At a glance.
- TeamViewer says hack did not affect its product environment or customer data.
- Juniper Networks fixes critical flaw.
- Interpol disrupts international scam networks.
- OpenSSH RCE flaw affects glibc-based Linux systems.
TeamViewer says hack did not affect its product environment or customer data.
TeamViewer has provided an update on last Wednesday's attack against its corporate IT environment, which the company has attributed to Russia's APT29. TeamViewer said yesterday, "As the investigation progresses, we reconfirm that the attack has been contained to our internal corporate IT environment. Most importantly, our assessment reconfirms that it did not touch our separated product environment, nor the TeamViewer connectivity platform, nor any customer data. According to current findings the threat actor leveraged a compromised employee account to copy employee directory data, i.e. names, corporate contact information, and encrypted employee passwords for our internal corporate IT environment. We have informed our employees and the relevant authorities."
Juniper Networks fixes critical flaw.
Juniper Networks has issued an emergency patch for a critical authentication bypass vulnerability affecting Session Smart router and conductor products, SecurityWeek reports. The vulnerability (CVE-2024-2973) has been assigned a CVSS score of 10, and "allows a network-based attacker to bypass authentication and take full control of the device."
Interpol disrupts international scam networks.
An Interpol operation seized $257 million and resulted in the arrests of 3,950 suspects linked to organized scam networks, the Record reports. The effort, dubbed "Operation First Light 2024," involved police forces from sixty-one countries and targeted "phishing, investment fraud, fake online shopping sites, romance, and impersonation scams."
OpenSSH RCE flaw affects glibc-based Linux systems.
Researchers at Qualys have discovered an unauthenticated remote code execution vulnerability (CVE-2024-6387) affecting OpenSSH’s server (sshd) in glibc-based Linux systems, the Register reports. Qualys explains, "[W]e identified that this vulnerability is a regression of the previously patched vulnerability CVE-2006-5051, reported in 2006. A regression in this context means that a flaw, once fixed, has reappeared in a subsequent software release, typically due to changes or updates that inadvertently reintroduce the issue. This incident highlights the crucial role of thorough regression testing to prevent the reintroduction of known vulnerabilities into the environment. This regression was introduced in October 2020 (OpenSSH 8.5p1)."
The researchers add, "This bug marks the first OpenSSH vulnerability in nearly two decades—an unauthenticated RCE that grants full root access. It affects the default configuration and does not require user interaction, posing a significant exploit risk."
Ubuntu issued patched versions of OpenSSH today.