Apple Releases Critical Security Updates to Address Actively Exploited Zero-Day Vulnerabilities

Apple has released critical security updates to address actively exploited zero-day vulnerabilities, including a WebKit flaw (CVE-2023-32409), an out-of-bounds read issue (CVE-2023-28204), and a use-after-free bug (CVE-2023-32373). Two of the vulnerabilities were previously patched with Rapid Security Response updates. The updates are available for various devices and operating systems. This is the sixth time Apple has addressed actively exploited zero-day vulnerabilities in 2023. Previously, they fixed other vulnerabilities reported by the same security researchers. No further technical details about the vulnerabilities or the attacks are currently available, but historically, such vulnerabilities have been used in targeted attacks to deploy spyware on the devices of individuals like dissidents and journalists.

Critical Security Flaws in Cisco Small Business Series Switches: Urgent Updates Released to Prevent Remote Code Execution and DoS Attacks

Cisco has released urgent updates to address nine security vulnerabilities in its Small Business Series Switches. These flaws, resulting from improper validation of web interface requests, can be exploited by remote attackers without authentication. Four vulnerabilities are rated as critical and affect various switch models from different product lines. Exploiting these vulnerabilities could allow attackers to execute arbitrary code with root privileges, trigger denial-of-service (DoS) situations, or access unauthorized information. Firmware updates will not be provided for certain switch models that have reached the end-of-life stage. Although proof-of-concept exploit code exists, Cisco has not detected any instances of malicious exploitation in the wild. Users are strongly advised to promptly apply the provided patches to mitigate potential security risks, considering the attractiveness of Cisco devices as targets for threat actors.

Critical Vulnerabilities Addressed: VMware Releases Security Update for Aria Operations and Cloud Foundation

VMware has released a security update targeting four vulnerabilities in VMware Aria Operations and Cloud Foundation. These vulnerabilities pose potential risks and have been assigned specific CVE identifiers. The vulnerabilities include a privilege escalation vulnerability (CVE-2023-20877) that highlights the importance of addressing privilege levels and access controls. Another vulnerability (CVE-2023-20878) involves deserialization and can be exploited by an attacker with administrative privileges to execute arbitrary commands. Two other vulnerabilities (CVE-2023-20879 and CVE-2023-20880) relate to local privilege escalation, allowing attackers to gain root access to the underlying operating system. By addressing these vulnerabilities promptly, VMware aims to mitigate the risks of unauthorized privilege escalation, arbitrary command execution, and operating system compromise.

For more information on these threats visit our Threat Feed