Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-46873PUBLISHED: 2023-01-29
WireGuard, such as WireGuard 0.5.3 on Windows, does not fully account for the possibility that an adversary might be able to set a victim's system time to a future value, e.g., because unauthenticated NTP is used. This can lead to an outcome in which one static private key becomes permanently useles...
CVE-2023-0572PUBLISHED: 2023-01-29Unchecked Error Condition in GitHub repository froxlor/froxlor prior to 2.0.10.
CVE-2023-24065PUBLISHED: 2023-01-29
NOSH 4a5cfdb allows stored XSS via the create user page. For example, a first name (of a physician, assistant, or billing user) can have a JavaScript payload that is executed upon visiting the /users/2/1 page. This may allow attackers to steal Protected Health Information because the product is for ...
CVE-2023-0565PUBLISHED: 2023-01-29Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.10.
CVE-2023-0566PUBLISHED: 2023-01-29Static Code Injection in GitHub repository froxlor/froxlor prior to 2.0.10.
User Rank: Apprentice
4/28/2020 | 12:41:28 PM
The good news is you can reference the list of URLs used in the attack and immediately guard against access to these sites, at least. While updated versions of the trojan may point to other domains, it's a start. Additionally they provide a comprehensive file list that can be used for system scans of malicious files.
Because this SQL injection attack will have been patched against already in a hotfix, the biggest issue currently is the Sophos user base that does not have automatic updates enabled. Opening themselves up to the Asnarok attackers will not only provide access to data for as long as their Sophos installs remain unpatched, they offer a testbed for modifications to the code that could allow bypassing any changes made in the hotfix.