Get Help Now
CONTACT US

Get expert threat analysis weekly. Sign up to receive our Threat Briefing:

    RESOURCES  >   THREAT INTEL BRIEFINGS

    Date: 06/28/2023

    Fortinet FortiNAC Critical Remote Code Execution (RCE) Vulnerability

    Overview

    On June 23, 2023, Fortinet released a patch for a critical RCE vulnerability. CVE-2023-33299 vulnerability allows an unauthenticated attacker to execute code on unpatched FortiNAC devices.

    Potential Impact

    For organizations running FortiNAC on their WAN Ips, this could give attackers a foothold in the organization.

    Recommended Actions

    Reference the article below, and upgrade FortiNAC to the latest build.

    Request Consultation

    For a complimentary consultation, fill out the form below and we will be in touch soon.

      Number of Employees - select one:
      Industry - select one:

      Grafana Patches Critical Authentication Bypass Vulnerability

      Overview

      On June 28, 2023, Grafana released patches for a critical authentication bypass vulnerability. According to NIST, the CVE-2023-3128 vulnerability allows for “account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.”

      Potential Impact

      Account takeover in Grafana can lead to the exfiltration of whatever data is held in Grafana.

      Recommended Actions

      Upgrade Grafana to the latest release. The Bleeping Computer article linked below shows patch levels.

      Sources

      https://nvd.nist.gov/vuln/detail/CVE-2023-3128

      https://www.bleepingcomputer.com/news/security/grafana-warns-of-critical-auth-bypass-due-to-azure-ad-integration/

      CISA Adds VMware Vulnerabilities to Known Exploited Vulnerabilities Catalog

      Overview

      The U.S. Cybersecurity and Infrastructure Security Agency recently added six flaws to its Known Exploited Vulnerabilities (KEV) catalog. Among them were CVE-2023-20867 and CVE-2023-20887, vulnerabilities affecting VMware Tools and Aria Operations for Networks.

      Potential Impact

      CVE-2023-20867 is an authentication bypass vulnerability where VMware tools can be forced to fail to authenticate on a fully compromised ESXi host resulting in access to virtual machines. CVE-2023-20887 is a command injection vulnerability that an actor can compromise with network access to VMWare Aria Operations for Networks. Exploitation would result in remote code execution.

      Recommended Actions

      Threat actors are more commonly targeting virtualization infrastructure, making it critical that updates are applied regularly. Fixes for 2023-20867 and CVE-2023-20887 are available and should be used quickly. Additionally, regular internal vulnerability scanning is recommended to ensure the identification and tracking of vulnerability management efforts.

      Sources

      https://www.vmware.com/security/advisories/VMSA-2023-0012.html

      https://thehackernews.com/2023/06/us-cybersecurity-agency-adds-6-flaws-to.html

      https://www.vmware.com/security/advisories/VMSA-2023-0013.html

      New Cryptomining Campaign Targets Linux and IoT Devices

      Overview

      A new cryptocurrency mining campaign targeting Internet-facing Linux and IoT devices has been identified. The campaign targets SSH services in brute force attacks to gain initial access.

      Potential Impact

      Post-compromise activities include:

      • installing rootkit malware,
      • establishing command-and-control communications,
      • clearing logs and bash history,
      • consuming system resources for cryptocurrency mining
      • establishing persistence by installing a trojanized version of OpenSSH and adding public keys for all users on the system. 
      Recommended Actions

      Internet-facing SSH services should be removed or restricted if not needed for business operations. Furthermore, passwords should adhere to best practices and have a minimum length greater than 14 characters. External vulnerability scanning is an effective way of identifying which services are openly accessible from the Internet. If suspicious outbound traffic, such as IRC (Internet Chat Relay), is detected, the originating device should be isolated and reviewed for indicators of compromise.

      Sources

      https://thehackernews.com/2023/06/new-cryptocurrency-mining-campaign.html

      How can we help?

      If you need assistance with any of the Threats identified today or any other cybersecurity concerns, compliance issues or questions, please reach out through the contact button below.  We stand ready to assist!


      Let’s Discuss Your Cybersecurity Needs

      Contact Us  
      Privacy Settings
      We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
      Youtube
      Consent to display content from - Youtube
      Vimeo
      Consent to display content from - Vimeo
      Google Maps
      Consent to display content from - Google
      Spotify
      Consent to display content from - Spotify
      Sound Cloud
      Consent to display content from - Sound
      Contact Us