A serious vulnerability has been discovered in Fortinet's Security Information and Event Management (SIEM) solution, FortiSIEM, which allows remote, unauthenticated attackers to execute arbitrary commands. This flaw, classified as a command injection vulnerability, poses a significant risk as it can be exploited without needing any prior access. Researchers have released technical details and exploit code, raising concerns about the potential for widespread attacks. Companies using FortiSIEM should take immediate action to secure their systems, as the implications of this vulnerability could lead to unauthorized access and data breaches. It's crucial for users to stay informed and apply any necessary patches or updates as they become available.
Articles tagged "Vulnerability"
Found 206 articles
A recently discovered vulnerability known as Reprompt poses a significant risk to users of Copilot, a popular AI-powered tool. This flaw allows attackers to gain control over the Copilot interface and access sensitive user data, even after the chat session has ended. The implications of this vulnerability are serious, as it can potentially expose personal information and compromise user privacy. Users of Copilot should be aware of this issue and take necessary precautions to protect their data. Security experts recommend monitoring for any suspicious activity related to Copilot accounts until a fix is implemented.
Fortinet has addressed a severe vulnerability in its FortiSIEM product that could allow attackers to execute arbitrary code without authentication. This flaw, known as CVE-2025-64155, has a CVSS score of 9.4, highlighting its potential impact on affected systems. The vulnerability arises from improper handling of special elements in OS commands, which could be exploited by malicious actors. Organizations using FortiSIEM should prioritize applying the latest updates to protect their systems. The existence of such vulnerabilities emphasizes the need for ongoing vigilance in maintaining security protocols and software updates.
The Department of Education in Victoria, Australia, has informed parents that hackers have accessed a database containing personal information of both current and former students. This breach raises serious concerns about the security of sensitive data, as it may include details like names, addresses, and potentially more sensitive information. The incident highlights the vulnerability of educational institutions to cyberattacks, which can compromise the privacy of thousands of students. Parents and guardians are being urged to remain vigilant and monitor for any suspicious activities related to their children's information. This situation serves as a reminder of the importance of cybersecurity measures in protecting personal data in schools.
Node.js has issued urgent updates to address a serious vulnerability that affects nearly all production applications using the platform. The flaw, related to the async_hooks module, can lead to a stack overflow, resulting in a denial-of-service (DoS) condition. This means that if attackers exploit this vulnerability, they could crash servers running affected applications, disrupting services. Developers and companies using Node.js should prioritize applying these patches to maintain service availability and prevent potential outages. The vulnerability is especially concerning because it touches on core functionality that many frameworks rely on for stability.
SCM feed for Latest
A serious vulnerability has been identified in multiple versions of the Apache Struts 2 framework, tracked as CVE-2025-68493. This XML external entity injection flaw could allow attackers to gain unauthorized access to sensitive data, cause denial-of-service attacks, or execute server-side request forgery (SSRF) attacks. Organizations using affected versions of Apache Struts 2 are at risk, which could lead to significant data breaches and disruptions. The issue emphasizes the need for developers and system administrators to ensure their applications are updated and secure against such vulnerabilities. Immediate action is necessary to mitigate potential exploitation.
SCM feed for Latest
The Cybersecurity and Infrastructure Security Agency (CISA) has added a serious vulnerability in the open-source Git service Gogs to its Known Exploited Vulnerabilities catalog. This flaw, identified as CVE-2025-8110, is a path traversal issue that attackers are actively exploiting. Organizations using Gogs should be particularly vigilant, as this vulnerability allows unauthorized access to sensitive files on affected systems. The inclusion in CISA's catalog highlights the urgency for users to address this issue promptly, as it can lead to significant security breaches if not mitigated. Companies relying on Gogs for version control must prioritize patching this vulnerability to protect their data.
ServiceNow has revealed a significant vulnerability linked to its legacy chatbot, which has recently been upgraded with agentic AI capabilities. This flaw has put customer data and connected systems at risk, potentially allowing unauthorized access and exploitation. The issue arises from the integration of AI into an older system that lacked adequate security measures. As a result, businesses using ServiceNow's platform may face serious data breaches if the vulnerability is not addressed promptly. This incident serves as a crucial reminder for companies to continually assess the security of their systems, especially when implementing new technologies.
Central Maine Healthcare (CMH) suffered a significant data breach last year, compromising the personal information of over 145,000 individuals. The breach exposed sensitive data, including names, birth dates, Social Security numbers, and medical records, raising concerns about identity theft and privacy violations. CMH has stated that they are taking steps to enhance their security measures, but the incident underscores the vulnerability of healthcare organizations to cyber attacks. Affected individuals have been advised to monitor their accounts for any suspicious activity. This breach serves as a reminder of the importance of robust data protection in the healthcare sector, where sensitive information is frequently targeted by cybercriminals.
SCM feed for Latest
Hackers have reportedly leaked parts of Target's internal source code and developer documentation on Gitea, a self-hosted Git service. The threat actor created multiple repositories that allegedly contain sensitive information related to Target's operations. This incident raises significant concerns about the security of Target's systems and the potential misuse of the leaked code. If the claims are verified, it could lead to increased vulnerability for Target and its customers, as attackers may exploit the leaked information to launch further attacks or create malicious software. Companies need to be vigilant about their internal data security to prevent such leaks from occurring.
ServiceNow has addressed a significant flaw in its AI platform that could allow attackers to impersonate users. The company claims there is no evidence that this vulnerability was exploited before the patch was released in October. However, security researchers warn that the configuration of AI agents could still lead to prompt-injection style abuses, which could potentially compromise user accounts. This situation raises concerns about the security of AI systems and the risks they pose if not properly configured. Organizations using ServiceNow's AI features should ensure they implement the latest updates to mitigate any potential risks.
ServiceNow has reported a serious security vulnerability in its AI Platform that could allow an unauthenticated user to impersonate another user and take actions on their behalf. This flaw, identified as CVE-2025-12420, has a high severity rating of 9.3 out of 10, indicating a significant risk to users. The potential for impersonation means that attackers could exploit this weakness to gain unauthorized access to sensitive information or perform harmful actions. Organizations using ServiceNow's AI Platform should prioritize applying the patch to mitigate this risk and protect their users. The quick response from ServiceNow in addressing this vulnerability is crucial to maintaining trust in their services.
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive for federal agencies to address a serious vulnerability in Gogs, an open-source Git service. This flaw has already been exploited in zero-day attacks, which means attackers took advantage of it before it was publicly known. Government systems using Gogs are particularly at risk, and CISA's mandate aims to prevent further exploitation. It's crucial for agencies to apply the necessary patches to protect their data and operations from potential breaches. Ignoring this could lead to significant security incidents, given the active nature of the attacks targeting this vulnerability.
Security Affairs
Meta has addressed a vulnerability in Instagram that allowed unauthorized parties to send password reset emails. This flaw raised concerns about potential account takeovers, as attackers could exploit it to gain access to user accounts. Despite claims of leaked data, Meta has denied any data breach, stating they have only fixed the reset issue. Users should be aware of this vulnerability, especially if they received unexpected password reset emails, as it indicates the possibility of malicious activity. It's important for users to enable additional security measures, such as two-factor authentication, to further protect their accounts.
Instagram recently addressed a vulnerability that allowed unauthorized third parties to send password reset emails to users. This issue raised concerns about user security and the potential for unauthorized access to accounts, which could lead to data breaches or identity theft. The platform has confirmed that they have fixed the flaw, but the incident highlights ongoing risks associated with account management and security on social media. Users are urged to remain vigilant and consider changing their passwords regularly to enhance their security. This incident serves as a reminder of the importance of robust security measures in protecting personal information online.