• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
u.s. cybersecurity agency adds 6 flaws to known exploited vulnerabilities

U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog

You are here: Home / General Cyber Security News / U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog
June 24, 2023

The U.S. Cybersecurity and Infrastructure Security Company has added a batch of six flaws to its Recognized Exploited Vulnerabilities (KEV) catalog, citing proof of active exploitation.

This includes 3 vulnerabilities that Apple patched this 7 days (CVE-2023-32434, CVE-2023-32435, and CVE-2023-32439), two flaws in VMware (CVE-2023-20867 and CVE-2023-20887), and one shortcoming impacting Zyxel devices (CVE-2023-27992).

CVE-2023-32434 and CVE-2023-32435, both equally of which permit code execution, are mentioned to have been exploited as zero-times to deploy adware as component of a decades-very long cyber espionage campaign that commenced in 2019.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Dubbed Procedure Triangulation, the action culminates in the deployment of TriangleDB that’s developed to harvest a broad variety of information from compromised gadgets, these as producing, modifying, eliminating, and stealing data files, listing and terminating processes, gathering qualifications from iCloud Keychain, and monitoring a user’s location.

The attack chain starts with the qualified sufferer acquiring an iMessage with an attachment that routinely triggers the execution of the payload without demanding any conversation, producing it a zero-click exploit.

“The destructive message is malformed and does not result in any alerts or notifications for [the] user,” Kaspersky famous in its initial report.

CVE-2023-32434 and CVE-2023-32435 are two of numerous vulnerabilities in iOS that have been abused in the espionage attack. A person amid them is CVE-2022-46690, a superior-severity out-of-bounds generate issue in IOMobileFrameBuffer that could be weaponized by a rogue application to execute arbitrary code with kernel privileges.

The weak point was remediated by Apple with improved enter validation in December 2022.

Kaspersky flagged TriangleDB as made up of unused options referencing macOS as properly as permissions looking for access to the device’s microphone, digicam, and the address e-book that it claimed could be leveraged at a potential date.

The Russian cybersecurity company’s investigation into Operation Triangulation commenced at the begin of the yr when it detected the compromise in its possess organization network.

In mild of energetic exploitation, Federal Civilian Government Branch (FCEB) businesses are recommended to apply seller-presented patches to secure their networks towards probable threats.

The development will come as CISA issued an alert warning of a few bugs in the Berkeley Internet Identify Domain (BIND) 9 Area Identify Method (DNS) software suite that could pave the way for a denial-of-services (DoS) condition.

The flaws – CVE-2023-2828, CVE-2023-2829, and CVE-2023-2911 (CVSS scores: 7.5) – could be exploited remotely, ensuing in the sudden termination of the named BIND9 support or exhaustion of all readily available memory on the host running named, main to DoS.

This is the next time in a lot less than 6 months that the Internet Programs Consortium (ISC) has unveiled patches to resolve very similar issues in BIND9 that could trigger DoS and system failures.

Found this article interesting? Stick to us on Twitter  and LinkedIn to go through extra exclusive articles we submit.


Some pieces of this article are sourced from:
thehackernews.com

Previous Post: «twitter hacker sentenced to 5 years in prison for $120,000 Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam
Next Post: Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks chinese hackers using never before seen tactics for critical infrastructure attacks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.