Researchers have discovered CVE-2024-45488, a critical vulnerability in One Identity’s Safeguard for Privileged Passwords that allows for authentication bypass. This flaw could allow attackers to gain full administrative control of the virtual appliance. Once an attacker authenticates with an administrative session, they can perform actions such as reconfiguring appliance settings, modifying policies to extract passwords, and downloading and decrypting backups if the default backup encryption setting is used, which involves a hard-coded RSA key. AmberWolf researchers have demonstrated the exploit in action and provided an easy-to-understand write-up, along with a video demo. The vulnerability, known as "Skeleton Cookie," is caused by the use of a hard-coded cryptographic key in SPP virtual appliance images. This key can be exploited to forge session cookies, enabling attackers to bypass authentication. One Identity confirmed that only virtual appliance deployments on VMware or HyperV are affected, while physical appliances and those hosted on Azure, AWS, OCI, or other supported cloud platforms are not impacted. Users are advised to update to Safeguard for Privileged Passwords versions 7.0.5.1 LTS, 7.4.2, or 7.5.2, which include the patch. AmberWolf has also released a script to help users determine if their instances are vulnerable to this exploit.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...