Tag

Patching

All articles tagged with #patching

CISA Flags Four Actively Exploited Flaws in KEV Update and Urges Patch
security9 days ago

CISA Flags Four Actively Exploited Flaws in KEV Update and Urges Patch

CISA added four flaws to the Known Exploited Vulnerabilities catalog due to active exploitation: CVE-2026-2441 (Chrome use-after-free), CVE-2024-7694 (TeamT5 ThreatSonar Anti-Ransomware arbitrary file upload leading to command execution), CVE-2020-7796 (Zimbra Collaboration Server SSRF), and CVE-2008-0015 (Windows Video ActiveX buffer overflow). Google confirms an in-the-wild exploit for CVE-2026-2441; GreyNoise documents about 400 IPs exploiting CVE-2020-7796 across several countries; the CVE-2008-0015 exploit can download additional malware like Dogkild and alter system files/hosts. The TeamT5 exploitation vector remains unclear. Federal agencies are urged to patch by March 10, 2026.

BeyondTrust CVE-2026-1731 exploited in the wild; urgent patching and KEV updates
security13 days ago

BeyondTrust CVE-2026-1731 exploited in the wild; urgent patching and KEV updates

Threat actors are actively exploiting BeyondTrust CVE-2026-1731 (CVSS 9.9) in the wild by abusing get_portal_info to harvest the x-ns-company value before WebSocket setup, enabling unauthenticated remote code execution; BeyondTrust notes PRA v25.1+ do not require patching, while RS requires the BT26-02-RS patch (v21.3–25.3.1) and PRA patch (BT26-02-PRA, v22.1–24.X); watchTowr, GreyNoise/Defused Cyber, and Arctic Wolf report rapid activity and persistence attempts using SimpleHelp and PSexec; CISA added CVE-2026-1731 to KEV with federal patch deadlines by Feb 16, 2026, and KEV also lists other flaws (CVE-2026-20700, CVE-2025-15556, CVE-2025-40536, CVE-2024-43468).

CISA Tightens Patch Deadline for Actively Exploited VMware vCenter RCE
technology1 month ago

CISA Tightens Patch Deadline for Actively Exploited VMware vCenter RCE

CISA warns that the actively exploited VMware vCenter Server remote-code-execution flaw CVE-2024-37079 is being used in the wild and orders U.S. federal agencies to patch within three weeks, citing a DCERPC heap overflow that enables easy remote control with no user interaction. Broadcom notes there are no mitigations, advising immediate patches to the latest vCenter Server and Cloud Foundation releases.

"Urgent: Patch SolarWinds Serv-U Vulnerability Amid Active Exploits"
vulnerability-data-protection1 year ago

"Urgent: Patch SolarWinds Serv-U Vulnerability Amid Active Exploits"

A high-severity directory traversal vulnerability in SolarWinds Serv-U file transfer software (CVE-2024-28995) is being actively exploited, allowing attackers to read sensitive files. The flaw affects all versions up to Serv-U 15.4.2 HF 1 and has been patched in version 15.4.2 HF 2. Users are urged to update immediately to mitigate potential threats, as public proof-of-concept exploits make it easy for attackers to leverage this vulnerability.

CISA Warns of Active Exploits in Apache Flink and NextGen Healthcare Flaws
cybersecurity1 year ago

CISA Warns of Active Exploits in Apache Flink and NextGen Healthcare Flaws

A three-year-old improper access control bug in Apache Flink, CVE-2020-17519, is being actively exploited, prompting the US government to add it to the Known Exploited Vulnerabilities Catalog. Federal agencies must patch or stop using the software by June 13, and all users should ensure they are updated and check for potential compromises. The flaw allows attackers to read any file on the JobManager's local filesystem via the REST interface, and its exploitation underscores the critical need for timely software updates.

"Critical Security Patches Address Flaws in Cisco Unified Communications and Networking Products"
cyber-threat-network-security2 years ago

"Critical Security Patches Address Flaws in Cisco Unified Communications and Networking Products"

Cisco, Fortinet, and VMware have released critical security patches to address multiple vulnerabilities in their products, including CSRF attacks on Cisco Expressway Series, bypasses for a critical flaw in FortiSIEM supervisor, and moderate-to-important severity flaws in VMware Aria Operations for Networks. Organizations are urged to apply the patches promptly to mitigate the risks associated with these vulnerabilities.

"Urgent Patching: Critical Vulnerabilities Found in Citrix, VMware, and Atlassian Products"
cybersecurity2 years ago

"Urgent Patching: Critical Vulnerabilities Found in Citrix, VMware, and Atlassian Products"

CISA has directed U.S. federal agencies to address recently patched Citrix NetScaler and Google Chrome zero-day vulnerabilities, with a focus on fixing a Citrix remote code execution (RCE) bug within a week. Citrix has advised immediate patching of affected appliances, and CISA has mandated specific timelines for patching vulnerable devices within federal agencies. The cybersecurity agency has also urged all organizations, including private companies, to prioritize patching these security flaws.

"Critical Perforce Server Vulnerabilities Expose Network Takeover and System Control"
technology2 years ago

"Critical Perforce Server Vulnerabilities Expose Network Takeover and System Control"

Microsoft has identified and disclosed four vulnerabilities in Perforce Helix Core Server, including a critical remote code execution bug. The flaws have been patched by Perforce in version 2023.1/2513900, and users are urged to update immediately. Exploitation of the critical vulnerability could give unauthenticated attackers complete control over unpatched systems and connected infrastructure. Microsoft recommends basic security hygiene measures and specific steps for securing Perforce Server, such as using a VPN, issuing TLS certificates, logging all access, and configuring alerts.

CISA Urges Immediate Patching for Juniper Networking Devices Amid Active Exploits
cybersecurity2 years ago

CISA Urges Immediate Patching for Juniper Networking Devices Amid Active Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to federal agencies to secure their Juniper devices against four vulnerabilities that are being actively exploited in remote code execution (RCE) attacks. Juniper has confirmed that the flaws in its J-Web interface have been successfully exploited in the wild. The ShadowServer threat monitoring service has already detected exploitation attempts, and over 10,000 Juniper devices with vulnerable J-Web interfaces are exposed online. Administrators are urged to upgrade JunOS or restrict Internet access to the J-Web interface. CISA has added the vulnerabilities to its Known Exploited Vulnerabilities Catalog, and federal agencies must secure their Juniper devices within the next four days.

cybersecurity2 years ago

"Unpatched Vulnerabilities: A Growing Threat in 2022"

The Cybersecurity and Infrastructure Security Agency (CISA) and other international cybersecurity agencies have released a joint advisory detailing the top routinely exploited vulnerabilities in 2022. Malicious cyber actors have been targeting older software vulnerabilities and unpatched, internet-facing systems. The advisory provides recommendations for vendors, designers, developers, and end-user organizations to mitigate the risk of compromise. The top 12 vulnerabilities include Fortinet SSL VPNs, Microsoft Exchange email servers (ProxyShell), Zoho ManageEngine ADSelfService Plus, Atlassian Confluence Server, Apache's Log4j library (Log4Shell), and VMware Workspace ONE Access. Additional vulnerabilities were also identified, emphasizing the importance of timely patching and implementing security measures.

Rising Concerns: MOVEit Transfer Software Faces Multiple Critical Flaws and Breaches
cybersecurity2 years ago

Rising Concerns: MOVEit Transfer Software Faces Multiple Critical Flaws and Breaches

Progress Software has patched a critical SQL injection vulnerability, CVE-2023-36934, in its MOVEit Transfer software, which could allow unauthenticated attackers to gain unauthorized access to the database. This vulnerability is particularly dangerous as it can be exploited without valid credentials. Two other high-severity vulnerabilities, CVE-2023-36932 and CVE-2023-36933, have also been addressed in the update. Users are advised to update to the latest version of MOVEit Transfer to mitigate the risks associated with these vulnerabilities.

Hackers Exploit Zero-Day Vulnerability in MOVEit Transfer for Data Theft
cybersecurity2 years ago

Hackers Exploit Zero-Day Vulnerability in MOVEit Transfer for Data Theft

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch their systems by June 23 to fix an actively exploited SQL injection vulnerability in Progress MOVEit Transfer, a managed file transfer solution. The flaw allows remote attackers to access the database and execute arbitrary code. Threat actors have been exploiting the vulnerability since at least May 27, with mass exploitation and data theft occurring. Private companies are also advised to prioritize securing their systems against the flaw. Progress advises all customers to patch their MOVEit Transfer instances or disable HTTP and HTTPS traffic to remote the attack surface.

US Govt and Apple Issue Urgent Patches for iPhone Vulnerabilities
cybersecurity2 years ago

US Govt and Apple Issue Urgent Patches for iPhone Vulnerabilities

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has ordered federal agencies to patch three recently discovered zero-day flaws affecting iPhones, Macs, and iPads that have been exploited in attacks. The bugs allow attackers to access sensitive information and execute arbitrary code. Apple has acknowledged that the flaws may have been actively exploited. The affected devices include iPhones 6s and later, iPads, Macs, Apple Watches, and Apple TVs. The bugs were addressed in recent updates, and federal agencies must apply the patches by June 12th, 2023. The flaws were likely exploited in state-sponsored spyware attacks.