New and Legacy flaws added to the CISA KEV amid rising threat activity

December 20, 2024
Executive Summary
Trending / Critical Vulnerabilities
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Vulnerabilities abused by Botnet
Vulnerabilities Abused by Malware
PRE-NVD observed for this week
External References
Subscribe to our Reports

Executive Summary

This week saw the addition of eightvulnerabilities to the CISA Known Exploited Vulnerabilities (KEV) catalog,spotlighting a mix of new and legacy threats. Microsoft faced scrutiny with acritical flaw in its Windows Kernel-mode driver, while Adobe ColdFusion alsosaw a high-severity vulnerability added. BeyondTrust joined the list with asignificant entry, underscoring the diverse attack surface. Cleo remains underpressure with another vulnerability added to the catalog following last week’sentry. Additionally, the catalog now includes two legacy OS command injectionvulnerabilities in Reolink IP cameras and two more in NUUO NVRmini devices, emphasizingthe risk posed by unresolved legacy issues.

The surge in botnet activity has takena sharp turn, with Zerobot launching attacks on Tenda WiFi routers and Andoryuexploiting vulnerabilities in GitLab systems. IoT Reaper and AndroxGh0St remainrelentless, preying on outdated flaws in Cisco routers and PHP Unit. Adding tothe wave of exploits, veteran botnets Mirai, Tsunami, Brickerbot, and Bashlitehave zeroed in on an eight-year-old vulnerability in the Eir D1000 modem,underscoring the risks posed by legacy security gaps in critical infrastructure.

Ransomware and threat activity surgedthis week, with Cl0p ransomware operators claiming responsibility for attackson Cleo products, showcasing their ongoing impact. The discovery of NoviSpyspyware leveraging Qualcomm zero-day vulnerabilities further highlights thesophistication of emerging threats. Additionally, the FBI issued a starkwarning about HiatusRAT campaigns, which have evolved to target IoT devices,signaling a broader expansion in attack vectors.

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.  

CVE-2024-32520

A vulnerability in the Microsoft Windows Kernel-mode Driver, involving an untrusted pointer dereference, poses a significant threat by allowing attackers to execute malicious code with elevated system privileges upon successful exploitation. With a high CVSS score of 7.8, this vulnerability was disclosed and patched by Microsoft in June security advisory. While the vendor provided limited details at that time, the subsequent release of proof-of-concept (PoC) exploit has amplified the risk, making it easier for attackers to leverage this vulnerability. The flaw's critical nature led to its inclusion in the CISA Known Exploited Vulnerabilities (KEV) catalog, underscoring the urgency of mitigation efforts.

CVE-2024-20767

An improper access control vulnerability in Adobe ColdFusion, with a CVSS score of 7.4, allows attackers to access or modify restricted files, potentially exposing sensitive information. This high-severity flaw affects versions 2023.6, 2021.12, and earlier. The vulnerability has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, highlighting its critical nature. Additionally, the availability of a Proof of Concept (PoC) exploit further increases the risk, making it crucial for organizations to apply patches and mitigate the threat promptly.  

CVE-2024-55956

A critical vulnerability, with a CVSS Score of 9.8, has been identified in Cleo Harmony, VLTrader and Lexicom, affecting versions prior to 5.8.0.24. This flaw allows unauthenticated users to import and execute arbitrary Bash or PowerShell commands on the host system, posing a severe risk of system compromise. Due to its high impact, this vulnerability has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog recently.  

CVE-2024-12356

A command injection vulnerability rated critical (CVSS 9.8) has been identified in BeyondTrust's Privileged Remote Access (PRA) and Remote Support (RS) products, impacting versions 24.3.1 and earlier. This vulnerability, now added to the CISA Known Exploited Vulnerabilities (KEV) catalog, enables attackers to execute arbitrary commands, significantly escalating risks to affected systems.  

CVE-2022-23227

A missing authentication vulnerability in NUUO NVRmini 2 devices (versions through 3.11) allows unauthenticated attackers to upload an encrypted TAR archive, which can be exploited to add arbitrary users due to the lack of authentication in the handle_import_user.php function. When chained with another vulnerability (CVE-2011-5325), attackers can overwrite arbitrary files under the web root, ultimately achieving code execution with root privileges. This critical flaw has been recently added to the CISA KEV catalog, highlighting the urgent need for mitigation to prevent exploitation.

CVE-2021-40407

A critical OS command injection vulnerability in Reolink RLC-410W IP cameras (version 3.0.0.136_20121102) has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog. With a CVSS Score of 9.8, this flaw allows attackers to exploit the network settings functionality through crafted HTTP requests, posing a severe security risk. Immediate updates are essential to mitigate this critical threat.

CVE-2019-11001

Added recently to the CISA Known Exploited Vulnerabilities (KEV) catalog, this five-year-old OS command injection vulnerability impacts multiple Reolink IP camera models, including RLC-410W, C1 Pro, C2 Pro, RLC-422W and RLC-511W. This flaw allows an authenticated administrator to exploit the "TestEmail" functionality to inject and execute OS commands with root-level access.  

CVE-2018-14933

Recently added to the CISA Known Exploited Vulnerabilities (KEV) catalog, a six-year-old OS command injection vulnerability in NUUO NVRmini devices allows remote code execution. Having a CVSS Score of 9.8, this flaw exists in the upgrade_handle.php script, where shell metacharacters in the uploaddir parameter of the writeuploaddir command can be exploited.  This vulnerability underscores the importance of reviewing and securing legacy devices to mitigate critical security risks.

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned.  As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

Vulnerabilities Product Severity Title Exploited – in the-wild CISA KEV
CVE-2024-47176 OpenPrinting CUPS Medium Improper Input Validation vulnerability in OpenPrinting CUPS browsed through 2.0.1 leads to remote code execution True False
CVE-2024-3721 TBK DVR devices Medium OS Command Injection vulnerability in TBK DVR-4104 and DVR-4216 up to 20240412 True False
CVE-2024-23334 aiohttp High Path Traversal vulnerability in aiohttp leads to unauthorized access to arbitrary files True False
CVE-2023-26801 LB-LINK Critical Command injection vulnerability in LB-LINK devices. True False
CVE-2023-24488 Citrix ADC and Citrix Gateway Medium Cross site scripting vulnerability in Citrix ADC and Citrix Gateway. True False
CVE-2022-34045 Wavlink Devices Critical Hardcoded encryption/decryption key vulnerability in Wavlink True False
CVE-2022-25168 Apache Hadoop Critical Command injection vulnerability in org.apache.hadoop.fs.FileUtil.unTarUsingTar in Apache Hadoop False False
CVE-2022-22947 Spring Cloud Gateway Critical Remote code execution vulnerability in Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ True True
CVE-2022-30023 Tenda Devices High Command injection vulnerability via the Ping function in Tenda Products False False
CVE-2022-24847 GeoServer High Improper input validation vulnerability in GeoServer leads to arbitrary code execution False False
CVE-2022-47945 ThinkPHP Framework Critical Path Traversal Vulnerability in ThinkPHP Framework leads to arbitrary code execution. True False
CVE-2022-30075 TP-Link Router High Improper Validation vulnerability in TP-Link Router leads to remote code execution True False

Vulnerabilities abused by Botnet

Identifiedvulnerabilities exploited by botnets, including recent CVEs logged in Misp.Presenting the top 5 CVEs with payloads suggestive of botnet activities, likeutilizing wget with IP addresses.

Vulnerability Product Title Exploit Abused by Botnet
CVE-2022-30023 Tenda ONT GPON AC1200 Dual band WiFi HG9 v1.0.1 Command injection vulnerability via the Ping function in Tenda ONT GPON AC1200 Dual band WiFi HG9 v1.0.1 True Zerobot
CVE-2021-22205 Gitlab-Exiftool Remote code execution vulnerability in Gitlab-Exiftool True Andoryu
CVE-2017-9841 Util/PHP/eval-stdin.php in PHPUnit Arbitrary PHP code execution vulnerability in Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 True AndroxGh0st
CVE-2016-10372 Eir D1000 modem Improper protocol access control vulnerability in Eir D1000 modem True Bashlite BrickerBot Tsunami Mirai
CVE-2013-2678 Cisco Linksys E4200 1.0.05 Build 7 routers Local file inclusion vulnerability in Cisco Linksys E4200 1.0.05 Build 7 routers leads to obtain sensitive information or execute arbitrary code True IoTReaper

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.    

CVE-2024-55956

SecurityWeek confirmed that ClOp representatives have claimed responsibility for the recent attacks on Cleo products. Initially, the attacks were attributed to a new ransomware group called Termite, with some cybersecurity experts speculating a possible link between Termite and ClOp, potentially positioning Termite as ClOp's successor. However, Rapid7 researchers have noted that it is still possible that multiple threat groups were involved in the attacks.

NoviSpy Spyware leveraging Qualcomm Zero-day vulnerabilities

The Serbian government has been linked to the exploitation of Qualcomm zero-day vulnerabilities to deploy a new spyware, dubbed 'NoviSpy,' targeting activists, journalists, and protestors. Discovered by Amnesty International's Security Lab on a journalist's phone after it was returned by the police, NoviSpy appears to have been used by Serbian authorities based on its communication patterns. Researchers shared exploit artifacts with Google’s Threat Analysis Group (TAG), which identified vulnerabilities in Qualcomm's DSP (Digital Signal Processor) driver, specifically 'adsprpc,' used for multimedia processing. While Google has not confirmed the exact vulnerabilities exploited, evidence indicates that NoviSpy employs an exploit chain to bypass Android security mechanisms and achieve persistent kernel-level installation.

