Tenable Research: May Vulnerability Disclosure Roundup

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

Tenable Research has a dedicated team that performs vulnerability research on software and hardware from third-party vendors. The goal is to discover zero-day vulnerabilities and work with vendors to get them addressed before hackers discover and exploit them. This post provides an overview of all the vulnerabilities discovered by Tenable Research in May.

You can access all Tenable Research advisories here.

 

Cisco Prime Data Center Network Manager Remote Code Execution Vulnerability

CVE ID: CVE-2018-0258

Tenable Research Advisory: TRA-2018-11

Risk Factor: Critical

What do you need to know?

Tenable Research discovered a relative path traversal vulnerability in Cisco Prime Data Center Network Manager.

What’s the attack vector?

An unauthenticated remote attacker can write a file to any location on the server and achieve remote code execution by uploading a WAR file that contains a JSP webshell.

What’s the business impact?

A malicious threat actor can execute code on affected systems, leading to full system compromise.

What’s the solution?

There are no known workarounds, but Cisco has released a software update, which you should apply.

 

OpenVPN Windows Service Double Free Vulnerability

CVE ID: CVE-2018-9336

Nessus Plugin ID: 109362

Tenable Research Advisory: TRA-2018-09

Risk Factor: High

What do you need to know?

Tenable Research recently discovered a new double free vulnerability in OpenVPN 2.4x.

What’s the attack vector?

The vulnerability can be exploited by a local attacker sending a malformed request to the interactive service

What’s the business impact?

A malicious threat actor could cause a denial-of-service through memory corruption and possibly have other unspecified impact including privilege escalation.

What’s the solution?

Affected users should upgrade to OpenVPN 2.4.6.

 

Trend Micro Smart Protection Server Denial of Service

CVE IDs: CVE-2018-6237

Tenable Research Advisory: TRA-2018-10

Risk Factor: High

What do you need to know?

Tenable Research has discovered a denial-of-service vulnerability in Trend Micro Smart Protection Server (TMSPS) versions 3.0-3.3.

What’s the attack vector?

An unauthenticated attacker can remotely send crafted HTTP requests to trigger the denial-of-service by initiating the creation of “BF” files, eventually filling up all available disk space.

What’s the business impact?

A malicious attacker can fill the entire hard drive of a targeted system, leading to a denial-of-service of the TMSPS server.

What’s the solution?

Users should apply the relevant patch for their TMSPS version.

 

Cylance PROTECT Missing SSL Certificate Verification Vulnerability

Tenable Research Advisory: TRA-2018-12

Risk Factor: Medium

What do you need to know?

Tenable Research recently discovered a missing SSL certificate verification vulnerability in Cylance PROTECT.

What’s the attack vector?

An attacker can execute a man-in-the-middle attack to intercept and modify requests and responses between the Cylance PROTECT server and clients.

What’s the business impact?

An attacker can cause Cylance PROTECT to download an arbitrary file. A user would need to be persuaded or tricked into executing the file.

What’s the solution?

Affected users should upgrade to Cylance PROTECT 1480 or later.

 

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
1569 Followers
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at tenable.com.
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel