Disgusting eight: CISA joins the list of actively exploited vulnerabilities

Carding

Professional
Messages
2,870
Reaction score
2,486
Points
113
8 well-forgotten vulnerabilities continue to be used in real attacks.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added eight new items to its catalog of known exploited vulnerabilities. The decision to add it was made based on data about the active exploitation of these vulnerabilities by intruders.

CVE-2022-22265: Vulnerability in Samsung mobile devices
The Use-After-Free vulnerability in Samsung mobile devices was identified under the number CVE-2022-22265 and a CVSS rating of 7.8 points. The vulnerability is related to incorrect checking or handling of exceptional conditions in the NPU driver and allows arbitrary writing to memory and execution of malicious code.

CVE-2014-8361: Vulnerability in the Realtek SDK
The vulnerability associated with incorrect verification of input data in the Realtek SDK is known as CVE-2014-8361 . The vulnerability allows remote attackers to execute arbitrary code using the created NewInternalClient request.

CVE-2017-6884: Vulnerability in Zyxel EMG2926 routers
The vulnerability, which allows you to execute arbitrary commands on Zyxel EMG2926 routers, was published under the number CVE-2017-6884 with a CVSS score of 8.8 points. An attacker can use multiple vectors to execute arbitrary commands on the router, such as the "ping_ip" parameter in the URI: expert/maintenance/diagnostic/nslookup.

CVE-2021-3129: Laravel Ignition vulnerability
The Laravel Ignition file upload vulnerability is known as CVE-2021-3129 and has a CVSS score of 9.8 points. Allows remote unauthorized attackers to execute arbitrary code on vulnerable websites due to unsafe use of the file_get_contents () and file_put_contents () functions.

Vulnerabilities in Owl Labs Meeting Owl
Four vulnerabilities were discovered in the Meeting Owl video surveillance products from Owl Labs:
  • CVE-2022-31459 (CVSS 6.5) - insufficient encryption strength, allows attackers to extract the access hash code using a specific value via Bluetooth.
  • CVE-2022-31461 (CVSS 6.5) - lack of authentication for critical functions, allows attackers to deactivate the password protection mechanism with a specific message.
  • CVE-2022-31462 (CVSS 8,8)-the use of hard-coded credentials allows attackers to control the device using a backdoor password that can be found in Bluetooth broadcast data.
  • CVE-2022-31463 (CVSS 7.1) — improper authentication, vulnerability does not require a password for Bluetooth commands, since only client-side authentication is used.

Conclusion and recommendations
These types of vulnerabilities, despite the fact that they have already been fixed in later versions of the software, are still often attack vectors for intruders and pose significant risks to federal networks.

CISA strongly recommends that all organizations prioritize timely removal of vulnerabilities from the catalog as part of their vulnerability management practices, which include updating vulnerable software to the latest versions.
 
Top