Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. There's serious panic being caused by AI discovered vulnerabilities behind the scenes, where those finding them are basically using them as marketing.

There's serious panic being caused by AI discovered vulnerabilities behind the scenes, where those finding them are basically using them as marketing.

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
27 Indlæg 19 Posters 63 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

    CVE-2026-34486 - Tomcat

    - Only exploitable if a certain feature is used, if its endpoint is reachable and if port 4000 is available. It's pretty niche.

    gossithedog@cyberplace.socialG This user is from outside of this forum
    gossithedog@cyberplace.socialG This user is from outside of this forum
    gossithedog@cyberplace.social
    wrote sidst redigeret af
    #4

    CVE-2026-42945 - Nginx (otherwise branded Nginx Rift)

    It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it. To reach RCE, also ASLR needs to have been disabled on the box.

    The PoC they've built specifically disabled ASLR, deploys a specifically vulnerable config and the exploit knows about the vulnerable config endpoint.

    wdormann@infosec.exchangeW gossithedog@cyberplace.socialG huronbikes@cyberplace.socialH epd5qrxx@mastodon.onlineE databeestje@noc.socialD 7 Replies Last reply
    0
    • misusecase@twit.socialM misusecase@twit.social

      @GossiTheDog I really want to hear your take on this because I’ve heard conflicting things about whether any of the vulnerabilities are serious or not.

      0xtero@ohai.social0 This user is from outside of this forum
      0xtero@ohai.social0 This user is from outside of this forum
      0xtero@ohai.social
      wrote sidst redigeret af
      #5

      @MisuseCase @GossiTheDog most of the stuff is just pure marketing fluff. Sure, AI is finding bugs. People are fixing them. This has been the case for a while now. Nothing new. Exploitable bugs still very rare. Catastrophic ones like Heartbleed nil, so far. It’s business as usual. The noise volume is up, quality of the signal seems about same as always.

      misusecase@twit.socialM 1 Reply Last reply
      0
      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

        CVE-2026-34486 - Tomcat

        - Only exploitable if a certain feature is used, if its endpoint is reachable and if port 4000 is available. It's pretty niche.

        mikesiegel@infosec.exchangeM This user is from outside of this forum
        mikesiegel@infosec.exchangeM This user is from outside of this forum
        mikesiegel@infosec.exchange
        wrote sidst redigeret af
        #6

        @GossiTheDog while they can certainly find some fun things, a number of the "vulns" are ridiculous "Oh this can be an RCE during full moons with ASLR disabled running on TRSDOS ported to ARM."

        The models don't really threat model well at all. I like @bagder 's approach of VULN-DISCLOSURE-POLICY.md

        1 Reply Last reply
        0
        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

          CVE-2026-42945 - Nginx (otherwise branded Nginx Rift)

          It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it. To reach RCE, also ASLR needs to have been disabled on the box.

          The PoC they've built specifically disabled ASLR, deploys a specifically vulnerable config and the exploit knows about the vulnerable config endpoint.

          wdormann@infosec.exchangeW This user is from outside of this forum
          wdormann@infosec.exchangeW This user is from outside of this forum
          wdormann@infosec.exchange
          wrote sidst redigeret af
          #7

          @GossiTheDog
          (except fewer)

          nosirrahsec@infosec.exchangeN 1 Reply Last reply
          0
          • 0xtero@ohai.social0 0xtero@ohai.social

            @MisuseCase @GossiTheDog most of the stuff is just pure marketing fluff. Sure, AI is finding bugs. People are fixing them. This has been the case for a while now. Nothing new. Exploitable bugs still very rare. Catastrophic ones like Heartbleed nil, so far. It’s business as usual. The noise volume is up, quality of the signal seems about same as always.

            misusecase@twit.socialM This user is from outside of this forum
            misusecase@twit.socialM This user is from outside of this forum
            misusecase@twit.social
            wrote sidst redigeret af
            #8

            @0xtero @GossiTheDog Meanwhile

            1. AI coding agents are one of the factors contributing to shorter intervals between “vulnerability discovery” and “working exploit”

            2. Orgs can’t be bothered to patch known vulnerabilities in a timely fashion so a huge proportion of cyberattacks and their associated damage are down to bugs that have been known about (and left unpatched) for half a year or more

            0xtero@ohai.social0 1 Reply Last reply
            0
            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

              There's serious panic being caused by AI discovered vulnerabilities behind the scenes, where those finding them are basically using them as marketing. Automated vulnerability hype train again, basically.

              A thread on a few of them.

              robinsyl@meow.socialR This user is from outside of this forum
              robinsyl@meow.socialR This user is from outside of this forum
              robinsyl@meow.social
              wrote sidst redigeret af
              #9

              @GossiTheDog I already feel so "boy who cried wolf"ed about all the vulns

              1 Reply Last reply
              0
              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                CVE-2026-42945 - Nginx (otherwise branded Nginx Rift)

                It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it. To reach RCE, also ASLR needs to have been disabled on the box.

