每日安全动态推送(4-30)
2024-4-30 14:52:29 Author: mp.weixin.qq.com(查看原文) 阅读量:1 收藏

Tencent Security Xuanwu Lab Daily News

• NAT Slipstreaming v2.0:
https://www.armis.com/research/nat-slipstreaming-v2-0/

   ・ 新发现的NAT Slipstreaming攻击变种可绕过NAT和防火墙,使内部网络中的所有设备暴露在互联网上。 – SecTodayBot

• Palo Alto Firewalls Under Attack: Critical Flaw Exploited to Deploy Cryptojacking Malware:
https://securityonline.info/palo-alto-firewalls-under-attack-critical-flaw-exploited-to-deploy-cryptojacking-malware/

   ・ Palo Alto Networks的防火墙设备面临着严重的漏洞CVE-2024-3400,导致远程控制漏洞,被攻击者利用部署加密货币挖矿恶意软件。 – SecTodayBot

• LSASS rings KsecDD ext. 0:
https://tierzerosecurity.co.nz/2024/04/29/kexecdd.html

   ・ 介绍了LSASS存在的一个新的内核漏洞,并提供了利用该漏洞的详细分析和漏洞利用代码。该漏洞允许执行任意内核模式地址,可能导致绕过系统的安全检查和进行恶意活动。 – SecTodayBot

• D-Link NAS Device Backdoor Abused:
https://isc.sans.edu/diary/rss/30878

   ・ 披露了D-Link NAS设备中的一个漏洞,允许使用特定用户名无需凭据访问设备,并且可以执行任意系统命令,且D-Link并未提供补丁。 – SecTodayBot

• Researchers Uncover ‘Pathfinder’ Exploit, Putting CPUs at Risk of High-Precision Attacks:
https://securityonline.info/researchers-uncover-pathfinder-exploit-putting-cpus-at-risk-of-high-precision-attacks/

   ・ 介绍了研究人员揭示的对现代计算机处理器的新漏洞'Pathfinder',该漏洞利用了CPU中的条件分支预测器,可以窃取敏感信息并对程序的运行方式进行微妙的劫持。 – SecTodayBot

• Relaying Kerberos Authentication from DCOM OXID Resolving:
https://www.tiraniddo.dev/2024/04/relaying-kerberos-authentication-from.html

   ・ 讨论了利用DCOM身份验证和Kerberos身份验证,以获取提升的权限和在某些情况下获得域管理员访问权限。通过对身份验证的滥用,可以实现从本地访问到完全远程的过程。 – SecTodayBot

• Reading Between the Lines of Code: Ziraat_Stealer:
https://infosecwriteups.com/reading-between-the-lines-of-code-ziraat-stealer-68f4971d0e85?source=rss----7b722bfd1b8d---4

   ・ 对一种.NET信息窃取软件进行了详细的分析,揭示了其功能和使用的新工具DNSpy。 – SecTodayBot

• oss-security - CVE-2024-27322: Deserialization vulnerability in R before 4.4.0:
https://www.openwall.com/lists/oss-security/2024/04/29/3

   ・ R语言发现了一个反序列化漏洞(CVE-2024-27322),攻击者可以利用这个漏洞执行任意代码。 – SecTodayBot

• CodeQL zero to hero part 3: Security research with CodeQL:
https://github.blog/2024-04-29-codeql-zero-to-hero-part-3-security-research-with-codeql/

   ・ 介绍了如何使用CodeQL进行安全研究,发现漏洞 – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号: 腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959624&idx=1&sn=4f0968a81d2f24cf4b19dc93e55a9d07&chksm=8baed1d7bcd958c15f921037e19ab3af583ab5e2884474a2f28111639642b0b07e9854f71ce9&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh