Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of January 17, 2022
  • Cyber Attacks
  • Vulnerabilities

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of January 17, 2022

4 years ago Andrew Swoboda
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of January 17, 2022

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of January 17, 2022. We’ve also included the comments from a few folks here at Tripwire VERT.

Root-Level RCE Vulnerability Patched by Cisco

Bleeping Computer reported that Cisco had issued a fix for CVE-2022-20649. The bug enabled someone to remotely execute code with root-level privileges on machines running vulnerable versions of Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS Software. In a security advisory, the company clarified that the flaw arose from the fact that debug mode was incorrectly enabled for certain services.

Andrew Swoboda | Senior Security Researcher at Tripwire

Cisco Redundacy Configuration Manager is subject to a remote code execution vulnerability. This issue exists on Cisco StarOS software while running in debug mode. Command execution occurs with root privileges. Cisco is not aware of any attacks using this vulnerability.

Nearly 100K WordPress Sites Vulnerable to High-Severity Bug

According to DataBreachToday, security researchers discovered a cross-site request forgery vulnerability (tracked as CVE-2022-0215) with a CVSS score of 8.8. The flaw affected three plugins running across 84,000 WordPress sites. When exploited, the bug could allow a malicious actor to assume control over a vulnerable website.

Tyler Reguly | Senior Manager, Security R&D at Tripwire

They must convince that WordPress administrator to click a link or visit a website in order to execute the attack. Ultimately, I would compare this to the Windows problem. For years, we’ve heard that Windows is less secure that macOS and Linux, but in reality, there’s just more targets, making it more valuable.

Microsoft Fixed Issues with January Patch Tuesday Updates

Microsoft fixed several issues surrounding its security releases for January’s Patch Tuesday. Some organizations that implemented those updates witnessed their domain controllers unexpectedly restart, wrote The Register. Others encountered problems with VPN connections on Windows versions from the 2015 LTSB edition to Windows 11,

Andrew Swoboda | Senior Security Researcher at Tripwire

Microsoft’s cumulative patches appear to have cause issues with multiple services. Issues ranged from crashing services to problems with VPNs. If only you could select patches and test individual portions of the update to ensure the reliability of the updates. Unfortunately, we are stuck with either no patch or a patched system. A patched system is essentially more secure, but in this case a cumulative can leave you with the feeling that the patch is not worth the hassle.

Unofficial Patch Released for ‘RemotePotato0″ Zero-Day Flaw

On January 13, Bleeping Computer reported that Microsoft had released an unofficial patch for the “RemotePotato0” zero-day bug. Security researchers first discovered the vulnerability, which enables attackers to elevate privileges to domain administrator, back in April 2021. The bug didn’t receive a CVE ID at that time after Microsoft said it wasn’t planning on fixing the issue.

Andrew Swoboda | Senior Security Researcher at Tripwire

An interesting new exploit for NTLM. This vulnerability requires attackers to have local administrator credentials or obtain them from a user that does. No official path for this vulnerability exists at this point because Microsoft decided to mark this issue as they won’t fix. Domain admins were told to either disable NTLM or block relay attacks using Active Directory Certificate Services (AD CS).

Keep in Touch with Tripwire VERT

Want more insights from Tripwire VERT before our next cybersecurity news roundup comes out? Subscribe to our newsletter here.

Previous VERT Cybersecurity News Roundups

  • September 27, 2021

The post ” Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of January 17, 2022″ appeared first on TripWire

Source:TripWire – Andrew Swoboda

Tags: Bug, Exploit, High Severity, Linux, Microsoft, Patch Tuesday, TripWire, Vulnerability

Continue Reading

Previous AdSanity, AccessPress Plugins Open Scads of WordPress Sites to Takeover
Next New MacOS Malware ‘DazzleSpy’ Used in Watering-Hole Attacks

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

7 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

11 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach

Securing the Mid-Market Across the Complete Threat Lifecycle

11 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

14 hours ago [email protected] (The Hacker News)

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
  • Securing the Mid-Market Across the Complete Threat Lifecycle

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT