Security Vulnerability of the Week 22/05/22

Windows 11 hacked again at Pwn2Own, Telsa Model 3 also falls

Weekly review of the top vulnerability issues of the week: This week Focus on PWN 2 OWN in Vancuver

This week we hear from Pwn2OWN – Trend Micro, ZDI, Tesla and more bugs found for a total of 1,155,000 Awarded

This week features Apple IoS & Remediation, QNAP, Windows, Firefox, Ubuntu & Tesla explits at Pwn2OWN, PyPI

PWN 2 OWN Summary with all the vulnerabilities Discovered

Microsoft Teams

Hector “p3rr0” Peralta was able to demonstrate an improper configuration against Microsoft Teams. He earns $150,000 and 15 Master of Pwn points.

Daniel Lim Wee Soong (@daniellimws), Poh Jia Hao (@Chocologicall), Li Jiantao (@CurseRed) & Ngo Wei Lin (@Creastery) of STAR Labs successfully demonstrated their zero-click exploit of 2 bugs (injection and arbitrary file write) on Microsoft Teams. 

Mozilla Firefox

Credit Pwn2Own & ZeroDay Initiative

Manfred Paul (@_manfp) successfully demonstrated 2 bugs – prototype pollution and improper input validation – on Mozilla Firefox


Special – Tesla

For the Full video:

David BERARD and Vincent DEHORS from @Synacktiv exploited 2 unique bugs (Double-Free & OOBW) with a collision on a known sandbox escape on a Telsa Model 3 Infotainment System

For full:


nghiadt12 from Viettel Cyber Security was able to successfully show an escalation of privilege via Integer Overflow on Microsoft Windows 11 

vinhthp1712 successfully achieved Elevation of Privilege via Improper Access Control on Microsoft Windows 11

Bruno PUJOS (@brunopujos) from REverse Tactics successfully achieved Elevation of Privilege via Use-After-Free on Microsoft Windows 11

Credit Pwn2Own


Bien Pham (@bienpnn) was able to execute a Use After Free bug leading to elevation of privilege on Unbuntu Desktop


PyPI – Library pymafka Expose data via open backdoor


A malicious library pymafka has been released on PyPI with the intent to exfiltrate data

PyKafka is a widely used Apache Kafka client that counts over four million downloads on the PyPI registry.

The library implemented the attack known as typosquatting where users mistake the library capital for lowercase

The library was fortunately promptly removed, nonetheless there are 325 users who downloaded the library

the infection begins with the execution of the ‘’ script found in the package.

This script detects the host operating system and, depending on whether it is Windows, Linux, or Darwin (macOS), fetches a compatible malicious payload that is executed on the system.

For Linux systems, the Python script connects to a remote URL at and pipes the output to the bash shell. Unfortunately, that host is down at the time of this writing, so it is unclear what commands are executed, but it is believed to open a reverse shell.

For Windows and macOS, the payload is a Cobalt Strike beacon, which provides remote access to the infected device. 

Cobalt Strike is a widely abused penetration testing suite that features powerful traits such as command execution, keylogging, file actions, SOCKS proxying, privilege escalation, credential stealing, port scanning, and more.

More info

To avoid similar attacks always check if the package has description and is from a reputable author as well as checking for typos

The PyMafka page on the PyPI registry

Software developers should scrutinize package names and details and double-check their selection of building blocks when something appears funky.


IOS – Remote Execution of malware via Bluetooth

Security Apple

Security researchers were able to exploit successfully vulnerability in the  Bluetooth, NFC, and ultra-wideband (UWB) that are all hardwired to the phone’s secure element. The researchers were able to write to the Bluetooth chip in an iPhone 13 by exploiting a legacy feature that requires iOS to be able to write to the executable RAM regions using a vendor-specific host-controller interface (HCI) command.

Workaround: disable the Find My network as a device policy this can be implemented as policy for your workforce with iPhones running iOS 15

Follow Apple Security Advisory:

Previous Vulnerability Covered here: has not been fixed:


QNAP has warned of a new series of attack bots to the vulnerabilities recently fixed

 “a new wave of DeadBolt ransomware attacks. Please install the latest updates”  

 CVE-2022-23121 and others were discovered by NCC Group EDG team at Pwn2Own

We covered the Qnap Vulnerability: and

More details:

Affected Versions

  • QTS 5.0.x and later
  • QTS 4.5.4 and later
  • QTS 4.3.6 and later
  • QTS 4.3.4 and later
  • QTS 4.3.3 and later
  • QTS 4.2.6 and later
  • QuTS hero h5.0.x and later
  • QuTS hero h4.5.4 and later
  • QuTScloud c5.0.x


Current Year Research on Vulnerabilities Discovered

No alternative text description for this image
Courtesy of Christoper Parisel

For the Deep dive on previous Cloud Vulnerabilities:


and here

AutoWrap Vulnerability in Microsoft Azure Automation Service – Orca – CVSS 8.5

What Is the Microsoft Azure Automation Service? 

Microsoft Azure Automation allows customers to execute automation code in a managed fashion. You can schedule jobs, provide input and output, and more. Each customer’s automation code runs inside a sandbox, isolated from other customers’ code executing on the same virtual machine. 

The vulnerability was discovered by the orca team on December 2021 and Public disclosure to Microsoft on March 07 2022

You have been exposed to the vulnerability if

  1. You have been using the Azure Automation service
  2. The Managed Identity feature in your automation account is enabled (which is enabled by default)

AutoWarp is a critical vulnerability in the Azure Automation service that allowed unauthorized access 

Microsoft Has responded to the incident here:

Microsoft has also issued Automation customers to follow Security best practices outlined here.

For full detail of the vulnerability:

logicApp – NetSPI – CVSS 6

Vulnerability  CVE-2021-42306 (CredManifest) reported to Microsoft on Nov 17 2021

The vulnerability Is triggered when running an account in azure with automation. the vulnerability can be triggered by running an Automation Account with a “Run as” account

Add Automation Account
Credit Netspi

Microsoft has issued guidance

For the disclosure:

credManifest – NetSPI – CVSS 6.5 – CVE 2021-42306

extraReplica – Wiz – CVSS 6.8


Conti Ransomware group closes and split in more independent units

New from Advanced Intel’s Yelisey Boguslavskiy, who tweeted this afternoon that the gang’s internal infrastructure was turned off.

Conti Has been recently at war with Costa Rica

Advanced Intel report explains that Conti has partnered with numerous well-known ransomware operations, including HelloKitty, AvosLocker, Hive, BlackCat, BlackByte, and more.

Snapshot of costa rica attack:

On Sunday, May 8th, the newly elected Costa Rican President Chaves declared a national emergency citing ongoing Conti ransomware attacks as the reason.

Conti’s data leak site had been updated to state that the group had leaked 97% of the 672 GB data dump allegedly containing information stolen from government agencies:

Conti leak site with stolen data allegedly belonging to Costa Rica
Credit Bleeping Computer

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Critical Alert: Discover the implications of the Lace Tempest CVE-2023-47246 vulnerability in SysAid software, exploited by the notorious ransomware group TA505 also known as cl0p. Learn path traversal flaw, Microsoft’s insights, and urgent patching advice. Stay informed on the latest in cybersecurity with Phoenix Security’s insights and solutions for mitigating this high-impact ransomware threat. Focus on your vulnerability management program and application security program
Francesco Cipollone

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

x Logo: ShieldPRO
This Site Is Protected By