thesis: numbers stations are a form of microblogging
New post: Vulnerability Disclosure: Command Injection in Kemp LoadMaster Load Balancer (CVE-2024-7591) https://insinuator.net/2024/11/vulnerability-disclosure-command-injection-in-kemp-loadmaster-load-balancer-cve-2024-7591/
What, it's already this time of the year again?! Yes, 'tis the season of reviewing and selecting our top picks from around 3.000 #demoscene productions - and we would love to have you on the team as a juror! Sign up now:
https://2025.meteoriks.org/taking_part/juror/
CFP window ends this friday! We have ~50 submissions so far -- competitive but not so busy that a high quality talk can't rise to the top, make sure to get your submission in soon.
Microsoft: "we had one #PatchTuesday yes, but what about second Patch Tuesday?"
Only CVE-2024-49053 has any substantial information in their FAQ section. CVE-2024-49035 is "not exploited" but "exploitation detected" 🤔 (analyst comment: likely a gaffe). The rest are Not Exploited, Not Publicly Disclosed, and Exploitation Less Likely.
#microsoft #vulnerability #CVE #infosec #cybersecurity #copilot #dynamics365 #azure
Splunk security advisories since apparently they missed #PatchTuesday and everyone wants to push to prod before Thanksgiving:
No mention of exploitation.
GitLab security advisory: GitLab Patch Release: 17.6.1, 17.5.3, 17.4.5
No mention of exploitation.
XBOW found a path traversal vulnerability (CVE-2024-53844) in LabsAI's EDDI project that allows attackers to download any file on the server. XBOW combined a series of URL encodings and path normalization bypasses to trigger the flaw. Users of versions 4.3–5.3 should upgrade.
VMware security advisory: VMSA-2024-0022: VMware Aria Operations updates address multiple vulnerabilities(CVE-2024-38830, CVE-2024-38831, CVE-2024-38832, CVE-2024-38833, CVE-2024-38834)
No mention of exploitation
#CVE_2024_38830 #vmware #vulnerability #CVE #infosec #cybersecurity #CVE_2024_38831 #CVE_2024_38832 #CVE_2024_38833 #CVE_2024_38834 #aria #AriaOperations
Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels
An outstanding paper by Lukas Maar et al. about analyzing the exploitation techniques used in public 1-day Android kernel exploits over the last few years and cross-referencing them with the mitigations implemented by various Android vendors 🔥
https://www.usenix.org/system/files/usenixsecurity24-maar-defects.pdf
🎮 The @travisgoodspeed training on recovering Gameboy ROMs from microscopic pictures with the help of #radare2 is now indexed, with the rest of #r2con2024 presentations in the Radare TV website 👉 https://www.radare.org/tv/
I don't know if this is known but last week I found out that giving a user the #Windows OOBE experience can be abused for privilege escalation.
Scenario: A company gives a new employee his computer and lets him do the first login. During the #Windows OOBE, he presses SHIFT+F10 and opens CMD.
Since this CMD runs as SYSTEM, he installs a custom CA certificate via certutil, places 'WptsExtensions.dll' into System32, and creates a new local backdoor admin user.
Once the #Microsoft OOBE and/or #Intune setup is complete, only the local backdoor admin user will be deleted. The certificate and DLL still remain. A reboot is enough to trigger the DLL being loaded as SYSTEM.
The third-party cert could be detected using sigcheck, but that's a little hacky...
Does anyone know a fix for this? I've not found anything inside #Intune that would kill this vector.