The vulnerability is GlobalProtect. The vulnerability makes it possible to get root on a PaloAlto device – without any authentication (!). Unauth Command Injection. The manufacturer reports that the vulnerability is being exploited in real-world attacks.
Read more Critical 0day in VPN from PaloAlto. CVSS 10/10.Cisco SD-WAN vManage Unauthenticated REST API Access Vulnerability
A vulnerability in the request authentication validation for the REST API of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to gain read permissions or limited write permissions to the configuration of an affected Cisco SD-WAN vManage instance.
Read more Cisco SD-WAN vManage Unauthenticated REST API Access VulnerabilitycURL and libcurl Vulnerability Affecting Cisco Products: October 2023
On October 11, 2023, cURL released Version 8.4.0 of the cURL utility and the libcurl library. This release addressed two security vulnerabilities:
- CVE-2023-38545 – High Security Impact Rating (SIR)
- CVE-2023-38546 – Low SIR
This advisory covers CVE-2023-38545 only. For more information about this vulnerability, see the cURL advisory.
This advisory is available at the following link:
Security Impact Rating: High
CVE: CVE-2023-38545
Patch your confluence if it’s not done yet
Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
The Vulnerability has been marked with a maximum CVSS value (10/10) and allows you to create a Confluence administrator account from the Internet.
Critical vulnerability in Fortinet products
https://www.fortiguard.com/psirt/FG-IR-22-300
Summary
An external control of file name or path vulnerability [CWE-73] in FortiNAC webserver may allow an unauthenticated attacker to perform arbitrary write on the system.
Affected Products
FortiNAC version 9.4.0
FortiNAC version 9.2.0 through 9.2.5
FortiNAC version 9.1.0 through 9.1.7
FortiNAC 8.8 all versions
FortiNAC 8.7 all versions
FortiNAC 8.6 all versions
FortiNAC 8.5 all versions
FortiNAC 8.3 all versions
Critical vulnerability in Fortinet products
https://www.fortiguard.com/psirt/FG-IR-22-398
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.
Affected Products
FortiOS version 7.2.0 through 7.2.2
FortiOS version 7.0.0 through 7.0.8
FortiOS version 6.4.0 through 6.4.10
FortiOS version 6.2.0 through 6.2.11
FortiOS-6K7K version 7.0.0 through 7.0.7
FortiOS-6K7K version 6.4.0 through 6.4.9
FortiOS-6K7K version 6.2.0 through 6.2.11
FortiOS-6K7K version 6.0.0 through 6.0.14