                The PoC they've built specifically disabled ASLR, deploys a specifically vulnerable config and the exploit knows about the vulnerable config endpoint.

                gossithedog@cyberplace.socialG This user is from outside of this forum
                gossithedog@cyberplace.socialG This user is from outside of this forum
                gossithedog@cyberplace.social
                wrote sidst redigeret af
                #10

                I will likely be one of the first people banging the drum to patch and mitigate if any of the recent AI vulns results in serious harm. Otherwise, keep calm and carry on patching as usual.

                nyanbinary@infosec.exchangeN F draeath@infosec.exchangeD starlily@mastodon.socialS gossithedog@cyberplace.socialG 5 Replies Last reply
                0
                • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                  There's serious panic being caused by AI discovered vulnerabilities behind the scenes, where those finding them are basically using them as marketing. Automated vulnerability hype train again, basically.

                  A thread on a few of them.

                  womble@infosec.exchangeW This user is from outside of this forum
                  womble@infosec.exchangeW This user is from outside of this forum
                  womble@infosec.exchange
                  wrote sidst redigeret af
                  #11

                  @GossiTheDog I'd be willing to bet that if they paid real humans the same amount of money as the true cost of running the LLM, they'd find more and better bugs.

                  1 Reply Last reply
                  0
                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                    I will likely be one of the first people banging the drum to patch and mitigate if any of the recent AI vulns results in serious harm. Otherwise, keep calm and carry on patching as usual.

                    nyanbinary@infosec.exchangeN This user is from outside of this forum
                    nyanbinary@infosec.exchangeN This user is from outside of this forum
                    nyanbinary@infosec.exchange
                    wrote sidst redigeret af
                    #12

                    @GossiTheDog but but but, how else am I supposed to market magic box triage-as-a-service

                    1 Reply Last reply
                    0
                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                      I will likely be one of the first people banging the drum to patch and mitigate if any of the recent AI vulns results in serious harm. Otherwise, keep calm and carry on patching as usual.

                      F This user is from outside of this forum
                      F This user is from outside of this forum
                      fatalisticcritic@cyberplace.social
                      wrote sidst redigeret af
                      #13

                      @GossiTheDog and that's why I'm here. Thanx for keeping us calm.

                      1 Reply Last reply
                      0
                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                        I will likely be one of the first people banging the drum to patch and mitigate if any of the recent AI vulns results in serious harm. Otherwise, keep calm and carry on patching as usual.

                        draeath@infosec.exchangeD This user is from outside of this forum
                        draeath@infosec.exchangeD This user is from outside of this forum
                        draeath@infosec.exchange
                        wrote sidst redigeret af
                        #14

                        @GossiTheDog ... also never turn off ASLR! Why would someone do that nowadays!?

                        1 Reply Last reply
                        0
                        • misusecase@twit.socialM misusecase@twit.social

                          @0xtero @GossiTheDog Meanwhile

                          1. AI coding agents are one of the factors contributing to shorter intervals between “vulnerability discovery” and “working exploit”

                          2. Orgs can’t be bothered to patch known vulnerabilities in a timely fashion so a huge proportion of cyberattacks and their associated damage are down to bugs that have been known about (and left unpatched) for half a year or more

                          0xtero@ohai.social0 This user is from outside of this forum
                          0xtero@ohai.social0 This user is from outside of this forum
                          0xtero@ohai.social
                          wrote sidst redigeret af
                          #15

                          @MisuseCase @GossiTheDog For sure. But the "from vuln to exploitation" trend has been clear downward slope for years now. (https://zerodayclock.com/). We're seeing a high volume of vulns and bugs, but I feel lot of it ends up being low, medium severity, because it's hard to exploit in real conditions. Fixing these vulns is good - but the marketing messages don't quite map to reality I feel (when do they ever..)

                          misusecase@twit.socialM 1 Reply Last reply
                          0
                          • wdormann@infosec.exchangeW wdormann@infosec.exchange

                            @GossiTheDog
                            (except fewer)

                            nosirrahsec@infosec.exchangeN This user is from outside of this forum
                            nosirrahsec@infosec.exchangeN This user is from outside of this forum
                            nosirrahsec@infosec.exchange
                            wrote sidst redigeret af
                            #16

                            @wdormann @GossiTheDog
                            I love this show and that scene so much lol

                            1 Reply Last reply
                            0
                            • 0xtero@ohai.social0 0xtero@ohai.social

                              @MisuseCase @GossiTheDog For sure. But the "from vuln to exploitation" trend has been clear downward slope for years now. (https://zerodayclock.com/). We're seeing a high volume of vulns and bugs, but I feel lot of it ends up being low, medium severity, because it's hard to exploit in real conditions. Fixing these vulns is good - but the marketing messages don't quite map to reality I feel (when do they ever..)

                              misusecase@twit.socialM This user is from outside of this forum
                              misusecase@twit.socialM This user is from outside of this forum
                              misusecase@twit.social
                              wrote sidst redigeret af
                              #17

                              @0xtero @GossiTheDog I know about the zero day clock and part of the reason it looks like that is that people who have some idea what they’re doing (not script kiddies, though that may change) can use AI coding agents to develop exploits faster than they would otherwise.

