Articles about vulnerability

Flash! Ah-ahhh! WebEx pwned for all of us!

Cisco has patched a serious vulnerability in its WebEx software that lets an attacker remotely execute code on target machines via poisoned Adobe Flash files. Switchzilla is today advising all users running WebEx Business Suite or WebEx Meetings (both client and server) to update their software in order to patch CVE-2018-0112 …
Shaun Nichols, 19 Apr 2018
iOS screenshot of iTunes Wi-Fi sync

How's your Wednesday? Things going well? OK, your iPhone, iPad can be pwned via Wi-Fi sync

RSA 2018 The iTunes Wi-Fi sync feature in Apple's iOS can be potentially abused by cops, snoops, and hackers to remotely extract information from, and control, iPhones and iPads. This is according to researchers at Symantec, who discovered that, once an iOS device trusts a physically connected computer, the device can, in certain …
Shaun Nichols, 18 Apr 2018

Security? We've heard of it, say web-app devs. 31 in 33 codebases have at least one big bad vuln

Automated source code analysis of 33 web applications has found that 94 per cent of them have at least one high-severity vulnerability, according to security biz Positive Technologies. "Web applications practically have a target painted on their back," said Leigh-Anne Galloway, cyber security resilience lead at the company in …
Thomas Claburn, 16 Apr 2018
Woman thumbs down, image via Shutterstock

Juniper admins: Pour that hipster gin and settle in for a session

Juniper Networks' bug-hunters have bagged a big haul and shown them off with this month's patch collection. Top of the Gin Palace's priority list is a fix for the critical-rated CVE-2018-0016. This bug affects devices running Connectionless Network Protocol (CLNP) routing on Junos OS 15.1: a crafted packet can “result in a …
A person hiding in a box

SAP's Business Client can own entire apps, DDOS them into dust

SAP has issued its April security update, which brings a waiting world news of ten patch-worthy problems. The nastiest has a CVSS rating of 9.8 and impacts SAP's Business Client, the desktop tool to access much of its wares. Details of the problem are behind a registration wall, but according to ERP Scan, the vulnerability is …

Want to terrify a city with an emergency broadcast? All you need is a laptop and $30

Researchers have uncovered a remote hijacking vulnerability present in the systems many cities and organizations are using to manage emergency sirens and alerts. Dubbed SirenJack, the vulnerability would allow an attacker to remotely activate emergency alert systems manufactured by a company called ATI Systems. Bastille said …
Shaun Nichols, 11 Apr 2018
What the beep?

Linux Beep bug joke backfires as branded fix falls short

Retro programmers may need to reconsider using the Linux beep command as an activity or progress alert. One of the silliest bugs on record emerged late last week, when Debian project leader Chris Lamb took to the distro's security to post an advisory that the little utility had a local privilege escalation vulnerability. The …

Gosh, these 'hacker' nerds are only getting more sophisticated

Hackers have moved away from simple point-of-sale (POS) terminal attacks to more refined assaults on corporations' head offices. An annual report from security firm Trustwave out today highlighted increased sophistication of web app hacking and social engineering tactics on the part of miscreants. Half of the incidents …
John Leyden, 5 Apr 2018
Half mechanical brain

Brain monitor had remote code execution and DoS flaw

Cisco’s Talos security limb has warned that specialist medical hardware has remote code execution and denial of service bugs. Talos researchers say Natus Xltek EEG medical products are susceptible to “A specially crafted network packet” that “can cause a stack buffer overflow resulting in code execution.” Which is rather …

They forked this one up: Microsoft modifies open-source code, blows hole in Windows Defender

A remote-code execution vulnerability in Windows Defender – a flaw that can be exploited by malicious .rar files to run malware on PCs – has been traced back to an open-source archiving tool Microsoft adopted for its own use. The bug, CVE-2018-0986, was patched on Tuesday in the latest version of the Microsoft Malware …
Shaun Nichols, 4 Apr 2018
Shutterstock Easter Egg

Egg on Cisco's face: Three critical software bugs to fix over Easter

Cisco's ruined Easter for netadmins by revealing three critical-rated flaws, with fixes landing today. The company's IOS and IOS XE software need patching against two bugs, CVE-2018-0151 and CVE-2018-0171. CVE-2018-151 is a bounds-checking error in IOS/IOS XE's quality-of-service subsystem, and can be attacked using malicious …

Internet of insecure Things: Software still riddled with security holes

An audit of the security of IoT mobile applications available on official stores has found that tech to safeguard the world of connected things remains outstandingly mediocre. Pradeo Security put a representative sample of 100 iOS and Android applications developed to manage connected objects (heaters, lights, door-locks, baby …
John Leyden, 28 Mar 2018
Someone trying to use a QR code if QR codes were ever this cool

How a QR code can fool iOS 11's Camera app into opening rather than

A security researcher based in Germany has identified a flaw in the way Apple's iOS 11 handles QR codes in its Camera app. Last year, with the launch of iOS 11, Apple gave its Camera app the ability to automatically recognize QR codes. Over the weekend, Roman Mueller found that this feature has a bug that can be used to …
Thomas Claburn, 27 Mar 2018
Afraid of the dark, image via Shutterstock

Your code is RUBBISH, says GitHub. Good thing we're here to save you

Last year, GitHub added security scanning to its dependency graph – and this month flicked the lid off a can absolutely crawling with bugs. The code-sharing site kicked off vulnerability scanning in late 2017, focussing on known Ruby and Javascript library vulnerabilities designated CVE numbers by MITRE. GitHub ran the …
Bounty chocolate - Shuterstock

What ends with X and won't sue security researchers?

If you listen carefully, you'll hear the sound of a very small ship coming in: Netflix has joined Bugcrowd, offering bounties of up to US$15,000 for vulnerabilities. The bounty program covers a host of apps and platforms. Netflix Android and iOS mobile apps are included, the various APIs at, nine other domains on …
A person hiding in a box

Researchers slap SAP CRM with vuln combo for massive damage

A pair of recently patched security vulnerabilities in SAP NetWeaver Application Server Java* could have been combined to hack customer relationship management (CRM) systems. When exploited together, the directory traversal and log injection flaws lead to information disclosure, privilege escalation and full SAP CRM system …
John Leyden, 15 Mar 2018

SecurEnvoy SecurMail, you say? Only after this patch is applied, though

Recently resolved vulnerabilities in SecurEnvoy's encrypted email transfer SecurMail created a way for encrypted emails in users' inboxes to be read, overwritten and deleted by others. The flaws – uncovered by Austrian security firm SEC Consult during a crash test – included cross-site scripting, cross-site request forgery, …
John Leyden, 13 Mar 2018
A Chinese laundry on the back streets of Shanghai

China ALTERED its public vuln database to conceal spy agency tinkering – research

China has altered public vulnerability data to conceal the influence of its spy agency in the country's national information security bug reporting process. The damning finding from threat intel firm Recorded Future follows months of research examining the publication speed for China’s National Vulnerability Database (CNNVD …
John Leyden, 12 Mar 2018

Create a news alert about vulnerability, or find more stories about vulnerability.

Biting the hand that feeds IT © 1998–2018