Remove Authentication Remove Performance Remove SMB
article thumbnail

Microsoft’s November 2024 Patch Tuesday Addresses 87 CVEs (CVE-2024-43451, CVE-2024-49039)

Tenable

Successful exploitation would lead to the unauthorized disclosure of a user’s NTLMv2 hash, which an attacker could then use to authenticate to the system as the user. For more specific guidance on best practices for vulnerability assessments, please refer to our blog post on How to Perform Efficient Vulnerability Assessments with Tenable.

Windows 119
article thumbnail

CVE-2024-8260: SMB Force-Authentication Vulnerability in OPA Could Lead to Credential Leakage

Tenable

Tenable Research discovered an SMB force-authentication vulnerability in Open Policy Agent (OPA) that is now fixed in the latest release of OPA. This exploration led us to discover an SMB force-authentication vulnerability (CVSSv3 6.1) affecting all existing versions of OPA for Windows at that time.

SMB 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

It's 2022. Why do you keep using SMB?

Ivanti

During the last 25 years, companies have relied on SMB protocol to allow them to collaborate and centralize corporate documents. The history of SMB (and why it's no longer relevant). The latest iteration, SMB 3.1.1, encryption added in SMB3 and implemented a pre-authentication integrity check using?SHA-512?hash.

SMB 75
article thumbnail

Maximize Your Vulnerability Scan Value with Authenticated Scanning

Tenable

Start doing authenticated scanning. Performing authenticated scans of your environment offers essential benefits and is a practice widely recognized as valuable. The scan configurations we observe in Tenable’s SaaS products are telling: our customers run unauthenticated scans 20 times more than authenticated ones.

article thumbnail

From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25

Tenable

CVE-2017-0144: Windows SMB Remote Code Execution Vulnerability EternalBlue Remote Code Execution Exploited Network WannaCry NotPetya High 2017 Why it’s significant: CVE-2017-0144 was discovered by the National Security Agency (NSA) and leaked by a hacker group known as Shadow Brokers, making it widely accessible. and Medusa adopted it.

article thumbnail

Microsoft’s September 2024 Patch Tuesday Addresses 79 CVEs (CVE-2024-43491)

Tenable

Active Directory Lightweight Directory Services Administrative Tools Internet Explorer 11 Internet Information ServicesWorld Wide Web Services LPD Print Service Microsoft Message Queue (MSMQ) Server Core MSMQ HTTP Support MultiPoint Connector SMB 1.0/CIFS Advanced Services ASP.NET 4.6 This vulnerability was assigned a CVSSv3 score of 7.3

Windows 120
article thumbnail

MSPs are the Holy Grail for Cybercriminals! Are You Protected?

Kaseya

MSPs hold the keys to the kingdom when it comes to data access and, while a typical day won’t involve leaping from trains to protect it like the fictional professor, they still need to take action to keep themselves and their SMB customers safe. They can also jump from a partner or SMB customer over to you! Island Hopping.

SMB 83