Featured Story
Microsoft Patches Zero-Click Outlook Vulnerability That Could Soon Be Exploited
Microsoft’s June 2024 Patch Tuesday update includes a fix for a critical vulnerability in Outlook, identified as CVE-2024-30103 with a CVSS score of 8.8. This flaw could allow attackers to execute remote code without any user interaction by bypassing Outlook registry block lists and creating malicious DLL files.
The vulnerability is considered ‘critical’ due to its potential for exploitation without user interaction, posing a significant risk for accounts with the auto-open email feature enabled.
The flaw could be used for data exfiltration, unauthorized system access, and other malicious activities. The ease of creating an exploit for this zero-click vulnerability makes it a prime target for widespread attacks.
For now there is no evidence of active exploitation but with the publication of the CVE it will bring the attention of threat actors. The affected versions include: Outlook 2016, Office LTSC 2021, 365 Apps for Enterprise, and Office 2019. It’s advised to promptly update Outlook clients. Our SOC team can assist in the event of an incident or suspected compromise.
Other Stories
VMware Fixed RCE and Privilege Escalation Bugs in vCenter Server
VMware has patched several critical vulnerabilities in its vCenter Server, including heap-overflow issues (CVE-2024-37079, CVE-2024-37080, CVSS 9.8) and local privilege escalation bugs (CVE-2024-37081, CVSS 7.8) caused by sudo misconfigurations.
VMware urges customers to patch immediately as there are no available workarounds. Fixes available in 8.0 U2d, 8.0 U1e, and 7.0 U3r.
Atlassian Fixed Six High-Severity Bugs in Confluence Data Center and Server
Atlassian resolved several high-severity vulnerabilities, including CVE-2024-22257 (CVSS 8.2), as well as SSRF (CVE-2024-22243, 22262, 22259) and DoS (CVE-2024-29133, 29131) issues across its Confluence, Jira, and Crucible products.
Although there’s no current evidence of exploitation, immediate patching is advised. Updates include Confluence 8.9.3, 8.5.11, Jira 9.16.1, 9.12.10, and 9.4.23.
WARNING: Juniper Networks Patched 126 Vulnerabilities, Including 3 Critical
Juniper addressed 126 vulnerabilities in its Juniper Secure Analytics (JSA) appliance. Three of these (CVE-2023-5178, CVE-2019-15505, CVE-2023-25775) were rated critical (CVSS 9.8), many tied to outdated Linux dependencies.
These vulnerabilities are older and may already be exploited. Patch to JSA 7.5.0 UP8 IF03 and increase monitoring to detect suspicious activity.
Contact the Approach Cyber SOC team for tailored support and training programs.