CERT/CC

103 posts

CERT/CC banner
CERT/CC

CERT/CC

@certcc

CERT Coordination Center at the Carnegie Mellon University Software Engineering Institute.

Pittsburgh, PA, USA Entrou em Mart 2009
0 Seguindo3.5K Seguidores
CERT/CC
CERT/CC@certcc·
You all know by now about the #log4j CVE-2021-44228 that affects lots of Java applications, right? No? Well that extra sleep must be nice! We've published a vulnerability note with details: kb.cert.org/vuls/id/930724 We link to PowerShell and Python3 scanners to find jar files too.
CERT/CC tweet media
English
1
28
76
0
CERT/CC
CERT/CC@certcc·
We have been communicating our findings to and collaborating with Pulse Secure. They have published more details about the Integrity Checker Tool (ICT) here: kb.pulsesecure.net/articles/Pulse…
English
1
1
4
0
CERT/CC
CERT/CC@certcc·
Since the Pulse Connect Secure ICT has been public since March, it would be wise to assume that attackers have worked around it by now. Yes, run the ICT if you haven't already by now. No, a clean ICT report doesn't necessarily mean you're fine.
English
1
2
8
0
CERT/CC
CERT/CC@certcc·
It is important to realize that the Pulse Secure Integrity Checker Tool (ICT) and the PCS factory reset functionality can both be subverted by an attacker on a compromised PCS device. If we can do this, assume that attackers can do this as well. 🤔
CERT/CC tweet mediaCERT/CC tweet mediaCERT/CC tweet media
English
2
23
44
0
CERT/CC
CERT/CC@certcc·
If you have a Pulse Connect Secure system and did not immediately apply the instantaneous XML workaround published on April 20, assume compromise until you can prove otherwise. Run the PCS Integrity Assurance package as soon as possible (requires reboot). kb.pulsesecure.net/articles/Pulse…
English
0
12
12
0
CERT/CC
CERT/CC@certcc·
@cscart We have a vulnerability report that we would like to share with you. How would you like to receive vulnerability reports?
English
1
0
1
0
CERT/CC
CERT/CC@certcc·
We've published vulnerability note VU#490028 about Zerologon / CVE-2020-1472. Windows Domain controllers without the August update from Microsoft are vulnerable to complete domain takeover by an unauthenticated attacker. Samba DCs < 4.8 affected by default kb.cert.org/vuls/id/490028
English
0
4
7
0
CERT/CC
CERT/CC@certcc·
Citrix vulnerabilities in Citrix ADC (formerly known as NetScaler ADC), Citrix Gateway (formerly known as NetScaler Gateway) and Citrix SD-WAN WANOP. Impacts include system compromise by an unauthenticated user on the management network. support.citrix.com/article/CTX276…
English
0
7
4
0
CERT/CC
CERT/CC@certcc·
RT @CNMF_CyberAlert: Please patch all devices affected by CVE-2020-2021 immediately, especially if SAML is in use. Foreign APTs will likely…
English
0
391
0
0
CERT/CC
CERT/CC@certcc·
Microsoft has released ADV200006 about an 0day vulnerability being exploited in the wild in Microsoft Windows Adobe Type Manager Type 1 font parsing. There are almost as many workarounds provided as there are attack vectors! kb.cert.org/vuls/id/354840/
English
0
12
17
0
CERT/CC
CERT/CC@certcc·
Disable SMB compression and block SMB both inbound AND outbound to help prevent exploitation of an unpatched "wormable" vulnerability in Microsoft Windows SMBv3. kb.cert.org/vuls/id/872016/ ADV200005 CVE-2020-0796 VU#872016
English
2
56
57
0
CERT/CC
CERT/CC@certcc·
VU#338824 Microsoft Internet Explorer is being actively exploited in the wild using a new unpatched vulnerability in the Scripting Engine. Disable access to JScript.dll as a workaround. kb.cert.org/vuls/id/338824/
English
1
17
15
0
CERT/CC
CERT/CC@certcc·
If you use "Disable all macros without notification" in Microsoft Office for Mac, you may be in for an unpleasant surprise. XLM macros in SYLK (.SLK) content will run without any prompting. This allows for arbitrary code execution without any clicks. kb.cert.org/vuls/id/125336/
English
0
6
5
0
CERT/CC
CERT/CC@certcc·
Any device that has a software stack associated with it may become unsafe when it has outlived its support life span. It's Time to Retire Your Unsupported Things insights.sei.cmu.edu/cert/2019/10/i…
English
0
4
4
0
CERT/CC
CERT/CC@certcc·
@todb Indeed. But guess what happens to a narrowly-targeted attack that suddenly has a patch available?
English
1
0
1
0
CERT/CC
CERT/CC@certcc·
It's important to note that these updates are NOT currently being deployed via Windows Update or Microsoft Update. Despite being actively exploited in the wild, manual actions must be taken to receive the fixes.
English
1
10
14
0