{"id":15817,"date":"2023-03-10T14:02:44","date_gmt":"2023-03-10T21:02:44","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=15817"},"modified":"2023-05-02T14:41:04","modified_gmt":"2023-05-02T21:41:04","slug":"securins-threat-intelligence-mar-6-2023-mar-10-2023","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/securins-threat-intelligence-mar-6-2023-mar-10-2023\/","title":{"rendered":"Securin’s Threat Intelligence: Mar 6, 2023 – Mar 10, 2023"},"content":{"rendered":"\t\t
This edition brings you early warnings, trending news about cyber threats, and the accurate threat context. Check out which threat group is on the rampage, what vulnerability it could soon weaponize, and more.<\/span><\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t A spear-phishing campaign spanning over multiple years has been targeting entities in the maritime industry. The threat actors seem to have a financial motivation in carrying out these attacks. The emails contain malicious files which exploit CVE-2017-0199<\/a>, a Microsoft Office vulnerability. Once initial access is gained, the threat actor uses remote access trojans (RATs) such as Agent Tesla and Formbook to harvest sensitive information like credentials, session tokens, and email lists. This information is used to either launch more attacks or sold to provide initial access to other operators. Since the maritime industry holds sensitive information regarding shipping, it needs to step up cyber security measures.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CVE-2022-35914, CVE-2022-33891, and CVE-2022-28810 were added to the CISA KEV catalog on 7 March, 2022.\u00a0<\/span><\/p> ManageEngine fixed<\/a> CVE-2022-28810 in builds 6122 and above.<\/strong><\/p> Apache has asked its users to patch<\/a> this vulnerability as soon as possible.<\/strong><\/p> Here is the patch<\/a> for this vulnerability.<\/strong><\/p> All Federal agencies are required to patch these vulnerabilities before 28-03-3023.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t The proof of concept for the exploit of CVE-2023-21839<\/a> has been\u00a0released<\/a>\u00a0publicly. This Oracle WebLogic vulnerability will allow an unauthenticated attacker to gain network access via T3, IIOP and execute code remotely.\u00a0 Oracle has already\u00a0patched<\/a>\u00a0this vulnerability.<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CVE-2023-21716<\/a> is a vulnerability in Microsoft Office\u2019s \u201cwwlib.dll\u201d. It has a score of 9.8 on the CVSS scale. It allows a remote attacker to execute code with the same privileges as the victim that opens a malicious .RTF document. Microsoft <\/span>addressed<\/span><\/a> this vulnerability in the February Patch Tuesday. The proof of concept for its exploit was <\/span>released<\/span><\/a> recently.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CVE-2023-21716<\/a> is a vulnerability in Microsoft Office\u2019s \u201cwwlib.dll\u201d. It has a score of 9.8 on the CVSS scale. It allows a remote attacker to execute code with the same privileges as the victim that opens a malicious .RTF document. Microsoft <\/span>addressed<\/span><\/a> this vulnerability in the February Patch Tuesday. The proof of concept for its exploit was <\/span>released<\/span><\/a> recently.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CVE-2023-25610<\/a> impacts FortiOS and FortiProxy. It rates 9.3 on the CVSS scale and can allow an unauthenticated attacker to execute arbitrary code or perform denial of service (DoS) on the GUI of vulnerable devices using specially crafted requests. Fortinet has released a <\/strong><\/span>security advisory<\/a> for this vulnerability and urges users to patch it immediately.<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t A high-severity vulnerability,\u00a0 CVE-2023-27532<\/a> is found in Veeam’s Backup & Replication software. It allows unauthenticated attackers to access backup infrastructure hosts after obtaining encrypted credentials stored in the VeeamVBR configuration database. Veeam provides a temporary workaround and also a <\/span>patch<\/span><\/a> for the vulnerability in versions V11 and V12.\u00a0<\/span><\/p> Workaround<\/b>: As a temporary workaround you can block access to TCP port 9401 on your Veeam Backup & Replication server. This will affect the connection of mount servers to the VBR server, so only use this if you don’t have a distributed Veeam environment. And still apply the patch as soon as possible.<\/span><\/p> Users are recommended to upgrade to the V11 or V12 immediately.<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t This Windows Ancillary Function Driver vulnerability, CVE-2023-21768<\/a>,\u00a0 can lead to privilege escalation if exploited. A <\/span>proof of concept<\/span><\/a> has been released for this exploit. Since Microsoft already <\/strong><\/span>patched<\/a> this vulnerability in the January Patch Tuesday, users should apply it immediately in their respective devices before attackers exploit it. <\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Follow our weekly Threat Intelligence Series and podcast for proactive alerts on trending threats.<\/p> Leverage our expertise and manage your threats continuously to stay safe from attackers.\u00a0<\/strong>Talk to Us!<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\tWhy play catch up when you can fix it now?<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Trending Threats<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Vulnerabilities to Watch Out For<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Trending Threats<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Active Spear-Phishing Campaign Against the Maritime Industry<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CISA Adds Three Vulnerabilities to the KEV<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Vulnerabilities to Watch Out For<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Proof of Concept (PoC) Released for Oracle Vulnerability<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Proof of Concept (PoC) Released for CVE-2023-21716<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
VMware NSX Manager Vulnerabilities Actively Exploited In The Wild<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CVE-2023-25610: Fortinet Vulnerability<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CVE-2023-27532: Veeam Vulnerability Fixed<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CVE-2023-21768: Windows Vulnerability<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t