Thursday, July 4, 2024

CISA Flags Energetic Exploitation of Microsoft SharePoint Vulnerability

Jan 12, 2024NewsroomCyber Assault / Vulnerability

Microsoft SharePoint Vulnerability

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has added a essential safety vulnerability impacting Microsoft SharePoint Server to its Recognized Exploited Vulnerabilities (KEV) catalog, citing proof of lively exploitation.

The difficulty, tracked as CVE-2023-29357 (CVSS rating: 9.8), is a privilege escalation flaw that could possibly be exploited by an attacker to realize administrator privileges. Microsoft launched patches for the bug as a part of its June 2023 Patch Tuesday updates.

“An attacker who has gained entry to spoofed JWT authentication tokens can use them to execute a community assault which bypasses authentication and permits them to realize entry to the privileges of an authenticated consumer,” Redmond mentioned. “The attacker wants no privileges nor does the consumer must carry out any motion.”

Safety researcher Nguyễn Tiến Giang (Jang) of StarLabs SG demonstrated an exploit for the flaw on the Pwn2Own Vancouver hacking contest final 12 months, incomes a $100,000 prize.

Cybersecurity

The pre-authenticated distant code execution chain combines authentication bypass (CVE-2023–29357) with a code injection bug (CVE-2023-24955, CVSS rating: 7.2), the latter of which was patched by Microsoft in Might 2023.

“The method of discovering and crafting the exploit chain consumed almost a 12 months of meticulous effort and analysis to finish the complete exploit chain,” Tiến Giang famous in a technical report revealed in September 2023.

Further specifics of the real-world exploitation of CVE-2023–29357 and the id of the risk actors that could be abusing them are presently unknown. That mentioned, federal businesses are really useful to use the patches by January 31, 2024, to safe towards the lively risk.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles