Articles tagged "CVE"

Found 168 articles

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding a serious vulnerability in the Langflow framework, designated as CVE-2026-33017. This flaw allows attackers to hijack AI workflows, potentially leading to unauthorized access and manipulation of AI systems. Organizations using Langflow should be particularly vigilant as the vulnerability is currently being exploited in the wild. This situation poses significant risks not only to the integrity of AI applications but also to the security of the data they handle. Immediate action is recommended to mitigate risks associated with this vulnerability.

Impact: Langflow framework for building AI agents
Remediation: Users should apply security patches provided by Langflow, review their configurations, and consider implementing additional access controls to protect their AI workflows from exploitation.
Read Original

Researchers at Georgia Tech have reported a notable increase in vulnerabilities linked to AI-generated code, specifically through newly documented Common Vulnerabilities and Exposures (CVEs). The study indicates that flaws introduced by AI tools are becoming more common, raising concerns about the safety and reliability of software created with these technologies. This trend suggests that as companies increasingly rely on AI for coding, they may inadvertently be introducing security risks. The findings highlight the need for developers and organizations to be cautious when using AI-generated code and to implement thorough testing and validation processes to mitigate potential vulnerabilities. As this issue evolves, it could have significant implications for software security across various sectors.

Impact: AI-generated code vulnerabilities affecting various software applications and platforms
Remediation: Developers should implement rigorous testing and validation processes for AI-generated code; specific patches or updates were not mentioned.
Read Original

Kaspersky's GReAT team has identified a new exploit kit called Coruna, which specifically targets iPhones. This kit utilizes kernel exploits associated with two vulnerabilities, CVE-2023-32434 and CVE-2023-38606, and is an updated version of techniques used in Operation Triangulation. The existence of these exploits poses significant risks to iPhone users, as they could potentially allow attackers to gain unauthorized access to sensitive data or control over the devices. Users should be aware of these vulnerabilities and take steps to secure their devices against exploitation. The findings emphasize the need for continuous vigilance in mobile security as attackers evolve their methods.

Impact: iPhones affected by CVE-2023-32434 and CVE-2023-38606
Remediation: Users should ensure their iPhones are updated to the latest software version to mitigate the risks associated with these vulnerabilities. Regularly applying updates helps protect against known exploits.
Read Original

TP-Link has addressed a significant security vulnerability in its Archer NX router series, identified as CVE-2025-15517, which has a CVSS score of 8.6. This flaw allows attackers to bypass authentication measures, potentially enabling them to install malicious firmware on affected devices. The vulnerability affects several models, including the Archer NX200, NX210, and NX500, among others. Users of these routers are urged to update their firmware promptly to protect against potential exploits. This incident is particularly concerning as it highlights the risks associated with consumer-grade networking equipment, which often lacks robust security measures.

Impact: TP-Link Archer NX200, NX210, NX500, and other models in the Archer NX series.
Remediation: Users should apply the latest security updates provided by TP-Link for their Archer NX routers to mitigate the vulnerability. Specific patch numbers or firmware versions were not mentioned, but users should ensure they are running the most recent firmware available from TP-Link.
Read Original

Oracle has issued an emergency patch for a serious vulnerability, identified as CVE-2026-21992, affecting Oracle Identity Manager and Oracle Web Services Manager. This flaw allows attackers to exploit a missing authentication feature, potentially leading to remote code execution without prior authentication. While Oracle hasn't confirmed if this vulnerability has been actively exploited in the wild, they are urging all customers to apply the updates or implement alternative mitigations immediately. The lack of authentication for such a critical function poses significant risks for organizations using these services, emphasizing the need for prompt action to safeguard their systems.

Impact: Oracle Identity Manager, Oracle Web Services Manager
Remediation: Customers should apply the latest patches provided by Oracle or implement the recommended mitigations as soon as possible.
Read Original

Researchers have identified a serious security vulnerability, CVE-2025-32975, affecting the Quest KACE Systems Management Appliance (SMA). This flaw has a maximum severity rating of 10.0 and is being actively exploited by attackers who are targeting unpatched systems exposed to the internet. Malicious activity linked to this vulnerability was first observed during the week of March 9, 2026, according to Arctic Wolf. Organizations using KACE SMA need to take immediate action to protect their systems, as this could lead to unauthorized access and potential data breaches. It’s crucial for users to ensure their systems are updated to mitigate this risk.

Impact: Quest KACE Systems Management Appliance (SMA)
Remediation: Organizations should immediately apply any available patches for Quest KACE SMA. Users are also advised to restrict access to the SMA from the internet and to implement network segmentation to minimize exposure. Regularly updating systems and monitoring for suspicious activity can help mitigate risks associated with this vulnerability.
Read Original

Oracle has issued an emergency patch for a serious vulnerability in its Identity Manager software, identified as CVE-2026-21992. This flaw allows attackers to execute remote code without needing any authentication, raising concerns that it may already be exploited in the wild. This vulnerability poses a significant risk, especially for organizations using Oracle Identity Manager, as it could allow unauthorized access to sensitive systems and data. Users and companies relying on this software are urged to apply the patch promptly to safeguard against potential exploitation. The situation emphasizes the ongoing need for vigilance in software security and timely updates.

Impact: Oracle Identity Manager
Remediation: Oracle has released an emergency patch to address CVE-2026-21992. Users should apply this patch immediately to mitigate the risk of unauthorized remote code execution.
Read Original

A recent vulnerability identified as CVE-2025-32975 may have been exploited in attacks targeting the education sector. This flaw affects Critical Quest's KACE systems, which are commonly used for IT management and endpoint security. The potential exploitation raises concerns about the security of sensitive data within educational institutions. As attackers increasingly focus on this sector, it is crucial for organizations to assess their systems and ensure they are protected against such vulnerabilities. Institutions that use KACE products should be particularly vigilant and consider implementing protective measures immediately.

Impact: Critical Quest KACE systems
Remediation: Organizations using KACE systems should immediately apply any available security patches from Critical Quest, review their security configurations, and monitor for unusual activity. Regular updates and vulnerability assessments are recommended to mitigate risks.
Read Original

A newly discovered vulnerability, identified as CVE-2026-33017, poses a serious risk by allowing unauthenticated attackers to run arbitrary Python code on vulnerable servers. This flaw was reportedly exploited within 20 hours of its disclosure, raising concerns among cybersecurity experts. Organizations that use systems affected by this vulnerability need to act swiftly to secure their environments. The ability for attackers to execute arbitrary code can lead to severe data breaches and system compromises, making it crucial for affected users to understand their risk and take appropriate measures. As of now, details on specific systems or versions impacted have not been disclosed, leaving many organizations potentially vulnerable.

Impact: N/A
Remediation: Organizations should apply security patches as soon as they become available, monitor for unusual activity, and review their systems for any signs of exploitation. Regular updates and code audits may also help mitigate risks associated with this vulnerability.
Read Original

Ubiquiti has released patches to address a critical vulnerability in its UniFi Network application, specifically affecting versions 10.1.85 and earlier. The vulnerability, tracked as CVE-2026-22557, poses significant risks to users who have not yet updated their software. This flaw could potentially allow attackers to exploit the system, compromising network security. Users of the affected versions are strongly advised to update to the latest version to safeguard their networks. The urgency of this patch highlights the ongoing need for regular software updates to protect against evolving threats.

Impact: UniFi Network application versions 10.1.85 and earlier.
Remediation: Users should update their UniFi Network application to the latest version to mitigate the vulnerability. Specific patch details are not provided, but upgrading to the most recent version is crucial.
Read Original

Oracle has issued an emergency security update to address a serious vulnerability in its Identity Manager and Web Services Manager products, identified as CVE-2026-21992. This flaw allows attackers to execute remote code without needing any authentication, which poses a significant risk to organizations using these systems. The vulnerability could potentially be exploited to gain unauthorized access and control over sensitive information. Users of Oracle's Identity Manager and Web Services Manager should prioritize applying the update to protect their systems from potential attacks. This incident underscores the ongoing need for vigilance in software security, particularly with products that manage identity and access controls.

Impact: Oracle Identity Manager, Oracle Web Services Manager
Remediation: Oracle has released an out-of-band security update to address CVE-2026-21992. Users are advised to apply the latest patches immediately to mitigate this vulnerability.
Read Original

A severe security vulnerability in Langflow, identified as CVE-2026-33017, has been actively exploited just 20 hours after being disclosed. This flaw, which has a CVSS score of 9.3, is due to missing authentication combined with a code injection issue that could allow attackers to execute arbitrary code remotely. Organizations using Langflow are at risk, as the fast exploitation of such vulnerabilities underscores the need for immediate action. Users and administrators should prioritize addressing this flaw to protect their systems from potential attacks. The rapid responses from malicious actors highlight the urgency for security teams to stay vigilant and proactive against new threats.

Impact: Langflow software, potentially affecting any systems or applications utilizing this platform.
Remediation: Users should immediately apply any available patches for Langflow, review their authentication mechanisms, and implement strict access controls. Regularly updating the software and monitoring for unauthorized access attempts are also recommended.
Read Original
Actively Exploited

Researchers at Sysdig have reported that hackers successfully exploited a significant vulnerability in Langflow, identified as a CVE, in under 20 hours. This rapid exploitation underscores the urgency for users and companies utilizing Langflow to act quickly. The vulnerability could allow attackers to gain unauthorized access or control, posing serious risks to data security. As the threat remains active, organizations relying on this software must prioritize patching and securing their systems to mitigate potential damage. The situation serves as a reminder of the importance of timely updates and vigilance in cybersecurity practices.

Impact: Langflow software
Remediation: Users are advised to apply the latest security patches provided by Langflow immediately.
Read Original

ConnectWise has addressed a significant vulnerability (CVE-2026-3564) in its ScreenConnect remote access platform, which is widely used by managed service providers and IT departments. This flaw allows attackers to potentially hijack remote sessions by misusing ASP.NET machine keys to create forged authentication tokens. The vulnerability arises from inadequate verification of cryptographic signatures, making it possible for hackers to exploit the issue remotely. Organizations that utilize ScreenConnect, whether in cloud-hosted or on-premise configurations, need to prioritize applying the available patches to safeguard their systems. Failure to address this vulnerability could lead to unauthorized access to sensitive information and operations.

Impact: ScreenConnect remote access platform by ConnectWise, affected versions not specified.
Remediation: Users should update to the latest patched version of ScreenConnect provided by ConnectWise to mitigate this vulnerability.
Read Original

The Interlock ransomware group has been exploiting a severe zero-day vulnerability in Cisco Secure Firewall Management Center software, identified as CVE-2026-20131, since January 26, prior to its public disclosure. This vulnerability allows for insecure deserialization, which can lead to unauthorized access and potential takeover of affected systems. Organizations using Cisco's Secure Firewall Management Center should be particularly vigilant, as the attacks have been ongoing for over a month, posing a significant risk to network security. The situation emphasizes the urgent need for timely security updates and monitoring to protect against such exploitation.

Impact: Cisco Secure Firewall Management Center software, specifically affected versions that are vulnerable to CVE-2026-20131.
Remediation: Organizations should apply any available security patches from Cisco for the affected software. They should also review their configurations and consider implementing additional security measures to mitigate the risk of exploitation.
Read Original
PreviousPage 3 of 12Next