In the continuity of the previous years, attacks on suppliers or subcontractors continue, targeting more and more software publishers with their software factory and sometimes code/image repository hosts... :
- 725 malicious packages discovered in the RubyGems repository(Review of 2020-05-12)
- JavaScript library update impacts over 3 million projects (2020-05-12 Review)
- Russian citizen accused of seeking to recruit U.S. employee to deploy malware on Tesla's network (2020-09-11 Review)
- Four malicious packages removed from npm package manager (2020-11-10 Review)
- Solarwinds compromised (Review from 2021-01-12)
2020, the year of major vulnerabilities again?
Every year has its share of critical vulnerabilities, each with a global reach:
- Curveball affecting Microsoft's crypto (CVE-2020-0601) and allows to spoof a valid X.509 certificate chain (Review of 2020-02-11)
- System takeover via 2 vulnerabilities within SaltStack, remotely and without authentication (Review of 2020-05-12)
- System takeover via 2 vulnerabilities within Apple iOS Mail app, exploited in the wild but "a priori" without persistence if iOS 13 (Review of 2020-05-12)
- Critical vulnerability in Apple products earns researcher $100,000 on "Connect with Apple" feature (2020-06-09 review)
- Another Remote Control Takeover via Vulnerability in Apache Tomcat (2020-06-09 Review)
- SMBleed, allows to read the uninitialized memory of the Windows kernel (Review of 2020-07-07)
- ZeroLogon (CVE-2020-1459), cancels the local administrator password of a domain controller and is exploited in the wild (Review of 2020-10-13)
- BadNeighbour (CVE-2020-1459) allows a remote denial of service in IPv6 but limited to the local network (Review of 2020-11-10)
And always:
- Hundreds of vulnerabilities in Chrome (all reviews)
- Hundreds of vulnerabilities in Cisco (all reviews)
- Hundreds of vulnerabilities in Android:
System takeover and elevation of privilege via 40 vulnerabilities within Android (2020-01-14 review)
System takeover and elevation of privileges via 25 vulnerabilities in Android (Review of 2020-02-11)
System takeover and elevation of privileges via 39 vulnerabilities in Android (Review of 2020-05-12)
System takeover and elevation of privileges via 34 vulnerabilities within Android (Review of 2020-06-09)
...
- But also a lot on iOS (all reviews)
- Vulnerabilities in antivirus software:
System takeover and security bypass via 4 vulnerabilities within Kaspersky products (Review from 2020-01-14)
Data manipulation and denial of service via a vulnerability in Trend Micro Deep Security (Review from 2020-01-14)
Elevation of privileges via a vulnerability in Trend MicroMaximum Security (Review from 2020-02-11)
System takeover via vulnerability in F-Secure(Review of 2020-02-11)
Chinese hackers exploit vulnerability in Trend Micro antivirus to compromise Mitsubishi Electric systems (2020-02-11 Review)
Privilege elevation and data manipulation via 5 vulnerabilities in Symantec Endpoint Protection and Symantec Endpoint Protection Manager (Review of 2020-06-09)
Security bypass via 2 vulnerabilities within SymantecAdvanced Secure Gateway and Symantec Content Analysis (Review from 2020-06-09)
- Security product vulnerabilities:
System takeover and elevation of privileges via 13 vulnerabilities within F5 BIG-IP (2020-01-14 Review)
System takeover without authentication via a vulnerability in the traffic management portal of F5 BIG-IP products (Reviewed on 2020-07-07)
Security bypass and denial of service via 5 vulnerabilities within F5 Big-IP and Big-IQ (Reviewed on 2020-12-09)
Change of a user's password remotely, without authentication in FortiMail and FortiVoiceEnterprise (Review of 2020-05-12)
System takeover and data manipulation via 6 vulnerabilities in PAN-OS (PAN-100734) (Review of 2020-06-09)
Elevation of privileges and security bypass via a vulnerability in PAN-OS on signatures during SAML authentication (PAN-148988) (Reviewed on 2020-07-07)
System takeover without authentication via a vulnerability in PAN-OS (Reviewed on 2020-09-11)
System takeover via 3 vulnerabilities in Trend Micro InterScan Web Security Virtual Appliance (Reviewed on 2020-07-07)
Data manipulation and information disclosure via two vulnerabilities in Stormshield Network Security (Review of 2020-07-07)
System takeover and security bypass via 4 vulnerabilities in Trend Micro InterScan Web Security Virtual Appliance (2020-07-07 Review)
- Citrix vulnerabilities:
Remote system takeover via a vulnerability within Citrix ADC and Gateway products (2020-01-14 Review)
Theft of sensitive information via 3 vulnerabilities within Citrix ShareFile and update is not enough to fix (Review of 2020-05-12)
Security bypass and information disclosure via 3 vulnerabilities within Citrix products (Review of 2020-12-09)
Privilege elevation and information disclosure via 3 vulnerabilities in Citrix products (2020-10-13 Review)
- Thousands of vulnerabilities in Oracle:
Oracle, 334 vulnerabilities including 43 critical (CVSS score > 9.1) (2020-02-11 Review)
Oracle, 450 vulnerabilities in 24 products including 286 critical (Review of 2020-05-12)
Oracle, 443 vulnerabilities in 27 products including 70 critical (Review of 2020-07-07)
Oracle, 402 vulnerabilities including a hundred critical (Review of 2020-11-10)
...