Weekly Threat & Vulnerabilities Report

May 24, 2024
Executive Summary
Trending / Critical Vulnerabilities
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Vulnerabilities abused by Botnet
Vulnerabilities Abused by Malware
PRE-NVD observed for this week
Subscribe to our Reports

Executive Summary

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.

CVE-IDType of vulnerabilitySeverityCVSSAffected ProductExploited-in-WildEPSS scoreCISA-KEVZero-dayOSS
CVE-2023-43208Remote Code Execution (RCE)Critical9.8NextGen Healthcare Mirth ConnectTrue0.95978TrueFalseFalse
CVE-2020-17519Improper access control vulnerabilityHigh7.5Apache FlinkTrue0.97227TrueFalseTrue
CVE-2024-4947Type ConfusionHigh8.8Google ChromeTrue0.00229TrueTrueTrue

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned. As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

VulnerabilitiesProductSeverityTitleCISA KEV
CVE-2023-49103ownCloud graphapiCriticalInformation Disclosure Vulnerability in ownCloud graphapi.True
CVE-2023-26801LB-LINKCriticalCommand injection vulnerability in LB-LINK devices.False
CVE-2023-1389TP-Link Archer AX-21HighCommand Injection Vulnerability in TP-Link Archer AX-21.True

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

VulnerabilityProductDescriptionExploitAbused by Botnet
CVE-2023-1389TP-Link Archer AX21An unauthenticated command injection vulnerability found in the TP-Link Archer AX21 WiFi router.TrueAGoent, Gafgyt, Moobot, Miori, Mirai, Condi
CVE-2023-26801Lb-Link DevicesCommand injection vulnerability in LB-LINKTrueMirai
CVE-2016-20016MVPower CCTV DVR modelsRemote code execution vulnerability in MVPower CCTV DVR modelsTrueIoT-Repear

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.

VulnerabilitySeverityDescriptionPatchTargeted By Malware
CVE-2024-30051HighElevation of Privilege (EoP) vulnerability in the Desktop Window Manager (DWM) Core Library of Microsoft Windows.TrueQakbot
CVE-2023-46805HighAuthentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.xTrueMirai

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-IDType of vulnerabilityProductReference
CVE-2023-50739Heap-Based Buffer OverflowLexmark CX331adweResource
CVE-2023-52718Connection Hijacking VulnerabilityHuawei home routersResources
CVE-2024-30420Server-side request forgerya-blog cms Versions earlier than Ver.3.1.12Resource
CVE-2024-2046Arbitrary local file readingTelegram Version 10.8.2Resource
CVE-2024-28880Path TraversalS-Mind LLCResource

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Latest Reports

Latest Reports