Thursday, 20 April 2017

Cisco Unified Communications Manager SQL Injection Vulnerability

Threat Type: Vulnerability Threat Severity: Medium

Affected Platforms

Known affected releases:
1.0(1.10000.10)
11.5(1.10000.6)

Description

Security researchers have found that Cisco Unified Communications Manager (Cisco Unified CM / CallManager) is vulnerable to an SQL-injection. The attack would compromise the application, allowing data to be accessed and modified as well as exploiting hidden vulnerabilities in the underlying database.
Researchers have reported that only authenticated attackers can exploit the vulnerability in Cisco Unified CM. If exploited, an authenticated, remote attacker could execute arbitrary SQL queries.
A successful SQL injection exploit can lead to the unauthorised exposure of sensitive data from the database, the execution of unauthorised administrative operations on the database and even modification or deletion of the database. Therefore, an attack would impact on the confidentiality, integrity and availability of the system.
The reported vulnerability occurs due to a lack of input validation on HTTP requests which encompass user-provided input. An attacker could exploit this vulnerability by sending constructed HTTP requests that contain malicious SQL statements. The vulnerability can also allow a remote attacker to check if certain data exists in the application.
CVE identifier:
Affected Products:
Known affected releases:
  • 1.0(1.10000.10)
  • 11.5(1.10000.6)
Known Fixed Releases:
  • 12.0(0.98000.619)
  • 12.0(0.98000.485)
  • 12.0(0.98000.212)
  • 11.5(1.13035.1)
  • 11.0(1.23900.5)
  • 11.0(1.23900.2)
  • 11.0(1.23067.1)
  • 10.5(2.15900.2)

Remediation

  • Ensure any identified vulnerable Cisco Unified CM/ CallManager product versions are included in patch deployment schedules.
  • Users are encouraged to patch all relevant programs as quickly as possible.

Sunday, 16 April 2017

Fake SEO Plugin (WP-Base-SEO) Used To Compromise Wordpress Installations

Affected Platforms

WordPress - all versions

Description

A fake SEO plugin is being used by attackers to compromise WordPress installations. The plugin is called WP-Base-SEO, and is a forgery of a legitimate search engine optimization plugin called WordPress SEO Tools. The plugin’s wp-seo-main.php file hooks WordPress’ native add_action() functionality to run a malicious base64 encoded PHP eval request. The result is the creation of a backdoor which a malicious actor could use to gain access.

Remediation

  • Manually Check Installations for suspicious files
  • Implement Strong Alpha Numeric Passwords to secure installations
  • Update WordPress core, themes and plugins to the latest secure versions

Saturday, 15 April 2017

Adobe Releases Security Updates

Affected Platforms

Adobe Campaign, Flash Player, Acrobat and Reader, Photoshop CC, and Creative Cloud.

Description

Adobe has released security updates to address vulnerabilities in Adobe Campaign, Flash Player, Acrobat and Reader, Photoshop CC, and Creative Cloud. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system (Intelligence provided by US-Cert).

Remediation

Users and administrators are encouraged to review Adobe Security Bulletins APSB17-09, APSB17-10, APSB17-11, APSB17-12, and APSB17-13 and apply the necessary updates

Friday, 14 April 2017

Apache Software Foundation Releases Security Updates

Apache Software Foundation Releases Security Updates

Affected Platforms

Apache Tomcat

Description

The Apache Foundation has released security updates to address vulnerabilities in Apache Tomcat. Exploitation of one of these vulnerabilities may cause a remote attacker to obtain sensitive information.
Users and administrators are encouraged to review Apache.org CVE-2017-5648, CVE-2017-5650, and CVE-2017-5651 for more information and apply the necessary updates.

Remediation

Ensure Apache Tomcat is patched with all latest updates

Thursday, 13 April 2017

Cisco Wireless Security Updates

Affected Platforms

Aironet 1830 Series and 1850 Series Access Points
Wireless LAN Controller 802.11 WME 
Wireless LAN Controller IPv6 
Wireless LAN Controller Management GUI

Description

Cisco has released several updates to address vulnerabilities affecting multiple products. A remote attacker could exploit one of these vulnerabilities to take control of an affected system.

Remediation

Cisco encourages users and administrators to review the following Cisco Security Advisories and apply the necessary updates:
Aironet 1830 Series and 1850 Series Access Points Mobility Express Default Credential Vulnerability cisco-sa-20170405-ame 
Wireless LAN Controller 802.11 WME Denial-of-Service Vulnerability cisco-sa-20170405-wlc 
Wireless LAN Controller IPv6 UDP Denial-of-Service Vulnerability cisco-sa-20170405-wlc2 
Wireless LAN Controller Management GUI Denial-of-Service Vulnerability cisco-sa-20170405-wlc3

Changes To Microsoft Patch Tuesday

Affected Platforms

Internet Explorer
Microsoft Edge
Microsoft Windows
Microsoft Office and Microsoft Office Services and Web Apps
Visual Studio for Mac
NET Framework
Silverlight
Adobe Flash Player

Description

Microsoft has released April's Patch Tuesday in the new Security Update Guide format. There are 61 security updates for products such as its operating systems, browsers, the Office suite, and others.
This month's Patch Tuesday see's the retirement of the security bulletins format (MS17-XXX) in favor of a new searchable database that lists individual updates (KBxxxxxxx) one by one.
This update also patches a notable zero-day disclosed over the weekend, tracked as CVE-2017-0199.
The last security updates for Vista are also included, because as of today, Microsoft has stopped all support (free and paid) for the Operating System.

Translate