Register Now
June 21, 2024

Weekly Threat & Vulnerabilities Report

Executive Summary

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.

CVE-ID Type of vulnerability Severity CVSS Affected Product Exploited-in-Wild EPSS score CISA-KEV Zero-day OSS
CVE-2024-6045 Use of Hard-coded Credentials High 8.8 D-Link wireless routers False 0.0005 False False False
CVE-2024-37902 Path traversal High 10.0 Deep javalibrary False 0.00044 False False True
CVE-2024-30103 Remote Code Execution High 8.8 Microsoft Outlook False 0.0005 False False False
CVE-2023-32191 Information Disclosure Critical 10.0 Rancher Kubernetes Engine False Unknown False False True

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned. As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

Vulnerabilities Product Severity Title Exploited-in-Wild CISA KEV
CVE-2024-4577 PHP-CGI on Windows Critical Critical argument injection vulnerability in PHP on Windows servers True True
CVE-2024-1709 ConnectWise ScreenConnect Critical Authentication Bypass Vulnerability in ConnectWise ScreenConnect. True True
CVE-2023-38646 Metabase open source/Enterprise Critical Remote code execution vulnerability in Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1. True False

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

Vulnerability Product Title Exploit Abused by Botnet
CVE-2023-1389 TP-Link Archer AX21 An unauthenticated command injection vulnerability found in the TP-Link Archer AX21 WiFi router. True AGoent, Gafgyt, Moobot, Miori, Mirai, Condi
CVE-2017-17215 Huawei HG532 Remote code execution vulnerability in Huawei HG532 router True HinataBot, Zerobot, Mirai, Bashlite, Gitpaste, Beastmode, Enemybot, PerlBot, QakBot, Ircbot
CVE-2016-10372 Eir D1000 modem Improper protocol access control vulnerability in Eir D1000 modem True Bashlite, BrickerBot, Tsunami, Mirai

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.

Vulnerability Severity Title Patch Targeted By Malware OSS
CVE-2023-20867 Low Authentication bypass vulnerability in VMware Tools leads to remote code execution True UNC3886, VIRTUALPIE, VIRTUALSPHERE, VIRTUALPITA, REPTILE True
CVE-2022-22948 Medium Information disclosure vulnerability due to improper permission of files in vCenter server multiple versions True UNC3886, VIRTUALPIE, VIRTUALSPHERE, VIRTUALPITA, REPTILE False

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of vulnerability Product Reference
CVE-2024-5510 Out-Of-Bounds Read Kofax Power PDF Resource
CVE-2024-5511 Out-Of-Bounds Read Kofax Power PDF Resource
CVE-2024-2201 Information Disclosure Native Spectre v2 Resource
CVE-2024-5717 Command Injection Unified SecOps Platform Resource
CVE-2024-5719 Command Injection Unified SecOps Platform Resource

Subscribe to our Newsletter