You are here

Cybersecurity

TFlower – The Latest Ransomware Targeting Businesses

TFlower has emerged as the latest ransomware targeting corporate environments, gaining entry into networks through exposed Remote Desktop Protocol (RDP) services. TFlower was actually discovered in August, and at the time it was thought to just be another generic ransomware. But TFLower activity is reported to be picking up. While TFlower’s rise in the ransomware environment may have come as a surprise, its method for infecting systems shouldn’t be.

Honeywell Performance IP Cameras and Performance NVRs (ICSA-19-260-03) – Product Used in the Energy Sector

CISA has released an advisory on an information exposure vulnerability in Honeywell Performance IP Cameras and Performance NVRs. Numerous products and versions of the products are affected. Successful exploitation of this vulnerability could allow an attacker to view device configuration information. Honeywell has released firmware update packages for all affected products.  CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

Siemens SINEMA Remote Connect Server (ICSA-19-260-02) – Product Used in the Water and Wastewater and Energy Sectors

CISA has released an advisory on improper restriction of excessive authentication attempts, information exposure, cross-site request forgery, and use of password hash with insufficient computational effort vulnerabilities in Siemens SINEMA Remote Connect Server. Versions prior to 2.0 SP1 are affected. Successful exploitation of these vulnerabilities may allow an attacker unauthorized access to the web interface, improper access to privileged user and device information, and may allow successful CSRF attacks.

Advantech WebAccess (ICSA-19-260-01) – Product Used in the Water and Wastewater and Energy Sectors

CISA has released an advisory on code injection, command injection, stack-based buffer overflow, and improper authorization vulnerabilities in Advantech WebAccess. Versions 8.4.1 and prior are affected. Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, access files and perform actions at a privileged level, or delete files on the system. Advantech has released Version 8.4.2 of WebAccessNode to address the reported vulnerabilities. CISA also recommends a series of measures to mitigate the vulnerabilities.

Top 25 Most Dangerous Software Errors

MITRE has released the 2019 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Errors list. It is a compilation of the most frequent and critical errors that can lead to serious vulnerabilities in software. MITRE notes these weaknesses are often easy to find and exploit and are dangerous because they frequently allow adversaries to completely take over execution of software, steal data, or prevent the software from working. Access the list at MITRE.

3S-Smart Software Solutions GmbH CODESYS V3 Products Containing a CODESYS Communication Server (ICSA-19-255-05)

CISA has published an advisory on an improper input validation vulnerability in 3S-Smart Software Solutions GmbH CODESYS V3 Products Containing a CODESYS Communication Server. Numerous products and versions of these products are affected. Successful exploitation of this vulnerability could cause a denial-of-service condition. 3S-Smart Software Solutions GmbH has released Version 3.5.15.0 to resolve this vulnerability for all affected CODESYS products. CISA also recommends a series of measures for mitigating the vulnerability.

3S-Smart Software Solutions GmbH CODESYS Control V3 OPC UA Server (ICSA-19-255-04)

CISA has published an advisory on a NULL pointer reference vulnerability in 3S-Smart Software Solutions GmbH CODESYS Control V3 OPC UA Server. Numerous products and versions of these products are affected. Successful exploitation of this vulnerability could cause a denial-of-service condition. 3S-Smart Software Solutions GmbH has released Version 3.5.15.0 to resolve this vulnerability for all affected CODESYS products. CISA also recommends a series of measures for mitigating the vulnerability.

3S-Smart Software Solutions GmbH CODESYS Control V3 Online User Management (ICSA-19-255-03)

CISA has published an advisory on an incorrect permission assignment for critical resource vulnerability in 3S-Smart Software Solutions GmbH CODESYS Control V3 Online User Management. Numerous products and versions of these products are affected. Successful exploitation of this vulnerability could allow unauthorized actors access to unintended functionality and/or information. 3S-Smart Software Solutions GmbH has released Version 3.5.13.0 to resolve this vulnerability for all affected CODESYS products. CISA also recommends a series of measures for mitigating the vulnerability.

3S-Smart Software Solutions GmbH CODESYS V3 Web Server (ICSA-19-255-01)

CISA has published an advisory on path traversal and stack-based buffer overflow vulnerabilities in 3S-Smart Software Solutions GmbH CODESYS V3 web server. Numerous products and versions of these products are affected. Successful exploitation of these vulnerabilities may allow an attacker to create a denial-of-service condition, to perform remote code execution, or to access restricted files. 3S-Smart Software Solutions GmbH has released Versions 3.5.12.80, 3.5.14.10, and 3.5.15.0 to resolve the vulnerabilities for the affected CODESYS products.

Pages

Subscribe to Cybersecurity