Articles tagged "Critical"

Found 577 articles

OpenSSL has patched 12 vulnerabilities, including a critical remote code execution (RCE) flaw that poses a significant risk to users. These vulnerabilities mainly arise from issues related to memory safety, parsing robustness, and resource handling. Affected products include various versions of OpenSSL, which is widely used across different platforms and applications. This is particularly concerning for organizations that rely on OpenSSL for secure communications, as attackers could exploit these flaws to gain unauthorized access or control over systems. Users and administrators are urged to apply the latest patches to mitigate these risks and protect their systems from potential exploitation.

Impact: OpenSSL versions affected include 1.0.2, 1.1.1, and 3.0.0.
Remediation: Users should update to the latest version of OpenSSL to address these vulnerabilities. Specific patch numbers were not provided.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued new guidance focusing on insider threats, which pose a serious risk to organizations, particularly within critical infrastructure sectors. CISA emphasizes the need for organizations to form multi-disciplinary teams to effectively manage these threats. This guidance comes amid growing concerns about the potential misuse of artificial intelligence by insiders. By providing an infographic, CISA aims to help organizations understand how to better identify and mitigate these risks, ensuring a more secure operational environment. This is crucial as insider threats can lead to significant data breaches and operational disruption, affecting not only the organizations themselves but also the broader public they serve.

Impact: N/A
Remediation: Organizations should establish multi-disciplinary insider threat management teams as recommended by CISA.
Read Original

The Biden administration has decided to repeal two memorandums that set software security requirements for federal agencies. This move has been described as a way to reduce what the White House calls 'burdensome' regulations. While the memorandums are no longer in effect, some of the resources they provided can still be accessed by government organizations. The decision raises concerns about the overall security of software used by federal agencies, as these rules were designed to enhance security practices in software development and procurement. The implications of this change could affect how government entities approach software security moving forward, potentially leading to vulnerabilities in critical systems.

Impact: Federal software security practices
Remediation: N/A
Read Original

SmarterTools has released patches for two vulnerabilities in its SmarterMail email software, one of which is classified as critical. This flaw, identified as CVE-2026-24423, has a CVSS score of 9.3 and could allow attackers to execute arbitrary code on systems running affected versions of SmarterMail. Users of SmarterMail versions prior to build 9511 are particularly at risk. It's crucial for organizations using this software to update immediately to protect against potential exploitation. The existence of such a high-severity vulnerability underscores the importance of regular software updates and vigilance in cybersecurity practices.

Impact: SmarterMail versions prior to build 9511
Remediation: Users should update to SmarterMail build 9511 or later to mitigate the risks associated with this vulnerability.
Read Original

A recent cyberattack linked to Russian hackers, specifically the Sandworm/Electrum group, has targeted the Polish power grid, affecting communication and control systems at 30 different sites. As a result of this intrusion, several Industrial Control Systems (ICS) devices have been rendered inoperable, or 'bricked.' This incident raises concerns not only about the immediate impact on Poland's energy infrastructure but also about the broader implications for critical infrastructure security across Europe. The attack reflects ongoing tensions in the region and highlights vulnerabilities in essential services that could have far-reaching consequences if exploited further.

Impact: Polish power grid, Industrial Control Systems (ICS) devices
Remediation: N/A
Read Original
Actively Exploited

Ivanti has released patches for two critical vulnerabilities in its EPMM (Enterprise Mobile Management) software that could let attackers execute arbitrary code remotely without authentication. These vulnerabilities are serious because they can be exploited by anyone with internet access to take control of affected systems. Organizations using the EPMM platform should prioritize applying these updates to prevent potential breaches. The vulnerabilities were discovered to be actively exploited in the wild, which means companies are at risk if they do not take immediate action. This incident underscores the need for regular software updates and vigilance in cybersecurity practices.

Impact: Ivanti EPMM software
Remediation: Apply the latest patches provided by Ivanti for the EPMM software.
Read Original

Ivanti has revealed two serious vulnerabilities in its Endpoint Manager Mobile (EPMM) software, identified as CVE-2026-1281 and CVE-2026-1340. These vulnerabilities are currently being exploited in zero-day attacks, meaning attackers have already taken advantage of them before any fix was made available. Organizations using EPMM are at risk, as these flaws could allow unauthorized access to sensitive mobile device management functions. The situation is urgent, as the vulnerabilities are actively being exploited in the wild, which could lead to data breaches or unauthorized control over managed devices. Users and companies are advised to monitor for updates and take immediate action to secure their systems.

Impact: Ivanti Endpoint Manager Mobile (EPMM)
Remediation: Users should apply any available patches or updates from Ivanti as soon as they are released. In the meantime, organizations are advised to limit access to the EPMM software and monitor for unusual activity.
Read Original

Recent vulnerabilities have been discovered in n8n, a widely used AI automation platform. These flaws could allow attackers to take control of servers and steal sensitive user credentials. This poses a significant risk to businesses that rely on n8n for automating workflows and managing data. If exploited, these vulnerabilities could lead to unauthorized access and data breaches, potentially impacting customer trust and company reputation. Users of n8n should take immediate action to secure their systems and monitor for any suspicious activity.

Impact: n8n automation platform
Remediation: Users are advised to apply security patches as they become available and review their system configurations for any vulnerabilities.
Read Original

Zscaler's recent testing has revealed alarming vulnerabilities in enterprise AI systems, finding that 90% of these systems have critical weaknesses that can be exploited in less than 90 minutes. The research indicates that the median time to experience a critical failure is just 16 minutes. This poses a significant risk for businesses relying on AI technology, as attackers could potentially compromise their systems before adequate defenses are put in place. With the growing adoption of AI in various sectors, companies need to be aware of these vulnerabilities and take immediate action to secure their systems. The findings serve as a wake-up call for organizations to assess their AI infrastructure and implement stronger security measures.

Impact: Enterprise AI systems
Remediation: Organizations should conduct security assessments of their AI systems and implement stronger security protocols to mitigate vulnerabilities.
Read Original

SolarWinds has addressed four critical vulnerabilities found in their Web Help Desk software that could allow attackers to execute code remotely or bypass authentication. These flaws can be exploited without requiring any user credentials, posing a serious risk to organizations using the software. Companies that rely on Web Help Desk should prioritize applying the latest patches to protect their systems from potential attacks. The vulnerabilities were disclosed recently, making immediate action essential to prevent exploitation. Users and administrators are urged to check for updates and ensure their installations are secure.

Impact: SolarWinds Web Help Desk software
Remediation: Users should apply the latest patches provided by SolarWinds for Web Help Desk.
Read Original

In late December, Poland's energy grid experienced a coordinated cyberattack that affected around 30 facilities nationwide. The attackers targeted various distributed energy resources, including combined heat and power plants, as well as wind and solar energy systems. This incident raises concerns about the security of critical infrastructure, as energy systems are essential for everyday life and economic stability. The attack not only disrupted operations but also highlighted vulnerabilities in the energy sector that could be exploited in the future. Authorities are likely to investigate the incident further to bolster defenses against potential future threats.

Impact: Combined heat and power (CHP) facilities, wind and solar dispatch systems
Remediation: N/A
Read Original

Fortinet has confirmed a new zero-day vulnerability that is allowing attackers to exploit single sign-on (SSO) authentication for malicious logins. In response to the ongoing attacks, the company has temporarily disabled FortiCloud SSO authentication across all devices to mitigate the risk. This means that users relying on this feature for secure access may face disruptions while Fortinet works on a solution. The situation is particularly concerning as it puts sensitive information at risk and could lead to unauthorized access to critical systems. Companies using Fortinet products should monitor the situation closely and be prepared to implement any updates once they are released.

Impact: FortiCloud SSO authentication
Remediation: Temporarily disabled FortiCloud SSO authentication for all devices
Read Original

SEC Consult has identified several security vulnerabilities in Dormakaba's exos 9300 access systems, including hardcoded credentials, weak passwords, and command injection flaws. These vulnerabilities could allow attackers to remotely unlock doors, posing a significant risk to physical security in facilities that rely on these systems. Dormakaba, a leading provider of access control solutions, serves a wide range of industries, meaning many organizations could be affected. Users of the exos 9300 need to be aware of these vulnerabilities and take immediate action to secure their systems to prevent unauthorized access. The findings emphasize the need for strong security practices in access control systems, especially in critical infrastructure.

Impact: Dormakaba exos 9300 access systems
Remediation: Users should change hardcoded credentials and implement stronger password policies. Regular security audits and updates should be performed to mitigate command injection risks.
Read Original

Researchers have identified two serious vulnerabilities in n8n, an open-source workflow automation tool, that could allow attackers to execute code remotely. These flaws are related to how n8n handles its sandboxing, which is supposed to isolate code execution for security. If exploited, these vulnerabilities could let malicious actors run arbitrary code on affected systems, potentially compromising sensitive data and system integrity. Users of n8n should take this issue seriously, as it poses significant risks to any workflows that utilize the platform. It's crucial for organizations to stay updated on these types of vulnerabilities to safeguard their operations.

Impact: n8n workflow automation tool
Remediation: Users should apply any available patches or updates from n8n and review their configurations to enhance security. Specific patch numbers or updates were not mentioned.
Read Original

Fortinet has issued patches for a serious vulnerability in its FortiOS software, identified as CVE-2026-24858, which has been actively exploited by attackers. This flaw allows unauthorized users to bypass Single Sign-On (SSO) authentication, posing a significant risk to organizations using affected systems. The vulnerability has a high CVSS score of 9.4, indicating its severity. It impacts several products, including FortiOS, FortiManager, and FortiAnalyzer. Companies utilizing these systems should prioritize applying the available patches to protect against potential breaches.

Impact: FortiOS, FortiManager, FortiAnalyzer
Remediation: Fortinet has started rolling out patches for CVE-2026-24858. Users are advised to apply these patches immediately to mitigate the risk of exploitation.
Read Original
PreviousPage 20 of 39Next