Data
Events
Data: CASIE
Trigger word:
affect
Negative Trigger
Adobe
's
scheduled
October
update
for
its
Acrobat
and
Reader
PDF
software
addresses
Vulnerability-related.PatchVulnerability
85
vulnerabilities
,
including
dozens
of
critical
flaws
that
allow
arbitrary
code
execution
.
The
patches
also
address
Vulnerability-related.PatchVulnerability
multiple
privilege-escalation
and
information-disclosure
flaws
,
shoring
up
Adobe
's
PDF
software
further
following
a
patch
for
a
critical
Acrobat
and
Reader
flaw
plugged
Vulnerability-related.PatchVulnerability
two
weeks
ago
.
The
bugs
affect
Vulnerability-related.DiscoverVulnerability
Acrobat
DC
and
Reader
versions
2018.011.20063
and
earlier
from
Adobe
's
continuous
track
,
Acrobat
2017
and
Acrobat
Reader
2017
2017.011.30102
,
and
Acrobat
DC
and
Reader
DC
versions
2015.006.30452
and
earlier
from
Adobe
's
classic
2015
track
.
The
flaws
affect
Vulnerability-related.DiscoverVulnerability
the
software
running
on
Windows
and
macOS
systems
.
This update
Vulnerability-related.PatchVulnerability
is
the
largest
set
of
fixes
Adobe
's
PDF
software
since
it
swatted
Vulnerability-related.PatchVulnerability
105
vulnerabilities
in
July
.
However
,
fortunately
the
company
says
it
is
not
currently
aware
Vulnerability-related.DiscoverVulnerability
of
any
exploits
in
the
wild
for
bugs
fixed
Vulnerability-related.PatchVulnerability
in
this update
Vulnerability-related.PatchVulnerability
.
Users
and
admins
nonetheless
should
install
fixed
versions
,
according
to
Adobe
,
because
if
an
attacker
developed
an
exploit
it
could
lead
to
arbitrary
code
execution
in
the
context
of
the
current
user
because
the
software
is
sandboxed
.
Since
PDFs
are
still
widely
used
in
the
enterprise
,
hackers
continue
to
develop
new
techniques
to
break
the
sandbox
by
combining
PDF
attacks
with
operating
system
flaws
.
This
happened
earlier
this
year
,
prompting
a
warning
Vulnerability-related.DiscoverVulnerability
from
Adobe
in
May
after
it
was informed
Vulnerability-related.DiscoverVulnerability
by
researchers
at
ESET
and
Microsoft
that
they
'd
discovered
Vulnerability-related.DiscoverVulnerability
a
malicious
PDF
using
a
zero-day
remote
code
execution
flaw
in
Reader
with
a
sandbox-busting
Windows
privilege
escalation
flaw
.
Adobe
credits
researchers
from
Qihoo
360
,
Cisco
Talos
,
Beihang
University
,
Palo
Alto
Networks
,
and
Check
Point
for
reporting
Vulnerability-related.DiscoverVulnerability
flaws
patched
Vulnerability-related.PatchVulnerability
in
the
October
update
.
Check
Point
researcher
Omri
Herscovici
was
responsible
for
reporting
Vulnerability-related.DiscoverVulnerability
35
of
this
month
's
bugs
,
all
of
which
were
information
disclosure
flaws
.
Adobe
's
scheduled
October
update
for
its
Acrobat
and
Reader
PDF
software
addresses
Vulnerability-related.PatchVulnerability
85
vulnerabilities
,
including
dozens
of
critical
flaws
that
allow
arbitrary
code
execution
.
The
patches
also
address
Vulnerability-related.PatchVulnerability
multiple
privilege-escalation
and
information-disclosure
flaws
,
shoring
up
Adobe
's
PDF
software
further
following
a
patch
for
a
critical
Acrobat
and
Reader
flaw
plugged
Vulnerability-related.PatchVulnerability
two
weeks
ago
.
The
bugs
affect
Vulnerability-related.DiscoverVulnerability
Acrobat
DC
and
Reader
versions
2018.011.20063
and
earlier
from
Adobe
's
continuous
track
,
Acrobat
2017
and
Acrobat
Reader
2017
2017.011.30102
,
and
Acrobat
DC
and
Reader
DC
versions
2015.006.30452
and
earlier
from
Adobe
's
classic
2015
track
.
The
flaws
affect
Vulnerability-related.DiscoverVulnerability
the
software
running
on
Windows
and
macOS
systems
.
This update
Vulnerability-related.PatchVulnerability
is
the
largest
set
of
fixes
Adobe
's
PDF
software
since
it
swatted
Vulnerability-related.PatchVulnerability
105
vulnerabilities
in
July
.
However
,
fortunately
the
company
says
it
is
not
currently
aware
Vulnerability-related.DiscoverVulnerability
of
any
exploits
in
the
wild
for
bugs
fixed
Vulnerability-related.PatchVulnerability
in
this update
Vulnerability-related.PatchVulnerability
.
Users
and
admins
nonetheless
should
install
fixed
versions
,
according
to
Adobe
,
because
if
an
attacker
developed
an
exploit
it
could
lead
to
arbitrary
code
execution
in
the
context
of
the
current
user
because
the
software
is
sandboxed
.
Since
PDFs
are
still
widely
used
in
the
enterprise
,
hackers
continue
to
develop
new
techniques
to
break
the
sandbox
by
combining
PDF
attacks
with
operating
system
flaws
.
This
happened
earlier
this
year
,
prompting
a
warning
Vulnerability-related.DiscoverVulnerability
from
Adobe
in
May
after
it
was informed
Vulnerability-related.DiscoverVulnerability
by
researchers
at
ESET
and
Microsoft
that
they
'd
discovered
Vulnerability-related.DiscoverVulnerability
a
malicious
PDF
using
a
zero-day
remote
code
execution
flaw
in
Reader
with
a
sandbox-busting
Windows
privilege
escalation
flaw
.
Adobe
credits
researchers
from
Qihoo
360
,
Cisco
Talos
,
Beihang
University
,
Palo
Alto
Networks
,
and
Check
Point
for
reporting
Vulnerability-related.DiscoverVulnerability
flaws
patched
Vulnerability-related.PatchVulnerability
in
the
October
update
.
Check
Point
researcher
Omri
Herscovici
was
responsible
for
reporting
Vulnerability-related.DiscoverVulnerability
35
of
this
month
's
bugs
,
all
of
which
were
information
disclosure
flaws
.
Adobe
has patched
Vulnerability-related.PatchVulnerability
87
vulnerabilities
for
Acrobat
and
Reader
in
its
December
Patch
Tuesday
update
,
including
a
slew
of
critical
flaws
that
would
allow
arbitrary
code-execution
.
The
scheduled
update
comes
less
than
a
week
after
Adobe
released
Vulnerability-related.PatchVulnerability
several
out-of-band
fixes
for
Flash
Player
,
including
a
critical
vulnerability
(
CVE-2018-15982
)
that
it
said
is
being exploited
Vulnerability-related.DiscoverVulnerability
in
the
wild
.
That
’
s
a
use-after-free
flaw
enabling
arbitrary
code-execution
in
Flash
.
The
addressed
critical
vulnerabilities
are
myriad
this
month
.
The
arbitrary
code-execution
problems
include
:
two
buffer
errors
;
two
untrusted
pointer
dereference
glitches
;
three
heap-overflow
issues
,
five
out-of-bounds
write
flaws
,
24
use-after-free
bugs
.
Adobe
also
patched
Vulnerability-related.PatchVulnerability
three
other
critical-rated
issues
that
could
lead
to
privilege
escalation
;
these
are
all
security
bypass
problems
.
In
addition
to
the
critical
bugs
,
Adobe
also
patched
Vulnerability-related.PatchVulnerability
43
out-of-bounds
read
flaws
,
four
integer
overflow
problems
and
two
security
bypass
issues
,
all
of
which
could
allow
information
disclosure
.
Adobe
has
characterized
all
of
the
flaws
,
both
critical
and
important
,
as
“
priority
two
”
for
patching
Vulnerability-related.PatchVulnerability
,
which
means
that
the
software
giant
deems
them
to
be
unlikely
to
be
imminently
exploited
Vulnerability-related.DiscoverVulnerability
in
the
wild
,
but
patching
Vulnerability-related.PatchVulnerability
within
30
days
is
recommended
.
The
flaws
are
far-reaching
and
affect
Vulnerability-related.DiscoverVulnerability
various
implementations
of
Acrobat
DC
,
Acrobat
Reader
DC
,
Acrobat
2017
and
Acrobat
Reader
2017
for
macOS
and
Windows
,
in
classic
2015
,
classic
2017
and
continuous-track
versions
.
All
can
be
mitigated by updating
Vulnerability-related.PatchVulnerability
to
the
most
current
versions
of
the
software
.
Foxit
has patched
Vulnerability-related.PatchVulnerability
more
than
118
vulnerabilities
in
its
PDF
reader
,
some
of
which
could
be exploited
Vulnerability-related.DiscoverVulnerability
to
enable
full
remote
code
execution
.
Patches
were released
Vulnerability-related.PatchVulnerability
last
week
for
Foxit
Reader
9.3
and
Foxit
PhantomPDF
9.3
to
address
Vulnerability-related.PatchVulnerability
a
huge
number
of
issues
in
the
programs
.
This
security
bulletin
released
by
Foxit
provides
details
on
the
extensive
list
of
vulnerabilities
,
which
were discovered
Vulnerability-related.DiscoverVulnerability
via
internal
research
,
end
user
reports
,
and
reports
from
research
teams
.
More
than
118
issues
were addressed
Vulnerability-related.PatchVulnerability
,
though
there
was
some
overlap
,
and
so
the
number
of
actual
bugs
was
lower
.
Vulnerable
versions
are
9.2.0.9297
and
earlier
,
and
only
affect
Vulnerability-related.DiscoverVulnerability
Windows
users
.
A
significant
number
of
flaws
were
classed
as
‘
critical
’
and
could
allow
for
remote
code
execution
–
18
were reported
Vulnerability-related.DiscoverVulnerability
by
Cisco
Talos
,
all
of
which
were
dubbed
high
in
severity
.
Several
were
use-after-free
flaws
,
which
allows
memory
to
be
accessed
after
it
has
been
freed
and
can
enable
hackers
to
execute
arbitrary
code
and
take
over
the
system
.
Cisco
Talos
wrote
in
a
report
:
“
There
are
a
couple
of
different
ways
an
adversary
could
leverage
this
attack
including
tricking
a
user
to
opening
a
specially
crafted
,
malicious
PDF
or
,
if
the
browser
plugin
is
enabled
,
the
user
could
trigger
the
exploit
by
viewing
the
document
in
a
web
browser.
”
Foxit
told
The
Daily
Swig
that
its
programs
were
embedded
with
security
features
designed
to
protect
its
users
from
malicious
actors
.
These
include
a
‘
Safe
Mode
’
,
which
“
prevents
suspicious
external
commands
to
be
executed
by
Foxit
Reader
”
,
and
the
option
to
disable
JavaScript
.
The
company
also
urged
its
users
to
update
to
the
latest
version
.
A
spokesperson
told
The
Daily
Swig
:
“
Overall
,
Foxit
Reader
has
had
over
525
million
downloads
,
but
obviously
they
are
not
all
active
users
on
the
latest
release
.
“
In
Foxit
Reader
,
we
have
a
Safe
Mode
which
prevents
suspicious
external
commands
to
be
executed
by
Foxit
Reader
.
Therefore
,
we
don
’
t
know
how
many
folks
are
running
without
Safe
Mode
enabled.
”
However
,
this
security
feature
was
bypassed
not
just
once
,
but
twice
,
by
researchers
last
year
.
Foxit
added
:
“
For
a
number
of
reasons
,
including
bug fixes
Vulnerability-related.PatchVulnerability
,
we
always
advise
users
to
download
and
install
the
latest
release
.
Also
,
run
the
product
in
Safe
Mode
whenever
possible
.
”
The
Git
community
has disclosed
Vulnerability-related.DiscoverVulnerability
a
security
vulnerability
affecting
Vulnerability-related.DiscoverVulnerability
the
clone
and
submodule
commands
that
could
enable
remote
code
execution
when
vulnerable
machines
access
malicious
repositories
.
The
vulnerability
,
which
has been assigned
Vulnerability-related.DiscoverVulnerability
CVE–2018–17456
by
Mitre
,
has been fixed
Vulnerability-related.PatchVulnerability
in
Git
2.19.1
.
To
trigger
the
vulnerability
,
a
malicious
repository
could
forge
a
.gitmodules
containing
an
URL
starting
with
a
dash
.
This
would
affect
Vulnerability-related.DiscoverVulnerability
both
git
clone
--
recurse-submodules
and
git
submodule
update
--
recursive
in
that
they
would
recursively
pass
the
URL
starting
with
a
dash
to
a
git
clone
or
git
submodule
subprocess
that
would
interpret
the
URL
as
a
command
option
.
This
could
lead
to
executing
an
arbitrary
command
on
the
local
machine
.
This
vulnerability
is
similar
to
CVE–2017–1000117
,
which
also
enabled
an
option-injection
attack
by
forging
ssh
URLs
starting
with
a
dash
that
would
be
interpreted
as
an
option
by
the
ssh
subprocess
executed
by
git
.
No
exploits
are
known
at
the
moment
.
We
were
also
able
to
use
the
time
to
scan
all
repositories
on
GitHub
for
evidence
of
the
attack
being
used
in
the
wild
.
As
shown
in
the PR fixing
Vulnerability-related.PatchVulnerability
the
vulnerability
,
submitted
by
@
joernchen
,
the
fix
is
quite
trivial
in
itself
.
Yet
,
this
discovery
provided
the
opportunity
for
an
overall
audit
of
.gitmodules
,
which
led
to
implementing
stricter
checks
on
both
paths
and
URLs
found
inside
of
it
.
As
mentioned
,
the
fix
for
this
vulnerability
is
included
in
Git
2.19.1
.
Additionally
,
it
has been backported
Vulnerability-related.PatchVulnerability
to
versions
2.14.5
,
2.15.3
,
2.16.5
,
2.17.2
,
and
2.18.1
.
Since
git
is
integrated
in
GitHub
projects
such
as
GitHub
Desktop
and
Atom
,
those
have been patched
Vulnerability-related.PatchVulnerability
as
well
,
so
you
will
be
better
off
upgrading
Vulnerability-related.PatchVulnerability
them
as
soon
as
possible
.
Adobe
has resolved
Vulnerability-related.PatchVulnerability
11
security
flaws
in
this
month
's
patch
update
on
the
heels
of
a
far
larger
security
round
last
month
in
which
over
a
hundred
bugs
were squashed
Vulnerability-related.PatchVulnerability
.
The
patch
release
impacts
Vulnerability-related.PatchVulnerability
Adobe
Flash
,
Acrobat
and
Reader
,
Experience
Manager
,
and
Creative
Cloud
.
Two
of
the
vulnerabilities
disclosed
Vulnerability-related.DiscoverVulnerability
in
the
release
are described
Vulnerability-related.DiscoverVulnerability
as
critical
and
affect
Vulnerability-related.DiscoverVulnerability
Acrobat
and
Reader
.
In
July
,
Adobe
issued
Vulnerability-related.PatchVulnerability
a
security
update
which
patched
Vulnerability-related.PatchVulnerability
a
total
of
112
vulnerabilities
.
