Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 14 – 2024

Publication date

05.04.2024

Featured Story

Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros

A newly discovered backdoor in XZ Utils, a data compression utility present in nearly all Linux distributions, has revived the ghosts of previous major software-supply chain security scares such as the Log4Shell vulnerability and the attack on SolarWinds.

We were likely very close to seeing the backdoor update merged into Debian and Red Hat, the two biggest distributions of Linux, when an eagle-eyed software developer, Andres Freund, spotted something fishy while investigating performance issues on a Debian system related to SSH.

The backdoor, tracked as CVE-2024-3094 with a CVSS score of 10.0, impacts XZ Utils versions 5.6.0 and 5.6.1. Embedded within the liblzma component, the malicious code uses obfuscated processes to tamper with SSH authentication via the systemd software suite. If triggered under the right conditions, it could allow remote unauthorized access to systems using this library.

Major distros affected include Debian testing, Fedora Rawhide, openSUSE, Kali Linux, Archlinux, and Alpine Edge, though mostly in testing or pre-release branches.

SOC Analysis: Like all advisories provided by maintainers of major Linux distributions, we recommend upgrading XZ Utils to >5.6.1 or downgrading to a stable version <5.6.0 if not available.

While patching appliances or software to the unaffected version may provide safety from future exploitation, it does not remediate historic compromise.

The fact that someone managed to sneak a nearly undetectable backdoor into a trusted, widely used open source component and the potential havoc it could have caused is a painful wake-up call about supply chain security.


Other Stories

Critical Security Flaw Found in Popular LayerSlider WordPress Plugin

A critical SQL injection vulnerability (CVE-2024-2879) in LayerSlider, a widely used WordPress plugin, affects versions 7.9.11 through 7.10.0. Exploitation could allow attackers to extract sensitive data through time-based methods. The flaw is tied to improperly handled user inputs and the absence of secure SQL preparation.

SOC Analysis: The vulnerability is linked to the “ls_get_popup_markup” action. A fix is available in version 7.10.1. We strongly recommend upgrading to this version immediately. Contact our SOC for assistance with vulnerability management.

Ivanti Releases Security Updates to Address Vulnerabilities, Patch Immediately

Ivanti has released critical patches addressing multiple vulnerabilities (CVE-2024-21894, CVE-2024-22052, CVE-2024-22023) in Connect Secure and Policy Secure gateways. These flaws may lead to DoS attacks or arbitrary code execution, depending on the component targeted.

SOC Analysis: We strongly advise applying the recommended patch versions without delay. For systems unable to patch immediately, consider containment steps and contact our SOC for support with mitigation.

Critical Vulnerability in Synology Surveillance Station Software

CVE-2024-29241 is a missing authorization flaw in Synology Surveillance Station software (pre-9.2.0-9289 and 9.2.0-11289). Remote authenticated users can bypass security constraints via unspecified vectors, compromising system integrity and availability.

SOC Analysis: If your system runs one of the affected versions, we highly recommend upgrading to version 9.2.0-11289 or higher. Contact our SOC for support with patching and risk management.

Want to enhance your organization’s cyber awareness or compliance strategy? Contact the Approach Cyber SOC team for tailored support and training programs.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?