Summary

  • OpenSSH has patched a pair of vulnerabilities after they were discovered by the Qualsys Threat Research Unit (TRU) using the CodeQL code analysis tool.
  • The central observation was that OpenSSH contains a code paradigm that contained a logic bug similar to the Apple SSL vulnerability.
  • One of these goto statements in the VerifyHostKeyDNS handling could allow an attacker to bypass server verification during the key exchange.
  • Cisco Talos has released a report on the Salt Typhoon breach of US telecom providers and the JumbledPath malware that was used, which included stealing credentials.
  • The Ivanti Endpoint manager was also found to have multiple vulnerabilities during a high-speed code audit.
  • The Florida Institute for Cybersecurity Research published a post and paper on RANsacked research into various LTE and 5G systems.
  • RyotaK found an interesting vulnerability in Chatwork that allows for arbitrary remote code execution when a user clicks a malicious link in the application.
  • Microsoft published Virtual Machines for developers to use for testing websites inside Edge and IE with the puppet admin engine installed.
  • Anurag analysed the Arechclient2 RAT, a bit of .

By Jonathan Bennett

Original Article