Daily NCSC-FI news followup 2020-10-13

Windows Update can be abused to execute malicious programs

www.bleepingcomputer.com/news/security/windows-update-can-be-abused-to-execute-malicious-programs/ MDSec researcher David Middlehurst discovered that Windows Update client (wuauclt) can also be used by attackers to execute malicious code on Windows 10 systems. Middlehurst also found a sample using it in the wild.

Microsoft October Patch Tuesday fixes 87 bugs, six publicly disclosed

www.bleepingcomputer.com/news/security/microsoft-october-patch-tuesday-fixes-87-bugs-six-publicly-disclosed/ Of the 87 vulnerabilities fixed today, 12 are classified as Critical, and 74 are classified as Important, and one as moderate.

Adobe fixes critical security vulnerability in Flash Player

www.bleepingcomputer.com/news/security/adobe-fixes-critical-security-vulnerability-in-flash-player/ When successfully exploited, the vulnerability could lead to a crash that allows the attacker to execute commands on a visitor’s computer remotely. These commands would be executed under the security context of the user and would not have administrator privileges. Starting on December 31st, 2020, Adobe will no longer distribute or update Adobe Flash Player, and web browsers will no longer support the Adobe Flash Plugin.

Norway says Russian hackers were behind August Parliament attack

www.bleepingcomputer.com/news/security/norway-says-russian-hackers-were-behind-august-parliament-attack/ Norway’s Minister of Foreign Affairs Ine Eriksen Sreide today said that Russia is behind the August 2020 cyber-attack on the Norwegian Parliament (Stortinget). The Norwegian National Security Authority (NSM), a government cybersecurity agency responsible for coordinating the country’s national computer emergency response team (NorCERT), is also assisting with the investigation.

Orca Security Research Reveals How Software Industry Unwittingly Distributes Virtual Appliances with Known Vulnerabilities

www.businesswire.com/news/home/20201013005406/en/Orca-Security-Research-Reveals-Software-Industry-Unwittingly The Orca Security research study found 401, 571 total vulnerabilities in scanning 2, 218 virtual appliance images from 540 software vendors. Since alerting vendors of these risks, 287 products have been updated and 53 removed from distribution, leading to 36, 938 discovered vulnerabilities being addressed. For example, Dell EMC issued a critical security advisory; Cisco published fixes to 15 found security risks; and IBM, Symantec, Kaspersky Labs, Oracle, Splunk, ZOHO and Cloudflare all removed outdated or vulnerable virtual appliances.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.