CPU in socket

CVE-2020-0618 | Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability

Published by Microsoft: 02/11/2020
MITRE CVE-2020-0618

“A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests. An attacker who successfully exploited this vulnerability could execute code in the context of the Report Server service account.”

There exists a proof of concept and write-up.

Basefarm considers this a Base CVSS Score: 9.8 (Critical) – but there exists an official fix from Microsoft, bringing the Temporal CVSS Score down to a 9.4 (Critical).

And we consider most of our users do not expose Microsoft SQL Server Reporting Service directly to the internet, so this CVSS Environmental Score can be lowered down to a 7.6 (High).

Per Basefarm Vulnerability process we still consider this a priority 1 (of 3) issue, and we will not wait until normal patch window to mitigate this issue. Internally we are tracking this progress in BF-VLN-1990987, registered 2020-02-18.

Wordpress

ThemeREX Addons – Remote Code Execution (0day, Being Exploited)

Published by Wordfence: 2020-02-18
No known CVE

“This flaw allows attackers to remotely execute code on a site with the plugin installed, including the ability to execute code that can inject administrative user accounts.
This vulnerability has not yet been patched. We are only trying to get the word out so people can remove the plugin temporarily as the vulnerability is being actively exploited. ”

Basefarm considers this a Base CVSS Score: 9.8 (Critical) – there is no fix and it is currently being actively exploited.

Basefarm has done some initial investigations regarding the use of this WordPress Theme, but has not identified any customers or internal usage. Basefarm has decided not to track this vulnerability further internally, but want to make it visible by posting this vulnerability bulletin.

Black network swtich with cables.

VMSA-2020-0003 vRealize Operations for Horizon Adapter updates address multiple security vulnerabilities (CVE-2020-3943, CVE-2020-3944, CVE-2020-3945)

Published by VMware: 2020-02-18
MITRE CVE-2020-3943

“vRealize Operations for Horizon Adapter uses a JMX RMI service which is not securely configured. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.0.”

“vRealize Operations for Horizon Adapter has an improper trust store configuration leading to authentication bypass. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.6.”

“vRealize Operations for Horizon Adapter contains an information disclosure vulnerability due to incorrect pairing implementation between the vRealize Operations for Horizon Adapter and Horizon View. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.3.”

The issue has been evaluated by our VMware technicians and Basefarm has concluded that we do not use Horizon Adapter and our systems are therefor not affected by these vulnerabilities.

|

The State of Breach Protection 2020

This blog post is a summary of this week’s Information Security News put together by our Security Incident Response Team (SIRT).

“What are the key considerations security decision makers should take into account when designing their 2020 breach protection?”
1,536 cybersecurity professionals has been asked that question and many other security related questions in Cynet’s “The State of Breach Protection 2020″ survey.
The survey report will give a great insight into common practices, prioritizations and preferences of organization today in how their are protecting themselves from breaches.

Download the full survey report here

 

Top 5 Security News

EU privacy fines near £100m, but regulators are hungry for more

Iran-Linked PupyRAT backdoor used in recent attacks on European energy sector

250 Million Microsoft Customer Support Records Exposed Online

NIST’s new privacy rules – what you need to know

Cisco Warns of Critical Network Security Tool Flaw

Golden Gate bridge during sunset

CVE-2020-3158 – Cisco Smart Software Manager On-Prem Static Default Credential Vulnerability

Published by Cisco: 2020-02-19
MITRE CVE-2020-3158

“A vulnerability in the High Availability (HA) service of Cisco Smart Software Manager On-Prem could allow an unauthenticated, remote attacker to access a sensitive part of the system with a high-privileged account.”

The vulnerability has a CVSS Base score of 9.8, Critical.

Basefarm has triaged this vulnerability and found that we are not using the Cisco Smart Software Manager On-Prem software. Basefarm will not track this vulnerability further.

|||||

Security Software & Tools Tips – November 2019

In this monthly post, we try to make you aware of five different security-related products.
This is a repost from my personal website Ulyaoth

This month we have chosen for the following:
* Kismet
* MAGNET RAM Capture
* RedLock
* SQLMap
* Wazuh

Kismet

Information from the block-doh website:

Kismet is a wireless network and device detector, sniffer, wardriving tool, and WIDS (wireless intrusion detection) framework.

Website:

https://kismetwireless.org/

MAGNET RAM Capture

Information from the MAGNET RAM Capture website:

MAGNET RAM Capture is a free imaging tool designed to capture the physical memory of a suspect’s computer, allowing investigators to recover and analyze valuable artifacts that are often only found in memory.

Website:

https://www.magnetforensics.com/resources/magnet-ram-capture/

RedLock

Information from the RedLock website:

RedLock Enables Cloud Threat Defense: Threat defense in the cloud requires a new AI-driven approach that correlates disparate security data sets including network traffic, user activities, risky configurations and threat intelligence, to provide a unified view of risks across fragmented cloud environments.

Website:

https://redlock.io/

SQLMap

Information from the SQLMap website:

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections.

Website:

https://github.com/sqlmapproject/sqlmap

Wazuh

Information from the Wazuh website:

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Website:

https://wazuh.com/

Image by StockSnap from Pixabay

Basefarm security news

This blog post is a short summary of this week’s Information Security News put together by SecOps team.

Basefarm have started to publish vulnerability bulletin in the blog posts, feel free to share this with our customers:

https://blog.basefarm.com/blog/category/security-blog/vuln-bullet/feed/

 

Top 3 Security News:

CVE-2020-0618 | Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability

Critical Cisco Bug Opens Software Licencing Manager to Remote Attack

You are never secure with a WordPress

CVE-2020-1938: Apache Tomcat AJP Connector Remote Code Execution Vulnerability Alert

 

 

 

Using two laptops

Insider threats

This blog post is a summary of this week’s Information Security News put together by our Security Incident Response Team (SIRT).

This week we have seen multiple cases of one of the harder issues in security, the insider threat.
Two former employees of twitter have been charged with spying on Twitter users for Saudi Arabia, together with a third man with ties to the Saudi royal family. According to court documents they were working together, using twitters internal systems to unmask  critics of the Kingdom and other users of Twitter.
Trend Micro also suffered from an insider attack where an employee accessed and sold customer data to a malevolent third party. Trend started getting suspicious after customers started getting calls from scammers claiming to be from Trend Micro support. The employee was fired after a three month investigation by Trend micro, and is now investigated by law enforcement.  You can read more about both cases here.

The Cybersecurity Insiders 2020 Insider Threat Report came out, and found that more than half of the organizations that participated believes that insider threats are harder to follow up in cloud environments. Meaning that the trend of offloading to the cloud could increase risk on unexpected levels.

Insider threats are one of the more complex issues in security with different challenges depending on a lot of factors, and organizations need to focus on what the challenges are for their specific organization, and find preventive measures that works in their environment.

Top 5 Security News

BlueKeep Attacks Have Arrived, Are Initially Underwhelming
Cybersecurity Skills Shortage Tops Four Million
Bug Hunters Hack Samsung Galaxy S10, Xiaomi Mi9 at Pwn2Own
Wizard Spider Upgrades Ryuk Ransomware to Reach Deep into LANs
Facebook reveals another privacy breach, this time involving developers

Grey and white long fured cat

CVE-2020-1938 – Apache Tomcat AJP Request Injection and potential Remote Code Execution

Published by Apache: 2020-02-24
MITRE CVE-2020-3158

“When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising.”

There is not enough details available yet, but the vulnerability has at least a CVSS Base score of 8.1, High. This depends on how hard it is to exploit, etc.

There is proof of concept published, but as of writing no known public exploitation of this vulnerability.

Basefarm customers will be upgraded as part of normal patching routines.

Vulnerable Citrix Appliances

On December 17, Citrix disclosed a vulnerability in their ADC, Gateway and SD-WAN product lines. Some patches were delivered around January 10, but these patches were not that efficient. A proper patch was not released before January 19 to January 24, depending on the appliance and release train.

Unfortunately, the nature of the vulnerability makes it extremely simple to exploit. That, combined with the fact that these appliances are usually directly connected to the Internet, makes this a serious threat to the overall Internet health. Exploit code has been generally available since about January 11 and there are now multiple, automated scanners deployed that is targeting unpatched appliances. When compromised, the malware is collecting config files and potentially SSL certificates and keys. There has also been attempts at using compromised appliances as stepping stones to move further into the infrastructure.

Basefarm recommend that all such appliances are checked and verified OK as soon as possible. FireEye has released a tool to aid in the verification. This tool can be found on Github. If a box is believed to be compromised, Basefarm recommends that the appliance is disconnected from the Internet immediately and fully replaced with a freshly installed one with all necessary patches in place before the appliance is exposed to the Internet again. All credentials and SSL keys stored on the appliance should be rotated.