Search
UP-TO-DATE

Blog

Our employees frequently engage in research projects to live up to the high standard. They analyze the latest topics, methods and tools in interesting information security areas and prepare them in this context. The results of these activities contribute, for example, to projects, lectures at conferences, market overviews and articles for technical journals as well in advisories and zero-day-vulnerabilities.

Blog Articles

Blog

Loader Dev. 5 – Loading our payload

May 10, 2024 – In this post, we will finally cover loading our actual payload. As discussed at the beginning of this series, our loader should be able to load shellcode and C# assemblies as well as PEs. The actual mode will be chosen using an argument to the python script used for compilation.

Author: Kolja Grassmann

Read more »
Blog

Loader Dev. 4 – AMSI and ETW

April 30, 2024 – In the last post, we discussed how we can get rid of any hooks placed into our process by an EDR solution. However, there are also other mechanisms provided by Windows, which could help to detect our payload. Two of these are ETW and AMSI.

Author: Kolja Grassmann

Read more »
Blog

Loader Dev. 1 – Basics

February 10, 2024 – This is the first post in a series of posts that will cover the development of a loader for evading AV and EDR solutions.

Author: Kolja Grassmann

Read more »
AD Security

Microsoft Tiering Model – Part 3/3

January 10, 2024 – This is the third part of a three-part blog post series that looks at different design decisions, considerations and options an organization should bear in mind when planning, implementing and maintaining a tiering model in order to administrate the IT infrastructure securely. It describes the various options for implementation, explains trade-offs that must be made and their residual risks, and outlines the technical measures that need to be taken.


Author: Hagen Molzer

Read more »

Research

Advisories

Vulnerability in VMware Workstation (CVE-2023-20854)

February 3, 2023
VMware Workstation is a virtualization software that allows to run several virtual machines in parallel on one device. These virtual machines can be managed via the software VMware Workstation Player or VMware Workstation Pro, which is installed on all systems used for managing virtual machines.

Read more »

Vulnerabilities

cirosec conducts vulnerability research into products and services, which at times results in zero day vulnerabilities being discovered.

cirosec follows a responsible disclosure policy when dealing with zero-day vulnerabilities found during research or customer projects. The goal is to balance the need of giving the vendor or open-source project enough time to develop and distribute a fix for the vulnerability with the need of the public to know about the security vulnerability. The policy is in accordance with industry-standard responsible disclosure practices. Our Responsible Disclosure Policy can be found here.

Below is a list of CVEs vulnerabilities identified by cirosec and presented here for reference and cataloguing.

CVE #VendorProductCVSS RatingAdvisory Link
CVE-2024-24912CheckpointCheckpoint Harmony7.8 (CVSS v3)Advisory Checkpoint
CVE-2023-7241WebrootWebroot Antivirus7.8 (CVSS v3)Advisory, Webroot
CVE-2023-6154BitdefenderBitdefender Total Security, Internet Security, Antivirus Plus, Antivirus Free7.8 (CVSS v3)Advisory, Bitdefender
CVE-2023-20854VMwareVMware Workstation7.8 (CVSS v3)Advisory, VMware
CVE-2022-41975RealVNCConnect7.8 (CVSS v3)Advisory, RealVNC

Your contact person

Do you want to protect your systems? Get in touch with us.

Search
Search