Skip to content

CISAnalysis – August 18, 2022

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About VRX
VRX is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.

Whoa, nelly! Eight vulnerabilities have been added to CISA’s Known Exploited Vulnerabilities Catalog. We have remote code execution, privilege escalation and the complete compromise of Confidentiality, Integrity and Availability of a system. Let’s dive into a few and see what smarter people than I have to say. Resources will be at the bottom and linked throughout the piece.

CVE-2022-32894 and CVE-2022-32893: CWE-787, Out-of-bounds Write.

Can’t flip on the TV to get your daily dose of social, cultural, and environmental decline without some talking head getting the newest Apple vulnerabilities in your existential dread. What gives? Well, 32894 allows an attacker to escalate privileges via a local application. This local application triggers an out-of-bounds write error allowing the execution of arbitrary code with kernel privileges. 32893 “is a boundary error in WebKit when processing HTML content.” If a user opens a malicious website created by a remote attacker, an out-of-bounds write is triggered which executes arbitrary code.

Apple users need to update Monterey.

CVE-2022-22536: CWE-444, HTTP Request/Response Smuggling or Memory Pipe Desynchronization per Tenable.

This one received a perfect CVSSv3 score of 10.0 and affects SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server and SAP Web Dispatcher. Per an Onapsis threat report that is available to download on their website, the vulnerability appears

…when an internal handler is able to generate a response, and the size of the request is bigger than that of the MPI Buffer. If a proxy is placed between the ICM and the clients, an attacker could leverage this to take over the application by exploiting the HTTP desynchronization between both components.

SAP users can access a patch via their account.

CVE-2022-2856: CWE-20 Improper Input Validation.

This one is fun since it fits the theme of a couple articles that a user has been posting recently and it’s another Google Zero Day! We don’t know much more than this tidbit found on Google’s blog: “insufficient validation of untrusted input in Intents.” Presumably we’ll know more once the update has had a chance to make it around.

Chrome users need to install the recent update.

Sources that were not linked above:

https://www.cybersecurity-help.cz/vdb/SB2022081718

https://onapsis.com/threat-report/icmad-sap-vulnerabilities (downloads the PDF)

#CISAnalysis #apple #google #rce #cisa #zeroday

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About VRX
VRX is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.

Discover more from Version 2

Subscribe now to keep reading and get access to the full archive.

Continue reading

×

Hello!

Click one of our contacts below to chat on WhatsApp

×