Weekly threat roundup: Froala, WordPress, Siemens – IT PRO

View all Business
View all Cloud
View all Hardware
View all Infrastructure
View all Security
View all Software
View all Technology
Shutterstock
Patch management is far easier said than done, and security teams may often be forced into prioritising fixes for several business-critical systems, all released at once. It's become typical, for example, to expect dozens of patches to be released on Microsoft's Patch Tuesday, with other vendors also routinely getting in on the act.
Below, IT Pro has collated the most pressing disclosures from the last seven days, including details such as a summary of the exploit mechanism, and whether the vulnerability is being exploited in the wild. This is in order to give teams a sense of which bugs and flaws might pose the most dangerous immediate security risks.
Bishop Fox researcher Chris Davis has uncovered a cross-site scripting (XSS) vulnerability in the Froala website editor used to build roughly 30,000. 
Tracked as CVE-2021-28114, the vulnerability affects Foala versions 3.2.5 and earlier and is embedded in its HTML sanitisation parsing protocol, which allows attackers to bypass existing XSS protections. This is a high-risk flaw and can be triggered remotely. 
Fraola is a what-you-see-is-what-you-get (WYSIWYG) HTML rich-text editor that's used in third-party sites to provide text editing functionality, including HTML text. The latest version of the application was released on 18 May this year and includes a patch for the flaw.
A critical file upload vulnerability in the Fancy Product Designer WordPress plugin has been actively exploited by cyber criminals, according to researchers with Wordfence. 
The flaw, tracked as CVE-2021-24370, is rated 9.8 on the CVSS threat severity scale and has been disclosed publicly with minimal details due to the fact it's under active exploitation. Hackers have been abusing the flaw in the plugin, which allows users to upload images and PDF files that can be added to listed products on their sites. 
The flaw is possible to exploit in some configurations even if the plugin has been deactivated. All users, therefore, were initially urged to uninstall Fancy Product Designer until a patched version was made available, although this has now been released. 
Siemens has released patches for a critical memory protection flaw embedded in a set of automation products, which hackers could exploit to run arbitrary code to access memory.
The vulnerability, tagged CVE-2020-15782, is highly critical and affects seven products across Siemens' automation product series SIMATIC S7-1200 and S7-1500 CPU. These appliances are conventionally used to control applications and tasks for medium and complex mechanical engineering and factory plant buildings. 
Hackers could exploit these flaws to remotely obtain read-write memory access, which can allow them to read data, as well as use this as a springboard to launch further attacks. 
Siemens has strongly advised that operators enable password protection for S8 communication and configure additional access protections. They should also block remote client connections, prevent physical access to critical components, and ensure the vulnerable systems aren't connected to untrusted networks. 
How to hold more productive meetings
Tips and tricks to get the most out of your meetings
Enabling the future of work with embedded real-time communication
A new dimension of human interaction is coming to digital work
How to do hybrid work right
Overcoming challenges in the transition to hybrid work
HCI 2.0 From HPE: How it can help your business thrive
Why SMBs need to accelerate digital transformation with HCI
China plans to dump 50 million foreign PCs within the next two years
How full-stack observability can accelerate IT innovation
Cisco develops technology to predict network issues before they happen
ITPro is part of Future plc, an international media group and leading digital publisher. Visit our corporate site www.futureplc.com
© Future Publishing Limited, Quay House, The Ambury, Bath BA1 1UA. All rights reserved. England and Wales company registration number 2008885

source

Registered for Cape Town Website Design Agency