Lenovo Several High-Severity BIOS Vulnerabilities Impacts Hundreds of Devices

Recently, Lenovo’s new BIOS updates fixes the high-severity vulnerabilities impacting hundreds of devices in several models (Desktop, All in One, IdeaCentre, Legion, ThinkCentre, ThinkPad, ThinkAgile, ThinkStation, ThinkSystem). The potential impact may include Information disclosure, privilege escalation and denial of service. The List of Vulnerabilities Includes: CVE-2021-28216 – Fixed pointer vulnerability in TianoCore EDK II BIOS […]

Critical BIOS vulnerabilities affect Lenovo Desktop, Desktop AIO, Smart Edge, Smart Office, ThinkStation, and ThinkSystem models

Four BIOS-related vulnerabilities have recently been discovered, according to a new security alert from Lenovo. Threat actors can use these flaws to allow information exposure, denial of service, or privilege escalation. The first of the bugs, identified as CVE-2022-40137, affects the WMI SMI Handler function and affects the Lenovo Desktop, Desktop AIO, Smart Edge, Smart […]

Mirai Variant MooBot Botnet Exploiting D-Link Router Vulnerabilities

A variant of the Mirai botnet known as MooBot is co-opting vulnerable D-Link devices into an army of denial-of-service bots by taking advantage of multiple exploits. “If the devices are compromised, they will be fully controlled by attackers, who could utilize those devices to conduct further attacks such as distributed denial-of-service (DDoS) attacks,” Palo Alto […]

CISA Adds 10 New Known Actively Exploited Vulnerabilities to its Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added 10 new actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, including a high-severity security flaw affecting industrial automation software from Delta Electronics. The issue, tracked as CVE-2021-38406 (CVSS score: 7.8), impacts DOPSoft 2 versions 2.00.07 and prior. A successful exploitation of the […]

CISA Adds 7 New Actively Exploited Vulnerabilities to Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday moved to add a critical SAP security flaw to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. The issue in question is CVE-2022-22536, which has received the highest possible risk score of 10.0 on the CVSS vulnerability scoring system and was addressed […]

Apple Releases Security Updates to Patch Two New Zero-Day Vulnerabilities

Apple on Wednesday released security updates for iOS, iPadOS, and macOS platforms to remediate two zero-day vulnerabilities previously exploited by threat actors to compromise its devices. The list of issues is below – CVE-2022-32893 – An out-of-bounds issue in WebKit which could lead to the execution of arbitrary code by processing a specially crafted web […]

ÆPIC and SQUIP Vulnerabilities Found in Intel and AMD Processors

A group of researchers has revealed details of a new vulnerability affecting Intel CPUs that enables attackers to obtain encryption keys and other secret information from the processors. Dubbed ÆPIC Leak, the weakness is the first-of-its-kind to architecturally disclose sensitive data in a manner that’s akin to an “uninitialized memory read in the CPU itself.” […]

Fix these Windows vulnerabilities before someone exploits them

On many occasions, security flaws appear that can compromise our devices. They can affect operating systems like Windows, applications, drivers. It is important to always correct them and prevent hackers from having a choice. In this article we echo the latest and important vulnerabilities that Windows has corrected. We’re going to explain why you should […]

Hackers Use Open Redirect Vulnerabilities in Online Services to Deliver Phishing Content

Researchers at Resecurity noticed threat actors leveraging Open Redirect Vulnerabilities which is popular in online services and apps to evade spam filters to deliver phishing content. Trusted service domains like Snapchat and other online services make special URLs that lead to malicious resources with phishing kits. The kit identified is named ‘LogoKit’ that was earlier […]

3 critical vulnerabilities in Argo CD allow complete take over of your applications and servers

Argo CD is a declarative GitOps continuous delivery tool for Kubernetes. It is required because Application definitions, configurations, and environments should be declarative and version controlled. Also it helps when Application deployment and lifecycle management should be automated, auditable, and easy to understand. This Argo Cd security team has published details of 4 vulnerabilities. Following […]

3 critical vulnerabilities in 9 Cisco Router models allows complete takeover of any network

3 vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated threat actor to remotely execute arbitrary code or cause a denial of service (DoS) condition on the router. Affected Products Vulnerable ProductsCVE-2022-20827 and CVE-2022-20841 affect the following Cisco products: RV160 VPN Routers RV160W Wireless-AC VPN Routers RV260 VPN […]

Critical Security Vulnerabilities In Netgear Business Routers Which The Netgear Team Can’t Fix. Stop Using These Routers As Soon As Possible

The manufacturer NETGEAR has issued an urgent notice for all owners of professional VPN and firewall routers, the affected models are the BR200 and BR500, two models widely used by small and medium-sized businesses as they have advanced configuration options. The manufacturer has declared that due to technical limitations beyond its control, they will not […]

3 vulnerabilities affecting IBM QRadar SIEM. Patch immediately

IBM has published details of vulnerabilities affecting IBM QRadar SIEM. Below are the details. 1) Improper input validation CVE-ID: CVE-2017-9801 Description The vulnerability allows a remote attacker to inject arbitrary files. The vulnerability exists due to an improper input validation flaw in the setSubject() method. A remote attacker can supply a specially crafted value containing […]

3 Critical Vulnerabilities In Lenovo Laptops’ UEFI  (70 Models Including Thinkbook) Allow Them To Be Hacked Forever, Even After Removing The Hard Drive

Lenovo released security fixes to address three vulnerabilities that reside in the UEFI firmware shipped with over 70 product models, including several ThinkBook models. ESET Research discovered and reported to the manufacturer these three vulnerabilities. Two months of ago UEFI vulnerabilities affected Dell laptops. To help fellow researchers discover more similar vulnerabilities and improve the […]

New UEFI Firmware Vulnerabilities Impact Several Lenovo Notebook Models

Consumer electronics maker Lenovo on Tuesday rolled out fixes to contain three security flaws in its UEFI firmware affecting over 70 product models. “The vulnerabilities can be exploited to achieve arbitrary code execution in the early phases of the platform boot, possibly allowing the attackers to hijack the OS execution flow and disable some important […]

11 important vulnerabilities in Fortinet products FortiOS, FortiAnalyzer, FortiADC, FortiManager, FortiProxy, FortiClient, FortiDeceptor, FortiSwitch, FortiRecoder & FortiVoiceEnterprise 

Fortinet, an American multinational corporation headquartered in Sunnyvale, California. The company develops and sells cybersecurity solutions, such as physical firewalls, antivirus software, intrusion prevention systems, and endpoint security components. Fortinet has addressed a raft of security vulnerabilities affecting several of its endpoint security products.The following is a list of advisories for issues resolved in Fortinet […]

SAN storage products of Dell, Fujitsu, HP, Huawei, IBM, Brocade and Lenovo affected by 9 critical vulnerabilities

Broadcom published that software used by its storage networking company Brocade is affected by 9 important vulnerabilities, and the same vulnerabilities impact the SAN products of several major companies like Dell, Fujitsu, HP, Huawei, IBM, and Lenovo. The SANnav storage area network (SAN) management application is affected by nine vulnerabilities. Brocade has made available patches but […]

Critical Information disclosure, Incomplete cleanup and Race condition vulnerabilities in Citrix Hypervisor. Download hotfixes.

Citrix Hypervisor is an industry leading platform for cost-effective desktop, server, and cloud virtualization infrastructures. Citrix Hypervisor enables organizations of any size or type to consolidate and transform compute resources into virtual workloads for today’s data center requirements. Citrix has released hotfix to patch important  Information disclosure,  Incomplete cleanup and Race condition vulnerabilities.  1) Information […]