Programmer’s Digest #108
11/06/2024-11/13/2024 Patched Critical Vulnerability in Industrial Networking Solution, Security Flaws in Popular ML Toolkits, Potential PAN-OS RCE Vulnerability And More.
1. Cisco Patches Critical Vulnerability in Industrial Networking Solution
Cisco recently issued patches for multiple vulnerabilities across its enterprise products, including a critical bug in Unified Industrial Wireless software. The critical flaw, tracked as CVE-2024-20418 with a maximum CVSS score of 10, lets remote attackers execute commands with root privileges. This vulnerability exists due to improper input validation in the software’s web management interface, enabling crafted HTTP requests to bypass security controls. Devices affected include Catalyst IW9165D, IW9165E, and IW9167E access points with Ultra-Reliable Wireless Backhaul mode enabled. Cisco urges users to upgrade to version 17.15.1 to mitigate the risk.
Cisco also patched CVE-2024-20536, a high-severity vulnerability in the Nexus Dashboard Fabric Controller that could allow SQL command execution, and CVE-2024-20484 in Enterprise Chat and Email, which could cause denial-of-service. No known exploits of these flaws have been reported, and further details are available in Cisco’s security advisories.
2. Microsoft Confirms Zero-Day Exploitation of Task Scheduler Flaw
Microsoft’s security team released fixes for over 90 Windows vulnerabilities, highlighting two zero-day flaws already exploited in attacks. One flaw, CVE-2024-49039, is a privilege escalation issue in Windows Task Scheduler that could allow code execution from low-privilege applications. Discovered by Google’s Threat Analysis Group, it has a severity score of 8.8 and is suspected to have been used in targeted attacks. Another critical flaw, CVE-2024-43451, exposes a user’s NTLMv2 hash, enabling attackers to impersonate the user. Minimal interaction, like a single-click on a malicious file, could trigger this vulnerability.
The patch rollout also addresses a critical Windows Kerberos vulnerability (CVE-2024-43639) and a .NET/Visual Studio bug (CVE-2024-43498), both carrying severity scores of 9.8 and risking remote code execution. Additionally, Adobe issued fixes for 48 bugs across various products, including urgent patches for Adobe Commerce and other platforms vulnerable to code execution.
3. Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation
Cybersecurity researchers have identified nearly two dozen vulnerabilities across 15 open-source machine learning (ML) projects, exposing critical security weaknesses. These flaws, which include issues on both server- and client-sides that could allow attackers to hijack ML model registries, databases, and pipelines. Key vulnerabilities include CVE-2024-7340, a directory traversal flaw in Weave ML that allows privilege escalation, and CVE-2024-6507, a command injection vulnerability in Deep Lake’s database that enables malicious command execution. Other severe flaws affect ZenML, Vanna.AI, and Mage AI, allowing unauthorized privilege elevation and code execution. These flaws highlight the risk of attacks such as ML model backdooring and data poisoning, which could lead to significant breaches.
4. Palo Alto Networks Warns of Potential PAN-OS RCE Vulnerability
Palo Alto Networks recently warned customers about a possible remote code execution vulnerability in the PAN-OS management interface of its next-generation firewalls. Although the company has not yet confirmed details of the vulnerability or detected active exploitation, it advises customers to restrict access to the interface by allowing only trusted internal IPs. For enhanced security, Palo Alto suggests isolating the management interface on a dedicated VLAN, using jump servers, and limiting IP access to approved devices. Cortex Xpanse and Cortex XSIAM customers can monitor for potential exposure via the Firewall Admin Login attack surface rule. Meanwhile, CISA has warned of ongoing attacks on a critical flaw in Palo Alto’s Expedition tool (CVE-2024-5910), which allows attackers to reset admin credentials. Exploits for this and related vulnerabilities, including CVE-2024-9464, have been demonstrated, potentially allowing unauthorized command execution.
5. New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration
Cybersecurity researchers have found security flaws in Citrix Virtual Apps and Desktops that could allow remote code execution (RCE) through the Session Recording component, which logs user activity for compliance purposes. The vulnerability arises from a misconfigured Microsoft Message Queuing (MSMQ) instance, allowing unauthorized access via BinaryFormatter deserialization. Notably, Citrix stated that successful exploitation requires an authenticated user in the same domain, and patches are available in newer versions, including updates for LTSR releases. The flaws are tracked as CVE-2024-8068 and CVE-2024-8069. Microsoft has discouraged using BinaryFormatter due to security risks, removing it in .NET 9 for safety. Researchers warn the vulnerability could lead to “point-click-full-takeover” attacks. Shadowserver Foundation has observed potential exploitation attempts and strongly advises immediate patching to secure affected systems.