Tag: system privileges

  • Unit 42: Multiple Vulnerabilities Discovered in a SCADA System

    Source URL: https://unit42.paloaltonetworks.com/vulnerabilities-in-iconics-software-suite/ Source: Unit 42 Title: Multiple Vulnerabilities Discovered in a SCADA System Feedly Summary: We identified multiple vulnerabilities in ICONICS Suite, SCADA software used in numerous OT applications. This article offers a technical analysis of our findings. The post Multiple Vulnerabilities Discovered in a SCADA System appeared first on Unit 42. AI Summary…

  • Cloud Blog: CVE-2023-6080: A Case Study on Third-Party Installer Abuse

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/cve-2023-6080-third-party-installer-abuse/ Source: Cloud Blog Title: CVE-2023-6080: A Case Study on Third-Party Installer Abuse Feedly Summary: Written By: Jacob Paullus, Daniel McNamara, Jake Rawlins, Steven Karschnia Executive Summary Mandiant exploited flaws in the Microsoft Software Installer (MSI) repair action of Lakeside Software’s SysTrack installer to obtain arbitrary code execution. An attacker with low-privilege access…

  • The Register: Don’t want your Kubernetes Windows nodes hijacked? Patch this hole now

    Source URL: https://www.theregister.com/2025/01/24/kubernetes_windows_nodes_bug/ Source: The Register Title: Don’t want your Kubernetes Windows nodes hijacked? Patch this hole now Feedly Summary: SYSTEM-level command injection via API parameter *chef’s kiss* A now-fixed command-injection bug in Kubernetes can be exploited by a remote attacker to gain code execution with SYSTEM privileges on all Windows endpoints in a cluster,…

  • The Register: Microsoft fixes under-attack privilege-escalation holes in Hyper-V

    Source URL: https://www.theregister.com/2025/01/15/patch_tuesday_january_2025/ Source: The Register Title: Microsoft fixes under-attack privilege-escalation holes in Hyper-V Feedly Summary: Plus: Excel hell, angst for Adobe fans, and life’s too Snort for Cisco Patch Tuesday The first Patch Tuesday of 2025 has seen Microsoft address three under-attack privilege-escalation flaws in its Hyper-V hypervisor, plus plenty more problems that deserve…

  • The Register: HTTP your way into Citrix’s Virtual Apps and Desktops with fresh exploit code

    Source URL: https://www.theregister.com/2024/11/12/http_citrix_vuln/ Source: The Register Title: HTTP your way into Citrix’s Virtual Apps and Desktops with fresh exploit code Feedly Summary: ‘Once again, we’ve lost a little more faith in the internet,’ researcher says Researchers are publicizing a proof of concept (PoC) exploit for what they’re calling an unauthenticated remote code execution (RCE) vulnerability…

  • Hacker News: Windows 0-day was exploited by North Korea to install advanced rootkit

    Source URL: https://arstechnica.com/security/2024/08/windows-0-day-was-exploited-by-north-korea-to-install-advanced-rootkit/ Source: Hacker News Title: Windows 0-day was exploited by North Korea to install advanced rootkit Feedly Summary: Comments AI Summary and Description: Yes Summary: The text highlights a critical Windows zero-day vulnerability (CVE-2024-38193) exploited by the North Korean hacking group Lazarus to install advanced rootkit malware (FudModule). This sophisticated attack allows the…