Newsflash - Nangia & Co LLP https://nangia.com Wed, 20 Aug 2025 09:09:16 +0000 en-US hourly 1 https://wordpress.org/?v=6.9 https://nangia.com/wp-content/uploads/2024/08/NANGIA-CO-LLP-150x22.png Newsflash - Nangia & Co LLP https://nangia.com 32 32 Unmasking CVE-2024- 6387: The Critical OpenSSH https://nangia.com/portfolio-item/unmasking-cve-2024-6387-the-critical-openssh-flaw-exposing-servers-to-remote-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=unmasking-cve-2024-6387-the-critical-openssh-flaw-exposing-servers-to-remote-attacks https://nangia.com/portfolio-item/unmasking-cve-2024-6387-the-critical-openssh-flaw-exposing-servers-to-remote-attacks/#respond Tue, 10 Sep 2024 16:00:13 +0000 http://13.233.77.81/?post_type=portfolio-item&p=8919 CVE-2024-6387 is a critical security vulnerability identified in the OpenSSH server (sshd). This vulnerability, classified as a Remote Code Execution (RCE) flaw, enables unauthenticated attackers to execute arbitrary code on affected systems. The exploit takes advantage of a previously unknown weakness in the sshd service, allowing remote attackers to gain full control over the target […]

The post Unmasking CVE-2024- 6387: The Critical OpenSSH first appeared on Nangia & Co LLP.

]]>
CVE-2024-6387 is a critical security vulnerability identified in the OpenSSH server (sshd). This vulnerability, classified as a Remote Code Execution (RCE) flaw, enables unauthenticated attackers to execute arbitrary code on affected systems. The exploit takes advantage of a previously unknown weakness in the sshd service, allowing remote attackers to gain full control over the target server without requiring valid authentication credentials. The discovery of this vulnerability highlights the ongoing need for vigilance and timely patching in maintaining the security of critical network services. This advisory outlines the nature of these vulnerabilities, the affected products, and provides guidance on mitigation strategies to safeguard against potential attacks. 

What is Remote Unauthenticated Code Execution Vulnerability in OpenSSH server? 

A security regression (CVE-2024-6387) was found in OpenSSH’s server (sshd). This issue arises from a race condition that causes sshd to handle certain signals unsafely. A remote attacker, without authentication, might exploit this by failing to authenticate within a specified time frame. The Qualys Threat Research Unit (TRU) discovered an unauthenticated Remote Code Execution (RCE) vulnerability in OpenSSH’s server (sshd) on glibc-based Linux systems. This marks the first OpenSSH vulnerability in nearly twenty years and allows an unauthenticated RCE that provides full root access. The vulnerability affects the default configuration and requires no user interaction, representing a significant exploit risk. 

What is affected? 

OpenSSH versions earlier than 4.4p1 are vulnerable to this signal handler race condition unless they are patched for CVE2006-5051 and CVE-2008-4109. Versions from 4.4p1 up to, but not including, 8.5p1 are not vulnerable due to a transformative patch for CVE-2006-5051, which made a previously unsafe function secure. Versions from 8.5p1 up to, but not including, 9.8p1 are vulnerable due to the accidental removal of a critical component in a function. OpenBSD systems 

Read More

The post Unmasking CVE-2024- 6387: The Critical OpenSSH first appeared on Nangia & Co LLP.

]]>
https://nangia.com/portfolio-item/unmasking-cve-2024-6387-the-critical-openssh-flaw-exposing-servers-to-remote-attacks/feed/ 0
Don’t Get Hacked: Fixing the PAN-OS Flaw https://nangia.com/portfolio-item/dont-get-hacked/?utm_source=rss&utm_medium=rss&utm_campaign=dont-get-hacked https://nangia.com/portfolio-item/dont-get-hacked/#respond Tue, 10 Sep 2024 15:58:26 +0000 http://13.233.77.81/?post_type=portfolio-item&p=8916 A recent security flaw (CVE-2024-3400) has been discovered which is impacting Palo Alto Networks PAN-OS firewalls. This vulnerability, classified as severe, allows attackers to potentially gain significant control over affected systems through a technique called command injection. This type of vulnerability could lead to the execution of malicious code, the compromise of sensitive data, or […]

The post Don’t Get Hacked: Fixing the PAN-OS Flaw first appeared on Nangia & Co LLP.

