VU#581311: TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks

CWE-306:Missing Authentication for Critical Function – CVE-2018-5393 EAP Controller for Linux utilizes a Java remote method invocation(RMI)service for remote control. The RMI interface does not require any authentication before use. Remote attackers ca… Continue reading VU#581311: TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks

Posted in Uncategorized

VU#598349: Automatic DNS registration and proxy autodiscovery allow spoofing of network services

The Web Proxy Automatic Discovery(WPAD)protocol is used to automatically provide proxy configuration information to devices on a network. Clients issue a special DHCP request to obtain the information for the proxy configuration,but will fall back on a… Continue reading VU#598349: Automatic DNS registration and proxy autodiscovery allow spoofing of network services

Posted in Uncategorized

VU#581311: TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks

The TP-LINK EAP Controller is TP-LINK’s software for remotely controlling wireless access point devices. EAP Controller for Linux lacks user authentication for RMI service commands,as well as utilizes an outdated vulnerable version of Apache commons-collections,which may allow an attacker to implement deserialization attacks and control the EAP Controller server. Continue reading VU#581311: TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks

VU#906424: Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the ALPC interface

The Microsoft Windows task scheduler SchRpcSetSecurity API contains a vulnerability in the handling of ALPC,which can allow an authenticated user to overwrite the contents of a file that should be protected by filesystem ACLs. This can be leveraged to … Continue reading VU#906424: Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the ALPC interface

Posted in Uncategorized