Year: 2020

Apache Tomcat Session Deserialization Code Execution Vulnerability (CVE-2020-9484) Threat Alert

June 5, 2020

Overview Recently, Apache Tomcat released a security advisory, announcing the fix of a remote code execution vulnerability (CVE-2020-9484) due to persistent session. An attacker can exploit this vulnerability only when the following conditions are met: The attacker can take control of the contents and name of a file on the server. The server is configured […]

IP Reputation Report-05312020

June 4, 2020

1. Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at May 31, 2020. 2. Top 10 countries in attack percentage: The Belarus is in first place. The Cape Verde is in the second place. The country China […]

DDoS Attack Landscape 10

June 3, 2020

Active Families

  • Gafgyt

As one of the largest IoT DDoS families, Gafgyt compromises such devices as routers and cameras by means of password cracking and exploits to receive C&C commands and launch DDoS attacks.

In 2019, the Gafgyt family continued to be active, mainly targeting North America, Europe, and Australia. The number of Gafgyt-based malware increased fourfold compared with 2018 and the
average daily increase of C&C attacks reached 34.5%. Compared with 2018, the number of DDoS attack directives increased by 175%, most of which were UDP flood attacks targeting ports 80 and
443 for HTTP services and ports 3074, 300000, 30100, and 32000 for gaming services.

(more…)

Cisco Unified Contact Center Express (Unified CCX) Deserialization Code Execution Vulnerability (CVE-2020-3280) Threat Alert

June 2, 2020

Overview

Recently, Cisco officially released a security advisory, announcing the fix of a high-risk vulnerability (CVE-2020-3280) in Unified Contact Center Express (Unified CCX). The vulnerability stems from the fact that during the deserialization operation of the software, the input provided by the user is not sufficiently restricted. The attacker can send a malicious Java object to trigger the vulnerability without authorization to execute arbitrary code.

CVSS3.0 Base Score: 9.8

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X

(more…)

WellinTech KingView Multiple Vulnerabilities Threat Alert

June 1, 2020

Overview

Some versions of WellinTech KingView are prone to multiple vulnerabilities, including the real-time database access authorization bypass vulnerability and denial-of-service vulnerability existing in the web data transmission service. Vulnerability details are as follows:

1. KingView real-time database access authorization bypass vulnerability (CNVD-C-2020-87074)

2. KingView denial-of-service vulnerability existing in the web data transmission service (CNVD-C-2020-92339)

3. KingView denial-of-service vulnerability existing in the web data transmission service (CNVD-C-2020-92346)

4. KingView denial-of-service vulnerability existing in the web data transmission service (CNVD-C-2020-92365)

5. KingView denial-of-service vulnerability existing in the web data transmission service (CNVD-C-2020-92343)

6. KingView denial-of-service vulnerability existing in the web data transmission service (CNVD-C-2020-92341)

7. KingView denial-of-service vulnerability existing in the web data transmission service (CNVD-C-2020-92351)

(more…)

NSFOCUS Named a Representative Vendor in Gartner Market for Security Threat Intelligence Products and Services

May 30, 2020

The world’s leading research and advisory company, Gartner, has named NSFOCUS as a Representative Vendor in its May 2020 Market Guide for Security Threat Intelligence Products and Services.

This guide provides in-depth analysis of the threat intelligence (TI) market, focusing on introducing its technical value and commercial potential of threat intelligence, and selecting credible vendors globally. NSFOCUS is honored to be named in the list.

(more…)

Microsoft’s Security Bulletin for May Patches That Fix 111 Security Vulnerabilities Threat Alert

May 29, 2020

Overview

Microsoft released the May 2020 security patch on Tuesday that fixes 111 vulnerabilities ranging from simple spoofing attacks to remote code execution in various products, including .NET Core, .NET Framework, Active Directory, Common Log File System Driver, Internet Explorer, Microsoft Dynamics, Microsoft Edge, Microsoft Graphics Component, Microsoft JET Database Engine, Microsoft Office, Microsoft Office SharePoint, Microsoft Scripting Engine, Microsoft Windows, Power BI, Visual Studio, Windows Hyper-V, Windows Kernel, Windows Scripting, Windows Subsystem for Linux, Windows Task Scheduler, and Windows Update Stack.

(more…)

IP Reputation Report-05242020

May 28, 2020

1. Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at May 24, 2020. 2. Top 10 countries in attack percentage: The Belarus is in first place. The Cape Verde is in the second place. The country China […]

DDoS Attack Landscape 9

May 27, 2020

DDoS Botnets

In 2019, NSFOCUS Security Labs detected over 400,000 DDoS attacks launched via botnets, a sharp increase compared with 2018 (8323 DDoS attacks). According to our observation, the
botnets running on IoT devices were mainly Mirai and Gafgyt families. These two families were exploited to launch over 60% of DDoS attacks in the first half of 2019. The following figure shows the proportions of high-risk commands observed by NSFOCUS Security Labs in 2018 and 2019.

(more…)

Adobe Releases May’s Security Updates Threat Alert

May 26, 2020

Overview

On May 12, 2020, local time, Adobe officially released July’s security updates to fix multiple vulnerabilities in its various products, including Adobe DNG Software Development Kit (SDK) and Adobe Acrobat and Reader.

For details about the security update, visit the following link:

https://helpx.adobe.com/security.html
(more…)

Search

Subscribe to the NSFOCUS Blog