<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Windows LSA Spoofing Vulnerability &#8211; DEVOQ Technology</title>
	<atom:link href="https://www.devoq.gr/tag/windows-lsa-spoofing-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.devoq.gr</link>
	<description></description>
	<lastBuildDate>Sat, 21 Jun 2025 12:31:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://i0.wp.com/www.devoq.gr/wp-content/uploads/2018/07/cropped-logo_ico.png?fit=32%2C32&#038;ssl=1</url>
	<title>Windows LSA Spoofing Vulnerability &#8211; DEVOQ Technology</title>
	<link>https://www.devoq.gr</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">192885280</site>	<item>
		<title>Threat Advisory &#8211; May 12-18</title>
		<link>https://www.devoq.gr/2022/05/18/threat-advisory-may-12-18/</link>
					<comments>https://www.devoq.gr/2022/05/18/threat-advisory-may-12-18/#respond</comments>
		
		<dc:creator><![CDATA[DEVOQ Technology]]></dc:creator>
		<pubDate>Wed, 18 May 2022 12:30:19 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[DEVOQ Technology]]></category>
		<category><![CDATA[devoq.gr]]></category>
		<category><![CDATA[Microsoft's May 2022 Patch Tuesday]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[security vulnerabilities]]></category>
		<category><![CDATA[Threat Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows LSA Spoofing Vulnerability]]></category>
		<category><![CDATA[zero-day vulnerability]]></category>
		<guid isPermaLink="false">https://devoq.gr/?p=11114895</guid>

					<description><![CDATA[Microsoft has reminded customers today that Windows Server, version 20H2, will be reaching the end of service (EOS) on August 9, 2022]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><span style="color: #333333;">CySec news</span></h1>
<p style="text-align: center;"><span style="color: #333333;">Microsoft has reminded customers today that Windows Server, version 20H2, will be reaching the end of service (EOS) on August 9, 2022. In a <a style="color: #333333;" href="https://docs.microsoft.com/en-US/lifecycle/announcements/windows-server-20h2-retiring" target="_blank" rel="nofollow noopener">support document</a> published today, Microsoft says that Windows Server 20H2 will reach the mainstream support end date for Datacenter Core and Standard Core users.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-server-20h2-reaches-end-of-service-in-august/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">NVIDIA has released a security update for a wide range of graphics card models, addressing four high-severity and six medium-severity vulnerabilities in its GPU drivers. The security update fixes vulnerabilities that can lead to denial of service, information disclosure, elevation of privileges, code execution, etc. Interestingly, apart from the current and recent product lines that are actively supported, NVIDIA’s latest release also covers GTX 600 and GTX 700 Kepler-series cards, whose support ended in October 2021. The GPU maker previously <a style="color: #333333;" href="https://nvidia.custhelp.com/app/answers/detail/a_id/5202" target="_blank" rel="nofollow noopener">promised</a> to continue providing critical security updates for these products until September 2024, and this driver update honors that promise.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference: </strong>https://www.bleepingcomputer.com/news/security/nvidia-fixes-ten-vulnerabilities-in-windows-gpu-display-drivers/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Apple has released security updates to address a zero-day vulnerability that threat actors can exploit in attacks targeting Macs and Apple Watch devices. The flaw is an out-of-bounds write issue (CVE-2022-22675) in the AppleAVD (a kernel extension for audio and video decoding) that allows apps to execute arbitrary code with kernel privileges. The bug was reported by anonymous researchers and fixed by Apple in <a style="color: #333333;" href="https://support.apple.com/en-us/HT213256" target="_blank" rel="nofollow noopener">macOS Big Sur 11.6.</a>, <a style="color: #333333;" href="https://support.apple.com/en-us/HT213253" target="_blank" rel="nofollow noopener">watchOS 8.6</a>, and <a style="color: #333333;" href="https://support.apple.com/en-us/HT213254" target="_blank" rel="nofollow noopener">tvOS 15.5</a> with improved bounds checking. The list of impacted devices includes Apple Watch Series 3 or late, Macs running macOS Big Sur, Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference: </strong>https://www.bleepingcomputer.com/news/security/apple-emergency-update-fixes-zero-day-used-to-hack-macs-watches/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">A new variant of the macOS malware tracked as <b>UpdateAgent </b>has been spotted in the wild, indicating ongoing attempts on the part of its authors to upgrade its functionalities. The newly discovered Swift-based dropper masquerades as Mach-O binaries named &#8220;<a style="color: #333333;" href="https://www.virustotal.com/gui/file/d737c8dc4def95064e8078bcf2a1fa0fe2bae9dd0a5769474a360bf00a268a06" target="_blank" rel="noopener">PDFCreator</a>&#8221; and &#8220;<a style="color: #333333;" href="https://www.virustotal.com/gui/file/f2b2a07db11a8ccc3f7431c94130a48e746c1aa2129d9e805f4d6bb4d1fc422f" target="_blank" rel="noopener">ActiveDirectory</a>&#8221; that, upon execution, establish a connection to a remote server and retrieve a bash script to be executed.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference: </strong>https://thehackernews.com/2022/05/updateagent-returns-with-new-macos.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Tracked as <a style="color: #333333;" href="https://thehackernews.com/2022/05/zyxel-releases-patch-for-critical.html" target="_blank" rel="noopener">CVE-2022-30525</a>, the vulnerability is rated 9.8 for severity and relates to a command injection flaw in select versions of the Zyxel firewall that could enable an unauthenticated adversary to execute arbitrary commands on the underlying operating system.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/05/watch-out-hackers-begin-exploiting.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">SonicWall &#8220;strongly urges&#8221; customers to patch several high-risk security flaws impacting its Secure Mobile Access (SMA) 1000 Series line of products that can let attackers bypass authorization and, potentially, compromise unpatched appliances. While the first flaw (an unauthenticated access control bypass rated as high severity) is now tracked as <a style="color: #333333;" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22282" target="_blank" rel="nofollow noopener">CVE-2022-22282</a>, the other two (a hard-coded cryptographic key and an open redirect, both rated as medium severity) are still waiting for a CVE ID to be issued. &#8220;There are no temporary mitigations. SonicWall urges impacted customers to implement applicable patches as soon as possible,&#8221; the company <a style="color: #333333;" href="https://www.sonicwall.com/support/knowledge-base/security-notice-sma-1000-series-unauthenticated-access-control-bypass/220510172939820/" target="_blank" rel="nofollow noopener">says</a> in a security advisory published this week.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference: </strong>https://www.bleepingcomputer.com/news/security/sonicwall-strongly-urges-admins-to-patch-sslvpn-sma1000-bugs/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Sophos has released a fix for a known issue triggering blue screens of death (aka BSODs) on Windows 11 systems running Sophos Home antivirus software after installing the KB5013943 update. Sophos <a style="color: #333333;" href="https://support.home.sophos.com/hc/en-us/articles/6257009398292" target="_blank" rel="nofollow noopener">says</a> the issue is caused by the hmpalert.sys (aka HitManPro.Alert Support) Windows driver used by Sophos Home. The fix for this known bug will apply automatically to all impacted systems, with users prompted to restart their devices as soon as the patch is applied.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference: </strong>https://www.bleepingcomputer.com/news/software/sophos-antivirus-driver-caused-bsods-after-windows-kb5013943-update/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">The European Parliament announced a &#8220;provisional agreement&#8221; aimed at improving cybersecurity and resilience of both public and private sector entities in the European Union. The revised directive, called &#8220;<b>NIS2</b>&#8221; (short for network and information systems), is expected to replace the <a style="color: #333333;" href="https://digital-strategy.ec.europa.eu/en/policies/nis-directive" target="_blank" rel="noopener">existing legislation</a> on cybersecurity that was established in July 2016. The revamp sets ground rules, requiring companies in energy, transport, financial markets, health, and digital infrastructure sectors to adhere to risk management measures and reporting obligations.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference: </strong>https://thehackernews.com/2022/05/europe-agrees-to-adopt-new-nis2.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">HTML files remain one of the most popular attachments used in phishing attacks for the first four months of 2022, showing that the technique remains effective against antispam engines and works well on the victims themselves. In phishing emails, HTML files are commonly used to redirect users to malicious sites, download files, or to even display phishing forms locally within the browser. As HTML is not malicious, attachments tend not to be detected by email security products, thus doing a good landing in recipients&#8217; inboxes.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference: </strong>https://www.bleepingcomputer.com/news/security/html-attachments-remain-popular-among-phishing-actors-in-2022/</span></p>
<h1 style="text-align: center;"><span style="color: #333333;">CVE&#8217;s of the Week</span></h1>
<h2 style="text-align: center;"><span style="color: #333333;">Cisco</span></h2>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20796 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20796/">CVE-2022-20796</a> &#8211; Score 4.9</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20794 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20794/">CVE-2022-20794</a> &#8211; Score4.3</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20785 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20785/">CVE-2022-20785</a> &#8211; Score 7.8</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20780 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20780/">CVE-2022-20780</a> &#8211; Score 4.3</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20779 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20779/">CVE-2022-20779</a> &#8211; Score 9.3</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20777 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20777/">CVE-2022-20777</a> &#8211; Score 9.0</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20771 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20771/">CVE-2022-20771</a> &#8211; Score 7.8</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20770 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20770/">CVE-2022-20770</a> &#8211; Score 7.8</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20767 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20767/">CVE-2022-20767</a> &#8211; Score 7.8</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20764 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20764/">CVE-2022-20764</a> &#8211; Score 5.5</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20760 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20760/">CVE-2022-20760</a> &#8211; Score 7.8</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20759 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20759/">CVE-2022-20759</a> &#8211; Score 8.5</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20757 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20757/">CVE-2022-20757</a> &#8211; Score 4.3</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20748 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20748/">CVE-2022-20748</a> &#8211; Score 5.0</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20746 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20746/">CVE-2022-20746</a> &#8211; Score 7.1</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20745 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20745/">CVE-2022-20745</a> &#8211; Score 7.8</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20742 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20742/">CVE-2022-20742</a> &#8211; Score 5.8</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20737 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20737/">CVE-2022-20737</a> &#8211; Score 7.0</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20734 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20734/">CVE-2022-20734</a> &#8211; Score 4.9</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20730 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20730/">CVE-2022-20730</a>  Score 5.0</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20729 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20729/">CVE-2022-20729</a> &#8211; Score 4.6</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20715 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20715/">CVE-2022-20715</a> &#8211; Score 7.8</span></p>
<h2 style="text-align: center;"><span style="color: #333333;">Microsoft</span></h2>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-29131 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-29131/">CVE-2022-29131</a> &#8211; Score 9.0</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-29130 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-29130/">CVE-2022-29130</a> &#8211; Score 9.3</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-29129 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-29129/">CVE-2022-29129</a> &#8211; Score 9.0</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-29128 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-29128/">CVE-2022-29128</a> &#8211; Score 9.0</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-22014 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-22014/">CVE-2022-22014</a> &#8211;  Score 6.5</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-22013 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-22013/">CVE-2022-22013</a> &#8211; Score 6.5</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-22012 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-22012/">CVE-2022-22012</a> &#8211; Score 9.3</span></p>
<h2 style="text-align: center;"><span style="color: #333333;">Fortinet</span></h2>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-23443 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-23443/">CVE-2022-23443</a> &#8211; Score 5.0</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2021-43206 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2021-43206/">CVE-2021-43206</a> &#8211; Score 4.3</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2021-41032 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2021-41032/">CVE-2021-41032</a> &#8211; Score 5.5</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2021-41020 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2021-41020/">CVE-2021-41020</a> &#8211; Score 6.5</span></p>

]]></content:encoded>
					
					<wfw:commentRss>https://www.devoq.gr/2022/05/18/threat-advisory-may-12-18/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11114895</post-id>	</item>
		<item>
		<title>Threat Advisory – May 5-11</title>
		<link>https://www.devoq.gr/2022/05/15/threat-advisory-may-5-11/</link>
					<comments>https://www.devoq.gr/2022/05/15/threat-advisory-may-5-11/#respond</comments>
		
		<dc:creator><![CDATA[DEVOQ Technology]]></dc:creator>
		<pubDate>Sun, 15 May 2022 16:52:18 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[DEVOQ Technology]]></category>
		<category><![CDATA[devoq.gr]]></category>
		<category><![CDATA[Microsoft's May 2022 Patch Tuesday]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[security vulnerabilities]]></category>
		<category><![CDATA[Threat Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows LSA Spoofing Vulnerability]]></category>
		<category><![CDATA[zero-day vulnerability]]></category>
		<guid isPermaLink="false">https://devoq.gr/?p=11114877</guid>

					<description><![CDATA[Today is Microsoft's May 2022 Patch Tuesday, and with it comes fixes for three zero-day vulnerabilities,]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><span style="color: #333333;">CySec News</span></h1>
<p style="text-align: center;"><span style="color: #333333;">Today is Microsoft&#8217;s May 2022 Patch Tuesday, and with it comes fixes for three zero-day vulnerabilities, with one actively exploited, and a total of 75 flaws. Of the 75 vulnerabilities fixed in today&#8217;s update, eight are classified as &#8216;Critical&#8217; as they allow remote code execution or elevation of privileges. The actively exploited zero-day vulnerability fixed today is for a new NTLM Relay Attack using an LSARPC flaw tracked as &#8216;<a style="color: #333333;" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26925">CVE-2022-26925</a> &#8211; Windows LSA Spoofing Vulnerability.&#8217;</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/microsoft/microsoft-may-2022-patch-tuesday-fixes-3-zero-days-75-flaws/">https://www.bleepingcomputer.com/news/microsoft/microsoft-may-2022-patch-tuesday-fixes-3-zero-days-75-flaws/</a></span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Microsoft on Monday disclosed that it mitigated a security flaw affecting Azure Synapse and Azure Data Factory that, if successfully exploited, could result in remote code execution. A malicious actor can weaponize the bug to acquire the Azure Data Factory service certificate and access another tenant&#8217;s Integration Runtimes to gain access to sensitive information, effectively breaking tenant separation protections.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> <a style="color: #333333;" href="https://thehackernews.com/2022/05/microsoft-mitigates-rce-vulnerability.html">https://thehackernews.com/2022/05/microsoft-mitigates-rce-vulnerability.html</a></span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">A recently disclosed F5 BIG-IP vulnerability has been used in destructive attacks, attempting to erase a device&#8217;s file system and make the server unusable. Last week, <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/security/f5-warns-of-critical-big-ip-rce-bug-allowing-device-takeover/">F5 disclosed</a> a vulnerability tracked as CVE-2022-1388 that allows remote attackers to execute commands on BIG-IP network devices as &#8216;root&#8217; without authentication. Due to the critical nature of the bug, F5 urged admins to apply updates as soon as possible. A few days later, researchers began publicly publishing exploits on Twitter and GitHub, with <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/security/hackers-exploiting-critical-f5-big-ip-bug-public-exploits-released/">threat actors soon using them in attacks</a> across the Internet.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/security/critical-f5-big-ip-vulnerability-exploited-to-wipe-devices/">https://www.bleepingcomputer.com/news/security/critical-f5-big-ip-vulnerability-exploited-to-wipe-devices/</a></span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Two high-severity security vulnerabilities, which went undetected for several years, have been discovered in a <a style="color: #333333;" href="https://docs.microsoft.com/en-us/windows-hardware/drivers/gettingstarted/what-is-a-driver-">legitimate driver</a> that&#8217;s part of Avast and AVG antivirus solutions. &#8220;These vulnerabilities allow attackers to escalate privileges enabling them to disable security products, overwrite system components, corrupt the operating system, or perform malicious operations unimpeded&#8221;.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> <a style="color: #333333;" href="https://thehackernews.com/2022/05/researchers-disclose-10-year-old.html">https://thehackernews.com/2022/05/researchers-disclose-10-year-old.html</a></span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">GitHub announced today that all users who contribute code on its platform (an estimated 83 million developers in total) will be required to enable two-factor authentication (2FA) on their accounts by the end of 2023. Active contributors who will have to enable 2FA include but are not limited to GitHub users who commit code, use Actions, open or merge pull requests, or publish packages. Developers can use one or more 2FA options, including physical security keys, virtual security keys built into devices like phones and laptops, or Time-based One-Time Password (TOTP) authenticator apps.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/security/github-to-require-2fa-from-active-developers-by-the-end-of-2023/">https://www.bleepingcomputer.com/news/security/github-to-require-2fa-from-active-developers-by-the-end-of-2023/</a></span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Today, GitHub has launched a new public beta to notably improve the two-factor authentication (2FA) experience for all npm user accounts. Myles Borins, Open Source Product Manager at GitHub, said that the code hosting platform now allows npm accounts to register &#8220;multiple second factors, such as security keys, biometric devices, and authentication applications.&#8221; It has also introduced a new 2FA configuration menu that allows users to manage registered keys and recovery codes.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/security/github-announces-enhanced-2fa-experience-for-npm-accounts/">https://www.bleepingcomputer.com/news/security/github-announces-enhanced-2fa-experience-for-npm-accounts/</a></span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Cisco has addressed several security flaws found in the Enterprise NFV Infrastructure Software (<a style="color: #333333;" href="https://www.cisco.com/c/en/us/products/routers/enterprise-nfv-infrastructure-software/index.html">NFVIS</a>), a solution that helps virtualize network services for easier management of virtual network functions (VNFs). Two of them, rated critical and high severity, can be exploited by attackers to run commands with root privileges or to escape the guest virtual machine (VM) and fully compromise NFVIS hosts. Cisco&#8217;s Product Security Incident Response Team (PSIRT) says there is no proof-of-concept exploit code and no ongoing exploitation in the wild.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/security/cisco-fixes-nfvis-bugs-that-help-gain-root-and-hijack-hosts/">https://www.bleepingcomputer.com/news/security/cisco-fixes-nfvis-bugs-that-help-gain-root-and-hijack-hosts/</a></span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">QNAP has released several security advisories today, one of them for a critical security issue that allows remote execution of arbitrary commands on vulnerable QVR systems, the company&#8217;s video surveillance solution hosted on a NAS device. The vulnerability is tracked as <a style="color: #333333;" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27588">CVE-2022-27588</a> and has a critical severity score of 9.8. It impacts QVR versions older than 5.1.6 build 20220401.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/security/qnap-fixes-critical-qvr-remote-command-execution-vulnerability/">https://www.bleepingcomputer.com/news/security/qnap-fixes-critical-qvr-remote-command-execution-vulnerability/</a></span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Trend Micro antivirus has fixed a false positive affecting its Apex One endpoint security solution that caused Microsoft Edge updates to be tagged as malware and the Windows registry to be incorrectly modified. According to hundreds of customer reports that started streaming in earlier this week on <a style="color: #333333;" href="https://success.trendmicro.com/forum/s/question/0D54T00001QDqzgSAD/we-are-getting-this-message-from-every-client-since-several-minutesis-it-a-false-positiv-error-or-do-we-have-a-real-trojaner-problem-">the company&#8217;s forum</a> and on <a style="color: #333333;" href="https://www.reddit.com/r/sysadmin/comments/uhdo02/trend_apexone_flagging_false_positive_on_latest/">social networks</a>, the false positive affected update packages stored in the Microsoft Edge installation folder. As users further revealed, the Trend Micro Apex One flagged the browser updates as Virus/Malware: TROJ_FRS.VSNTE222 and Virus/Malware: TSC_GENCLEAN.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/security/trend-micro-antivirus-modified-windows-registry-by-mistake-how-to-fix/">https://www.bleepingcomputer.com/news/security/trend-micro-antivirus-modified-windows-registry-by-mistake-how-to-fix/</a></span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">The European Union (EU) wants to see greater standardization across European cybersecurity legislation and regulations, according to the bloc’s cybersecurity agency. The EU sees standards as vital to increasing security across the bloc, as well as ensuring that cybersecurity measures are consistent between member states. This, the European Commission argues, will make it easier for both security vendors and businesses in general to work across borders. EU-wide standards are envisaged for both product <a style="color: #333333;" href="https://portswigger.net/daily-swig/certification">certification</a> and legislation on computer misuse.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> <a style="color: #333333;" href="https://portswigger.net/daily-swig/eu-targets-standardization-as-key-to-bloc-wide-cyber-resilience">https://portswigger.net/daily-swig/eu-targets-standardization-as-key-to-bloc-wide-cyber-resilience</a></span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Security researchers have noticed a malicious campaign that used Windows event logs to store malware, a technique that has not been previously documented publicly for attacks in the wild. The method enabled the threat actor behind the attack to plant fileless malware in the file system in an attack filled with techniques and modules designed to keep the activity as stealthy as possible.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/security/hackers-are-now-hiding-malware-in-windows-event-logs/">https://www.bleepingcomputer.com/news/security/hackers-are-now-hiding-malware-in-windows-event-logs/</a></span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">On April 26, 2022, a new Emotet campaign was spotted in the wild, where the usual Office delivery system was replaced with LNK files, in a clear response to the VBA protection launched by Microsoft. Researchers found 139 distinct LNK files that are part of the same campaign, delivering two distinct payloads that share the same C2 infrastructure.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> <a style="color: #333333;" href="https://otx.alienvault.com/pulse/627a83c015db5d4d97dc6779">https://otx.alienvault.com/pulse/627a83c015db5d4d97dc6779</a></span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">In February 2022 has been observed a technique of putting the shellcode into Windows event logs for the first time “in the wild” during the malicious campaign. It allows the “fileless” last stage Trojan to be hidden from plain sight in the file system. Such attention to the event logs in the campaign isn’t limited to storing shellcodes. Dropper modules also patch Windows native API functions, related to event tracing (ETW) and anti-malware scan interface (AMSI), to make the infection process stealthier.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> <a style="color: #333333;" href="https://securelist.com/a-new-secret-stash-for-fileless-malware/106393/">https://securelist.com/a-new-secret-stash-for-fileless-malware/106393/</a></span></p>
<h1 style="text-align: center;"><span style="color: #333333;">CVE&#8217;s of the Week</span></h1>
<h2 style="text-align: center;"><span style="color: #333333;">CISCO</span></h2>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" href="https://www.cvedetails.com/cve/CVE-2022-20744/">CVE-2022-20744</a> &#8211; Score 4.0</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" href="https://www.cvedetails.com/cve/CVE-2022-20743/">CVE-2022-20743</a> &#8211; Score 9.0</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" href="https://www.cvedetails.com/cve/CVE-2022-20740/">CVE-2022-20740</a> &#8211; Score 4.3</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" href="https://www.cvedetails.com/cve/CVE-2022-20629/">CVE-2022-20629</a> &#8211; Score 3.5</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" href="https://www.cvedetails.com/cve/CVE-2022-20628/">CVE-2022-20628</a> &#8211; Score 3.5</span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" href="https://www.cvedetails.com/cve/CVE-2022-20627/">CVE-2022-20627</a> &#8211; Score 3.5</span></p>

]]></content:encoded>
					
					<wfw:commentRss>https://www.devoq.gr/2022/05/15/threat-advisory-may-5-11/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11114877</post-id>	</item>
	</channel>
</rss>
