong>Description</strong></th><th><strong>CVSSv3</strong></th><th><strong>Severity</strong></th></tr></thead><tbody><tr><td><a href="https://www.tenable.com/cve/CVE-2024-27198"><u>CVE-2024-27198</u></a></td><td>Authentication bypass vulnerability</td><td>9.8</td><td>Critical</td></tr><tr><td><a href="https://www.tenable.com/cve/CVE-2024-27199"><u>CVE-2024-27199</u></a></td><td>Path traversal vulnerability which allows for authentication bypass</td><td>7.3</td><td>High</td></tr></tbody></table></div><h2>Analysis</h2><p>CVE-2024-27198 is an authentication bypass vulnerability with a critical CVSSv3 rating of 9.8. The vulnerability is within the web component of TeamCity and stems from an <a href="https://cwe.mitre.org/data/definitions/288.html"><u>alternate path issue</u></a>. Exploitation of this vulnerability could allow an attacker to bypass authentication in order to take administrative control of an affected TeamCity server. With this level of access, the attacker could execute arbitrary code and abuse this access for a supply chain attack.</p><p>CVE-2024-27199 is another authentication bypass vulnerability in the web component of TeamCity, made possible by a path traversal issue. The vulnerability received a CVSSv3 score of 7.3 and while this vulnerability is less severe, it can still be abused by an unauthenticated attacker.</p><p>These CVE alerts are primarily a concern for organizations running on-premises installations of TeamCity, and it is crucial that administrators of on-premises servers take steps to update their systems immediately. JetBrains has confirmed TeamCity Cloud customers have already had their servers patched, and have confirmed no evidence of exploitation has occurred for cloud customers.</p><p><strong>Historical exploitation of TeamCity vulnerabilities</strong></p><p>Unfortunately, this is not the first authentication bypass vulnerability to impact TeamCity servers. <a href="https://www.tenable.com/cve/CVE-2023-42793"><u>CVE-2023-42793</u></a>, another authentication bypass vulnerability patched in September, saw a variety of exploitation attempts within days of exploit details being released. In October, it was claimed that state sponsored North Korean hackers were responsible for <a href="https://www.helpnetsecurity.com/2023/10/20/north-korean-hackers-it/"><u>impersonating IT workers and attacking software developers</u></a> via CVE-2023-42793.</p><p>Shortly after, in December, law enforcement from Poland, the United States, and the United Kingdom warned that CVE-2023-42793 was being <a href="https://www.helpnetsecurity.com/2023/12/14/russian-hackers-cve-2023-42793/"><u>used by Russian state sponsored groups</u></a> to target unpatched instances of TeamCity servers. APT 29, also known as Cozy Bear, is a threat actor well known for supply chain and malware attacks across a variety of industries and sectors including energy companies and political organizations. Their abuse of CVE-2023-42793 and the exploitation from a wide range of threat actor groups are a reminder of the severe damage that can be inflicted in well organized attacks. We expect to see continued attacks on TeamCity instances and organizations running vulnerable versions of TeamCity should take the latest warnings seriously and remediate these vulnerabilities as soon as possible.</p><p><strong>Exploitation has been observed</strong></p><p>In a post on X (formerly Twitter), LeakIX revealed that they have observed over 1400 instances of compromised TeamCity servers with evidence of "clear signs of rogue user creation."</p><blockquote class="twitter-tweet"><p lang="en" dir="ltr" xml:lang="en">⚠️We added detection for compromised <a href="https://twitter.com/hashtag/TeamCity?src=hash&amp;ref_src=twsrc%5Etfw">#TeamCity</a> instances:<br /><br />1711 vulnerable instances were found during our last scan, 1442 show clear signs of rogue user creation.<br /><br />If you were/are still running a vulnerable system, assume compromise. <a href="https://t.co/BIvscjRxZJ">pic.twitter.com/BIvscjRxZJ</a></p><p>— LeakIX (@leak_ix) <a href="https://twitter.com/leak_ix/status/1765497407045853255?ref_src=twsrc%5Etfw">March 6, 2024</a></p></blockquote><script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><p>With in-the-wild exploitation already underway, it's imperative to take action to remediate these vulnerabilities as well as begin incident response processes to identify if your server has been compromised.</p><h2>Proof of concept</h2><p>At the time this blog was published, public proof-of-concept (PoC) code is available. Additionally, active exploitation attempts of CVE-2024-27198 have been observed.