Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 48 – 2024

Publication date

29.11.2024

Featured Story

Critical 7-Zip Vulnerability Let Attackers Execute Arbitrary Code

A severe vulnerability (CVE-2024-11477) in 7-Zip, the popular file compression utility, allows attackers to execute malicious code through specially crafted archives. Rated 7.8 on the CVSS scale, the flaw lies in the Zstandard decompression implementation, where improper validation of user-supplied data results in an integer underflow.

Attackers can exploit this vulnerability by distributing malicious archives, often via email or file-sharing methods. The flaw is especially concerning in Linux environments where the Zstandard format is more common.

SOC Analysis:
This incident underscores the importance of proper input validation in software that handles untrusted data. Organizations relying on 7-Zip should immediately upgrade to version 24.07, as the application does not support auto-updates. Manually patching is critical to avoid exploitation.

Other Stories

Critical Flaw in ProjectSend Under Active Exploitation Against Public-Facing Servers

CVE-2024-11680 (CVSS 9.8) is a critical flaw in the open-source ProjectSend file-sharing app that allows remote code execution due to improper authorization checks. Attackers have been exploiting this since September 2024 to deploy web shells on exposed servers.

SOC Analysis:
If you’re using ProjectSend, update to version r1720 or later immediately. Only ~1% of exposed servers are patched. Our SOC can assist with vulnerability management and exploitation detection for ProjectSend and similar systems.

Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks

CVE-2024-10542 and CVE-2024-10781 affect the CleanTalk Spam Protection and Firewall plugin. The flaws allow unauthenticated attackers to install and activate malicious plugins, potentially leading to remote code execution on over 200,000 WordPress sites.

SOC Analysis:
Always keep plugins up to date. We strongly advise updating to versions 6.44 or 6.45 of CleanTalk immediately. Vulnerable plugins are common entry points for website compromises.

Beware: Fake Emails Circulating in the Name of Christian Mutuality

Phishing emails are circulating that impersonate Christian Mutuality, claiming a document is available through a malicious link. These emails aim to steal personal or banking information and are considered a widespread threat.

SOC Analysis:
Do not click on links or open attachments in unexpected messages. Always access services via official websites. Report suspicious messages to suspicious@safeonweb.be — text messages can be screenshotted and sent to the same address.

Want to enhance your organization’s cyber awareness or compliance strategy?
Contact the Approach Cyber SOC team for tailored support and training programs.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?