On Tuesday, August 23, an advisory notification was released by VMware, the virtualization technology software firm, announcing a local privilege escalation vulnerability (CVE-2022-31676). Updates are available to remediate this vulnerability in affected VMware products.
Several cybersecurity research groups have identified and studied the use of a Zero-Day vulnerability found in the Mitel VoIP MiConnect solution, CVE-2022-29499. The vulnerability exists due to improper input validation in the Mitel Service Appliance. A cyberattacker can send a specially crafted HTTP GET request to the application and execute arbitrary Operating System commands on the target system. Successful exploitation of this flaw may result in the complete compromise of the vulnerable system. This vulnerability has been successfully exploited by at least one ransomware group.
UPDATE: December 21, 2021- We have identified the products Systems Engineering sells and supports that are impacted by the log4j vulnerability. Affected products are listed below along with our plans to address each.
The November 2021 Microsoft Patch Tuesday updates were released on November, 9th. The full release covered 55 security updates and vulnerabilities found in Exchange Servers 2013, 2016, 2019. Included in this release is a patch that covers an actively exploited zero-day vulnerability classified as CVE-2021-42321 - Microsoft Exchange Server Remote Code Execution Vulnerability. This one vulnerability only affects on-premises and hybrid Exchange servers 2016, and 2019.
The July 2021 Microsoft Patch Tuesday updates were released on July 13. One of those patches addressed a publicly disclosed but unexploited, zero-day vulnerability classified as CVE-2021-34473 - Microsoft Exchange Server Remote Code Execution Vulnerability. This vulnerability affects on-premises Exchange servers 2013, 2016, and 2019, and was assigned a severity of critical.