Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 8, 2022
  • Critical Vulnerability
  • Cyber Attacks
  • Vulnerabilities

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 8, 2022

3 years ago Andrew Swoboda
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 8, 2022

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 8st, 2022. I’ve also included some comments on these stories.

Slack leaked hashed passwords from its servers for years

Did Slack send you a password reset link last week? The company has admitted to accidentally exposing the hashed passwords of workspace users, reported The Register. The issue occurred when a user created or revoked a shared invitation link for their workspace.

Andrew Swoboda | Senior Security Researcher at Tripwire

Slack exposed password hashes when requesting a password reset link. The password hashes were salted. Depending on how the passwords are salted, they might be difficult to crack. This issue was discovered by an independent security researcher. Users that created these links between April 17, 2017, and July 17, 2022, are affected.


VU#309662: Signed third party UEFI bootloaders are vulnerable to Secure Boot bypass

A security feature bypass vulnerability exists in signed 3rd party UEFI bootloaders that allows bypass of the UEFI Secure Boot feature. An attacker who successfully exploits this vulnerability can bypass the UEFI Secure Boot feature and execute unsigned code during the boot process, notes Carnegie Mellon’s CERT Coordination Center.

Andrew Swoboda | Senior Security Researcher at Tripwire

UEFI bootloaders are subject to a secure boot bypass vulnerability. This vulnerability exists in signed 3rd party UEFI bootloaders. An attacker could execute unsigned code during the boot process upon successful exploitation of this vulnerability. Security researchers at Eclypsion found CVE-2022-34302, CVE-2022-34301, and CVE-2022-34303.


Microsoft Patches Dogwalk Zero Day And 17 Critical Flaws

Microsoft is urging users to patch a zero-day vulnerability dubbed Dogwalk that is actively being exploited in the wild. The bug (CVE-2022-34713) is tied to a Microsoft Windows Support Diagnostic Tool and allows a remote attacker to execute code on a vulnerable system, cites Threatpost.

Andrew Swoboda | Senior Security Researcher at Tripwire

Dogwalk was initially discovered in January 2022 by Imre Rad. A separate researcher began tracking a flaw dubbed Follina (CVE-2022-30190) which led to the rediscovery of Dogwalk. Microsoft has finally patched the vulnerability in the August patches. The vulnerability is present in the Microsoft Windows Support Diagnostic Tool. CVE-2022-34713 is a variant of Dogwalk and requires the attacker to have psychical access to a vulnerable system.


CVE-2022-2590: Linux kernel privilege escalation vulnerability

A newly discovered flaw (CVE-2022-2590) that affects the Linux kernel can be leveraged to write malicious code directly into processes, Security Online reports.

Andrew Swoboda | Senior Security Researcher at Tripwire

Linux greater than and equal to version 5.16 and prior to version 5.19 are subject to a privilege escalation vulnerability. An attacker could gain access to memory mappings upon successful exploitation of this vulnerability. An unprivileged user could modify shmem (tmpfs) file when they do not have write permissions.


Keep in Touch with Tripwire VERT

Want more insights from Tripwire VERT before our next cybersecurity news roundup comes out? Subscribe to our newsletter here.

Previous VERT Cybersecurity News Roundups

  • August 1, 2022
  • July 25, 2022
  • June 20, 2022
  • June 6, 2022
  • May 30, 2022
  • May 16, 2022
  • May 2, 2022
  • April 25, 2022
  • April 18, 2022

The post ” Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 8, 2022″ appeared first on TripWire

Source:TripWire – Andrew Swoboda

Tags: Bug, CERT, Critical Severity, Linux, Microsoft, Threatpost, TripWire

Continue Reading

Previous Russian State Hackers Continue to Attack Ukrainian Entities with Infostealer Malware
Next Microsoft Warns About Phishing Attacks by Russia-linked Hackers

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

17 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

18 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

21 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

23 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

1 day ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT