Malware Devil

Thursday, April 8, 2021

Prism: Private Verifiable Set Computation over Multi-Owner Outsourced Databases

Read More

The post Prism: Private Verifiable Set Computation over Multi-Owner Outsourced Databases appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/prism-private-verifiable-set-computation-over-multi-owner-outsourced-databases/?utm_source=rss&utm_medium=rss&utm_campaign=prism-private-verifiable-set-computation-over-multi-owner-outsourced-databases

Behind the Headlines: Why Ransomware Will Be One of 2020’s Most Infamous Legacies

With attacks increasing by 140 percent between 2018 and 2019, the threat from ransomware was growing long before the COVID-19 pandemic began. Last year, however, thanks to a perfect storm of unfortunate circumstances, the trend line for ransomware growth has gone vertical.

The post Behind the Headlines: Why Ransomware Will Be One of 2020’s Most Infamous Legacies appeared first on Security Boulevard.

Read More

The post Behind the Headlines: Why Ransomware Will Be One of 2020’s Most Infamous Legacies appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/behind-the-headlines-why-ransomware-will-be-one-of-2020s-most-infamous-legacies/?utm_source=rss&utm_medium=rss&utm_campaign=behind-the-headlines-why-ransomware-will-be-one-of-2020s-most-infamous-legacies

Fraudsters Use HTML Legos to Evade Detection in Phishing Attack

Criminals stitch pieces of HTML together and hide them in JavaScript files, researchers report.

The post Fraudsters Use HTML Legos to Evade Detection in Phishing Attack appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/fraudsters-use-html-legos-to-evade-detection-in-phishing-attack-2/?utm_source=rss&utm_medium=rss&utm_campaign=fraudsters-use-html-legos-to-evade-detection-in-phishing-attack-2

Fraudsters Use HTML Legos to Evade Detection in Phishing Attack

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2020-14103
PUBLISHED: 2021-04-08

The application in the mobile phone can read the SNO information of the device, Xiaomi 10 MIUI < 2020.01.15.

CVE-2020-14106
PUBLISHED: 2021-04-08

The application in the mobile phone can unauthorized access to the list of running processes in the mobile phone, Xiaomi Mobile Phone MIUI < 2021.01.26.

CVE-2021-29154
PUBLISHED: 2021-04-08

Incorrect computation of branch displacements in BPF JIT compilers the Linux kernel can be abused to execute arbitrary code in Kernel mode.

CVE-2021-3146
PUBLISHED: 2021-04-08

The Dolby Audio X2 (DAX2) API service before 0.8.8.90 on Windows allows local users to gain privileges.

CVE-2021-22312
PUBLISHED: 2021-04-08

There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product in…

The post Fraudsters Use HTML Legos to Evade Detection in Phishing Attack appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/fraudsters-use-html-legos-to-evade-detection-in-phishing-attack/?utm_source=rss&utm_medium=rss&utm_campaign=fraudsters-use-html-legos-to-evade-detection-in-phishing-attack

StrikeForce Technologies Acquires Cybersecurity Risk Solutions LLC Expanding Its Identity and Endpoint Cyber-Defense Arsenal

New Acquisition Adds Comprehensive Cyber, Privacy & Data Protection Solutions April 08, 2021 08:00 ET | Source: StrikeForce Technologies, Inc. EDISON, N.J., April 08, 2021 (GLOBE NEWSWIRE) — StrikeForce Technologies, Inc. (OTC PINK: SFOR), a cyber technology company that reduces the risk of identity theft and data breaches, today announced the acquisition of Cybersecurity Risk..

The post StrikeForce Technologies Acquires Cybersecurity Risk Solutions LLC Expanding Its Identity and Endpoint Cyber-Defense Arsenal appeared first on Security Boulevard.

Read More

The post StrikeForce Technologies Acquires Cybersecurity Risk Solutions LLC Expanding Its Identity and Endpoint Cyber-Defense Arsenal appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/strikeforce-technologies-acquires-cybersecurity-risk-solutions-llc-expanding-its-identity-and-endpoint-cyber-defense-arsenal/?utm_source=rss&utm_medium=rss&utm_campaign=strikeforce-technologies-acquires-cybersecurity-risk-solutions-llc-expanding-its-identity-and-endpoint-cyber-defense-arsenal

600K Payment Card Records Leaked After Swarmshop Breach

A leaked database also contains the nicknames, hashed passwords, contact details, and activity history of Swarmshop admins, sellers, and buyers.

The post 600K Payment Card Records Leaked After Swarmshop Breach appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/600k-payment-card-records-leaked-after-swarmshop-breach-2/?utm_source=rss&utm_medium=rss&utm_campaign=600k-payment-card-records-leaked-after-swarmshop-breach-2

600K Payment Card Records Leaked After Swarmshop Breach

A leaked database also contains the nicknames, hashed passwords, contact details, and activity history of Swarmshop admins, sellers, and buyers.

A breach of Swarmshop, an online hub for selling stolen personal and payment records, has led to the exposure of more than 600,000 payment card numbers and nearly 70,000 sets of US Social Security numbers and Canadian Social Insurance numbers, Group-IB researchers report.

Group-IB calls Swarmshop a midsize “neighborhood” store for selling stolen records. The shop has been in operation since at least April 2019; by March 2021, it had more than 12,000 users and more than 600,000 payment card records for sale.

Researchers discovered data belonging to Swarmshop users leaked on March 17, 2021, when they found the information posted on a different underground forum. The leaked database contained the records of four shop admins, 90 sellers, and 12,250 buyers of stolen data, whose nicknames, hashed passwords, account balance, and, for some, contact details, were exposed.

The database also exposed a wealth of compromised and personal data traded on Swarmshop. It contained 623,036 payment card records, 62.7% of which were issued by US banks. Other records came from financial institutions in China (14.02%), the UK (3.24%), Canada (3.09%), France (3.07%), Singapore (1.6%), Brazil (1.32%), Saudi Arabia (0.99%), and Mexico (0.86%).

In addition to stolen payment cards, the database exposed 498 sets of online bank account credentials, 68,995 sets of US Social Security numbers, and 597 Canadian Social Insurance numbers.

Read the full Group-IB findings for more details.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post 600K Payment Card Records Leaked After Swarmshop Breach appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/600k-payment-card-records-leaked-after-swarmshop-breach/?utm_source=rss&utm_medium=rss&utm_campaign=600k-payment-card-records-leaked-after-swarmshop-breach

Adware Spreads via Fake TikTok App, Laptop Offers

Cybercriminals are encouraging users to send the “offers” via WhatsApp to their friends as well.
Read More

The post Adware Spreads via Fake TikTok App, Laptop Offers appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/adware-spreads-via-fake-tiktok-app-laptop-offers/?utm_source=rss&utm_medium=rss&utm_campaign=adware-spreads-via-fake-tiktok-app-laptop-offers

Zero-Day Bug Impacts Problem-Plagued Cisco SOHO Routers

Cisco says it will not patch three small business router models and one VPN firewall device with critical vulnerabilities.
Read More

The post Zero-Day Bug Impacts Problem-Plagued Cisco SOHO Routers appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/zero-day-bug-impacts-problem-plagued-cisco-soho-routers-2/?utm_source=rss&utm_medium=rss&utm_campaign=zero-day-bug-impacts-problem-plagued-cisco-soho-routers-2

Zero-Day Bug Impacts Problem-Plagued Cisco SOHO Routers

Cisco says it will not patch three small business router models and one VPN firewall device with critical vulnerabilities.
Read More

The post Zero-Day Bug Impacts Problem-Plagued Cisco SOHO Routers appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/zero-day-bug-impacts-problem-plagued-cisco-soho-routers/?utm_source=rss&utm_medium=rss&utm_campaign=zero-day-bug-impacts-problem-plagued-cisco-soho-routers

IcedID Banking Trojan Surges: The New Emotet?

A widespread email campaign using malicious Microsoft Excel attachments and Excel 4 macros is delivering IcedID at high volumes, suggesting it’s filling the Emotet void.
Read More

The post IcedID Banking Trojan Surges: The New Emotet? appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/icedid-banking-trojan-surges-the-new-emotet-2/?utm_source=rss&utm_medium=rss&utm_campaign=icedid-banking-trojan-surges-the-new-emotet-2

IcedID Banking Trojan Surges: The New Emotet?

A widespread email campaign using malicious Microsoft Excel attachments and Excel 4 macros is delivering IcedID at high volumes, suggesting it’s filling the Emotet void.
Read More

The post IcedID Banking Trojan Surges: The New Emotet? appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/icedid-banking-trojan-surges-the-new-emotet/?utm_source=rss&utm_medium=rss&utm_campaign=icedid-banking-trojan-surges-the-new-emotet

A Storm Might be Brewing at Molson Coors

In some countries, breweries have been classified as ‘essential’ during the pandemic. So when North America’s largest beer maker suddenly ceased production in March due to a cyber-attack it sent shockwaves through the industry and around the globe.

The post A Storm Might be Brewing at Molson Coors appeared first on Security Boulevard.

Read More

The post A Storm Might be Brewing at Molson Coors appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/a-storm-might-be-brewing-at-molson-coors/?utm_source=rss&utm_medium=rss&utm_campaign=a-storm-might-be-brewing-at-molson-coors

The Automation of Fraud Attacks

The need for automation of fraud attacks Legitimate enterprises take advantage of automation to handle repetitive, yet business-critical tasks. They pay top dollars for skilled engineers to build and maintain automated business logic. Fraudsters do the same and commonly leverage botnets to automate part of the workflow that will lead to a successful fraud attack. […]

The post The Automation of Fraud Attacks appeared first on Security Boulevard.

Read More

The post The Automation of Fraud Attacks appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/the-automation-of-fraud-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=the-automation-of-fraud-attacks

IETF RFC 4041 – Requirements for Morality Sections in Routing Area Drafts

Network Working Group

A. Farrel
Request for Comments: 4041

Old Dog Consulting

Category: Informational

1 April 2005

Requirements for Morality Sections in Routing Area Drafts

Status of This Memo

This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (2005).

Abstract

It has often been the case that morality has not been given proper
consideration in the design and specification of protocols produced
within the Routing Area. This has led to a decline in the moral
values within the Internet and attempts to retrofit a suitable moral
code to implemented and deployed protocols has been shown to be
sub-optimal.

This document specifies a requirement for all new Routing Area
Internet-Drafts to include a “Morality Considerations” section, and
gives guidance on what that section should contain.

  1. Introduction

    It is well accepted by popular opinion and other reliable metrics
    that moral values are declining and that degeneracy is increasing.
    Young people are particularly at risk from the rising depravity in
    society and much of the blame can be squarely placed at the door of
    the Internet. If you do not feel safe on the streets at night, what
    do you think it is like on the Information Superhighway?

    When new protocols or protocol extensions are developed within the
    Routing Area, it is often the case that not enough consideration is
    given to the impact of the protocol on the moral fiber of the
    Internet. The result is that moral consequences are only understood
    once the protocols have been implemented, and sometimes not until
    after they have been deployed.

Farrel Informational [Page 1]

RFC 4041 Routing Morality Section Requirements 1 April 2005

The resultant attempts to restore appropriate behavior and purge the
community of improper activities are not always easy or
architecturally pleasant. Further, it is possible that certain
protocol designs make morality particularly hard to achieve.

Recognising that moral issues are fundamental to the utility and
success of protocols designed within the IETF, and that simply making
a wishy-washy liberal-minded statement does not necessarily provide
adequate guarantees of a correct and proper outcome for society, this
document defines requirements for the inclusion of Morality
Considerations sections in all Internet-Drafts produced within the
Routing Area. Meeting these requirements will ensure that proper
consideration is given to moral issues at all stages of the protocol
development process, from Requirements and Architecture, through
Specification and Applicability.

The remainder of this document describes the necessary subsections of
the Morality Considerations sections, and gives guidance about what
information should be contained in those subsections.

1.1. Conventions Used in This Document

The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this
document are to be interpreted as described in RFC 2119 [RFC2119].

The key words “SHALT”, “SHALT NOT”, “SMITE”, and “PILLAR OF SALT” in
this document are to be interpreted as expected.

  1. Presence and Placement of Morality Considerations Sections

2.1. Null Morality Considerations Sections

It may be the case that the authors of Internet-Drafts have no or few
morals. This does not relieve them of their duty to understand the
consequences of their actions.

The more likely an author is to say that a null Morality
Considerations section is acceptable, the more pressure must be
exerted on him by the Area and the appropriate Working Group to
ensure that he gives full consideration to his actions, and reflects
long and hard on the consequences of his writing and the value of his
life.

On the other hand, some authors are well known to have the highest
moral pedigree: a fact that is plainly obvious from the company they
keep, the Working Groups they attend, and their eligibility for
NomCom. It is clearly unnecessary for such esteemed persons to waste

Farrel Informational [Page 2]

RFC 4041 Routing Morality Section Requirements 1 April 2005

effort on Morality Considerations sections. It is inconceivable that
anything that they write would have anything other than a beneficial
effect on the Routing Area and the Internet in general.

2.2. Mandatory Subsections

If the Morality Considerations section is present, it MUST contain at
least the following subsections. The content of these subsections is
surely self-evident to any right-thinking person. Further guidance
can be obtained from your moral guardian, your household gods, or
from any member of the IMM (Internet Moral Majority).

  • Likelihood of misuse by depraved or sick individuals. This
    subsection must fully address the possibility that the proposed
    protocols or protocol extensions might be used for the
    distribution of blue, smutty, or plain disgusting images.

  • Likelihood of misuse by misguided individuals. There is an
    obvious need to protect minors and people with misguided thought
    processes from utilising the protocols or protocol extensions for
    purposes that would inevitably do them harm.

  • Likelihood of misuse by large, multi-national corporations. Such
    a thought is, of course, unthinkable.

  • Availability of oversight facilities. There are those who would
    corrupt our morals motivated as they are by a hatred of the
    freedom of Internet access with which we are graced. We place a
    significant burden of responsibility on those who guard our
    community from these evil-doers and it is only fitting that we
    give them as much support as is possible. Therefore, all
    encryption and obfuscation techniques MUST be excluded –
    individuals who have nothing to hide need to fear the oversight of
    those whose morals are beyond doubt.

  • Inter-SDO impact. We must allow for other moral frameworks and
    fully respect other people’s right to subscribe to other belief
    systems. Such people are, however, wrong and doomed to spend
    eternity in a dark corner with only dial-up access. So it has
    been written.

  • Care and concern for avian carriers. A duck may be somebody’s
    mother.

    Even if one or more of these subsections are considered irrelevant,
    they MUST all still be present, and MUST contain a full rebuttal of
    this deviant thought.

Farrel Informational [Page 3]

RFC 4041 Routing Morality Section Requirements 1 April 2005

2.3. Optional Subsections

Additional subsections may be added to accommodate zealots.

2.4. Placement of Morality Considerations Sections

The Morality Considerations section MUST be given full prominence in
each Internet Draft.

  1. Applicability Scenarios

    This section outlines, by way of example, some particular areas that
    are in dire need of reform and where a short, sharp shock could make
    a really big difference.

3.1. Provision of Services

We must do our utmost to ensure that services are delivered in a
timely and reliable way. Emphasis should be placed on Quality of
Service (QoS) and meeting the needs of the consumer of the service.

Arrangements should be made for regular provision of services, and
sermons should be to the point and contain a strong moral message.

3.2. Political Correctness (PC)

Political correctness has gone too far. This problem can be traced
way back to the 1970s when the desktop PC was invented. It is
necessary for Internet-Drafts to observe a form of political
correctness, but note that you do not always have to mean what you
say.

3.2.1. Differentiated Services

Segregation of packets on the grounds of color is now banned and
Internet-Drafts must not make use of this technique.

If you follow all of the recommendations in this document, you will
find that “packets of color” (as we must now refer to them) tend to
avoid your points of presence, and you will no longer be troubled by
them.

3.2.2. Jumbo Packets

It is no longer appropriate to refer to “jumbo packets”. Please use
the term “capacitorially challenged”.

Farrel Informational [Page 4]

RFC 4041 Routing Morality Section Requirements 1 April 2005

3.2.3. Byte Ordering

Note that within Internet-Drafts, bytes (and bits) progress from the
left to the right. This is how things should be.

3.3. Protection or Abstinence

Much has been made recently of the need to provide protection within
the Internet. It is the role of the IMM to determine when protection
is required, and the role of the IESG bulldogs to ensure that we are
all protected.

However, protection is only one way to prevent unplanned outages and,
as we all know, the ready availability of protection schemes such as
1:1 (one-on-one) or 1:n (orgy-mode) have lead to a belief that it is
acceptable to switch (or swing) at will. It should be noted that
protection can fail, and under no circumstances should extra traffic
be countenanced.

In reality, the only safe way to avoid passing data to your friends
is to agree to pledge to have no control plane before marriage. Join
our campaign and sign up for the SONET Ring Thing.

3.4. Promiscuity

Various disgusting protocols indulge in promiscuity. This appears to
happen most often when an operator is unwilling to select a single
partner and wants to play the field.

Promiscuous modes of operation are an abomination, exceeded only by
multicast.

  1. Terminology

    Admission Control
    The caring investigative arm of the IMM.

    Doom
    Port 666. Need we say more?

    ECMP
    What is this? Some kind of Communism?

    Money
    The root of all evil.

Farrel Informational [Page 5]

RFC 4041 Routing Morality Section Requirements 1 April 2005

MPLS
What is with this “layer two-and-a-half” nonsense? The world is
flat, just accept the fact.

Packet Switching
Sounds like fraud to me.

Path
The route of all LSPs.

Policy Control
The administrative arm of the IMM.

Random Walk
Substance abuse is to be avoided.

Rendezvous Point
Poorly lit street corner. Not to be confused with the root of all
multicast.

Standard Body
What we should all strive for.

Strawberry Ice Cream
Something that wills the void between rational discussion and
all-out thermo nuclear war [SCREAM].

  1. Morality Considerations

    The moral pedigree of the author of this document places him and his
    writings beyond question.

  2. IANA Considerations

    IANA should think carefully about the protection of their immortal
    souls.

  3. Security Considerations

    Security is of the utmost importance.

    A secure Internet community will ensure the security of all of its
    members.

Farrel Informational [Page 6]

RFC 4041 Routing Morality Section Requirements 1 April 2005

  1. Acknowledgements

    I would like to thank my guru Alex Dipandra-Zinin.

    Jozef Wroblewski, who clearly knows promiscuous behavior when he sees
    it, pointed out some of the dangers in promiscuous operation.

    No avian carriers were harmed in the production of this document.

  2. Intellectual Property Considerations

    Property is theft. What is yours is mine. What is mine, you keep
    your hands off.

  3. Normative References

    I don’t need to be told how to formulate my morals.

    [RFC2119] Bradner, S., “Key words for use in RFCs to Indicate

    Requirement Levels", BCP 14, RFC 2119, March 1997.
  4. Informative References

    To be frank, I don’t find many other documents informative.

    [SCREAM] Farrel, A., “Observations on Proposing Protocol

    Enhancements that Address Stated Requirements but also go
        Further by Meeting more General Needs", Work in Progress,
        June 2003.

Author’s Address

Adrian Farrel
Old Dog Consulting

Phone: I’m not telling you that. Why do you ask, anyway?
EMail: adrian@olddog.co.uk

Farrel Informational [Page 7]

RFC 4041 Routing Morality Section Requirements 1 April 2005

Full Copyright Statement

Copyright (C) The Internet Society (2005).

This document is subject to the rights, licenses and restrictions
contained in BCP 78 and at www.rfc-editor.org/copyright.html, and
except as set forth therein, the authors retain all their rights.

This document and the information contained herein are provided on an
“AS IS” basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.

Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.

The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
ipr@ietf.org.

Acknowledgement

Funding for the RFC Editor function is currently provided by the
Internet Society.

Farrel Informational [Page 8]

Permalink

The post IETF RFC 4041 – Requirements for Morality Sections in Routing Area Drafts appeared first on Security Boulevard.

Read More

The post IETF RFC 4041 – Requirements for Morality Sections in Routing Area Drafts appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/ietf-rfc-4041-requirements-for-morality-sections-in-routing-area-drafts/?utm_source=rss&utm_medium=rss&utm_campaign=ietf-rfc-4041-requirements-for-morality-sections-in-routing-area-drafts

Integrity: How It’s More than Just Data Security and FIM

Integrity is a word thrown around a lot in the cybersecurity space. That’s not surprising. It is one of the three components that make up the CIA Triad, after all. However, the meaning and use of the word has been relatively limited in many security circles up until now. Let’s take a look at the […]… Read More

The post Integrity: How It’s More than Just Data Security and FIM appeared first on The State of Security.

The post Integrity: How It’s More than Just Data Security and FIM appeared first on Security Boulevard.

