22,000 CyberPanel Servers Exposed: Zero-Click RCE Vulnerability Discovered, PoC Published https://t.co/omNd3INdbu
Windows 'Downdate' Attack Reverts Patched PCs to a Vulnerable State https://t.co/PfnIjriyUs
CVE-2024-46483 (CVSS 9.8): Xlight FTP Server Flaw Leaves Users Exposed to Remote Attacks, PoC Published https://t.co/fzZCdsmcP0
Recent cybersecurity research has revealed multiple critical vulnerabilities affecting various software and systems. Notably, CVE-2022-45157, rated 9.1 on the CVSS scale, exposes vSphere credentials in plaintext within Rancher. Another critical flaw, CVE-2024-38812, has been identified in VMware vCenter, with a CVSS score of 9.8, indicating a severe risk of remote code execution (RCE). Additionally, a new attack technique has been discovered that bypasses Microsoft's Driver Signature Enforcement on fully patched Windows systems, allowing attackers to load unsigned kernel drivers. Researchers have also uncovered a downgrade vulnerability targeting the Microsoft Windows kernel, which enables malicious actors to exploit previously patched vulnerabilities. This type of attack, known as a 'version-rollback attack,' can revert patched systems to vulnerable states, leaving them exposed despite recent mitigations from Microsoft. Other vulnerabilities reported include CVE-2023-32197, a critical RKE2 flaw that allows privilege escalation, and CVE-2024-46483, which affects Xlight FTP Server, exposing users to remote attacks. A proof of concept (PoC) for the Grafana vulnerability CVE-2024-9264, rated 9.9, has also been released, highlighting ongoing security challenges across multiple platforms.