hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

8.9K
active users

#securityflaw

1 post1 participant0 posts today

🚨 BREAKING: Security flaw discovered in Erlang/OTP SSH server, but don't worry, you can't read about it because the server is too busy playing hide and seek with its own responses. 🙈🔐 Meanwhile, the tech world collectively pretends this is the first time a server has dropped the ball. 😂
nvd.nist.gov/vuln/detail/CVE-2 #ErlangSSH #SecurityFlaw #TechNews #ServerIssues #HideAndSeek #CyberSecurity #HackerNews #ngated

nvd.nist.govNVD - CVE-2025-32433

"He included a PoC that caused the ChatGPT app for macOS to send a verbatim copy of all user input and ChatGPT output to a server of his choice. All a target needed to do was instruct the LLM to view a web link that hosted a malicious image. From then on, all input and output to and from ChatGPT was sent to the attacker's website."

arstechnica.com/security/2024/

Ars Technica · Hacker plants false memories in ChatGPT to steal user data in perpetuityBy Dan Goodin

Critical GitHub Enterprise Server Flaw Allows Authentication Bypass

Date: May 21, 2024

CVE: [[CVE-2024-4985]]

Vulnerability Type: Improper Authentication

CWE: [[CWE-287]]

Sources: Cyber Security News, SecurityWeek, The Hacker News

Issue Summary

A critical vulnerability in GitHub Enterprise Server, identified as CVE-2024-4985, was discovered that allows attackers to bypass authentication. This flaw, found in versions 3.9.14, 3.10.11, 3.11.9, and 3.12.3, permits unauthorized access to repositories and sensitive data by exploiting a weakness in the SAML SSO authentication process.

Technical Key Findings

The vulnerability arises from a logic error in the SAML SSO authentication process, where the server fails to verify the validity of digital signatures on SAML responses properly. Attackers can craft SAML assertions with any certificate, which the server incorrectly accepts, allowing the spoofing of user identities, including admin accounts.

Vulnerable Products

  • GitHub Enterprise Server versions 3.9.14
  • GitHub Enterprise Server versions 3.10.11
  • GitHub Enterprise Server versions 3.11.9
  • GitHub Enterprise Server versions 3.12.3

Impact Assessment

Exploitation of this vulnerability could lead to unauthorized access to private repositories, sensitive data, and administrative controls. This can result in data breaches, code tampering, and potential intellectual property theft.

Patches or Workaround

GitHub has released patched versions (3.9.15, 3.10.12, 3.11.10, and 3.12.4) to address this issue. As an interim measure, enabling SAML certificate pinning can mitigate the risk. Additionally, auditing access logs for suspicious activity and rotating credentials is advised.

Tags

Cyber Security News · Critical GitHub Enterprise Server Flaw Allowed Attackers to Bypass AuthenticationA critical vulnerability was discovered in the GitHub Enterprise Server that could allow attackers to completely bypass authentication and gain unauthorized access to repositories and sensitive data.

users say their were hacked to warn of a
This allegedly enables potential attackers to control any Anycubic affected by this vulnerability using the company's service .
The hacked_machine_readme.gcode file received by the impacted devices also asks Anycubic to open-source their 3D printers because the company's software "is lacking." The file claims 2,934,635 devices downloaded this warning .
techcrunch.com/2024/02/28/anyc

"🔐 #KeyTrap DoS: The DNSSEC Dilemma - A 25-Year-Old Design Flaw Exposed 🚨"

In a groundbreaking discovery, researchers from the National Research Center for Applied Cybersecurity ATHENE have unveiled #KeyTrap (CVE-2023-50387), a critical flaw in DNSSEC's design that could bring the internet to its knees. With a severity rating of 7.5/10, this flaw in DNSSEC has been lurking since 1999, and affects 31% of global DNSSEC-validating DNS resolvers, risking widespread internet service disruptions. KeyTrap, an Algorithmic Complexity Attack, can overload a DNS server with a single packet, stalling major DNS providers like Google and Cloudflare for up to 16 hours. This vulnerability not only jeopardizes internet access but could also cripple essential security mechanisms like anti-spam defenses and PKI. Despite patches being rolled out, a permanent fix may necessitate a DNSSEC standard overhaul. 🌍💻🛡️