Read More

The post Integrity: How It’s More than Just Data Security and FIM appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/integrity-how-its-more-than-just-data-security-and-fim/?utm_source=rss&utm_medium=rss&utm_campaign=integrity-how-its-more-than-just-data-security-and-fim

ISC Stormcast For Thursday, April 8th, 2021 https://isc.sans.edu/podcastdetail.html?id=7448, (Thu, Apr 8th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Thursday, April 8th, 2021 https://isc.sans.edu/podcastdetail.html?id=7448, (Thu, Apr 8th) appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/isc-stormcast-for-thursday-april-8th-2021-https-isc-sans-edu-podcastdetail-htmlid7448-thu-apr-8th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-thursday-april-8th-2021-https-isc-sans-edu-podcastdetail-htmlid7448-thu-apr-8th

ESB-2021.1174 – [Cisco] Cisco Umbrella: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1174
       Cisco Umbrella Link and CSV Formula Injection Vulnerabilities
                               8 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Umbrella
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Provide Misleading Information  -- Existing Account
                   Reduced Security                -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-1475 CVE-2021-1474 

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-inject-gbZGHP5T

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Umbrella Link and CSV Formula Injection Vulnerabilities

Priority:        Medium
Advisory ID:     cisco-sa-umbrella-inject-gbZGHP5T
First Published: 2021 April 7 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvx27753 CSCvx28555
CVE Names:       CVE-2021-1474 CVE-2021-1475
CWEs:            CWE-1236 CWE-74

Summary

  o Multiple vulnerabilities in the Admin audit log export feature and
    Scheduled Reports feature of Cisco Umbrella could allow an authenticated,
    remote attacker to perform formula and link injection attacks on an
    affected device.

    For more information about these vulnerabilities, see the Details section
    of this advisory.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-inject-gbZGHP5T

Affected Products

  o Vulnerable Products

    These vulnerabilities affect Cisco Umbrella, which is cloud based.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by these vulnerabilities.

Details

  o The vulnerabilities are not dependent on one another. Exploitation of one
    of the vulnerabilities is not required to exploit the other vulnerability.
    In addition, a software release that is affected by one of the
    vulnerabilities may not be affected by the other vulnerability.

    Details about the vulnerabilities are as follows.

    CVE-2021-1474: Cisco Umbrella CSV Formula Injection Vulnerability

    A vulnerability in the Admin audit log export feature of Cisco Umbrella
    could allow an authenticated, remote attacker to perform a formula
    injection attack on an affected device.

    This vulnerability is due to improper neutralization of formula elements in
    the comma-separated value (CSV) file that is generated by the Admin audit
    log export feature. An attacker could exploit this vulnerability by
    performing certain actions that would lead to an injection of malicious
    entries into the log. A successful exploit could allow the attacker to
    inject malicious formula elements into the CSV file. These elements would
    be executed when a user opens the CSV file with a spreadsheet application,
    which could lead to manipulation of the data in the CSV file or code
    execution on the computer of the user.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvx27753
    CVE ID: CVE-2021-1474
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 6.5
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L

    CVE-2021-1475: Cisco Umbrella Link Injection Vulnerability

    A vulnerability in the Scheduled Reports feature of Cisco Umbrella could
    allow an authenticated, remote attacker to perform a link injection attack
    on an affected device.

    This vulnerability is due to improper neutralization of user-supplied
    input. An attacker could exploit this vulnerability by scheduling a report
    with a crafted title. A successful exploit could allow the attacker to
    inject a malicious link into the report, leading the user to believe that
    the link is coming from the application.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvx28555
    CVE ID: CVE-2021-1475
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 4.1
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Workarounds

  o There are no workarounds that address these vulnerabilities.

Fixed Software

  o Cisco has addressed these vulnerabilities in Cisco Umbrella, which is cloud
    based. No user action is required. Customers can determine the current
    remediation status or software version by using the Help function in the
    service GUI.

    Customers who need additional information are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerabilities that are
    described in this advisory.

