Posts
2457
Following
555
Followers
1263
A drunken debugger

Heretek of Silent Signal
repeated

Clownstrike @ 358...
Cyber incidents appear to have no long term impact ;-)

0
1
0
repeated

We have observed D-Link NAS CVE-2024-10914 /cgi-bin/account_mgr.cgi command injection exploitation attempts starting Nov 12th. This vuln affects EOL/EOS devices, which should be removed from the Internet: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10413

We see ~1100 exposed.

https://dashboard.shadowserver.org/statistics/iot-devices/tree/?day=2024-11-12&vendor=d-link&type=nas&geo=all&data_set=count&scale=log

We share IP data on exposed D-Link NAS instances for your network/constituency in our Device ID reports (vendor D-Link, type: nas): https://shadowserver.org/what-we-do/network-reporting/device-identification-report/

D-Link NAS exposure tracker https://dashboard.shadowserver.org/statistics/iot-devices/time-series/?date_range=7&vendor=d-link&type=nas&model=sharecenter&dataset=count&limit=1000&group_by=geo&style=stacked

NVD entry: https://nvd.nist.gov/vuln/detail/CVE-2024-10914

0
3
0
repeated

Happy on a Wednesday from Palo Alto Networks:

  1. PAN-SA-2024-0016 Chromium: Monthly Vulnerability Updates
  2. CVE-2024-5920 (CVSSv4: 4.6 medium) PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in PAN-OS Enables Impersonation of a Legitimate Administrator
  3. CVE-2024-2550 (CVSSv4: 8.7 high) PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway Using a Specially Crafted Packet
  4. CVE-2024-2551 (CVSSv4: 8.7 high) PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway Using a Specially Crafted Packet
  5. CVE-2024-2552 (CVSSv4: 6.8 medium) PAN-OS: Arbitrary File Delete Vulnerability in the Command Line Interface (CLI)
  6. CVE-2024-5917 (CVSSv4: 6.3 medium) PAN-OS: Server-Side Request Forgery in WildFire
  7. CVE-2024-5918 (CVSSv4: 5.3 medium) PAN-OS: Improper Certificate Validation Enables Impersonation of a Legitimate GlobalProtect User
  8. CVE-2024-5919 (CVSSv4: 5.1 medium) PAN-OS: Authenticated XML External Entities (XXE) Injection Vulnerability
  9. CVE-2024-9472 (CVSSv4: 8.7 high) PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Traffic

"Palo Alto Networks is not aware of any malicious exploitation of this issue." RE:CVE-2024-9472: "However, customers have reported encountering this issue during normal operations."

0
2
0
#Xen Security Advisory 464 v2 (CVE-2024-45819) - libxl leaks data to PVH guests via ACPI tables

https://seclists.org/oss-sec/2024/q4/80
0
1
1
repeated

Another big step towards becoming a security boundary: today weโ€™re expanding the VRP for the V8 Sandbox

* No longer limited to d8

* Rewards for controlled writes are increased to $20k

* Any memory corruption outside the sandbox is now in scope

See https://bughunters.google.com/about/rules/chrome-friends/5745167867576320/chrome-vulnerability-reward-program-rules#v8-sandbox-bypass-rewards for more details.

Happy hacking!

0
2
0
repeated

Thrilled to share my BlueHat keynote is now live! ๐ŸŽค

"A Clash of Cultures Comes Together to Change Software" dives into how early hacker groups like the L0pht began collaborating with tech companies, reshaping software security.

Watch here: https://www.youtube.com/watch?v=w6SAqT4ZQik

1
4
0
repeated

bsky.app/profile/b1ack0wl.bsky.social/post/3latq4vftsk2a

Heads up: that viral "backdoor attempt" against multiple GitHub repos is a smear campaign. The lame code that was submitted is also a part of it since it's there to paint a picture of someone with very little offensive skills. Don't fall for the bait

0
1
0
repeated

GitLab security advisory: GitLab Patch Release: 17.5.2, 17.4.4, 17.3.7

  1. CVE-2024-9693 (8.5 high) Unauthorized access to Kubernetes cluster agent
  2. CVE-2024-7404 (6.8 medium) Device OAuth flow allows for cross window forgery
  3. requested CVE ID not yet available (6.5 medium) Denial of Service by importing malicious crafted FogBugz import payload
  4. CVE-2024-8648 (6.1 medium) Stored XSS through javascript URL in Analytics dashboards
  5. CVE-2024-8180 (5.4 medium) HTML injection in vulnerability Code flow could lead to XSS on self hosted instances
  6. CVE-2024-10240 (5.3 medium) Information disclosure through an API endpoint

No mention of exploitation.