]]>
A recent security flaw (CVE-2024-3400) has been discovered which is impacting Palo Alto Networks PAN-OS firewalls. This vulnerability, classified as severe, allows attackers to potentially gain significant control over affected systems through a technique called command injection. This type of vulnerability could lead to the execution of malicious code, the compromise of sensitive data, or even the disruption of critical network operations. It affects firewalls running specific versions of the PAN-OS software and configured with the GlobalProtect security feature. Palo Alto Networks is actively working to provide updates and solutions to address this flaw.To ensure your continued security, we have prepared a comprehensive advisory newsflash, detailing the vulnerability, risks, and mitigation steps. 

What is the vulnerability 

A zero-day command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Tracked as CVE-2024-3400, the issue has a CVSS score of 10.0, indicating maximum severity. Threat actors have been able to exploit the vulnerability to compromise the firewall to introduce a python based backdoor, create a reverse shell, download further tools on the device, exfiltrate data and move laterally within the network. The exact origins of the threat actor exploiting the flaw are presently unknown but Palo Alto Networks Unit 42 is tracking the malicious activity under the name Operation MidnightEclipse. 

How do you protect yourself? 

This issue is fixed in hotfix releases of PAN-OS 10.2.9-h1, PAN-OS 11.0.4-h1, PAN-OS 11.1.2-h3, and in all later PAN-OS versions. Hotfixes for other commonly deployed maintenance releases will also be made available to address this issue. Palo Alto Networks states that hotfixes for rest of the versions will be released by the date 19/04/2024.

Read More

The post Don’t Get Hacked: Fixing the PAN-OS Flaw first appeared on Nangia & Co LLP.

]]>
https://nangia.com/portfolio-item/dont-get-hacked/feed/ 0
RBI Strengthens Fraud Risk Management in Banks  https://nangia.com/portfolio-item/rbi-strengthens-fraud-risk-management-in-banks/?utm_source=rss&utm_medium=rss&utm_campaign=rbi-strengthens-fraud-risk-management-in-banks https://nangia.com/portfolio-item/rbi-strengthens-fraud-risk-management-in-banks/#respond Tue, 10 Sep 2024 15:56:43 +0000 http://13.233.77.81/?post_type=portfolio-item&p=8915 RBI issued revised Master Directions strengthening fraud risk management in commercial banks (including Regional Rural Banks) and All India Financial Institutions (AIFIs) on 15 July 2024. These principle-based guidelines emphasize Board oversight, robust internal controls, and adherence to natural justice principles before classifying someone as a fraud. Early warning systems and red flagging of accounts […]

The post RBI Strengthens Fraud Risk Management in Banks  first appeared on Nangia & Co LLP.

]]>
RBI issued revised Master Directions strengthening fraud risk management in commercial banks (including Regional Rural Banks) and All India Financial Institutions (AIFIs) on 15 July 2024. These principle-based guidelines emphasize Board oversight, robust internal controls, and adherence to natural justice principles before classifying someone as a fraud. Early warning systems and red flagging of accounts are enhanced for quicker detection and reporting of frauds. This replaces previous guidelines and aims to improve the banking sector’s fraud prevention and management framework.  

In recent years, India has witnessed a significant rise in white-collar and corporate crimes, driven by rapid economic growth and technological advancements. These crimes, often committed by individuals in high social and professional positions, have a profound impact on our society and economy. They encompass fraud, embezzlement, bribery, insider trading, money laundering, and cybercrimes. Several factors contribute to this increase: 

Technological Advancements: 

The digitalization of financial transactions and corporate operations has created new opportunities for cybercrimes and financial frauds. A recent report by the Indian Cybercrime Coordination Centre (I4C) revealed that digital financial frauds accounted for a staggering INR 1.25 lakh crore over the last three years. According to the National Cybercrime Reporting Portal (NCRP), in 2023, at least INR 10,319 crore was reported to be lost by victims of digital financial fraud. 

Economic Growth: 

India’s rapid industrial and economic development has inadvertently facilitated corporate frauds. The need for effective fraud risk management is underscored by the disappearance of companies from stock exchanges. For instance, 2750 companies vanished from the Bombay Stock Exchange, highlighting the urgency of implementing robust fraud risk management measures. 

 

Read More

The post RBI Strengthens Fraud Risk Management in Banks  first appeared on Nangia & Co LLP.

]]>
https://nangia.com/portfolio-item/rbi-strengthens-fraud-risk-management-in-banks/feed/ 0
Multiple remote code execution Vulnerabilities https://nangia.com/portfolio-item/multiple-remote-code-execution-vulnerabilities-in-microsoft-products/?utm_source=rss&utm_medium=rss&utm_campaign=multiple-remote-code-execution-vulnerabilities-in-microsoft-products https://nangia.com/portfolio-item/multiple-remote-code-execution-vulnerabilities-in-microsoft-products/#respond Tue, 10 Sep 2024 15:53:53 +0000 http://13.233.77.81/?post_type=portfolio-item&p=8913 Recent investigations have unveiled a series of critical vulnerabilities in various Microsoft products, posing significant security risks to organizations worldwide. These vulnerabilities, identified as CVE-2024-30080, CVE-2024-30103, and CVE-2024-30078, enable remote code execution, potentially allowing attackers to take over affected systems. The issues span across multiple Microsoft products, including Windows OS versions, Microsoft Outlook, and Windows […]

The post Multiple remote code execution Vulnerabilities first appeared on Nangia & Co LLP.

]]>
Recent investigations have unveiled a series of critical vulnerabilities in various Microsoft products, posing significant security risks to organizations worldwide. These vulnerabilities, identified as CVE-2024-30080, CVE-2024-30103, and CVE-2024-30078, enable remote code execution, potentially allowing attackers to take over affected systems. The issues span across multiple Microsoft products, including Windows OS versions, Microsoft Outlook, and Windows Wi-Fi drivers, necessitating immediate attention and remediation to prevent exploitation and ensure the security of organizational infrastructure. Our Cyber Security Team has prepared an advisory detailing the nature of these vulnerabilities, the affected products, and providing guidance on mitigation strategies to safeguard against potential attacks. 

What are the different Vulnerabilities found in Microsoft Products? 

Remote Code Execution via MSMQ: 

An attacker can exploit the flaw in Microsoft Message Queuing component (MSMQ) by sending a specially crafted malicious MSMQ packet to a server with the MSMQ service enabled. Successful exploitation allows the attacker to execute arbitrary code on the server which may leads to takeover of the system. This vulnerability highlights the critical security concern for CVE-2024-30080. 

Remote Code Execution via Outlook: 

An attacker can exploit this vulnerability in Microsoft Outlook by bypassing the registry block lists to create and load malicious DLL files, which can execute without user interaction if the auto-open email feature is enabled. The vulnerability arises from improper handling of certain registry keys related to DLL handling and can be triggered by opening a specially crafted email in the Preview Pane. This vulnerability highlights the critical security concern for CVE-2024-30103. 

 

Read More

The post Multiple remote code execution Vulnerabilities first appeared on Nangia & Co LLP.

]]>
https://nangia.com/portfolio-item/multiple-remote-code-execution-vulnerabilities-in-microsoft-products/feed/ 0
Analysis of the Proposed CAFE – 3 and CAFE – 4 https://nangia.com/portfolio-item/analysis-of-the-proposed-cafe-3-and-cafe-4-norms/?utm_source=rss&utm_medium=rss&utm_campaign=analysis-of-the-proposed-cafe-3-and-cafe-4-norms https://nangia.com/portfolio-item/analysis-of-the-proposed-cafe-3-and-cafe-4-norms/#respond Tue, 10 Sep 2024 15:48:55 +0000 http://13.233.77.81/?post_type=portfolio-item&p=8912 The Bureau of Energy Efficiency (BEE) is working to enhance fuel efficiency standards for vehicles in India. The proposed Corporate Average Fuel Efficiency (CAFE) norms will establish minimum fuel efficiency requirements for vehicles. These standards are designed to lower greenhouse gas emissions, reduce the carbon footprint of vehicles, and improve air quality. This initiative is […]

The post Analysis of the Proposed CAFE – 3 and CAFE – 4 first appeared on Nangia & Co LLP.

