Extra, Extra, Vert Reads All About It: Cybersecurity News For The Week Of August 8, 2022 – Tripwire.com

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 8, 2022 – tripwire.com

Skip to content ↓ | Skip to navigation ↓
Home » News » Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 8, 2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 8st, 2022. I’ve also included some comments on these stories.
Did Slack send you a password reset link last week? The company has admitted to accidentally exposing the hashed passwords of workspace users, reported The Register. The issue occurred when a user created or revoked a shared invitation link for their workspace.
Slack exposed password hashes when requesting a password reset link. The password hashes were salted. Depending on how the passwords are salted, they might be difficult to crack. This issue was discovered by an independent security researcher. Users that created these links between April 17, 2017, and July 17, 2022, are affected.
A security feature bypass vulnerability exists in signed 3rd party UEFI bootloaders that allows bypass of the UEFI Secure Boot feature. An attacker who successfully exploits this vulnerability can bypass the UEFI Secure Boot feature and execute unsigned code during the boot process, notes Carnegie Mellon’s CERT Coordination Center.
UEFI bootloaders are subject to a secure boot bypass vulnerability. This vulnerability exists in signed 3rd party UEFI bootloaders. An attacker could execute unsigned code during the boot process upon successful exploitation of this vulnerability. Security researchers at Eclypsion found CVE-2022-34302, CVE-2022-34301, and CVE-2022-34303.
Microsoft is urging users to patch a zero-day vulnerability dubbed Dogwalk that is actively being exploited in the wild. The bug (CVE-2022-34713) is tied to a Microsoft Windows Support Diagnostic Tool and allows a remote attacker to execute code on a vulnerable system, cites Threatpost.
Dogwalk was initially discovered in January 2022 by Imre Rad. A separate researcher began tracking a flaw dubbed Follina (CVE-2022-30190) which led to the rediscovery of Dogwalk. Microsoft has finally patched the vulnerability in the August patches. The vulnerability is present in the Microsoft Windows Support Diagnostic Tool. CVE-2022-34713 is a variant of Dogwalk and requires the attacker to have psychical access to a vulnerable system.
A newly discovered flaw (CVE-2022-2590) that affects the Linux kernel can be leveraged to write malicious code directly into processes, Security Online reports.
Linux greater than and equal to version 5.16 and prior to version 5.19 are subject to a privilege escalation vulnerability. An attacker could gain access to memory mappings upon successful exploitation of this vulnerability. An unprivileged user could modify shmem (tmpfs) file when they do not have write permissions.
Want more insights from Tripwire VERT before our next cybersecurity news roundup comes out? Subscribe to our newsletter here.
Andrew Swoboda has contributed 30 posts to The State of Security.
View all posts by Andrew Swoboda
International Offices


Leave a Comment

Leave a Reply

Your email address will not be published.

FDA Seeks Feedback on Medical Device Security Guidance – HealthITSecurity

OpenAPIs and Third-Party Risks – Security Boulevard

Global Cyber Security Market to Gather around USD 156 Billion by 2031 by Growing at ~11% CAGR during 2022-2031; Surge in Unethical Cyber Intrusion, Cyber Attacks, and Others to Drive an Upbeat Growth Trajectory – Yahoo Finance

Open Security: The next step in the evolution of cybersecurity – SC Media