Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Hackers actively exploit Microsoft SharePoint vulnerabilities
    Cyber Security

    Hackers actively exploit Microsoft SharePoint vulnerabilities

    techempireBy techempire3 Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 27, 2024Editorial DepartmentThreat Intelligence/Cyber ​​Security

    Microsoft SharePoint vulnerability

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a security vulnerability affecting Microsoft Sharepoint Server to its Known Exploited Vulnerabilities (KEV) catalog based on evidence of active exploitation in the wild.

    This vulnerability, tracked as CVE-2023-24955 (CVSS score: 7.2), is a critical remote code execution flaw that allows an authenticated attacker with website owner permissions to execute arbitrary code.

    “In a network-based attack, an authenticated attacker acting as the site owner could remotely execute code on SharePoint Server,” Microsoft said in an advisory. In the May 2023 Patch Tuesday update, Microsoft This defect is resolved.

    Internet security

    More than two months ago, CISA added the privilege escalation flaw CVE-2023-29357 in SharePoint Server to its KEV directory.

    It is worth pointing out that StarLabs SG demonstrated an exploit chain combining CVE-2023-29357 and CVE-2023-24955 at last year’s Pwn2Own Vancouver Hacking Competition, winning the researcher a $100,000 prize.

    That said, there is currently no information on attacks that weaponized these two vulnerabilities and the threat actors that might exploit them.

    Microsoft previously told The Hacker News that “Customers who enable automatic updates and enable the ‘Receive updates for other Microsoft products’ option in Windows Update settings are already protected.”

    Federal Civilian Executive Branch (FCEB) agencies must apply these fixes by April 16, 2024 to protect their networks from active threats.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.