Skip to content

Commit

Permalink
20240626 002,005 + 003 Update (#905)
Browse files Browse the repository at this point in the history
  • Loading branch information
JadonWill authored Jul 26, 2024
1 parent a7b1e00 commit 849b056
Show file tree
Hide file tree
Showing 3 changed files with 54 additions and 1 deletion.
26 changes: 26 additions & 0 deletions docs/advisories/20240726002-Telerik-Critical-Advisory.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
# Telerik Releases Security Advisory - 20240726002

## Overview

Progress has published an advisory to address vulnerabilities in their Telerik Report Server product.

## What is vulnerable?

| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
| ------------------------------ | --------------------------------------------- | --------------------------------------------------------------- | ---- | ------------ |
| Progress Telerik Report Server | **all versions before** 2024 Q2 (10.1.24.709) | [CVE-2024-6327](https://nvd.nist.gov/vuln/detail/CVE-2024-6327) | 9.9 | **Critical** |

## What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 Hours...* (refer [Patch Management](../guidelines/patch-management.md)):

- Progress Telerik Advisory: <https://docs.telerik.com/report-server/knowledge-base/deserialization-vulnerability-cve-2024-6327>

## Additional References

- BleepingComputer blog post: <https://www.bleepingcomputer.com/news/security/progress-warns-of-critical-rce-bug-in-telerik-report-server/>
- SecurityAffairs blog post: <https://securityaffairs.com/166168/security/telerik-report-server-cve-2024-6327.html>
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Overview

GitLab has published and avdisory to address vulnerabilities across multiple versions of its software.
GitLab has published an advisory to address vulnerabilities across multiple versions of its software.

## What is vulnerable?

Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
# ServiceNow Public Exploitation Campaigns - 20240726005

## Overview

The WA SOC has been made aware of a growing number of campaigns targeting instances of ServiceNow since the publication of a Proof-of-Concept (PoC) exploit. Threat actors are chaining together ServiceNow flaws using publicly available exploits for unpatched systems containing vulnerabilities that were addressed on July-10.

## What is vulnerable?

| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
| -------------------------- | ----------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------- | --------------------------------------------------- |
| Utah, Vancouver, Washinton | Multiple versions | - [CVE-2024-4879](https://nvd.nist.gov/vuln/detail/CVE-2024-4879) </br> - [CVE-2024-5178](https://nvd.nist.gov/vuln/detail/CVE-2024-5178) </br> - [CVE-2024-5217](https://nvd.nist.gov/vuln/detail/CVE-2024-5217) | - 9.3 </br> - 6.9 </br> - 9.2 | - **Critical** </br> - Medium </br> - **Critical** |

## What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)):

- CVE-2024-4879: <https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1645154>
- CVE-2024-5178: <https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648312>
- CVE-2024-5217: <https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313>

## Additional References

- Securityonline blog post: <https://securityonline.info/gitlab-patches-six-security-flaws-urges-immediate-update/>

0 comments on commit 849b056

Please sign in to comment.