Je hebt een klacht over de onderstaande posting:
The advisory lists CVEs that Salt Typhoon commonly exploits to gain initial access. These include: CVE-2024-21887 – Ivanti Connect Secure and Ivanti Policy Secure web-component command injection vulneraspithobility, commonly chained with an authentication bypass bug tracked as CVE-2023-46805. CVE-2024-3400 – Palo Alto Networks PAN-OS GlobalProtect arbitrary file creation leading to OS command injection. The CVE allows for unauthenticated remote code execution (RCE) on firewalls when GlobalProtect is enabled on specific versions/configurations. CVE-2023-20273 – Cisco Internetworking Operating System (IOS) XE software web management user interface post-authentication command injection/privilege escalation (commonly chained with CVE-2023-20198 for initial access to achieve code execution as root) CVE-2023-20198 – Cisco IOS XE web user interface authentication bypass vulnerability CVE-2018-0171 – Cisco IOS and IOS XE smart install remote code execution vulnerability
Beschrijf je klacht (Optioneel):