{"vulnerability": "CVE-2024-56161", "sightings": [{"uuid": "4fd0eb71-7923-44ba-bda6-a8d490a39263", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3lheoau3ngp2s", "content": "", "creation_timestamp": "2025-02-04T18:19:45.057004Z"}, {"uuid": "993b22c2-6275-483e-b1a2-8b9c05fe85b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhc5ld77ig2p", "content": "", "creation_timestamp": "2025-02-03T18:16:03.358503Z"}, {"uuid": "bd82b8d9-396d-4017-9e37-4fd5d5d7006c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "MISP/c7341ce5-7a64-4747-9907-1a5b42bfcacc", "content": "", "creation_timestamp": "2025-02-05T08:48:20.000000Z"}, {"uuid": "528167a3-b845-4eea-92eb-7368955f2c99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-a910054a-1b1a0442aae5b72f", "content": "", "creation_timestamp": "2025-02-07T16:04:47.315220Z"}, {"uuid": "609bf4fa-b480-4525-b665-5c6867f3efb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113942010870884782", "content": "", "creation_timestamp": "2025-02-03T21:11:49.764902Z"}, {"uuid": "4d58f81b-262d-412c-a6a1-0b68227f0b97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/theitnerd.bsky.social/post/3lhezlyuvry2c", "content": "", "creation_timestamp": "2025-02-04T21:42:50.411918Z"}, {"uuid": "db1d7a0c-a8b1-4490-885d-23375b60e273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lhdvztfpsp2r", "content": "", "creation_timestamp": "2025-02-04T11:06:19.866457Z"}, {"uuid": "8733a965-871e-4801-bb50-5f64f53b4660", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-56161", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lhicb6m57k2o", "content": "", "creation_timestamp": "2025-02-06T04:55:50.705612Z"}, {"uuid": "815b8263-77b6-4941-bd7d-157cc583c32c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/113945848639845370", "content": "", "creation_timestamp": "2025-02-04T13:27:49.409253Z"}, {"uuid": "7ce975a6-1ce0-41c2-b054-b2ea064256cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3lhe5wzh4zk22", "content": "", "creation_timestamp": "2025-02-04T13:27:57.423682Z"}, {"uuid": "1c0927cf-352b-4b6d-a147-65b2fccf14d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3lhe6g5i5b32b", "content": "", "creation_timestamp": "2025-02-04T13:36:22.960292Z"}, {"uuid": "24130686-11f8-4e1b-82a4-48184ba31002", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lhfa24esrc2c", "content": "", "creation_timestamp": "2025-02-04T23:38:07.958906Z"}, {"uuid": "dfcf462b-01d9-4ef7-a671-6138c699050e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://thehackernews.com/2025/02/amd-sev-snp-vulnerability-allows.html", "content": "", "creation_timestamp": "2025-02-04T07:58:00.000000Z"}, {"uuid": "bb99400a-dd00-492d-8a5c-068039b5e415", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lhigxrgafa2d", "content": "", "creation_timestamp": "2025-02-06T06:20:03.147448Z"}, {"uuid": "afcddc87-5073-4bef-b483-8f8c35767a78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lhjg2eoufw26", "content": "", "creation_timestamp": "2025-02-06T15:36:16.855714Z"}, {"uuid": "e166b2a3-0c67-44a0-800b-d6c8c5e6d72f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3lhjy2kay4x2t", "content": "", "creation_timestamp": "2025-02-06T20:58:29.441292Z"}, {"uuid": "9647d1d7-5d73-484e-97c2-978a74e5bf1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-ff4bbbe6-58ed58dba88fdb03", "content": "", "creation_timestamp": "2025-02-07T11:34:45.789784Z"}, {"uuid": "10fd270d-a17e-444b-985d-9e7b58ce7a84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lhh7oi7bw623", "content": "", "creation_timestamp": "2025-02-05T18:36:56.161329Z"}, {"uuid": "8db98aff-d39b-49ce-8745-648169d2648c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3lhimranh7o2c", "content": "", "creation_timestamp": "2025-02-06T08:03:47.017176Z"}, {"uuid": "f96aa760-2de7-4ba2-b9e7-030add490ae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lheksl2zqg27", "content": "", "creation_timestamp": "2025-02-04T17:18:04.718836Z"}, {"uuid": "359c9ea9-1c9f-44ed-8d99-ac2b6507fc21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/kaldata.bsky.social/post/3ljrsql5tez27", "content": "", "creation_timestamp": "2025-03-07T10:35:08.465444Z"}, {"uuid": "792ab398-c5bc-43ba-bb89-99d38b317955", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/hacker-news-jp.bsky.social/post/3lhrsoxbad32y", "content": "", "creation_timestamp": "2025-02-09T23:43:49.916944Z"}, {"uuid": "a1279812-75ba-43ec-a9e5-96907d8bd1d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/schubringglobal.bsky.social/post/3lht77nvta72x", "content": "", "creation_timestamp": "2025-02-10T13:00:35.921141Z"}, {"uuid": "c540e2b2-9f82-465b-9b1c-a70e5ccf6af5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lifbk5lyoy2a", "content": "", "creation_timestamp": "2025-02-17T17:30:10.839499Z"}, {"uuid": "8fa875ca-ccde-4ffd-a9a7-0e78a3c0f1bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/campuscodi.risky.biz/post/3ljpmr2qey227", "content": "", "creation_timestamp": "2025-03-06T13:42:41.801042Z"}, {"uuid": "acff9502-410d-4edd-a12f-5ead28281db4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/114001895722363091", "content": "", "creation_timestamp": "2025-02-14T11:01:20.828540Z"}, {"uuid": "230f2566-960d-46ba-a5ab-13cc84508f88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/114013220447034408", "content": "", "creation_timestamp": "2025-02-16T11:01:22.677961Z"}, {"uuid": "e9a384f9-49f9-4879-b513-1f2d0140ca59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}, {"uuid": "b568b00c-e6ba-4242-ae27-fc58b72878d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lr76bwl7ws27", "content": "", "creation_timestamp": "2025-06-09T20:02:41.992192Z"}, {"uuid": "2f32c2fa-5f75-413f-b7b0-60cef548da27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://t.me/Lviathan404/6535", "content": "AMD SEV-SNP Vulnerability Allows Malicious Microcode Injection with Admin Access\n\nCVE-2024-56161 exposes AMD SEV-SNP to malicious microcode attacks, risking VM data integrity. Discovered by Google, rated CVSS 7.2.\n\nThe Hacker News | thehackernews.com \u2022 Feb 4, 2025", "creation_timestamp": "2025-02-09T14:36:20.000000Z"}, {"uuid": "ecb2c0af-77df-4a71-9314-026aed9a7530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://vulnerability.circl.lu/comment/4479dea7-72fb-4d91-90f4-95ffec3e0310", "content": "", "creation_timestamp": "2025-02-05T07:30:51.031707Z"}, {"uuid": "eed942e9-2494-4c1a-96c4-55ee9c670cd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "Telegram/zb-KRkiNlleccyENZlOi2OBey-zd7eJ-1xiV-zOd6w6XGgdk", "content": "", "creation_timestamp": "2025-03-08T04:34:09.000000Z"}, {"uuid": "c74517fc-f7db-4029-a87a-1d9635be9702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10151", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56161\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.\n\ud83d\udccf Published: 2025-02-03T17:24:01.185Z\n\ud83d\udccf Modified: 2025-04-02T22:03:14.707Z\n\ud83d\udd17 References:\n1. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html", "creation_timestamp": "2025-04-02T22:34:39.000000Z"}, {"uuid": "827e49c7-874b-4b93-9859-4b33a37cc944", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "Telegram/jSvf-h55rVPCdqGtlPkgVfhvzErUQ1uNd0ObSiTBy11kd9gr", "content": "", "creation_timestamp": "2025-03-08T04:34:11.000000Z"}, {"uuid": "ebe71e2b-2712-4b11-a992-0b89022a2ed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6653", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56161\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.\n\ud83d\udccf Published: 2025-02-03T17:24:01.185Z\n\ud83d\udccf Modified: 2025-03-06T06:03:37.556Z\n\ud83d\udd17 References:\n1. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html", "creation_timestamp": "2025-03-06T06:33:00.000000Z"}, {"uuid": "baca2d1d-5455-4ff0-8e6e-e09fd743b0c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://t.me/kasperskylab_ru/5886", "content": "\u0412 \u043d\u043e\u0432\u043e\u043c #kaspersky_securityweek:\n\n\ud83d\udfe2\u0412 \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u044b\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430\u0445 AMD EPYC \u0437\u0430\u043a\u0440\u044b\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-56161 \u0432 \u0445\u044d\u0448-\u0444\u0443\u043d\u043a\u0446\u0438\u0438, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0434\u043b\u044f \u0432\u0435\u0440\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u043c\u0438\u043a\u0440\u043e\u043a\u043e\u0434\u0430. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0438\u0439 \u043f\u0440\u0430\u0432\u0430 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435, \u043c\u043e\u0433 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.\n\n\ud83d\udfe2\u041d\u0430\u0448\u0438 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0438\u0437\u0443\u0447\u0438\u043b\u0438 \u00ab\u043d\u0438\u0433\u0435\u0440\u0438\u0439\u0441\u043a\u0438\u0439 \u0441\u043f\u0430\u043c\u00bb \u2014 \u0432\u0438\u0434 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u043c\u043e\u0448\u0435\u043d\u043d\u0438\u0447\u0435\u0441\u0442\u0432\u0430, \u043f\u0440\u0438 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0432\u044b\u0434\u0430\u044e\u0442 \u0441\u0435\u0431\u044f \u0437\u0430 \u0431\u043e\u0433\u0430\u0442\u044b\u0445 \u0431\u043b\u0430\u0433\u043e\u0434\u0435\u0442\u0435\u043b\u0435\u0439 \u0438 \u043e\u0431\u0435\u0449\u0430\u044e\u0442 \u0436\u0435\u0440\u0442\u0432\u0435 \u043d\u0435\u0441\u043c\u0435\u0442\u043d\u044b\u0435 \u0431\u043e\u0433\u0430\u0442\u0441\u0442\u0432\u0430.\n\n\ud83d\udfe2\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043d\u0430\u0448\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0432 App Store \u0441\u0442\u0438\u043b\u0435\u0440. \u041c\u043e\u0448\u0435\u043d\u043d\u0438\u043a\u0438 \u0432\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u043b\u0438 \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0434\u043b\u044f Android \u0438 iOS \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043c\u043e\u0434\u0443\u043b\u044c SparkCat, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043b \u0444\u0430\u0439\u043b\u044b \u0432 \u0433\u0430\u043b\u0435\u0440\u0435\u0435 \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u0439 \u0432 \u043f\u043e\u0438\u0441\u043a\u0430\u0445 \u0446\u0435\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0441\u0438\u0434-\u0444\u0440\u0430\u0437 \u0434\u043b\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u043a\u043e\u0448\u0435\u043b\u044c\u043a\u043e\u0432).", "creation_timestamp": "2025-02-11T11:49:06.000000Z"}, {"uuid": "e6c95dbf-ba86-4c3b-ab6b-8f2284a7204e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://t.me/cvedetector/17082", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56161 - AMD SEV-SNP Signature Verification Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56161 \nPublished : Feb. 3, 2025, 6:15 p.m. | 22\u00a0minutes ago \nDescription : Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T20:19:12.000000Z"}, {"uuid": "aa10438f-a503-4ecd-a9c6-a1837c79b695", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2692", "content": "#Hardware_Security\nZen and the Art of AMD Microcode Hacking (CVE-2024-56161)\nhttps://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking", "creation_timestamp": "2025-03-07T05:49:31.000000Z"}, {"uuid": "f29c4eac-dc63-405c-90c5-d7a6e526a643", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "published-proof-of-concept", "source": "Telegram/S-8_VyG5ivGi-5Ct7VRJbIC35U3Qzbj2HkX2d7v5VvEDkA", "content": "", "creation_timestamp": "2025-02-04T19:06:49.000000Z"}, {"uuid": "ac1b1f89-64d2-4cad-99e8-f57f5c71a837", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/7142", "content": "#Hardware_Security\nZen and the Art of AMD Microcode Hacking (CVE-2024-56161)\nhttps://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking", "creation_timestamp": "2025-03-07T05:49:30.000000Z"}, {"uuid": "438f1225-ac5d-4c18-8775-396f4269ea8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://t.me/true_secator/6820", "content": "\u041f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u043c \u0434\u0435\u043b\u0438\u0442\u044c\u0441\u044f \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0442\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u043c\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u043c\u0438 \u0441 \u043d\u0438\u043c\u0438 \u0443\u0433\u0440\u043e\u0437\u0430\u043c\u0438:\n\n1. Google \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0431\u00a0EntrySign, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043f\u043e\u0434\u043f\u0438\u0441\u0438 \u043c\u0438\u043a\u0440\u043e\u043a\u043e\u0434\u0430 AMD Zen (CVE-2024-56161), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0443.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 Zentool, \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0434\u043b\u044f \u0434\u0436\u0435\u0439\u043b\u0431\u0440\u0435\u0439\u043a\u0430 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 AMD.\n\n2. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Assetnote \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 Sitecore CMS, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0430\u0442\u0430\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430\u00a0- CVE-2025-27218.\n\n3. \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Jenkins \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0435 \u0447\u0435\u0442\u044b\u0440\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u044f\u0434\u0440\u0435 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b.\n\n4. Elastic \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f Kibana. \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0447\u0435\u0440\u0435\u0437 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u0443\u044e \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0443 \u0444\u0430\u0439\u043b\u0430 \u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u044b.\n\n5. \u0413\u0440\u0443\u043f\u043f\u0430 \u0443\u0447\u0435\u043d\u044b\u0445 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e \u043d\u043e\u0432\u043e\u043c \u0442\u0438\u043f\u0435 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0438\u043d\u0432\u0435\u0440\u0442\u043e\u0440\u044b \u043c\u043e\u0449\u043d\u043e\u0441\u0442\u0438, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u043d\u0430 \u0444\u043e\u0442\u043e\u044d\u043b\u0435\u043a\u0442\u0440\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0441\u0442\u0430\u043d\u0446\u0438\u044f\u0445.\n\n\u0410\u0442\u0430\u043a\u0430, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u00a0ReThink \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u0430 \u043d\u0430\u043d\u0435\u0441\u0442\u0438 \u0444\u0438\u0437\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0449\u0435\u0440\u0431 \u0438\u043d\u0432\u0435\u0440\u0442\u043e\u0440\u0430\u043c \u0438 \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0444\u043e\u0442\u043e\u044d\u043b\u0435\u043a\u0442\u0440\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c.\n\n6. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 SEC Consult \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u00ab\u0421\u043f\u044f\u0449\u0435\u0439 \u043a\u0440\u0430\u0441\u0430\u0432\u0438\u0446\u044b\u00bb, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u0440\u0438\u043e\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0440\u0430\u0431\u043e\u0442\u0443 \u0434\u0430\u0442\u0447\u0438\u043a\u0430 CrowdStrike Falcon.\n\nSEC Consult \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430 \u043e\u0431 \u044d\u0442\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0443 \u043f\u043e\u0441\u043b\u0435 \u0441\u043a\u043e\u043e\u0440\u0434\u0438\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043a\u043e\u043d\u0446\u0435 2023 \u0433\u043e\u0434\u0430, \u043d\u043e \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0437\u0430\u043a\u0440\u044b\u043b \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0431\u0435\u0437 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u043e\u0442\u0432\u0435\u0442\u0438\u0432, \u0447\u0442\u043e \u044d\u0442\u043e \u0432\u0441\u0435\u0433\u043e \u043b\u0438\u0448\u044c \u00ab\u043f\u0440\u043e\u0431\u0435\u043b \u0432 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0438\u00bb.\n\n\u0425\u043e\u0442\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0441\u0435 \u0436\u0435 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 2025 \u0433\u043e\u0434\u0443, \u0438 \u043d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0437\u0430\u043c\u0430\u043b\u0447\u0438\u0432\u0430\u043d\u0438\u0435 \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0430 SEC Consult \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e.\n\n7. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 SquareX \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043b\u0438 \u043f\u043e\u043b\u0438\u043c\u043e\u0440\u0444\u043d\u043e\u0435 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435 Chrome, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e \u0438\u043c\u0438\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043b\u044e\u0431\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u0435 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435.\n\n\u0422\u0430\u043a\u0438\u0435 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f \u0441\u043e\u0437\u0434\u0430\u044e\u0442 \u0442\u043e\u0447\u043d\u0443\u044e \u043a\u043e\u043f\u0438\u044e \u0437\u043d\u0430\u0447\u043a\u0430 \u0446\u0435\u043b\u0438, \u0432\u0441\u043f\u043b\u044b\u0432\u0430\u044e\u0449\u0435\u0433\u043e \u043e\u043a\u043d\u0430 HTML, \u0440\u0430\u0431\u043e\u0447\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0432 \u0438 \u0434\u0430\u0436\u0435 \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u043b\u0435\u0433\u0430\u043b\u044c\u043d\u043e\u0435  \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435, \u0447\u0442\u043e \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u0436\u0435\u0440\u0442\u0432 \u043f\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u0432 \u0442\u043e, \u0447\u0442\u043e \u043e\u043d\u0438 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0434\u043b\u044f \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0433\u043e \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f \u0441\u043e \u0432\u0441\u0435\u043c\u0438 \u0432\u044b\u0442\u0435\u043a\u0430\u044e\u0449\u0438\u043c\u0438.", "creation_timestamp": "2025-03-07T19:00:07.000000Z"}, {"uuid": "4439939b-3c10-497d-b34d-3079532d6d74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://t.me/true_secator/6703", "content": "\u041f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u043c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0442\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0432\u043a\u0440\u0430\u0442\u0446\u0435 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0432\u044b\u0433\u043b\u044f\u0434\u0438\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c.\n\n1. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Google \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430\u0445 AMD Zen.\n\nCVE-2024-56161 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430.\n\n\u0410\u0442\u0430\u043a\u0430 \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u0430 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0437\u0430\u0449\u0438\u0442\u0443 AMD Secure Encrypted Virtualization \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043e\u0431\u043b\u0430\u0447\u043d\u0443\u044e \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443.\n\n\u0421\u0440\u0435\u0434\u0438 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 - Zen 1 \u2014 Zen 4.\n\nAMD \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0432 \u043f\u043e\u043d\u0435\u0434\u0435\u043b\u044c\u043d\u0438\u043a.\n\n2. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 watchTowr Labs \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043e\u043a\u043e\u043b\u043e 150 AWS S3 buckets, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0440\u0430\u043d\u0435\u0435 \u043f\u0440\u0438\u043d\u0430\u0434\u043b\u0435\u0436\u0430\u043b\u0438 \u043d\u044b\u043d\u0435 \u043d\u0435\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c \u043a\u043e\u043c\u043c\u0435\u0440\u0447\u0435\u0441\u043a\u0438\u043c \u0438 open-source \u043f\u0440\u043e\u0435\u043a\u0442\u0430\u043c.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0441 \u043d\u0438\u0445 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u043b \u0438\u0434\u0442\u0438 \u0442\u0440\u0430\u0444\u0438\u043a, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0441 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0445 (\u0438 \u0434\u0430\u0436\u0435 \u0432\u043e\u0435\u043d\u043d\u044b\u0445) \u0434\u043e\u043c\u0435\u043d\u043e\u0432 \u0438 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u0438\u0437 \u0441\u043f\u0438\u0441\u043a\u0430 Fortune 500. \n\n\u0421\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u041f\u041e, \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044e \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0438 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b, \u043c\u043e\u0436\u043d\u043e \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0437\u0430\u0445\u0432\u0430\u0442\u0430 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439.\n\n3. \u0418\u043d\u0436\u0435\u043d\u0435\u0440 \u0420\u0430\u0439\u043a \u0428\u043d\u0430\u0439\u0434\u0435\u0440 \u0432\u044b\u044f\u0432\u0438\u043b \u0443\u044f\u0437\u0438\u043c\u043e\u0441\u0442\u0438, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u043e\u043c DLL \u0432 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u0445 Sysinternal \u043e\u0442 Microsoft.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f \u043d\u0435\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u043c\u0438 \u0434\u0430\u0436\u0435 \u043f\u043e\u0441\u043b\u0435 90-\u0434\u043d\u0435\u0432\u043d\u043e\u0433\u043e \u0441\u0440\u043e\u043a\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f.\n\n4. Netgear \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438\u00a0RCE\u00a0\u0432 WiFi-\u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445.\n\n5. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Aqua \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442\u00a0\u043e\u0431 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430\u0445 \u043e\u0431\u0445\u043e\u0434\u0430 \u043f\u043e\u043b\u0438\u0442\u0438\u043a \u0432 OPA Gatekeeper, \u0443\u0442\u0438\u043b\u0438\u0442\u0435 \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u0430\u043c\u0438 Kubernetes.\n\n6. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0412\u043b\u0430\u0434\u0438\u043c\u0438\u0440 \u041f\u0430\u043b\u0430\u043d\u0442 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b \u043d\u043e\u0432\u044b\u0439 \u043d\u0430\u0431\u043e\u0440 \u0438\u0437 10 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 Chrome \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435 \u0431\u044b\u043b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d \u043f\u0435\u0440\u0432\u044b\u0439 \u043d\u0430\u0431\u043e\u0440 \u0438\u0437 35.\n\n7. Veeam \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u041f\u041e \u0434\u043b\u044f \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Veeam Backup \u0434\u043b\u044f Salesforce, Nutanix AHV, AWS, Microsoft Azure, Google Cloud, Oracle Linux Virtualization Manager \u0438 Red Hat Virtualization.\n\nCVE-2025-23114 \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 9,0 \u0438\u0437 10,0 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c MiTM-\u0430\u0442\u0430\u043a\u0443  \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435-\u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 root.", "creation_timestamp": "2025-02-05T18:30:05.000000Z"}, {"uuid": "9ce08fd9-d17b-406c-ab82-ff7e278d8318", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://t.me/thehackernews/6279", "content": "\ud83d\udea8 A new flaw (CVE-2024-56161) in AMD SEV could allow attackers to load malicious CPU microcode on vulnerable systems.\n\nIt exploits improper signature verification, allowing attackers local admin access to tamper with microcode.\n\nRead more: https://thehackernews.com/2025/02/amd-sev-snp-vulnerability-allows.html", "creation_timestamp": "2025-02-04T10:00:58.000000Z"}, {"uuid": "dd3df92f-49ef-403e-8239-984dfeb820b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11895", "content": "#Hardware_Security\nZen and the Art of AMD Microcode Hacking (CVE-2024-56161)\nhttps://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking", "creation_timestamp": "2025-03-06T14:07:27.000000Z"}, {"uuid": "e192b829-dd71-443b-bb4b-c7fa80756c39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56161", "type": "published-proof-of-concept", "source": "https://t.me/cultofwire/1329", "content": "3 \u0444\u0435\u0432\u0440\u0430\u043b\u044f Google Security Team \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430\u0445 AMD Zen (Zen 1 - Zen4), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043f\u0430\u0442\u0447\u0438.\nPo\u0421 \u0438\u0437 \u0434\u0438\u0441\u043a\u043b\u043e\u0437\u0430.\n\n\u0417\u0430 \u0434\u0438\u0441\u043a\u043b\u043e\u0437\u043e\u043c \u0432\u044b\u0448\u043b\u0430 \u0441\u0442\u0430\u0442\u044c\u044f - Zen and the Art of Microcode Hacking, \u0441 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435\u043c \u043a\u0430\u043a \u0441\u0430\u043c\u043e\u0433\u043e \u043c\u0438\u043a\u0440\u043e\u043a\u043e\u0434\u0430, \u0442\u0430\u043a \u0438 \u043e\u0431\u0445\u043e\u0434\u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438.\n\u0410 \u0434\u043b\u044f \u043e\u0441\u043e\u0431\u043e \u043b\u044e\u0431\u043e\u043f\u044b\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445, \u0432 \u0440\u0435\u043f\u0435 Google Security Team \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0434\u043b\u044f \u0440\u0430\u0431\u043e\u0442\u044b \u0441 \u043c\u0438\u043a\u0440\u043e\u043a\u043e\u0434\u043e\u043c - zentool.\n\n\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e CVE:\nNIST: CVE-2024-56161\nAMD: AMD SEV Confidential Computing Vulnerability", "creation_timestamp": "2025-03-17T11:09:04.000000Z"}]}