<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Chinese snoops use F5, ConnectWise bugs to sell access into top US, UK networks in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Chinese-snoops-use-F5-ConnectWise-bugs-to-sell-access-into-top/m-p/68620#M6780</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have any doubts about China being friendly, these are banished.&amp;nbsp; Lets get real.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.theregister.com/2024/03/22/china_f5_connectwise_unc5174/?utm_medium=share&amp;amp;utm_content=article&amp;amp;utm_source=linkedin" target="_blank"&gt;https://www.theregister.com/2024/03/22/china_f5_connectwise_unc5174/?utm_medium=share&amp;amp;utm_content=article&amp;amp;utm_source=linkedin&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Chinese spies exploited a couple of critical-severity bugs in F5 and ConnectWise equipment earlier this year to sell access to compromised US defense organizations, UK government agencies, and hundreds of other entities, according to Mandiant.&lt;/P&gt;&lt;P&gt;The Google-owned threat hunters said they assess, "with moderate confidence," that a crew they track as UNC5174 was behind the exploitation of &lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2023-46747" target="_blank" rel="nofollow noopener"&gt;CVE-2023-46747&lt;/A&gt;, a 9.8-out-of-10-CVSS-rated remote code execution bug in the &lt;A href="https://www.theregister.com/2023/11/01/f5_bigip_critical_vulnerability/" target="_blank" rel="noopener"&gt;F5 BIG-IP&lt;/A&gt; Traffic Management User Interface, and &lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2024-1709" target="_blank" rel="nofollow noopener"&gt;CVE-2024-1709&lt;/A&gt;, a path traversal flaw in ConnectWise ScreenConnect that scored a perfect 10 out of 10 CVSS severity rating.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 24 Mar 2024 19:56:56 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-03-24T19:56:56Z</dc:date>
    <item>
      <title>Chinese snoops use F5, ConnectWise bugs to sell access into top US, UK networks</title>
      <link>https://community.isc2.org/t5/Industry-News/Chinese-snoops-use-F5-ConnectWise-bugs-to-sell-access-into-top/m-p/68620#M6780</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have any doubts about China being friendly, these are banished.&amp;nbsp; Lets get real.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.theregister.com/2024/03/22/china_f5_connectwise_unc5174/?utm_medium=share&amp;amp;utm_content=article&amp;amp;utm_source=linkedin" target="_blank"&gt;https://www.theregister.com/2024/03/22/china_f5_connectwise_unc5174/?utm_medium=share&amp;amp;utm_content=article&amp;amp;utm_source=linkedin&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Chinese spies exploited a couple of critical-severity bugs in F5 and ConnectWise equipment earlier this year to sell access to compromised US defense organizations, UK government agencies, and hundreds of other entities, according to Mandiant.&lt;/P&gt;&lt;P&gt;The Google-owned threat hunters said they assess, "with moderate confidence," that a crew they track as UNC5174 was behind the exploitation of &lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2023-46747" target="_blank" rel="nofollow noopener"&gt;CVE-2023-46747&lt;/A&gt;, a 9.8-out-of-10-CVSS-rated remote code execution bug in the &lt;A href="https://www.theregister.com/2023/11/01/f5_bigip_critical_vulnerability/" target="_blank" rel="noopener"&gt;F5 BIG-IP&lt;/A&gt; Traffic Management User Interface, and &lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2024-1709" target="_blank" rel="nofollow noopener"&gt;CVE-2024-1709&lt;/A&gt;, a path traversal flaw in ConnectWise ScreenConnect that scored a perfect 10 out of 10 CVSS severity rating.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Mar 2024 19:56:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Chinese-snoops-use-F5-ConnectWise-bugs-to-sell-access-into-top/m-p/68620#M6780</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-03-24T19:56:56Z</dc:date>
    </item>
  </channel>
</rss>

