Articles tagged "Critical"

Found 363 articles

JumpCloud Remote Assist Flaw Lets Users Gain Full Control of Company Devices

Hackread – Cybersecurity News, Data Breaches, AI, and More

A serious vulnerability identified as CVE-2025-34352 affects the JumpCloud Remote Assist for Windows agent, allowing local users to gain full SYSTEM privileges on company devices. Discovered by XM Cyber, this flaw poses a significant risk to organizations using the software, as it could enable unauthorized access and control over sensitive company systems. Businesses are strongly urged to update their JumpCloud software to version 0.317.0 or later to mitigate this high-severity security issue. Failure to address this vulnerability could lead to severe operational disruptions and data breaches. Immediate action is crucial to ensure the safety and integrity of company devices and networks.

Impact: JumpCloud Remote Assist for Windows, versions prior to 0.317.0
Remediation: Update to JumpCloud Remote Assist version 0.317.0 or later
Read Original

Fortinet FortiGate devices are currently under active attack due to two recently disclosed vulnerabilities, CVE-2025-59718 and CVE-2025-59719, which allow for authentication bypass through malicious single sign-on (SSO) logins. Cybersecurity firm Arctic Wolf reported observing these attacks on December 12, 2025, just days after the vulnerabilities were made public. This situation poses significant risks for organizations using FortiGate appliances, as attackers can potentially gain unauthorized access to sensitive systems. Companies using these devices should take immediate action to protect their networks and data from these ongoing intrusions.

Impact: Fortinet FortiGate devices, specifically those vulnerable to CVE-2025-59718 and CVE-2025-59719.
Remediation: Organizations should apply security patches released by Fortinet for the affected FortiGate devices. Additionally, it is advisable to review and strengthen SSO configurations and monitor logs for any unusual login attempts.
Read Original

Cybercriminals are currently exploiting two serious authentication bypass vulnerabilities in FortiGate appliances. These flaws allow unauthorized access to systems, putting sensitive data at risk for organizations using these devices. Fortinet has confirmed that these vulnerabilities are being actively exploited in the wild, making it urgent for users to take action. Companies that rely on FortiGate appliances should prioritize applying available patches and updates to protect against potential intrusions. The situation underscores the need for vigilance in maintaining security measures, especially with rapidly evolving threats.

Impact: FortiGate appliances
Remediation: Users should apply the latest patches and updates provided by Fortinet to mitigate these vulnerabilities.
Read Original

Atlassian has addressed a significant security vulnerability in Apache Tika, which affects several of its products including Bamboo, Bitbucket, Confluence, Crowd, Fisheye/Crucible, and Jira. This flaw poses a risk as it could potentially allow attackers to exploit the software, putting user data at risk. The company has released software updates to patch the vulnerability, urging users to apply these updates promptly to ensure their systems remain secure. This incident underscores the importance of regularly updating software to protect against known vulnerabilities. Users of the affected products should prioritize these updates to safeguard their environments from potential exploitation.

Impact: Bamboo, Bitbucket, Confluence, Crowd, Fisheye/Crucible, Jira
Remediation: Software updates released by Atlassian for affected products.
Read Original

MITRE has released its Top 25 list of dangerous software weaknesses for 2025, based on an analysis of nearly 40,000 Common Vulnerabilities and Exposures (CVEs). This list identifies the most critical flaws that could be exploited by attackers, affecting a wide range of software and hardware products. Developers and organizations need to be aware of these vulnerabilities to improve their security measures and protect against potential breaches. The findings serve as a crucial resource for cybersecurity professionals aiming to prioritize their efforts in addressing these weaknesses. By understanding and mitigating these risks, companies can better safeguard their systems and data from malicious actors.

Impact: Various software and hardware products
Remediation: Organizations should review the Top 25 CWE list and implement necessary security measures to address identified weaknesses.
Read Original
Actively Exploited

In December 2025, researchers identified a serious vulnerability in React, designated as CVE-2025-55182, which has led to a surge in attacks on services that use React2Shell. This vulnerability affects numerous applications built with the React framework, making them targets for malicious actors. Attackers are exploiting this flaw to gain unauthorized access to systems, which could lead to data breaches or service disruptions. Organizations utilizing React-enabled services are urged to take immediate action to safeguard their systems. The situation is critical, as the exploitation of this vulnerability poses significant risks to businesses and users globally.

Impact: React2Shell applications, React framework versions affected are not specified.
Remediation: Organizations should apply the latest security patches for the React framework, conduct vulnerability assessments, and implement monitoring to detect any suspicious activities. Regular updates and reviews of security protocols are also recommended to mitigate risks.
Read Original

MITRE has released its 2025 list of the top 25 most dangerous software vulnerabilities, with Cross-Site Scripting (XSS) taking the top spot. It is followed by SQL injection and Cross-Site Request Forgery (CSRF). Other notable vulnerabilities include buffer overflow issues and improper access control. This list serves as a critical resource for developers and security professionals to understand the most pressing risks to their applications. By addressing these vulnerabilities, organizations can significantly reduce their exposure to cyberattacks that exploit these weaknesses.

Impact: N/A
Remediation: Organizations should implement secure coding practices and regularly update their software to mitigate these vulnerabilities.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent directive for U.S. federal agencies to patch a serious vulnerability found in GeoServer. This flaw is being exploited in XML External Entity (XXE) injection attacks, which can allow attackers to access sensitive data. The exploitation of this vulnerability poses a significant risk to the integrity and confidentiality of systems using GeoServer. Agencies are advised to take immediate action to defend against potential breaches and secure their data. Given that this vulnerability is actively being exploited, it is crucial for affected organizations to prioritize the necessary updates to protect their networks from compromise.

Impact: GeoServer versions affected by the vulnerability; U.S. federal agencies using GeoServer.
Remediation: CISA has ordered federal agencies to apply the latest patches for GeoServer to mitigate the risk associated with the vulnerability. Specific patch numbers or version updates were not mentioned in the article.
Read Original

The React team has identified and patched two significant vulnerabilities in React Server Components (RSC) that could lead to denial-of-service (DoS) attacks and exposure of source code. These issues were uncovered by security researchers while they were probing the existing patches for a previously disclosed critical bug (CVE-2025-55182) that had a CVSS score of 10.0, indicating its severity. This situation is concerning as it affects developers using React for building applications, potentially putting sensitive code at risk. The React team emphasizes the importance of applying these patches promptly to maintain application security.

Impact: React Server Components (RSC) in various applications utilizing React framework.
Remediation: Users should apply the latest patches provided by the React team to address these vulnerabilities. Specific patch numbers or versions were not mentioned in the article, but it is essential to keep the React framework updated to the latest version.
Read Original

Hackers have taken advantage of a zero-day vulnerability in Gogs, a self-hosted Git service, leading to the compromise of approximately 700 servers that are accessible over the internet. This vulnerability allows attackers to execute code remotely, posing a significant risk to organizations and individuals using this platform to manage their Git repositories. Gogs, which is known for its lightweight and easy-to-deploy nature, is now under scrutiny as users scramble to secure their systems. The incident highlights the importance of promptly applying security updates and monitoring for unusual activity. Without swift action, affected servers could lead to data breaches or unauthorized access to sensitive information.

Impact: Gogs self-hosted Git service
Remediation: Users should apply any available patches for Gogs, review server configurations, and consider implementing network security measures to limit exposure.
Read Original

Danielle Hillmer, a former employee of Accenture, has been charged with fraud related to cybersecurity practices. The allegations state that she knowingly misled clients about the company's cloud platform, claiming it met the Department of Defense's requirements when it did not. This situation raises concerns about the integrity of cybersecurity measures in handling sensitive government data. If proven guilty, Hillmer could face serious penalties, and the case underscores the importance of transparency in cybersecurity services, especially for clients in critical sectors like defense. This incident may also prompt reviews of compliance protocols within companies that serve government contracts.

Impact: Accenture's cloud platform
Remediation: N/A
Read Original

Cybersecurity experts are reporting a surge in malware attacks exploiting a serious vulnerability in the React library, known as React2Shell. This vulnerability allows attackers to execute code remotely without authentication, putting many applications at risk. React is widely used for building user interfaces, meaning a broad range of developers and companies could be affected. The situation is concerning as it opens the door for various types of malware to be deployed against unsuspecting users. Companies using React should take immediate action to assess their systems and implement security measures to protect against these attacks.

Impact: React library versions affected by the React2Shell vulnerability.
Remediation: Developers should update to the latest version of the React library and apply any available security patches. Regular security audits and code reviews are also recommended to identify and mitigate potential vulnerabilities.
Read Original

IBM has addressed more than 100 vulnerabilities this week, with many of these issues stemming from third-party dependencies. Among the vulnerabilities, some were classified as critical, which means they could potentially allow attackers to exploit systems if left unpatched. This patching effort is crucial for organizations that rely on IBM software and services, as unaddressed vulnerabilities can lead to severe security breaches. Users should ensure they update their systems to the latest versions to protect against possible exploits. Regular updates and patches are essential in maintaining cybersecurity hygiene.

Impact: IBM software and services relying on third-party dependencies.
Remediation: Users should apply the latest patches and updates provided by IBM for their affected software.
Read Original

The article discusses a significant issue related to data leakage within AI systems, where sensitive information unintentionally slips through the cracks due to flaws in the underlying architectures. Researchers are increasingly concerned about how these vulnerabilities can lead to unauthorized access to private data, affecting both individuals and organizations relying on AI technology. This situation raises serious questions about data privacy and security, especially as AI becomes more integrated into everyday applications. The article emphasizes the need for developers to address these plumbing problems to prevent leaks that could have dire consequences for users and businesses alike. As AI continues to evolve, ensuring that these systems are secure is more critical than ever.

Impact: AI systems, machine learning models
Remediation: Implementing stricter data handling protocols and reviewing AI system architectures for vulnerabilities
Read Original

Researchers have identified a significant surge in attacks linked to a vulnerability in React2Shell, with more than 50 confirmed victims to date. This issue stems from a critical defect that has left many systems exposed, as reports indicate that about half of these vulnerable instances remain unpatched. The rapid exploitation of this flaw underscores the urgency for affected organizations to take immediate action to secure their systems. Companies using React2Shell need to prioritize updates and patch deployments to mitigate these risks. Failure to address this vulnerability could lead to more widespread damage and data breaches as attackers continue to exploit the flaw in the wild.

Impact: React2Shell
Remediation: Organizations should apply the latest patches and updates for React2Shell as soon as possible to protect against exploitation.
Read Original
PreviousPage 19 of 25Next