Security Advisories: Feb 10 to Feb 16, 2025

Title: mySCADA myPRO OS Command Injection

Published Date: Nov 21, 2024

Risk Index: 9.08 of 10 (Critical)

Summary: A critical vulnerability has been identified in the command input validation logic of the myPRO Manager component of mySCADA’s software suite. This vulnerability could potentially allow an unauthenticated remote attacker to inject and execute arbitrary operating system commands.

If exploited, this vulnerability could allow an attacker to gain unauthorized access to the affected system, execute arbitrary operating system commands, and potentially take complete control of the underlying server. The attack vector’s remote and unauthenticated nature magnifies the risk, as it could lead to disruption of critical industrial operations and unauthorized access to sensitive information. Potential consequences include:

โ— Unauthorized Remote Code Execution (RCE)
โ— Data breaches and unauthorized access to sensitive information
โ— Disruption of critical operations and industrial processes
โ— Potential for launching further attacks within a compromised network

Title: Chartify โ€“ WordPress Chart Plugin <= 2.9.5 – Unauthenticated Local File Inclusion via source

Published Date: Nov 14, 2024

Risk Index: 9.04 of 10 (Critical)

Summary: A critical vulnerability has been identified in the Chartify โ€“ WordPress Chart Plugin in versions up to, and including, 2.9.5. This Local File Inclusion vulnerability is exploited via the ‘source’ parameter, allowing unauthorized attackers to include and execute arbitrary files on the server. As a result, malicious actors can bypass access controls, obtain sensitive information, or execute any PHP code available in the included files.

If exploited, this vulnerability could allow an attacker to gain unauthorized access to the server, read sensitive data, execute arbitrary PHP code, and potentially take full control of the server. This jeopardizes the confidentiality, integrity, and availability of the data and the hosting environment.

Title: Multiple Vulnerabilities in Microsoft Windows

Published Date: Jun 09, 2015

Risk Index: 9.3 of 10 (Critical)

Summary: A critical vulnerability has been identified in the kernel-mode drivers (win32k.sys) of multiple Microsoft Windows products. This vulnerability, known as “Win32k Elevation of Privilege Vulnerability,” allows local users to gain elevated privileges or cause a denial of service (DoS) through memory corruption by running a specially crafted application.

If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data or execute arbitrary code on the affected system. This access could lead to full administrative control, with the ability to compromise system integrity, confidentiality, and availability. Attackers may also install further malware, exfiltrate data, or leverage the compromised system to initiate wider network attacks, emphasizing the high risk and impact associated with this vulnerability.

Check out our Vulnerability Notices to keep up to date with the vulnerabilities to watch out for.ย 

Share This Post On