ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Tags
    3. vulnerability
    Log in to post
    • All categories
    • OksanaO

      Empower Your SOC Team with AI: Discover VMware's Project Cypress

      Watching Ignoring Scheduled Pinned Locked Moved Starwind starwind vmware nsx ai vulnerability soc
      1
      0 Votes
      1 Posts
      931 Views
      No one has replied
    • DustinB3403D

      Vulnerability Assessment and Alerting Solutions

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion siem vulnerability open source
      13
      0 Votes
      13 Posts
      2k Views
      DustinB3403D

      @IRJ Yeah I've tried openVAS in the past, it wasn't bad, but it also wasn't great.

      I've ended up making some changes to my firewall and using Wazuh to report on my endpoints that are remote to our datacenter.

      Which works well enough for our needs

    • gjacobseG

      New secret-spilling hole in Intel CPUs sends company patching (again)

      Watching Ignoring Scheduled Pinned Locked Moved News intel pentium celeron atom vulnerability apollo lake gemini lake gemini lake refresh fuse encryption key
      4
      3 Votes
      4 Posts
      818 Views
      ObsolesceO

      @scottalanmiller said in New secret-spilling hole in Intel CPUs sends company patching (again):

      If you build in a back door, people will use it.

      So tired of Intel's messes.

    • DustinB3403D

      Scanning Domain for Shared Printers

      Watching Ignoring Scheduled Pinned Locked Moved Unsolved IT Discussion printnightmare windows domain scanning printers vulnerability discovery
      9
      1 Votes
      9 Posts
      868 Views
      notverypunnyN

      @dustinb3403

      Oh, yeah that changes things... advanced ip scanner as others have suggested might be the safest thing.

      We've pushed the config to "Disable the “Allow Print Spooler to accept client connections:” policy to block remote attacks."

      Option 2 at the link below:

      https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527

    • DustinB3403D

      Substantial OnPremise Exchange Vulnerabilities announced yesterday Patch Immediately

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion microsoft exchange on-premise vulnerability critical update
      5
      2 Votes
      5 Posts
      722 Views
      DustinB3403D

      @dbeato said in Substantial OnPremise Exchange Vulnerabilities announced yesterday Patch Immediately:

      @DustinB3403 Yeah, Exchange 2013 and over. You have to also be on the last 2 Cumulative Updates from Exchange 2013, 2016 or 2019. For 2019 You only can get the updates through Microsoft Volume Licensing.

      Yeah, a customer attempted an update from 2016 CU15.1 to CU19, it errored out on the last step, they restored (bad move) and had some mail flow issues for a bit.

      But they are back online now

    • ObsolesceO

      ADV200005 | Server Message Block 3.1.1 (SMBv3) Vulnerability & Workaround

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion smbv3 vulnerability mitigation workaround
      2
      0 Votes
      2 Posts
      396 Views
      PhlipElderP

      @Obsolesce said in ADV200005 | Server Message Block 3.1.1 (SMBv3) Vulnerability & Workaround:

      ADV200005 | Microsoft Guidance for Disabling SMBv3 Compression

      Microsoft is aware of a remote code execution vulnerability in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target SMB Server or SMB Client.

      To exploit the vulnerability against an SMB Server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 Server. To exploit the vulnerability against an SMB Client, an unauthenticated attacker would need to configure a malicious SMBv3 Server and convince a user to connect to it.

      Workarounds

      The following workaround may be helpful in your situation. In all cases, Microsoft strongly recommends that you install the updates for this vulnerability as soon as they become available even if you plan to leave this workaround in place:

      Disable SMBv3 compression

      You can disable compression to block unauthenticated attackers from exploiting the vulnerability against an SMBv3 Server with the PowerShell command below.

      Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" DisableCompression -Type DWORD -Value 1 -Force

      Notes:

      No reboot is needed after making the change. This workaround does not prevent exploitation of SMB clients.

      You can disable the workaround with the PowerShell command below.

      Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" DisableCompression -Type DWORD -Value 0 -Force

      Keep in mind that the vulnerability is only listed for Windows 10 1903 and up and Windows Server Semi-Annual Channel 1903 and up.

      Folks should have inbound file/print turned off at user endpoints via Group Policy anyway so that eliminates that vector.

      We don't deploy containers so no Server SAC anywhere in our stable.

