<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Vulnerability &#8211; SCRT Team Blog</title>
	<atom:link href="/category/vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Orange Cyberdefense Switzerland&#039;s technical blog</description>
	<lastBuildDate>Wed, 04 Jun 2025 13:59:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>/wp-content/uploads/2024/10/cropped-favicon-32x32-1-32x32.png</url>
	<title>Vulnerability &#8211; SCRT Team Blog</title>
	<link>/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>SonicDoor &#8211; Cracking SonicWall&#8217;s SMA 500</title>
		<link>/2025/06/04/sonicdoor-attacking-sonicwalls-sma-500/</link>
		
		<dc:creator><![CDATA[Alain Mowat]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 09:36:07 +0000</pubDate>
				<category><![CDATA[Research]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=6642</guid>

					<description><![CDATA[While attempting to compare the security level of various VPN vendors, I kept falling down the path of searching for vulnerabilities instead. This blog post details the ones I discovered in SonicWall&#8217;s SMA 500, which were patched in December 2024. This post has been delayed to coincide with my talk at SecurityFest on this exact &#8230; <a href="/2025/06/04/sonicdoor-attacking-sonicwalls-sma-500/" class="more-link">Continue reading <span class="screen-reader-text">SonicDoor &#8211; Cracking SonicWall&#8217;s SMA 500</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Attacking Cortex XDR from an unprivileged user perspective</title>
		<link>/2024/12/05/attacking-cortex-xdr-from-an-unprivileged-user-perspective/</link>
		
		<dc:creator><![CDATA[Romain Melchiorre]]></dc:creator>
		<pubDate>Thu, 05 Dec 2024 12:49:41 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=6405</guid>

					<description><![CDATA[In late 2023, we launched a new form of service where multiple customers could co-fund research time on a given product they are all using. The goal of the Co-funded research is to find vulnerabilities and possible weaknesses within the product that could impact not only our customers&#8217; security, but anyone using the product. The &#8230; <a href="/2024/12/05/attacking-cortex-xdr-from-an-unprivileged-user-perspective/" class="more-link">Continue reading <span class="screen-reader-text">Attacking Cortex XDR from an unprivileged user perspective</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Arbitrary web root file read in Sitecore before v10.4.0 rev. 010422</title>
		<link>/2024/11/25/arbitrary-web-root-file-read-in-sitecore-before-v10-4-0-rev-010422/</link>
		
		<dc:creator><![CDATA[Alain Mowat]]></dc:creator>
		<pubDate>Mon, 25 Nov 2024 13:34:08 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=5725</guid>

					<description><![CDATA[As part of our continuous pentesting offering, we try to identify solutions used by multiple clients to guide our research efforts to deliver the greatest impact. That is why, recently, we spent some time searching for vulnerabilities within Sitecore to find what we initially thought to be a 0-day, but ended up having been already &#8230; <a href="/2024/11/25/arbitrary-web-root-file-read-in-sitecore-before-v10-4-0-rev-010422/" class="more-link">Continue reading <span class="screen-reader-text">Arbitrary web root file read in Sitecore before v10.4.0 rev. 010422</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Getting code execution on Veeam through CVE-2023-27532</title>
		<link>/2024/09/10/getting-code-execution-on-veeam-through-cve-2023-27532/</link>
		
		<dc:creator><![CDATA[Alain Mowat]]></dc:creator>
		<pubDate>Tue, 10 Sep 2024 13:32:28 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=4313</guid>

					<description><![CDATA[While several blog posts have shown how to retrieve credentials through this vulnerability, we decided to dig deeper and see whether it was possible to execute arbitrary code through this issue. DISCLAIMER: This blog post was written a year and a half ago and we have postponed publication upon Veeam&#8217;s request, but given a recent &#8230; <a href="/2024/09/10/getting-code-execution-on-veeam-through-cve-2023-27532/" class="more-link">Continue reading <span class="screen-reader-text">Getting code execution on Veeam through CVE-2023-27532</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>CVE-2022-41099 &#8211; Analysis of a BitLocker Drive Encryption Bypass</title>
		<link>/2023/08/14/cve-2022-41099-analysis-of-a-bitlocker-drive-encryption-bypass/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Mon, 14 Aug 2023 14:12:14 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=4374</guid>

					<description><![CDATA[In November 2022, an advisory was published by Microsoft about a BitLocker bypass. This vulnerability caught my attention because the fix required a manual operation by users and system administrators, even after installing all the security updates. Couple this with the fact that the procedure was not well documented initially, and you have the perfect &#8230; <a href="/2023/08/14/cve-2022-41099-analysis-of-a-bitlocker-drive-encryption-bypass/" class="more-link">Continue reading <span class="screen-reader-text">CVE-2022-41099 &#8211; Analysis of a BitLocker Drive Encryption Bypass</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Producing a POC for CVE-2022-42475 (Fortinet RCE)</title>
		<link>/2023/03/14/producing-a-poc-for-cve-2022-42475-fortinet-rce/</link>
		