The
majority
of
bugs
were uncovered
Vulnerability-related.DiscoverVulnerability
in
Adobe
Acrobat
,
but
a
critical
code
execution
flaw
was also resolved
Vulnerability-related.PatchVulnerability
in
Adobe
Flash
.
The
critical
bugs
in
this
release
impact
Vulnerability-related.DiscoverVulnerability
Adobe
Acrobat
2017
,
Acrobat
DC
,
and
Acrobat
Reader
DC
on
Windows
and
macOS
machines
.
The
tech
giant
says
Vulnerability-related.DiscoverVulnerability
that
exploitation
of
the
security
flaws
,
an
out
of
bounds
write
issue
(
CVE-2018-12808
)
and
an
untrusted
pointer
dereference
problem
(
CVE-2018-12799
)
can
lead
to
arbitrary
code
execution
.
The
vulnerabilities
resolved
Vulnerability-related.PatchVulnerability
include
five
bugs
in
Adobe
Flash
.
An
out
of
bounds
read
flaw
(
CVE-2018-12824
)
,
a
security
bypass
error
(
CVE-2018-12825
)
,
two
information
disclosure
vulnerabilities
(
CVE-2018-12826
,
CVE-2018-12827
)
,
and
a
privilege
escalation
flaw
(
CVE-2018-12828
)
have all been patched
Vulnerability-related.PatchVulnerability
.
A
reflected
cross-site
scripting
flaw
(
CVE-2018-12806
)
,
input
validation
bypass
(
CVE-2018-12807
)
,
and
cross-site
scripting
(
XSS
)
bug
(
CVE-2018-5005
)
have been patched
Vulnerability-related.PatchVulnerability
in
Adobe
Experience
Manager
versions
6.0
--
6.4
on
all
platforms
.
If
exploited
Vulnerability-related.DiscoverVulnerability
,
the
security
flaws
can
facilitate
sensitive
information
disclosure
and
data
modification
.
In
addition
,
a
single
bug
in
Adobe
Creative
Cloud
Desktop
affecting
Vulnerability-related.DiscoverVulnerability
versions
4.5.0.324
and
earlier
versions
on
Windows
systems
has been resolved
Vulnerability-related.PatchVulnerability
.
The
DLL
hijacking
vulnerability
(
CVE-2018-5003
)
can
be exploited
Vulnerability-related.DiscoverVulnerability
in
order
for
an
attacker
to
escalate
privileges
on
an
account
.
Adobe
recommends
that
users
update
their
software
as
quickly
as
possible
.
Researchers
from
Trend
Micro
's
Zero
Day
Initiative
,
Palo
Alto
Networks
,
Google
Project
Zero
,
TenCent
,
and
Cognizant
Technology
Solutions
,
among
others
,
were
thanked
for
reporting
Vulnerability-related.DiscoverVulnerability
the
bugs
.
On
Tuesday
,
Microsoft
's
latest
round
of
patches
tackled
Vulnerability-related.PatchVulnerability
a
total
of
60
vulnerabilities
,
19
of
which
were
deemed
critical
.
Two
severe
security
flaws
resolved
Vulnerability-related.PatchVulnerability
in
the
update
are
zero-day
vulnerabilities
which
are
being
actively
exploited
Vulnerability-related.DiscoverVulnerability
in
the
wild
.
Cisco
has released
Vulnerability-related.PatchVulnerability
fixes
for
34
flaws
in
its
software
,
including
24
that
affect
Vulnerability-related.DiscoverVulnerability
its
FXOS
software
for
Firepower
firewalls
and
NX-OS
software
for
Nexus
switches
.
Cisco
's
June
updates
include
fixes
for
five
critical
arbitrary
code
execution
vulnerabilities
affecting
Vulnerability-related.DiscoverVulnerability
FXOS
and
NX-OS
and
19
high-rated
flaws
affecting
Vulnerability-related.DiscoverVulnerability
the
software
.
Four
of
the
critical
flaws
affect
Vulnerability-related.DiscoverVulnerability
FXOS
and
NX-OS
Cisco
Fabric
Services
,
while
the
fifth
one
affects
Vulnerability-related.DiscoverVulnerability
the
NX-API
feature
of
NX-OS
.
All
have
a
CVSS
v3
score
of
9.8
out
of
a
maximum
of
10
.
Cisco
Fabric
Services
facilitate
distribution
and
synchronization
of
configuration
data
between
Cisco
devices
on
the
same
network
.
Some
of
the
flaws
allow
an
unauthenticated
,
remote
attack
to
execute
arbitrary
code
and
one
allows
an
attacker
to
do
so
as
root
.
Multiple
switches
are vulnerable
Vulnerability-related.DiscoverVulnerability
if
they
've
been
configured
to
use
Cisco
Fabric
Services
,
including
its
Nexus
2000
series
through
to
Nexus
9000
series
switches
,
as
well
as
Cisco
's
Firepower
4100
Series
Next-Gen
Firewalls
and
other
hardware
.
The
insufficient
input
validation
may
occur
when
FXOS
and
NX-OS
process
Cisco
Fabric
Services
packets
received
during
distribution
and
synchronization
.
There
are
various
ways
to
exploit
each
of
the
flaws
,
depending
on
what
Cisco
Fabric
Services
distribution
types
have
been
configured
.
For
example
,
if
Fibre
Channel
ports
are
configured
as
a
distribution
type
for
a
device
,
the
attack
could
occur
via
Fibre
Channel
over
Ethernet
(
FCoE
)
or
Fibre
Channel
over
IP
(
FCIP
)
.
Cisco
has already rolled out
Vulnerability-related.PatchVulnerability
fixes
in
some
releases
of
FXOS
and
NX-OS
.
Cisco
posted
a
blog
this
week
explaining
why
it
often
fixes
Vulnerability-related.PatchVulnerability
bugs
in
IOS
and
NX-OS
releases
before
disclosing
Vulnerability-related.DiscoverVulnerability
them
in
an
advisory
.
It
's
a
practice
that
appears
to
cause
confusion
for
customers
wondering
why
it
has
n't
told
them
fixed
code
has been available
Vulnerability-related.PatchVulnerability
for
several
months
before
it
discloses
Vulnerability-related.DiscoverVulnerability
them
.
Cisco
's
answer
is
that
some
flaws
affect
Vulnerability-related.DiscoverVulnerability
more
than
50
versions
of
its
software
.
``
There
have
been
some
questions
as
to
why
creating
Vulnerability-related.PatchVulnerability
fixes
and
releasing
Vulnerability-related.PatchVulnerability
updates
can
take
several
weeks
,
or
sometimes
even
months
,
before
an
advisory
is
published
,
''
Cisco
's
Customer
Assurance
Security
Programs
team
wrote
.
``
In
some
cases
,
there
is
a
large
number
of
supported
software
versions
to
be
updated
.
The
number
of
affected
versions
that
will be updated
Vulnerability-related.PatchVulnerability
can
range
from
single
digits
to
nearly
50
or
more
.
We
are committed to issuing
Vulnerability-related.PatchVulnerability
fixes
for
every
one
of
those
supported
versions
.
''
``
If
we
disclosed
Vulnerability-related.DiscoverVulnerability
the
vulnerability
after
only
fixing
Vulnerability-related.PatchVulnerability
one
release
,
we
would
unnecessarily
expose
all
customers
running
Vulnerability-related.PatchVulnerability
other
releases
to
potential
exploitation
once
details
about
the
attack
itself
became
public
.
''
There
are
also
10
medium-severity
flaws
,
including
one
that
affects
Vulnerability-related.DiscoverVulnerability
some
WebEx
endpoints
due
to
an
already
disclosed
flaw
in
Nvidia
's
Tegra
TX1
chips
.
Cisco
has released
Vulnerability-related.PatchVulnerability
fixes
for
34
flaws
in
its
software
,
including
24
that
affect
Vulnerability-related.DiscoverVulnerability
its
FXOS
software
for
Firepower
firewalls
and
NX-OS
software
for
Nexus
switches
.
