<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Software Issues &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/software-issues/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Tue, 13 Jan 2026 14:27:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Software Issues &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>React2Shell Vulnerability Under Mass Exploitation</title>
		<link>https://firsthackersnews.com/react2shell-vulnerability-2/</link>
					<comments>https://firsthackersnews.com/react2shell-vulnerability-2/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 08 Jan 2026 14:38:00 +0000</pubDate>
				<category><![CDATA[Bug Bounty]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[exploitation]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[React2Shell]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10948</guid>

					<description><![CDATA[<p>The React2Shell vulnerability (CVE-2025-55182) continues to be heavily targeted, with attackers launching more than 8.1 million attack attempts</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/react2shell-vulnerability-2/">React2Shell Vulnerability Under Mass Exploitation</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The <strong>React2Shell vulnerability (CVE-2025-55182)</strong> continues to be heavily targeted, with attackers launching <strong>more than 8.1 million attack attempts</strong> since the flaw was disclosed.</p>



<p>Data from GreyNoise shows that while daily attack activity has slightly slowed, it remains extremely high. Attack volumes now average 300,000 to 400,000 attempts per day, confirming that exploitation is ongoing and well-organized.</p>



<h2 class="wp-block-heading">Large-Scale and Global Exploitation</h2>



<p>The attack campaign is spread across a wide infrastructure. Researchers observed activity coming from <strong>thousands of unique IP addresses</strong>, spanning <strong>over 1,000 networks</strong> and <strong>more than 100 countries</strong>.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="547" src="https://firsthackersnews.com/wp-content/uploads/2026/01/image-2-1024x547.png" alt="" class="wp-image-10949" srcset="https://firsthackersnews.com/wp-content/uploads/2026/01/image-2-200x107.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/01/image-2-300x160.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/01/image-2-400x214.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/01/image-2-600x320.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/01/image-2-768x410.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/01/image-2-800x427.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/01/image-2-1024x547.png 1024w, https://firsthackersnews.com/wp-content/uploads/2026/01/image-2-1200x641.png 1200w, https://firsthackersnews.com/wp-content/uploads/2026/01/image-2-1536x820.png 1536w, https://firsthackersnews.com/wp-content/uploads/2026/01/image-2.png 1540w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">More than <strong>8.1 million sessions</strong> have been observed since the campaign began</figcaption></figure>



<p>Cloud platforms are being widely abused to support the attacks. A large portion of the traffic originates from major cloud providers, with Amazon Web Services accounting for a significant share. This approach helps attackers blend in with legitimate traffic and rotate infrastructure quickly.</p>



<h2 class="wp-block-heading">How the Attacks Work</h2>



<p>Most exploitation attempts follow a consistent pattern:</p>



<ul class="wp-block-list">
<li>Initial probes test whether commands can be executed on the target system</li>



<li>If successful, attackers deliver encoded payloads</li>



<li>Additional scripts are run using techniques designed to bypass security controls</li>
</ul>



<p>Attackers continue to refine their methods, creating <strong>tens of thousands of unique payloads</strong> and using varied tools to avoid detection. This constant change makes static defenses like fixed IP blocklists ineffective.</p>



<h2 class="wp-block-heading">What Organizations Should Do</h2>



<p>Systems that remain unpatched are still at risk. Nearly half of the attacking infrastructure appeared only in recent months, showing that new resources are constantly being added.</p>



<p>To reduce exposure, organizations should:</p>



<ul class="wp-block-list">
<li>Patch affected React Server Components immediately</li>



<li>Monitor for suspicious PowerShell activity and encoded commands</li>



<li>Use dynamic threat intelligence rather than static blocklists</li>



<li>Apply network-level protections to exposed services</li>
</ul>



<p>React2Shell is not a short-lived threat. It remains an active and persistent attack vector that requires immediate attention and ongoing monitoring.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/react2shell-vulnerability-2/">React2Shell Vulnerability Under Mass Exploitation</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/react2shell-vulnerability-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows Kernel and Named Pipe Flaws Enable Privilege Escalation</title>
		<link>https://firsthackersnews.com/windows-privilege-escalation-attack-surfaces/</link>
					<comments>https://firsthackersnews.com/windows-privilege-escalation-attack-surfaces/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 29 Dec 2025 11:12:34 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Software Issues]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[kernel drivers]]></category>
		<category><![CDATA[local privilege escalation]]></category>
		<category><![CDATA[malware techniques]]></category>
		<category><![CDATA[named pipes]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[windows internals]]></category>
		<category><![CDATA[windows security]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10871</guid>

					<description><![CDATA[<p>Windows privilege escalation remains a common technique used by attackers to gain deeper control of a system. By</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-privilege-escalation-attack-surfaces/">Windows Kernel and Named Pipe Flaws Enable Privilege Escalation</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Windows privilege escalation remains a common technique used by attackers to gain deeper control of a system. </p>



<p>By abusing weakly protected components such as kernel drivers and named pipes, a standard user account can be elevated to SYSTEM-level access. Kernel drivers are especially attractive targets when IOCTL handling lacks proper input validation.</p>



<h2 class="wp-block-heading"><strong>Windows Kernel and Named Pipe Flaws</strong></h2>



<p>In some WDM drivers that use METHOD_BUFFERED mode, the I/O Manager creates a kernel buffer but does not properly check the data coming from user space. This missing validation becomes a serious security weakness.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="295" src="https://firsthackersnews.com/wp-content/uploads/2025/12/image-9-1024x295.png" alt="" class="wp-image-10872" srcset="https://firsthackersnews.com/wp-content/uploads/2025/12/image-9-200x58.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-9-300x86.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-9-400x115.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-9-600x173.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-9-768x221.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-9-800x231.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-9-1024x295.png 1024w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-9-1200x346.png 1200w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-9-1536x443.png 1536w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-9.png 1600w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">The extracted files were successfully moved to the analysis directory.</figcaption></figure>



<p>Attackers can abuse this gap by sending specially crafted IOCTL requests. These requests include dangerous pointer and size values that the kernel mistakenly trusts and processes.</p>



<p>A typical attack starts by finding exposed device names, then reviewing IOCTL handling logic, and finally identifying weak input checks. Once found, attackers can force the driver to call unsafe kernel functions such as MmMapIoSpace.</p>



<p>This gives them arbitrary read and write access in kernel memory, which can be used to steal the SYSTEM process token and assign it to their own process, resulting in full privilege escalation.</p>



<p>Named pipes are widely used for communication between processes, especially by services running as SYSTEM. This makes them an attractive target for attackers.</p>



<p>While named pipes do not access memory directly like kernel drivers, many services trust incoming pipe messages without proper checks, creating another path for privilege escalation.</p>



<p>The attack begins by looking for SYSTEM-owned named pipes that have weak permissions, allowing any user to read from or write to them. Attackers then study how the pipe works by analyzing the service’s code.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="570" src="https://firsthackersnews.com/wp-content/uploads/2025/12/image-10-1024x570.png" alt="" class="wp-image-10873" srcset="https://firsthackersnews.com/wp-content/uploads/2025/12/image-10-200x111.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-10-300x167.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-10-400x223.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-10-600x334.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-10-768x428.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-10-800x446.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-10-1024x570.png 1024w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-10-1200x668.png 1200w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-10-1536x855.png 1536w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-10.png 1600w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Attackers can abuse this trust gap to freely read and modify data.</figcaption></figure>



<p>In some cases, services accept pipe requests without properly checking who sent them. This lets a normal user ask the service to perform privileged actions.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="370" src="https://firsthackersnews.com/wp-content/uploads/2025/12/image-11-1024x370.png" alt="" class="wp-image-10874" srcset="https://firsthackersnews.com/wp-content/uploads/2025/12/image-11-200x72.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-11-300x109.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-11-400x145.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-11-600x217.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-11-768x278.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-11-800x289.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-11-1024x370.png 1024w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-11-1200x434.png 1200w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-11.png 1335w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Named Pipe Discovery</figcaption></figure>



<p>Researchers have seen examples where this flaw allowed changes to sensitive HKLM registry keys. One real-world case involved a commercial antivirus product, where an insecure named pipe was abused to modify the registry without authorization.</p>



<p>This weakness can let attackers abuse Image File Execution Options (IFEO) to run their own code as SYSTEM.</p>



<p>To reduce risk, security teams should closely review third-party kernel drivers, limit IOCTL access, and ensure all user input is properly checked before it reaches the kernel. Named pipes also need strict permission checks and clear validation of every request.</p>



<p>Research published by Hackyboiz shows that many environments expose named pipes with overly broad permissions. Organizations should identify these pipes and disable or lock down the risky ones. As Windows systems continue to be targeted by advanced attackers, understanding these local privilege-escalation paths is critical for protecting enterprise environments.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-privilege-escalation-attack-surfaces/">Windows Kernel and Named Pipe Flaws Enable Privilege Escalation</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/windows-privilege-escalation-attack-surfaces/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>User Submitted Posts: Vulnerability found in WordPress plugin</title>
		<link>https://firsthackersnews.com/user-submitted-posts-vulnerability/</link>
					<comments>https://firsthackersnews.com/user-submitted-posts-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 16 Oct 2023 17:00:34 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Software Issues]]></category>
		<category><![CDATA[plugin]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[user submitted posts]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[wordpress plugin]]></category>
		<category><![CDATA[wordpress vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7036</guid>

					<description><![CDATA[<p>His team at Patch Stack recently uncovered a fresh vulnerability in the WordPress plugin &#8220;User Submitted Posts,&#8221; affecting</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/user-submitted-posts-vulnerability/">User Submitted Posts: Vulnerability found in WordPress plugin</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>His team at Patch Stack recently uncovered a fresh vulnerability in the WordPress plugin &#8220;User Submitted Posts,&#8221; affecting versions from 20230902 onwards.</p>



<p>With over 20,000 active installations, this popular plugin is utilized for content submissions created by users and is the brainchild of Plugin Planet.</p>



<h2 class="wp-block-heading"><strong>All about the vulnerability :</strong></h2>



<p>The security researcher at Patchstack, Rafie Muhammad, brought attention to this vulnerability, and it has now been officially registered as CVE-2023-45603. According to the researcher, this vulnerability permits unauthorized file uploads.</p>



<p>The bug pertains to how the plugin manages uploaded files, specifically within the &#8220;usp_attach_images&#8221; function. Unauthenticated users could potentially exploit this vulnerability by uploading files containing embedded PHP code, which may subsequently execute on the server, potentially jeopardizing the security of the website.</p>



<p>The researcher elaborated that their team unearthed the vulnerability within the User Submitted Posts WordPress plugin in September 2023. </p>



<p>Plugin Planet promptly issued a patch just two days after its discovery. By October 10, 2023, the vulnerability had been officially documented in the Patchstack database.</p>



<p>&#8220;<em>Since the main problem is that arbitrary file name extensions are allowed to be uploaded, the vendor decided to add a whitelist check before uploading the file to the server</em>&#8220;, refers.</p>



<p>The matter has been resolved in the most recent release of the WordPress plugin, denoted as version 20230914. Users are strongly advised to promptly upgrade to safeguard their websites.</p>



<p>The researcher also emphasized, &#8220;Always scrutinize each $_FILES parameter in the plugin or theme code. Be sure to validate the file name and extension before proceeding with file uploads.&#8221;</p>



<p>Website owners are also encouraged to review their code for potential vulnerabilities and implement a whitelist of approved file extensions as a preventive measure against unauthorized file uploads.</p>



<h2 class="wp-block-heading"><strong>Basic Safety Measures&nbsp;</strong></h2>



<p><br>Administrators of a WordPress website should consider several fundamental security measures:</p>



<ol class="wp-block-list"><li>Employing robust and unique passwords for access.</li><li>Consistently updating the software to the latest versions.</li><li>Implementing a dedicated antivirus protection tool.</li><li>Periodically reviewing and enhancing the website&#8217;s security protocols.</li></ol>



<p>Ensuring WordPress site security is paramount in safeguarding your website against threats. By deploying suitable security measures and maintaining regular software updates, you can fortify your website&#8217;s security and uphold a steadfast and trustworthy online presence.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/user-submitted-posts-vulnerability/">User Submitted Posts: Vulnerability found in WordPress plugin</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/user-submitted-posts-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Researchers Detect Vulnerabilities in PowerShell Gallery Enabling Supply Chain Attacks</title>
		<link>https://firsthackersnews.com/vulnerabilities-in-powershell/</link>
					<comments>https://firsthackersnews.com/vulnerabilities-in-powershell/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 17 Aug 2023 00:34:45 +0000</pubDate>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Darknet]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[infostealer]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Software Issues]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[malicious actors]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[powershell code]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[targeted attack]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=6834</guid>

					<description><![CDATA[<p>Malicious actors could exploit existing vulnerabilities within the PowerShell Gallery to execute supply chain attacks targeting users of</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/vulnerabilities-in-powershell/">Researchers Detect Vulnerabilities in PowerShell Gallery Enabling Supply Chain Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Malicious actors could exploit existing vulnerabilities within the PowerShell Gallery to execute supply chain attacks targeting users of the registry.</p>



<p>&#8220;Aqua security researchers, including Mor Weinberger, Yakir Kadkoda, and Ilay Goldman, conveyed in a report to The Hacker News that these vulnerabilities lead to unavoidable typosquatting attacks in the registry and complicate users&#8217; ability to discern package ownership.&#8221;</p>



