Known Actively Exploited Vulnerabilities Round-up (10.05.24-16.05.24)

This article covers recent vulnerabilities found to be actively exploited. They are categorised based not only on the category of exploitation, but their impact, and versions affected. This article also informs on any official fix and remediation guidance for the listed vulnerabilities.

This article covers recent vulnerabilities found to be actively exploited. They are categorised based not only on the category of exploitation, but their impact, and versions affected. This article also informs on any official fix and remediation guidance for the listed vulnerabilities.

 

CVE-2024-4671

Category: Memory Access Violation

 

Versions Affected:

The following platforms are known to be affected:

Google Chrome for Windows, macOS and Linux

  • All prior to 124.0.6367.201/.202 for Windows
  • All prior to 124.0.6367.201/.202 for Mac
  • All prior to 124.0.6367.201 for Linux

 

NOTE: Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi may also be vulnerable are also advised to apply the fixes as and when they become available.

 

Vulnerability Summary:

There is a ‘Use after free’ memory management vulnerability in the Visuals subsystem in Google Chrome prior to 124.0.6367.202.

Use-after-free errors have two common and sometimes overlapping causes:

  • Error conditions and other exceptional circumstances.
  • Confusion over which part of the program is responsible for freeing the memory.

 

The memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.

 

Official Fix & Remediation Guidance:

Google addressed the problem with the release of 124.0.6367.201/.202 for Mac/Windows and 124.0.6367.201 for Linux, with the updates rolling out over the coming days. Affected organisations are encouraged to review the Chrome Release 124.0.6367.201 advisory and apply the necessary updates to the latest release.

Chrome updates automatically when a security update is released, but customers can confirm that they are running the latest version by going to Settings > About Chrome, letting the update finish, and then clicking on the ‘Relaunch’ button to apply the update.

NOTE: Remediation of this vulnerability by patching to a specific version indicated may not be sufficient to secure the product against further vulnerabilities discovered in later versions, subsequent to the publication of this guidance. Unless contra-indicated, customers are therefore advised to always upgrade to the latest version of the product available.

 

 

CVE-2024-30051

Category: Buffer Overflow

 

Versions Affected:

  • Microsoft Windows Server 2016 (Server Core installation) prior to release 10.0.14393.6981
  • Microsoft Windows Server 2016 prior to release 10.0.14393.6981
  • Microsoft Windows 10 Version 1607 for x64-based Systems prior to release 10.0.14393.6981
  • Microsoft Windows 10 Version 1607 for 32-bit Systems prior to release 10.0.14393.6981
  • Microsoft Windows 10 for x64-based Systems prior to release 10.0.10240.20651
  • Microsoft Windows 10 for 32-bit Systems prior to release 10.0.10240.20651
  • Microsoft Windows 11 Version 23H2 for x64-based Systems prior to release 10.0.22631.3593
  • Microsoft Windows 11 Version 23H2 for ARM64-based Systems prior to release 10.0.22631.3593
  • Microsoft Windows 10 Version 22H2 for 32-bit Systems prior to release 10.0.19045.4412
  • Microsoft Windows 10 Version 22H2 for ARM64-based Systems prior to release 10.0.19045.4412
  • Microsoft Windows 10 Version 22H2 for x64-based Systems prior to release 10.0.19045.4412
  • Microsoft Windows 11 Version 22H2 for x64-based Systems prior to release 10.0.22621.3593
  • Microsoft Windows 11 Version 22H2 for ARM64-based Systems prior to release 10.0.22621.3593
  • Microsoft Windows 10 Version 21H2 for x64-based Systems prior to release 10.0.19044.4412
  • Microsoft Windows 10 Version 21H2 for ARM64-based Systems prior to release 10.0.19044.4412

 

Vulnerability Summary:

The Microsoft DWM Core Library contains an input validation failure vulnerability. Manipulation with an undisclosed malicious input payload leads to an overflow of the system’s heap memory. A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().

 

Official Fix & Remediation Guidance:

Customers are advised to upgrade to the latest version of Microsoft Windows via one of the following methods:

  • This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
  • To get the standalone package for this update, go to the Microsoft Update Catalog website.
  • You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

 

NOTE: Remediation of this vulnerability by patching to a specific version indicated may not be sufficient to secure the product against further vulnerabilities discovered in later versions, subsequent to the publication of this guidance. Unless contra-indicated, customers are therefore advised to always upgrade to the latest version of the product available.

 

 

CVE-2024-30040

Category: Bypass Or Failure Of Protection Mechanism

 

Versions Affected:

  • Microsoft Windows 10 Version 1607 for 32-bit Systems prior to release 10.0.14393.6981
  • Microsoft Windows 10 for x64-based Systems prior to release 10.0.10240.20651
  • Microsoft Windows 10 for 32-bit Systems prior to release 10.0.10240.20651
  • Microsoft Windows Server 2022, 23H2 Edition (Server Core installation) prior to release 10.0.25398.887
  • Microsoft Windows 11 Version 23H2 for x64-based Systems prior to release 10.0.22631.3593
  • Microsoft Windows 11 Version 23H2 for ARM64-based Systems prior to release 10.0.22631.3593
  • Microsoft Windows 10 Version 22H2 for 32-bit Systems prior to release 10.0.19045.4412
  • Microsoft Windows 10 Version 22H2 for ARM64-based Systems prior to release 10.0.19045.4412
  • Microsoft Windows 10 Version 22H2 for x64-based Systems prior to release 10.0.19045.4412
  • Microsoft Windows 11 Version 22H2 for x64-based Systems prior to release 10.0.22621.3593
  • Microsoft Windows 11 Version 22H2 for ARM64-based Systems prior to release 10.0.22621.3593
  • Microsoft Windows 10 Version 21H2 for x64-based Systems prior to release 10.0.19044.4412
  • Microsoft Windows 10 Version 21H2 for ARM64-based Systems prior to release 10.0.19044.4412
  • Microsoft Windows 10 Version 21H2 for 32-bit Systems prior to release 10.0.19044.4412
  • Microsoft Windows 11 version 21H2 for ARM64-based Systems prior to release 10.0.22000.2960

