|
HB1PMS > TECH 29.02.20 19:42l 69 Lines 2777 Bytes #999 (0) @ WW
BID : 2285HB1PMS
Read: GAST
Subj: Unpatched systems are still one of the significant
Path: DBO595<DBX320<FRB024<NL3TD<NL3PRC<GY1BBS<HB1BBS
Sent: 200229/1606Z 8602@HB1BBS.ZL.NLD.EU BPQ6.0.19
Van: HB1PMS@HB1BBS.ZL.NLD.EU
Unpatched systems are still one of the significant attack vectors to launch
cyberattacks
The issue can turn worse when the organization can be compromised to steal
confidential data or launch DDoS attacks.
Most of these vulnerabilities are found to be exploited via phishing attacks
and exploit kits that specifically target flaws in Microsoft products.
Leaving a vulnerable system unpatched can invite troubles for an
organization. The issue can turn worse when the organization suffers a
cyberattack that can result in, but not limited to, compromise of
confidential data, DDoS attacks or stealing of customers’ details.
According to a report released by Recorded Future, it has been found that
the same vulnerabilities kept showing up year-after-year. An interesting
aspect of the report was that most of these vulnerabilities were found to be
exploited via phishing attacks and exploit kits that specifically target
flaws in Microsoft products.
Prevalent old flaws
Some of the old flaws that have been quite actively used to launch attacks
are:
CVE-2016-0189 - Memory corruption flaw in Microsoft’s Internet Explorer
CVE-2017-8570 - Remote code execution flaw in Microsoft Office
CVE-2017-0143 - Affects SMBv1 protocol
CVE - 2018-11776 -Remote code execution Apache Struts
CVE-2017-11882 - Remote code execution Microsoft Office
CVE-2009-3129 - Remote code execution in Microsoft Excel/Word
CVE-2017-11774 - Security Feature Bypass vulnerability in Microsoft Outlook
Bottom line
It is no surprise that the vulnerabilities above are leveraged in
cyberattacks since there are public exploits for all of them. With growing
numbers of threats taking advantage of well-known and old vulnerabilities,
it is very much necessary for organizations to patch out date systems to
protect their data, systems and critical infrastructure against hackers.
73 Henk.
======================================================================
_ _ ____ __ ____ ____ _____
| | | | _ \/_ | _ \| _ \ / ____| SYS: Henk (hb1nos@hb1bbs.com)
| |__| | |_) || | |_) | |_) | (___ QTH: Ouwerkerk - JO11XO
| __ | _ < | | _ <| _ < \___ \ BBS: HB1BBS.ZLD.NLD.EU
| | | | |_) || | |_) | |_) |____) | QRV: 27.235 MHz (FM 1200bps)
|_| |_|____/ |_|____/|____/|_____/ WEB: www.hb1bbs.com
======================================================================
** Host of BPQ Netrom/Node NLDHUB::NL9HUB 85.214.163.10 UDP 93
======================================================================
** This message is generated with Sally 7.2.033
----------------------------------------------------------------------
** Timed zaterdag 29 februari 2020 17:03 West-Europa (standaardtijd)
** BBS HB1PMS@HB1BBS.ZL.NLD.EU
Lese vorherige Mail | Lese naechste Mail
| |