May 17, 2024

Weekly Threat & Vulnerabilities Report

Executive Summary

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.

CVE-ID Type of vulnerability Severity CVSS Affected Product Exploited-in-Wild EPSS score CISA-KEV Zero-day OSS
CVE-2024-30051 Privilege Escalation High 7.8 Windows DWM Core Library True 0.00144 True True False
CVE-2024-30040 Security Feature Bypass High 8.8 Windows MSHTML Platform True 0.00806 True True False
CVE-2024-4947 Type Confusion High - Google Chrome True Unknown False True False

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned. As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

Vulnerabilities Product Severity Title CISA KEV
CVE-2024-3273 D-Link DNS devices High Command Injection vulnerability in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403 True
CVE-2023-4966 Citrix Netscaler High Sensitive information disclosure vulnerability in NetScaler ADC and NetScaler Gateway True
CVE-2023-38646 Metabase open source/Enterprise Critical Remote code execution vulnerability in Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1. False

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

Vulnerability Product Title Exploit Abused by Botnet
CVE-2023-26801 LB-LINK Devices Command injection vulnerability affecting LB-LINK routers. True Mirai
CVE-2023-1389 TP-Link Archer AX21 An unauthenticated command injection vulnerability found in the TP-Link Archer AX21 WiFi router. True AGoent, Gafgyt, Moobot, Miori, Mirai, Condi

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.

Vulnerability Severity Title Patch Targeted By Malware OSS
CVE-2024-30051 High Elevation of Privilege (EoP) vulnerability in the Desktop Window Manager (DWM) Core Library of Microsoft Windows. True Qakbot False

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of vulnerability Product Reference
CVE-2024-30658 Denial-of-Service ROS Melodic Morenia (ROS_VERSION=1 and ROS_PYTHON_VERSION=3) Resource
CVE-2024-30419 Stored cross-site scripting a-blog cms Versions earlier than Ver.3.1.12 Resource
CVE-2024-30420 Server-side request forgery a-blog cms Versions earlier than Ver.3.1.12 Resource
CVE-2024-2046 Arbitrary local file reading Telegram Version 10.8.2 Resource
CVE-2024-28880 Path Traversal S-Mind LLC Resource

Subscribe to our Newsletter