		<dc:creator><![CDATA[Alain Mowat]]></dc:creator>
		<pubDate>Tue, 14 Mar 2023 10:24:13 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=3776</guid>

					<description><![CDATA[Late last year a new remote code execution vulnerability was discovered in Fortinet&#8217;s SSLVPN service. Given the relative lack of information surrounding it at the time, and the fact I&#8217;d have some uninterrupted research time due to a lengthy flight, I decided to attempt to produce a POC for the vulnerability. Background information I started &#8230; <a href="/2023/03/14/producing-a-poc-for-cve-2022-42475-fortinet-rce/" class="more-link">Continue reading <span class="screen-reader-text">Producing a POC for CVE-2022-42475 (Fortinet RCE)</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Stealing user passwords through a VPN&#8217;s SSO</title>
		<link>/2021/02/25/stealing-user-passwords-through-a-vpns-sso/</link>
		
		<dc:creator><![CDATA[Alain Mowat]]></dc:creator>
		<pubDate>Thu, 25 Feb 2021 15:57:36 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=2831</guid>

					<description><![CDATA[Last year I got this idea that I should attempt to pay for my holidays to Japan by hunting for bounties in security appliances while in the plane. A full 10 hours of uninterrupted focus on one solution seemed like it should yield interesting results. So I started reverse engineering the Firewall of a relatively &#8230; <a href="/2021/02/25/stealing-user-passwords-through-a-vpns-sso/" class="more-link">Continue reading <span class="screen-reader-text">Stealing user passwords through a VPN&#8217;s SSO</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Combining Request Smuggling and CBC Byte-flipping to stored-XSS</title>
		<link>/2020/03/30/combining-request-smuggling-and-cbc-byte-flipping-to-stored-xss/</link>
		
		<dc:creator><![CDATA[Alain Mowat]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 07:51:06 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=2565</guid>

					<description><![CDATA[During a recent penetration test we stumbled upon a couple of issues which independently might not have warranted any attention, but when combined allowed to compromise other users by injecting arbitrary JavaScript into their browsers. It goes to show that even certain issues which might not always seem particularly interesting (such as self-XSS) can sometimes &#8230; <a href="/2020/03/30/combining-request-smuggling-and-cbc-byte-flipping-to-stored-xss/" class="more-link">Continue reading <span class="screen-reader-text">Combining Request Smuggling and CBC Byte-flipping to stored-XSS</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>SonicWall SRA and SMA vulnerabilities</title>
		<link>/2020/02/11/sonicwall-sra-and-sma-vulnerabilties/</link>
		
		<dc:creator><![CDATA[Alain Mowat]]></dc:creator>
		<pubDate>Tue, 11 Feb 2020 12:43:12 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=2546</guid>

					<description><![CDATA[Last year, Orange Tsai did some awesome research and discovered several vulnerabilities in SSL VPN providers which can allow an attacker to break into a network through the very device which is supposed to protect it. The vulnerable constructors were: I&#8217;ll admit I&#8217;ve always found it particularly ironic to discover vulnerabilities in security-related devices and &#8230; <a href="/2020/02/11/sonicwall-sra-and-sma-vulnerabilties/" class="more-link">Continue reading <span class="screen-reader-text">SonicWall SRA and SMA vulnerabilities</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Magento &#8211; RCE &#038; Local File Read with low privilege admin rights</title>
		<link>/2019/01/24/magento-rce-local-file-read-with-low-privilege-admin-rights/</link>
		
		<dc:creator><![CDATA[blogscrt]]></dc:creator>
		<pubDate>Thu, 24 Jan 2019 17:24:03 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[web]]></category>
		<guid isPermaLink="false">/?p=2493</guid>

					<description><![CDATA[I regularly search for vulnerabilities on big services that allow it and have a Bug Bounty program. Here is a second paper which covers two vulnerabilities I discovered on Magento, a big ecommerce CMS that&#8217;s now part of Adobe Experience Cloud. These vulnerabilities have been responsibly disclosed to Magento team, and patched for Magento 2.3.0, &#8230; <a href="/2019/01/24/magento-rce-local-file-read-with-low-privilege-admin-rights/" class="more-link">Continue reading <span class="screen-reader-text">Magento &#8211; RCE &#038; Local File Read with low privilege admin rights</span></a>]]></description>
		
		
		
			</item>
	</channel>
</rss>
