Critical Exim Flaw Opens Millions of Servers to Takeover
This week, researchers discovered a critical flaw which allows a remote attacker to take full control of millions of Exim servers. Exim is free software that serves as a mail transfer agent for various organizations. The researchers are urging admins and users to quickly upgrade their servers before a bad actor conducts any malicious activity.
All Exim versions up to and including 4.92.1 are affected by the flaw (CVE-2019-15846) allowing a “local or remote attacker to execute arbitrary code with root privileges.” In other words, by exploiting this vulnerability, a cybercriminal can take full control over a server and execute any commands a typical administrator could do. The CVE was given a 9.8 out of 10 on the CVSS scale.
The vulnerability exists due to an issue with how Exim servers handle various pieces of information during a TLS handshake. In an advisory on Friday, Tenable’s Ryan Seguin stated:
According to the Exim team, no public exploit of the vulnerability has been discovered yet.
Read more here
Metasploit Releases Public BlueKeep Exploit Module
BlueKeep, a wormable remote code execution (RCE), is a vulnerability in the Remote Desktop Protocol (RDP) service throughout various Windows operating systems (XP, 2003, 7, Server 2008, and Windows Server 2008 R2). Exploiting this vulnerability can allow an “unauthenticated attacker to run arbitrary code remotely, launch denial of service attacks, and, in some cases, take full control of unpatched systems.”
The recently announced exploit module was built using proof-of-concepts from Metasploit contributors zǝɹosum0x0 and Ryan Hanson. The module currently does not support automatic targeting and requires manual control to specify targets. It is aimed to exploit 64-bit versions of Windows 7 and Windows 2008 R2.
Read more here
Telnet Backdoor Vulnerabilities Impact over a Million IoT Radio Devices
Telestar Digital GmbH Internet of Things (IoT) radio devices have been affected by critical vulnerabilities which allow cybercriminals to hijack systems remotely.
Vulnerability-Lab researcher Benjamin Kunz revealed his firm’s findings, which included CVE-2019-13473 and CVE-2019-13474. An investigation into the radio’s permitted the discovery of an undocumented Telnet service on Port 23, providing the opportunity for an individual to combine a port scan with ncrack to gain access into the system.
Benjamin Kuntz and his team were able “to connect and brute-force the radio within only 10 minutes due to lax password security, granting them root access with full privileges.”
By using this exploitation tactic, possible attacks vectors include:
Changing device names
Forcing a play stream
Saving audio files as messages
Transmitting audio commands both locally and remotely
According to Kuntz, over a million devices may be at risk to these vulnerabilities.
Get more information here
Wikipedia Suffers Intermittent Outages as a Result of a Malicious Attack
Wikipedia, the largest and most popular multilingual online encyclopedia, was hit with various rounds of distributed denial-of-service (DDoS) attacks in the past several days. The encyclopedia went down in several countries which the organization confirmed in a tweet on Friday.
Wikipedia has been experiencing intermittent outages today as a result of a malicious attack. We’re continuing to work on restoring access. #wikipediadown
— Wikipedia (@Wikipedia) September 7, 2019
The Wikimedia Foundation also confirmed the attack stating:
Many have condemned the attack, stating that the malicious actions threaten everyone’s fundamental rights to access and share information freely.
Read more here
Stellar to Airdrop Two Billion XLM Crypto Tokens Worth $120 Million
The Stellar Development Foundation announced a two billion XLM airdrop on Monday. The airdrop will be the largest in Stellar’s history and is worth roughly $120 million. The airdrop is in collaboration with Keybase, a messaging service. Users will receive a portion of a 100 million XLM monthly airdrop over the next 20 months.
According to CoinDesk, “All you have to do is have an authenticated Keybase account, and your XLM will appear in your wallet – automatically, every month, for as long as the airdrop continues.”
Denelle Dixon, the Stellar Development Foundation CEO, states that the collaboration with Keybase is part of a broader adoption strategy. On Keybase, users can transfer the cryptocurrency to each other, including those who do not have a Keybase account.
Read more here