![]() ![]() Still, Thunderbird users are advised to update to the latest version available to mitigate the risk of exploitation.įeel free to access the International Institute of Cyber Security (IICS) websites to learn more about information security risks, malware variants, vulnerabilities, and information technologies. The vulnerability received a CVSS score of 4.6/10, as it’s considered a medium severity issue.Īlthough these flaws can be exploited by remote, unauthenticated threat actors, no active exploit attempts or exploits have been detected for the attack. The vulnerability received a CVSS score of 7.7/10, as it’s considered a high-severity issue.ĬVE-2022-31742: An issue while handling a large number of allowCredential entries can allow remote malicious hackers to detect the difference between invalid key handles and cross-origin key handles using a specially crafted webpage.ĬVE-2022-31747: A boundary error when processing HTML content would allow malicious hackers to create a specially crafted website and perform memory corruption and arbitrary code execution attacks.ĬVE-2022-1834: The incorrect processing of multiple Braille Pattern Blank space characters would result in displaying every space character, allowing threat actors to spoof senders’ email addresses. Home Thunderbird Privacy and security settings Privacy and security settings Keep your information safe with password and security settings All articles and threads Passwords, forms and search Remote Content in Messages This page explains the privacy implications of allowing remote content like images to be displayed in email messages. This is a high-severity flaw and received a CVSS score of 7.7/10.ĬVE-2022-31741: A boundary error when processing HTML content would allow remote attackers to create a specially crafted webpage and run arbitrary code on the victim’s system. This is a medium-severity flaw and received a CVSS score of 5.7/10.ĬVE-2022-31740: A boundary error related to register allocation problem in WASM on arm64 allows remote threat actors to run arbitrary code on the target system using a specially crafted website. The vulnerability received a CVSS score of 4.7/10, as it’s considered a medium severity issue.ĬVE-2022-31739: An input validation error when saving downloaded files on Windows would allow remote attackers to use the “%” character in filename to store data outside the originally intended directory. These minimum viable secure configuration baselines are part of CISA’s Secure Cloud Business Applications (SCuBA) project.įor additional information and guidance, CISA and the FBI encourage network defenders to take the measures listed in this CSA to reduce the likelihood of similar activity and posture for detection.CVE-2022-31738: An error when exiting fullscreen mode may allow remote hackers to use an iframe and confuse the browser about its current screen state, thus allowing spoofing attacks. Note: See CISA’s Microsoft Exchange Online Microsoft 365 Minimum Viable Secure Configuration Baselines. Archivarius searches Internet newsgroups Netscape and Thunderbird mail Lotus Notes databases. 1) Installing the S/MIME certificate in the personal certificate store 2) Importing the S/MIME certificate to Mozilla Thunderbird profile 3) Signing and. ![]() ![]() For mitigations that are classified as preventative measures (e.g., steps to take to reduce the risk of network categorized exposure), CISA and FBI strongly encourage that FCEB agencies and critical infrastructure organizations ensure Audit Logging is enabled. Eudora and Mozilla mail, and off-line Exchange messages. Organizations that identify suspicious, anomalous activity should contact Microsoft for proceeding with mitigation actions due to the cloud-based infrastructure affected, as well as report to CISA and the FBI. The goal of this CSA is to enhance organizational cybersecurity posture and position organizations to detect similar malicious activity via implementing the listed logging recommendations. After reporting the incident to Microsoft, network defenders deemed the activity malicious. In June 2023, a Federal Civilian Executive Branch (FCEB) agency observed unexpected events in Microsoft 365 (M365) audit logs. The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have released a joint Cybersecurity Advisory (CSA), Enhanced Monitoring to Detect APT Activity Targeting Outlook Online, to provide guidance to agencies and critical infrastructure organizations on enhancing monitoring in Microsoft Exchange Online environments. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |