Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
The following CVEs are being actively exploited in wild by threat actors. Immediate action is suggested.
A server-side request forgery (SSRF) vulnerability in Exchange Server
An insecure deserialization vulnerability in the Unified Messaging service
A post-authentication arbitrary file write vulnerability in Exchange
A post-authentication arbitrary file write vulnerability in Exchange
The Zero-day Pulse Connect Secure authentication bypass vulnerability allows an attacker to run an arbitrary code on the Pulse Connect Secure Gateway. A remote, unauthenticated attacker can send a specially crafted HTTP request to the victim to exploit the vulnerability and gain access to the target system.
Pulse Connect Secure is vulnerable to a buffer overflow, caused by improper bounds checking. By persuading a victim to connect to a maliciously-crafted meeting room, a remote authenticated attacker could overflow a buffer and execute arbitrary code with root privileges on the system.
Pulse Connect Secure could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a command injectionflaw. By using Windows Resource Profiles Feature, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
Pulse Connect Secure could allow a remote authenticated attacker to upload arbitrary files, caused by the improper validation of file extensions by the administrator web interface. By sending a specially-crafted HTTP request, a remote attacker could exploit this vulnerability to upload a malicious script, which could allow the attacker to execute arbitrary code on the vulnerable system.
Accellion File Transfer Appliance is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the document_root.html script using a specially crafted Host header, which could allow the attacker to view, add, modify or delete information in the back-end database.
Accellion File Transfer Appliance could allow a remote attacker to execute arbitrary commands on the system. By using a local web service call, an attacker could exploit this vulnerability to execute arbitrary OS commands on the system.
Accellion File Transfer Appliance is vulnerable to server-side request forgery. By sending a request with a specially-crafted POST request to wmProgressstat.html, an attacker could exploit this vulnerability to conduct an SSRF attack.
Accellion File Transfer Appliance could allow a remote attacker to execute arbitrary commands on the system. By sending a specially crafted POST request, an attacker could exploit this vulnerability to execute arbitrary OS commands on the system.
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in the vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server
Microsoft
Pulse Secure
VMware
Acellion
Refer to CISA advisory from more update affected product and their respective patches