</p><blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr" xml:lang="en">If running JetBrains TeamCity on-prem - make sure to patch for latest CVE-2024-27198 (remote auth bypass) &amp; CVE-2024-27199 vulns NOW! <br /><br />We started seeing exploitation activity for CVE-2024-27198 around Mar 4th 22:00 UTC. 16 IPs seen scanning so far.<a href="https://t.co/zZ0iU5MD8S">https://t.co/zZ0iU5MD8S</a></p><p>— Shadowserver (@Shadowserver) <a href="https://twitter.com/Shadowserver/status/1764960110659478012?ref_src=twsrc%5Etfw">March 5, 2024</a></p></blockquote><script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><h2>Solution</h2><p>JetBrains has released TeamCity version <a href="https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/">2023.11.4</a> to address both of these authentication bypass vulnerabilities.</p><p>JetBrains advises customers to update or patch as soon as possible. In situations where either of these options are not available and devices are internet facing, JetBrains recommends taking impacted devices offline until the patch can be applied.</p><p>In instances where upgrading to version 2023.11.4 is not possible, JetBrains offers a <a href="https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/#mitigation-option-2-apply-the-security-patch-plugin"><u>standalone security patch</u></a>, with versions available for TeamCity 2018.2 and newer as well as TeamCity 2018.1 and older.</p><p>With public PoC code available and historical exploitation of TeamCity servers, we recommend patching or updating your installation as soon as possible.</p><h2>Identifying affected systems</h2><p>A list of Tenable plugins to identify affected systems can be found on the individual CVE pages for <a href="https://www.tenable.com/cve/CVE-2024-27198"><u>CVE-2024-27198</u></a> and <a href="https://www.tenable.com/cve/CVE-2024-27199"><u>CVE-2024-27199</u></a>. This link will display all available plugins for these vulnerabilities, including upcoming plugins in our <a href="https://www.tenable.com/plugins/pipeline"><u>Plugins Pipeline</u></a>.</p><h3>Get more information</h3><ul><li>TeamCity Blog: <a href="https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/"><u>Additional Critical Security Issues Affecting TeamCity On-Premises (CVE-2024-27198 and CVE-2024-27199) – Update to 2023.11.4 Now</u></a></li><li>TeamCity followup blog: <a href="https://blog.jetbrains.com/teamcity/2024/03/our-approach-addressing-recently-discovered-vulnerabilities-in-teamcity-on-premises/"><u>Insights and Timeline: Our Approach to Addressing the Recently Discovered Vulnerabilities in TeamCity On-Premises</u></a></li></ul><div class="blog-change-log" id="blog-change-log"><div class="blog-change-log-head"><h3>Change Log</h3></div><div class="col-sm-12 blog-change-log-content"><p><strong>Update March 7:</strong> The blog has been updated to include information in-the-wild exploitation of CVE-2024-27198.</p></div></div><p><em><strong>Join </strong></em><a href="https://community.tenable.com/s/group/0F9f2000000fyxyCAA/cyber-exposure-alerts"><em><strong><u>Tenable's Security Response Team</u></strong></em></a><em><strong> on the Tenable Community.</strong></em></p><p><em><strong>Learn more about </strong></em><a href="https://www.tenable.com/products/tenable-one"><em><strong><u>Tenable One</u></strong></em></a><em><strong>, the Exposure Management Platform for the modern attack surface.</strong></em></p> Wed, 06 Mar 2024 10:06:33 Chris Boyd https://www.tenable.com/209065 Frequently Asked Questions about ScreenConnect Vulnerabilities https://www.tenable.com/blog/frequently-asked-questions-about-connectwise-screenconnect-vulnerabilities <p><strong>Frequently asked questions about two vulnerabilities affecting ConnectWise ScreenConnect</strong></p><div class="blog-update"><div class="col-sm-12"><p><strong>Update February 23:</strong> The blog has been updated to include information about ransomware attacks involving vulnerable ScreenConnect servers.</p><p><a class="blog-update-view-log">View Change Log</a></p></div></div><h2>Background</h2><p>The Tenable Security Response Team has put together this blog to answer Frequently Asked Questions (FAQ) regarding two vulnerabilities impacting ScreenConnect, a Remote Monitoring and Management (RMM) solution from ConnectWise.</p><h2>FAQ</h2><p><strong>What are the ScreenConnect vulnerabilities and when were they disclosed?</strong></p><p>On February 19, ConnectWise released a <a href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"><u>security advisory</u></a> for two vulnerabilities affecting their RMM product, ScreenConnect. At the time the advisory was released, no CVE identifiers had been released for the vulnerabilities. On February 21, three CVEs were assigned for these vulnerabilities. Two CVEs were reserved by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) (CVE-2024-1708 and CVE-2024-1709) and another was reserved by MITRE (CVE-2024-27215). CVE-2024-27215 was later updated and listed as REJECTED.</p><div class="table-responsive"><table class="table"><thead><tr><th><strong>CVE</strong></th><th><strong>Description</strong></th><th><strong>CVSSv3</strong></th></tr></thead><tbody><tr><td><a href="https://www.tenable.com/cve/CVE-2024-1709">CVE-2024-1709</a></td><td>Authentication bypass that could allow an attacker to execute remote code or directly impact confidential data or critical systems.</td><td>10</td></tr><tr><td><a href="https://www.tenable.com/cve/CVE-2024-1708">CVE-2024-1708</a></td><td>A path traversal vulnerability that could allow an attacker to access confidential data</td><td>8.4</td></tr></tbody></table></div><p><strong>Which versions of ConnectWise are affected?</strong></p><p>ScreenConnect versions 23.9.7 and prior are affected by these vulnerabilities. These vulnerabilities only impact self-hosted or on-premise installations. Cloud customers who have ScreenConnect servers hosted on the “screenconnect.com” or “hostedrmm.com” are not impacted as updates have been made to the cloud service to address these vulnerabilities.</p><p>The advisory also notes that updated versions of ScreenConnect 22.4 through 23.9.7 will be released, however they still strongly recommend upgrading to ScreenConnect version 23.9.8.</p><p><strong>Have any of these vulnerabilities been exploited?</strong></p><p>On February 20, ConnectWise <a href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"><u>updated its security advisory</u></a> to share indicators of compromise (IOCs) relating to malicious activity. In this update, ConnectWise notes that they have "received updates of compromised accounts" that were investigated and confirmed by its incident response team, indicating in-the-wild exploitation of these flaws. The update includes IOCs of IP addresses reportedly associated with threat actor activity.</p><p>On February 20, Huntress posted a <a href="https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2"><u>blog post</u></a> with detection guidance to aid defenders into identifying impacted systems.</p><p>On February 23, <a href="https://news.sophos.com/en-us/2024/02/23/connectwise-screenconnect-attacks-deliver-malware/"><u>Sophos reported</u></a> that ransomware attacks have been observed exploiting vulnerable ScreenConnect servers. A variant of the LockBit ransomware known as buhtiRansom has been observed and according to Sophos, this variant appears to have been generated using the leaked LockBit builder. As ransomware groups and affiliates begin targeting vulnerable instances of ScreenConnect, it's imperative that immediate action is taken to remediate these vulnerabilities.</p><p><strong>Has any Proof-of-Concept (PoC) code been released?</strong></p><p>As of February 20, a <a href="https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8"><u>blog by Huntress</u></a> indicates that their researchers have reproduced these vulnerabilities and developed a working PoC, however they have chosen not to release the exploit code. Later that day, Huntress posted another <a href="https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass"><u>blog post</u></a> with their analysis of the vulnerabilities as well as how they discovered them. This blog included information on how to exploit these vulnerabilities citing that other vendors have released their own PoCs and that "the cat is out of the bag."</p><p>In addition to Huntress, researchers at Horizon3 Attack Team posted to X (formerly known as Twitter) about their own PoC for the authentication bypass vulnerability, adding that it is “extremely trivial to reverse and exploit” that they plan to publish it along with a blog post soon.</p><blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr" xml:lang="en">The recent <a href="https://twitter.com/hashtag/ConnectWise?src=hash&amp;ref_src=twsrc%5Etfw">#ConnectWise</a> <a href="https://twitter.com/hashtag/ScreenConnect?src=hash&amp;ref_src=twsrc%5Etfw">#ScreenConnect</a> authentication bypass vulnerability is extremely trivial to reverse and exploit. Blog and exploit POC will drop soon. <a href="https://t.co/mEIaRetKxQ">pic.twitter.com/mEIaRetKxQ</a></p><p>— Horizon3 Attack Team (@Horizon3Attack) <a href="https://twitter.com/Horizon3Attack/status/1760019078280826903?ref_src=twsrc%5Etfw">February 20, 2024</a></p></blockquote><p><script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p><p>On February 21, Horizon3 released their <a href="https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/&quot;"><u>write up and PoC</u></a> and researchers at watchTowr posted on X that they have created a PoC for the authentication bypass issue and posted a link to their PoC on GitHub.