In this week's Security Advisory:
There is a zero-day in the VPN feature of Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) software which could allow an attacker to gain access to the vulnerable device. According to Cisco, the zero-day, CVE-2023-20269, is "due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features." To exploit this vulnerability, an attacker needs to obtain valid credentials through a brute-force attack. Once authenticated, a remote attacker could establish a clientless SSL VPN session with an unauthorized user.
Of note, the following Cisco products are not affected by this zero-day: Firepower Management Center (FMC) Software, FXOS Software, IOS Software, IOS XE Software, IOS XR Software, and NX-OS Software.
Cisco has not released a patch for this zero-day. However, there is a workaround that users can apply until the patch is released. Navigate to the following link to learn more: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC
More Reading/Information
Apple released updates to address two (2) zero-days being actively exploited in iPhone and Mac devices. The first zero-day, CVE-2023-41064, is a buffer overflow vulnerability that could lead to arbitrary code execution when processing specially crafted images. CVE-2023-41064 received a CVSS score of 7.8 out of a possible 10. The second zero-day, CVE-2023-41061, is a validation issue in Apple's Wallet which could lead to arbitrary code execution when processing specially crafted attachments. CVE-2023-41061 received a CVSS score of 7.8 out of a possible 10. It is believed that the zero-days were actively used in a zero-click exploit chain dubbed BLASTPASS which deployed NSO Group's Pegasus mercenary spyware onto iOS devices.
The following products are affected:
This month's Patch Tuesday includes fixes for two (2) zero-days. The two (2) zero-days are being tracked as CVE-2023-36802, is a local privilege elevation vulnerability in the Microsoft Streaming Service Proxy that could allow an attacker to gain SYSTEM level privilege if exploited. The second zero-day, CVE-2023-36761, is an information disclosure vulnerability in Microsoft Word and could allow an attacker to steal NTLM hashes. This attack can be triggered when a user opens a document or views a document in the Preview Pane.
More Reading/Information
There were security updates released for multiple vendors including Adobe, Google Chrome, and Mozilla. The most severe could lead to arbitrary code execution.
Adobe fixed a total of five (5) vulnerabilities, including a zero-day in Adobe Acrobat and Reader that is being actively exploited in the wild. This zero-day is being tracked as CVE-2023-26369 and is an out-of-bounds write issue that could be exploited to gain arbitrary code execution.
Google Chrome Desktop Browser addressed sixteen (16) vulnerabilities, with one (1) given a severity rating of "Critical". These vulnerabilities affect Windows, Mac, and Linux.
Mozilla fixed a critical zero-day that is being actively exploited in the wild. The zero-day is being tracked as CVE-2023-4863 and is a heap buffer overflow in the WebP code library (libwebp). Successful exploitation of this vulnerability can lead to the threat actor executing arbitrary code on the victim's host or the user's browser crashing leading to a denial-of-service attack. This zero-day affects Firefox, Firefox ESR, and Thunderbird.
Notepad++ released updates to address four (4) vulnerabilities. The most severe, CVE-2023-40031, is a high severity heap buffer overflow vulnerability and has received a CVSS score of 7.8 out of a possible 10. CVE-2023-40031 could be exploited to achieve arbitrary code execution. CVE-2023-40031 affects versions prior to 8.5.7.
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe Solutions strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.