About Administrador

This author has not yet filled in any details.
So far Administrador has created 238 blog entries.

CVE-2024-22024: XXE vulnerability disclosed in Ivanti products

By |14 Feb. 2024|Tarlogic's Blog - Cybersecurity|

CVE-2024-22024 is an XML External Entity (XXE) vulnerability that allows a remote attacker to access internal files CVE-2024-22024, a new high rated vulnerability affecting Ivanti Connect Secure and Ivanti Policy Secure software has been disclosed. This software is used to connect devices to virtual private networks (VPNs). The vulnerability would allow a remote attacker to access internal files by sending maliciously crafted XML files. The situation is more serious by the fact that there is a known, publicly accessible exploit. The vulnerability CVE-2024-22024 is the latest in a series of high and critical vulnerabilities discovered in a single month (CVE-2024-21893, CVE-2024-21887, CVE-2024-21888). It is worth mentioning that the exploitation of these previous vulnerabilities has been detected in the wild, so ...

Comments Off on CVE-2024-22024: XXE vulnerability disclosed in Ivanti products

CVE-2023-7028: A critical vulnerability affecting GitLab

By |16 Jan. 2024|Tarlogic's Blog - Cybersecurity|

Critical vulnerability CVE-2023-7028 in the open source platform GitLab allows taking control of other users' accounts A critical vulnerability has been discovered in GitLab, an open-source platform for managing git repositories. This vulnerability could allow a remote attacker to take control of other users' accounts. GitLab is an open-source platform that performs functions equivalent to those of GitHub. The company in charge of developing it maintains a version of this software in the cloud so that users can access its functions, but installing it on local servers is also possible. Key features CVE identifier: CVE-2023-7028 Release date: January 11, 2024 Affected software: GitLab CVSS score: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H (10.0 Critical) Affected versions: 16.1 to 16.1.5 16.2 to 16.2.8 16.3 to 16.3.6 16.4 ...

Comments Off on CVE-2023-7028: A critical vulnerability affecting GitLab

Critical vulnerabilities of the ownCloud platform are being exploited in the wild

By |30 Nov. 2023|Tarlogic's Blog - Cybersecurity|

On November 21, 2023, three critical vulnerabilities were made public (CVE-2023-49103, CVE-2023-49104, CVE-2023-49105), affecting several applications of the ownCloud online file sharing and collaboration platform. These vulnerabilities of the ownCloud platform allow a remote attacker, under certain circumstances, to obtain sensitive data such as ownCloud administrator password, mail server credentials and license key; access, modify and delete files without authentication (knowing the victim user); and bypass subdomain validation in ownCloud's oauth2. As published by GreyNoise, these vulnerabilities of the ownCloud platform have been highly exploited since November 25, 2023, mainly the one affecting the disclosure of sensitive data (CVE-2023-49103). OwnCloud is an open-source software platform designed to provide cloud storage and online collaboration services. It focuses on enabling users to ...

Comments Off on Critical vulnerabilities of the ownCloud platform are being exploited in the wild

CVE-2023-4911: The vulnerability Looney Tunables in GlibC is being actively exploited

By |23 Nov. 2023|Tarlogic's Blog - Cybersecurity|

On October 3, 2023, Qualys published information about a high-severity local privilege escalation vulnerability in the GNU C Library (glibc), which is widely used on Linux systems. This vulnerability (CVE-2023-4911) could allow a local attacker to gain root privileges. Only two days ago, CISA, the Cybersecurity and Infrastructure Security Agency of the United States, reported that this vulnerability CVE-2023-4911 is actively being exploited. The GNU C Library defines system calls and other basic functionality that all programs that use this language require. Most current Linux distributions use this library to compile their software packages. Vulnerability CVE-2023-4911 details The following are the main details of this vulnerability: CVE identifier: CVE-2023-4911. Date published: October 3, 2023. Affected software: glibc. CVSS score: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H ...

Comments Off on CVE-2023-4911: The vulnerability Looney Tunables in GlibC is being actively exploited

CVE-2023-38545: Heap overflow vulnerability in curl (SOCKS 5)

By |13 Oct. 2023|Tarlogic's Blog - Cybersecurity|

The vulnerability CVE-2023-38545 affects curl, a command line tool and software library used to transfer data to and from a server On October 11th, 2023 the curl development team has reported a heap buffer overflow vulnerability, classified as High, affecting the handshake in the SOCKS5 proxy component. This vulnerability was reported by Jay Satiro via the HackerOne platform on September 30, 2023. Curl is a command-line tool and library used to transfer data to or from a server using various network protocols, including HTTP, HTTPS, FTP, FTPS, SCP, SFTP, LDAP, and more. The name cURL stands for Client for URLs, which indicates its primary function: to act as a client for accessing resources via URLs. What is the vulnerability? The ...

