July 12, 2024

Weekly Threat & Vulnerabilities Report

Executive Summary

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.

CVE-ID Type of vulnerability Severity CVSS Affected Product Exploited-in-Wild EPSS score CISA-KEV Zero-day OSS
CVE-2024-38080 Privilege Escalation High 7.8 Windows Hyper-V True 0.00144 True True False
CVE-2024-23692 Template Injection Critical 9.8 Rejetto HTTP File Server True 0.02333 True False False
CVE-2024-38112 Spoofing vulnerability High 8.1 Microsoft Windows MSHTML Platform True 0.01008 True True False
CVE-2024-29510 Format String vulnerability Medium 6.3 Artifex Ghostscript True 0.00129 False False True
CVE-2024-5441 Arbitrary File Upload High 8.8 Modern Events Calendar plugin True 0.0005 False False False

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned. As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

Vulnerabilities Product Severity Title Exploited-in-Wild CISA KEV
CVE-2023-49103 ownCloud graphapi Critical Information Disclosure Vulnerability in ownCloud graphapi. True True
CVE-2023-22527 Confluence Data Center and Server Critical Template injection vulnerability in Out-of-Date Versions of Confluence Data Center and Server leads to remote code execution True False

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

Vulnerability Product Title Exploit Abused by Botnet
CVE-2021-41773 Apache HTTP Server Path traversal vulnerability in Apache HTTP Server True Zerobot
CVE-2017-17215 Huawei HG532 Remote code execution vulnerability in Huawei HG532 router True Sysrv botnet

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.

VulnerabilitySeverityTitlePatchTargeted By MalwareOSS
CVE-2024-21412HighSecurity Feature Bypass vulnerability in Microsoft Internet Shortcut FilesTrueDarkMe RAT, Meduza stealer, Lumma StealerFalse
CVE-2023-27532HighMissing authentication vulnerability in Veeam Backup & Replication componentTrueEstate RansomwareFalse

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of vulnerability Product Reference
CVE-2024-23967 Stack-based Buffer Overflow Autel MaxiCharger AC Elite Business C50 Resource
CVE-2024-23960 Improper Verification of Cryptographic Signature Alpine Halo9 Resource
CVE-2024-23963 Stack-based Buffer Overflow Alpine Halo9 Resource

Subscribe to our Newsletter