Microsoft’s June 2024 Patch Tuesday Addresses 49 CVEs
Microsoft addresses 49 CVEs in its June 2024 Patch Tuesday release with one rated as critical and no zero-day or publicly disclosed vulnerabilities. Our counts omitted two CVEs that were not issued by Microsoft, which include CVE-2023-50868 (issued by MITRE) and CVE-2024-29187 (issued by GitHub).
CVE-2024-4577: Proof of Concept Available for PHP-CGI Argument Injection Vulnerability
Researchers disclose a critical severity vulnerability affecting PHP installations and provide proof-of-concept exploit code, which could lead to remote code execution.
Rockwell Automation: Disconnect OT Devices with Public-Facing Internet Access, Patch or Mitigate Logix, FactoryTalk CVEs
An advisory from Rockwell Automation reiterates the importance of disconnecting operational technology devices with public-facing internet access and patching and mitigating systems vulnerable to several flaws.
CVE-2024-4358, CVE-2024-1800: Progress Telerik Report Server의 중요 익스플로잇 체인에 대한 익스플로잇 코드가 사용 가능
Researchers have released an exploit chain to achieve remote code execution on unpatched instances of Progress Telerik Report Server. Immediate patching is recommended.
These Services Shall Not Pass: Abusing Service Tags to Bypass Azure Firewall Rules (Customer Action Required)
Azure customers whose firewall rules rely on Azure Service Tags, pay attention: You could be at risk due to a vulnerability detected by Tenable Research. Here’s what you need to know to determine if you’re affected, and if so, what you should do right away to protect your Azure environment from…
CVE-2024-24919: Check Point Security Gateway 정보 공개 제로데이가 널리 악용됨
Amid warnings of threat actors targeting VPN devices, Check Point has identified a zero-day information disclosure vulnerability impacting Check Point Network Security gateways which has been exploited by malicious actors.
Microsoft의 May 2024 Patch Tuesday에서 59개 CVE에 대응(CVE-2024-30051, CVE-2024-30040)
Microsoft addresses 59 CVEs in its May 2024 Patch Tuesday release with one critical vulnerability and three zero-day vulnerabilities, two of which were exploited in the wild.
CVE-2024-21793, CVE-2024-26026: F5 BIG-IP Next Central Manager 취약성에 대한 개념 증명 사용 가능
Researchers disclose multiple vulnerabilities in F5 BIG-IP Next Central Manager and provide proof-of-concept exploit code, which could lead to exposure of hashed passwords.
CVE-2024-20353, CVE-2024-20359: ArcaneDoor에 대해 자주 묻는 질문
Frequently asked questions about CVE-2024-20353 and CVE-2024-20359, two vulnerabilities associated with “ArcaneDoor,” the espionage-related campaign targeting Cisco Adaptive Security Appliances.
CVE-2024-4040: CrushFTP VFS(가상 파일 시스템 Sandbox Escape 취약성 악용
A zero-day vulnerability in CrushFTP was exploited in the wild against multiple U.S. entities prior to fixed versions becoming available as the vendor recommends customers upgrade as soon as possible.
Oracle April 2024 중요 패치 업데이트에서 239개 CVE에 대응
Oracle addresses 239 CVEs in its second quarterly update of 2024 with 441 patches, including 38 critical updates.
CVE-2024-3400: Palo Alto Networks PAN-OS GlobalProtect Gateway에 제로데이 취약성이 널리 악용됨
A critical severity command injection vulnerability in Palo Alto Networks PAN-OS has been exploited in limited targeted attacks. While a fix is not yet available, patches are expected to be released on April 14 and mitigation steps are available.