Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » CISA flags active exploit of Microsoft SharePoint vulnerability
    Cyber Security

    CISA flags active exploit of Microsoft SharePoint vulnerability

    techempireBy techempire4 Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 12, 2024Editorial DepartmentCyber ​​attacks/vulnerabilities

    Microsoft SharePoint vulnerability

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security vulnerability affecting Microsoft SharePoint Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

    The issue is tracked as CVE-2023-29357 (CVSS score: 9.8) is a privilege escalation flaw that allows an attacker to gain administrator privileges. Microsoft released a patch for the bug as part of the June 2023 Patch Tuesday update.

    “An attacker who obtains spoofed JWT authentication tokens can use them to perform network attacks, bypassing authentication and allowing them to gain the rights of the authenticated user,” Redmond said. “The attacker does not need to No privileges and no action is required from the user.”

    Nguyễn Tiến Giang (Jang), a security researcher at StarLabs SG, demonstrated an exploit for the vulnerability at the Pwn2Own Vancouver hacking competition and received a $100,000 prize.

    Internet security

    The pre-authenticated remote code execution chain combines an authentication bypass (CVE-2023-29357) with a code injection bug (CVE-2023-24955, CVSS score: 7.2), which was reported by Microsoft in May 2023 repair.

    “The process of discovering and building the exploit chain took nearly a year of careful work and research to complete the complete exploit chain,” Tiến Giang noted in a technical report released in September 2023.

    It is currently unclear the actual exploits of CVE-2023-29357 and the identity of the threat actors who may be abusing them. That said, federal agencies are recommended to apply patches by January 31, 2024, to protect against active threats.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.