]]>
The Bureau of Energy Efficiency (BEE) is working to enhance fuel efficiency standards for vehicles in India. The proposed Corporate Average Fuel Efficiency (CAFE) norms will establish minimum fuel efficiency requirements for vehicles. These standards are designed to lower greenhouse gas emissions, reduce the carbon footprint of vehicles, and improve air quality. This initiative is an important move towards promoting sustainable transportation and a more environmentally friendly future. Our Power Sector Advisory Team has prepared a detailed advisory that outlines the applicability, impact, and adaptation of these new standards. 

 Comments on the Proposed Norms 

  1. Stringency and Achievability  
  • Proposed Norms 

o CAFE-III: 91.7 gCO2/km (2027-2032)  

o CAFE-IV: 70 gCO2/km (2032-2037)  

  • Current Norms: CAFE-II (113 gCO2/km) 
  • Global Comparison: 

o US (2024-2026): 40 miles per gallon (approximately 58 gCO2/km) (Center for Automotive Research).  

o EU (2021): 95 gCO2/km with further reductions planned (Wikipedia).  

  • Feasibility in India: Achieving these targets will be challenging due to the current technological and infrastructural limitations in India. While the targets align well with global efforts to reduce emissions, the pace of technological adoption and infrastructure development in India may not be sufficient to meet these stringent norms within the proposed timeline.
  1. Infrastructure Development 
  • Current State: India’s EV infrastructure, including charging stations and service facilities, is underdeveloped compared to countries like the US and EU. Rapid and extensive investment is needed to support the widespread adoption of electric and hybrid vehicles required to meet the CAFE-III and CAFE-IV norms.  
  • • Global Standards: Countries like Norway, which leads in EV adoption, have robust infrastructure and incentives for electric vehicles. The EU and the US are also significantly investing in EV infrastructure to support their stringent emission norms (Center for Automotive Research).  
  •  Recommendation: To make the proposed norms achievable, India must prioritize the development of EV infrastructure, including expanding the network of charging stations and enhancing testing facilities 
Read More

The post Analysis of the Proposed CAFE – 3 and CAFE – 4 first appeared on Nangia & Co LLP.

]]>
https://nangia.com/portfolio-item/analysis-of-the-proposed-cafe-3-and-cafe-4-norms/feed/ 0
Git clone Catastrophe: Unpatched Vulnerability https://nangia.com/portfolio-item/git-clone-catastrophe-unpatched-vulnerability-opens-door-to-remote-code-execution/?utm_source=rss&utm_medium=rss&utm_campaign=git-clone-catastrophe-unpatched-vulnerability-opens-door-to-remote-code-execution https://nangia.com/portfolio-item/git-clone-catastrophe-unpatched-vulnerability-opens-door-to-remote-code-execution/#respond Tue, 10 Sep 2024 15:47:19 +0000 http://13.233.77.81/?post_type=portfolio-item&p=8910 Git clone Catastrophe: Unpatched Vulnerability Opens Door to Remote Code Execution A critical Remote Code Execution (RCE) vulnerability, CVE-2024-32002, has been identified in Git’s repository cloning process. This flaw allows attackers to exploit submodule configurations, executing arbitrary code during the clone operation without user intervention. As a result, malicious actors can gain control over the […]

The post Git clone Catastrophe: Unpatched Vulnerability first appeared on Nangia & Co LLP.

]]>
Git clone Catastrophe: Unpatched Vulnerability Opens Door to Remote Code Execution

A critical Remote Code Execution (RCE) vulnerability, CVE-2024-32002, has been identified in Git’s repository cloning process. This flaw allows attackers to exploit submodule configurations, executing arbitrary code during the clone operation without user intervention. As a result, malicious actors can gain control over the affected system, potentially installing malware or exfiltrating data. Developers cloning repositories from platforms like GitHub and GitLab are at heightened risk. Our Cyber Security Team has documented a detailed advisory outlining the vulnerability, associated risks and mitigation steps. 

What is the RCE Vulnerability while Cloning Git Repositories? 

A critical Remote Code Execution (RCE) vulnerability has been identified in the process of cloning Git repositories. This issue arises when repositories containing submodules are manipulated to exploit a flaw in Git, allowing files to be written not in the submodule’s work tree but directly into the “.git/” directory. This exploit causes a hook to execute during the cloning process, giving users no opportunity to inspect or interrupt the code execution. As a result, this vulnerability poses a significant security risk, as it enables automatic code execution without user verification. Malicious actors can leverage repositories with submodules to exploit this bug, leading to the execution of a hook from the “.git/” directory during the cloning process, and potentially resulting in Remote Code Execution (RCE). This type of attack is especially dangerous because it can provide attackers with control over the system, allowing them to run arbitrary code, install malware, or carry out other malicious actions without the user’s knowledge or consent. The RCE vulnerability while cloning Git repositories underscores the critical security concern identified as CVE-2024-32002. 

What is affected? 

Version prior to 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4 are affected 

 

The post Git clone Catastrophe: Unpatched Vulnerability first appeared on Nangia & Co LLP.

]]>
https://nangia.com/portfolio-item/git-clone-catastrophe-unpatched-vulnerability-opens-door-to-remote-code-execution/feed/ 0
Supply Chain Attack Leads to Backdoor vulnerability  https://nangia.com/portfolio-item/supply-chain-attack-leads-to-backdoor-vulnerability/?utm_source=rss&utm_medium=rss&utm_campaign=supply-chain-attack-leads-to-backdoor-vulnerability https://nangia.com/portfolio-item/supply-chain-attack-leads-to-backdoor-vulnerability/#respond Tue, 10 Sep 2024 15:45:10 +0000 http://13.233.77.81/?post_type=portfolio-item&p=8908 Recently a supply chain attack was uncovered with a backdoor being detected in specific versions of a commonly used utility called XZ Utils in Linux. The backdoor had the potential to grant malicious actors full, unauthorized access to systems using the affected versions. Our Cyber Security Team has put together an advisory documenting the procedure […]

The post Supply Chain Attack Leads to Backdoor vulnerability  first appeared on Nangia & Co LLP.

]]>
Recently a supply chain attack was uncovered with a backdoor being detected in specific versions of a commonly used utility called XZ Utils in Linux. The backdoor had the potential to grant malicious actors full, unauthorized access to systems using the affected versions. Our Cyber Security Team has put together an advisory documenting the procedure to verify if your organization has been affected along with the preventive and remedial steps to be undertaken to protect your information systems. 

What is XZ Utils Backdoor Vulnerability? 

The CVE-2024-3094 vulnerability, also known as the xz supply chain attack, represents a significant security issue identified within the xz/liblzma package, beginning from version 5.6.0. This flaw involves the discovery of malicious code within the upstream tarballs of xz, posing a threat to the software supply chain, especially in opensource environments. Exploitation of this backdoor may potentially grant unauthorized entry and control over compromised systems.XZ Utils is a vital data compression tool widely integrated into Linux distributions. It is utilized in compressing diverse file types like release tarballs, software packages, kernel images, and initramfs images. 

Background of the Vulnerability: 

A Microsoft engineer involved in contributing to PostgreSQL projects encountered performance issues on a Debian system linked to SSH. These issues were characterized by heightened CPU usage during SSH logins and errors flagged by valgrind, a memory monitoring tool. Subsequent investigation uncovered that certain versions of the xz libraries contained malicious code, highlighting the significance of CVE-2024-3094 as a critical concern for Linux security.  

 

Read More

The post Supply Chain Attack Leads to Backdoor vulnerability  first appeared on Nangia & Co LLP.

