Cybersecurity Vulnerabilities news & analysis | SC Media

Vulnerabilities News and Analyis

antivirus

Researchers disclose five unpatched bugs in Comodo Antivirus

Researchers at Tenable have disclosed five unpatched vulnerabilities in Comodo Antivirus, which reportedly will be patched by Monday of next week. The most significant of the zero-days appears to be CVE-2019-3969, a local privilege escalation condition that results from an flawed verification mechanism in the CmdAgent.exe process file. “A local process can bypass the signature…

Banner vulnerability allows remote access to records of more than 60 colleges

At least 62 colleges were affected by a software vulnerability in a program called Banner, operated by Ellucian, that allows threat actors to infiltrate colleges’ private records. The vulnerability, CVE-2019-8978, was reported in May 2019 and allows an attacker to log in to the Banner system with an institutional account and leverage scripts in the…

13 vulnerabilities disclosed in U-Boot loader

The code analysis platform provider Semmle has publicly disclosed 13 vulnerabilities in the open-source universal boot loader Das U-Boot. The issues, which can lead to remote code execution, are exploitable when U-Boot is configured to use networking and NFS, said Semmle CSO Fermín Serna, who discovered the fault. He noted U-Boot can be found in…

vulnerability

Critical vulnerability found in VLC Media Player

Germany’s national Computer Emergency Response Team (CERT Bund) has issued a security alert for a critical vulnerability in the VLC Media Player. The memory corruption flaw, CVE-2019-13615, affects VLC 3.0.7.1 in Linux, UNIX, Windows and if exploited can allow an attacker to remotely execute arbitrary code, create a denial of service state, disclose information, or…

Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014

Remote code execution vulnerability disclosed in Palo Alto Network’s GlobalProtect SSL VPN

Two cybersecurity researchers have publicly disclosed a remote code execution vulnerability in Palo Alto Network’s GlobalProtect Secure Socket Layer (SSL) virtual private network (VPN) that the company had previously discovered and silently patched. Orange Tsai and Meh Chang, of DevCore Security Consulting, blogged that they came across the flaw while conducting a red team security…

IRS

GAO office audit finds more vulnerabilities at IRS

An annual Government Accountability Office (GAO) audit has found more security vulnerabilities at the Internal Revenue Service (IRS) and has made more security recommendations to solve the problems.  Some of the cybersecurity issues included access control vulnerabilities, a lack of encryption, identification and authorization issues, and a lack of contingency planning, GOA Director of Financial…

Researchers bypass Cylance’s AI-based AV solution by masking malware with video game code

Researchers have disclosed that they were able to repeatedly sneak malware past a leading AI-based endpoint security solution simply by appending benign code strings from a video game file to the malicious code. The solution, CylancePROTECT, from Cylance and its parent company BlackBerry, failed to detect almost 90 percent of the 384 malware programs that…

Flaw allows attackers to alter media files sent via WhatsApp, Telegram, say researchers

Researchers have reported a vulnerability in the Android versions of WhatsApp and Telegram that could allow malicious actors to manipulate media files sent via the apps. This “media file-jacking” flaw could allow attackers to alter photographs, modify invoices (to aid in a financial scam), swap out files in a particular channel feed, or potentially even…

Researchers devise method to track Bluetooth devices, despite built-in protections

Researchers from Boston University (BU) have discovered a way to circumvent anonymization protections on Bluetooth Low Energy devices, allowing potentially malicious actors to passively track the movements of these devices and their users. BLE devices rely on non-encrypted advertising messages to signal their availability to other devices to pair up. To prevent third-party actors from…

Next post in Vulnerabilities