Cisco Talos has uncovered a flaw in the shader functionality of the NVIDIA D3D10 driver, which is used alongside NVIDIA graphics cards. If an attacker provides a specifically constructed shader packer, the driver is susceptible to memory corruption, which might give rise to a memory corruption problem. The severity rating for the flaw tracked as CVE-2022-34671 is 8.5 out of 10. An attacker might use the vulnerability to accomplish a guest-to-host escape from guest computers running virtualization frameworks (like VMware, QEMU, and VirtualBox). According to Talos' study, these vulnerability might potentially be exploited via a web browser employing WebGL and WebAssembly. Our investigation team used the RemoteFX functionality to trigger the flaw from a HYPER-V guest, resulting in the execution of susceptible code on the HYPER-V host (within the rdvgm.exe process). Microsoft has discontinued RemoteFX lately; however, older workstations may still use it. Moreover, Talos collaborated with NVIDIA to patch these vulnerability and make an update accessible to impacted users, all in accordance with Cisco’s vulnerability reporting policy.
The U.S. Cybersecurity and Infrastructure Security Agency warned about a critical vulnerability in Motex Lanscope Endpoint Manager that is currently being exploited in active attac...
Cybersecurity firm Sansec has issued an urgent warning about an active exploitation campaign targeting a newly exposed flaw in Adobe Commerce and Magento Open-Source platforms. The...
The state-backed Iranian hacker group MuddyWater has targeted over 100 government organizations using version 4 of the Phoenix backdoor in their attacks. Also known as Static Kitte...