HomeVulnerabilityCISA Provides 4 Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by...

CISA Provides 4 Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Tuesday added 4 security flaws to its Recognized Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation within the wild.

The checklist of vulnerabilities is as follows –

  • CVE-2024-45195 (CVSS rating: 7.5/9.8) – A pressured looking vulnerability in Apache OFBiz that permits a distant attacker to acquire unauthorized entry and execute arbitrary code on the server (Fastened in September 2024)
  • CVE-2024-29059 (CVSS rating: 7.5) – An data disclosure vulnerability in Microsoft .NET Framework that might expose the ObjRef URI and result in distant code execution (Fastened in March 2024)
  • CVE-2018-9276 (CVSS rating: 7.2) – An working system command injection vulnerability in Paessler PRTG Community Monitor that permits an attacker with administrative privileges to execute instructions through the PRTG System Administrator internet console (Fastened in April 2018)
  • CVE-2018-19410 (CVSS rating: 9.8) – A neighborhood file inclusion vulnerability in Paessler PRTG Community Monitor that permits a distant, unauthenticated attacker to create customers with read-write privileges (Fastened in April 2018)
Cybersecurity

Though these shortcomings have since been addressed by the respective distributors, there are at present no public experiences about how they could have been exploited in real-world assaults.

See also  The Largest Takeaways from Current Malware Attacks

Federal Civilian Govt Department (FCEB) businesses have been urged to use the mandatory fixes by February 25, 2025, to safeguard in opposition to energetic threats.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular