Article Details
Scrape Timestamp (UTC): 2023-11-17 06:00:59.356
Source: https://thehackernews.com/2023/11/cisa-adds-three-security-flaws-with.html
Original Article Text
Click to Toggle View
CISA Adds Three Security Flaws with Active Exploitation to KEV Catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog based on evidence of active exploitation in the wild. The vulnerabilities are as follows - CVE-2023-1671 relates to a critical pre-auth command injection vulnerability that allows for the execution of arbitrary code. CVE-2023-2551 is a flaw in the WLS Core Components that allows an unauthenticated attacker with network access to compromise the WebLogic Server. There are currently no public reports documenting in-the-wild attacks leveraging the two flaws. On the other hand, the addition of CVE-2023-36584 to the KEV catalog is based on a report from Palo Alto Networks Unit 42 earlier this week, which detailed spear-phishing attacks mounted by pro-Russian APT group known as Storm-0978 (aka RomCom or Void Rabisu) targeting groups supporting Ukraine's admission into NATO in July 2023. CVE-2023-36584, patched by Microsoft as part of October 2023 security updates, is said to have been used alongside CVE-2023-36884, a Windows remote code execution vulnerability addressed in July, in an exploit chain to deliver PEAPOD, an updated version of RomCom RAT. In light of active exploitation, federal agencies are recommended to apply the fixes by December 7, 2023, to secure their networks against potential threats. Fortinet Disclosed Critical Command Injection Bug in FortiSIEM The development comes as Fortinet is alerting customers of a critical command injection vulnerability in FortiSIEM report server (CVE-2023-36553, CVSS score: 9.3) that could be exploited by attackers to execute arbitrary commands. CVE-2023-36553 has been described as a variant of CVE-2023-34992 (CVSS score: 9.7), a similar flaw in the same product that was remediated by Fortinet in early October 2023. "An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in FortiSIEM report server may allow a remote unauthenticated attacker to execute unauthorized commands via crafted API requests," the company said in an advisory this week. The vulnerability, which impacts FortiSIEM versions 4.7, 4.9, 4.10, 5.0, 5.1, 5.2, 5.3, and 5.4, has been fixed in versions 7.1.0, 7.0.1, 6.7.6, 6.6.4, 6.5.2, 6.4.3, or later.
Daily Brief Summary
The Cybersecurity and Infrastructure Security Agency (CISA) has added three actively exploited security flaws to its KEV catalog.
The vulnerabilities include CVE-2023-1671, a pre-auth command injection issue, and CVE-2023-2551, a flaw in WLS Core Components compromising WebLogic Server.
No in-the-wild attacks for CVE-2023-1671 and CVE-2023-2551 have been publicly reported yet.
CVE-2023-36584 was used by pro-Russian APT group Storm-0978 in spear-phishing attacks targeting supporters of Ukraine's NATO admission efforts.
Microsoft has patched CVE-2023-36584, which, along with CVE-2023-36884, formed part of an exploit chain delivering the PEAPOD malware variant of RomCom RAT.
CISA advises federal agencies to apply the necessary fixes by December 7, 2023, to mitigate risks.
Fortinet disclosed a critical command injection vulnerability (CVE-2023-36553) in FortiSIEM, with a fix available in newer versions of the software.