    • dbeatoD

      Sonicwall Management Vulnerability

      Watching Ignoring Scheduled Pinned Locked Moved News vulnerability sonicwall management patch patching
      1
      3 Votes
      1 Posts
      467 Views
      No one has replied
    • PhlipElderP

      D-Link DWR Series Vulnerability - Trivial Total Takeover

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion d-link security vulnerability d-link dwr router networking
      2
      1 Votes
      2 Posts
      498 Views
      scottalanmillerS

      Only so serious, it's in D-Link gear. Bwahaha

    • DustinB3403D

      rTorrent vulnerability allows hackers to use your system resources to mine Crypto

      Watching Ignoring Scheduled Pinned Locked Moved News unix crypto currency mining vulnerability
      1
      3 Votes
      1 Posts
      632 Views
      No one has replied
    • dbeatoD

      Intel finds critical holes in secret Management Engine hidden in tons of desktop, server chipsets

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion intel firmware vulnerability
      27
      2 Votes
      27 Posts
      3k Views
      scottalanmillerS

      @dashrender said in Intel finds critical holes in secret Management Engine hidden in tons of desktop, server chipsets:

      Here is a program Intel put together to tell you if you are vulnerable to this and several other security flaws they have found.

      https://downloadcenter.intel.com/download/27150

      But be warned, it's written by a company known to not understand security or be concerned about its customers. So...

    • DustinB3403D

      Linux vulnerability found - effecting Debian and RedHat

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion linux kernel vulnerability security patching
      10
      2 Votes
      10 Posts
      2k Views
      stacksofplatesS

      @jmoore said in Linux vulnerability found - effecting Debian and RedHat:

      @stacksofplates Oh that is interesting, I didn't know that.

      Ya it forces it to use the legacy mmap layout which isn't vulnerable. Once you are able to reboot then you should be able to remove it.

    • DustinB3403D

      Apache Struts - Critical Security Flaw

      Watching Ignoring Scheduled Pinned Locked Moved News apache struts vulnerability httpd equifax breach millions
      21
      0 Votes
      21 Posts
      4k Views
      coliverC

      @jaredbusch said in Apache Struts - Critical Security Flaw:

      Was the Eqifax breech because of the march strus flaw or a more recent one?

      Just making sure the actual facts are known.

      The one from March.

    • AmbarishrhA

      Thousands of Hacked Home Routers are Attacking WordPress Sites. Check your home router

      Watching Ignoring Scheduled Pinned Locked Moved News wordpress vulnerability router wordfence
      1
      4 Votes
      1 Posts
      915 Views
      No one has replied
    • coliverC

      Ubiquiti vulnerability

      Watching Ignoring Scheduled Pinned Locked Moved News php ubiquiti ubnt vulnerability security
      14
      0 Votes
      14 Posts
      3k Views
      JaredBuschJ

      @stacksofplates said in Ubiquiti vulnerability:

      @JaredBusch said in Ubiquiti vulnerability:

      @stacksofplates said in Ubiquiti vulnerability:

      @JaredBusch said in Ubiquiti vulnerability:

      None of that is the EdgeMax series.

      That is all the original wireless stuff before even the Unifi line.

      Yes it is all still currently available, but not nearly as horrible as that article is trying to insinuate.

      All that gear should be behind a router normally.

      Ya I was looking through it and noticed that. The tough switch was in there, but that's the only non bridge type device I saw.

      The tough switch has been a dead product for years.

      Ah didn't realize that. I've seen it for sale a few places, but never noticed they weren't produced any more.

      It might still be produced, but it has not been developed against at all.

    • scottalanmillerS

      Proposed Email Attack Vector

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion security email vulnerability social engineering
      4
      3 Votes
      4 Posts
      1k Views
      brad_altnB

      Thanks for sharing this, Scott. Threats are always evolving!

    • AmbarishrhA

      Patch for Asterisk Denial of Service

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion asterisk dos patch vulnerability
      1
      2 Votes
      1 Posts
      940 Views
      No one has replied
    • mlnewsM

      Major Linux TCP Stack Vulnerability Discovered

      Watching Ignoring Scheduled Pinned Locked Moved News zdnet security linux android tcp networking vulnerability
      2
      4 Votes
      2 Posts
      1k Views
      mlnewsM

      On the Ubuntu Linux family, for instance, you can fix it with the following steps:

      Open /etc/sysctl.conf, with an editor, such as vim. Enter the line: net.ipv4.tcp_challenge_ack_limit = 999999999 Save the file. Use the shell command "sysctl -p" to update the configuration.
    • DustinB3403D

      AI self detects - test and patches security vulnerabilities at Defcon

      Watching Ignoring Scheduled Pinned Locked Moved News artificial intelligence self programming defcon darpa vulnerability security
      4
      2 Votes
      4 Posts
      1k Views
      scottalanmillerS

      I used to live on campus at CM with @AndyW

    • IRJI

      Help fixing X.509 Certificate Vulnerability

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion certificates x.509 security vulnerability
      1
      1 Votes
      1 Posts
      802 Views
      No one has replied
    • JaredBuschJ

      KeePass dev refuses to patch security hole in favor of ad revenue

      Watching Ignoring Scheduled Pinned Locked Moved News keepass security vulnerability password managers lastpass
      29
      2 Votes
      29 Posts
      6k Views
      stacksofplatesS

      So I guess I should have specified in the other thread. I use KeePassx and it's updated through yum. And the Android version of Keepass2Android (the one I use) isn't maintained by the same people.

    • 1
    • 2
    • 1 / 2