It’s still unclear whether customer data has been compromised
Yearly Archives: 2023
Microsoft Patch Tuesday Fixed Zero Day Elevation of Privilege Vulnerability (CVE-2023-21674)
Microsoft has released 98 security patches for this month’s January 2023 Patch Tuesday release. One of the fixes is for CVE-2023-21674 (Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability). The vulnerability is rated critical, and exploitation of the vulnerability was observed in the field by Microsoft. This has a CVSS score of 8.8.Why is this Significant?This is significant because Microsoft observed CVE-2023-21674 being exploited as a 0-day, as such the patch should be applied as soon as possible. As CVE-2023-21674 is a local privilege escalation vulnerability, attackers need to either chain the exploit for CVE-2023-21674 with other exploit(s) or have already gain access to the victim’s network, which lower the severity.What is CVE-2023-21674?CVE-2023-21674 is a Local Privilege Escalation vulnerability in Windows Advanced Local Procedure Call (ALPC), which attackers can exploit for a browser sandbox escape to gain SYSTEM privileges in vulnerable systems.Has the Vendor Released an Advisory?Yes, Microsoft released an advisory. See the Appendix for a link to “Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability”.Has the Vendor Released a Patch for CVE-2023-21674?Yes, Microsoft released a patch for CVE-2023-21674 as part of January Patch Tuesday on January 10, 2023.What is the Status of Protection?FortiGuard Labs has released the following IPS signature for CVE-2023-21674 in version 22.472 on January 10th, 2023:MS.Windows.ALPC.CVE-2023-21674.Privilege.Elevation (default action is set to “pass”)
Post-ransomware attack, The Guardian warns staff their personal data was accessed
Three weeks after The Guardian newspaper was hit by a ransomware attack, it warns staff members that their personal data was accessed.
Free decryptor for victims of MegaCortex ransomware released
The experts at security firm Bitdefender have released a universal decryptor for victims of the MegaCortex family of ransomware, which is estimated to have caused more than 1800 infections – mostly of businesses.
Cybercriminals bypass Windows security with driver-vulnerability exploit
The Scattered Spider cybercrime group has recently been observed attempting to deploy a malicious kernel driver using a tactic called bring your own vulnerable driver (BYOVD) — a warning to security professionals that the technique, which exploits longstanding deficiencies in Windows kernel protections, is still being employed by cybercriminals, according to cybersecurity company CrowdStrike.
In this latest BYOVD attack, which was observed and stopped by CrowdStrike’s Falcon security system, Scattered Spider attempted to deploy a malicious kernel driver via a vulnerability — CVE-2015-2291 in MITRE’s Common Vulnerability and Exposures program — in the Intel Ethernet diagnostics driver for Windows (iqvw64.sys).
phoronix-test-suite-10.8.4-2.el8
FEDORA-EPEL-2023-be2f5c557d
Packages in this update:
phoronix-test-suite-10.8.4-2.el8
Update description:
Security fix for CVE-2022-40704
phoronix-test-suite-10.8.4-2.el9
FEDORA-EPEL-2023-a67e0f6221
Packages in this update:
phoronix-test-suite-10.8.4-2.el9
Update description:
Security fix for CVE-2022-40704
phoronix-test-suite-10.8.4-2.el7
FEDORA-EPEL-2023-f2c2f32842
Packages in this update:
phoronix-test-suite-10.8.4-2.el7
Update description:
Security fix for CVE-2022-40704
phoronix-test-suite-10.8.4-2.fc37
FEDORA-2023-e363201a4c
Packages in this update:
phoronix-test-suite-10.8.4-2.fc37
Update description:
Security fix for CVE-2022-40704
phoronix-test-suite-10.8.4-2.fc36
FEDORA-2023-40e14b37c2
Packages in this update:
phoronix-test-suite-10.8.4-2.fc36
Update description:
Security fix for CVE-2022-40704