Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2024-290
Version:
1.1
Affected software:
Angular Expressions before version 1.4.3
Type:
Execution of Arbitrary Code
CVE/CVSS:
https://github.com/peerigon/angular-expressions/security/advisories/GHSA-5462-4vcx-jh7j
The present vulnerability has a HIGH impact on Confidentiality, Integrity and Availability.
Moreover, a Proof-of-Concept exploit has been published, thus rendering the exploitation of this vulnerability a lot easier for attackers.
CVE-2024-54152 allows an attacker to write a malicious expression that escapes the sandbox to execute arbitrary code on the underlying system.
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for the vulnerable software mentioned in the present advisory.
Workaround
Two possible workarounds are possible:
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.