Critical Arbitrary File Overwrite Vulnerability on Linux Kernel 'Dirty Pipe

Mozilla Firefox fixes two actively exploited zero-day bugs  

Description:  

Mozilla has released Firefox updates to fix two critical zero-day vulnerabilities actively exploited in attacks.

 Both zero-day vulnerabilities are "Use-after-free" bugs, which is when a program tries to use memory that has been previously cleared. When threat actors exploit this type of bug, it can cause the program to crash while at the same time allowing commands to be executed on the device without permission.

CVE_IDs:

CVE-2022-26485, CVE-2022-26486

Source: 

2 New Mozilla Firefox 0-Day Bugs Under Active Attack — Patch Your Browser ASAP! (thehackernews.com)

Impact:  

Upon successful exploitation of these bugs, they could allow a remote attacker to execute almost any code

Suggestions and Recommendations: 

Due to the critical nature of these bugs, and they are being actively exploited, it is strongly recommended that all Firefox users update their browsers immediately

Multiple UEFI Firmware Flaws Discovered in Millions of HP Devices

Description:  

High-severity vulnerabilities have been disclosed in various implementations of Unified Extensible Firmware Interface (UEFI) firmware impacting multiple HP enterprise devices. Newly disclosed 16 vulnerabilities have CVSS scores ranging from 7.5 to 8.8. 

According to Binarly, a firmware security company’s report, exploiting these vulnerabilities a threat actor can gain high privileges on the affected devices. It may also allow the attacker to evade AV tools and remain undetectable.

CVE_IDs:

CVE-2021-39297, CVE-2021-39298, CVE-2021- 39299, CVE-2021-39300, CVE-2021-39301, CVE2022-23924, CVE-2022-23925, CVE-2022-23926, CVE-2022-23927, CVE-2022-23928, CVE-2022- 23929, CVE-2022-23930, CVE-2022-23931, CVE2022-23932, CVE-2022-23933, CVE-2022-23934  

Source: 

New 16 High-Severity UEFI Firmware Flaws Discovered in Millions of HP Devices (thehackernews.com)

Impact:  

Successful exploitation of this vulnerability allows threat actors to gain high privileges on the affected devices.

Suggestions and Recommendations: 

HP has addressed the flaws with the release of HP UEFI Firmware in February 2022 security updates. We strongly suggest patching the vulnerability


Critical "Access:7" Supply Chain Vulnerabilities Impact ATMs, Medical and IoT Devices

Description:  

Seven security vulnerabilities have been disclosed in PTC's Axeda software that could be weaponized to gain unauthorized access to medical and IoT devices collectively called Access-7. According to the joint report from the researcher of Forescout and CyberMDX, Access-7 could enable hackers to remotely execute malicious code, access sensitive data, or alter the configuration on medical and IoT devices running PTC's Axeda remote code and management agent.

The flaws, which have an effect on all variations of the Axeda Agent prior to 6.9.3

CVE_IDs:

CVE-2022-25246, CVE-2022-25247, CVE-2022- 25247, CVE-2022-25249, CVE-2022-25249, CVE2022-25249, CVE-2022-25248

Source: 

Critical "Access:7" Supply Chain Vulnerabilities Impact ATMs, Medical and IoT Devices (thehackernews.com)  

Impact:  

Upon successful exploitation, the impact of these issues ranges from information disclosure and denial-of-service (DoS) to remote code execution

Suggestions and Recommendations: 

Axeda has addressed all Access:7 vulnerabilities and device makers have rolled out the fixes. If you are using Axeda Software, we strongly recommend applying the fixes


Critical Arbitrary File Overwrite Vulnerability on Linux Kernel 'Dirty Pipe'  

Description:  

A new vulnerability has been disclosed in the Linux kernel, which allows overwriting data in arbitrary read-only files. This flaw is being called "Dirty Pipe" and could lead to privilege escalation because unprivileged processes can inject code into root processes

This vulnerability share similarities to that of Dirty Cow and affects any distro using the Linux kernel is vulnerable in versions 5.8 and forward.  

CVE_IDs:

CVE-2022-0847

Source: 

Researchers Warn of Linux Kernel 'Dirty Pipe' Arbitrary File Overwrite Vulnerability (thehackernews.com)

Impact:  

Successful exploitation of this flaw lead to privilege escalation because unprivileged processes can inject code into root processes

Suggestions and Recommendations

The Linux Kernel Security has fixed the vulnerability in Linux 5.16.11, 5.15.25, and 5.10.10. However not all distributions have released patches yet, for example, Red Enterprise Linux Server (RHEL) 8. We strongly recommend applying the patch if it is available




 




Critical Arbitrary File Overwrite Vulnerability on Linux Kernel 'Dirty Pipe
Monal Tech, Suman Sunuwar 13 March, 2022
Share this post
Tags
Archive
Sign in to leave a comment

Critical Security Bugs Uncovered In VoIPmonitor Monitoring Software