VU#982149: Intel processors are vulnerable to a speculative execution side-channel attack called L1 Terminal Fault (L1TF)

Speculative execution is a technique used by many modern processors to improve performance by predicting which instructions may be executed based on past execution history. When a program attempts to access data in memory,the logical memory address is … Continue reading VU#982149: Intel processors are vulnerable to a speculative execution side-channel attack called L1 Terminal Fault (L1TF)

Posted in Uncategorized

VU#598349: Automatic DNS registration and proxy autodiscovery allow spoofing of network services

Automatic DNS registration and autodiscovery functionality provides an opportunity for the misconfiguration of networks,resulting in a loss of confidentiality and integrity of the network if an attacker on the network adds a specially configured proxy device. Continue reading VU#598349: Automatic DNS registration and proxy autodiscovery allow spoofing of network services

VU#906424: Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the ALPC interface

Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the Advanced Local Procedure Call(ALPC)interface,which can allow a local user to obtain SYSTEM privileges. Continue reading VU#906424: Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the ALPC interface

Posted in Uncategorized

VU#304725: Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange

CWE-325: Missing Required Cryptographic Step – CVE-2018-5383 Bluetooth utilizes a device pairing mechanism based on elliptic-curve Diffie-Hellman (ECDH) key exchange to allow encrypted communication between devices. The ECDH key pair consists of a priv… Continue reading VU#304725: Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange

Posted in Uncategorized

VU#982149: Intel processors are vulnerable to a speculative execution side-channel attack called L1 Terminal Fault (L1TF)

Intel processors are vulnerable to one or more L1 data cache information disclosure and terminal fault attacks via a speculative execution side channel. These attacks are known as L1 Terminal Fault:SGX,L1 Terminal Fault:OS/SMM,and L1 Terminal Fault:VMM. Continue reading VU#982149: Intel processors are vulnerable to a speculative execution side-channel attack called L1 Terminal Fault (L1TF)

VU#787952: Android and iOS apps contain multiple vulnerabilities

Android apps,including those pre-installed on some mobile devices,contain multiple vulnerabilities. All of these vulnerabilities were reported by Kryptowire. Vulnerabilities in pre-installed apps were presented at DEF CON 26 and a set of different vulnerabilities were previously coordinated by the Department of Homeland Security(DHS)Science and Technology Directorate(S&T)and National Cybersecurity and Communications Integration Center(NCCIC). Continue reading VU#787952: Android and iOS apps contain multiple vulnerabilities