Threat Report 12/10/24
Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution Multiple vulnerabilities have been discovered in Google Android...
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those with administrative user rights.
Affected Systems:
Chrome prior to 119.0.6045.105/.106 for Windows
Chrome prior to 119.0.6045.105 for Mac and Linux
Risk:
Remediation Recommendations
Ensure all devices running Google Chrome have the latest version(s) installed.
Enact the Principle of Least Privilege (limit higher-level privileges to only the users that need it)
References
A vulnerability has been discovered in Apple products, which could allow for privilege escalation. Successful exploitation of this vulnerability could allow for privilege escalation in the context of the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those with administrative user rights.
Affected Systems:
Versions prior to macOS Ventura 13.6.1
Versions prior to macOS Sonoma 14.1
Versions prior to macOS Monterey 12.7.1
Versions prior to iOS 16.7.2 and iPadOS 16.7.2
Versions prior to iOS 17.1 and iPadOS 17.1
Versions prior tvOS 17.1
Versions prior watchOS 10.1
Versions prior Safari 17.1
Risk:
Remediation Recommendations
Ensure Apple software has the latest version(s) installed.
Enact the Principle of Least Privilege (limit higher-level privileges to only the users that need it)
References
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution.
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those with administrative user rights.
Affected Systems:
Firefox ESR versions prior to 115.4
Firefox versions prior to 119
Thunderbird versions prior to 115.4
Risk:
Remediation Recommendations
Ensure all devices running Mozilla products have the latest version available installed.
Enact the Principle of Least Privilege (limit higher-level privileges to only the users that need it)
References
Multiple vulnerabilities have been discovered in ChromeOS, the most severe of which could allow for arbitrary code execution. ChromeOS is a Linux-based operating system developed and designed by Google. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Affected Systems:
118.0.5993.117 for Mac and Linux
118.0.5993.117/.118 for Windows
Risk:
Remediation Recommendation
Ensure all devices running ChromeOS have the latest version available installed.
Enact the Principle of Least Privilege (limit higher-level privileges to only the users that need it)
References
On October 20th, KrebsOnSecurity reported that the identity tool provider Okta suffered a security breach earlier in October of this year wherein hackers were able to obtain recordings of web browser sessions (HAR files) which often contain customers’ cookies and session tokens from ongoing support cases at the time. These cookies and session tokens can then be used to impersonate valid users. According to Okta, a “very, very small subset” of their 18,000 customers were impacted by this breach.
In a later update, it was reported that companies 1Password and Cloudflare disclosed compromises of their Okta authentication platforms that were directly related to the Okta breach. However, they announced that no customer information or systems were impacted by said compromises.
Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution Multiple vulnerabilities have been discovered in Google Android...
Critical Patches Issued for Microsoft Products Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could...
Multiple Vulnerabilities in Microsoft Edge (Chromium-Based) Could Allow for Arbitrary Code Execution Multiple vulnerabilities have been discovered...