Source

  o Cisco would like to thank Abhinav Khanna of eSec Forte Technologies for
    reporting these vulnerabilities

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-inject-gbZGHP5T

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-APR-07  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=mEg+
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1174 – [Cisco] Cisco Umbrella: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/esb-2021-1174-cisco-cisco-umbrella-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1174-cisco-cisco-umbrella-multiple-vulnerabilities

ESB-2021.1175 – [Cisco] Cisco Unified Intelligence Center products: Cross-site scripting – Remote with user interaction

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1175
          Cisco Unified Intelligence Center Reflected Cross-Site
                          Scripting Vulnerability
                               8 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Unified Intelligence Center
                   Cisco Unified Contact Center Express
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Cross-site Scripting     -- Remote with User Interaction
                   Access Confidential Data -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-1463  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-xss-U2WTsUg6

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Unified Intelligence Center Reflected Cross-Site Scripting Vulnerability

Priority:        Medium
Advisory ID:     cisco-sa-cuic-xss-U2WTsUg6
First Published: 2021 April 7 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvx10201 CSCvx10205
CVE Names:       CVE-2021-1463
CWEs:            CWE-79

Summary

  o A vulnerability in the web-based management interface of Cisco Unified
    Intelligence Center Software could allow an unauthenticated, remote
    attacker to conduct a cross-site scripting (XSS) attack against a user of
    the interface.

    This vulnerability exists because the web-based management interface does
    not properly validate user-supplied input. An attacker could exploit this
    vulnerability by persuading a user of an affected interface to click a
    crafted link. A successful exploit could allow the attacker to execute
    arbitrary script code in the context of the affected interface or access
    sensitive, browser-based information.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-xss-U2WTsUg6

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected Cisco Unified
    Intelligence Center and Cisco Unified Contact Center Express.

    For information about which Cisco software releases were vulnerable at the
    time of publication, see the Fixed Software section of this advisory. See
    the Details section in the bug ID(s) at the top of this advisory for the
    most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, the release information in the following table
    (s) was accurate. See the Details section in the bug ID(s) at the top of
    this advisory for the most complete and current information.

    The left column lists Cisco software releases, and the right column
    indicates whether a release was affected by the vulnerability described in
    this advisory and which release included the fix for this vulnerability.

    Unified Intelligence Center

    Cisco Unified Intelligence Center     First Fixed Release for This
    Releases                              Vulnerability
    11.6(1) and earlier                   Migrate to a fixed release.
    12.0(1)                               12.0(1) ES14
    12.5(1)                               12.5(1) ES7

    Unified Contact Center Express

    Cisco Unified Contact Center Express   First Fixed Release for This
    Releases                               Vulnerability
    11.6(1) and earlier                    Migrate to a fixed release.
    12.0(1)                                Migrate to a fixed release.
    12.5(1)                                12.5(1) SU1

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o Cisco would like to thank security researcher Tarkan of
    Digital-Investigation for reporting this vulnerability.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Related to This Advisory

  o Cross-Site Scripting

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-xss-U2WTsUg6

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-APR-07  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=C5py
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1175 – [Cisco] Cisco Unified Intelligence Center products: Cross-site scripting – Remote with user interaction appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/esb-2021-1175-cisco-cisco-unified-intelligence-center-products-cross-site-scripting-remote-with-user-interaction/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1175-cisco-cisco-unified-intelligence-center-products-cross-site-scripting-remote-with-user-interaction

ESB-2021.1163 – ALERT [Cisco] Cisco SD-WAN vManage Software: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1163
               Cisco SD-WAN vManage Software Vulnerabilities
                               8 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco SD-WAN vManage Software
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Root Compromise                 -- Remote/Unauthenticated
                   Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Increased Privileges            -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-1480 CVE-2021-1479 CVE-2021-1137

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco SD-WAN vManage Software Vulnerabilities

Priority:        Critical
Advisory ID:     cisco-sa-vmanage-YuTVWqy
First Published: 2021 April 7 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvs98509 CSCvv87918 CSCvw08533 CSCvw31395
CVE Names:       CVE-2021-1137 CVE-2021-1479 CVE-2021-1480
CWEs:            CWE-119 CWE-250 CWE-269

Summary

  o Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an
    unauthenticated, remote attacker to execute arbitrary code or allow an
    authenticated, local attacker to gain escalated privileges on an affected
    system.

    For more information about these vulnerabilities, see the Details section
    of this advisory.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy

Affected Products

  o Vulnerable Products

    These vulnerabilities affect Cisco devices if they are running a vulnerable
    release of Cisco SD-WAN vManage Software.

    For information about which Cisco software releases are vulnerable, see the
    Fixed Software section of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by these vulnerabilities.

    Cisco has confirmed that these vulnerabilities do not affect the following
    Cisco products:

       IOS XE SD-WAN Software
       SD-WAN cEdge Routers
       SD-WAN vBond Orchestrator Software
       SD-WAN vEdge Routers
       SD-WAN vSmart Controller Software

Details

  o The vulnerabilities are not dependent on one another. Exploitation of one
    of the vulnerabilities is not required to exploit another vulnerability. In
    addition, a software release that is affected by one of the vulnerabilities
    may not be affected by the other vulnerabilities.

    Details about the vulnerabilities are as follows:

    CVE-2021-1479: Cisco SD-WAN vManage Remote Management Buffer Overflow
    Vulnerability

    A vulnerability in a remote management component of Cisco SD-WAN vManage
    Software could allow an unauthenticated, remote attacker to cause a buffer
    overflow condition.
    The vulnerability is due to improper validation of user-supplied input to
    the vulnerable component. An attacker could exploit this vulnerability by
    sending a crafted connection request to the vulnerable component that, when
    processed, could cause a buffer overflow condition. A successful exploit
    could allow the attacker to execute arbitrary code on the underlying
    operating system with root privileges.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvv87918
    CVE ID: CVE-2021-1479
    Security Impact Rating (SIR): Critical
    CVSS Base Score: 9.8
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

    CVE-2021-1137: Cisco SD-WAN vManage Privilege Escalation Vulnerability

    A vulnerability in the user management function of Cisco SD-WAN Software
    could allow an authenticated, local attacker to gain escalated privileges
    on the underlying operating system.

    The vulnerability is due to insufficient input validation by the affected
    software. An authenticated attacker who has permissions to add new users or
    groups on the vManage system could exploit this vulnerability by modifying
    a user account. A successful exploit could allow the attacker to gain root 
    privileges on the underlying operating system.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvw08533
    CVE ID: CVE-2021-1137
    Security Impact Rating (SIR): High
    CVSS Base Score: 7.8
    CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    CVE-2021-1480: Cisco SD-WAN vManage Privilege Escalation Vulnerability

    A vulnerability in system file transfer functions of Cisco SD-WAN Software
    could allow an authenticated, local attacker to gain escalated privileges
    on the underlying operating system.

    The vulnerability is due to improper validation of input to the system file
    transfer functions. An authenticated attacker could exploit this
    vulnerability by sending specially crafted requests to the vulnerable
    system. A successful exploit could allow the attacker to overwrite
    arbitrary files and modify the system in such a way that could allow the
    attacker to gain root privileges on the underlying operating system.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvw31395 and CSCvs98509
    CVE ID: CVE-2021-1480
    Security Impact Rating (SIR): High
    CVSS Base Score: 7.8
    CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Workarounds

  o There are no workarounds that address these vulnerabilities.

Fixed Software

  o Cisco has released free software updates that address the vulnerabilities
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
    /en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    Customers are advised to upgrade to an appropriate fixed software release
    as indicated in the following table.

       Cisco SD-WAN       First Fixed         First Fixed Release for all
     vManage Release        Release         Vulnerabilities in this Advisory
    18.4 and earlier   Migrate to a         Migrate to a fixed release.
                       fixed release.

    19.2               19.2.4               19.2.4
    19.3               Migrate to a         Migrate to a fixed release.
                       fixed release.
    20.1               Migrate to a         Migrate to a fixed release.
                       fixed release.
    20.3               20.3.3               20.3.3
    20.4               20.4.1               20.4.1

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerabilities that are
    described in this advisory.

Source

  o Vulnerability CVE-2021-1479 was found during internal security testing.

    Cisco would like to thank Jakub Olszak and Stefan Zaryn for reporting the
    vulnerability CVE-2021-1137.

    Vulnerability CVE-2021-1480 was found during the resolution of a Cisco TAC
    support case. Cisco would also like to thank XMCO for independently
    reporting this vulnerability.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-APR-07  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=LhTP
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1163 – ALERT [Cisco] Cisco SD-WAN vManage Software: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/esb-2021-1163-alert-cisco-cisco-sd-wan-vmanage-software-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1163-alert-cisco-cisco-sd-wan-vmanage-software-multiple-vulnerabilities

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...