Also: Critical WHOIS Vulnerability Exposes Internet Security Flaw in .mobi Domains This week, cyberthreats rising in Mexico; FBI warned of BEC scams; U.K. police arrested hacking suspect; Avis, Slim CD, Medicare and Fortinet disclosed breaches; Highline public schools reopened after cyberattack; a critical flaw was found in WHOIS; and Konni upped attacks on Russia, South Korea.
British Government Says Data Centers Are 'Essential for Functioning of Society' The U.K. government on Thursday designated data centers as part of its critical national infrastructure in a move intended to prevent the loss of sensitive user data during disruptive cyberattacks. A newly announced data center security team will monitor and anticipate potential cyberthreats.
New Report Warns of Continued Delays and Deficiencies in Federal GPS Modernization The Space Force is suffering from years of delays, setbacks and shortcomings in its Global Positioning System modernization program, according to a Government Accountability Office report, which found major deficiencies and testing issues that could hinder the United States competitiveness in space.
Company Focused on Safe Deployment Practices, Reducing Kernel Mode Dependencies Cutting kernel mode dependencies and adopting safe deployment practices will make endpoint systems more resilient and secure for Windows customers. Tuesday's meeting came two months after a faulty CrowdStrike update disrupted 8.5 million Windows machines and caused $5.4 billion in direct losses.
A vulnerability, which was classified as critical, has been found in Intel VTune Profiler software 2023.0/2024.0. This issue affects some unknown processing. The manipulation leads to uncontrolled search path.
The identification of this vulnerability is CVE-2024-29015. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Intel TDX Module Software and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to incomplete filtering of special elements.
This vulnerability is handled as CVE-2024-39283. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Intel NUC and classified as critical. This issue affects some unknown processing. The manipulation leads to improper input validation.
The identification of this vulnerability is CVE-2024-34163. An attack has to be approached locally. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Radio Player Plugin up to 2.0.73 on WordPress. This affects an unknown part of the component Setting Handler. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2023-4027. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.10.2. It has been declared as critical. This vulnerability affects the function nfs_folio_length. The manipulation leads to denial of service.
This vulnerability was named CVE-2024-43826. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in MagePeople Team Event Manager for WooCommerce Plugin up to 4.2.1 on WordPress. This affects an unknown part. The manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2024-43138. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Mitel MiVoice MX-ONE up to 7.6 SP1. Affected by this issue is some unknown functionality. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2024-36446. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in Intel Ethernet Network Controllers and Adapters 4.4 on Linux and classified as critical. This issue affects some unknown processing of the component Kernel Mode Driver Handler. The manipulation leads to out-of-bounds write.
The identification of this vulnerability is CVE-2024-23497. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Intel Server Board S2600ST Family. This affects an unknown part of the component Kernel Mode Driver Handler. The manipulation leads to improper input validation.
This vulnerability is uniquely identified as CVE-2024-28947. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Intel License Manager for FLEXlm Product Software. This affects an unknown part. The manipulation leads to uncontrolled search path.
This vulnerability is uniquely identified as CVE-2024-24977. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Intel HID Event Filter Software Installer and classified as critical. This issue affects some unknown processing. The manipulation leads to insecure inherited permissions.
The identification of this vulnerability is CVE-2024-25561. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Intel FPGA Software. It has been classified as critical. Affected is an unknown function of the component Flexlm License Daemon. The manipulation leads to insecure inherited permissions.
This vulnerability is traded as CVE-2024-23908. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Intel VROC Software 8.0.8.1001. Affected is an unknown function. The manipulation leads to uncontrolled search path.
This vulnerability is traded as CVE-2024-23489. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Intel IPP Software. This affects an unknown part. The manipulation leads to uncontrolled search path.
This vulnerability is uniquely identified as CVE-2024-28887. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.