Vulnerability Reports

WebEx Remote Code Execution Vulnerability

A vulnerability has been discovered and patched in various versions of Cisco WebEx that allows an unauthenticated remote user to execute arbitrary code on a targeted system.

Cisco IOS XE Vulnerabilities (CVE-2018-0150, CVE-2018-0151, CVE-2018-171)

Three critical vulnerabilities in Cisco IOS XE can cause denial of service, unauthorized access, and remote code execution. Both GDT and Cisco’s Talos Intelligence Group have seen these vulnerabilities being exploited in the wild. Cisco’s Smart Install is a configuration management feature that provides zero-touch deployment for new switches. Smart Install features no authentication by…

Windows 7 Total Meltdown Vulnerability

In January, Intel and AMD released patches for severe processor level vulnerabilities that revealed flaws in chip architecture for the last 20 years. The vulnerabilities lie in the speculative processing and kernel page table isolation libraries, and allow an attacker to access privileged memory in a read-only mode. In the January and Februaru Patch Tuesday…

Remote Code Execution Through MS-RDP via CredSSP (CVE-2018-0886)

A logic vulnerability exists in the Credential Security Support Provider protocol that allows attackers using a man-in-the-middle attack to run arbitrary code on remote servers. The vulnerability is a logic flaw that affects all versions of Windows to date.

Shurl0cker Ransomware

A new ransomware is making its way across the internet. Ransom.Shurl0cker is an executable wrapped as a word or PDF document that encrypts certain filetypes on an affected device and demands a ransom. If you’ve been hit with ransomware or some other cyber attack, contact your GDT Account Manager to see what GDT’s SOC and…

Reverse Engineering Cryptocurrency Miner using Heaven’s Gate Injection

Cryptocurrency Miners are the new trend for malware in 2018. While they aren’t as harmful as ransomware or RATs, they cause major performance headaches for administrators. Often times, miners are usually built using the same open-source technologies but occasionally there is one that uses a new or interesting technique. This specific malware uses a 64-bit…

Signup for Vulnerability Reports