- Unpatched WordPress Flaw Could Allow Hackers To Reset Admin Password
WordPress is a free and open-source content management system (CMS) based on PHP and MySQL. Polish security researcher Dawid Golunski of Legal Hackers last year in July discovered a flaw in WordPress. The logical vulnerability that could allow a remote attacker to reset targeted user’s password under certain circumstances. The vulnerability (CVE-2017-8295) becomes even more dangerous after knowing that it affects all versions of WordPress including the latest 4.7.4 version. The vulnerability in WordPress processes the password reset request, for the user it has been initiated. According to research when a user requests to reset his/her password through forgot password option, WordPress immediately generates a unique secret code and sends it to user’s email ID already stored in the database. According to Golunski, an attacker can send a spoofed HTTP request with a predefined custom hostname value (for example attacker-mxserver.com), while initiating password reset process for a targeted admin user.
Cyber security Tips: There is no patch available from the popular CMS Company, WordPress admins are advised to update their server configuration to enable Use Canonical Name to enforce static/predefined SERVER_NAME value.
- Real-World SS7 Attack Hackers Are Stealing Money From Bank Accounts
Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network. Nodes in an SS7 network are called signaling points. The Security researchers have discovered critical security holes in the Signaling System 7 (SS7). The vulnerability allows hackers to listen in private phone calls and read text messages on a potentially vast scale, despite the most advanced encryption used by cellular networks. Germany’s O2 Telefonica has confirmed that the same SS7 weaknesses have recently been exploited by cybercriminals to bypass two-factor authentication (2FA) banks used to prevent unauthorized withdrawals from user’s bank accounts according to news published by Hacker news.
Cyber Security Tips: Users are strictly recommended that avoid using two-factor authentication via SMS texts for receiving OTP codes. Instead, rely on cryptographically-based security keys as a second authentication factor.
- Researchers hack industrial robots; yet another IoT disaster
The security researchers at Trend Mirco demonstrated how factory/industrial robots could be hacked and used for malicious purposes by threat actors. The demonstration centers on the security flaws in Internet of Things (IoT) devices and how they require emergency security implementations. The researchers are able to exploit due to vulnerability present in a robot. The vulnerability which allows hackers to make changes in robots altering the way they operate. By leveraging the remote code execution vulnerability, they are able to modify the control loop configuration files, which are naively obfuscated and thus easily modifiable. The hackers can exploit the vulnerable system to control a robot, damage its parts or even cause injuries to people who work in close collaboration with it, for instance, by disabling or substantially altering safety devices. The robot manufactured by forums like ABB, Kawasaki, Fanuc, and Yaskawa are vulnerable.
Cyber Security Tips: Administrators are strictly recommended to patch these vulnerabilities as soon as possible.
- Cisco Patches Critical Flaw in Small Business Router
Cisco has released a firmware update for one of its small business routers to address a critical vulnerability that can be exploited for denial-of-service (DoS) attacks and arbitrary code execution. The flaw, tracked as CVE-2017-3882 and described as a buffer overflow, affects the device’s Universal Plug and Play (UPnP) implementation and it can allow an unauthenticated, layer 2-adjacent attacker to execute arbitrary code with root privileges or cause vulnerable routers to reload. The flaw affects CVR100W Wireless-N VPN routers running a version of the firmware prior to 126.96.36.199. The same router model is also affected by a medium severity bug that can be exploited by an unauthenticated attacker to bypass the remote management ACL according to news published by security week.
Cyber Security Tips: Users and administrators are strictly recommended to install patches as soon as possible.