Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of September 26, 2022
  • Critical Vulnerability
  • Cyber Attacks
  • Vulnerabilities

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of September 26, 2022

4 years ago Andrew Swoboda
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of September 26, 2022

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of September 26th, 2022. I’ve also included some comments on these stories.

Sophos Firewall Zero-Day Exploited in Attacks on South Asian Organizations

UK-based cybersecurity company Sophos has warned customers that a new zero-day vulnerability affecting some of its firewall products has been exploited in attacks, SecurityWeek reports. According to an advisory published on Friday, version 19.0 MR1 (19.0.1) and older of Sophos Firewall are affected by a critical vulnerability that can be exploited for remote code execution.

Sophos Firewall was subject to a zero day that affected versions 19.0 MR1 and prior. This vulnerability allowed attackers to execute code on vulnerable systems. The vulnerability was located in the User Portal and Webadmin components. Sophos has released a patch to fix this issue. It is also recommended to not have the User Portal and Webadmin interface exposed to the internet.

Windows 11 22H2 blocked due to blue screens on some Intel systems

Microsoft is now blocking the Windows 11 22H2 update from being offered on some systems with Intel Smart Sound Technology (SST) audio drivers. The company also put a safeguard hold in place because this known issue triggers blue screens of death (BSODs) on affected systems, BleepingComputer notes.

Be cautious when upgrading to Windows 11 22H2. This update has been known to cause the BSOD on certain systems with Intel Smart Sound Technology audio drivers. This issue exists because there is an incompatibility issue with the Intel Smart Sound Technology on 11th Gen Core processors and Windows 11. It is recommended to not force the update with the Media Creation Tool because this would cause systems to blue screen. Intel Smart Sound Technology Audio Controller with a file name of IntcAudioBus.sys with version 10.29.0.5152 or version 10.30.0.5152 contain this issue. This issue may be patched on your system if you’re running version 10.30.0.5714 or version 10.29.0.5714.

New Microsoft Exchange zero-days actively exploited in attacks

BleepingComputer reports that threat actors are exploiting yet-to-be-disclosed Microsoft Exchange zero-day bugs allowing for remote code execution, according to claims made by security researchers at Vietnamese cybersecurity outfit GTSC, who first spotted and reported the attacks.

Microsoft Exchange is subject to several zero-day vulnerabilities. Security researchers at GTSC noticed bugs that would allow remote code execution. Attackers have been chaining these vulnerabilities to deploy Chinese Chopper web shells. These vulnerabilities have been verified by Zero Day initiative and are being tracked as ZDI-CAN-18333 and ZDI-CAN-1880.

There are two stages to executing code on a vulnerable system:
1. Malicious requests to the ProxyShell (not possible on fully patched systems)
2. Use the previous requests to gain access to the backend to execute code

GTSC suggests that a new rule using the URL Rewrite Rule module could mitigate these vulnerabilities. They suggest blocking requests to the Autodiscover on the Frontend by adding the string “.*autodiscover\.json.*\@.*Powershell.*“ to the URL Path and using the condition of {REQUEST_URI}.

Keep in Touch with Tripwire VERT

Want more insights from Tripwire VERT before our next cybersecurity news roundup comes out? Subscribe to our newsletter here.

Previous VERT Cybersecurity News Roundups

  • September 5, 2022
  • August 29, 2022
  • August 8, 2022
  • August 1, 2022
  • July 25, 2022
  • June 20, 2022
  • June 6, 2022
  • May 30, 2022
  • May 16, 2022

The post ” Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of September 26, 2022″ appeared first on TripWire

Source:TripWire – Andrew Swoboda

Tags: Critical Severity, Microsoft, TripWire, Vulnerability

Continue Reading

Previous UK Construction: Cybersecurity Experts Defend Joint Ventures
Next Ex-NSA Employee Arrested for Trying to Sell U.S. Secrets to a Foreign Government

More Stories

  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP Converters

18 hours ago [email protected] (The Hacker News)
  • Vulnerabilities

No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks

22 hours ago [email protected] (The Hacker News)
  • Data Breach
  • Malware
  • Vulnerabilities

NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs

23 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Vulnerabilities

Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution

23 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Vulnerabilities

CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Vulnerabilities

SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

2 days ago [email protected] (The Hacker News)

Recent Posts

  • Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles
  • SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation
  • 22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP Converters
  • Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023
  • 5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT