বাংলাদেশের সাইবার স্পেসের সুরক্ষা নিশ্চিত করার লক্ষ্যে বাংলাদেশ সরকারের কম্পিউটার ইনসিডেন্ট রেসপন্স টিম (BGD e-GOV CIRT) সক্রিয়ভাবে গুরুত্বপূর্ণ থ্রেট ইনটেলিজেন্স সংক্রান্ত তথ্যাদি প্রকাশ করে থাকে। এরই ধারাবাহিকতায় সার্ট সাম্প্রতিককালে তথ্য পরিকাঠামোর জন্য ঝুঁকিপূর্ণ কিছু দুর্বলতা (critical vulnerabilities) চিহ্নিত করেছে। এরূপ ঝুঁকিপূর্ণ দুর্বলতাসমূহ ডিজিটাল অবকাঠামো হতে দূরিকরণের মাধ্যমে সম্ভাব্য সাইবার আক্রমন প্রতিহত করা যেতে পারে। Click here to see full details in pdf
The Cyber Threat Intelligence Unit of BGD e-GOV CIRT warns about the ongoing exploitation of two zero-day vulnerabilities in Cisco’s IOS XE Software web UI feature. BGD e-GOV CIRT has recently identified successful exploitation attempts against organizations in Bangladesh. This advisory is directed towards IT teams configuring and managing routers and network switches within their organizations. Download the attachment here
DESCRIPTION:Multiple vulnerabilities have been discovered in Apple Products, themost severe of which could allow for arbitrary code execution. * iCloud for Windows is a cloud storage and cloud computing service.* Xcode is an integrated development environment (IDE) for macOS.* Safari is a graphical web browser developed by Apple, based on theWebKit engine.* macOS Big Sur is the 17th and current major release of macOS.* macOS...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...
Read More
DESCRIPTION:Multiple vulnerabilities in SonicWall Email Security (ES) could allowfor arbitrary code execution. Successful exploitation of thesevulnerabilities could allow for arbitrary code execution. SonicWallEmail Security (ES) is an email security solution that providescomprehensive inbound and outbound protection, and defends againstadvanced email-borne threats such as ransomware, zero-day threats, spearphishing and business email compromise (BEC). The solution can bedeployed as a physical appliance, virtual appliance, softwareinstallation, or a...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Mozilla Firefox/FirefoxESR/Thunderbird, the most severe of which could allow for arbitrary codeexecution. Mozilla Firefox is a web browser that is used to access theInternet. Mozilla Firefox ESR is a version of the web browser intendedto be deployed in large organizations. Mozilla Thunderbird is an emailclient. Successful exploitation of these vulnerabilities could allow forarbitrary code execution. Depending on the privileges...
Read More
DESCRIPTION:A vulnerability has been discovered in Pulse Connect Secure VPN thatcould allow for remote code execution. Pulse Connect Secure VPN providesTLS and mobile VPN solutions. Successful exploitation of thisvulnerability could allow for remote code execution. Depending on theprivileges associated with the application, an attacker could theninstall programs; view, change, or delete data; or create new accountswith full user rights. Applications that are configured to have...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Microsoft products, themost severe of which could allow for arbitrary code execution in thecontext of the logged on user. Depending on the privileges associatedwith the user, an attacker could then install programs; view, change, ordelete data; or create new accounts with full user rights. Users whoseaccounts are configured to have fewer user rights on the system could beless impacted...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in ArubaNetwork’s ArubaOSand SD-WAN, which could result in arbitrary code execution. Aruba (aHewlett Packard Enterprise company) is the worldwide second-largestenterprise WLAN vendor after Cisco. ArubaOS is its WLAN controllersystem for automating WLAN management, and SD-WAN (software defined WAN)is its cloud-oriented WAN orchestration system. Successful exploitationof these vulnerabilities could allow an attacker to execute arbitrarycode in context of the user running...
Read More