Articles tagged "CVE"

Found 111 articles

A serious vulnerability in MongoDB, designated as CVE-2025-14847 and known as MongoBleed, is currently being exploited globally. This flaw, which has a CVSS score of 8.7, allows attackers to access sensitive data stored in the server's memory without needing authentication. Researchers have identified over 87,000 instances of MongoDB that could be affected by this issue. The potential for data leakage poses a significant risk to organizations using this database technology, making it critical for them to address the vulnerability promptly. Companies should assess their systems and implement necessary security measures to safeguard against this ongoing threat.

Impact: MongoDB servers, version not specified
Remediation: Organizations should immediately review their MongoDB configurations and apply any available security patches. It is advisable to implement access controls and monitor server activity for any unauthorized access attempts. Users should also consider upgrading to the latest version of MongoDB that addresses this vulnerability.
Read Original

A serious vulnerability known as MongoBleed (CVE-2025-14847) is currently being exploited, exposing over 80,000 MongoDB servers on the public internet. This flaw affects multiple versions of MongoDB, allowing attackers to potentially access sensitive information stored on these servers. The scale of the exposure raises significant security concerns, as many organizations may not be aware that their databases are at risk. Companies using affected MongoDB versions should take immediate action to secure their data and prevent unauthorized access. Failure to address this vulnerability could lead to severe data breaches and loss of sensitive information.

Impact: MongoDB versions affected include all versions with the MongoBleed vulnerability; specific versions are not detailed.
Remediation: Organizations should immediately update to the latest MongoDB version that addresses the MongoBleed vulnerability. Additionally, they should implement strict access controls and monitor their servers for any suspicious activity. Regularly auditing configurations and applying security patches as they become available is also recommended.
Read Original

A serious vulnerability has been found in LangChain Core, a key Python package used for developing applications that utilize large language models (LLMs). This flaw, identified as CVE-2025-68664 and assigned a CVSS score of 9.3, could enable attackers to perform prompt injection attacks, which may lead to the theft of sensitive data and manipulation of LLM responses. Organizations using LangChain Core for their applications are at risk, as this vulnerability allows malicious actors to exploit the package to access confidential information. It's critical for developers and companies utilizing this software to take immediate action to secure their systems and protect user data from potential breaches.

Impact: LangChain Core (langchain-core), Python applications built on LangChain ecosystem
Remediation: Update LangChain Core to the latest version that addresses this vulnerability. Review and harden input handling to prevent prompt injection attacks.
Read Original

Fortinet has alerted users about the active exploitation of a five-year-old vulnerability in its FortiOS SSL VPN, identified as CVE-2020-12812. This flaw, which has a CVSS score of 5.2, involves improper authentication and is particularly dangerous under specific configurations. Researchers have recently observed this vulnerability being abused in real-world attacks, which means organizations using affected versions of FortiOS SSL VPN should take immediate action to secure their systems. The ongoing exploitation of such an outdated vulnerability underscores the need for companies to regularly update their security measures and ensure proper configuration to protect against potential attacks.

Impact: FortiOS SSL VPN versions affected by CVE-2020-12812.
Remediation: Fortinet recommends updating to the latest version of FortiOS SSL VPN to mitigate this vulnerability. Users should also review their configurations to ensure that they are not exposing themselves to exploitation of this flaw.
Read Original

Fortinet has reported that a five-year-old vulnerability in its FortiOS SSL VPN is being actively exploited. This flaw, identified as CVE-2020-12812, allows attackers to bypass two-factor authentication under specific configurations, enabling unauthorized access to systems. Organizations using affected versions of FortiOS SSL VPN should be particularly vigilant, as this vulnerability could lead to significant security breaches. The issue emphasizes the need for users to ensure their VPN configurations are secure and up-to-date. Fortinet's warning serves as a critical reminder of the importance of addressing known vulnerabilities, even those that have been around for several years.

