Rewterz Threat Alert – DarkCrystal RAT (DCRat) – Active IOCs
August 25, 2023Rewterz Threat Advisory – ICS: Multiple Hitachi EH-VIEW Vulnerabilities
August 25, 2023Rewterz Threat Alert – DarkCrystal RAT (DCRat) – Active IOCs
August 25, 2023Rewterz Threat Advisory – ICS: Multiple Hitachi EH-VIEW Vulnerabilities
August 25, 2023Severity
High
Analysis Summary
CVE-2023-40273 CVSS:9.8
Apache Airflow could allow a remote authenticated attacker to bypass security restrictions, caused by not invalid user session after password change. By sending a specially crafted request, an attacker could exploit this vulnerability to reuse the user session to gain access to the system.
CVE-2023-39441 CVSS:7.5
Apache Airflow, Airflow SMTP Provider and Airflow IMAP Provider is vulnerable to a man-in-the-middle attack, caused by improper certificate validation. An attacker could exploit this vulnerability to launch a man-in-the-middle attack and gain access to the communication channel between endpoints to obtain mail server credentials or mail contents or further compromise the system.
Impact
- Security Bypass
- Information Theft
Indicators Of Compromise
CVE
- CVE-2023-40273
- CVE-2023-39441
Affected Vendors
Apache
Affected Products
- Apache Airflow 2.6.3
- Apache Airflow SMTP Provider 1.2.0
- Apache Airflow IMAP Provider 3.2.2
Remediation
Upgrade to the latest version of Apache Airflow, available from the Apache Website.