shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

255
active users

#Kev

0 posts0 participants0 posts today

So here's a dumb question. Does CVE-2025-33053 actually affect Apache #mod_dav after all?

#CISA #KEV seems to be implying this: "This vulnerability could affect various products that implement WebDAV, including but not limited to Microsoft Windows."

Like, is it a protocol bug, or a product bug? The CVE only lists Microsoft products as affected.

Continued thread

Happy hotfix day from Palo Alto Networks who released 3 hotfixes for CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 as an exploited zero-day) with 15 more hotfixes expected in the coming days: 🔗 security.paloaltonetworks.com/

  • PAN-OS 10.2:
    • 10.2.9-h1 (Released 14 April)
    • 10.2.8-h3 (ETA: 15 April)
    • 10.2.7-h8 (ETA: 15 April)
    • 10.2.6-h3 (ETA: 15 April)
    • 10.2.5-h6 (ETA: 16 April)
    • 10.2.3-h13 (ETA: 17 April)
    • 10.2.1-h2 (ETA: 17 April)
    • 10.2.2-h5 (ETA: 18 April)
    • 10.2.0-h3 (ETA: 18 April)
    • 10.2.4-h16 (ETA: 19 April)
  • PAN-OS 11.0:
    • 11.0.4-h1 (Released 14 April)
    • 11.0.3-h10 (ETA: 15 April)
    • 11.0.2-h4 (ETA: 16 April)
    • 11.0.1-h4 (ETA: 17 April)
    • 11.0.0-h3 (ETA: 18 April)
  • PAN-OS 11.1:
    • 11.1.2-h3 (Released 14 April)
    • 11.1.1-h1 (ETA: 16 April)
    • 11.1.0-h3 (ETA: 17 April)
Palo Alto Networks Product Security Assurance · CVE-2024-3400 PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtectA command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurat...
Continued thread

It should come as no surprise that Palo Alto Networks did not release hotfixes* for affected versions of PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11 by the self-imposed deadline of Sunday 14 April 2024 like they estimated in their security advisory. 48 hours to develop/test/release is a tight delivery window with the whole infosec community breathing down their necks.

Continued thread

Just to make it easier to read through the various reports (saying almost the same exact thing), I've assembled a Palo Alto Networks zero-day MEGA list:

UPDATE: Volexity and Unit 42 talk about the threat actor, campaign, and include indicators of compromise:

Here's the rest of the related reporting:

Palo Alto Networks Product Security Assurance · CVE-2024-3400 PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtectA command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurat...
Replied in thread

Ivanti has a frequently asked questions (FAQ) blog post from 14 February 2024 addressing questions about their Ivanti Connect Secure, Policy Secure and ZTA gateway products. Important to note that "As of 14 February, Ivanti has a build available for all supported versions." It also responds to Eclypsium's claim of old open source code. They also dispute reporting that CVE-2024-22024 (8.3. high, disclosed 12 February by Ivanti) was being exploited after disclosure. "It is unfortunate that media reports continue to cover statements and unverified numbers from third parties that are incorrect or inflated." Ivanti officially responds to the accusations that they didn't credit watchTowr for reporting CVE-2024-22024. This reads like damage control for Ivanti's Public Relations.
🔗 ivanti.com/blog/key-faqs-relat

www.ivanti.comKey FAQs Related to Ivanti Connect Secure, Policy Secure and ZTA Gateway Vulnerabilities | IvantiWe have prepared this FAQ which clarifies misinformation currently circulating in the marketplace, as well as outlining facts around customer questions.
Continued thread

Ivanti updated their knowledge base article with an available patch:

Update 1 February: A patch addressing all known vulnerabilities is now available for Ivanti Connect Secure version 22.5R2.2 and Ivanti Policy Secure 22.5R1.1.

forums.ivanti.com/s/article/KB

forums.ivanti.comIvanti Community
Continued thread

Ivanti identified two new vulnerabilities (one actively exploited) in connection to the Ivanti Connect Secure zero-days from 10 January 2024. They are:

  • CVE-2024-21888 (8.8 high) privilege escalation in web component "We have no evidence of customers being impacted by CVE-2024-21888 at this time"
  • CVE-2024-21893 (8.2 high, exploited in the wild) sever side request forgery (SSRF) in the SAML component "At the time of publication, the exploitation of CVE-2024-21893 appears to be targeted"

A patch is now available for Ivanti Connect Secure (versions 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2 and 22.5R1.1) and ZTA version 22.6R1.3.
🔗 forums.ivanti.com/s/article/KB
blog post: ivanti.com/blog/security-updat
security advisory: forums.ivanti.com/s/article/CV

forums.ivanti.comIvanti Community

Just your periodic update from Ivanti regarding their CVE-2023-46805 (8.2 high) and CVE-2024-21887 (9.1 critical) zero-days (both disclosed 10 January 2024 as exploited in the wild, has Proofs of Concept, mass exploitation):

"Update 26 January: The targeted release of patches for supported versions is delayed, this delay impacts all subsequent planned patch releases. We are now targeting next week to release a patch for Ivanti Connect Secure (versions 9.1R17x, 9.1R18x, 22.4R2x and 22.5R1.1), Ivanti Policy Secure (versions 9.1R17x, 9.1R18x and 22.5R1x) and ZTA version 22.6R1x.
Patches for supported versions will still be released on a staggered schedule. Instructions on how to upgrade to a supported version will also be provided.
The timing of patch release is subject to change as we prioritize the security and quality of each release. Please ensure you are following this article to receive updates as they become available."
🔗 forums.ivanti.com/s/article/KB

forums.ivanti.comIvanti Community