Security Concept for Software Supply Chain (Part 2) — Assessable Capabilities of Software Supply Chain Compositions

December 14, 2022 | Adeline Zhang

To deal with threats from supply chains and ensure the security of their own IT infrastructure, companies shall set a list of software compositions to sort out the supply chain products, identify and manage key software suppliers, control security risks through security assessments at all stages of the life cycle of supply chains, and reduce […]

Fortinet FortiOS sslvpnd Remote Code Execution Vulnerability (CVE-2022-42475)

December 14, 2022 | Jie Ji

Overview Recently, NSFOCUS CERT detected that Fortinet officially fixed a remote code execution vulnerability (CVE-2022-42475) in FortiOS sslvpnd. Due to the flaw in sslvpnd’s validation of user input, an unauthenticated attacker can trigger a buffer overflow by sending a specially crafted packet, which can eventually execute arbitrary code on the target system. The CVSS score […]

Thinkphp Remote Code Execution Vulnerability Alert

December 11, 2022 | Jie Ji

Overview Recently, NSFOCUS CERT has monitored that the exploit details of the Thinkphp remote code execution vulnerability are publicly disclosed on the Internet. Due to the incoming parameter inspection defect in the Thinkphp program, when Thinkphp enables the multilingual function, unauthenticated attackers can pass in parameters through get, header, cookie, etc., to achieve directory traversal […]

Security Researcher from NSFOCUS Security Labs to Speak at Black Hat 2022 Europe

December 7, 2022 | Adeline Zhang

Gao Jian at NSFOCUS Security Labs was invited to speak at the Black Hat 2022 Europe held at ExCel London, United Kindom from December 5 to 8, 2022. Gao Jian specializes in industrial control system security, focusing on PLC and SCADA vulnerability exploitation and ICS security enhancement. He has helped many vendors, including Siemens, Codesys, […]

Google Chrome V8 Type Confusion Vulnerability (CVE-2022-4262) Alert

December 6, 2022 | Jie Ji

Overview On December 5, NSFOCUS CERT found that Google officially released a type confusion vulnerability (CVE-2022-4262) in Google Chrome V8. A type confusion error occurs because a program uses one type of method to allocate or initialize a resource, such as a pointer, object, or variable, but then accesses that resource with another method that […]

Snapd Local Privilege Escalation Vulnerability (CVE-2022-3328)

December 3, 2022 | Jie Ji

Overview On December 2, NSFOCUS CERT detected that Qualys released a local privilege escalation vulnerability (CVE-2022-3328) in Snapd. There is a conditional race vulnerability in the must_mkdir_and_open_with_perms() function in snap-confine, an attacker with normal user privileges can use Multipath Privilege Escalation Vulnerability (CVE-2022-41974) and Multipath Symbolic Link Vulnerability, bind the /tmp directory to any directory […]

Security Concept for Software Supply Chain (Part 1) — Transparency of Software Supply Chain Compositions

December 2, 2022 | Adeline Zhang

Software supply chain security covers the whole software life cycle. In terms of software product complexity alone, apart from the software itself, it is necessary to ensure the security of the dependencies and transitive dependencies of software, as well as the security of the software ecosystem composed of these dependency chains. Especially regarding the issue […]

Glocomp – Partner Event in Malaysia

November 30, 2022 | NSFOCUS

The partner event with Glocomp Systems (M) Sdn Bhd kicked off on Nov. 29th in Malaysia. It was a wonderful chance for us to introduce our latest Next-Gen Firewall (NGFW) solution which meets the changing needs of the cloud-enabled enterprise network.

A Look at Qatar’s Infrastructure Construction Through Cyberspace Surveying and Mapping Technology

November 28, 2022 | Adeline Zhang

As the 2022 FIFA World Cup kicked off on Sunday, Nov 20, 2022, no country can be more notable than Qatar these days. In this article, we will get you familiar with the host nation Qatar, and show you its infrastructure construction level through analysis of cyberspace services. Qatar and the FIFA 2022 World Cup […]

The Increasingly Complex and Varied Vectors to Attack Software Supply Chain

November 23, 2022 | Adeline Zhang

Unlike vulnerability exploitation in products, attack vectors and implementation channels targeting the supply chain in the real environment are more diverse. Due to the advantages of low development cost, the widespread use of open-source components in projects has become the mainstream development method. The conflict between a rule-relaxed open community and limited maintenance resources provides […]

Search

Subscribe to the NSFOCUS Blog