Weekly Threat & Vulnerabilities Report

June 7, 2024
Executive Summary
Trending / Critical Vulnerabilities
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Vulnerabilities abused by Botnet
Vulnerabilities Abused by Malware
PRE-NVD observed for this week
Subscribe to our Reports

Executive Summary

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.

CVE-IDType of vulnerabilitySeverityCVSSAffected ProductExploited-in-WildEPSS scoreCISA-KEVZero-dayOSS
CVE-2024-24919Information Disclosure VulnerabilityHigh8.6Check Point Quantum Security GatewaysTrue0.94504TrueTrueFalse
CVE-2024-1086Use-after-free vulnerabilityHigh7.8Linux KernelTrue0.00969TrueFalseFalse
CVE-2017-3506Code execution vulnerabilityHigh7.4Oracle WebLogic ServerTrue0.8686TrueFalseFalse

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned. As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

VulnerabilitiesProductSeverityTitleCISA KEV
CVE-2024-3273D-Link DNS devicesHighCommand Injection Vulnerability in D-Link NAS devicesTrue
CVE-2023-49103ownCloud graphapiCriticalInformation Disclosure Vulnerability in ownCloud graphapiTrue
CVE-2023-46747F5 BIG-IPCriticalF5 BIG-IP Configuration Utility Authentication Bypass VulnerabilityTrue

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

VulnerabilityProductDescriptionExploitAbused by Botnet
CVE-2023-1389TP-Link Archer AX21An unauthenticated command injection vulnerability found in the TP-Link Archer AX21 WiFi router.TrueAGoent, Gafgyt, Moobot, Miori, Mirai, Condi
CVE-2023-26801Lb-Link DevicesCommand injection vulnerability in LB-LINKTrueMirai
CVE-2017-17215Huawei HG532Remote code execution vulnerability in Huawei HG532 routerTrueHinataBot, Zerobot, Mirai, Bashlite, Gitpaste, Beastmode, Enemybot, PerlBot, QakBot, Ircbot

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.

VulnerabilitySeverityDescriptionPatchTargeted By Malware
CVE-2023-21839Highcritical vulnerability in Oracle WebLogic ServerTrue8220 Gang
CVE-2017-3506Highcritical vulnerability in the Oracle WebLogic ServerTrue8220 Gang

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-IDType of vulnerabilityProductReference
CVE-2024-28038Stack-Based Buffer OverflowMultiple multi-function printers by Sharp Corporation and ToshibaResources
CVE-2023-26322Remote Code ExecutionXiaomi Pro 13Resources
CVE-2021-32007Information disclosureSecomea GateManager webserverResources

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Latest Reports

Latest Reports