 

Vulnerability Summary:

The Microsoft Windows MSHTML Platform contains an input improper input validation (CWE-20) vulnerability, exploit of which allows attackers to circumvent Object Linking and Embedding (OLE) mitigations that protect against malicious COM/OLE controls. When OLE protection mechanisms fail or can be bypassed, an attacker is able to embed or import arbitrary (malicious) code and have it executed within the target application’s (trusted) execution context, leading to arbitrary code execution.

An attacker would have to convince the user to load a malicious file onto a vulnerable system, typically by way of an enticement in an Email or Instant Messenger message, and then convince the user to manipulate the specially crafted file, but not necessarily click or open the malicious file.

 

Official Fix & Remediation Guidance:

Customers are advised to upgrade to the latest version of Microsoft Windows via one of the following methods:

  • This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
  • To get the standalone package for this update, go to the Microsoft Update Catalog website.
  • You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

 

NOTE: Remediation of this vulnerability by patching to a specific version indicated may not be sufficient to secure the product against further vulnerabilities discovered in later versions, subsequent to the publication of this guidance. Unless contra-indicated, customers are therefore advised to always upgrade to the latest version of the product available.

 

 

CVE-2024-4761

Category: Buffer Overflow

 

Versions Affected:

The following platforms are known to be affected:

  • All versions of Google Chrome prior to 124.0.6367.207/.208 for Windows
  • All versions of Google Chrome prior to 124.0.6367.207/.208 for Mac
  • All versions of Google Chrome prior to 124.0.6367.207 for Linux

 

NOTE: This vulnerability could also affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

 

Vulnerability Summary:

An out of bounds write vulnerability exists in the V8 JavaScript and WebAssembly engine in Google Chrome prior to 124.0.6367.207. An out-of-bounds write occurs when a program writes data outside the memory boundaries allocated to it. In the case of CVE-2024-4761, an attacker could exploit the bug by creating a crafted HTML page. When a user visits this page, the exploit manipulates memory in a way that bypasses Chrome’s security protections. Additional details about the nature of the vulnerability have been withheld by Google at this time to prevent more threat actors from weaponizing the flaw.

 

Official Fix & Remediation Guidance:

Users are recommended to upgrade to Chrome version 124.0.6367.207/.208 for Windows and macOS, and version 124.0.6367.207 for Linux. In the coming weeks, Google will release Extended Stable channel version 124.0.6367.207 for Mac and Windows.

Chrome typically updates automatically, but users can manually check for updates by navigating to “Settings” > “About Chrome”.

Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also advised to apply the fixes as and when they become available.

NOTE: Remediation of this vulnerability by patching to a specific version indicated may not be sufficient to secure the product against further vulnerabilities discovered in later versions, subsequent to the publication of this guidance. Unless contra-indicated, customers are therefore advised to always upgrade to the latest version of the product available.

 

 

CVE-2021-40655

Category: Credential Management

 

Versions Affected:

  • D-LINK-DIR-605 B2 Firmware Version : 2.01MT

 

Vulnerability Summary:

An information disclosure issue exists in D-LINK-DIR-605 B2 devices. An attacker can obtain a user name and password by forging a POST request to the /getcfg.php configuration page in order to retrieve the device credentials and other system information.

 

Official Fix & Remediation Guidance:

Vendor patches may be available for later firmware revisions. However, this vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions since they may are no longer receiving security updates and are likely subject to additional unpatched vulnerabilities.

 

 

CVE-2014-100005

Category: Cross-Site Request Forgery (‘CSRF’)

 

Versions Affected:

  • D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02

 

Vulnerability Summary:

Multiple cross-site request forgery (CSRF) vulnerabilities exist in D-Link DIR-600 routers, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to perform one of a number of exploits, depending on the request hijacked.

Exploit allow remote attackers to hijack the authentication of administrators for requests that:

  • create an administrator account; or
  • enable remote management via a crafted configuration module to hedwig.cgi; or
  • activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi; or
  • send a ping via a ping action to diagnostic.php.

 

 

Official Fix & Remediation Guidance:

A fix is available in release v 2.17b02. However, this vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions since they may are no longer receiving security updates and are likely subject to additional unpatched vulnerabilities.

 

 

About AppCheck

AppCheck is a software security vendor based in the UK, offering a leading security scanning platform that automates the discovery of security flaws within organisations websites, applications, network, and cloud infrastructure. AppCheck are authorized by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA).

Get started with Appcheck

No software to download or install.

Contact us or call us 0113 887 8380

About Appcheck

AppCheck is a software security vendor based in the UK, offering a leading security scanning platform that automates the discovery of security flaws within organisations websites, applications, network and cloud infrastructure. AppCheck are authorized by te Common Vulnerabilities and Exposures (CVE) Program aas a CVE Numbering Authority (CNA)

No software to download or install.
Contact us or call us 0113 887 8380

Start your free trial

Your details
IP Addresses
URLs

Get in touch