The security issue was disclosed by Swiss company SonarSource in late June in a report describing how it could be used for remote code execution to compromise a Zimbra email server without authentication.Įxploit code has been added to the Metasploit penetration testing software earlier this month.įor both vulnerabilities, federal agencies in the U.S. The second vulnerability added to CISA’s Known Exploited Vulnerabilities Catalog is tracked as CVE-2022-30333 and is a path traversal bug in the UnRAR utility for Linux and Unix systems.Īlso Read: Data Anonymisation: Managing Personal Data Protection RiskĪn attacker could leverage it to plant a malicious file on the target system by extracting it to an arbitrary location during the unpack operation. The company notes that the issue has been exploited in attacks. Microsoft addressed CVE-2022-34713 today as part of the August 2022 security updates for Windows. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.Īn unofficial patch exists since early June from the 0patch micropatching service, for most of the affected Windows versions (Windows 7/10/11 and Server 2008 through 2022).In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.Successful exploitation requires user interaction, an obstacle easy to surpass through social engineering, especially in email and web-based attacks, Microsoft says in an advisory today: The problem came back to public attention this year by security researcher j00sean, who summarized what an attacker could achieve by exploiting it and provided video proof: The issue was initially reported to Microsoft by researcher Imre Rad in January 2020 but his report was misclassified as not describing a security risk and dismissed as such. Officially tracked as CVE-2022-34713 and informally referred to as DogWalk, the security flaw in MSDT allows an attacker to place a malicious executable into the Windows Startup folder.Īlso Read: Data Protection Trustmark Certification: Business Advantage One of them has spent more than two years as a zero-day bug in the Windows Support Diagnostic Tool (MSDT) and it has exploit code publicly available.īoth security issues have received a high-severity score and are directory traversal vulnerabilities that could help attackers plant malware on a target system. Cybersecurity and Infrastructure Security Agency (CISA) has added two more flaws to its catalog of Known Exploited Vulnerabilities, based on evidence of active exploitation. CISA Warns of Windows and UnRAR flaws Exploited in the Wild
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |