Aggregator
CVE-2024-3772 | Pydantic up to 1.10.12/2.3.x Email redos (FEDORA-2024-fc5dc50bb6 / Nessus ID 214905)
CVE-2024-27137 | Apache Cassandra up to 4.0.14/4.1.7/5.0.2 RMI Registry deserialization
CISA Adds Four Known Exploited Vulnerabilities to Catalog
CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-45195 Apache OFBiz Forced Browsing Vulnerability
- CVE-2024-29059 Microsoft .NET Framework Information Disclosure Vulnerability
- CVE-2018-9276 Paessler PRTG Network Monitor OS Command Injection Vulnerability
- CVE-2018-19410 Paessler PRTG Network Monitor Local File Inclusion Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
CISA Partners with ASD’s ACSC, CCCS, NCSC-UK, and Other International and US Organizations to Release Guidance on Edge Devices
CISA—in partnership with international and U.S. organizations—released guidance to help organizations protect their network edge devices and appliances, such as firewalls, routers, virtual private networks (VPN) gateways, Internet of Things (IoT) devices, internet-facing servers, and internet-facing operational technology (OT) systems. The published guidance is as follows:
- “Security Considerations for Edge Devices,” led by the Canadian Centre for Cyber Security (CCCS), a part of the Communications Security Establishment Canada.
- “Digital Forensics Monitoring Specifications for Products of Network Devices and Applications,” led by the United Kingdom’s National Cyber Security Centre (NCSC-UK).
- “Mitigation Strategies for Edge Devices: Executive Guidance” and “Mitigation Strategies for Edge Devices: Practitioner Guidance,” two separate guides led by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC).
Foreign adversaries routinely exploit software vulnerabilities in network edge devices to infiltrate critical infrastructure networks and systems. The damage can be expensive, time-consuming, and reputationally catastrophic for public and private sector organizations. These guidance documents detail various considerations and strategies for a more secure and resilient network both before and after a compromise.
CISA and partner agencies urge device manufacturers and critical infrastructure owners and operators to review and implement the recommended actions and mitigations in the publications. Device manufacturers, please visit CISA’s Secure by Design page for more information on how to align development processes with the goal of reducing the prevalence of vulnerabilities in devices. Critical infrastructure owners and operators, please see Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products for guidance on procuring secure products.
CISA Releases Nine Industrial Control Systems Advisories
CISA released nine Industrial Control Systems (ICS) advisories on February 4, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-035-01 Western Telematic Inc NPS Series, DSM Series, CPM Series
- ICSA-25-035-02 Rockwell Automation 1756-L8zS3 and 1756-L3zS3
- ICSA-25-035-03 Elber Communications Equipment
- ICSA-25-035-04 Schneider Electric Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC
- ICSA-25-035-05 Schneider Electric Web Designer for Modicon
- ICSA-25-035-06 Schneider Electric Modicon M340 and BMXNOE0100/0110, BMXNOR0200H
- ICSA-25-035-07 Schneider Electric Pro-face GP-Pro EX and Remote HMI
- ICSA-25-035-08 AutomationDirect C-more EA9 HMI
- ICSA-23-299-03 Ashlar-Vellum Cobalt, Graphite, Xenon, Argon, Lithium (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
Surge in Infostealer Attacks Threatens EMEA Organizations' Data Security
CVE-2025-20033 | Mattermost up to 9.11.5/10.0.3/10.1.3/10.2.0/10.3.0 improper validation of specified type of input (Nessus ID 214906)
CVE-2025-22445 | Mattermost up to 10.2.x Setting unusual condition (Nessus ID 214906)
CVE-2024-56323 | OpenFGA up to 1.8.2 improper authorization (Nessus ID 214906)
CVE-2024-56138 | notaryproject notation-go up to 1.3.0-rc.1 improper check for certificate revocation (Nessus ID 214906)
CVE-2025-20621 | Mattermost up to 2.23.0/9.11.5/10.0.3/10.1.3/10.2.0 improper validation of specified type of input (Nessus ID 214906)
CVE-2024-10929 | ARM Cortex-A72/Cortex-A73/Cortex-A75 prior r1p0 Privilege Escalation (Nessus ID 214925)
Молчание – золото: школы США превратились в идеальную цель для вымогателей
恶意Go包利用模块镜像缓存实现持久远程访问
Интеграция IDE-плагинов и PT Application Inspector: новый уровень командной работы при поиске уязвимостей
Amazon Introduces Redshift Security Features to Prevent Data Leaks
Amazon Web Services (AWS) has announced significant updates to its popular data warehousing service, Amazon Redshift, with the introduction of enhanced security features aimed at minimizing data leaks and unauthorized access. These new default settings strengthen the security posture of newly created Redshift clusters and align with industry best practices for safeguarding sensitive data. The […]
The post Amazon Introduces Redshift Security Features to Prevent Data Leaks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Громкий арест в Польше: экс-министр юстиции ответит за слежку с использованием Pegasus
Texas to Establish Cyber Command Amid “Dramatic” Rise in Attacks
Casio UK site compromised, equipped with web skimmer
Japanese electronics maker Casio has had its UK website injected with a web skimmer that collected buyers’ personal and payment card information, Jscrambler has discovered. The company says that the same skimmer has been added to at least seventeen (and possibly more) websites, but refrained from disclosing the names. “All the victims were loading a skimmer script from the same hosting provider in Russia. It was also observed that even though the skimming domains could … More →
The post Casio UK site compromised, equipped with web skimmer appeared first on Help Net Security.