CVE-2024-5806: Progress MOVEit Transfer における認証バイパスの脆弱性
Progress Software has patched a high severity authentication bypass in the MOVEit managed file transfer (MFT) solution. As MOVEit has been a popular target for ransomware gangs and other threat actors, we strongly recommend prioritizing patching of this vulnerability....
CVE-2024-28995: SolarWinds Serv-U のパス/ディレクトリトラバーサルの脆弱性の悪用が確認される
Following the publication of proof-of-concept exploit details for a high-severity flaw in SolarWinds Serv-U, researchers have observed both automated and manual in-the-wild exploitation attempts; patching is strongly advised....
Microsoft’s June 2024 Patch Tuesday Addresses 49 CVEs
Microsoft addresses 49 CVEs in its June 2024 Patch Tuesday release with one rated as critical and no zero-day or publicly disclosed vulnerabilities. Our counts omitted two CVEs that were not issued by Microsoft, which include CVE-2023-50868 (issued by MITRE) and CVE-2024-29187 (issued by GitHub)....
CVE-2024-4577: Proof of Concept Available for PHP-CGI Argument Injection Vulnerability
Researchers disclose a critical severity vulnerability affecting PHP installations and provide proof-of-concept exploit code, which could lead to remote code execution....
ロックウェル・オートメーション: パブリックインターネットアクセスを持つ OT デバイスを切断し、Logix、FactoryTalk の CVE にパッチを適用しリスクを軽減する
An advisory from Rockwell Automation reiterates the importance of disconnecting operational technology devices with public-facing internet access and patching and mitigating systems vulnerable to several flaws....
CVE-2024-4358、CVE-2024-1800: Progress Telerik Report Server の重大なエクスプロイトチェーンのエクスプロイトコードがリリース
Researchers have released an exploit chain to achieve remote code execution on unpatched instances of Progress Telerik Report Server. Immediate patching is recommended....
サービスタグを悪用して Azure ファイアウォールルールをバイパスする脆弱性が発見される
Azure customers whose firewall rules rely on Azure Service Tags, pay attention: You could be at risk due to a vulnerability detected by Tenable Research. Here’s what you need to know to determine if you’re affected, and if so, what you should do right away to protect your Azure environment from atta...
CVE-2024-24919: チェックポイントのセキュリティゲートウェイの情報漏えいのゼロデイ脆弱性の悪用が確認される
Amid warnings of threat actors targeting VPN devices, Check Point has identified a zero-day information disclosure vulnerability impacting Check Point Network Security gateways which has been exploited by malicious actors....
マイクロソフトの 2024 年 5 月月例セキュリティ更新プログラム: 59 件の CVE に対処 (CVE-2024-30051、CVE-2024-30040)
Microsoft addresses 59 CVEs in its May 2024 Patch Tuesday release with one critical vulnerability and three zero-day vulnerabilities, two of which were exploited in the wild....
CVE-2024-21793、CVE-2024-26026: F5 の「BIG-IP Next Central Manager」の脆弱性をエクスプロイトする概念実証がリリース
Researchers disclose multiple vulnerabilities in F5 BIG-IP Next Central Manager and provide proof-of-concept exploit code, which could lead to exposure of hashed passwords....
CVE-2024-20353、CVE-2024-20359: ArcaneDoor に関するよくある質問
Frequently asked questions about CVE-2024-20353 and CVE-2024-20359, two vulnerabilities associated with “ArcaneDoor,” the espionage-related campaign targeting Cisco Adaptive Security Appliances....
CVE-2024-4040: CrushFTP VFS (仮想ファイル システム) のサンドボックスエスケープの脆弱性の悪用が確認される
A zero-day vulnerability in CrushFTP was exploited in the wild against multiple U.S. entities prior to fixed versions becoming available as the vendor recommends customers upgrade as soon as possible....