CISA Sounds the Alarm: Zero-Day Vulnerabilities Rock Apple, VMware, and Palo Alto Networks

November 22, 2024
Executive Summary
Trending / Critical Vulnerabilities
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Vulnerabilities abused by Botnet
Vulnerabilities Abused by Malware
PRE-NVD observed for this week
External References
Subscribe to our Reports

Executive Summary

CISA has added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog this week, including critical flaws in software from Apple, VMware, and Palo Alto Networks emphasizing the urgency for swift mitigation efforts across these platforms.  

Apple has addressed two critical zero-day vulnerabilities actively exploited in the wild, while Palo Alto Networks attributes a key flaw to "Operation Lunar Peek," without disclosing details about the attackers. Meanwhile, Sekoia’s TDR team has identified a Linux variant of Helldown ransomware exploiting a vulnerability in Zyxel firewalls to establish initial access.

The IoT_Reaper botnet remains active, exploiting vulnerabilities in MVPower CCTV DVRs to secure its position in the current threat landscape. Zerobot has redirected its attention to a vulnerability in the Apache HTTP server that has been exposed for three years. In parallel, other persistent botnets like Enemybot, LiquorBot, and Mirai continue to target a nine-year-old flaw in D-Link DIR 645 routers. These activities underscore a significant trend—long-standing vulnerabilities are still prime targets for cybercriminals, emphasizing the ongoing risk of outdated, unpatched systems in the face of evolving threats.

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.  

CVE-2024-0012

A critical authentication bypass vulnerability in PAN-OS (CVSS 9.8), now included in the CISA Known Exploited Vulnerabilities (KEV) catalog, enables attackers with network access to the management web interface to escalate privileges to an administrator level. This flaw arises from inadequate authentication in a critical function, providing unauthorized access to perform administrative actions, modify configurations, or exploit related privilege escalation vulnerabilities, such as CVE-2024-9474.

CVE-2024-9474

A command injection vulnerability in PAN-OS enables administrators with access to the management web interface to escalate their privileges and execute commands on the firewall with root-level permissions. While Palo Alto Networks has not explicitly linked CVE-2024-0012 and CVE-2024-9474, the available details suggest the possibility of both vulnerabilities being leveraged in a coordinated exploit chain. This vulnerability has also been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, emphasizing its critical nature.

CVE-2024-1212

Progress Kemp LoadMaster is affected by a critical command injection vulnerability (CVSS 10), which enables unauthenticated attackers to compromise the management interface, risking the system's security and integrity. This vulnerability, now listed in the CISA KEV catalog, is further escalated by the public availability of a Proof-of-concept (PoC) exploit, making immediate patching a priority.

CVE-2024-8068 & CVE-2024-8069

A privilege escalation to NetworkService Account access and a limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording Storage Manager. Watch Tower Labs has reported the flaw, and a proof-of-concept (PoC) exploit is now available, increasing the urgency for remediation.

CVE-2024-11120

A critical pre-authentication command injection vulnerability (CVSS 9.8) in GeoVision devices has been actively exploited by a botnet, enabling large-scale DDoS attacks and crypto mining on affected systems, particularly targeting end-of-life models.  

CVE-2024-38812

A critical heap overflow vulnerability rated CVSS 9.8 in VMware vCenter Server and VMware Cloud Foundation enables attackers with network access to trigger remote code execution using specially crafted packets. This issue affects versions 8.0U3a and earlier and has been included in the CISA Known Exploited Vulnerabilities (KEV) catalog.

CVE-2024-38813

A critical privilege escalation flaw in VMware vCenter Server and VMware Cloud Foundation (CVSS 9.8) allows attackers with network access to gain root-level privileges by leveraging specially crafted network packets. This vulnerability affects versions 8.0U3a and earlier and has been included in the CISA Known Exploited Vulnerabilities (KEV) catalog.  

CVE-2024-44308 and CVE-2024-44309

Two actively exploited zero-day vulnerabilities on Intel-based Mac Systems have been resolved by Apple. These include CVE-2024-44309, a cross-site scripting vulnerability targeting Safari's WebKit engine, and CVE-2024-44308, an arbitrary code execution vulnerability linked to JavaScriptCore. Discovered and reported by Google's Threat Analysis Group (TAG), both vulnerabilities have been added to the CISA Known Exploited Vulnerabilities (KEV) catalog.

CVE-2024-21287

A high-severity incorrect authorization vulnerability in Oracle Agile Product Lifecycle Management (PLM) Framework (CVSS 7.5) enables unauthenticated remote attackers to exploit the flaw via HTTP or HTTPS protocols, potentially disclosing files. This issue impacts version 9.3.6 and has been included in the CISA KEV catalog.