Cisco
's
June
updates
include
fixes
for
five
critical
arbitrary
code
execution
vulnerabilities
affecting
Vulnerability-related.DiscoverVulnerability
FXOS
and
NX-OS
and
19
high-rated
flaws
affecting
Vulnerability-related.DiscoverVulnerability
the
software
.
Four
of
the
critical
flaws
affect
Vulnerability-related.DiscoverVulnerability
FXOS
and
NX-OS
Cisco
Fabric
Services
,
while
the
fifth
one
affects
Vulnerability-related.DiscoverVulnerability
the
NX-API
feature
of
NX-OS
.
All
have
a
CVSS
v3
score
of
9.8
out
of
a
maximum
of
10
.
Cisco
Fabric
Services
facilitate
distribution
and
synchronization
of
configuration
data
between
Cisco
devices
on
the
same
network
.
Some
of
the
flaws
allow
an
unauthenticated
,
remote
attack
to
execute
arbitrary
code
and
one
allows
an
attacker
to
do
so
as
root
.
Multiple
switches
are vulnerable
Vulnerability-related.DiscoverVulnerability
if
they
've
been
configured
to
use
Cisco
Fabric
Services
,
including
its
Nexus
2000
series
through
to
Nexus
9000
series
switches
,
as
well
as
Cisco
's
Firepower
4100
Series
Next-Gen
Firewalls
and
other
hardware
.
The
insufficient
input
validation
may
occur
when
FXOS
and
NX-OS
process
Cisco
Fabric
Services
packets
received
during
distribution
and
synchronization
.
There
are
various
ways
to
exploit
each
of
the
flaws
,
depending
on
what
Cisco
Fabric
Services
distribution
types
have
been
configured
.
For
example
,
if
Fibre
Channel
ports
are
configured
as
a
distribution
type
for
a
device
,
the
attack
could
occur
via
Fibre
Channel
over
Ethernet
(
FCoE
)
or
Fibre
Channel
over
IP
(
FCIP
)
.
Cisco
has already rolled out
Vulnerability-related.PatchVulnerability
fixes
in
some
releases
of
FXOS
and
NX-OS
.
Cisco
posted
a
blog
this
week
explaining
why
it
often
fixes
Vulnerability-related.PatchVulnerability
bugs
in
IOS
and
NX-OS
releases
before
disclosing
Vulnerability-related.DiscoverVulnerability
them
in
an
advisory
.
It
's
a
practice
that
appears
to
cause
confusion
for
customers
wondering
why
it
has
n't
told
them
fixed
code
has been available
Vulnerability-related.PatchVulnerability
for
several
months
before
it
discloses
Vulnerability-related.DiscoverVulnerability
them
.
Cisco
's
answer
is
that
some
flaws
affect
Vulnerability-related.DiscoverVulnerability
more
than
50
versions
of
its
software
.
``
There
have
been
some
questions
as
to
why
creating
Vulnerability-related.PatchVulnerability
fixes
and
releasing
Vulnerability-related.PatchVulnerability
updates
can
take
several
weeks
,
or
sometimes
even
months
,
before
an
advisory
is
published
,
''
Cisco
's
Customer
Assurance
Security
Programs
team
wrote
.
``
In
some
cases
,
there
is
a
large
number
of
supported
software
versions
to
be
updated
.
The
number
of
affected
versions
that
will be updated
Vulnerability-related.PatchVulnerability
can
range
from
single
digits
to
nearly
50
or
more
.
We
are committed to issuing
Vulnerability-related.PatchVulnerability
fixes
for
every
one
of
those
supported
versions
.
''
``
If
we
disclosed
Vulnerability-related.DiscoverVulnerability
the
vulnerability
after
only
fixing
Vulnerability-related.PatchVulnerability
one
release
,
we
would
unnecessarily
expose
all
customers
running
Vulnerability-related.PatchVulnerability
other
releases
to
potential
exploitation
once
details
about
the
attack
itself
became
public
.
''
There
are
also
10
medium-severity
flaws
,
including
one
that
affects
Vulnerability-related.DiscoverVulnerability
some
WebEx
endpoints
due
to
an
already
disclosed
flaw
in
Nvidia
's
Tegra
TX1
chips
.
Cisco
has released
Vulnerability-related.PatchVulnerability
fixes
for
34
flaws
in
its
software
,
including
24
that
affect
Vulnerability-related.DiscoverVulnerability
its
FXOS
software
for
Firepower
firewalls
and
NX-OS
software
for
Nexus
switches
.
Cisco
's
June
updates
include
fixes
for
five
critical
arbitrary
code
execution
vulnerabilities
affecting
Vulnerability-related.DiscoverVulnerability
FXOS
and
NX-OS
and
19
high-rated
flaws
affecting
Vulnerability-related.DiscoverVulnerability
the
software
.
Four
of
the
critical
flaws
affect
Vulnerability-related.DiscoverVulnerability
FXOS
and
NX-OS
Cisco
Fabric
Services
,
while
the
fifth
one
affects
Vulnerability-related.DiscoverVulnerability
the
NX-API
feature
of
NX-OS
.
All
have
a
CVSS
v3
score
of
9.8
out
of
a
maximum
of
10
.
Cisco
Fabric
Services
facilitate
distribution
and
synchronization
of
configuration
data
between
Cisco
devices
on
the
same
network
.
Some
of
the
flaws
allow
an
unauthenticated
,
remote
attack
to
execute
arbitrary
code
and
one
allows
an
attacker
to
do
so
as
root
.
Multiple
switches
are vulnerable
Vulnerability-related.DiscoverVulnerability
if
they
've
been
configured
to
use
Cisco
Fabric
Services
,
including
its
Nexus
2000
series
through
to
Nexus
9000
series
switches
,
as
well
as
Cisco
's
Firepower
4100
Series
Next-Gen
Firewalls
and
other
hardware
.
The
insufficient
input
validation
may
occur
when
FXOS
and
NX-OS
process
Cisco
Fabric
Services
packets
received
during
distribution
and
synchronization
.
There
are
various
ways
to
exploit
each
of
the
flaws
,
depending
on
what
Cisco
Fabric
Services
distribution
types
have
been
configured
.
For
example
,
if
Fibre
Channel
ports
are
configured
as
a
distribution
type
for
a
device
,
the
attack
could
occur
via
Fibre
Channel
over
Ethernet
(
FCoE
)
or
Fibre
Channel
over
IP
(
FCIP
)
.
Cisco
has already rolled out
Vulnerability-related.PatchVulnerability
fixes
in
some
releases
of
FXOS
and
NX-OS
.
Cisco
posted
a
blog
this
week
explaining
why
it
often
fixes
Vulnerability-related.PatchVulnerability
bugs
in
IOS
and
NX-OS
releases
before
disclosing
Vulnerability-related.DiscoverVulnerability
them
in
an
advisory
.
It
's
a
practice
that
appears
to
cause
confusion
for
customers
wondering
why
it
has
n't
told
them
fixed
code
has been available
Vulnerability-related.PatchVulnerability
for
several
months
before
it
discloses
Vulnerability-related.DiscoverVulnerability
them
.
Cisco
's
answer
is
that
some
flaws
affect
Vulnerability-related.DiscoverVulnerability
more
than
50
versions
of
its
software
.
``
There
have
been
some
questions
as
to
why
creating
Vulnerability-related.PatchVulnerability
fixes
and
releasing
Vulnerability-related.PatchVulnerability
updates
can
take
several
weeks
,
or
sometimes
even
months
,
before
an
advisory
is
published
,
''
Cisco
's
Customer
Assurance
Security
Programs
team
wrote
.
``
In
some
cases
,
there
is
a
large
number
of
supported
software
versions
to
be
updated
.
The
number
of
affected
versions
that
will be updated
Vulnerability-related.PatchVulnerability
can
range
from
single
digits
to
nearly
50
or
more
.
We
are committed to issuing
Vulnerability-related.PatchVulnerability
fixes
for
every
one
of
those
supported
versions
.
''
``
If
we
disclosed
Vulnerability-related.DiscoverVulnerability
the
vulnerability
after
only
fixing
Vulnerability-related.PatchVulnerability
one
release
,
we
would
unnecessarily
expose
all
customers
running
Vulnerability-related.PatchVulnerability
other
releases
to
potential
exploitation
once
details
about
the
attack
itself
became
public
.
''
There
are
also
10
medium-severity
flaws
,
including
one
that
affects
Vulnerability-related.DiscoverVulnerability
some
WebEx
endpoints
due
to
an
already
disclosed
flaw
in
Nvidia
's
Tegra
TX1
chips
.
Onapsis
discovered
Vulnerability-related.DiscoverVulnerability
several
high
risk
vulnerabilities
affecting
Vulnerability-related.DiscoverVulnerability
SAP
HANA
platforms
.
If
exploited
Vulnerability-related.DiscoverVulnerability
,
these
vulnerabilities
would
allow
an
attacker
,
whether
inside
or
outside
the
organization
,
to
take
full
control
of
the
SAP
HANA
platform
remotely
,
without
the
need
of
a
username
and
password
.
“
This
level
of
access
would
allow
an
attacker
to
perform any action
Attack.Databreach
over
the
business
information
and
processes
supported
by
HANA
,
including
creating
,
stealing
Attack.Databreach
,
altering
,
and/or
deleting
sensitive
information
.
If
these
vulnerabilities
are exploited
Vulnerability-related.DiscoverVulnerability
,
organizations
may
face
severe
business
consequences
,
”
said
Sebastian
Bortnik
,
Head
of
Research
,
Onapsis
.
The
vulnerabilities
affect
Vulnerability-related.DiscoverVulnerability
a
specific
SAP
HANA
component
named
SAP
HANA
User
Self
Service
,
which
is
not
enabled
by
default
.
The
following
list
details
the
affected
HANA
2
and
HANA
versions
:
“
We
hope
organizations
will
use
this
threat
intelligence
to
assess
their
systems
and
confirm
that
they
are
not
currently
using
this
component
,
and
therefore
are
not
affected
by
these
risks
.
Even
if
the
service
is
not
enabled
,
we
still
recommend
that
these
organizations
apply
Vulnerability-related.PatchVulnerability
the
patches
in
case
a
change
is
made
to
the
system
in
the
future
,
”
continued
Bortnik
.
Onapsis
Research
Labs
originally discovered
Vulnerability-related.DiscoverVulnerability
the
vulnerabilities
on
the
newly
released
SAP
HANA
2
platform
,
but
after
additional
analysis
realized
that
several
older
versions
were vulnerable
Vulnerability-related.DiscoverVulnerability
as
well
.
Based
on
this
assessment
,
it
was identified
Vulnerability-related.DiscoverVulnerability
that
the
vulnerabilities
had been present
Vulnerability-related.DiscoverVulnerability
in
HANA
for
almost
two
and
a
half
years
,
when
the
User
Self
Service
component
was
first
released
.
This
greatly
increases
the
likelihood
that
these
vulnerabilities
have been discovered
Vulnerability-related.DiscoverVulnerability
by
attackers
to
break
into
organization
’
s
SAP
systems
.
Onapsis
worked
closely
with
SAP
’
s
Product
Security
&
Engineering
teams
to
help
them
develop
Vulnerability-related.PatchVulnerability
the
security
patches
.
SAP
is
releasing
the
first
ever
patch
for
SAP
HANA
2
.
In
this
case
,
default
installations
are
affected
and
an
attacker
can
elevate
privileges
if
exploited
Researchers
at
Germany-based
security
firm
Cure53
have
conducted
a
32-day
audit
of
the
Network
Time
Protocol
(
NTP
)
and
the
NTPsec
project
and
discovered
Vulnerability-related.DiscoverVulnerability
more
than
a
dozen
vulnerabilities
.
Experts
identified
Vulnerability-related.DiscoverVulnerability
a
total
of
16
security-related
issues
,
including
8
weaknesses
that
only
affect
Vulnerability-related.DiscoverVulnerability
NTP
and
two
that
only
impact
Vulnerability-related.DiscoverVulnerability
NTPsec
,
which
is
meant
to
be
a
secure
,
hardened
and
improved
implementation
of
NTP
.
Cure53
has
published
separate
reports
focusing
on
the
NTP
and
NTPsec
problems
.
The
Network
Time
Foundation
addressed
Vulnerability-related.PatchVulnerability
the
flaws
earlier
this
month
with
the
release
of
ntp-4.2.8p10
.
Cure53
has classified
Vulnerability-related.DiscoverVulnerability
one
vulnerability
as
being
critical
.
CVE-2017-6460
,
which
only
affects
Vulnerability-related.DiscoverVulnerability
NTP
,
has
been
described
Vulnerability-related.DiscoverVulnerability
as
a
stack-based
buffer
overflow
that
can
be
triggered
by
a
malicious
server
when
a
client
requests
the
restriction
list
.
The
flaw
can
be exploited
Vulnerability-related.DiscoverVulnerability
to
cause
a
crash
and
possibly
to
execute
arbitrary
code
.
The
security
holes
rated
Vulnerability-related.DiscoverVulnerability
by
Cure53
as
high
severity
are
CVE-2017-6463
and
CVE-2017-6464
,
both
of
which
can
be exploited
Vulnerability-related.DiscoverVulnerability
for
DoS
attacks
.
It
’
s
worth
noting
that
while
some
of
the
vulnerabilities
have been classified
Vulnerability-related.DiscoverVulnerability
as
critical
and
high
severity
by
Cure53
,
NTP
developers
have
only
assigned
Vulnerability-related.DiscoverVulnerability
medium
,
low
and
informational-level
severity
ratings
to
the
discovered
flaws
.
Ntp-4.2.8p10
patches
Vulnerability-related.PatchVulnerability
a
total
of
15
vulnerabilities
and
also
includes
just
as
many
non-security
fixes
and
improvements
.
Of
the
15
security
holes
resolved
Vulnerability-related.PatchVulnerability
in
the
latest
version
,
14
were discovered
Vulnerability-related.DiscoverVulnerability
by
Cure53
,
which
also
noticed
Vulnerability-related.DiscoverVulnerability
that
a
flaw
initially
patched
Vulnerability-related.PatchVulnerability
in
December
2014
was reintroduced
Vulnerability-related.DiscoverVulnerability
in
November
2016
.
One
of
the
vulnerabilities
fixed
Vulnerability-related.PatchVulnerability
in
ntp-4.2.8p10
was reported
Vulnerability-related.DiscoverVulnerability
by
researchers
at
Cisco
Talos
.
Experts
identified
Vulnerability-related.DiscoverVulnerability
a
DoS
vulnerability
affecting
Vulnerability-related.DiscoverVulnerability
the
origin
timestamp
check
functionality
If
you
’
re
using
one
of
the
many
QNAP
NAS
devices
and
you
haven
’
t
yet
upgraded
the
QTS
firmware
to
version
4.2.4
,
you
should
do
so
immediately
if
you
don
’
t
want
it
to
fall
prey
to
attackers
.
Among
the
vulnerabilities
fixed
Vulnerability-related.PatchVulnerability
by
QNAP
in
this
latest
firmware
version
,
released
Vulnerability-related.PatchVulnerability
on
March
21
,
are
three
command
injection
flaws
in
the
web
user
interface
that
can
be exploited
Vulnerability-related.DiscoverVulnerability
to
gain
remote
command
execution
on
a
vulnerable
device
as
administrative
user
(
root
)
.
And
among
these
three
,
one
can
be exploited
Vulnerability-related.DiscoverVulnerability
by
an
unauthenticated
attacker
,
via
a
specially
crafted
HTTP
request
.
A
thusly
compromised
NAS
device
can
be
used
for
further
attacks
,
but
what
should
worry
users
even
more
,
is
that
an
attacker
can
read
,
modify
or
remove
content
from
it
at
will
.
The
flaws
were discovered
Vulnerability-related.DiscoverVulnerability
by
Harry
Sintonen
of
F-Secure
,
and
responsibly disclosed
Vulnerability-related.DiscoverVulnerability
to
QNAP
.
But
,
given
that
Sintonen
has
now
released
more
information
about
each
vulnerability
,
it
’
s
not
inconceivable
that
attackers
might
craft
working
exploits
soon
,
and
try
to
use
them
.
The
vulnerabilities
are
confirmed
to
affect
Vulnerability-related.DiscoverVulnerability
QTS
versions
4.2.2
and
4.2.3
.
Users
are
advised
to
install
Vulnerability-related.PatchVulnerability
the
firmware
update
version
4.2.4
build
20170313
,
or
restrict
access
to
the
web
user
interface
(
ports
8080
and
443
)
Vanilla
Forums
open
source
software
suffers
Vulnerability-related.DiscoverVulnerability
from
vulnerabilities
that
could
let
an
attacker
gain
access
to
user
accounts
,
carry
out
web-cache
poisoning
attacks
,
and
in
some
instances
,
execute
arbitrary
code
.
Popular
open
source
forum
software
suffers
Vulnerability-related.DiscoverVulnerability
from
vulnerabilities
that
could
let
an
attacker
gain
access
to
user
accounts
,
carry
out
web-cache
poisoning
attacks
,
and
in
some
instances
,
execute
arbitrary
code
.
Legal
Hackers
‘
Dawid
Golunski
found
Vulnerability-related.DiscoverVulnerability
the
vulnerabilities
,
a
host
header
injection
and
an
unauthorized
remote
code
execution
vulnerability–in
software
which
is
developed
by
Vanilla
Forums
.
Golunski
reported
Vulnerability-related.DiscoverVulnerability
the
issues
to
Vanilla
Forums
in
January
and
while
a
support
team
acknowledged his reports
Vulnerability-related.DiscoverVulnerability
,
he
’
s
experienced
five
months
of
silence
from
the
company
since
,
something
that
prompted
him
to
finally
disclose
Vulnerability-related.DiscoverVulnerability
the
vulnerabilities
Thursday
via
his
ExploitBox.io
service
.
The
researcher
confirmed
Vulnerability-related.DiscoverVulnerability
the
vulnerabilities
exist in
Vulnerability-related.DiscoverVulnerability
the
most
recent
,
stable
version
(
2.3
)
of
Vanilla
Forums
.
He
presumes
Vulnerability-related.DiscoverVulnerability
older
versions
of
the
forum
software
are
also
vulnerable
Vulnerability-related.DiscoverVulnerability
.
When
reached
Thursday
,
Lincoln
Russell
,
a
senior
developer
at
Vanilla
Forums
stressed
the
vulnerabilities
,
which
are
in
the
middle
of
being fixed
Vulnerability-related.PatchVulnerability
,
only
affect
Vulnerability-related.DiscoverVulnerability
the
company
’
s
free
and
open
source
product
.
Golunski
says
Vulnerability-related.DiscoverVulnerability
the
most
concerning
vulnerability
,
the
RCE
(
CVE-2016-10033
)
stems
from
a
PHPMailer
vulnerability
he
disclosed
Vulnerability-related.DiscoverVulnerability
last
December
.
An
attacker
could remotely exploit
Vulnerability-related.DiscoverVulnerability
the
same
vulnerability
in
Vanilla
Forums
by
sending
a
web
request
in
which
a
payload
is
passed
within
the
HOST
header
.
Until
a
fix
is pushed
Vulnerability-related.PatchVulnerability
Golunski
is
encouraging
users
to
preset
the
sender
’
s
support
email
address
to
a
static
value
to
prevent
the
dynamic
creation
of
an
email
address
,
or
the
use
of
the
HOST
header
,
as
a
temporary
mitigation
.
Golunski
says
Vulnerability-related.DiscoverVulnerability
the
second
issue
,
the
host
header
injection
vulnerability
(
CVE-2016-10073
)
also
affects
Vulnerability-related.DiscoverVulnerability
version
2.3
of
the
software
.
The
issue
stems
from
the
fact
that
the
forum
software
uses
user-supplied
HTTP
HOST
header
when
sending
emails
from
the
host
on
which
the
forum
was
installed
.
That
means
an
attacker
could
use
HTTP
HOST
header
to
set
the
email
domain
to
an
arbitrary
host
.
It
would
require
user
interaction
but
if
exploited
Vulnerability-related.DiscoverVulnerability
,
it
’
s
possible
the
bug
could
help
an
attacker
intercept
Attack.Databreach
a
password
reset
hash
and
gain access
Attack.Databreach
to
a
victim
’
s
account
.
An
attacker
would
have send
Attack.Phishing
the
victim
an
email
tricking
Attack.Phishing
them
into
clicking
through
a
password
reset
link
,
he
says
.
“
The
resulting
email
will
have
the
sender
’
s
address
set
to
noreply
@
attackers_server
.
The
password
reset
link
will
also
contain
the
attacker
’
s
server
which
could
allow
the
attacker
to
intercept
the
hash
if
the
victim
user
clicked
on
the
malicious
link
,
”
Golunski
wrote
Thursday
.
It
’
s
possible
the
vulnerability
could
also
lead
to
web-cache
poisoning
if
the
HOST
header
is
used
to
form
links
in
web
responses
Golunski
says
Vulnerability-related.DiscoverVulnerability
.
According
to
Russell
,
when
Vanilla
Forums
responded
to
Golunski
in
January
it
told
him
the
issue
would
take
some
time
to
fix
Vulnerability-related.PatchVulnerability
due
to
the
“
complexity
of
unwinding
the
use
of
this
server
variable
without
breaking
the
myriad
scenarios
it
can
be
used
for
in
open
source
environments.
”
Golunski
hinted
Vulnerability-related.DiscoverVulnerability
at
the
vulnerabilities
in
Vanilla
Forums
back
in
December
but
didn
’
t
name
the
software
.
When
he
disclosed
Vulnerability-related.DiscoverVulnerability
the
initial
PHPMailer
bug
the
researcher
mentioned
that
he
had
developed
an
unauthenticated
RCE
exploit
for
“
a
popular
open-source
application
(
deployed
on
the
Internet
on
more
than
a
million
servers
)
as
a
PoC
for
real-world
exploitation.
”
Both
the
Vanilla
Forums
vulnerabilities
and
a
similar
RCE
vulnerability
in
WordPress
4.6
Golunski
disclosed
Vulnerability-related.DiscoverVulnerability
last
week
both
relate
to
PHPMailer
and
PHP
mail
(
)
function
injection
.
“
The
exploits
and
techniques
prove
that
these
type
of
vulnerabilities
could
be exploited
Vulnerability-related.DiscoverVulnerability
by
unauthenticated
attackers
via
server
headers
such
as
HOST
header
that
may
be
used
internally
by
a
vulnerable
application
to
dynamically
create
a
sender
address
,
”
Golunski
told
Threatpost
Thursday
,
“
This
adds
to
the
originally
presented
attack
surface
of
contact
forms
that
take
user
input
including
From/Sender
address
.
”
SEATTLE
—
When
malicious
software
first
became
a
serious
problem
on
the
internet
about
15
years
ago
,
most
people
agreed
that
the
biggest
villain
,
after
the
authors
of
the
damaging
code
,
was
Microsoft
.
As
a
new
cyberattack
continues
to
sweep
across
the
globe
,
the
company
is
once
again
at
the
center
of
the
debate
over
who
is
to
blame
for
a
vicious
strain
of
malware
demanding ransom
Attack.Ransom
from
victims
in
exchange
for
the
unlocking
of
their
digital
files
.
This
time
,
though
,
Microsoft
believes
others
should
share
responsibility
for
the
attack
,
an
assault
that
targeted
flaws
in
the
Windows
operating
system
.
On
Sunday
,
Brad
Smith
,
Microsoft
’
s
president
and
chief
legal
officer
,
wrote
a
blog
post
describing
the
company
’
s
efforts
to
stop
the
ransomware
’
s
spread
,
including
an
unusual
step
it
took
to
release
Vulnerability-related.PatchVulnerability
a
security
update
for
versions
of
Windows
that
Microsoft
no
longer
supports
.
Mr.
Smith
wrote
,
“
As
a
technology
company
,
we
at
Microsoft
have
the
first
responsibility
to
address
Vulnerability-related.PatchVulnerability
these
issues.
”
He
went
on
,
though
,
to
emphasize
that
the
attack
had
demonstrated
the
“
degree
to
which
cybersecurity
has
become
a
shared
responsibility
between
tech
companies
and
customers
,
”
the
latter
of
whom
must
update
their
systems
if
they
want
to
be
protected
.
He
also
pointed
his
finger
at
intelligence
services
,
since
the
latest
vulnerability
appeared
to
have
been
leaked
from
the
National
Security
Agency
.
On
Monday
,
a
Microsoft
spokesman
declined
to
comment
beyond
Mr.
Smith
’
s
post
.
Microsoft
has
recognized
the
risk
that
cybersecurity
poses
to
it
since
about
2002
,
when
Bill
Gates
,
the
former
chief
executive
,
issued
a
call
to
arms
inside
the
company
after
a
wave
of
malicious
software
began
infecting
Windows
PCs
connected
to
the
internet
.
“
As
software
has
become
ever
more
complex
,
interdependent
and
interconnected
,
our
reputation
as
a
company
has
in
turn
become
more
vulnerable
,
”
Mr.
Gates
wrote
in
an
email
to
employees
identifying
trustworthy
computing
as
Microsoft
’
s
top
priority
.
“
Flaws
in
a
single
Microsoft
product
,
service
or
policy
not
only
affect
Vulnerability-related.DiscoverVulnerability
the
quality
of
our
platform
and
services
overall
,
but
also
our
customers
’
view
of
us
as
a
company.
”
Since
then
,
the
company
has
poured
billions
of
dollars
into
security
initiatives
,
employing
more
than
3,500
engineers
dedicated
to
security
.
In
March
,
it
released
Vulnerability-related.PatchVulnerability
a
software
patch
that
addressed
Vulnerability-related.PatchVulnerability
the
vulnerability
exploited
by
the
ransomware
,
known
as
WannaCry
,
protecting
systems
such
as
Windows
10
,
its
latest
operating
system
.
Yet
security
flaws
in
older
editions
of
Windows
persist
.
The
company
no
longer
provides
Vulnerability-related.PatchVulnerability
regular
software
updates
to
Windows
XP
,
a
version
first
released
in
2001
,
unless
customers
pay
for
“
custom
support
,
”
a
practice
some
observers
believe
has
put
users
at
risk
.
Late
Friday
,
Microsoft
took
the
unusual
step
of
making
patches
Vulnerability-related.PatchVulnerability
that
protect
older
systems
against
WannaCry
,
including
Windows
XP
,
free
.
“
Companies
like
Microsoft
should
discard
the
idea
that
they
can
abandon
people
using
older
software
,
”
Zeynep
Tufekci
,
an
associate
professor
at
the
school
of
information
and
library
science
at
the
University
of
North
Carolina
,
wrote
in
a
New
York
Times
opinion
piece
over
the
weekend
.
“
The
money
they
made
from
these
customers
hasn
’
t
expired
;
neither
has
their
responsibility
to
fix
defects.
”
But
security
experts
challenged
that
argument
,
saying
that
Microsoft
could
not
be
expected
to
keep
updating
old
software
products
indefinitely
.
Providing
Vulnerability-related.PatchVulnerability
updates
to
older
systems
could
make
computers
more
insecure
by
removing
an
incentive
for
users
to
modernize
,
Mikko
Hypponen
,
the
chief
research
officer
of
F-Secure
,
a
security
firm
.
“
I
can
understand
why
they
issued
Vulnerability-related.PatchVulnerability
an
emergency
patch
for
XP
after
WannaCry
was
found
,
but
in
general
,
we
should
just
let
XP
die
,
”
Mr.
Hypponen
said
.
Researchers
say
Vulnerability-related.DiscoverVulnerability
several
Motorola
handset
models
are vulnerable
Vulnerability-related.DiscoverVulnerability
to
a
critical
kernel
command
line
injection
flaw
that
could
allow
a
local
malicious
application
to
execute
arbitrary
code
on
the
devices
.
The
two
affected
Motorola
models
are
the
Moto
G4
and
Moto
G5
.
The
warnings
Vulnerability-related.DiscoverVulnerability
come
from
Aleph
Research
which
said
Vulnerability-related.DiscoverVulnerability
it
found
Vulnerability-related.DiscoverVulnerability
the
vulnerability
on
up-to-date
handsets
running
the
latest
Motorola
Android
bootloader
.
Motorola
said
patches
to
fix
Vulnerability-related.PatchVulnerability
the
vulnerability
in
both
devices
are
expected
this
month
.
“
Exploiting
the
vulnerability
allows
the
adversary
to
gain
an
unrestricted
root
shell
.
(
And
more
!
)
,
”
wrote
Roee
Hay
,
manager
of
Aleph
Research
.
He
said
Vulnerability-related.DiscoverVulnerability
vulnerable
versions
of
the
Motorola
Android
bootloader
allow
for
a
kernel
command-line
injection
attack
.
The
vulnerability
(
CVE-2016-10277
)
is
the
same
one
found
Vulnerability-related.DiscoverVulnerability
by
Aleph
Research
earlier
this
year
and
fixed
Vulnerability-related.PatchVulnerability
by
Google
in
May
,
impacting
Vulnerability-related.DiscoverVulnerability
the
Nexus
6
Motorola
bootloader
.
“
By
exploiting
the
vulnerability
,
a
physical
adversary
or
one
with
authorized
USB
fastboot
access
to
the
device
could
break
the
secure/verified
boot
mechanism
,
allowing
him
to
gain
unrestricted
root
privileges
,
and
completely
own
the
user
space
by
loading
a
tampered
or
malicious
image
,
”
wrote
Hay
.
Despite
the
fact
the
vulnerability
had been patched
Vulnerability-related.PatchVulnerability
for
the
Nexus
6
,
Hay
said
the
Moto
G4
and
G5
were still vulnerable
Vulnerability-related.DiscoverVulnerability
to
the
same
kernel
command
line
injection
flaw
.
“
In
the
previous
blog
post
,
we
suggested
that
CVE-2016-10277
could
affect
Vulnerability-related.DiscoverVulnerability
other
Motorola
devices
.
After
receiving
a
few
reports
on
Twitter
that
this
was
indeed
the
case
we
acquired
a
couple
of
Motorola
devices
,
updated
to
the
latest
available
build
we
received
over-the-air
,
”
the
researcher
wrote
on
Wednesday
.
Motorola
told
Threatpost
via
a
statement
that
,
“
A
patch
will
begin
rolling out
Vulnerability-related.PatchVulnerability
for
Moto
G5
within
the
next
week
and
will
continue
until
all
variants
are updated
Vulnerability-related.PatchVulnerability
.
The
patch
for
Moto
G4
is
planned
to
start deployment
Vulnerability-related.PatchVulnerability
at
the
end
of
the
month
and
will
continue
until
all
variants
are updated
Vulnerability-related.PatchVulnerability
.
”
Researchers
were
able
to
trigger
the
vulnerability
on
the
Moto
devices
by
abusing
the
Motorola
bootloader
download
functionality
in
order
to
swap
in
their
own
malicious
initramfs
(
initial
RAM
file
system
)
at
a
known
physical
address
,
named
SCRATCH_ADDR
.
“
We
can
inject
a
parameter
,
named
initrd
,
which
allows
us
to
force
the
Linux
kernel
to
populate
initramfs
into
rootfs
from
a
specified
physical
address
,
”
the
researcher
wrote
.
Next
,
using
malicious
initramfs
to
load
into
a
customized
boot
process
they
were
able
to
gain
root
shell
access
to
the
device
.
Hay
’
s
research
into
the
Motorola
bootloaders
began
in
January
when
he
identified
Vulnerability-related.DiscoverVulnerability
a
high-severity
vulnerability
(
CVE-2016-8467
)
impacting
Vulnerability-related.DiscoverVulnerability
Nexus
6/6P
handsets
.
That
separate
vulnerability
allowed
attackers
to
change
the
bootmode
of
the
device
,
giving
access
to
hidden
USB
interfaces
.
Google
fixed
Vulnerability-related.PatchVulnerability
the
issue
by
hardening
the
bootloader
and
restricting
it
from
loading
custom
bootmodes
.
“
Just
before
Google
released
Vulnerability-related.PatchVulnerability
the
patch
,
we
had discovered
Vulnerability-related.DiscoverVulnerability
a
way
to
bypass
it
on
Nexus
6
,
”
Hay
said
in
May
of
the
second
CVE-2016-10277
vulnerability
.
In
an
interview
with
Hay
by
Threatpost
he
said
Vulnerability-related.DiscoverVulnerability
,
“
Yes
,
they
are
both
bootloader
vulnerabilities
.
The
CVE-2016-10277
can
be
considered
a
generalization
of
CVE-2016-8467
,
but
with
a
much
stronger
impact
,
”
he
said
Vulnerability-related.DiscoverVulnerability
.
Hundreds
of
thousands–potentially
more
than
one
million–Netgear
routers
are susceptible
Vulnerability-related.DiscoverVulnerability
to
a
pair
of
vulnerabilities
that
can
lead
to
password
disclosure
.
Researchers
said
Vulnerability-related.DiscoverVulnerability
that
while
anyone
who
has
physical
access
to
a
router
can exploit
Vulnerability-related.DiscoverVulnerability
the
vulnerabilities
locally
,
the
real
threat
is
that
the
flaw
can
also
be exploited
Vulnerability-related.DiscoverVulnerability
remotely
.
According
to
Simon
Kenin
,
a
security
researcher
with
Trustwave
’
s
Spiderlabs
team
,
who
discovered
Vulnerability-related.DiscoverVulnerability
the
flaw
and
disclosed
Vulnerability-related.DiscoverVulnerability
it
Monday
,
the
vulnerabilities
can
be
remotely
exploited
Vulnerability-related.DiscoverVulnerability
if
the
router
’
s
remote
management
option
is
enabled
.
While
Netgear
claims
remote
management
is
turned
off
on
routers
by
default
,
Kenin
said
there
are
“
hundreds
of
thousands
,
if
not
over
a
million
”
devices
left
remotely
accessible
.
Kenin
claims
that
all
he
had
to
do
was
send
a
simple
request
to
the
router
’
s
web
management
server
to
retrieve
a
router
’
s
password
.
After
determining
a
number
that
corresponds
to
a
password
recovery
token
,
he
found
he
could
pair
it
with
a
call
to
the
router
’
s
passwordrecovered.cgi
script
.
Kenin
claims
Vulnerability-related.DiscoverVulnerability
he
made
his
discovery
by
leveraging
two
exploits
disclosed
Vulnerability-related.DiscoverVulnerability
in
2014
on
some
Netgear
routers
he
had
hanging
around
.
It
wasn
’
t
until
after
Kenin
pieced
together
a
python
script
designed
to
diagnose
the
scope
of
the
issue
that
he
determined
he
could
still
retrieve
the
router
’
s
credentials
even
if
he
didn
’
t
send
the
correct
password
recovery
token
.
“
After
few
trials
and
errors
trying
to
reproduce
the
issue
,
I
found
Vulnerability-related.DiscoverVulnerability
that
the
very
first
call
to
passwordrecovered.cgi
will
give
out
the
credentials
no
matter
what
the
parameter
you
send
.
This
is
totally
new
bug
that
I
haven’t seen
Vulnerability-related.DiscoverVulnerability
anywhere
else
.
When
I
tested
both
bugs
on
different
NETGEAR
models
,
I
found
Vulnerability-related.DiscoverVulnerability
that
my
second
bug
works
on
a
much
wider
range
of
models
,
”
Kenin
wrote
Monday
.
Kenin
’
s
employer
,
Trustwave
,
divulged
Vulnerability-related.DiscoverVulnerability
details
around
both
vulnerabilities
in
a
lengthy
blog
post
Monday
,
putting
the
wraps
on
a
nearly
year-long
odyssey
with
the
vendor
.
The
firm
first disclosed
Vulnerability-related.DiscoverVulnerability
the
vulnerability
to
Netgear
in
April
2016
,
initially
it
listing
18
vulnerable
models
,
before
listing
25
vulnerable
models
in
a
subsequent
advisory
.
After
repeated
requests
for
an
update
on
a
fix
for
the
vulnerability
,
Netgear
finally
obliged
in
July
and
provided
Vulnerability-related.PatchVulnerability
firmware
updates
for
a
fraction
of
the
affected
routers
.
It
wasn
’
t
until
this
weekend
that
Netgear
acknowledged
Vulnerability-related.DiscoverVulnerability
the
issues
again
,
posting
Vulnerability-related.PatchVulnerability
an
updated
version
of
the
article
on
its
support
page
,
instructing
users
to
find
and
download
the
appropriate
firmware
fixes
.
The
most
recent
version
of
the
advisory
claims
there
are
31
vulnerable
models
,
18
of
which
are patched
Vulnerability-related.PatchVulnerability
.
The
company
is
encouraging
users
of
some
devices
in
which
firmware
is
not
available
to
implement
a
workaround
.
According
to
Netgear
,
users
of
12
different
models
would
be
best
served
to
manually
enable
password
recovery
and
disable
remote
management
on
their
devices
.
“
The
potential
for
password
exposure
remains
if
you
do
not
complete
both
steps
.
NETGEAR
is
not
responsible
for
any
consequences
that
could
have
been
avoided
by
following
the
recommendations
in
this
notification
,
”
the
company
writes
.
It
’
s
the
first
critical
vulnerability
to
affect
Vulnerability-related.DiscoverVulnerability
Netgear
routers
this
year
but
the
second
in
the
last
two
months
.
In
December
,
it
was discovered
Vulnerability-related.DiscoverVulnerability
that
a
handful
of
the
company
’
s
Nighthawk
line
of
routers
were vulnerable
Vulnerability-related.DiscoverVulnerability
to
a
flaw
that
could
have
given
an
attacker
root
access
on
the
device
and
allowed
them
to
run
remote
code
.
The
company
was
quick
to
release
Vulnerability-related.PatchVulnerability
beta
firmware
updates
to
address
Vulnerability-related.PatchVulnerability
the
vulnerability
but
simultaneously
confirmed
Vulnerability-related.DiscoverVulnerability
that
more
routers
than
originally
reported
were vulnerable
Vulnerability-related.DiscoverVulnerability
.
When
reached
Wednesday
,
a
Netgear
spokesperson
said
it
was
aware
of
the
vulnerability
and
that
it
was
appreciative
of
the
research
Trustwave
carried
out
.
Trustwave
discloses
Vulnerability-related.DiscoverVulnerability
an
unpatched
vulnerability
in
Brother
printers
with
the
Debut
embedded
webserver
after
numerous
attempts
to
contact
the
vendor
failed
.