VU#119704: Microsoft Windows Task Scheduler SetJobFileSecurityByName privilege escalation vulnerability

Task Scheduler is a set of Microsoft Windows components that allows for the execution of scheduled tasks. The front-end components of Task Scheduler,such as schtasks.exe,are interfaces that allow for users to view,create,and modify scheduled tasks. The… Continue reading VU#119704: Microsoft Windows Task Scheduler SetJobFileSecurityByName privilege escalation vulnerability

Posted in Uncategorized

VU#400865: Cisco Trust Anchor module (TAm) improperly checks code and Cisco IOS XE web UI does not sanitize user input

CVE-2019-1649:Secure Boot Tampering,also known as Thrangrycat The logic that handles Cisco’s Secure Boot improperly checks an area of code that manages the Field Programmable Gate Array(FPGA). The secure boot feature is a proprietary FPGA based impleme… Continue reading VU#400865: Cisco Trust Anchor module (TAm) improperly checks code and Cisco IOS XE web UI does not sanitize user input

Posted in Uncategorized

VU#169249: PrinterLogic Print Management Software fails to validate SSL certificates or the integrity of software updates.

PrinterLogic versions up to and including 18.3.1.96 are vulnerable to multiple attacks. The PrinterLogic agent,running as SYSTEM,does not validate the PrinterLogic Management Portal’s SSL certificate,validate PrinterLogic update packages,or sanitize we… Continue reading VU#169249: PrinterLogic Print Management Software fails to validate SSL certificates or the integrity of software updates.

Posted in Uncategorized

VU#871675: WPA3 design issues and implementation vulnerabilities in hostapd and wpa_supplicant

CERT continues to review the WPA3 protocol in support of this body of research. The root cause of the numerous”implementation”vulnerabilities may involve modifying the protocol. WPA3 uses Simultaneous Authentication of Equals(SAE),also known as Dragonf… Continue reading VU#871675: WPA3 design issues and implementation vulnerabilities in hostapd and wpa_supplicant

Posted in Uncategorized

VU#465632: Microsoft Exchange server 2013 and newer are vulnerable to NTLM relay attacks

Microsoft Exchange supports a API called Exchange Web Services(EWS). One of the EWS API functions is called PushSubscriptionRequest,which can be used to cause the Exchange server to connect to an arbitrary website. Connections made using the PushSubscr… Continue reading VU#465632: Microsoft Exchange server 2013 and newer are vulnerable to NTLM relay attacks

Posted in Uncategorized