Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Critical Code Execution Vulnerability Fixed In Adobe ColdFusion

Critical Code Execution Vulnerability Fixed In Adobe ColdFusion

Adobe has released out-of-band security updates to address a critical vulnerability impacting ColdFusion versions 2021, 2016, and 2018.

Today’s emergency updates patch an arbitrary code execution security flaw caused by an Improper Input Validation software vulnerability.

Adobe released ColdFusion 2016 Update 17, ColdFusion 2018 Update 11, and ColdFusion 2021 Update 1 to patch the vulnerability and said that all previous versions before these patches are vulnerable to attacks.

Updates to latest JDK also required to secure servers

In the security bulletin published today, Adobe tagged the vulnerability tracked as CVE-2021-21087 with “priority rating 2,” assigned to flaws with no known exploits affecting products that have historically been at elevated risk.

Adobe recommends administrators install the security updates as soon as possible and apply the security configuration settings outlined in the ColdFusion 2021ColdFusion 2018, and ColdFusion 2016 lockdown guides. 

“Adobe recommends updating your ColdFusion JDK/JRE to the latest version of the LTS releases for 1.8 and JDK 11,” the company also said.

“Applying the ColdFusion update without a corresponding JDK update will NOT secure the server.”

Also Read: Practitioner Certificate In Personal Data Protection: Everything You Need To Know

More details on how to apply these updates are available in the relevant Tech Notes linked in the table embedded below. 

ProductVulnerable versionsUpdated versionPlatformAvailability
ColdFusion 2016Update 16 and earlier versionUpdate 17AllTech note
ColdFusion 2018Update 10 and earlier versions    Update 11AllTech note
ColdFusion 2021Version 2021.0.0.323925Update 1AllTech note

The US National Security Agency (NSA) has listed CVE-2018-4939 (an Adobe ColdFusion 14 bug) as one of the top 25 vulnerabilities used by Chinese state-sponsored or financially-motivated hackers to exploit public-facing servers.

For instance, in November 2018, China-backed hackers took over ColdFusion servers by deploying China Chopper backdoors after exploiting a bug tracked as CVE-2018-15961 and patched two months before.

Chinese-speaking cybercrime group Rocke was also observed earlier that year while dropping cryptomining malware on Internet-exposed by exploiting Adobe ColdFusion servers unpatched against similar bugs.

Also Read: The DNC Singapore: Looking At 2 Sides Better

Another ColdFusion vulnerability, CVE-2018-15961, was included by the NSA a the list of most exploited bugs for deploying web shells on vulnerable servers.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us