Netizen: May Vulnerability Review

Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing the outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five vulnerabilities from April that should be immediately patched or addressed if present in your environment. Detailed writeups below:

CVE-2023-23801:

HasThemes provides more than 170,000 customers with custom web development and design services. Their ‘Really Simple Google Tag Manager’ serves to help track and update marketing tags and has over 2,000 active installations on WordPress sites. This vulnerability has a NIST CVSSv3 base scoring of 8.8/10. Versions <= 1.0.6 are subject to a Cross-Site Request Forgery (CSRF) vulnerability. The recommended patch process is updating to version 1.0.7, previously released four weeks ago.

CVE-2023-24877:

Microsoft PostScript and PCL6 Printer Drivers are home to a Remote Code Execution (RCE) vulnerability. This vulnerability has a NIST CVSSv3 base scoring of 8.8/10. Authenticated attackers with basic privileges could send a modified XPS file, a file type similar to PDF, to a shared printer. The processing of this modified XPS file may result in the execution of rogue code. Microsoft notes that applicable exploit code has not been spotted in the wild. An official fix for CVE-2023-24887 does exist through Microsoft.

CVE-2023-22913 / CVE-2023-27991:

Zyxel Networks, a technology provider, specializes in network solutions for small to medium-sized businesses. Applicable firmware versions of their USG Flex, versions 4.50 through 5.35, and ATP, versions 4.32 through 5.35, series firewalls were victims of post-authentication critical command injection last month. These vulnerabilities have a NIST CVSSv3 base scoring of 8.1/10 and 8.8/10 respectively. While the USG Flex vulnerability produces closer to DoS conditions, OS command injection is available for their ATP series. Version 5.36 has been released for both series of firewalls and remedies these vulnerabilities successfully. 

CVE-2023-1812:

Google Chrome before version 112.0.5615.49 is susceptible to maliciously crafted HTML pages. This vulnerability has a NIST CVSSv3 base scoring of 8.8/10. Google noted that crafted HTML pages could lead to a remote attacker gaining access to out-of-bounds memory. Google hastily delivered an update remediating this vulnerability along with fifteen others.

Conclusion:

In conclusion, software vulnerabilities are a common nuisance to IT and security teams everywhere. Organizations that prioritize the remediation and patching of these vulnerabilities will drastically reduce their attack surface and ensure no doors into their environment are left unlocked.

How Can Netizen Help?

Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

Questions or concerns? Feel free to reach out to us any time – https://www.netizen.net/contact

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.