Forescout Technologies has identified 14 vulnerabilities, including two critical flaws, in DrayTek routers used by businesses and residential users. The vulnerabilities could allow attackers to compromise the devices and gain complete control, potentially affecting over 700,000 devices in 168 countries. Two of the vulnerabilities have been rated as critical, while nine are rated as high severity and three as medium severity. DrayTek has released patches for the vulnerabilities, but security teams are urged to update their routers as soon as possible to mitigate the risks. This incident highlights the importance of keeping network equipment up-to-date and patching vulnerabilities promptly. Exploitation of these vulnerabilities could lead to data breaches, denial of service attacks, and disruption of network operations.
Multiple vulnerabilities have been discovered in the Common Unix Printing System (CUPS), a core printing component for many Unix-like operating systems. These vulnerabilities, tracked as CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, could allow attackers to execute arbitrary commands on vulnerable systems, potentially leading to security breaches and data theft. The vulnerabilities stem from flaws in the handling of Internet Printing Protocol (IPP) requests, improper validation of IPP attributes, and inadequate sanitization of temporary files. Systems running CUPS, particularly those with the cups-browsed service exposed to the internet, are at risk. The impact of these vulnerabilities is considered major, as they allow for remote code execution, potentially leading to significant security compromises.
A critical vulnerability discovered in Apache Kafka, a widely used open-source streaming platform, allows attackers to execute arbitrary code remotely. This vulnerability, tracked as CVE-2024-2016, affects all versions of Apache Kafka prior to 3.4.0. Attackers could exploit this flaw by sending specially crafted messages to Kafka brokers, potentially gaining complete control over the compromised server. The severity of this vulnerability is considered high, as it could allow attackers to compromise sensitive data, disrupt operations, or launch further attacks. Organizations using Apache Kafka should prioritize patching their systems to mitigate this risk.