</p><blockquote class="twitter-tweet"><p lang="en" dir="ltr" xml:lang="en">Here's our PoC for the Connectwise ScreenConnect Auth Bypass:<a href="https://t.co/C17vJWygf6">https://t.co/C17vJWygf6</a> <br /><br />The vuln is the definition of trivial and thus we won't release any analysis. Not sure what we would share - "Add a / and you too can pwn the world"? <a href="https://t.co/oVh2LNCqb6">pic.twitter.com/oVh2LNCqb6</a></p><p>— watchTowr (@watchtowrcyber) <a href="https://twitter.com/watchtowrcyber/status/1760189490067390581?ref_src=twsrc%5Etfw">February 21, 2024</a></p></blockquote><script async="" src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><p><strong>Are patches or mitigations available?</strong></p><p>As of February 19 when the security advisory was released, ScreenConnect version 23.9.8 has been released to address these vulnerabilities. No mitigation steps were provided by ConnectWise.</p><p><strong>Has Tenable released any product coverage for these vulnerabilities?</strong></p><p>Yes, product coverage for these vulnerabilities is now available in the following plugins:</p><ul><li>Nessus Plugin ID 190883: <a href="https://www.tenable.com/plugins/nessus/190883"><u>ConnectWise ScreenConnect Installed (Windows)</u></a></li><li>Nessus Plugin ID 190894: <a href="https://www.tenable.com/plugins/nessus/190894"><u>ConnectWise ScreenConnect HTTP Detection</u></a></li><li>Nessus Plugin ID 190886: <a href="https://www.tenable.com/plugins/nessus/190886"><u>ConnectWise ScreenConnect &lt; 23.9.8 Multiple Vulnerabilities</u></a></li><li>Nessus Plugin ID 190893: <a href="https://www.tenable.com/plugins/nessus/190893"><u>ConnectWise ScreenConnect &lt; 23.9.8 Authentication Bypass (Direct Check)</u></a></li><li>Web App Scanning ID 114214: <a href="https://www.tenable.com/plugins/was/114214"><u>ConnectWise ScreenConnect &lt; 23.9.8 Authentication Bypass</u></a></li></ul><p>Additional coverage can be found on the individual CVE pages for <a href="https://www.tenable.com/cve/CVE-2024-1708/plugins"><u>CVE-2024-1708</u></a> and <a href="https://www.tenable.com/cve/CVE-2024-1709/plugins"><u>CVE-2024-1709</u></a> as they're released. This link will display all available plugins for this vulnerability, including upcoming plugins in our <a href="https://www.tenable.com/plugins/pipeline"><u>Plugins Pipeline</u></a>.</p><h3>Get more information</h3><ul><li><a href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"><u>ConnectWise ScreenConnect 23.9.8 Security Advisory</u></a></li><li>Huntress Blog Post: <a href="https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8"><u>Vulnerability Reproduced: Immediately Patch ScreenConnect 23.9.8</u></a></li><li>Huntress Blog Post: <a href="https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass"><u>A Catastrophe For Control: Understanding the ScreenConnect Authentication Bypass</u></a></li><li>Horizon3 Attack Team Blog: <a href="https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/"><u>ConnectWise ScreenConnect: Authentication Bypass Deep Dive</u></a></li></ul><div class="blog-change-log" id="blog-change-log"><div class="blog-change-log-head"><h3>Change Log</h3></div><div class="col-sm-12 blog-change-log-content"><p><strong>Update February 23:</strong> The blog has been updated to include information about ransomware attacks involving vulnerable ScreenConnect servers.</p><p><strong>Update February 22:</strong> The blog has been updated with Tenable product coverage.</p><p><strong>Update February 21 (Second Update):</strong> The blog has been updated to announce that CVE identifiers have been reserved for these vulnerabilities.</p><p><strong>Update February 21:</strong> The blog has been updated to announce that public proof-of-concept code is now available.</p><p><strong>Update February 20:</strong> The blog has been updated with confirmation from ConnectWise of in-the-wild exploitation.</p></div></div><p><em><strong>Join </strong></em><a href="https://community.tenable.com/s/group/0F9f2000000fyxyCAA/cyber-exposure-alerts"><em><strong><u>Tenable's Security Response Team</u></strong></em></a><em><strong> on the Tenable Community.</strong></em><br /><em><strong>Learn more about </strong></em><a href="https://www.tenable.com/products/tenable-one"><em><strong><u>Tenable One</u></strong></em></a><em><strong>, the Exposure Management Platform for the modern attack surface.</strong></em></p> Tue, 20 Feb 2024 18:08:46 Scott Caveza https://www.tenable.com/208953