Sources say Microsoft on Tuesday will fix an extraordinarily scary flaw in all Windows versions, in a core cryptographic component that could be abused to spoof the source of digitally signed software. Apparently DoD & a few others got an advance patch https://krebsonsecurity.com/2020/01/cryptic-rumblings-ahead-of-first-2020-patch-tuesday/ …
-
Prikaži ovu nit
-
Maybe a coincidence, but today I received a heads up from the U.S. National Security Agency stating NSA’s Director of Cybersecurity is slated to host a call on Jan. 14 (Patch Tuesday) w/ news media that “will provide advanced notification of a current NSA cybersecurity issue.”
14 replies 231 proslijeđeni tweet 467 korisnika označava da im se sviđaPrikaži ovu nit -
Not a coincidence. NSA says in their call with media this morning this vulnerability is one they reported to Microsoft.
6 replies 51 proslijeđeni tweet 176 korisnika označava da im se sviđaPrikaži ovu nit -
NSA says they discovered the flaw on their own and that Microsoft will report that MS has seen no active exploitation of this vulnerability so far.
9 replies 47 proslijeđenih tweetova 156 korisnika označava da im se sviđaPrikaži ovu nit -
NSA's dir. of cybersecurity Anne Neuberger says the critical cryptographic vulnerability resides in Windows 10 and Windows Server 2016, and that the concern about this particular flaw is that it "makes trust vulnerable."
7 replies 111 proslijeđenih tweetova 193 korisnika označavaju da im se sviđaPrikaži ovu nit -
NSA: If enterprise-wide patching of this vuln not possible we recommend prioritize patching systems that perform TLS validation, or host critical infrastructure like domain controllers, DNS servers, VPN servers, etc.
85 proslijeđenih tweetova 147 korisnika označava da im se sviđaPrikaži ovu nit -
This particular flaw is assigned as CVE-2020-0601. NSA says it exists in Win10 systems from July 2015 onward and Win Server 2016. My read on that is it's "critical" in those OSes, but may be present and less of a concern in older versions of Windows but we'll know more soon.
8 replies 71 proslijeđeni tweet 118 korisnika označava da im se sviđaPrikaži ovu nit -
Sources say this disclosure from NSA is planned to be the first of many as part of a new initiative at NSA dubbed "Turn a New Leaf," aimed at making more of the agency's vulnerability research available to major software vendors and ultimately to the public.
9 replies 76 proslijeđenih tweetova 187 korisnika označava da im se sviđaPrikaži ovu nit -
The NSA's Neuberger said this wasn't the first vulnerability the agency has reported to Microsoft, but it was the first one for which they accepted credit/attribution when MS asked.
9 replies 36 proslijeđenih tweetova 109 korisnika označava da im se sviđaPrikaži ovu nit -
Microsoft has released an advisory for this vulnerability in Win10, Server 2016 and '19. It rated this as a "spoofing" flaw that is "important" in severity, but puts exploitability rating at 1, it's second most severe, i.e. "exploitation more likely." https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601 …
6 replies 72 proslijeđena tweeta 102 korisnika označavaju da im se sviđaPrikaži ovu nit
https://kb.cert.org/vuls/id/849224/ Here's an un-hug-of-death'd link
-
-
Odgovor korisnicima @tababodash @briankrebs
So as I understand this, it's likely a vector to spoof any identity on a Windows domain, by using a spoofed x.509 authentication cert. AD game over ?
0 replies 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđaHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Odgovor korisnicima @tababodash @briankrebs
Thx!
0 replies 0 proslijeđenih tweetova 0 korisnika označava da im se sviđaHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.