Wow Intel SGX and Sub-Page Protection exploded at the same time yesterday. The latter is so broken Intel removes it from all future processors. 👀
Remove /dev/null from a host and a surprising number of programs crash and burn. Experienced sysadmins understand that most software requires an uninterruptible supply of nothing.
Full Rapid7 analysis and #exploit PoC (with root shell!) for #FortiManager #CVE202447575 via @stephenfewer 🐚 Not a simple project, as it turned out :) https://attackerkb.com/topics/OFBGprmpIE/cve-2024-47575/rapid7-analysis
The Pentium processor had a minor error in the division algorithm. This error cost Intel $475 million to replace the faulty chips. I've tracked down the FDIV error to this circuit on the die:
Me to Matomo:
Your installation instructions guarantee that Windows will be vulnerable to LPE. You should probably fix that.
Matomo:
"Unfortunately we do not consider this as a security issue, because it's actually fully unrelated to Matomo itself."
Great job, folks!
Clownstrike @ 358...
Cyber incidents appear to have no long term impact ;-)
We have observed D-Link NAS CVE-2024-10914 /cgi-bin/account_mgr.cgi command injection exploitation attempts starting Nov 12th. This vuln affects EOL/EOS devices, which should be removed from the Internet: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10413
We see ~1100 exposed.
We share IP data on exposed D-Link NAS instances for your network/constituency in our Device ID reports (vendor D-Link, type: nas): https://shadowserver.org/what-we-do/network-reporting/device-identification-report/
D-Link NAS exposure tracker https://dashboard.shadowserver.org/statistics/iot-devices/time-series/?date_range=7&vendor=d-link&type=nas&model=sharecenter&dataset=count&limit=1000&group_by=geo&style=stacked
Happy #PatchTuesday on a Wednesday from Palo Alto Networks:
"Palo Alto Networks is not aware of any malicious exploitation of this issue." RE:CVE-2024-9472: "However, customers have reported encountering this issue during normal operations."
Another big step towards becoming a security boundary: today we’re expanding the VRP for the V8 Sandbox
* No longer limited to d8
* Rewards for controlled writes are increased to $20k
* Any memory corruption outside the sandbox is now in scope
See https://bughunters.google.com/about/rules/chrome-friends/5745167867576320/chrome-vulnerability-reward-program-rules#v8-sandbox-bypass-rewards for more details.
Happy hacking!
Thrilled to share my BlueHat keynote is now live! 🎤
"A Clash of Cultures Comes Together to Change Software" dives into how early hacker groups like the L0pht began collaborating with tech companies, reshaping software security.
Watch here: https://www.youtube.com/watch?v=w6SAqT4ZQik
bsky.app/profile/b1ack0wl.bsky.social/post/3latq4vftsk2a
Heads up: that viral "backdoor attempt" against multiple GitHub repos is a smear campaign. The lame code that was submitted is also a part of it since it's there to paint a picture of someone with very little offensive skills. Don't fall for the bait
Additional Fortinet security advisories:
No mention of exploitation.
#Fortinet #PatchTuesday #CVE #vulnerability #infosec #cybersecurity