Impact: FortiOS SSL VPN (specifically affected configurations), Fortinet products utilizing this version
Remediation: Users should apply the latest patches provided by Fortinet for FortiOS. Additionally, they should review and adjust their SSL VPN configurations to ensure that two-factor authentication is enforced correctly.
Read Original

A serious vulnerability has been found in the n8n workflow automation platform that could allow attackers to execute arbitrary code on affected systems. This flaw, known as CVE-2025-68613, has a CVSS score of 9.9, indicating a critical risk level. Discovered by security researcher Fatih Çelik, the vulnerability impacts numerous instances of n8n, potentially exposing sensitive workflows and data to exploitation. Organizations using n8n need to take immediate action to secure their systems, as such vulnerabilities can lead to significant data breaches and operational disruptions. Users are urged to monitor for updates and apply necessary patches to mitigate the risk of attack.

Impact: n8n workflow automation platform, all instances affected
Remediation: Users should apply any available patches or updates from n8n as soon as they are released. Regularly monitor n8n's official communication channels for further guidance on securing affected systems.
Read Original

Cisco has disclosed a critical zero-day vulnerability, tracked as CVE-2025-20393, affecting its Secure Email Gateway and Secure Email/Web Manager products. This vulnerability is currently being exploited by a China-linked advanced persistent threat group known as UAT-9686. The attack campaign began on December 10 and targets specific systems, raising significant concerns for organizations relying on these Cisco products. Users and administrators should be particularly vigilant, as this active exploitation could lead to unauthorized access and data breaches. The urgency of addressing this vulnerability cannot be overstated, given its potential impact on email security and the sensitive information handled by these systems.

Impact: Cisco Secure Email Gateway, Cisco Secure Email/Web Manager
Remediation: Organizations should apply available security patches for the affected Cisco products. They should also review their email security configurations and implement additional monitoring for unusual activity related to email traffic. Regular updates and security assessments are recommended to mitigate risks from this vulnerability.
Read Original

Hewlett Packard Enterprise (HPE) has addressed a serious security vulnerability in its OneView software that allows unauthenticated remote code execution. This flaw, identified as CVE-2025-37164, has been rated with a CVSS score of 10.0, indicating its critical nature. HPE OneView, used for managing IT infrastructure, could potentially allow attackers to take control of affected systems without needing to authenticate. This vulnerability can impact organizations relying on this software for IT operations, making it crucial for users to apply the necessary updates to safeguard their environments. HPE's prompt action to patch this flaw is vital in preventing potential exploitation by malicious actors.

Impact: HPE OneView software
Remediation: Users should update to the latest version of HPE OneView as soon as possible to mitigate the risk posed by this vulnerability. Specific patch numbers or versions were not mentioned, but applying any available updates from HPE is recommended.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious vulnerability, tracked as CVE-2025-59374, found in the Asus Live Update tool. This flaw acts as a backdoor that attackers can exploit, making it a significant concern for anyone using affected Asus devices. The vulnerability stems from a supply chain attack, meaning it was introduced during the software development process rather than through direct hacking. This situation puts users at risk, as the compromised update tool could allow unauthorized access to their systems. Asus users should take this warning seriously and ensure their devices are not vulnerable to exploitation.

Impact: Asus Live Update tool on affected Asus devices; specific models and versions not detailed.
Remediation: Users should update their Asus Live Update tool to the latest version as soon as it becomes available. Regularly check for updates and consider disabling the auto-update feature temporarily until the patch is confirmed to be secure.
Read Original

A new vulnerability, tracked as CVE-2025-20393, has been discovered in Cisco's Secure Email Gateway and Secure Email and Web Manager appliances. This zero-day flaw is reportedly being exploited by hackers linked to China, posing a significant risk to organizations using these products. The vulnerability allows attackers to bypass security controls, potentially leading to unauthorized access and data breaches. Companies using these Cisco appliances should prioritize patching and monitoring their systems to mitigate the risks associated with this exploit. The discovery of this flaw is particularly concerning given the ongoing cyber threats targeting critical infrastructure and enterprise environments.

Impact: Cisco Secure Email Gateway, Cisco Secure Email and Web Manager appliances
Remediation: Organizations should apply any available patches from Cisco for the affected appliances. Additionally, they should enhance monitoring and security measures around their email systems to detect any suspicious activity.
Read Original
Actively Exploited

SonicWall has issued a hotfix for a local privilege escalation vulnerability, identified as CVE-2025-40602, that affects its Secure Mobile Access (SMA) 1000 appliances. This flaw is currently being exploited by attackers, particularly in combination with another vulnerability, CVE-2025-23006, which allows for unauthenticated remote code execution with root privileges. Organizations using SMA 1000 appliances are at risk, as this could enable unauthorized access and control over their systems. SonicWall is urging all customers to apply the patch promptly to mitigate the risk of exploitation. The situation highlights the ongoing need for vigilance and timely updates in cybersecurity practices.

Impact: SonicWall Secure Mobile Access (SMA) 1000 appliances
Remediation: Customers are advised to apply the hotfix provided by SonicWall to address the vulnerability.
Read Original

A ransomware group has taken advantage of a serious vulnerability in React2Shell, identified as CVE-2025-55182, to infiltrate corporate networks. Once they gain access, they deploy their file-encrypting malware in under a minute, making the attack extremely swift and damaging. This incident highlights the urgency for organizations to address this vulnerability, as it poses a significant risk to corporate data security. Companies using systems that incorporate React2Shell need to remain vigilant and take immediate action to protect their networks from potential exploitation. The rapid nature of these attacks underlines the necessity for robust security measures and timely updates.

Impact: React2Shell, corporate networks using affected versions
Remediation: Organizations should apply patches provided by React2Shell developers, ensure their systems are updated to the latest versions, and implement security monitoring to detect any unauthorized access attempts. Regular vulnerability assessments and employee training on recognizing phishing attempts can also help mitigate risks.
Read Original

Researchers at Arctic Wolf have reported that attackers are actively exploiting a vulnerability in Fortinet's FortiGate firewalls, identified as CVE-2025-59718. This flaw allows unauthorized access to the firewalls, enabling attackers to export sensitive system configuration files. These files can reveal critical information about the network, security policies, and even encrypted passwords, which could facilitate further attacks. Organizations using FortiGate firewalls should take immediate action to protect their systems, as the risk of a security breach is significant due to the data that can be accessed through this vulnerability. The situation underscores the importance of timely updates and security measures to safeguard network infrastructure.

Impact: Fortinet FortiGate firewalls, specifically affected by CVE-2025-59718 and CVE-2025-59719.
Remediation: Organizations should apply any available patches from Fortinet for CVE-2025-59718 and CVE-2025-59719. Regularly updating firewall configurations and ensuring strong authentication practices are also recommended to mitigate risks.
Read Original
JumpCloud Remote Assist Flaw Lets Users Gain Full Control of Company Devices

Hackread – Cybersecurity News, Data Breaches, AI, and More

A serious vulnerability identified as CVE-2025-34352 affects the JumpCloud Remote Assist for Windows agent, allowing local users to gain full SYSTEM privileges on company devices. Discovered by XM Cyber, this flaw poses a significant risk to organizations using the software, as it could enable unauthorized access and control over sensitive company systems. Businesses are strongly urged to update their JumpCloud software to version 0.317.0 or later to mitigate this high-severity security issue. Failure to address this vulnerability could lead to severe operational disruptions and data breaches. Immediate action is crucial to ensure the safety and integrity of company devices and networks.

Impact: JumpCloud Remote Assist for Windows, versions prior to 0.317.0
Remediation: Update to JumpCloud Remote Assist version 0.317.0 or later
Read Original

Fortinet FortiGate devices are currently under active attack due to two recently disclosed vulnerabilities, CVE-2025-59718 and CVE-2025-59719, which allow for authentication bypass through malicious single sign-on (SSO) logins. Cybersecurity firm Arctic Wolf reported observing these attacks on December 12, 2025, just days after the vulnerabilities were made public. This situation poses significant risks for organizations using FortiGate appliances, as attackers can potentially gain unauthorized access to sensitive systems. Companies using these devices should take immediate action to protect their networks and data from these ongoing intrusions.

Impact: Fortinet FortiGate devices, specifically those vulnerable to CVE-2025-59718 and CVE-2025-59719.
Remediation: Organizations should apply security patches released by Fortinet for the affected FortiGate devices. Additionally, it is advisable to review and strengthen SSO configurations and monitor logs for any unusual login attempts.
Read Original
PreviousPage 5 of 8Next