/">Home */}} Home Honeypots Advisories @DTCERT About

Telekom Security

Home Honeypots Advisories @DTCERT About
  • T-Pot Version 22.04 released

    13 Apr 2022 • Honeypots • General

    We are proud to announce the release of T-Pot 22.04 with lots of new features i.e. new honeypots, a distributed installation option, arm64 support, live attack maps, Debian 11 base, ELK 8.x, and more. If you ever wanted to get started with honeypots (or take it to the next level), but with the ease of use of an appliance, now is the best time to get started.

    Continue Reading →

  • Twitter Account of Deutsche Telekom's CERT Resumed

    20 Jan 2022 • General

    We are very pleased to announce that Deutsche Telekom’s CERT recently has resumed their twitter activity. Make sure to follow @DTCERT for technical tweets from CERT, CTI, and DFIR.

    Continue Reading →

  • Enumerating and indexing SMB shares at scale

    19 Jan 2022 • Tools

    In order to improve and harden our group’s critical telco-infrastructure, Deutsche Telekom Security GmbH provides a red team to simulate real world attack scenarios. While our red team also offers its capabilities for external customers, our main focus is improving our internal security by simulating state of the art attacks.

    Continue Reading →

  • Critical DoS vulnerability in SQLCipher SQL command processing

    08 Mar 2021 • Advisories

    A new critical denial-of-service vulnerability (CVE-2021-3119) in the SQLCipher SQL command processing of the master branch was discovered with a self-developed SQLCipher-FAST (Fast Automated Software Testing) framework.

    View the full advisory

    Continue Reading →

  • Denial of service vulnerability in SQLCipher SQL command processing

    12 Nov 2020 • Advisories

    A new critical denial of service vulnerability (Use CVE-2020-27207) in the SQLCipher SQL command processing of the master branch (https://github.com/sqlcipher) was discovered with a self-developed SQLCipher-FAST (Fast Automated Software Testing) framework.

    View the full advisory

    Continue Reading →

  • Wire Secure Messenger Remote Format String Vulnerability

    09 Nov 2020 • Advisories

    A Remote Format String Vulnerability in the Wire Secure Messenger (CVE-2020-27853) allows an attacker to cause a denial of service (application crash) or possibly execute arbitrary code via voice or video call. This affects Wire AVS (Audio, Video, and Signaling) 5.3 through 6.x before 6.4, the Wire Secure Messenger application before 3.49.918 for Android, and the Wire Secure Messenger application before 3.61 for iOS.

    Continue Reading →

  • ILIAS RCE Via PHP File Inclusion

    29 Sep 2020 • Advisories

    Two vulnerabilities in the ILIAS learning management < 5.4.10 system were found which can be chained together to achieve remote code execution via an authenticated user.

    Continue Reading →

  • Teamwire Pass Code Bypass

    31 Aug 2020 • Advisories

    A pass code bypass in the mobile application of Teamwire for Android allows an attacker with physical access to the phone to use the app without entering the valid pass code.

    Continue Reading →

« 1 2 3 4 5 6 7 »
Imprint • Disclaimer • Privacy Policy