0
1
0
repeated
Edited 10 days ago

A lot of people think Apple Silicon Macs can boot from external storage, and Apple themselves go to great lengths to pretend they can.

However, the iBoot bootloader does not have USB or Thunderbolt drivers at all, and absolutely cannot boot from external storage in any way, shape, or form.

But they're cheating.

When you "select" an external volume to "boot" from, whether from macOS or recoveryOS or the Boot Picker (which is just recoveryOS, which is just macOS), the fully booted OS with full access to external storage will copy the bootloader, firmware, and OS kernel to internal storage, then configure the machine to boot off of THAT. Then the bootloader is still just booting off of internal storage.

You can see this if you set up "external" boot, then try to power on the machine without the disk connected. The progress bar will appear below the Apple logo, and that progress bar is drawn by the macOS kernel, which proves macOS is already running, even though supposedly you removed the disk it's booting from. It only times out and fails a few seconds later when it can't find the external disk to mount the root filesystem from.

BTW, the only blocker for supporting the same exact mechanism for USB boot in Asahi Linux is that m1n1 does not have USB drivers either, which it needs to chain off stage 2 from USB. So if anyone wants to help out and write a bare-metal xHCI USB stack with enough support for hubs and mass storage devices in Rust... ;-)

4
4
0
repeated

Looks like has stopped enriching again. So that's neat

2
6
0
repeated

Don't miss a second of with the Ekoparty LadoB on Twitch https://www.twitch.tv/ekoparty

1
1
0
repeated

โ€œIf more of us valued food & cheer & song above hoarded gold, it would be a merrier world.โ€

J.R.R. Tolkien

0
6
0
repeated

I am going to talk at German OWASP Day in Leipzig today and I just learned it will be live streamed.

Tune in if you want to learn about cross-site leaks at 5pm CET (9am US Pacific). There's lots of other interesting stuff before me. The event has already started ๐Ÿ˜Š https://streaming.media.ccc.de/god2024

0
2
0
repeated

Lovely thread on X from some Indian hackers using a microwave as a Faraday cage & spoofing Californian Wi-Fi networks in order to unlock AirPod hearing-aid functionality for Grandmaโ€ฆ
https://alecmuffett.com/article/110630

0
3
0
repeated

๐Ÿค– cheap Android set-top boxes might come with unexpected surprises. 0/10, would not recommend to buy https://cujo.com/blog/android-set-top-box-lies-about-its-os-version-comes-pre-infected-with-malware/

1
5
0
[RSS] [Microsoft] Toward greater transparency: Publishing machine-readable CSAF files

https://msrc.microsoft.com/blog/2024/11/toward-greater-transparency-publishing-machine-readable-csaf-files/
0
0
0
repeated

Down since the archive had to retool, emulation in the browser at @internetarchive is BACK.

A quarter million programs and growing can run free again.

But all anyone cares about is our #1 title:

https://archive.org/details/msdos_Oregon_Trail_The_1990

0
10
0
repeated

NIST standardisation organisation says that systems must phase out non-quantum-resistant cryptography by 2035. RSA, ECDSA, ECDH disallowed as insecure. https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf

1
3
0
repeated
repeated

"Ross Anderson had agreed with his publisher, Wiley, that he would be able to make all chapters of the 3rd edition of his book Security Engineering available freely for download from his website. These PDFs are now available there." ๐ŸŽ‰ ๐Ÿ’”

https://www.cl.cam.ac.uk/archive/rja14/book.html

(As noted at: https://www.lightbluetouchpaper.org/2024/11/12/sev3-download/ )

1
10
0
Show older