• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical patches released for new flaws in cisco, fortinet, vmware

Critical Patches Released for New Flaws in Cisco, Fortinet, VMware Products

You are here: Home / General Cyber Security News / Critical Patches Released for New Flaws in Cisco, Fortinet, VMware Products
February 8, 2024

Cisco, Fortinet, and VMware have launched security fixes for numerous security vulnerabilities, which includes critical weaknesses that could be exploited to conduct arbitrary steps on afflicted equipment.

The first established from Cisco consists of three flaws – CVE-2024-20252 and CVE-2024-20254 (CVSS rating: 9.6) and CVE-2024-20255 (CVSS rating: 8.2) – impacting Cisco Expressway Sequence that could make it possible for an unauthenticated, remote attacker to conduct cross-web-site request forgery (CSRF) attacks.

All the issues, which have been found in the course of inside security screening, stem from insufficient CSRF protections for the web-dependent administration interface that could allow an attacker to conduct arbitrary actions with the privilege amount of the influenced person.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“If the impacted person has administrative privileges, these steps could contain modifying the technique configuration and generating new privileged accounts,” Cisco explained about CVE-2024-20252 and CVE-2024-20254.

On the other hand, profitable exploitation of CVE-2024-20255 targeting a person with administrative privileges could help the menace actor to overwrite system configuration options, resulting in a denial-of-services (DoS) problem.

Cybersecurity

A further vital big difference between the two sets of flaws is that when the former two affect Cisco Expressway Sequence units in the default configuration, CVE-2024-20252 only impacts them if the cluster databases (CDB) API element has been enabled. It is disabled by default.

Patches for the vulnerabilities are readily available in Cisco Expressway Sequence Release versions 14.3.4 and 15…

Fortinet, for its component, has launched a next round of updates to deal with what are bypasses for a previously disclosed critical flaw (CVE-2023-34992, CVSS score: 9.7) in FortiSIEM supervisor that could result in the execution of arbitrary code, according to Horizon3.ai researcher Zach Hanley.

Tracked as CVE-2024-23108 and CVE-2024-23109 (CVSS scores: 9.8), the flaws “might allow for a remote unauthenticated attacker to execute unauthorized commands by way of crafted API requests.”

It can be truly worth noting that Fortinet resolved a different variant of CVE-2023-34992 by closing out CVE-2023-36553 (CVSS rating: 9.3) in November 2023. The two new vulnerabilities are/will be plugged in the next variations –

  • FortiSIEM version 7.1.2 or previously mentioned
  • FortiSIEM model 7.2. or previously mentioned (approaching)
  • FortiSIEM version 7..3 or higher than (impending)
  • FortiSIEM edition 6.7.9 or earlier mentioned (forthcoming)
  • FortiSIEM edition 6.6.5 or over (future)
  • FortiSIEM edition 6.5.3 or above (impending), and
  • FortiSIEM model 6.4.4 or previously mentioned (approaching)

Cybersecurity

Finishing the trifecta is VMware, which has warned of 5 reasonable-to-essential severity flaws in Aria Functions for Networks (formerly vRealize Network Perception) –

  • CVE-2024-22237 (CVSS rating: 7.8) – Local privilege escalation vulnerability that will allow a console person to acquire frequent root obtain
  • CVE-2024-22238 (CVSS rating: 6.4) – Cross-web page scripting (XSS) vulnerability that enables a destructive actor with admin privileges to inject malicious code into user profile configurations
  • CVE-2024-22239 (CVSS score: 5.3) – Community privilege escalation vulnerability that enables a console person to get standard shell access
  • CVE-2024-22240 (CVSS rating: 4.9) – Local file study vulnerability that allows a malicious actor with admin privileges to accessibility sensitive information and facts
  • CVE-2024-22241 (CVSS score: 4.3) – Cross-web page scripting (XSS) vulnerability that makes it possible for a destructive actor with admin privileges to inject malicious code and consider more than the consumer account

To mitigate the challenges, all end users of VMware Aria Operations for Networks edition 6.x are staying proposed to up grade to edition 6.12..

Thinking about the history of exploitation when it comes to Cisco, Fortinet, and VMware flaws, patching is a important and crucial 1st action that businesses need to have to take to handle the shortcomings.

Found this short article fascinating? Adhere to us on Twitter  and LinkedIn to read through extra unique content material we post.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «after fbi takedown, kv botnet operators shift tactics in attempt to After FBI Takedown, KV-Botnet Operators Shift Tactics in Attempt to Bounce Back
Next Post: Kimsuky’s New Golang Stealer ‘Troll’ and ‘GoBear’ Backdoor Target South Korea kimsuky's new golang stealer 'troll' and 'gobear' backdoor target south»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.