Louis Ceaser IV began his journey at Cisco ten years ago. As a Black leader in tech, Louis continuously evolves by challenging himself to try new roles, applying his signature passion for… Read more on Cisco Blogs
Progress Software has released a security advisory for a privilege escalation vulnerability in MOVEit Transfer—a Managed File Transfer Software. A cyber threat actor could exploit this vulnerability to take control of an affected system.
CISA urges users and organizations to review the MOVEit Transfer advisory, follow the mitigation steps, and apply the necessary updates when available.
Today, CISA, the Federal Bureau of Investigation (FBI), and Multi-State Information Sharing and Analysis Center (MS-ISAC) released an update for joint Cybersecurity Advisory (CSA) Threat Actors Exploit Progress Telerik Vulnerability in U.S. Government IIS Server.
This iteration of the CSA—now renamed Threat Actors Exploit Progress Telerik Vulnerabilities in Multiple U.S. Government IIS Servers—is based on the forensic analysis and identified exploitation of CVE-2017-9248 at an additional FCEB agency. Activity identified at this agency is separate from the CVE-2019-18935 exploitation listed in the original publication; analysis is provided as context for existing vulnerabilities within Telerik UI for ASP.NET AJAX. Further, this update provides a timetable and context of unattributed APT actor activity that highlights events, including identified malicious files.
CISA, FBI, and MS-ISAC encourage network defenders to review this update and refer to the accompanying Malware Analysis Report, MAR-10443863-1.v1 CVE-2017-9248 Exploitation in U.S. Government IIS Server for analysis of the newly identified malicious files.
Barracuda Networks has released an update to their advisory addressing a vulnerability—CVE-2023-2868—in their Email Security Gateway Appliance (ESG). According to Barracuda, customers should replace impacted appliances immediately.
CISA urges organizations to review the Barracuda advisory and for all impacted customers to follow the mitigation steps as well as hunt for the listed indicators of compromise (IOCs) to uncover any malicious activity. For more information, see Mandiant’s advisory on Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor.
Note: Customers who used enterprise privileged credentials for management of their Barracuda appliance (such as Active Directory Domain Admin or similar) should take immediate incident investigation steps to validate the use and behavior of all credentials used on the appliance. It is of utmost importance to verify that threat actors have not compromised customer enterprise networks via this entry vector.
CISA released fourteen Industrial Control Systems (ICS) advisories on June 15, 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-23-166-01 SUBNET PowerSYSTEM Center
- ICSA-23-166-02 Advantech WebAccessSCADA
- ICSA-23-166-03 Siemens SICAM Q200 Devices
- ICSA-23-166-04 Siemens SIMOTION
- ICSA-23-166-05 Siemens SIMATIC WinCC
- ICSA-23-166-06 Siemens TIA Portal
- ICSA-23-166-07 Siemens SIMATIC WinCC V7
- ICSA-23-166-08 Siemens SIMATIC STEP 7 and Derived Products
- ICSA-23-166-09 Siemens Solid Edge
- ICSA-23-166-10 Siemens SIMATIC S7-1500 TM MFP BIOS
- ICSA-23-166-11 Siemens SIMATIC S7-1500 TM MFP Linux Kernel
- ICSA-23-166-12 Siemens SINAMICS Medium Voltage Products
- ICSA-23-166-13 Siemens SICAM A8000 Devices
- ICSA-23-166-14 Siemens Teamcenter Visualization and JT2Go
CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations.