Summary
Sophos has released an update to mitigate three vulnerabilities in the Sophos Web Appliance (SWA). The most important of these three flaws is rated as critical and if exploited could lead to the execution of arbitrary code.
Threat Type
Vulnerability
Overview
**Update 04/25/2023**
According to multiple sources, now that the patch for this vulnerability has been reverse engineered, functional Proof of Concept (POC) exploit code has been released. The POC code is available now to the public on Github
On Friday, April 21, 2023, CISA added CVE-2023-27350 (a critical unauthenticated remote code execution vulnerability) impacting PaperCut MF and PaperCut NG to the Known Exploited Vulnerabilities (KEV) list. PaperCut MF and PaperCut NG are both enterprise printer management software.
GreyNoise, in conjunction with TrinityCyber, has observed active exploitation attempts using weaknesses found in CVE-2023-1389 against TP-Link Archer gigabit routers. This post provides information about a new GreyNoise tag for this activity as well as details on the exploit attempt and how organizations can keep themselves safe from harm.
GreyNoise is changing how we classify environment file crawlers from unknown intent to malicious intent. This change will result in the reclassification of over 11,000 IPs as malicious. Users who use GreyNoise’s malicious tag to block IPs based on malicious intent will see an increase in blocked IPs.