Remove Authentication Remove Information Remove LAN
article thumbnail

Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391)

Tenable

A local, authenticated attacker could exploit this vulnerability to elevate to SYSTEM level privileges. At the time this blog post was published, there was no other information about this exploitation. A local, authenticated attacker could exploit this vulnerability to delete files from a system. and is rated important.

Windows 71
article thumbnail

Microsoft’s September 2023 Patch Tuesday Addresses 61 CVEs (CVE-2023-36761)

Tenable

Important CVE-2023-36761 | Microsoft Word Information Disclosure Vulnerability CVE-2023-36761 is an information disclosure vulnerability in Microsoft Word. Successful exploitation of this flaw would allow for the disclosure of New Technology LAN Manager (NTLM) hashes. It was assigned a CVSSv3 score of 6.2 and is rated important.

LAN 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Hybrid working: network managers need to take care of unfinished business

CIO

NTT’s recipe for hybrid working begins with zero trust network architecture, identity management and multifactor authentication. Gone are the days when you used to have lots of fixed LAN cables. Lack of visibility is really one of the key problems that we have encountered.” Finally, there’s the need to consider access technologies.

Network 156
article thumbnail

Microsoft’s February 2024 Patch Tuesday Addresses 73 CVEs (CVE-2024-21351, CVE-2024-21412)

Tenable

It was disclosed to Microsoft by several researchers including Pter Girnus of Trend Micro’s Zero Day Initiative, Dima Lenz and Vlad Stolyarov of Google’s Threat Analysis Group (TAG) and dwbzn with Aura Information Security. No specific details about this zero-day vulnerability was available at the time of the February Patch Tuesday release.

LAN 130
article thumbnail

CVE-2020-1472: 'Zerologon' Vulnerability in Netlogon Could Allow Attackers to Hijack Windows Domain Controller

Tenable

Security researchers reveal how the cryptographic authentication scheme in Netlogon can be exploited to take control of a Windows domain controller (DC). An attacker can exploit this flaw to impersonate the identity of any machine on a network when attempting to authenticate to the Domain Controller (DC). Get more information.

Windows 119
article thumbnail

CVE-2020-27125, CVE-2020-27130, CVE-2020-27131: Pre-Authentication Vulnerabilities in Cisco Security Manager Disclosed

Tenable

As part of his PoC release for CVE-2020-27131, Hauser included a reference to TRA-2017-23 , a vulnerability disclosure from Tenable’s Zero Day Research team from 2017 regarding a deserialization remote code execution vulnerability in Cisco Security Manager and Cisco Prime LAN Management Solution. Get more information. Proof of concept.

article thumbnail

The Cable Security Experience

CableLabs

They may attack the CPE device from the home network side, or the local area network (LAN) side. These tools are authentication, encryption, and message hashing. Authentication is conducted using a secret of some sort. And they may attack the network operator’s infrastructure. Tapping fiber or coaxial cables are both practical.