November 9, 2024

Hello all,

This past week has some nice wins from the cyber-defenders; 41 arrests of evil people, with more coming, over 22,000 malicious servers taken offline, the person responsible for the Snowflake breach behind bars, and scores of Nigerian scammers extradited and now serving lengthy prison sentences. Unfortunately, cyber criminals are like the mythical hydra, you cut off one head and two more grow from the stump. As long as the lure of easy money exists, so will they. And the number of vulnerabilities, defects, and holes continues to grow as new AI enhanced tools help both defenders and threat actors with their search for avenues of exploitation. That is why it is vital to stay aware of the threat landscape so that you’re able to make informed decisions and respond appropriately. So, onward to the news.

As usual, my commentary is followed by a plethora of links to other items that are worth skimming to see if they interest you or pertain to your particular environment or of those you support.

Headline NEWS:

  • Cisco has a critical defect in their Ultra-Reliable Wireless Backhaul (UWRB) access point system. It scored a perfect 10 out of 10 on the CVSS. If you use any of the following, patch immediately, stop reading and go patch! Catalyst IW9165D Heavy Duty Access Points, Catalyst IW9165E Rugged Access Points and Wireless Clients, Catalyst IW9167E Heavy Duty Access Points. Seriously, stop and go patch!
  • HPE not wanting to let Cisco take all of the wireless news, announced their own critical defects in their Aruba Networking Access Points. They advise updating as soon as possible. There is no current evidence of exploitation, but it is only a matter of time. Some of the affected products are EOL and will not get updates. If you have those, follow HPE’s mitigation action recommendations and then quickly replace them with supported hardware.
  • Microsoft released Windows 2025 Server last Saturday. Apparently, they are so proud of it that they decided that they’d upgrade Windows Server 2022 without warning to the new version. Well, not exactly. However, from what we can gather, a data-entry problem with a different Microsoft KB incorrectly triggered an update to run on servers that were managed by some third-party patch management systems. Admins are now scrambling to either restore back to Windows Server 2022 or obtain licenses for the newly installed Operating System. In this author’s opinion, since this was Microsoft’s error, they should give the affected organizations free upgrade licenses.
  • NVIDIA released driver updates last week for their GeForce GPUs. There are eight high-risk defects that are being addressed. The video card maker is pleading with users to update, I suggest you take this vulnerability seriously and update as soon as possible.
  • Opera Browser has received an update for a zero-day vulnerability dubbed “CrossBarking” that is tied to malicious extensions. If you use Opera, update now.
  • Palo Alto Networks has potential Remote Code Execution (RCE) vulnerability in their Pan-OS that is under investigation. Palo Alto warns “customers to block access from the Internet to their firewalls’ PAN-OS management interface and only allow connections from trusted internal IP addresses.” That particular advice should be the standard for any firewall, either allow management access only from trusted addresses inside of the network, or from specific trusted public IP addresses, not the whole internet.

In Ransomware, Malware, and Vulnerabilities News:

  • D-Link Network Attached Storage (NAS) devices have a critical defect where a threat actor can remotely inject commands, and it has a public exploit available. And this is on top of another similar vulnerability revealed in April of this year. For its part, D-Link has said that they no longer make NAS devices and they will not receive any updates. If you have one of the 60,000+ publicly exposed D-Link NAS devices, take it off network immediately and buy yourself a new NAS.
  • Germany is finally decriminalizing researchers exposing defects, flaws, and vulnerabilities, provided that they do it within the confines of the new law. It looks like Ethischer Hackers can come out from hiding soon. The new law will also modernize penalties and definitions for illegal activity.

In Other News Events of Note and Interest:

  • Microsoft is running a contest where they are giving away $1 million to help promote their search engine – Bing. With their Co-Pilot advances making inroads into Bing, maybe this time they’ll succeed.

In Cyber Insurance News:

  • Cyber Insurance Demand Surges as Ransomware Targets Businesses of all Sizes is worth reading, if only to understand that threat actors rarely care who they attack, as long as there is money to be made. It is a crime of opportunity, generally not targeted.

Musings:

While the incessant assault of politically themed spam and worse are temporarily behind us, we cannot let our guards down. Threat actors are now gearing up for their favorite time of the year, the traditional Winter Holiday Season in most of the Western World. Expect unbelievable deals, amazing products, and missed package delivery notifications galore. Tis the season!

Visc. Jan Broucinek

Keep the shields up!

Viscount Jan Broucinek
Red Dot Security News

For the full listing of links in this week’s edition, visit https://reddotsecurity.news. You’ll also find past issues there.

Headline NEWS
Ransomware, Malware, and Vulnerabilities News
Other News Events of Note and Interest
Cyber Insurance News

 

Share this with: