Aggregator
CVE-2024-45690 | Moodle oauth2 resource injection
印度外包巨头创始人称周末是一种错误
CVE-2024-8403 | Mitsubishi Electric MELSEC iQ-F FX5-ENET IP SLMP Packet improper validation of specified type of input
CVE-2024-10855 | Sirv Plugin up to 7.3.0 on WordPress authorization
CVE-2024-10900 | ProfileGrid Plugin up to 5.9.3.6 on WordPress User Meta authorization
CVE-2024-10899 | WooCommerce Product Table Lite Plugin up to 3.8.6 on WordPress Shortcode cross site scripting
CVE-2024-9239 | Booster for WooCommerce Plugin up to 7.2.3 on WordPress cross site scripting
CVE-2024-11278 | GD bbPress Attachments Plugin up to 4.7.2 on WordPress cross site scripting
CVE-2024-11277 | 404 Solution Plugin up to 2.35.19 on WordPress cross site scripting
CVE-2024-9653 | Restaurant Menu Plugin up to 2.4.2 on WordPress cross site scripting
CVE-2024-8726 | MailMunch MailChimp Forms Plugin up to 3.2.3 on WordPress cross site scripting
CVE-2024-11179 | MStore API Plugin up to 4.15.7 on WordPress sql injection
CVE-2024-10872 | Getwid Plugin up to 2.0.12 on WordPress cross site scripting
CVE-2024-10891 | Pdfcrowd Save as PDF Plugin up to 4.2.1 on WordPress cross site scripting
CVE-2024-10665 | Yaad Sarig Payment Gateway for WC Plugin up to 2.2.4 on WordPress Log authorization
FACT SHEET: U.S. Department of Commerce & U.S. Department of State Launch the International Network of AI Safety Institutes at Inaugural Convening in San Francisco
USDA Releases Success Story Detailing the Implementation of Phishing-Resistant Multi-Factor Authentication
Today, the Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Department of Agriculture (USDA) released Phishing-Resistant Multi-Factor Authentication (MFA) Success Story: USDA’s FIDO Implementation. This report details how USDA successfully implemented phishing-resistant authentication for its personnel in situations where USDA could not exclusively rely on personal identity verification (PIV) cards.
USDA turned to Fast IDentity Online (FIDO) capabilities, a set of authentication protocols that uses cryptographic keys on user devices, to offer a secure way to authenticate user identities without passwords. USDA’s adoption of FIDO highlights the importance of organizations moving away from password authentication and adopting more secure MFA technologies.
This report offers examples to help organizations strengthen their cybersecurity posture through use cases, recommended actions, and resources. USDA successfully implemented MFA by adopting a centralized model, making incremental improvements, and addressing specific use cases. Organizations facing challenges with phishing-resistant authentication are encouraged to review this report.
For more information about phishing-resistant MFA, visit Phishing-Resistant MFA is Key to Peace of Mind and Implementing Phishing-Resistant MFA.
CISA and Partners Release Update to BianLian Ransomware Cybersecurity Advisory
Today, CISA, the Federal Bureau of Investigation (FBI), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) released updates to #StopRansomware: BianLian Ransomware Group on observed tactics, techniques, and procedures (TTPs) and indicators of compromise attributed to data extortion group, BianLian.
The advisory, originally published May 2023, has been updated with additional TTPs obtained through FBI and ASD’s ACSC investigations and industry threat intelligence as of June 2024.
BianLian is likely based in Russia, with Russia-based affiliates, and has affected organizations in multiple U.S. critical infrastructure sectors since June 2022. They have also targeted Australian critical infrastructure sectors, professional services, and property development.
CISA and partners encourage infrastructure organizations and small- to medium-sized organizations implement mitigations in this advisory to reduce the likelihood and impact of BianLian and other ransomware incidents. These mitigations align with the Cross-Sector Cybersecurity Performance Goals developed by CISA and the National Institute of Standards and Technology.
This advisory is part of CISA’s ongoing #StopRansomware effort.
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-38812 VMware vCenter Server Heap-Based Buffer Overflow Vulnerability
- CVE-2024-38813 VMware vCenter Server Privilege Escalation Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.