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned.  As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

Vulnerability Product Severity Title Exploited – In the Wild CISA KEV
CVE-2024-4577 PHP-CGI on Windows High Critical argument injection vulnerability in PHP on Windows servers True True
CVE-2023-31192 Softether VPN Critical Information Disclosure vulnerability in the ClientConnect() functionality of SoftEther VPN 5.01.9674 True False
CVE-2023-38646 Metabase open source and Metabase Enterprise Critical Remote code execution vulnerability in Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 True True
CVE-2022-30489 Wavlink Devices Medium Cross-site scripting vulnerability in Wavlink Devices False False
CVE-2022-25168 Apache Hadoop Critical Command injection vulnerability in org.apache.hadoop.fs.FileUtil.unTarUsingTar in Apache Hadoop False False
CVE-2022-22947 Spring Cloud Gateway Critical Remote code execution vulnerability in Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ True True
CVE-2022-30023 Tenda Devices High Command injection vulnerability via the Ping function in Tenda Products False False
CVE-2022-34045 Wavlink Devices Critical Hardcoded encryption/decryption key vulnerability in Wavlink False False
CVE-2022-24847 GeoServer High Improper input validation vulnerability in GeoServer leads to arbitrary code execution False False

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

Vulnerability Product Title Exploit Abused by Botnet
CVE-2021-41773 Apache HTTP Server Path traversal vulnerability in Apache HTTP Server True Zerobot
CVE-2016-20016 MVPower CCTV DVR models Remote code execution vulnerability in MVPower CCTV DVR models True IoT-Repear
CVE-2015-2051 D-Link DIR-645 Arbitrary command execution vulnerability in D-Link DIR-645 Wired/Wireless Router False Hakai
Yowai
Mirai
LiquorBot
BotenaGo
Enemybot

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.    

CVE-2024-0012

Palo Alto Networks has linked the exploitation of this specific vulnerability to an operation they have named "Operation Lunar Peek." However, details regarding the threat actor behind these attacks remain undisclosed. The company has shared several indicators of compromise (IoCs), including IP addresses and a hash associated with a PHP webshell payload found on compromised firewalls. Notably, much of the activity has been traced back to IP addresses tied to anonymous VPN services.  

CVE-2024-42057

A high-severity command injection vulnerability (CVSS 8.1) in the IPSec VPN feature of specific firewall versions allows unauthenticated attackers to execute arbitrary OS commands by sending a crafted username to the target device. Sekoia’s Threat Detection & Research (TDR) team has identified the Linux variant of Helldown ransomware leveraging this vulnerability to gain initial access.

Vulnerability Severity Title Patch Targeted By Malware OSS
CVE-2024-0012 Critical Authentication bypass vulnerability in the Palo Alto Networks PAN-OS Software. Yes Operation LunarPeek campaign False
CVE-2024-42057 High Command injection vulnerability in IPSec VPN feature Yes Helldown Ransomware False

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of Vulnerability Product Reference
CVE-2024-47142 Improper Access Control Aiphone IXG SYSTEM Resource
CVE-2024-9758 Out-Of-Bounds Read Tungsten Automation Power PDF Resource
CVE-2024-9258 Remote Code Execution IrfanView Resource
CVE-2024-9665 Information Disclosure Zimbra Resource
CVE-2024-9718 Out-Of-Bounds Read Trimble SketchUp Viewer Resource

External References

  1. https://www.cisa.gov/news-events/alerts/2024/11/18/cisa-adds-three-known-exploited-vulnerabilities-catalog  
  2. https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/  
  3. https://labs.watchtowr.com/visionaries-at-citrix-have-democratised-remote-network-access-citrix-virtual-apps-and-desktops-cve-unknown/  
  4. https://www.darkreading.com/cloud-security/citrix-patches-zero-day-recording-manager-bugs  
  5. https://www.cisa.gov/news-events/alerts/2024/11/21/cisa-adds-three-known-exploited-vulnerabilities-catalog  
  6. https://www.cisa.gov/news-events/alerts/2024/11/20/cisa-adds-two-known-exploited-vulnerabilities-catalog
  7. https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-vmware-vcenter-server-now-exploited-in-attacks/
  8. https://thehackernews.com/2024/11/apple-releases-urgent-updates-to-patch.html
  9. https://blog.sekoia.io/helldown-ransomware-an-overview-of-this-emerging-threat/

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Latest Reports

Latest Reports