Articles tagged "RCE"

Found 58 articles

Recent vulnerabilities in Google Looker have raised serious concerns about security, particularly regarding cross-tenant remote code execution (RCE) and data exfiltration. Attackers could exploit these flaws to gain access to environments of other Google Cloud Platform (GCP) tenants by leveraging a compromised Looker user account. This means that sensitive data from multiple organizations could potentially be at risk, making it a significant threat for businesses relying on GCP services. The findings underscore the need for users and companies to review their security practices and ensure that they are protected against unauthorized access. As vulnerabilities like these can lead to major data breaches, prompt action is essential to safeguard sensitive information.

Impact: Google Looker, Google Cloud Platform (GCP)
Remediation: Users should review their access controls and monitor for unusual activity. Google may release patches or updates, but specific remediation steps are not detailed.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious vulnerability in SolarWinds Web Help Desk that is currently being exploited in active attacks. This flaw poses a risk to federal agencies, which have been instructed to apply necessary patches within three days to mitigate potential damage. The urgency of the situation underscores the importance of maintaining up-to-date systems, especially for organizations that rely on SolarWinds products. If left unaddressed, this vulnerability could lead to unauthorized access and compromise sensitive data, affecting not just government agencies but potentially their partners and clients as well. The situation is a reminder for all users of SolarWinds software to remain vigilant and ensure their systems are secure.

Impact: SolarWinds Web Help Desk
Remediation: Federal agencies are required to patch their systems within three days. Specific patch numbers or versions are not mentioned.
Read Original

A serious security vulnerability, identified as CVE-2025-11953 and nicknamed Metro4Shell, has been discovered in the Metro Development Server, which is part of the '@react-native-community/cli' npm package. This flaw, rated 9.8 on the CVSS scale, allows remote attackers to execute arbitrary code without authentication. Researchers from VulnCheck first detected active exploitation of this vulnerability on December 21, 2025. This poses a significant risk for developers and organizations using this package, as it could lead to unauthorized control over their systems. Users of the affected npm package need to take immediate action to protect their applications.

Impact: Metro Development Server in the '@react-native-community/cli' npm package.
Remediation: Developers should update their '@react-native-community/cli' package to the latest version to mitigate the vulnerability. They should also review their server configurations and implement security best practices to limit exposure to such attacks.
Read Original
Ivanti Issues Urgent Fix for Critical Zero-Day Flaws Under Active Attack

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Ivanti has reported two serious vulnerabilities in its Endpoint Manager Mobile (EPMM) software, identified as CVE-2026-1281 and CVE-2026-1340. These flaws allow remote code execution, meaning attackers could potentially take control of affected systems without needing physical access. The company warns that these vulnerabilities are currently being actively exploited, putting users at risk. Organizations using EPMM should prioritize applying the necessary security updates to safeguard their systems. Failure to address these vulnerabilities could lead to significant security breaches, affecting both the integrity of user data and the overall security posture of the organization.

Impact: Ivanti Endpoint Manager Mobile (EPMM) software
Remediation: Users should apply the latest patches provided by Ivanti for EPMM to mitigate the vulnerabilities. Specific patch numbers or versions were not mentioned in the article, but it is critical to ensure that the software is updated to the latest version available.
Read Original

OpenSSL has patched 12 vulnerabilities, including a critical remote code execution (RCE) flaw that poses a significant risk to users. These vulnerabilities mainly arise from issues related to memory safety, parsing robustness, and resource handling. Affected products include various versions of OpenSSL, which is widely used across different platforms and applications. This is particularly concerning for organizations that rely on OpenSSL for secure communications, as attackers could exploit these flaws to gain unauthorized access or control over systems. Users and administrators are urged to apply the latest patches to mitigate these risks and protect their systems from potential exploitation.

Impact: OpenSSL versions affected include 1.0.2, 1.1.1, and 3.0.0.
Remediation: Users should update to the latest version of OpenSSL to address these vulnerabilities. Specific patch numbers were not provided.
Read Original

Researchers have discovered two vulnerabilities in the n8n platform that could allow attackers to execute remote code. The issues stem from flaws in the platform’s expression engine and its Python Code Node. These vulnerabilities could be exploited by malicious users, potentially compromising systems that rely on n8n for automation tasks. It’s crucial for users of this platform to understand the risks and take appropriate measures to secure their environments. The vulnerabilities underscore the need for vigilance in software security, especially in applications that handle sensitive data.

Impact: n8n platform, expression engine, Python Code Node
Remediation: Users should monitor for updates from n8n and apply any security patches as they become available. It is also advisable to review and restrict access to the affected components until a fix is implemented.
Read Original

Researchers have identified two serious vulnerabilities in the n8n workflow automation platform that could expose instances to remote code execution (RCE) attacks. If exploited, attackers could gain full control of affected systems, allowing them to access sensitive data and execute arbitrary code on the underlying host. This situation poses a significant risk to organizations that rely on n8n for automating workflows, as it could lead to data breaches and system compromises. Users of n8n are urged to take immediate action to secure their instances against these vulnerabilities. The details of these flaws underscore the need for vigilance in maintaining security in automation tools.

Impact: n8n workflow automation platform
Remediation: Users should apply available patches and updates to n8n as they become available and review security configurations to mitigate potential risks.
Read Original

Researchers have identified two serious vulnerabilities in n8n, an open-source workflow automation tool, that could allow attackers to execute code remotely. These flaws are related to how n8n handles its sandboxing, which is supposed to isolate code execution for security. If exploited, these vulnerabilities could let malicious actors run arbitrary code on affected systems, potentially compromising sensitive data and system integrity. Users of n8n should take this issue seriously, as it poses significant risks to any workflows that utilize the platform. It's crucial for organizations to stay updated on these types of vulnerabilities to safeguard their operations.

Impact: n8n workflow automation tool
Remediation: Users should apply any available patches or updates from n8n and review their configurations to enhance security. Specific patch numbers or updates were not mentioned.
Read Original

SolarWinds has issued important security updates to address two serious vulnerabilities in its Web Help Desk software. The flaws include an authentication bypass that could allow unauthorized access and a remote command execution (RCE) vulnerability, which could enable attackers to run commands on affected systems. These issues affect users of the Web Help Desk, which is widely used in IT support environments. Organizations relying on this software need to act quickly, as these vulnerabilities could lead to significant security breaches if exploited. Users are advised to apply the updates provided by SolarWinds to mitigate these risks.

Impact: SolarWinds Web Help Desk software
Remediation: Users should apply the latest security updates released by SolarWinds to patch the vulnerabilities.
Read Original

Cisco has addressed a serious security flaw in its Unified Communications and Webex Calling platforms, identified as CVE-2026-20045. This vulnerability allows attackers to execute arbitrary commands remotely without authentication, posing a significant risk to users. The flaw has been actively exploited in the wild, which raises concerns for organizations relying on these communication tools. With a CVSS score of 8.2, it is classified as critical, emphasizing the urgency for users to apply the available patches. Companies utilizing Cisco's services should prioritize updating their systems to mitigate potential attacks.

Impact: Cisco Unified Communications, Cisco Webex Calling
Remediation: Cisco has released patches to address the vulnerability. Users should update their systems to the latest versions as soon as possible to protect against exploitation.
Read Original

Cisco has addressed a serious vulnerability in its Unified Communications and Webex Calling platforms, identified as CVE-2026-20045. This remote code execution flaw was found to be actively exploited by attackers, posing a significant risk to users. The vulnerability could allow unauthorized access to systems, potentially leading to data breaches or service disruptions. Organizations using these Cisco products are urged to apply the latest updates to mitigate the risk. This incident underscores the importance of timely patch management in maintaining cybersecurity hygiene.

Impact: Cisco Unified Communications, Cisco Webex Calling
Remediation: Cisco has released patches for the vulnerability. Users should update to the latest versions of Unified Communications and Webex Calling as soon as possible to protect against potential exploits.
Read Original

Zoom and GitLab have rolled out security updates to fix several vulnerabilities, including a critical flaw that could allow remote code execution (RCE) on Zoom Node Multimedia Routers (MMRs). This vulnerability, identified as CVE-2026-22844, poses a significant risk as it could enable an attacker to execute malicious code during a meeting. Additionally, the updates address issues related to denial-of-service (DoS) attacks and two-factor authentication (2FA) bypasses, which could compromise user accounts. Organizations using these platforms should prioritize applying the latest updates to safeguard their systems against potential exploitation. Keeping software up to date is crucial to maintaining security and protecting sensitive data.

Impact: Zoom Node Multimedia Routers (MMRs), GitLab systems
Remediation: Users should apply the latest security updates from Zoom and GitLab to mitigate the vulnerabilities. Specific patch numbers or versions were not mentioned, so it is recommended to check the respective platforms for the most recent updates.
Read Original

A newly identified vulnerability, dubbed the 'Cursor vulnerability,' allows attackers to execute shell built-in commands without the user's consent. This means that malicious actors could potentially run commands indirectly through prompt injection methods, leading to remote code execution (RCE). The risk is concerning as it could compromise systems by letting unauthorized users manipulate or access sensitive data. Users of systems that incorporate shell commands should be particularly vigilant and ensure their environments are secure. It's crucial for organizations to assess their exposure to this vulnerability and take appropriate measures to mitigate the risks.

Impact: Shell environments that support built-in commands, potentially affecting various operating systems and applications that rely on these features.
Remediation: Users should review and update their shell environments, apply security patches as they become available, and consider implementing input validation to prevent prompt injection attacks.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive for federal agencies to address a serious vulnerability in Gogs, an open-source Git service. This flaw has already been exploited in zero-day attacks, which means attackers took advantage of it before it was publicly known. Government systems using Gogs are particularly at risk, and CISA's mandate aims to prevent further exploitation. It's crucial for agencies to apply the necessary patches to protect their data and operations from potential breaches. Ignoring this could lead to significant security incidents, given the active nature of the attacks targeting this vulnerability.

Impact: Gogs Git service
Remediation: Agencies are instructed to apply the latest patches and updates for Gogs to mitigate the vulnerability.
Read Original

Trend Micro has addressed a serious vulnerability in its Apex Central software, which is used for centralized management of security solutions. This flaw could allow attackers to run arbitrary code with SYSTEM privileges, potentially giving them full control over affected systems. The vulnerability affects the on-premise version of Apex Central, putting companies that rely on this tool at risk. Users are advised to apply the latest patches immediately to protect their systems from potential exploitation. This incident underscores the need for regular updates and vigilance in cybersecurity practices.

Impact: Trend Micro Apex Central (on-premise)
Remediation: Users should apply the latest patches provided by Trend Micro to mitigate the vulnerability.
Read Original
PreviousPage 3 of 4Next