#psirt

2024-07-02

A critical zero-day vulnerability, known as CVE-2024-20399, exists in the Command Line Interface (CLI) of Cisco NX-OS Software. This flaw allows attackers to run arbitrary commands as root on affected devices, posing a severe risk to network security, especially for those using Cisco's Nexus and MDS series switches. The issue stems from inadequate validation of arguments given to specific CLI commands. An attacker with admin rights can exploit this by inputting specially crafted arguments during a CLI command, gaining root access and the ability to execute any commands.

The Cisco Product Security Incident Response Team (PSIRT) discovered this vulnerability being actively exploited in April 2024, linking the attacks to a Chinese state-sponsored group called Velvet Ant. This group deployed malware through the flaw, enabling remote control, file uploads, and hidden malicious activities. Cisco has issued software updates to fix this issue, but there are no temporary solutions. It's crucial for administrators to install these updates immediately and frequently update admin passwords to reduce risks. Cisco offers a Software Checker tool to help identify affected software and the necessary updates. Organizations using affected Cisco products should prioritize patching and closely watch their networks for suspicious activity.

sec.cloudapps.cisco.com/securi

sec.cloudapps.cisco.com/securi

#cybersecurity #cisco #vulnerability #zeroday #cve #cli #nxos #nexus #mds #switch #root #psirt #velvetant #software #patch #update

@chrysn The company that sells the device to me should make sure the software components are maintained. "Ask your CPU manufacturer" can't be the answer the customer gets.

Firmware bugs and vulnerabilities "may not be critical" but they just as well may. And the #PSIRT has to check that and take measures accordingly. If they just answer "we don't care about that product anymore" than I as the owner want to know that.

2024-04-12

Unauthenticated, RCE vulnerability in Palo Alto firewalls, exploits in the wild
security.paloaltonetworks.com/
#ycombinator #psirt #PANW #PAN #CVE #Report_Vulnerabilities #Palo_Alto_Networks

Matt "msw" Wilsonmsw@mstdn.social
2024-03-15

Hot take for anyone who characterizes the lack of NIST-produced CVSS scores in the NVD as “flying blind” in vulnerability risk management practice: those scores were never intended to be the sole indicator of “risk.” By definition they don’t represent “risk” in any practical way.

#InfoSec #CVE #CVSS #NVD #PSIRT

2023-11-09

@firstdotorg

I just want to say thank you and wow for offering FREE TRAINING & a CERTIFICATE for the new CVSS v4.0. You guys should promote this more. It really opened my eyes to the awesome potential in v4's base, threat, and environmental scoring (CVSS-BTE). Hope to see more tools supporting this.

Link: first.org/cvss/training

#FIRSTdotOrg #CVSS #BuildingTrust #PSIRT #CSIRT

2023-11-01

The CVSS Special Interest Group is proud to announce the official release of CVSS v4.0. This latest release marks a significant step forward with added capabilities crucial for teams with the importance of using threat intelligence and environmental metrics for accurate scoring at its core.

Critical in the interface between supplier and consumer, CVSS provides a way to capture the principal characteristics of a security vulnerability and produces a numerical score reflecting its technical severity to inform and provide guidance to businesses, service providers, government, and the public.

The numerical score can be represented as a qualitative severity rating (such as low, medium, high, and critical) to help organizations properly assess and prioritize their vulnerability management processes and prepare defenses against cyber-attacks.

Furthermore, this system allows the consumer to also assess real-time threat and impact, arming them with vital information to help to defend themselves against an attack.

The Common Vulnerability Scoring System is a published standard used by organizations worldwide, and this latest version of CVSS 4.0 seeks to provide the highest fidelity of vulnerability assessment for both industry and the public.

More can be found here: first.org/cvss

#FIRSTdotOrg #CVSS #BuildingTrust #PSIRT #CSIRT

acrypthash👨🏻‍💻acrypthash@infosec.exchange
2023-10-12

A cool fuzzer I have been messing with after learning about it from Fortinet's latest PSIRT Advisories.

github.com/Cisco-Talos/mutiny-

#security #fuzzing #Fortinet #PSIRT #ciscotalos

2023-10-05

Meanwhile: A 2+ billion USD enterprise priding themselves to be researcher friendly (read: they promise maybe not sue you) have been unable to respond to a report of a critical #RCE #vulnerability within 5 business days.

Maybe they should throw more of that $$$ towards their #PSIRT ?

Chris John Riley :unverified:ChrisJohnRiley@infosec.exchange
2023-07-03

Did you miss #FIRSTCON23? Have no fear; the #FIRSTImpressions podcast is here! Check out the newest episode to learn about the critical role #PSIRT plays in Customer Trust, Adoption, and Renewal from con speakers, Kevin Hagopian and Emer O’Neill. ow.ly/IXa950OZIQB

First Podcast banner
2023-06-18

Great to see the FIRST CTI event recognised as a go-to event for Cyber Threat Intel.

Register now for this year's event: first.org/conference/berlin202 and save the date for 2024: Apr 15-17.

blog.pulsedive.com/the-biggest

#FIRSTdotOrg #collaboration #BuildingTrust #PSIRT #CSIRT #CTI

2023-03-04

That's a wrap - a great event in Kigali, Rwanda.

Min. Paula Ingabire (Minister of Information Communication Technology and Innovation) opened the FIRST, AfricaCERT and National Cyber Security Authority Rwanda symposium. 4 days of excellent content bringing together folks from 48 countries to collaborate, learn, build trust and discuss strategies to shape a secure internet for Africa.

#FIRSTdotOrg #collaboration #BuildingTrust #CSIRT #PSIRT #FIRSTAA23

2023-03-02

The #CFP for the Balkan Cybersecurity Days 2023 Symposium is open! May 16-18 in Orhid, North Macedonia. Event overview and CFP guidelines available at first.org/events/colloquia/ohr

@firstdotorg @DCAF_Geneva @MkdCirt @aecmk #collaboration #BuildingTrust #PSIRT #CSIRT

2023-02-28

The #DNSAbuse #SIG has proudly published its Techniques Matrix and has offered an introduction to the document on the #FIRSTBlog. Check it out at: first.org/blog/20230228-DNS_Ab

#FIRSTdotOrg #collaboration #BuildingTrust #PSIRT #CSIRT

2023-02-28

The opening sessions at the FIRST & AfricaCERT Symposium in Kigali, co-hosted by @AfricaCERT and @National Cyber Security Authority Rwanda. 2 days of training followed by a plenary session on Thursday. FIRST doing what FIRST does best - working with great partners to make the internet safer. #FIRSTdotOrg #collaboration #BuildingTrust #PSIRT #CSIRT

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst