Cisco Talos’ Vulnerability Discovery & Research team has disclosed a total of twelve security vulnerabilities affecting three distinct software products.
Seven vulnerabilities impact WWBN AVideo, four reside within the MedDream PACS Premium system, and one exists in the Eclipse ThreadX FileX module.
All issues have been addressed by their respective vendors in accordance with Cisco third-party vulnerability disclosure policy.
WWBN AVideo, a feature-rich video streaming platform offering hosting, management and monetization services, was found vulnerable across multiple components in version 14.4 and its development master (commit 8a8954ff). Talos researcher Claudio Bozzato uncovered:
All seven issues have been patched by the WWBN development team. Users are urged to upgrade to the latest release and review custom .htaccess configurations to ensure proper filtering of archive file types.
MedDream PACS Premium, a DICOM-compliant picture archiving and communication system widely deployed in medical imaging environments, was found to harbor four critical vulnerabilities. Researchers Emmanuel Tacheau and Marcin Noga reported:
All four MedDream vulnerabilities have been resolved in the latest 7.3.5.861 update. Administrators are advised to apply patches immediately, restrict file upload paths, and implement robust input validation and allow-listing for URLs.
In the realm of embedded real-time operating systems, Talos researcher Kelly Patterson discovered a critical vulnerability in the FileX RAM disk driver of Eclipse ThreadX (git commit 1b85eb2).
All disclosed vulnerabilities conform to Cisco’s third-party vulnerability disclosure policy and have corresponding advisory entries on the Talos Intelligence website.
The vulnerability, tracked as TALOS-2024-2088, stems from an integer underflow during buffer size calculations. An attacker capable of sending a specific sequence of network packets can trigger a buffer overflow, leading to arbitrary code execution in the context of the RTOS.
This vulnerability poses a significant risk for resource-constrained IoT and industrial devices that integrate ThreadX FileX.
Device vendors have since released updated driver versions incorporating bounds checks to neutralize underflow conditions. System integrators should review firmware versions and apply the patched FileX driver to all affected products.
Administrators can download Snort rule sets from Snort.org to detect exploitation attempts for these vulnerabilities.
Immediate patching, coupled with rigorous input validation, principle of least privilege, and network segmentation, will mitigate the risk of successful attacks.
Continuous monitoring of vulnerability advisories remains essential to safeguard critical infrastructure and services.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…