CVE-2024-1553 and CVE-2024-1557 are memory-safety bugs rated as having a excessive severity. “Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code,” Mozilla researchers mentioned.
Zoom
Video conferencing big Zoom has issued fixes for seven flaws in its software program, one in every of which has a CVSS rating of 9.6. CVE-2024-24691 is an improper-input-validation bug in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows. If exploited, the difficulty might enable an unauthenticated attacker to escalate their privileges by way of community entry, Zoom mentioned in a safety bulletin.
Another notable flaw is CVE-2024-24697, an untrusted-search-path subject in some Zoom 32 bit Windows purchasers that would enable an authenticated consumer with native entry to escalate their privileges.
Ivanti
In January, Ivanti warned that attackers have been concentrating on two unpatched vulnerabilities in its Connect Secure and Policy Secure merchandise, tracked as CVE-2023-46805 and CVE-2024-21887. With a CVSS rating of 8.2 the primary authentication-bypass vulnerability within the internet part of Ivanti Connect Secure and Ivanti Policy Secure permits a distant attacker to entry restricted assets by bypassing management checks.
With a CVSS rating of 9.1, the second command injection vulnerability in internet elements of Ivanti Connect Secure and Ivanti Policy Secure permits an authenticated administrator to ship specifically crafted requests and execute arbitrary instructions on the equipment. This vulnerability could be exploited over the web.
At the tip of the month, the agency alerted firms to a different two critical flaws, one in every of which was being exploited in assaults. The exploited subject is a server-side request forgery bug within the SAML part tracked as CVE-2024-21893. Meanwhile, CVE-2024-21888 is a privilege-escalation vulnerability.
Patches have been accessible by February 1, however the points have been deemed so critical that the US Cybersecurity and Infrastructure Security Agency (CISA) suggested disconnecting all Ivanti merchandise by February 2.
On February 8, Ivanti launched a patch for one more subject tracked as CVE-2024-22024, which prompted one other CISA warning.
Fortinet
Fortinet has issued a patch for a important subject with a CVSS rating of 9.6, which it says is already being utilized in assaults. Tracked as CVE-2024-21762, the code-execution flaw impacts FortiOS variations 6.0, 6.2, 6.4, 7.0, 7.2 and seven.4. The out-of-bounds write vulnerability can be utilized for arbitrary code execution utilizing specifically crafted HTTP requests, Fortinet mentioned.
It got here simply days after the agency launched a patch for 2 points in its FortiSIEM merchandise, CVE-2024-23108 and CVE-2024-23109, rated as important with a CVSS rating of 9.7. The flaw in FortiSIEM Supervisor may enable a distant unauthenticated attacker to execute unauthorized instructions by way of crafted API requests, Fortinet mentioned in an advisory.
Cisco
Cisco has listed a number of vulnerabilities in its Expressway Series that would enable an unauthenticated, distant attacker to conduct cross-site request forgery assaults.
Tracked as CVE-2024-20252 and CVE-2024-20254, two vulnerabilities within the API of Cisco Expressway Series units have been given a CVSS rating of 9.6. “An attacker could exploit these vulnerabilities by persuading a user of the API to follow a crafted link,” Cisco mentioned. “A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user.”
SAP
Enterprise software program agency SAP has launched 13 safety updates as a part of its SAP Security Patch Day. CVE-2024-22131 is a code-injection vulnerability in SAP ABA with a CVSS rating of 9.1.
CVE-2024-22126 is a cross-site scripting vulnerability in NetWeaver AS Java listed as having a excessive affect, with a CVSS rating of 8.8. “Incoming URL parameters are insufficiently validated and improperly encoded before including them into redirect URLs,” safety agency Onapsis mentioned. “This can result in a cross-site scripting vulnerability, leading to a high impact on confidentiality and mild impact on integrity and availability.”