Access Denied

This page requires users to be logged in and using a specific plan to access its content.

If you believe this is an error or need help, please contact
support@cybernewscentre.com


Login or Sign Up
⭠ Back
The Cybersecurity and Infrastructure Security Agency (CISA) recently extended its Known Exploited Vulnerabilities Catalog with the addition of three critical vulnerabilities that are under active exploitation
Copy Page Link
Mark De Boer
September 14, 2023

https://www.cybernewscentre.com/plus-content/content/cisa-adds-three-new-vulnerabilities-cve-update

You have viewed 0 of your 5 complimentary articles this month.
You have viewed all 5 of your 5 complimentary articles this month.
This content is only available to subscribers. Click here for non-subscriber content.
Sign up for free to access more articles and additional features.
Create your free account
follow this story

CVEs for Android Framework, CISCO and Google Chrome

The Cybersecurity and Infrastructure Security Agency (CISA) recently extended its Known Exploited Vulnerabilities Catalog with the addition of three critical vulnerabilities that are under active exploitation. Here's a deeper dive into each:

Original Description:

A flaw within Android's WindowState.java could allow an attacker to initiate a background activity, leading to local privilege escalation without requiring additional permissions or user interaction.

Expanded Analysis and Opinion:

This vulnerability is particularly concerning due to its "stealthy" nature. The absence of a need for user interaction or additional permissions is deeply problematic. Android, with its widespread usage, becomes a ripe target for attackers looking to exploit this flaw. In essence, malicious actors could escalate privileges on Android devices without triggering user suspicion, making it a covert and potent threat. Device manufacturers and Google must expedite patch distribution to mitigate the risk effectively.

Original Description:

A design flaw within the remote access VPN features of Cisco's ASA and FTD software could allow both unauthenticated and authenticated attackers to potentially identify valid credentials through brute force attacks.

Expanded Analysis and Opinion:

The Cisco vulnerability exposes not just a single layer but multiple aspects of network security, making it especially critical. Cisco's hardware is a cornerstone in many organizational and federal networks; thus, any vulnerability can have a cascading effect on national security. The issue arises from a poor separation of roles in authentication, authorization, and accounting (AAA), which leaves the door ajar for attackers to exploit these features. With the importance of VPNs in today's remote work environment, this vulnerability necessitates immediate attention and remediation measures.

Original Description:

A heap buffer overflow vulnerability in the WebP image processing within Google Chrome could allow a remote attacker to perform an out-of-bounds memory write through a manipulated HTML page.

Expanded Analysis and Opinion:

The fact that such a critical flaw exists in a widely-used browser like Google Chrome highlights the perennial challenge in software security. Even a browser with a strong track record in security is susceptible to critical vulnerabilities. This vulnerability stands as a stark reminder that software, no matter how secure, is never completely invulnerable. With the ability to write out-of-bounds in the memory, an attacker could potentially execute arbitrary code, making it a critical risk that warrants immediate patching.

General Analysis

The inclusion of these three vulnerabilities in CISA's catalog marks an unsettling upward trend in the frequency and variety of cyber threats. Malicious actors are diversifying their targets and methods, which necessitates a more agile and holistic approach to cybersecurity from both the private and public sectors. The need for rapid patch deployment and updated security protocols has never been more urgent.

CVEs for Android Framework, CISCO and Google Chrome

The Cybersecurity and Infrastructure Security Agency (CISA) recently extended its Known Exploited Vulnerabilities Catalog with the addition of three critical vulnerabilities that are under active exploitation. Here's a deeper dive into each:

Get access to more articles for free.
Create your free account
More Cyber News