This week has been a great week of spending time with the SentinelOne team getting updated on their newest releases and roadmaps for upcoming changes. We all know that Roadmaps are future state, so we must always take that into account. With that said, when these are released, it will be a game changer without adding a lot of complexity.
Let’s dive into this week's cyber update.
Microsoft Patch Tuesday
The following three are three exploited zero-days vulnerabilities
Recommendation – test the patches then full deploy, these are being exploited in the wild
Link (1): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36025
Link (2): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36033
Link (3): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36036
Boeing data published by LockBit
LockBit has released over 43GB of files since Boeing has refused to pay the ransom
Link (1): https://www.bleepingcomputer.com/news/security/lockbit-ransomware-leaks-gigabytes-of-boeing-data/
US was the most breached country last quarter
Q3 2023 76% decrease in breached accounts – but US still highest sitting at 26% (8.1 million)
Link (1): https://anthonycarranzza.medium.com/the-u-s-still-the-most-breached-country-in-q3-d18dbc2fdaa4
OpenAI blames DDoS attacks for ongoing ChatGPT outages
DDoS attack has caused periodic outages affecting ChatGPT and the developer tools
Link (1): https://techcrunch.com/2023/11/09/openai-blames-ddos-attack-for-ongoing-chatgpt-outage/
SysAid Exploited by Cl0p Ransomware (CVE-2023-47246)
CVE-2023-47246: In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023
Link (1): https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification
Sumo Logic Breach
November 3rd, Sumo detected evidence of a breach that an attacker used stolen credentials to gain access to the Sumo Logic AWS account
WS_FTP Server Update CVE-2023-42659
CVE-2023-42659 (CVSS 9.1): In WS_FTP Server versions prior to 8.7.6 and 8.8.4, an unrestricted file upload flaw has been identified. An authenticated Ad Hoc Transfer user could craft an API call which allows them to upload a file to a specified location on the underlying operating system hosting the WS_FTP Server application.
Link (1): https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-November-2023
ScreenConnect used to Attack Healthcare
I wish this was the only time I have seen this occur, but it’s not and its very devastating to see its continued to occur
OpenVPN Access Server Vulnerabilities
CVE-2023-46849: Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behavior which could cause an application crash, leading to a denial of service.
Link (1): https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/
Link (2): https://nvd.nist.gov/vuln/detail/CVE-2023-46849
Link (3): https://nvd.nist.gov/vuln/detail/CVE-2023-46850
Until next week, it’s Brent Forrest signing off. Be cyber safe my friends!
About the Author: Brent Forrest is a Field CISO with Flair Data Systems. In this role, Brents acts as an advisor to customers that span across different verticals providing guidance to include; developing strategies to reduce risk with existing or new technology while enabling the business. With over 20 years of experience in the IT industry, Brent has been able to be a part of multiple groups within the IT field spanning from Telecom, Network, Wireless, Infrastructure, and eventually finding his passion within Security. Roughly 20 years of that time was spent within the Oil and Gas industry working across multiple teams and leading initiatives. Specifically with EnLink Midstream, he spent the majority of his time building resilience and developing the cybersecurity program from the ground up.
Brent has been with Flair Data for 3 years and is CISSP, C|CISO, CvCISO, & Sec+ certified. In his free time, he likes to spend time with family, working out, or staying up with personal development.
He lives in Dallas, Texas with his wife and children.
About: Flair Data Systems is a strategically priced IT solutions company, serving clients in the U.S., with offices in Texas and Colorado. Now a technology industry leader, we began in 1916 as the Porter Burgess Company. Flair Data Systems is your Trusted Advisor for: Collaboration, Unified Communications, Networking, Cloud, Infrastructure, Data Analytics, and Cybersecurity, serving the U.S.