Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 21 – 2024

Publication date

24.05.2024

Featured Story

GitHub Fixes Maximum Severity Flaw in Enterprise Server

GitHub has patched a critical vulnerability (CVE-2024-4985) in GitHub Enterprise Server (GHES), scoring a maximum 10.0 on the CVSS scale. This authentication bypass flaw could have allowed unauthorized access to vulnerable instances without user credentials. The flaw affects all GHES versions prior to 3.13.0, but only impacts configurations using optional encrypted assertions and SAML single sign-on.

SOC Analysis: While there is no evidence of active exploitation, the critical nature and potential impact of this vulnerability cannot be ignored. Now that the CVE is public, it will likely attract attention from threat actors. Organizations using affected GHES versions must urgently upgrade to 3.13.0 or later.

Other Stories

New Google Chrome Zero-Day in Less Than a Week. Update Your Browser Now!

Google has patched another actively exploited zero-day (CVE-2024-4671), an out-of-bounds write flaw in the V8 JavaScript engine, just four days after its previous fix. The vulnerability enables attackers to execute code outside the browser sandbox and is being used in the wild.

SOC Analysis: This exploit highlights the ongoing importance of immediate browser updates. To stay protected, upgrade to:
  • Chrome 124.0.6367.201 (Windows/Linux)
  • Chrome 124.0.6367.202 (macOS)

Zero-days in browsers continue to be among the most heavily targeted attack vectors.


Critical SQL Injection Flaws Impact Ivanti Endpoint Manager (EPM)

Ivanti has patched ten vulnerabilities in Endpoint Manager (EPM) 2022 SU5 and earlier. Six of these flaws have a CVSS score of 9.6 and could allow unauthenticated attackers within the same network to execute arbitrary code via SQL injection.

SOC Analysis: While no exploitation has been reported, the impact potential is significant. An attacker with internal access could compromise all machines managed by Ivanti EPM. Apply the hotfix provided by the vendor immediately.

WARNING: A Critical Vulnerability Affects Fluent Bit

Fluent Bit, widely used in Kubernetes environments, is affected by a memory corruption flaw (CVE-2024-4323) in its monitoring API. The vulnerability has a 9.8 CVSS score and could lead to RCE, DoS, or data leaks through specially crafted HTTP requests.

SOC Analysis: Organizations running Fluent Bit < 3.0.3 should prioritize upgrades and implement enhanced monitoring. The issue does not require authentication, increasing its risk in exposed environments. If you’re unsure of your exposure, contact our SOC team.

Want to enhance your organization’s cyber awareness or compliance strategy? Contact the Approach Cyber SOC team for tailored support and training programs.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?