                              So that part is real, or uncomfortably close to it.

                              1 Reply Last reply
                              0
                              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                CVE-2026-42945 - Nginx (otherwise branded Nginx Rift)

                                It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it. To reach RCE, also ASLR needs to have been disabled on the box.

                                The PoC they've built specifically disabled ASLR, deploys a specifically vulnerable config and the exploit knows about the vulnerable config endpoint.

                                huronbikes@cyberplace.socialH This user is from outside of this forum
                                huronbikes@cyberplace.socialH This user is from outside of this forum
                                huronbikes@cyberplace.social
                                wrote sidst redigeret af
                                #18

                                @GossiTheDog this particular defect-leading-to-vulnerability according to F5 can be mitigated by using named parameters instead of numbered in the rewrite regex replace expressions.

                                I don't think the conditions that expose the issue are too terribly unusual as this is the sort of thing that would be done if one wanted to, say, wrap an older HTTP API with semantics that use path parameters.

                                The defect also impacts the NginX Kubernetes Ingress Controller.

                                1 Reply Last reply
                                0
                                • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                  CVE-2026-42945 - Nginx (otherwise branded Nginx Rift)

                                  It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it. To reach RCE, also ASLR needs to have been disabled on the box.

                                  The PoC they've built specifically disabled ASLR, deploys a specifically vulnerable config and the exploit knows about the vulnerable config endpoint.

                                  epd5qrxx@mastodon.onlineE This user is from outside of this forum
                                  epd5qrxx@mastodon.onlineE This user is from outside of this forum
                                  epd5qrxx@mastodon.online
                                  wrote sidst redigeret af
                                  #19

                                  @GossiTheDog

                                  > Theoretically, we could leverage this design to leak ASLR by progressively overwriting pointers byte by byte. In this post, we discuss the exploitation technique assuming ASLR has already been bypassed.

                                  Based on that ASLR is "just" a nuisance and not an actual show stopper 🤔

                                  https://depthfirst.com/research/nginx-rift-achieving-nginx-rce-via-an-18-year-old-vulnerability

                                  gossithedog@cyberplace.socialG 1 Reply Last reply
                                  0
                                  • epd5qrxx@mastodon.onlineE epd5qrxx@mastodon.online

                                    @GossiTheDog

                                    > Theoretically, we could leverage this design to leak ASLR by progressively overwriting pointers byte by byte. In this post, we discuss the exploitation technique assuming ASLR has already been bypassed.

                                    Based on that ASLR is "just" a nuisance and not an actual show stopper 🤔

                                    https://depthfirst.com/research/nginx-rift-achieving-nginx-rce-via-an-18-year-old-vulnerability

                                    gossithedog@cyberplace.socialG This user is from outside of this forum
                                    gossithedog@cyberplace.socialG This user is from outside of this forum
                                    gossithedog@cyberplace.social
                                    wrote sidst redigeret af
                                    #20

                                    @ePD5qRxX prove it 🤣

                                    1 Reply Last reply
                                    0
                                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                      CVE-2026-42945 - Nginx (otherwise branded Nginx Rift)

                                      It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it. To reach RCE, also ASLR needs to have been disabled on the box.

                                      The PoC they've built specifically disabled ASLR, deploys a specifically vulnerable config and the exploit knows about the vulnerable config endpoint.

                                      databeestje@noc.socialD This user is from outside of this forum
                                      databeestje@noc.socialD This user is from outside of this forum
                                      databeestje@noc.social
                                      wrote sidst redigeret af
                                      #21

                                      @GossiTheDog could this one be related to the Palo Alto captive portal authentication ?

                                      1 Reply Last reply
                                      0
                                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                        CVE-2026-42945 - Nginx (otherwise branded Nginx Rift)

                                        It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it. To reach RCE, also ASLR needs to have been disabled on the box.

                                        The PoC they've built specifically disabled ASLR, deploys a specifically vulnerable config and the exploit knows about the vulnerable config endpoint.

                                        phnt@fluffytail.orgP This user is from outside of this forum
                                        phnt@fluffytail.orgP This user is from outside of this forum
                                        phnt@fluffytail.org
                                        wrote sidst redigeret af
                                        #22
                                        @GossiTheDog
                                        >It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it.
                                        You can just scan the whole Internet with this. The attacker doesn't need to know the configuration.

                                        >The PoC they've built specifically disabled ASLR
                                        Doesn't really matter either. Randomization so far always was just another fence to jump over. It makes exploitation harder, not impossible.
                                        1 Reply Last reply
                                        0
                                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                          I will likely be one of the first people banging the drum to patch and mitigate if any of the recent AI vulns results in serious harm. Otherwise, keep calm and carry on patching as usual.

                                          starlily@mastodon.socialS This user is from outside of this forum
                                          starlily@mastodon.socialS This user is from outside of this forum
                                          starlily@mastodon.social
                                          wrote sidst redigeret af
                                          #23

                                          @GossiTheDog Copy Fail and Dirty Frag are pretty serious.

                                          1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper