article thumbnail

CVE-2020-0688: Microsoft Exchange Server Static Key Flaw Could Lead to Remote Code Execution

Tenable

The use of static keys could allow an authenticated attacker with any privilege level to send a specially crafted request to a vulnerable ECP and gain SYSTEM level arbitrary code execution. In their blog, the ZDI shared a YouTube video demonstrating exploitation of this flaw. Valid user credential requirement. Proof of concept.

article thumbnail

CVE-2021-28480, CVE-2021-28481, CVE-2021-28482, CVE-2021-28483: Four Critical Microsoft Exchange Server Vulnerabilities Patched in April Patch Tuesday

Tenable

CVE-2021-28480 and CVE-2021-28481 are pre-authentication vulnerabilities in Microsoft Exchange Server. A pre-authentication vulnerability means that an attacker does not need to authenticate to the vulnerable Exchange Server in order to exploit the vulnerability. 2013 Cumulative Update 23. Proof of concept. KB5001779.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065: Four Zero-Day Vulnerabilities in Microsoft Exchange Server Exploited in the Wild

Tenable

In a blog post , Microsoft attributes the exploitation of these flaws to a state-sponsored group it calls HAFNIUM. based institutions, which include “infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and NGOs,” according to the Microsoft blog.

article thumbnail

Copy-Paste Compromises: Threat Actors Target Telerik UI, Citrix, and SharePoint Vulnerabilities (CVE-2019-18935)

Tenable

Researchers at BishopFox published a blog post in December 2019 on CVE-2019-18935. At the time, little was known about the exploitability of this vulnerability, but the flaw was severe enough that Tenable Security Response posted a blog post around the vulnerability. as it works without authentication. KB4462184 KB4461630.

WAN 96
article thumbnail

The need for DevSecOps in the embedded world

Xebia

In this blog post, I want to talk about what happened in other parts of the development world in terms of security and how the embedded world can learn from it. For example, look at how the OWASP Top 10 has changed from 2013 to 2020. Or how web application developers improved their security maturity over the years?

article thumbnail

A Brief History of the Internet’s Biggest BGP Incidents

Kentik

In this blog post, I will address selected specific incidents which have demonstrated the range and gravity of threats to the stability and security of the internet’s routing system. This cannot be done over an encrypted and authenticated connection, as the party requesting the certificate may be requesting a certificate for the first time.

article thumbnail

Finding Proxylogon and Related Microsoft Exchange Vulnerabilities: How Tenable Can Help

Tenable

Tenable released version check plugins for Exchange Server 2010, 2013, 2016 and 2019, which can be used to determine which Exchange Server systems are vulnerable in your environment. As we noted in our previous blog, IOCs were initially published by Microsoft and Volexity. Microsoft Exchange Server Authentication Bypass.

Malware 58