July Threat Advisory – Top 5

July Threat Advisory – Top 5

Apple Released Security Update to Address Vulnerability in Their Products.


Threat Reference: Global


Risks: Arbitrary Code Execution


Advisory Type: Updates/Patches


Priority: Standard


Apple has released a security update to address a critical vulnerability in their products. Successful exploitation of this vulnerability could lead to arbitrary code execution.


Notable CVE: [Critical] - CVE-2023-37450 - Processing web content may lead to arbitrary code execution.


Affected Products include macOS Big Sur, macOS Monterey, iOS 16.5.1 and iPadOS 16.5.1, macOS Ventura 13.4.1.


Recommendation: It is recommended to update the affected products to their latest available versions/patch level.


Citrix Released Security Patch to Fix Critical and High Severity Vulnerability Impacting Citrix ADC and Citrix Gateway.


Threat Reference: Global


Risks: Elevation of Privilege, Remote Code Execution


Advisory Type: Updates/Patches


Priority: Standard


Citrix has released a security patch to fix Critical and High severity vulnerabilities affecting Citrix ADC and Citrix Gateway. Successful exploitation of these vulnerabilities by an attacker could lead to gaining NT AUTHORITYSYSTEM privileges on a local system or Remote Code Execution.


Notable CVEs:


[Critical] CVE-2023-24492 – Successful exploitation of vulnerability may lead to remote code execution.
[High] CVE-2023-24491 – Successful exploitation of vulnerability will allow an attacker to elevate privileges to NT AUTHORITYSYSTEM.


Affected Products include Citrix ADC and Citrix Gateway: All versions prior to 23.5.1.3 (Windows), and Citrix ADC and Citrix Gateway: All versions prior to 23.5.2 (Ubuntu).


Recommendation: It is recommended to update the affected products to their latest available versions/patch level.


New Multi-Stage TOITOIN Trojan Targeting Multiple Organizations.


Threat Reference: Global


Risks: Malware/Trojan


Advisory Type: Thre ..

Support the originator by clicking the read the rest link below.