HiatusRAT Exploiting Web Cameras and DVRs

The FBI has issued a warning about HiatusRAT campaigns expanding their scope beyond outdated network edge devices, such as routers, to target Internet of Things (IoT) devices from manufacturers like Hikvision, D-Link, and Dahua. These campaigns have been observed in regions including the U.S., Australia, Canada, New Zealand, and the United Kingdom. HiatusRAT, a Remote Access Trojan (RAT) active since at least July 2022, enables malicious actors to remotely take control of targeted devices. Initially focused on network edge devices, the latest iterations of HiatusRAT demonstrate a broader and more aggressive approach, emphasizing the need for enhanced IoT security measures.

Vulnerability Severity Title Patch Targeted By Malware OSS
CVE-2024-55956 Critical Cleo Multiple Products Unauthenticated File Upload Vulnerability Yes ClOp ransomware False
CVE-2024-43047 High A use after free vulnerability in the Qualcomm Digital Signal Processor (DSP) service Yes NoviSpy spyware True
CVE-2024-49848 High A logic flaw in managing persistent mappings can lead to a Use-After-Free (UAF) scenario, where references to mappings are improperly released. No NoviSpy spyware False
CVE-2024-33060 High A race condition in fastrpc_mmap_create introduces a Use-After-Free (UAF) vulnerability, particularly during the handling of global memory maps resulting in kernel memory corruption. Yes NoviSpy spyware True
CVE-2024-21455 High Improper handling of the is_compat flag allows user-controlled pointers to be misinterpreted as kernel pointers, enabling read/write operations. This can be exploited by attackers to achieve privilege escalation. Yes NoviSpy spyware True
CVE-2024-38402 High A reference counting flaw in the driver can result in a Use-After-Free (UAF) vulnerability, potentially enabling attackers to execute arbitrary code within kernel space. Yes NoviSpy spyware False
CVE-2021-36260 Critical Command injection vulnerability in the web server of Hikvision products Yes HiatusRAT False
CVE-2021-33044 Critical An identity authentication bypass vulnerability found in some Dahua products Yes HiatusRAT False
CVE-2020-25078 High A password disclosure vulnerability in the /config/getsuer endpoint of D-Link. Yes HiatusRAT False
CVE-2018-9995 Critical An authentication bypass vulnerability in the TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, DVR Login, HVR Login, and MDVR Login No HiatusRAT False
CVE-2017-7921 Critical Improper authentication issue in Hikvision devices that can allow a malicious user to escalate privileges on the system and gain access to sensitive information. Yes HiatusRAT False

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of Vulnerability Product Reference
CVE-2024-51770 XML External Entity Hewlett Packard Enterprise AutoPass License Server Resource
CVE-2024-11249 Stack-based Buffer Overflow Fedora host package Resource
CVE-2024-7095 Denial of Service Arista EOS Resource
CVE-2024-4229 Incorrect Default Permissions Edgecross Basic Software for Windows Resource
CVE-2024-11944 Directory Traversal iXsystems TrueNAS CORE Resource

External References

  1. https://www.cisa.gov/news-events/alerts/2024/12/17/cisa-adds-one-known-exploited-vulnerability-catalog
  2. https://www.cisa.gov/news-events/alerts/2024/12/16/cisa-adds-two-known-exploited-vulnerabilities-catalog
  3. https://www.cisa.gov/news-events/alerts/2024/12/19/cisa-adds-one-known-exploited-vulnerability-catalog
  4. https://www.cisa.gov/news-events/alerts/2024/12/18/cisa-adds-four-known-exploited-vulnerabilities-catalog  
  5. https://vulnera.com/newswire/serbian-government-linked-to-novispy-spyware-exploiting-qualcomm-zero-day-vulnerabilities/  
  6. https://securitylab.amnesty.org/latest/2024/12/a-digital-prison-surveillance-and-the-suppression-of-civil-society-in-serbia/
  7. https://www.bleepingcomputer.com/news/security/new-android-novispy-spyware-linked-to-qualcomm-zero-day-bugs/  
  8. https://thehackernews.com/2024/12/novispy-spyware-installed-on.html?m=1  
  9. https://thehackernews.com/2024/12/cisa-and-fbi-raise-alerts-on-exploited.html  
  10. https://www.ic3.gov/CSA/2024/241216.pdf

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Latest Reports

Latest Reports