CISA Releases Fourteen Industrial Control Systems Advisories

CISA released fourteen Industrial Control Systems (ICS) advisories on June 15, 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. 
ICSA-23-166-01 SUBNET PowerSYSTEM Center
ICSA-23-166-02 Advantech WebAccessSCADA
ICSA-23-166-03 Siemens SICAM Q200 Devices
ICSA-23-166-04 Siemens SIMOTION
ICSA-23-166-05 Siemens SIMATIC WinCC
ICSA-23-166-06 Siemens TIA Portal
ICSA-23-166-07 Siemens SIMATIC WinCC V7
ICSA-23-166-08 Siemens SIMATIC STEP 7 and Derived Products
ICSA-23-166-09 Siemens Solid Edge
ICSA-23-166-10 Siemens SIMATIC S7-1500 TM MFP BIOS
ICSA-23-166-11 Siemens SIMATIC S7-1500 TM MFP Linux Kernel
ICSA-23-166-12 Siemens SINAMICS Medium Voltage Products
ICSA-23-166-13 Siemens SICAM A8000 Devices
ICSA-23-166-14 Siemens Teamcenter Visualization and JT2Go 
 
CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations.

Barracuda Networks Releases Update to Address ESG Vulnerability

Barracuda Networks has released an update to their advisory addressing a vulnerability—CVE-2023-2868—in their Email Security Gateway Appliance (ESG). According to Barracuda, customers should replace impacted appliances immediately. 
CISA urges organizations to review the Barracuda advisory and for all impacted customers to follow the mitigation steps as well as hunt for the listed indicators of compromise (IOCs) to uncover any malicious activity. For more information, see Mandiant’s advisory on Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor.
Note: Customers who used enterprise privileged credentials for management of their Barracuda appliance (such as Active Directory Domain Admin or similar) should take immediate incident investigation steps to validate the use and behavior of all credentials used on the appliance. It is of utmost importance to verify that threat actors have not compromised customer enterprise networks via this entry vector.

CISA, FBI, and MS-ISAC Update Joint CSA on Progress Telerik Vulnerabilities

Today, CISA, the Federal Bureau of Investigation (FBI), and Multi-State Information Sharing and Analysis Center (MS-ISAC) released an update for joint Cybersecurity Advisory (CSA) Threat Actors Exploit Progress Telerik Vulnerability in U.S. Government IIS Server. 
This iteration of the CSA—now renamed Threat Actors Exploit Progress Telerik Vulnerabilities in Multiple U.S. Government IIS Servers—is based on the forensic analysis and identified exploitation of CVE-2017-9248 at an additional FCEB agency. Activity identified at this agency is separate from the CVE-2019-18935 exploitation listed in the original publication; analysis is provided as context for existing vulnerabilities within Telerik UI for ASP.NET AJAX. Further, this update provides a timetable and context of unattributed APT actor activity that highlights events, including identified malicious files. 
CISA, FBI, and MS-ISAC encourage network defenders to review this update and refer to the accompanying Malware Analysis Report, MAR-10443863-1.v1 CVE-2017-9248 Exploitation in U.S. Government IIS Server for analysis of the newly identified malicious files. 

Ataques a dispositivos ESG de Barracuda vinculados a hackers chinos

SonicWall emite un parche para un error crítico que afecta a sus productos de análisis y GMS.

Un grupo de actores maliciosos, pro-chino ha sido recientemente vinculado a los ataques en los dispositivos de puerta de enlace de correo electrónico (ESG) de barracuda, mediante la explotación de una vulnerabilidad Zero-day, ahora rastreada como CVE-2023-2868. Se sabe que la explotación de la vulnerabilidad Zero-day se dio desde octubre de 2022, el cual tiene […]

Vulnerabilidad Zero-day permite instalación de backdoor en VMs

VMware

Recientemente VMware ha lanzado parches para la vulnerabilidad Zero-day utilizada por actores maliciosos patrocinados por el gobierno chino para el robo de información de maquinas virtuales de Linux y Windows mediante backdoor. Investigaciones recientes, conducidas por Mandiant, han descubierto que el grupo de actores maliciosos rastreados como UNC3886 ha estado abusando de una vulnerabilidad Zero-day, […]