The Uganda National CERT and Coordination Center (CERT.UG/CC) strongly advises all users to review the security advisory.
Cisco published an update that the public exploit code exists for CVE-2020-350 and further notes that the vulnerability is being actively exploited. This affects Cisco products running vulnerable releases of Cisco ASA Software or FTD Software with a vulnerable AnyConnect or WebVPN configuration.
Google published an urgent security update that addresses 14 vulnerabilities for the Chrome browser. The Uganda National CERT and Coordination Center (CERT.UG/CC) strongly advises all users and Systems Admins to immediately update to the latest version 91.0.4472.101.
Microsoft released security updates that address various vulnerabilities for a range of its impacted products. Six of the vulnerabilities are already under exploit.
The Adobe security team published security updates for various products including Adobe Acrobat and reader. These updates fix multiple vulnerabilities within the affected Adobe products.
Cisco released software updates to fix the Webex memory corruption vulnerability. An attacker could exploit this vulnerability by sending a user a malicious WRF file through a link or email attachment to executive arbitrary code on an affected system.
Ransomware launched on a system encrypts all user files and locks out the user with a demand note for anonymous online payment to restore access. Cybercriminals are mainly targeting Windows platform users.
Nginx released a security fix to address the ‘nginx DNS Resolver Off-by-One Heap Write’ vulnerability. The severity rating is HIGH. Systems Admins should immediately implement the fix in order to avoid the risk of Denial of Service.
VMware security team published security updates to address a Remote Code Execution flaw in vCenter Server.
Microsoft released a security update to fix the XSS vulnerability in the SSH Terminal page related vulnerability. Systems Admins should upgrade to Nagios XI 5.8.0 or above in order to avoid infrastructure compromise.
Microsoft released a security update to fix the Windows NTFS Remote Code Execution Vulnerability. A local attacker could run a specially crafted application that would elevate the attacker's privileges.
VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector contain a Command Injection Vulnerability in the administrative configurator. VMware has evaluated this issue to be of 'Important' severity with a maximum CVSSv3 base score of 7.2.
The cPanel security team released an update that addresses the 2FA bypass vulnerability.
The Drupal security team released a security update to address a critical drupal core Remote Code Execution Vulnerability.
Cisco security released patches that address 17 vulnerabilities (high severity) for appliances that include Adaptive Security Appliance (ASA), Firepower Threat Defence (FTD) and Firepower Management Center (FMC).
Google released a security update (Chrome version 86.0.4240.111) that addresses high severity vulnerabilities affecting the Google Chrome bowser on Linux, Mac and Windows computers. We strongly urge all users to immediately update their browser.
Oracle released a critical patch update to address multiple security vulnerabilities in Oracle code and in third party components included in Oracle products. As is Oracle practice, the patches are cumulative which requires data base admins to also review the previous patches.
The Microsoft Security Response Center has released an advisory on a Remote Code Execution vulnerability that exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets.
The Microsoft Security Response Center released another security advisory concerning a Remote Code Execution (RCE) vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory.
Microsoft Security Team advises that ‘an elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC).