Articles tagged "CVE"

Found 168 articles

Actively Exploited

A Russian advanced persistent threat (APT) group has been exploiting a critical cross-site scripting (XSS) vulnerability in Zimbra, identified as CVE-2025-66376, with a severity score of 7.2. The attackers are sending HTML emails that contain insufficiently sanitized scripts, which execute when opened by users. This campaign specifically targets individuals in Ukraine, highlighting the ongoing cyber conflict in the region. The exploitation of this vulnerability could allow attackers to compromise user accounts and access sensitive information. Organizations using Zimbra should be particularly vigilant and take immediate action to secure their systems.

Impact: Zimbra Collaboration, affected versions unspecified.
Remediation: Users should apply any available patches for Zimbra Collaboration as soon as possible. Additionally, organizations are advised to implement email filtering solutions to block potentially malicious HTML emails and to educate users on the risks of opening unknown emails.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about active exploitation of a recently patched vulnerability in SharePoint, identified as CVE-2026-20963. This remote code execution flaw allows attackers to run malicious code on affected systems, posing a significant risk to organizations using the software. Microsoft released a patch for this vulnerability back in January, but the discovery of in-the-wild exploitation suggests that some users may not have applied the update. Organizations using SharePoint should prioritize implementing the latest security updates to protect against potential breaches. Failing to address this vulnerability could lead to unauthorized access and data compromise, making it crucial for companies to stay vigilant and proactive in their cybersecurity practices.

Impact: SharePoint, affected versions unspecified.
Remediation: Organizations should apply the Microsoft patch released in January 2026 for CVE-2026-20963 to mitigate the risk of exploitation.
Read Original

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has alerted government agencies about two significant security vulnerabilities affecting the Synacor Zimbra Collaboration Suite (ZCS) and Microsoft Office SharePoint. Both flaws, identified as CVE-2025-66376 and another not specified in the article, have been found to be actively exploited by attackers. The CVE-2025-66376 vulnerability has a CVSS score of 7.2, indicating a moderate to high risk. Organizations using these platforms are urged to apply the necessary patches to protect against potential attacks. The exploitation of these vulnerabilities underscores the need for timely updates and vigilance in cybersecurity practices, especially for government entities.

Impact: Synacor Zimbra Collaboration Suite (ZCS), Microsoft Office SharePoint
Remediation: Government agencies are advised to apply patches for the vulnerabilities in Zimbra and SharePoint as soon as possible. Specific patch numbers or versions were not mentioned in the article.
Read Original

A significant vulnerability in Cisco's Catalyst SD-WAN, identified as CVE-2026-20133, poses a serious risk that some organizations may be overlooking. Cybersecurity experts have expressed concern that security teams are focusing their attention on another vulnerability, CVE-2026-20127, which is a zero-day exploit. This could lead to a dangerous situation where the high-severity flaw is not addressed, leaving systems vulnerable to potential attacks. Organizations using Cisco SD-WAN products should be aware of this oversight, as failing to remediate the CVE-2026-20133 vulnerability could expose critical data and systems to exploitation. The urgency of addressing this issue cannot be overstated, especially as cyber threats continue to evolve rapidly.

Impact: Cisco Catalyst SD-WAN products, specifically those affected by CVE-2026-20133.
Remediation: Organizations should prioritize patching their Cisco Catalyst SD-WAN systems and monitor for updates regarding CVE-2026-20133. Regular security assessments and a review of security practices are recommended to ensure all vulnerabilities are addressed.
Read Original

Amazon Threat Intelligence has issued a warning regarding an active ransomware campaign known as Interlock, which is exploiting a significant vulnerability in Cisco's Secure Firewall Management Center (FMC) Software. This vulnerability, identified as CVE-2026-20131, has a maximum severity score of 10.0 and stems from an insecure deserialization of user-supplied Java byte streams. This flaw could allow attackers to gain root access without authentication, posing a serious risk to organizations using affected Cisco products. The exploitation of this vulnerability is concerning as it enables unauthorized access, potentially leading to data breaches and system compromises. Companies using Cisco FMC Software must take immediate action to protect their systems from this ongoing threat.

Impact: Cisco Secure Firewall Management Center (FMC) Software
Remediation: Organizations should immediately update their Cisco FMC Software to the latest version to mitigate this vulnerability. Additionally, they should review their security configurations and consider implementing network segmentation and access controls to limit exposure.
Read Original

A new vulnerability identified as CVE-2026-3888 has been discovered in Ubuntu's snap package management system, allowing local users to escalate their privileges to root access through a timing-based exploit. This flaw poses a significant risk particularly for multi-user environments, as any local user could potentially gain complete control over the affected system. Ubuntu has not specified which versions are impacted, but users running the snap package system should be aware of this vulnerability. The implications of this flaw are serious, as it could enable attackers to manipulate system settings, install malicious software, or access sensitive information. Users are advised to monitor for updates from Ubuntu and apply patches as they become available.

Impact: Ubuntu snap package management system (specific versions not specified)
Remediation: Users should apply patches from Ubuntu as soon as they are released to mitigate this vulnerability. Monitoring for any updates regarding this CVE is recommended.
Read Original

A significant security vulnerability, identified as CVE-2026-3888, has been discovered in default installations of Ubuntu Desktop versions 24.04 and later. This flaw allows unprivileged local attackers to escalate their privileges to root access, potentially giving them complete control over the affected systems. With a CVSS score of 7.8, this high-severity issue poses a serious risk to users who have not applied necessary security measures. It is crucial for Ubuntu users to be aware of this vulnerability, as it could lead to unauthorized access and manipulation of sensitive data. Immediate action is recommended to safeguard systems against potential exploitation.

Impact: Ubuntu Desktop versions 24.04 and later
Remediation: Users should update their systems to the latest available patches from Ubuntu to address this vulnerability. Regular system updates and monitoring for security advisories are also recommended to mitigate risks.
Read Original

Researchers have identified a severe vulnerability in the GNU InetUtils telnet daemon, known by its CVE identifier CVE-2026-32746. This flaw allows unauthenticated attackers to execute arbitrary code with root privileges through Telnet connections on port 23. With a CVSS score of 9.8, this vulnerability poses a significant risk to systems using the affected telnetd. The issue arises from an out-of-bounds write in the LINEMODE Set, which could be exploited easily by attackers. Organizations using this software need to take immediate action to secure their systems, as the implications of this flaw could lead to unauthorized access and control over critical infrastructure.

Impact: GNU InetUtils telnet daemon (telnetd), versions not specified.
Remediation: Organizations should disable the telnetd service if it is not necessary. If telnetd must be used, system administrators should implement strict network controls to limit access to trusted hosts only. Regularly monitor for updates from the GNU project regarding patches or fixes for this vulnerability.
Read Original

Microsoft has released an out-of-band update to address three vulnerabilities in Windows 11's Routing and Remote Access Service (RRAS). The vulnerabilities, identified as CVE-2026-25172, CVE-2026-25173, and CVE-2026-26111, could potentially allow remote code execution when users connect to a malicious server. This is a serious concern as it could enable attackers to execute harmful code on affected systems. Users of Windows 11 should ensure they apply the latest updates to protect their devices from these risks. The prompt release of this patch reflects the urgency in addressing vulnerabilities that can be exploited remotely, highlighting the need for users to stay vigilant about software updates.

Impact: Windows 11, Routing and Remote Access Service (RRAS)
Remediation: Users should apply the latest updates provided by Microsoft to address the vulnerabilities. Specific patch numbers or versions were not mentioned, but keeping Windows 11 updated is essential.
Read Original

A serious SQL injection vulnerability (CVE-2026-2413) has been discovered in the Ally plugin for WordPress, which is currently used on over 400,000 websites. This flaw allows attackers to exploit the plugin without needing any authentication, potentially enabling them to access and steal sensitive data from affected sites. The vulnerability has a CVSS score of 7.5, indicating a high severity level. Security researchers at Acquia, including Drew Webber, identified this issue, raising concerns for site administrators who may not be aware of the risks. It's crucial for users of the Ally plugin to take immediate action to protect their sites from potential attacks.

Impact: Ally WordPress plugin (CVE-2026-2413), affecting over 400,000 WordPress sites.
Remediation: Website administrators should update the Ally plugin to the latest version as soon as a patch is released. In the meantime, users should consider disabling the plugin until a fix is applied to mitigate the risk of exploitation.
Read Original

In March 2026, a significant security update was released, addressing eight critical vulnerabilities among a total of 82 Common Vulnerabilities and Exposures (CVEs). Two of these vulnerabilities had been publicly disclosed before the patch, raising concerns about their potential exploitation. The vulnerabilities affect various products and systems, making it crucial for organizations and users to apply the updates promptly to safeguard their environments. The nature of these vulnerabilities could allow attackers to gain unauthorized access or disrupt services, emphasizing the need for vigilance in maintaining software security. Companies and IT departments should prioritize these patches to mitigate risks associated with these newly identified threats.

Impact: Various products and systems, specific vendors and versions not specified
Remediation: Patches for the vulnerabilities are included in the March 2026 Patch Tuesday update; users should apply these updates immediately.
Read Original

Cisco has confirmed that two vulnerabilities in the Catalyst SD-WAN Manager are currently being exploited by attackers. The first vulnerability, identified as CVE-2026-20122, has a CVSS score of 7.1 and allows authenticated remote users to overwrite files on the local file system. This could lead to significant disruptions and unauthorized access to sensitive data. Organizations using the Catalyst SD-WAN Manager should take immediate action to address these vulnerabilities, as they pose a serious risk to network security. It’s crucial for affected users to monitor their systems closely and apply any available patches as soon as possible.

Impact: Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage)
Remediation: Organizations should apply patches as soon as they are available and ensure that all access controls are reviewed to prevent unauthorized access. Regularly updating the system and monitoring for unusual activity is also recommended.
Read Original

Recent threat intelligence reports indicate that a single threat actor is behind the majority of attacks exploiting two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), identified as CVE-2026-21962 and CVE-2026-24061. These vulnerabilities allow for remote code execution, posing significant risks to organizations using this mobile management solution. The findings suggest that companies using Ivanti's software need to be vigilant, as the attacks are actively occurring. The focus on a single actor highlights the need for targeted defenses against this specific threat. Organizations are encouraged to monitor for unusual activity and apply any available patches to mitigate potential exploitation.

Impact: Ivanti Endpoint Manager Mobile (EPMM), versions affected not specified.
Remediation: Organizations should apply the latest security patches from Ivanti for the affected vulnerabilities and monitor their systems for any signs of exploitation. Regular updates and security assessments are recommended.
Read Original

A serious vulnerability has been identified in the WPvivid backup plugin, tracked as CVE-2026-1357, which has a high severity score of 9.8. This issue affects all versions of the plugin up to version 0.9.123, leaving many WordPress sites potentially at risk. The flaw allows attackers to execute remote code, which could lead to unauthorized access or control over affected systems. Users of the plugin are strongly advised to take immediate action to protect their sites. This vulnerability poses a significant threat, especially for those who have not updated their plugins recently.

Impact: WPvivid backup plugin, all versions up to 0.9.123
Remediation: Users should update the WPvivid backup plugin to the latest version to mitigate this vulnerability.
Read Original

Hackers have begun exploiting a serious vulnerability in BeyondTrust Remote Support known as CVE-2026-1731, which allows unauthenticated remote code execution. This flaw was identified and a proof of concept (PoC) was released just a day prior to the exploitation attempts, indicating a rapid response from malicious actors. Organizations using BeyondTrust Remote Support should be particularly vigilant, as this vulnerability poses significant risks, potentially allowing attackers to take control of affected systems. The quick exploitation of this flaw underscores the importance of timely patch management and security measures to protect sensitive data and systems from unauthorized access. Users are urged to monitor for updates and apply any patches as soon as they become available to mitigate risks.

Impact: BeyondTrust Remote Support
Remediation: Organizations should apply any available patches for BeyondTrust Remote Support as soon as possible. Regularly review security settings and ensure that systems are updated to the latest versions to protect against this vulnerability.
Read Original
PreviousPage 4 of 12Next