CRITICAL
The severity rating is CRITICAL due to the broad impact of these vulnerabilities. The exposure of customer records by Sears Home Services demonstrates a significant risk to privacy and data integrity. KVM vulnerabilities pose severe risks as they allow for BIOS-level attacks, bypassing typical OS security measures. Scammers exploiting fake GitHub accounts highlight the need for vigilance in all areas, especially with critical software repositories. These issues are highly exploitable both in homelab and production environments, emphasizing the urgent need to implement patches and updates.

This week's cybersecurity news highlights several critical vulnerabilities and attacks. One of the most significant is the exposure of nearly 3.7 million customer service records by Sears Home Services due to unprotected databases, which included personal details like names, addresses, phone numbers, and service appointment information. Another notable story involves nine vulnerabilities found in KVM devices from various vendors, including a severe flaw that allows remote execution without credentials. This vulnerability is particularly dangerous because it affects the BIOS level, allowing attackers to bypass OS-level security measures. Additionally, scammers used fake GitHub accounts to trick developers into connecting their wallets to a malicious site, and new malware named Speagle was discovered, leveraging legitimate security software to steal sensitive data. The ransomware group The Gentlemen has been using a critical FortiOS/FortiProxy flaw for network infiltration and encryption attacks.

Affected Systems
  • Sears Home Services AI chatbot databases
  • GL-iNet KVM devices
  • Angeet/Yeeso ES3 KVM device
  • Sipeed KVM devices
  • JetKVM
Affected Versions: All versions before the latest patch for KVM devices, unspecified versions of Sears Home Services systems
Remediation
  • Upgrade to the latest version of KVM software from JetKVM and Sipeed.
  • Apply patches provided by vendors for GL-iNet, Angeet/Yeeso, and other affected KVM devices.
  • Implement strict access controls on any exposed databases or repositories.
  • Update all systems with critical security updates.
Stack Impact

The impact on homelab stacks is significant due to the vulnerabilities in KVM devices and potential for BIOS-level attacks. Specific software like GL-iNet, Angeet/Yeeso ES3, Sipeed, and JetKVM may need to be updated or patched immediately.

Source →