article thumbnail

Microsoft’s February 2024 Patch Tuesday Addresses 73 CVEs (CVE-2024-21351, CVE-2024-21412)

Tenable

Important November 2023 Important CVE-2024-21412 | Internet Shortcut Files Security Feature Bypass Vulnerability CVE-2024-21412 is a security feature bypass in Internet Shortcut Files. Exploitation of this flaw requires an attacker to convince their intended target to open a malicious Internet Shortcut File using social engineering.

LAN 124
article thumbnail

Hybrid working: network managers need to take care of unfinished business

CIO

But even though hybrid working is here to stay, organizations may still lack the cybersecurity controls and business-grade internet connections, like SD-WAN, that are required to support remote and hybrid workers. NTT’s recipe for hybrid working begins with zero trust network architecture, identity management and multifactor authentication.

Network 222
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft’s September 2023 Patch Tuesday Addresses 61 CVEs (CVE-2023-36761)

Tenable

Successful exploitation of this flaw would allow for the disclosure of New Technology LAN Manager (NTLM) hashes. Successful exploitation of these vulnerabilities requires an attacker to authenticate with LAN-access and have valid credentials for an Exchange user. Each of these vulnerabilities were given CVSSv3 scores of 8.0

LAN 119
article thumbnail

Microsoft’s January 2023 Patch Tuesday Addresses 98 CVEs (CVE-2023-21674)

Tenable

Windows Authentication Methods. Windows Internet Key Exchange (IKE) Protocol. and could grant an authenticated attacker SYSTEM privileges. CVE-2023-21745 can be exploited by an adjacent attacker — either via the local area network, or over the internet — and was rated “Exploitation More Likely.” Windows Backup Engine.

Windows 99
article thumbnail

CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller

Tenable

Security researchers reveal how the cryptographic authentication scheme in Netlogon can be exploited to take control of a Windows domain controller (DC). An attacker can exploit this flaw to impersonate the identity of any machine on a network when attempting to authenticate to the Domain Controller (DC). Background. the maximum score.

Windows 115
article thumbnail

It's 2022. Why do you keep using SMB?

Ivanti

communication protocol that was originally created by IBM and was used by Microsoft in its LAN Manager product during the mid-1990s. was renamed CIFS (Common Internet File System) and Microsoft submitted some partial specifications to IETF as drafts, though these submissions have since expired. Server Message Block?(SMB) Windows 10?and?Windows

SMB 69
article thumbnail

The Cable Security Experience

CableLabs

This includes the development and maintenance of the Data Over Cable Service Interface Specification (DOCSIS®) technology that enables broadband internet service over HFC networks. They may attack the CPE device from the home network side, or the local area network (LAN) side. Authentication is conducted using a secret of some sort.