CVE Details: mitre & nvd

Tags: #CyberSecurity #DNSSEC #Vulnerability #InternetSafety #PatchNow #TechNews #InfoSecExchange #SecurityFlaw #DigitalInfrastructure 🚀🔒💡

Source: ATHENE Press Portal

cve.mitre.orgCVE - CVE-2023-50387 The mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.

This is one worth sharing folks

A serious flaw in bluetooth from versions 4.2 onwards has been discovered.

It CANNOT be fixed as it's the architectural design and is NOT a software flaw that can be patched.

It doesn't matter what device you are using, anything from 2014 onwards, using 4.2 to the latest 5.4 is vulnerable to attack and decryption of data being transferred.

Even apple airdrop is vulnerable as that uses bluetooth for file transfers.

#Bluetooth
#SecurityFlaw
#NoFixAvailable

"🚨 ShellTorch Attack: A Fiery Threat to PyTorch Models 🚨"

🔥 The #ShellTorch attack exposes millions of #PyTorch systems to critical Remote Code Execution (RCE) vulnerabilities! Researchers from Oligo Security have unveiled a series of vulnerabilities within the PyTorch Model Server, aka TorchServe. 🤖🛑

A series of critical vulnerabilities, known as 'ShellTorch,' has been discovered in the TorchServe AI model-serving tool, widely used by organizations such as Amazon, OpenAI, Tesla, Azure, Google, and Intel. These flaws can potentially allow unauthorized access and remote code execution on vulnerable servers. The vulnerabilities affect TorchServe versions 0.3.0 through 0.8.1.

One of the vulnerabilities stems from a misconfiguration in the management interface API, which exposes it to external requests without proper authentication, enabling malicious model uploads from external sources. Another issue is a remote server-side request forgery (SSRF) that can lead to remote code execution, as all domains are accepted by default. The third vulnerability involves Java deserialization, allowing attackers to execute remote code.

🔗 Vulnerabilities include:

  • Unauthenticated Management Interface API Misconfiguration
  • CVE-2023-43654: SSRF leading to RCE
  • CVE-2022-1471: Java Deserialization RCE due to SnakeYAML library misuse

🌐 Affected organizations include giants like Walmart, Amazon, OpenAI, Tesla, Azure, Google Cloud, and Intel. The vulnerabilities allow attackers to execute code remotely with high privileges, potentially affecting thousands of IP addresses globally. 🌎🔓

🛡️ Mitigation steps:

  • Update to TorchServe v0.8.2 or above 🔄
  • Configure the Management Console 🛠️
  • Control Model Fetching 🚫

🔗 Source: HackRead, The Hacker News

🏷️ Tags: #Cybersecurity #Vulnerability #AI #ML #PyTorch #ShellTorch #RCE #CyberAttack #InfoSec #SecurityFlaw #MachineLearning #Artificial

Hackread - Latest Cybersecurity News, Press Releases & Technology Today · ShellTorch Attack Exposes Millions of PyTorch Systems to RCE VulnerabilitiesFollow us on Twitter @Hackread - Facebook @ /Hackread

Mozilla, CISA urge users to patch Firefox security flaw
Mozilla released an advisory this week warning users of a vulnerability affecting its popular web browser and email client.
Exploitation of the bug would allow a hacker to take control of an affected system, officials at the Cybersecurity and Infrastructure Security Agency (CISA) said in their own notice.
therecord.media/mozilla-cisa-u #Mozilla #CISA #patch #Firefox #SecurityFlaw

therecord.mediaMozilla, CISA urge users to patch Firefox security flawMozilla released an advisory this week warning users of a vulnerability affecting its popular web browser and email client.