Does your IT team track reported security threats, vulnerabilities, and patches as often as weekly? We do. In fact, our primeCLOUD customers receive notifications about the impact each week, along with an explanation of how our team is mitigating risk on their behalf. Review last week's summary to understand the potential impacts and interventions.
Effective Week Ending September 19, 2021
High Impact
Source |
Product(s) |
Type |
Microsoft |
NTLM Relay |
Mitigation advice for PetitPotam attacks |
AMD Ryzen |
Chipset Driver |
Patches for security vulnerabilities |
Medium Impact
Source |
Product(s) |
Type |
Intel |
Multiple |
Multiple security updates |
FBI |
n/a |
Indicators of compromise associated with Hive ransomware |
|
Chrome |
Security updates |
Microsoft |
Multiple |
Mitigation advice and workarounds for zero-day threat CVE-2021-40444 |
Low Impact
Source |
Product(s) |
Type |
ManageEngine |
ServiceDesk Plus |
Update for remote code execution (RCE) and server-side request forgery (SSRF) vulnerabilities |
Pulse Secure |
Secure Connect |
Security update
NOTE: Remediation depends entirely on third-party, sole-source software supplier (Verizon Enterprise Solutions) and new hardware deployment (est. mid-October) |
Microsoft |
Multiple |
Security updates (Aug 2021) |
Atlassian |
Confluence Server and Data Center |
Security updates |
Mozilla |
Firefox, Firefox ESR, and Thunderbird |
Security updates |
Microsoft |
Multiple |
Security updates (Sep 2021) |
No Impact
*Prime Care Tech team assessed and determined our clients are not impacted/using product
Source |
Product(s) |
Type |
WordPress |
WordPress |
Security update |
Fortinet |
FortiManager |
Patch for improper access control vulnerability |
Apple |
iOS and iPadOS 14.8 |
Security updates |
SAP |
Multiple |
Security updates (Sep 2021) |
Citrix |
ShareFile Storage Zones Controller |
Security update |
Drupal |
n/a |
Multiple security updates |
Microsoft |
Azure Linux Open Mgt Infrastructure |
Security update |
FBI-CISA-CGCYBER |
ManageEngine |
Advisory on advanced persistent threat (APT) exploitation of vulnerability |
The constantly increasing demands of securing your data against cyber criminals make it challenging to keep up. If you need help staying on top of your game, get in touch.
Perhaps someone from your organization could also benefit from these security alerts?