Comments Off on CVE-2023-38545: Heap overflow vulnerability in curl (SOCKS 5)

CVE-2023-42115: Vulnerabilities without security patch in Exim

By |30 Sep. 2023|Tarlogic's Blog - Cybersecurity|

Exim has multiple critical vulnerabilities, including CVE-2023-4863, that allow attackers to run code on affected systems without authentication. Multiple vulnerabilities, one of them critical, have been revealed that affect the Exim software solution. Among the different consequences that could result from the exploitation of these vulnerabilities are remote code execution and the disclosure of sensitive information. The most critical is CVE-2023-42115, which allows remote execution over the network without authentication. Exim is a message transfer agent (MTA) developed by the University of Cambridge for use on Unix systems connected to the internet. It is an open-source software widely used as an alternative to Sendmail. It is the default MTA in Debian distributions and the most popular on the internet according ...

Comments Off on CVE-2023-42115: Vulnerabilities without security patch in Exim

Bluetooth vulnerabilities in smart locks

By |29 Sep. 2023|Tarlogic's Blog - Cybersecurity|

Detecting and mitigating Bluetooth vulnerabilities in smart locks is critical to securing these IoT devices A smart lock is an IoT device that facilitates access by opening a door without the need for a physical key. In this second part of the analysis of a smart lock, we will focus on evaluating Bluetooth communications. We analyze the security of Bluetooth and the communications of a Yale Linus smart lock and tell you about the identified security problems. The importance of evaluating this mechanism lies in the fact that the smart lock we are analyzing is controlled from a mobile phone via Bluetooth. There are several vulnerabilities in Bluetooth technology. While BIAS and KNOB are the ones that have received the ...

Comments Off on Bluetooth vulnerabilities in smart locks

Hardware vulnerabilities in smart locks

By |21 Sep. 2023|Tarlogic's Blog - Cybersecurity|

We evaluate the hardware security level of the smart locks, disassembling one and analyzing the elements that make it up We got our hands on a Yale Linus smart lock, one that you can operate from your smartphone, so we thought it was an excellent opportunity to practice many of the hardware hacking concepts and IoT security testing methodologies we have seen here in the past. Over the following few articles, we will walk through the security assessment process of smart locks and tell you our conclusions. Obtaining information for hardware analysis of smart locks The existence of design flaws in the hardware can make a smart lock no longer secure. This security breach would allow us to interact with ...

Comments Off on Hardware vulnerabilities in smart locks

CVE-2023-4863: Heap buffer overflow in Google libwebp (WebP)

By |19 Sep. 2023|Tarlogic's Blog - Cybersecurity|

The vulnerability CVE-2023-4863 is found in the open source Libwebp library and affects browsers such as Mozilla, Chrome and Edge On September 6th, 2023 Apple Security Engineering and Architecture (SEAR) and The Citizen Lab at the University of Toronto reported a critical vulnerability affecting an image compression library used in Chromium and other software solutions that support WebP images. WebP is an image format that offers superior lossless and lossy compression for images on the Web. Thanks to WebP, developers and webmasters have the ability to generate more compact, high-quality images, which leads to a significant improvement in the loading speed of web pages. Google developed an open source library for manipulating images in WebP format, known as Libwebp, providing ...

Comments Off on CVE-2023-4863: Heap buffer overflow in Google libwebp (WebP)

CVE-2023-35082: Unauthenticated API Access Vulnerability in MobileIron Core

By |7 Aug. 2023|Tarlogic's Blog - Cybersecurity|

CVE-2023-35082 is a critical vulnerability that allows access to APIs in older versions of MobileIron Core Ivanti is having a tough time as another critical vulnerability has been reported after the latest incident. This time, it's the CVE-2023-35082 vulnerability, which affects older and unsupported versions of MobileIron Core. MobileIron Core is an unsupported product used for managing mobile devices such as phones and tablets. CVE-2023-35082 allows unauthenticated attackers to access the API in older versions of MobileIron Core (11.2 and earlier). This means a cybercriminal could gain access to API endpoints on the exposed management server without the need for authentication. With this access, an attacker could potentially disclose personal data or make modifications to the platform. Furthermore, the attacker ...

Comments Off on CVE-2023-35082: Unauthenticated API Access Vulnerability in MobileIron Core