CISA Issues Warnings on Seven New Exploited Vulnerabilities

Multiple Apple Devices, Veritas Backup, Microsoft Windows At Risk Without Immediate Update and Remediation, CISA Says

Since April 3, CISA has published warnings about seven known exploited vulnerabilities, adding them to the Known Exploited Vulnerabilities Catalog, ordering federal agencies to remediate the identified vulnerabilities immediately, and encouraging all organizations to do the same.

The flaws were discovered by Google’s Threat Analysis Group and Amnesty International Security Lab while being exploited in attacks, CISA reported. “These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks,” the agency said.

Two of the newly reported vulnerabilities impact the following Apple devices:

  • iPhone 8 and later

  • iPad Pro (all models)

  • iPad Air 3rd generation and later

  • iPad 5th generation and later

  • iPad mini 5th generation and later

  • Macs running MacOS Ventura 

Following are the published details on the seven new exploited vulnerabilities, the exploitation potential of each, and information on remediation steps:

  • CVE-2023-28206 Apple iOS, iPadOS, and macOS IOSurfaceAccelerator Out-of-Bounds Write Vulnerability: Updates iOS 16.4.1 and iPadOS 16.4.1 address reported security issues with IOSurfaceAccelerator. A malicious app could execute arbitrary code with kernel privileges prior to this update, and Apple said it is aware of a report that this issue may have been actively exploited. In the new OS updates, an out-of-bounds write issue was addressed with improved input validation. 

  • CVE-2023-28205 Apple iOS, iPadOS, and macOS WebKit Use-After-Free Vulnerability: Updates iOS 16.4.1 and iPadOS 16.4.1 address reported security issues with WebKit. Processing maliciously crafted web content may lead to arbitrary code execution, and Apple said it is aware of a report that this issue may have been actively exploited. In the new OS updates, a use after free issue was addressed with improved memory management.

  • CVE-2021-27876 Veritas Backup Exec Agent File Access Vulnerability: An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an agent requires successful authentication, typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. By using crafted input parameters in one of these commands, an attacker can access an arbitrary file on the system using System privileges. 

  • CVE-2021-27877 Veritas Backup Exec Agent Improper Authentication Vulnerability: An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes: SHA authentication is one of these. This authentication scheme is no longer used in current versions of the product, but hadn't yet been disabled. An attacker could remotely exploit this scheme to gain unauthorized access to an Agent and execute privileged commands. 

  • CVE-2021-27878 Veritas Backup Exec Agent Command Execution Vulnerability: An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. The attacker could use one of these commands to execute an arbitrary command on the system using system privileges. 

  • CVE-2019-1388 Microsoft Windows Certificate Dialog Privilege Escalation Vulnerability: An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges, aka 'Windows Certificate Dialog Elevation of Privilege Vulnerability.’ 

  • CVE-2023-26083 Arm Mali GPU Kernel Driver Information Disclosure Vulnerability: Memory leak vulnerability in Mali GPU Kernel Driver in Midgard GPU Kernel Driver all versions from r6p0 – r32p0, Bifrost GPU Kernel Driver all versions from r0p0 – r42p0, Valhall GPU Kernel Driver all versions from r19p0 – r42p0, and Avalon GPU Kernel Driver all versions from r41p0 – r42p0 allows a non-privileged user to make valid GPU processing operations that expose sensitive kernel metadata. 

About the Author

Kristal Kuykendall is editor, 1105 Media Education Group. She can be reached at [email protected].


Featured

  • college students in a classroom focus on a silver laptop, with a neural network diagram on the monitor in the background

    Report: 93% of Students Believe Gen AI Training Belongs in Degree Programs

    The vast majority of today's college students — 93% — believe generative AI training should be included in degree programs, according to a recent Coursera report. What's more, 86% of students consider gen AI the most crucial technical skill for career preparation, prioritizing it above in-demand skills such as data strategy and software development.

  • laptop with a neural network image, surrounded by books, notebooks, a magnifying glass, a pencil cup, and a desk lamp

    D2L Lumi AI Updates Add Personalized Study Supports

    Learning platform D2L has announced new artificial intelligence features for D2L Lumi that help provide more personalized study supports for students.

  • three glowing stacks of tech-themed icons

    Research: LLMs Need a Translation Layer to Launch Complex Cyber Attacks

    While large language models have been touted for their potential in cybersecurity, they are still far from executing real-world cyber attacks — unless given help from a new kind of abstraction layer, according to researchers at Carnegie Mellon University and Anthropic.

  • young man in a denim jacket scans his phone at a card reader outside a modern glass building

    Colleges Roll Out Mobile Credential Technology

    Allegion US has announced a partnership with Florida Institute of Technology (FIT) and Denison College, in conjunction with Transact + CBORD, to install mobile credential technologies campuswide. Implementing Mobile Student ID into Apple Wallet and Google Wallet will allow students access to campus facilities, amenities, and residence halls using just their phones.