Forum

Message Boards Message Boards

Announcements

Security vulnerability notification

Security vulnerability notification
Answer
28 January 2022 10:16
Dear CREODIAS users

In the Security section customers will find information about latest and most critical security vulnerabilities, published in the last month by the SANS Institute (www.sans.org). Security vulnerabilities in software and hardware are very often used by cybercriminals to attack IT infrastructure and steal or destroy company's data, that is why companies are advice to fix those vulnerabilities as soon as possible.


ID: CVE-2021-0956Title: Privilege escalation vulnerability in Google AndroidDescription: There is a potential out of bounds write in NfcTag::discoverTechnologies (activation) in NfcTag.cpp due to an erroneous bounds check. This could lead to remote privilege escalation without the need for additional System execution privileges. Exploitation does not necessitate user participation.

ID: CVE-2021-41560Title: Arbitrary code execution vulnerability in OpenCATS 0.9.6Description: By uploading an executable file via lib/FileUtility.php in OpenCATS 0.9.6, remote attackers can execute arbitrary code.

ID: CVE-2021-42311 & CVE-2021-42313Title: IoT Remote code execution vulnerability in Microsoft DefenderDescription: This vulnerability allows remote attackers to bypass authentication on Microsoft Azure Defender for IoT installations that are vulnerable. This vulnerability can be exploited without requiring authentication.

ID: CVE-2021-43907Title: Remote code execution vulnerability in Microsoft Visual StudioDescription: A remote attacker might use the Microsoft Visual Studio Code WSL Extension to execute arbitrary code on the system. An attacker might use this vulnerability to execute arbitrary code on the system by delivering a specially crafted request.

ID: CVE-2021-44515Title: Authentication bypass vulnerability in Zoho ManageEngine Desktop Central and Desktop Central MSPDescription: Zoho ManageEngine Desktop Central is vulnerable to authentication bypass, leading to remote code execution on the server, as exploited in the wild in December 2021. An authentication bypass vulnerability has been discovered in ManageEngine Desktop Central MSP, which might allow an attacker to bypass authentication and execute arbitrary code on the Desktop Central MSP server.

ID: CVE-2021-43779 Title: Remote Code Execution vulnerability in GLPI with addressing pluginDescription: GLPI is a free open-source IT asset management, issue tracking, and service desk software. The GLPI addressing plugin in version 2.9.1 has an authorized Remote Code Execution vulnerability, which allows command injection misuse of functionality to get access to the server's underlying operating system. There is no way to fix this problem, thus users should either upgrade or disable the addressing plugin.

ID: CVE-2021-31589 Title: Cross site scripting vulnerability in BeyondTrust Remote SupportĀ Description: BeyondTrust Secure Remote Access Base Software through 6.0.1 allows an attacker to achieve full admin access to the appliance, by tricking the administrator into creating a new admin account through an XSS/CSRF attack involving a crafted request to the /appliance/users?action=edit endpoint. This cross-site-scripting (XSS) vulnerability occurs when it does not properly sanitize an unauthenticated crafted web request to the server.

Best Regards,

CREODIAS team
0 (0 Votes)