Skip to content

Commit

Permalink
20241220002 - 2nd try (#1135)
Browse files Browse the repository at this point in the history
* 20241220002

* Format markdown docs

* 20241220002

---------

Co-authored-by: DGOV-Bryce <[email protected]>
  • Loading branch information
DGOV-Bryce and DGOV-Bryce authored Dec 20, 2024
1 parent e762370 commit 09f4cdc
Showing 1 changed file with 25 additions and 0 deletions.
25 changes: 25 additions & 0 deletions docs/advisories/20241220002-BeyondTrust-Critical-Vuln.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
# BeyondTrust Critical Vulnerability - 20241220002

## Overview

A critical vulnerability has been discovered in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user.

## What is vulnerable?

| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
| --------------------------------------------------------------------------- | --------------------------- | ----------------------------------------------------------------- | ---- | ------------ |
| BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products | Versions 24.3.1 and earlier | [CVE-2024-12356](https://nvd.nist.gov/vuln/detail/CVE-2024-12356) | 9.8 | **Critical** |

## What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)):

- BeyondTrust: https://www.beyondtrust.com/trust-center/security-advisories/bt24-10

## Additional References

- BleepingComputer: https://www.bleepingcomputer.com/news/security/beyondtrust-says-hackers-breached-remote-support-saas-instances/

0 comments on commit 09f4cdc

Please sign in to comment.