A critical vulnerability in Realtek SDK, software that enables computer audio devices to function, is being actively exploited according to Palo Alto Networks.
Since August 2022 over 134 million exploits have been identified particularly targeting vendor supply chains.
The vulnerability recognized as CVE-2021-35394 is a critical buffer overflow that enables the attacker to execute any command with administrator privileges. This is also known as arbitrary command injection with root privileges. The top geographic sources for these attacks is the U.S. and Russia, though it is suspected that the U.S. based attackers are foreign nationals using VPNs to mask their origin.
A significant volume of ransomware has not yet been tied to this vulnerability, but given its pervasive nature and many organizations delay in patching, that may be a matter of time. A critical vulnerability in Realtek SDK, software that enables computer audio devices to function, is being actively exploited according to Palo Alto Networks.
Since August 2022 over 134 million exploits have been identified particularly targeting vendor supply chains.
The vulnerability recognized as CVE-2021-35394 is a critical buffer overflow that enables the attacker to execute any command with administrator privileges. This is also known as arbitrary command injection with root privileges.
Remaining slots
<span data-metadata=""><span data-buffer="">2 Hours Expert Mitigation Slots Remaining Today
The Acreto solution provides multiple ways to defend against the Ping pull malware across the entire infrastructure.
These include ecosystem isolation, segmentation, encrypted secure scan, and positive controls to allow only authorized application protocols and application programs. These capabilities prevent Ping pull custom.