<h2 class="wp-block-heading"><strong>Vulnerabilities in PowerShell Gallery Enabling Supply Chain Attacks</strong></h2>



<p>Managed by Microsoft, PowerShell Gallery is a primary hub for distributing and obtaining PowerShell code, encompassing modules, scripts, and Desired State Configuration (DSC) resources. The registry hosts 11,829 unique packages and a total of 244,615 packages.</p>



<p>The cloud security company pinpointed concerns linked to the registry&#8217;s lenient package naming policy, which lacks safeguards against typosquatting attacks. This oversight empowers attackers to upload deceptive malicious PowerShell modules, fooling unsuspecting users.</p>



<p><br>Another issue involves a malicious individual being able to manipulate a module&#8217;s metadata, such as Author(s), Copyright, and Description fields. This manipulation makes the module seem more genuine, tricking unsuspecting users into installing it.</p>



<p>The researchers mentioned that users can only confirm the true author/owner by accessing the &#8220;Package Details&#8221; tab.</p>



<p>However, this leads only to the false author&#8217;s profile since attackers can freely choose any name while making a user on the PowerShell Gallery. Hence, identifying the true author of a PowerShell module in the PowerShell Gallery is challenging.</p>



<p>Another issue is a third vulnerability, exploitable by attackers to list all package names and versions, even those meant to be private. This exploit employs the PowerShell API &#8220;https://www.powershellgallery.com/api/v2/Packages?$skip=number,&#8221; granting unrestricted access to the entire PowerShell package database, along with its versions.</p>



<p>Aqua notified Microsoft about the issues in September 2022. Microsoft supposedly implemented reactive fixes by March 7, 2023. However, the problems can still be replicated.</p>



<p>The researchers emphasized, &#8220;As we rely more on open-source projects and registries, security risks become more noticeable.&#8221;</p>



<p>&#8220;The main responsibility for user security rests with the platform. It&#8217;s crucial for PowerShell Gallery and similar platforms to bolster their security measures.&#8221;</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/vulnerabilities-in-powershell/">Researchers Detect Vulnerabilities in PowerShell Gallery Enabling Supply Chain Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/vulnerabilities-in-powershell/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>QakBot Malware Operators Ramp Up C2 Network with 15 New Servers</title>
		<link>https://firsthackersnews.com/qakbot-malware/</link>
					<comments>https://firsthackersnews.com/qakbot-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 08 Aug 2023 16:05:37 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[infostealer]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Software Issues]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[C2 network]]></category>
		<category><![CDATA[command and control]]></category>
		<category><![CDATA[malware attack]]></category>
		<category><![CDATA[malware variants]]></category>
		<category><![CDATA[new server]]></category>
		<category><![CDATA[qakbot]]></category>
		<category><![CDATA[qakbot malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=6800</guid>

					<description><![CDATA[<p>As of late June 2023, the QakBot (aka QBot) malware operators have established 15 new command-and-control (C2) servers.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/qakbot-malware/">QakBot Malware Operators Ramp Up C2 Network with 15 New Servers</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>As of late June 2023, the QakBot (aka QBot) <a href="https://firsthackersnews.com/bundlebot-malware/">malware</a> operators have established 15 new command-and-control (C2) servers.</p>



<p>The findings come as a follow-up to Team Cymru&#8217;s previous malware infrastructure analysis, emerging just over two months after Lumen Black Lotus Labs disclosed that 25% of its C2 servers remain active for only a single day.</p>



<h2 class="wp-block-heading"><strong>QakBot Malware</strong></h2>



<p>QakBot, also known as QBot, is a sophisticated <a href="https://firsthackersnews.com/bundlebot-malware/">banking Trojan malware</a> that targets financial institutions and their customers. It steals sensitive information, creates botnets, and establishes a command-and-control network to control infected computers remotely.</p>



<p>The cybersecurity firm reported that QakBot has a consistent pattern of going on an extended break each summer and then resurfacing sometime in September. This year, its spamming activities halted around 22 June 2023.</p>



<p><br>QakBot&#8217;s C2 network has a tiered architecture similar to Emotet and IcedID. The C2 nodes communicate with Tier 2 (T2) C2 nodes hosted on VPS providers in Russia.</p>



<p>Most of the bot C2 servers, which communicate with victim hosts, are in India and the U.S. The outbound T2 connections lead to IP addresses primarily based in the U.S., India, Mexico, and Venezuela.</p>



<p>Additionally, there is a BackConnect (BC) server alongside the C2s and Tier 2 C2s, which turns the infected bots into proxies for other malicious activities.</p>



<p>Team Cymru&#8217;s latest research shows a significant decrease in the number of C2s communicating with the T2 layer, leaving only eight remaining. This reduction was partly due to Black Lotus Labs&#8217; null-routing of the higher-tier infrastructure in May 2023.</p>



<p>An analysis of NetFlow data reveals a pattern where increased outbound T2 connections often follow spikes in inbound bot C2 connections. Conversely, spikes in outbound T2 connections coincide with a decline in bot C2 activity.</p>



<p>Team Cymru explained that QakBot&#8217;s strategy of using victims as C2 infrastructure with T2 communication results in double harm to users &#8211; first in the initial compromise and then in the risk of being publicly identified as malicious.</p>



<h2 class="wp-block-heading"><strong>Indicators of Compromise</strong></h2>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="235" height="506" src="https://firsthackersnews.com/wp-content/uploads/2023/08/image-3.png" alt="" class="wp-image-6801" srcset="https://firsthackersnews.com/wp-content/uploads/2023/08/image-3-139x300.png 139w, https://firsthackersnews.com/wp-content/uploads/2023/08/image-3-200x431.png 200w, https://firsthackersnews.com/wp-content/uploads/2023/08/image-3.png 235w" sizes="auto, (max-width: 235px) 100vw, 235px" /></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/qakbot-malware/">QakBot Malware Operators Ramp Up C2 Network with 15 New Servers</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/qakbot-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MOVEit Transfer customers are being warned to fix a new, critical flaw</title>
		<link>https://firsthackersnews.com/moveit-transfer-critical-flaw/</link>
					<comments>https://firsthackersnews.com/moveit-transfer-critical-flaw/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 10 Jul 2023 14:55:08 +0000</pubDate>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Banking Trojan]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[Linux Malware]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Software Issues]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[critical flaw]]></category>
		<category><![CDATA[critical patch update]]></category>
		<category><![CDATA[CVE-2-23-36934]]></category>
		<category><![CDATA[MOVEit]]></category>
		<category><![CDATA[MOVEit transfer]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[sql injection]]></category>
		<category><![CDATA[SQL injection vulnerbaility]]></category>
		<category><![CDATA[sql queries]]></category>
		<category><![CDATA[targeted attack]]></category>
		<category><![CDATA[unauthorized]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=6688</guid>

					<description><![CDATA[<p>Progress is notifying customers about a newly discovered critical SQL injection vulnerability, identified as CVE-2023-36934, in its MOVEit</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/moveit-transfer-critical-flaw/">MOVEit Transfer customers are being warned to fix a new, critical flaw</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Progress is notifying customers about a newly discovered critical SQL injection vulnerability, identified as CVE-2023-36934, in its MOVEit Transfer software.</p>



<h2 class="wp-block-heading"><strong>MOVEit Transfer</strong></h2>



<p>The software at the center of the recent massive Clop ransomware breach, MOVEit Transfer, has been updated to address a critical SQL injection bug along with two additional vulnerabilities of lesser severity.</p>



<p>The SQL injection vulnerabilities enable attackers to manipulate queries in order to gain unauthorized access to a database or manipulate its contents by executing malicious code. These attacks exploit the absence of adequate input/output data sanitization in the targeted application.</p>



<p><br>The two SQL injection security issues impact various versions of MOVEit Transfer, including:</p>



<ul class="wp-block-list"><li>Versions 12.1.10 and earlier</li><li>Versions 13.0.8 and earlier</li><li>Versions 13.1.6 and earlier</li><li>Versions 14.0.6 and earlier</li><li>Versions 14.1.7 and earlier</li><li>Versions 15.0.3 and older.</li></ul>



<p>The second SQL injection flaw, identified as CVE-2023-36932, received a high severity rating because an attacker could exploit it after authentication.</p>



<p>A third vulnerability addressed by this patch is CVE-2023-36933, a high severity issue that allows attackers to cause an unexpected program termination.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1021" height="625" src="https://firsthackersnews.com/wp-content/uploads/2023/07/image-2.png" alt="" class="wp-image-6689" srcset="https://firsthackersnews.com/wp-content/uploads/2023/07/image-2-200x122.png 200w, https://firsthackersnews.com/wp-content/uploads/2023/07/image-2-300x184.png 300w, https://firsthackersnews.com/wp-content/uploads/2023/07/image-2-400x245.png 400w, https://firsthackersnews.com/wp-content/uploads/2023/07/image-2-600x367.png 600w, https://firsthackersnews.com/wp-content/uploads/2023/07/image-2-768x470.png 768w, https://firsthackersnews.com/wp-content/uploads/2023/07/image-2-800x490.png 800w, https://firsthackersnews.com/wp-content/uploads/2023/07/image-2.png 1021w" sizes="auto, (max-width: 1021px) 100vw, 1021px" /></figure>



<p>In response to the significant impact of the security incident, the American software company has made the decision to implement a proactive measure by introducing monthly security updates known as &#8220;Service Packs.&#8221; </p>



<p>This new approach enhances the software upgrade process, enabling MOVEit Transfer administrators to apply fixes more efficiently and promptly than previous methods.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/moveit-transfer-critical-flaw/">MOVEit Transfer customers are being warned to fix a new, critical flaw</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/moveit-transfer-critical-flaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zyxel firewalls are affected by two security flaws</title>
		<link>https://firsthackersnews.com/zyxel-firewalls/</link>
					<comments>https://firsthackersnews.com/zyxel-firewalls/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 29 May 2023 15:16:51 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Software Issues]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[cpn firmware]]></category>
		<category><![CDATA[exploitation]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[firmware]]></category>
		<category><![CDATA[patch update]]></category>
		<category><![CDATA[remote code execution]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security flaws]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[unathenticated tracker]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[zyxel]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=6459</guid>

					<description><![CDATA[<p>Zyxell has released a&#160;security advisory&#160;for multiple buffer overflow vulnerabilities. Exploitation of these vulnerabilities could allow an unauthenticated attacker</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zyxel-firewalls/">Zyxel firewalls are affected by two security flaws</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Zyxell has released a&nbsp;security advisory&nbsp;for multiple buffer overflow vulnerabilities. Exploitation of these vulnerabilities could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on the affected Zyxell firewalls.</p>



<h2 class="wp-block-heading"><strong>Below are the two vulnerabilities :</strong></h2>



<p><strong>CVE-2023-33009:</strong> A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1.</p>



<p><strong>CVE-2023-33010:</strong> Another buffer overflow vulnerability in the ID processing function in the same Zyxel firmware versions.The flaw could once again allow an unauthenticated attacker to cause “conditions&nbsp;DoS” or remotely execute code on an affected device. Both issues are classified as &#8220;critical&#8221; vulnerabilities, with a severity score of 9,8.</p>



<h2 class="wp-block-heading"><strong>How to install updates</strong></h2>



<p>Login to your ZLD appliance and go to&nbsp;<strong>Configuration → Licensing → Registration → Service</strong>&nbsp;and click the&nbsp;<strong>Service License Refresh&nbsp;</strong>button.&nbsp; This must be done before you can access your myZyxel account to download new firmware patches. This will sync necessary info with the myZyxel server (info like running firmware version, MAC Address, S/N, etc.).</p>



<p>Open an internet browser and go to URL:&nbsp;https://portal.myzyxel.com/&nbsp;and login to your account.</p>



<p>Once in your account dashboard, find the ZLD router you wish to download firmware for and click on the Download button under the &#8220;Firmware Update&#8221; column.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zyxel-firewalls/">Zyxel firewalls are affected by two security flaws</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zyxel-firewalls/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>RCE Vulnerability (CVE-2022-45359) in Yith WooCommerce Gift Cards Plugin Exploited in Attacks</title>
		<link>https://firsthackersnews.com/cve-2022-45359-vulnerability/</link>
					<comments>https://firsthackersnews.com/cve-2022-45359-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 04 Jan 2023 01:26:30 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Software Issues]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[2022-45359]]></category>
		<category><![CDATA[bug]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[remoteaccess]]></category>
		<category><![CDATA[remotecodeexecution]]></category>
		<category><![CDATA[reverse-engineering]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security threat]]></category>
		<category><![CDATA[website attack]]></category>
		<category><![CDATA[Woocommerce]]></category>
		<category><![CDATA[WP-admin]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=5881</guid>

					<description><![CDATA[<p>Hackers are actively exploiting a critical vulnerability, tracked as CVE-2022-45359 (CVSS v3: 9.8), affecting the WordPress plugin YITH WooCommerce Gift</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2022-45359-vulnerability/">RCE Vulnerability (CVE-2022-45359) in Yith WooCommerce Gift Cards Plugin Exploited in Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hackers are actively exploiting a critical vulnerability, tracked as CVE-2022-45359 (CVSS v3: 9.8), affecting the WordPress plugin YITH WooCommerce Gift Cards Premium.</p>



