CERT/CC (@certcc) 's Twitter Profile
CERT/CC

@certcc

CERT Coordination Center at the Carnegie Mellon University Software Engineering Institute.

ID: 27862773

linkhttp://www.cert.org calendar_today31-03-2009 12:52:28

103 Tweet

3,3K Followers

0 Following

CERT/CC (@certcc) 's Twitter Profile Photo

A user with the ability to run code (php, cgi, etc.) in the context of Apache can escalate privileges to root. CVE-2019-0211 Apply updates to get the fix. cfreal.github.io/carpe-diem-cve… httpd.apache.org/security/vulne…

CERT/CC (@certcc) 's Twitter Profile Photo

Exim has released fixes for CVE-2019-15846, an issue where a local or remote attacker can execute programs with root privileges. This affects versions up to and including 4.92.1. The patches were released today in version 4.92.2 and can be found at ftp.exim.org/pub/exim/exim4/

CERT/CC (@certcc) 's Twitter Profile Photo

It's important to note that these updates are NOT currently being deployed via Windows Update or Microsoft Update. Despite being actively exploited in the wild, manual actions must be taken to receive the fixes.

CERT/CC (@certcc) 's Twitter Profile Photo

Any device that has a software stack associated with it may become unsafe when it has outlived its support life span. It's Time to Retire Your Unsupported Things insights.sei.cmu.edu/cert/2019/10/i…

CERT/CC (@certcc) 's Twitter Profile Photo

If you use "Disable all macros without notification" in Microsoft Office for Mac, you may be in for an unpleasant surprise. XLM macros in SYLK (.SLK) content will run without any prompting. This allows for arbitrary code execution without any clicks. kb.cert.org/vuls/id/125336/

CERT/CC (@certcc) 's Twitter Profile Photo

VU#338824 Microsoft Internet Explorer is being actively exploited in the wild using a new unpatched vulnerability in the Scripting Engine. Disable access to JScript.dll as a workaround. kb.cert.org/vuls/id/338824/

CERT/CC (@certcc) 's Twitter Profile Photo

Microsoft has released ADV200006 about an 0day vulnerability being exploited in the wild in Microsoft Windows Adobe Type Manager Type 1 font parsing. There are almost as many workarounds provided as there are attack vectors! kb.cert.org/vuls/id/354840/

USCYBERCOM Cybersecurity Alert (@cnmf_cyberalert) 's Twitter Profile Photo

Please patch all devices affected by CVE-2020-2021 immediately, especially if SAML is in use. Foreign APTs will likely attempt exploit soon. We appreciate Palo Alto Networks’ proactive response to this vulnerability. security.paloaltonetworks.com/CVE-2020-2021

CERT/CC (@certcc) 's Twitter Profile Photo

Citrix vulnerabilities in Citrix ADC (formerly known as NetScaler ADC), Citrix Gateway (formerly known as NetScaler Gateway) and Citrix SD-WAN WANOP. Impacts include system compromise by an unauthenticated user on the management network. support.citrix.com/article/CTX276…

CERT/CC (@certcc) 's Twitter Profile Photo

We've published vulnerability note VU#490028 about Zerologon / CVE-2020-1472. Windows Domain controllers without the August update from Microsoft are vulnerable to complete domain takeover by an unauthenticated attacker. Samba DCs < 4.8 affected by default kb.cert.org/vuls/id/490028

Christopher Glyer (@cglyer) 's Twitter Profile Photo

This is not a drill - patch your Exchange Servers ASAP We're seeing active exploitation by #HAFNIUM microsoft.com/security/blog/…

CERT/CC (@certcc) 's Twitter Profile Photo

If you have a Pulse Connect Secure system and did not immediately apply the instantaneous XML workaround published on April 20, assume compromise until you can prove otherwise. Run the PCS Integrity Assurance package as soon as possible (requires reboot). kb.pulsesecure.net/articles/Pulse…

CERT/CC (@certcc) 's Twitter Profile Photo

You all know by now about the #log4j CVE-2021-44228 that affects lots of Java applications, right? No? Well that extra sleep must be nice! We've published a vulnerability note with details: kb.cert.org/vuls/id/930724 We link to PowerShell and Python3 scanners to find jar files too.

You all know by now about the #log4j CVE-2021-44228 that affects lots of Java applications, right?
No? Well that extra sleep must be nice!
We've published a vulnerability note with details: kb.cert.org/vuls/id/930724
We link to PowerShell and Python3 scanners to find jar files too.