Recently this Friday which is 21-04-2023 the US Cybersecurity and Infrastructure Security Agency which is known as (CISA) added three vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog after detecting active exploitation.
The following three critical vulnerabilities are mentioned below:
- (CVE-2023-27350) in PaperCut print management software that permits unauthorized access and execution of arbitrary code. The flaw has been remediated in the latest software versions.
- (CVE-2023-28432) The KEV catalog also includes a MinIO information disclosure vulnerability
- (CVE-2023-2136) Google Chrome Skia integer overflow vulnerability.
According to GreyNoise, as many as 18 malicious IP addresses from different countries have attempted to exploit the MinIO flaw over the last 30 days.
In a recent alert, GreyNoise pointed out that an OpenAI-provided reference implementation for developers to incorporate plugins into ChatGPT relied on an outdated version of MinIO. The threat intelligence company also noted that this version is susceptible to CVE-2023-28432
While the OpenAI feature is a valuable tool for developers, GreyNoise cautioned that security should be a key design consideration.
CISA’s KEV catalog also includes a serious remote code execution bug that impacts PaperCut print management software, enabling attackers to bypass authentication and execute arbitrary code. The vendor has resolved the vulnerability by releasing PaperCut MF and PaperCut NG versions 20.1.7, 21.2.11, and 22.0.9, as of March 8, 2023. The Zero Day Initiative
reported the issue on January 10, 2023, and is expected to publish additional technical information on May 10, 2023.
According to a recent update shared by Melbourne company this week active of evidence, exploitation of unpatched emerged around 08/04/2023
One more actively exploited flaw was added to the KEV catalog, namely a vulnerability in Google Chrome that affects the Skia 2D graphics library. This flaw could allow an attacker to perform a sandbox escape by using a specially crafted HTML page.
FCEB agencies in the U.S. are advised to address identified vulnerabilities by May 12, 2023, to safeguard their networks against ongoing threats.