<h2 class="wp-block-heading"><strong>CVE-2022-45359 Vulnerability</strong></h2>



<p>The CVE-2022-45359 vulnerability allows unauthenticated attackers to upload executables to vulnerable e-commerce websites, as well as install backdoors, obtain remote code execution, and take control of the website for further compromise. </p>



<p>The bug is being weaponized to full access to a vulnerable website to sites running the YITH WooCommerce Gift Cards Premium plugin, WordPress security company Wordfence noted.</p>



<p>According to reports, Wordfence was able to reverse-engineer the exploit using attack data and a copy of the vulnerable plugin, and they are now disclosing details about its operation.Sending a request to /wp-admin/admin-post.php as an unauthenticated attacker will cause functions that run on admin init to be activated because admin init runs for any page in the /wp-admin/ directory.</p>



<p>The issue was discovered on November 22, 2022, and was addressed with the release of version 3.20.0.</p>



<p>Below are some files uploaded by threat actors in attacks analyzed by Wordfence:</p>



<ul class="wp-block-list"><li><strong>kon.php/1tes.php</strong> – this file loads a copy of the “marijuana shell” file manager in memory from a remote location (shell[.]prinsh[.]com)</li><li><strong>b.php</strong> – this file is a simple uploader</li><li><strong>admin.php</strong> – this file is a password-protected backdoor</li></ul>



<p>The vulnerability has been exploited in attacks, with the following&nbsp;<strong>IP addresses</strong>&nbsp;accounting for the vast majority of exploitation attempts:&nbsp;</p>



<ul class="wp-block-list"><li>103.138.108[.]15 </li><li>188.66.0[.]135 </li></ul>



<h2 class="wp-block-heading"><strong>Mitigation</strong></h2>



<p>Users of the WooCommerce Gift Cards plugin must update to <strong>version 3.20.0 or higher</strong> to avoid the vulnerability. </p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2022-45359-vulnerability/">RCE Vulnerability (CVE-2022-45359) in Yith WooCommerce Gift Cards Plugin Exploited in Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cve-2022-45359-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MegaRAC flaws, IP leak impact multiple server brands</title>
		<link>https://firsthackersnews.com/megarac/</link>
					<comments>https://firsthackersnews.com/megarac/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 12 Dec 2022 20:49:12 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Software Issues]]></category>
		<category><![CDATA[Targeted Attacks]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[API]]></category>
		<category><![CDATA[BMC]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[execute]]></category>
		<category><![CDATA[execute arbitary code]]></category>
		<category><![CDATA[exploitation]]></category>
		<category><![CDATA[flaws]]></category>
		<category><![CDATA[IP leak]]></category>
		<category><![CDATA[MegaRAC]]></category>
		<category><![CDATA[software implementation]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=5803</guid>

					<description><![CDATA[<p>Research team has found three different vulnerabilities in the MegaRAC Baseboard Management Controller (BMC) software. CVE-2022-40259&#160;and&#160;CVE-2022-40242&#160;vulnerabilities have&#160;CVSS scores</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/megarac/">MegaRAC flaws, IP leak impact multiple server brands</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Research team has found three different vulnerabilities in the MegaRAC Baseboard Management Controller (BMC) software.<br></p>



<p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40259" target="_blank" rel="noopener">CVE-2022-40259</a>&nbsp;and&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40242" target="_blank" rel="noopener">CVE-2022-40242</a>&nbsp;vulnerabilities have&nbsp;<strong>CVSS scores of 9.8</strong>, while the&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2827" target="_blank" rel="noopener">CVE-2022-2827</a>&nbsp;vulnerability has a&nbsp;<strong>CVSS score of 7.5</strong>&nbsp;on the National Vulnerability Database (NVD).</p>



<p>MegaRAC is a BMC software implementation developed by American Megatrends (AMI), which is also one of the largest providers of UEFI/BIOS firmware for computers. Manufacturers known to have used MegaRAC BMC in at least some of their products include AMD, Ampere Computing, ASRock, Asus, ARM, Dell EMC, Gigabyte, Hewlett-Packard Enterprise, Huawei, Inspur, Lenovo, NVidia, Qualcomm, Quanta, and Tyan.</p>



<p>CVE-2022-40259 (CVSS 9.5) – an arbitrary code execution vulnerability in the Redfish API implementation. A specially crafted exploit from an attacker with minimum access to the target device could trigger the flaw. </p>



<p>CVE-2022-40242 (CVSS 8.3) – Default credentials for UID = 0 shell via SSH. The researchers stated that they found “a hash in etc/shadow&nbsp;for the sysadmin user,” cracking, which made them reach the default credentials. Exploiting this vulnerability merely requires an attacker to have remote access to the target device. </p>



<p>CVE-2022-2827 (CVSS 7.5) – when resetting the password, one of the parameters could allow an adversary to discover various user accounts by querying possible usernames. It then allows the attacker to perform credential stuffing or brute force attacks against those accounts.</p>



<p>These vulnerabilities pose a serious risk because they could lead to&nbsp;supply chain attacks. Many server manufacturers, including&nbsp;<strong>NVidia, AMD, Asus, Huawei, Lenovo, Quanta, and Dell EMC</strong>, use MegaRAC BMC.&nbsp;</p>



<h2 class="wp-block-heading"><strong>Versions Affected</strong></h2>



<figure class="wp-block-table"><table><tbody><tr><td><strong>Products</strong></td><td><strong>Versions</strong></td></tr><tr><td>AMI MegaRAC SPx12</td><td>0 – 6.00</td></tr><tr><td>AMI MegaRAC SPx13</td><td>0 – 4.00</td></tr></tbody></table></figure>



<h2 class="wp-block-heading"><strong>Mitigations for the MegaRAC BMC vulnerabilities</strong></h2>



<ul class="wp-block-list"><li>Make sure&nbsp;<strong>critical firmware</strong>&nbsp;and remote server management subsystems (like MegaRAC, iDRAC, iLO, etc.) are covered in vulnerability assessments.&nbsp;</li><li>Server owners should also review the default configurations on their BMCs and disable default accounts or change default passwords.&nbsp;</li><li>Make sure the software is up-to-date and remove unnecessary remote access.</li></ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/megarac/">MegaRAC flaws, IP leak impact multiple server brands</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/megarac/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OpenSSL Announced Two High-Severity Vulnerabilities Are Fixed</title>
		<link>https://firsthackersnews.com/openssl-vulnerabilities/</link>
					<comments>https://firsthackersnews.com/openssl-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 04 Nov 2022 22:51:06 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Software Issues]]></category>
		<category><![CDATA[buffer overflow]]></category>
		<category><![CDATA[openSSL]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[severity]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<category><![CDATA[vulnerable devices]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=5642</guid>

					<description><![CDATA[<p>OpenSSL released patches for two vulnerabilities that have caused widespread concern among cybersecurity experts and researchers over the</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/openssl-vulnerabilities/">OpenSSL Announced Two High-Severity Vulnerabilities Are Fixed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>OpenSSL released patches for two vulnerabilities that have caused widespread concern among cybersecurity experts and researchers over the last week and a half. OpenSSL is a commonly used code library designed to allow secured communication over the internet.</p>



<p>OpenSSL said it had lowered the severity rating for the latter bug after they were given technical feedback about its details and spent the last week working with several organizations to test the issue. </p>



<h2 class="wp-block-heading"><strong>Two High Severity Vulnerabilities</strong></h2>



<p>The first vulnerability, CVE-2022-3602 (X.509 Email Address 4-byte Buffer Overflow), is an arbitrary 4-byte stack buffer overflow that might trigger crashes or lead to remote code execution (RCE). CVE-2022-3602 is the vulnerability assessed as critical in the announcement.</p>



<p> According to the OpenSSL Blog, it became evident that certain Linux distributions were immune to the buffer overflow, therefore, to the crash and the RCE. </p>



<p>The second vulnerability, CVE-2022-3786 (X.509 Email Address Variable Length Buffer Overflow), can be exploited by attackers via malicious email addresses to trigger a denial of service state via a buffer overflow.</p>



<p>The company noted that the number of hosts running a 3.0.0 version of OpenSSL has slowly grown over the past few months from about 3,000 in August. </p>



<p>The vulnerabilities affect the OpenSSL version 3.0.0 – 3.0.6. Any platform that uses earlier versions is not affected by these vulnerabilities.</p>



<h2 class="wp-block-heading"><strong>Mitigation</strong></h2>



<p>The vulnerabilities only affect the OpenSSL version 3.0.0 – 3.06, which is around 1.5% of the OpenSSL users, according to Wiz.io. Any platform that uses earlier versions is safe. The affected platforms should be upgraded as soon as possible to version 3.0.7.</p>



<p>As a mitigation, users can disable the TLS client authentication until they can apply the fix.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/openssl-vulnerabilities/">OpenSSL Announced Two High-Severity Vulnerabilities Are Fixed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/openssl-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
