In November, we highlighted eight trending vulnerabilities. These represent the most dangerous security flaws, either currently being widely exploited by cybercriminals or likely to be exploited in the near future.
In November, we highlighted eight trending vulnerabilities. These represent the most dangerous security flaws, either currently being widely exploited by cybercriminals or likely to be exploited in the near future.
Three vulnerabilities were found in Microsoft products. The first one (CVE-2024-43451) allows the theft of the NTLMv2 hash1, which is used in Windows systems for authentication, enabling an attacker to authenticate on the network as a legitimate user. After that, the attackers can proceed to the next stages of the attack: escalating privileges to administrator level, executing malicious code, and moving laterally to other systems. Ultimately, they can gain full control over compromised devices, steal confidential data, or deploy malware.
The second vulnerability (CVE-2024-49039) allows an attacker to escalate privileges in Windows and execute commands to manage services, network settings, or user accounts. This could lead to a breach of confidential data.
The third vulnerability (CVE-2024-49040) affects Microsoft Exchange 2016 and 2019 mail servers, allowing attackers to spoof the sender addresses of incoming emails. This flaw can be exploited in phishing attacks to gain access to sensitive information.
Special attention should be given to the critical vulnerability, CVE-2024-47575, in the FortiManager management system. This vulnerability allows attackers to execute malicious code, gain access to confidential information, and obtain control over Fortinet devices within the corporate network. As a result, attackers can disrupt the operation of compromised devices or block traffic between segments, leading to network failures and reduced security.
Additionally, security researchers discovered the vulnerability CVE-2024-48990 in the needrestart utility of the Ubuntu Linux OS. The utility is used to identify processes that need to be restarted after updating system libraries. Exploiting this vulnerability enables attackers with local access to escalate their privileges to the superuser (root) level. This could lead to a breach of confidential data, injection of malware, as well as the deletion or modification of important files.
Two more vulnerabilities (CVE-2024-0012 and CVE-2024-9474) were discovered in products by Palo Alto Networks. By exploiting these flaws simultaneously, an unauthenticated attacker can gain administrator privileges and perform remote code execution on the compromised device. As a result, cybercriminals can obtain control of the system or its components, inject malware, disrupt device operation, or steal confidential data.
The vulnerability CVE-2024-11667 was found in Zyxel firewalls. The exploitation of this vulnerability enables attackers to remotely conduct a directory traversal attack2 and gain access to protected directories and files. This can lead to credential compromise, malware injection, failures in critical system and resources, and even ransom demands.
Read below to learn about these vulnerabilities, how they are exploited, and mitigation strategies in this digest.
The Windows vulnerabilities described below potentially affect around a billion devices, according to The Verge. Any users with outdated versions of Windows are potentially at risk.
1. NTLMv2 (NT LAN Manager version 2) is an authentication protocol used in Windows operating systems to ensure secure access to network resources.
2. A directory traversal attack is a type of cyberattack where attackers can bypass access restrictions and compromise protected resources. To do this, attackers exploit vulnerabilities related to improper handling of file and directory paths.