The U.S. Federal Bureau of Investigation (FBI) has sought assistance from the public in connection with an investigation involving the breach of edge devices and computer networks belonging to companies and government entities.
"An Advanced Persistent Threat group allegedly created and deployed malware (CVE-2020-12271) as part of a widespread series of indiscriminate computer intrusions designed
A vulnerability was found in Enel X JuiceBox Pro 3.0 22kW Cellular up to 2.1.1.0_JB3VU096A and classified as critical. This issue affects some unknown processing. The manipulation leads to improper authentication.
The identification of this vulnerability is CVE-2023-29117. The attack needs to be done within the local network. There is no exploit available.
A vulnerability has been found in Netgear R7000P 1.3.3.154 and classified as critical. This vulnerability affects unknown code of the file pppoe.cgi of the component POST Request Handler. The manipulation of the argument pppoe_localnetmask leads to stack-based buffer overflow.
This vulnerability was named CVE-2024-51019. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Netgear XR300 and R6400. This affects an unknown part of the file pppoe.cgi of the component POST Request Handler. The manipulation of the argument pppoe_localip leads to denial of service.
This vulnerability is uniquely identified as CVE-2024-51011. The attack can only be done within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Enel X JuiceBox Pro 3.0 22kW Cellular. Affected by this issue is some unknown functionality of the component Firmware Update Handler. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2023-29114. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Enel X JuiceBox Pro 3.0 22kW Cellular. Affected by this vulnerability is an unknown functionality. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2023-29116. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A 26-year-old man in Ontario, Canada has been arrested for allegedly stealing data from and extorting more than 160 companies that used the cloud data service Snowflake.
On October 30, Canadian authorities arrested Alexander Moucka, a.k.a. Connor Riley Moucka of Kitchener, Ontario, on a provisional arrest warrant from the United States. Bloomberg first reported Moucka's alleged ties to the Snowflake hacks on Monday.
At the end of 2023, malicious hackers learned that many large companies had uploaded huge volumes of sensitive customer data to Snowflake accounts that were protected with little more than a username and password (no multi-factor authentication required). After scouring darknet markets for stolen Snowflake account credentials, the hackers began raiding the data storage repositories used by some of the world’s largest corporations.
A vulnerability classified as critical has been found in D-Link DIR-823G 1.0.2B05. Affected is the function SetWanSettings of the component Request Handler. The manipulation of the argument HostName leads to command injection.
This vulnerability is traded as CVE-2024-51024. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Netgear XR300 1.0.3.78. It has been rated as critical. This issue affects some unknown processing of the file bridge_wireless_main.cgi of the component POST Request Handler. The manipulation of the argument ssid leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2024-51022. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability was found in D-Link DIR-823G 1.0.2B05. It has been declared as critical. This vulnerability affects the function SetNetworkTomographySettings of the component Request Handler. The manipulation of the argument Address leads to command injection.
This vulnerability was named CVE-2024-51023. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Netgear XR300, R6400 and R7000P. It has been classified as critical. This affects an unknown part of the file genie_fix2.cgi of the component Request Handler. The manipulation of the argument wan_gateway leads to command injection.
This vulnerability is uniquely identified as CVE-2024-51021. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Netgear R7000P 1.3.3.154 and classified as critical. Affected by this issue is some unknown functionality of the file usbISP_detail_edit.cgi of the component POST Request Handler. The manipulation of the argument apn leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2024-51020. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Netgear R7000P 1.3.3.154 and classified as critical. Affected by this vulnerability is an unknown functionality of the file pptp.cgi of the component POST Request Handler. The manipulation of the argument pptp_user_netmask leads to stack-based buffer overflow.
This vulnerability is known as CVE-2024-51018. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Netgear R7000P 1.3.3.154. Affected is an unknown function of the file l2tp.cgi of the component POST Request Handler. The manipulation of the argument l2tp_user_netmask leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2024-51017. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Netgear XR300 1.0.3.78. This issue affects some unknown processing of the file usb_approve.cgi of the component POST Request Handler. The manipulation of the argument addName%d leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2024-51016. Access to the local network is required for this attack. There is no exploit available.
A vulnerability classified as critical was found in Netgear XR300 1.0.3.78. This vulnerability affects unknown code of the file bridge_wireless_main.cgi of the component POST Request Handler. The manipulation of the argument ssid_an leads to stack-based buffer overflow.
This vulnerability was named CVE-2024-51014. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability classified as critical has been found in Netgear R7000P 1.3.3.154. This affects an unknown part of the file wireless.cgi of the component POST Request Handler. The manipulation of the argument RADIUSAddr%d_wla leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2024-51013. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in Netgear R8500 1.0.2.160. It has been rated as critical. Affected by this issue is some unknown functionality of the file ipv6_fix.cgi of the component POST Request Handler. The manipulation of the argument ipv6_pri_dns leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2024-51012. The attack may be launched remotely. There is no exploit available.