]]>
https://nangia.com/portfolio-item/supply-chain-attack-leads-to-backdoor-vulnerability/feed/ 0
“BatBadBut” Bug Bites: Critical Windows Injection https://nangia.com/portfolio-item/batbadbut-bug-bites-critical-windows-injection-flaw/?utm_source=rss&utm_medium=rss&utm_campaign=batbadbut-bug-bites-critical-windows-injection-flaw https://nangia.com/portfolio-item/batbadbut-bug-bites-critical-windows-injection-flaw/#respond Tue, 10 Sep 2024 15:35:58 +0000 http://13.233.77.81/?post_type=portfolio-item&p=8906 A critical Windows vulnerability (CVE-2024-24576), nicknamed “BatBadBut,” has been discovered. This vulnerability allows for command injection through the improper handling of batch files. Exploitation could lead to system compromise. Given the severity of this threat, swift and decisive measures are imperative to mitigate potential risks and safeguard your systems and data. Our Cyber security team […]

The post “BatBadBut” Bug Bites: Critical Windows Injection first appeared on Nangia & Co LLP.

]]>
A critical Windows vulnerability (CVE-2024-24576), nicknamed “BatBadBut,” has been discovered. This vulnerability allows for command injection through the improper handling of batch files. Exploitation could lead to system compromise. Given the severity of this threat, swift and decisive measures are imperative to mitigate potential risks and safeguard your systems and data. Our Cyber security team has prepared a detailed advisory describing the vulnerability, risks, and steps to mitigate them effectively. 

What is “BatBadBut” Vulnerability 

The BatBadBut Vulnerability is a critical flaw affecting the handling of batch files (bat and cmd extensions) on Windows platforms across various programming languages/ technologies. It allows attackers to execute arbitrary shell commands by bypassing the escaping mechanism. This vulnerability may also affect the application that executes commands without specifying the file extension. 

Background of Vulnerability 

Flatt Security has discovered a critical vulnerability called BatBadBut “bad, but not the worst” that could allow attackers to inject malicious commands into Windows applications. The flaw, discovered by Flatt Security’s security engineer RyotaK, affects multiple programming languages. It was reported to the CERT Coordination Center and registered as CVE2024-24576 on GitHub with a severity score of 10.0. 

 

Read More

The post “BatBadBut” Bug Bites: Critical Windows Injection first appeared on Nangia & Co LLP.

]]>
https://nangia.com/portfolio-item/batbadbut-bug-bites-critical-windows-injection-flaw/feed/ 0
What you ought to know about Audit Trail  https://nangia.com/portfolio-item/what-you-ought-to-know-about-audit-trail/?utm_source=rss&utm_medium=rss&utm_campaign=what-you-ought-to-know-about-audit-trail https://nangia.com/portfolio-item/what-you-ought-to-know-about-audit-trail/#respond Tue, 10 Sep 2024 14:18:57 +0000 http://13.233.77.81/?post_type=portfolio-item&p=8904 ICAI has issued revised edition in January 2024 of its implementation guide on Audit Trail Requirements for Companies Using Accounting Software. We’ve distilled the guide including FAQs in an intelligible simplified synopsis, aiming to make it easily comprehensible and to save you valuable time.We further wish to provide insights on steps to prepare yourselves for […]

The post What you ought to know about Audit Trail  first appeared on Nangia & Co LLP.

]]>
ICAI has issued revised edition in January 2024 of its implementation guide on Audit Trail Requirements for Companies Using Accounting Software. We’ve distilled the guide including FAQs in an intelligible simplified synopsis, aiming to make it easily comprehensible and to save you valuable time.We further wish to provide insights on steps to prepare yourselves for audit of such audit trails by the statutory auditors for their reporting. This information is vital for ensuring compliance and transparency in financial reporting. Who needs to maintain audit trail and from when? 

  • Every Company in India using accounting software  
  • No exception for SMCs, banks or NBFCs, foreign or section 8 companies  
  • Excludes where books are entirely maintained manually  
    • Applicable from April 1, 2023

Read More                                                                                                                                                                                                                                                                                                                 

The post What you ought to know about Audit Trail  first appeared on Nangia & Co LLP.

]]>
https://nangia.com/portfolio-item/what-you-ought-to-know-about-audit-trail/feed/ 0