Articles tagged "CVE"

Found 111 articles

Recent threat intelligence reports indicate that a single threat actor is behind the majority of attacks exploiting two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), identified as CVE-2026-21962 and CVE-2026-24061. These vulnerabilities allow for remote code execution, posing significant risks to organizations using this mobile management solution. The findings suggest that companies using Ivanti's software need to be vigilant, as the attacks are actively occurring. The focus on a single actor highlights the need for targeted defenses against this specific threat. Organizations are encouraged to monitor for unusual activity and apply any available patches to mitigate potential exploitation.

Impact: Ivanti Endpoint Manager Mobile (EPMM), versions affected not specified.
Remediation: Organizations should apply the latest security patches from Ivanti for the affected vulnerabilities and monitor their systems for any signs of exploitation. Regular updates and security assessments are recommended.
Read Original

A serious vulnerability has been identified in the WPvivid backup plugin, tracked as CVE-2026-1357, which has a high severity score of 9.8. This issue affects all versions of the plugin up to version 0.9.123, leaving many WordPress sites potentially at risk. The flaw allows attackers to execute remote code, which could lead to unauthorized access or control over affected systems. Users of the plugin are strongly advised to take immediate action to protect their sites. This vulnerability poses a significant threat, especially for those who have not updated their plugins recently.

Impact: WPvivid backup plugin, all versions up to 0.9.123
Remediation: Users should update the WPvivid backup plugin to the latest version to mitigate this vulnerability.
Read Original

Hackers have begun exploiting a serious vulnerability in BeyondTrust Remote Support known as CVE-2026-1731, which allows unauthenticated remote code execution. This flaw was identified and a proof of concept (PoC) was released just a day prior to the exploitation attempts, indicating a rapid response from malicious actors. Organizations using BeyondTrust Remote Support should be particularly vigilant, as this vulnerability poses significant risks, potentially allowing attackers to take control of affected systems. The quick exploitation of this flaw underscores the importance of timely patch management and security measures to protect sensitive data and systems from unauthorized access. Users are urged to monitor for updates and apply any patches as soon as they become available to mitigate risks.

Impact: BeyondTrust Remote Support
Remediation: Organizations should apply any available patches for BeyondTrust Remote Support as soon as possible. Regularly review security settings and ensure that systems are updated to the latest versions to protect against this vulnerability.
Read Original
Actively Exploited

Apple has addressed a serious zero-day vulnerability, identified as CVE-2026-20700, which was used in targeted attacks last year. This flaw, a memory corruption issue in the dyld component of Apple's operating systems, could allow attackers to execute arbitrary code on affected devices. Specifically, the vulnerability impacts versions of iOS prior to iOS 26 and was reportedly exploited in sophisticated attacks against select individuals. Users of these older versions should update their devices to protect against potential exploitation.

Impact: Affected products include Apple's iOS versions prior to iOS 26, particularly those using the dyld component.
Remediation: Users are advised to update their devices to the latest version of iOS to mitigate the vulnerabilities associated with CVE-2026-20700.
Read Original

In February 2026, Microsoft addressed over 50 security vulnerabilities during its Patch Tuesday update, including six zero-day flaws that were actively exploited by attackers. Notably, three of these zero-days involve security feature bypasses. One of the vulnerabilities, identified as CVE-2026-21513, impacts the MSHTML/Trident browser engine used in Internet Explorer on Windows, while CVE-2026-21514 affects Microsoft Word. Attackers can exploit these vulnerabilities by tricking users into opening malicious files or links. As these security holes are actively being exploited, users and organizations must apply the updates promptly to protect their systems from potential breaches.

Impact: Microsoft Windows (Internet Explorer), Microsoft Word
Remediation: Users are advised to install the latest security updates from Microsoft to mitigate these vulnerabilities. Specific patches addressing these issues were released as part of the February 2026 Patch Tuesday.
Read Original
Actively Exploited

Recent reports from BleepingComputer indicate that attackers are exploiting significant vulnerabilities in SolarWinds Web Help Desk, identified as CVE-2025-40551 and CVE-2026-26399. These flaws have been under active exploitation since mid-January, allowing intruders to deploy legitimate tools for unauthorized activities within affected systems. Organizations using SolarWinds Web Help Desk could be at risk, as these vulnerabilities could facilitate broader attacks or data breaches. It is crucial for companies to assess their systems for these vulnerabilities and apply necessary updates or patches to safeguard against potential intrusions. The ongoing exploitation of these flaws underscores the need for vigilance in maintaining software security.

Impact: SolarWinds Web Help Desk, versions affected not specified.
Remediation: Organizations should apply available patches for SolarWinds Web Help Desk and continuously monitor their systems for unusual activity. Regularly updating software and conducting security audits can also help mitigate risks associated with these vulnerabilities.
Read Original

The European Commission recently experienced a cyberattack that took advantage of two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) software, identified as CVE-2026-1281 and CVE-2026-1340. These vulnerabilities allowed attackers to potentially compromise sensitive information and systems within the Commission. As a key institution in the EU, any breach could have significant implications for data security and operational integrity. The exploitation of these flaws underscores the urgent need for organizations using Ivanti EPMM to assess their security measures and apply necessary updates promptly. This incident serves as a reminder of the ongoing risks associated with unpatched software vulnerabilities.

Impact: Ivanti Endpoint Manager Mobile (EPMM) software, specifically versions vulnerable to CVE-2026-1281 and CVE-2026-1340.
Remediation: Organizations using Ivanti EPMM should immediately apply security patches released by Ivanti for CVE-2026-1281 and CVE-2026-1340. Regularly update software to the latest versions and implement security best practices to mitigate risks from similar vulnerabilities.
Read Original

A newly discovered vulnerability, identified as CVE-2026-1731, poses a serious risk to users of BeyondTrust software. This flaw allows for remote code execution without the need for user interaction, meaning that attackers could exploit it through relatively straightforward methods. Organizations using BeyondTrust products should take this threat seriously as it could lead to unauthorized access and control over their systems. Timely patching is crucial to mitigate the risks associated with this vulnerability, especially since it can be exploited before any authentication takes place. Users are advised to check for updates and apply any available patches immediately to protect their systems from potential attacks.

Impact: BeyondTrust software products (specific versions not mentioned)
Remediation: Users should apply the latest patches and updates provided by BeyondTrust as soon as they become available. Regularly checking for software updates is advised to ensure vulnerabilities are addressed promptly.
Read Original

In February 2026, a significant security update was released that addressed 59 Common Vulnerabilities and Exposures (CVEs), including six zero-day vulnerabilities. These vulnerabilities could allow attackers to gain unauthorized access or execute malicious code on affected systems. Various products from multiple vendors are impacted, which means a wide range of users, including businesses and individual consumers, could be at risk. The presence of zero-day vulnerabilities indicates that attackers could exploit these weaknesses before users have the chance to apply the necessary patches. Companies and users are urged to update their systems promptly to mitigate potential risks associated with these vulnerabilities. Ignoring these updates could expose them to serious security breaches.

Impact: Windows Operating System, Microsoft Office products, various third-party applications
Remediation: Users are advised to apply the latest patches released during February 2026 Patch Tuesday, specifically targeting CVEs identified in the update.
Read Original

BeyondTrust has addressed a serious remote code execution vulnerability, identified as CVE-2026-1731, which affects its Remote Support (RS) and Privileged Remote Access (PRA) solutions. This vulnerability can be exploited without authentication, making it particularly dangerous for self-hosted customers. BeyondTrust is urging users to apply the patch immediately to protect their systems. Unlike a previous zero-day vulnerability exploited by threat actors linked to China, this issue was discovered by a security researcher and disclosed privately. The prompt action by BeyondTrust highlights the necessity for timely vulnerability management in remote access tools, which are critical for many organizations.

Impact: BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) solutions.
Remediation: BeyondTrust has released a patch for CVE-2026-1731. Self-hosted customers are urged to apply this patch as soon as possible.
Read Original

The Cybersecurity & Infrastructure Security Agency (CISA) has issued a warning regarding a serious vulnerability, identified as CVE-2026-24423, in SmarterMail. This flaw allows for unauthenticated remote code execution (RCE), which means attackers could potentially take control of affected systems without needing any prior authentication. This vulnerability has already been leveraged in ransomware attacks, posing significant risks to users and organizations running SmarterMail. Users are urged to take immediate action to secure their systems, as the flaw could lead to severe data breaches and operational disruptions. The urgency of this warning stems from the active exploitation of the flaw in the wild, highlighting the need for prompt remediation.

Impact: SmarterMail versions affected by CVE-2026-24423.
Remediation: Users should apply any available patches from SmarterMail, update their systems to the latest versions, and implement proper security configurations to mitigate the risk of exploitation. Regularly monitoring for unusual activity and ensuring robust security practices are also recommended.
Read Original

Hackers have been exploiting a serious vulnerability in the React Native CLI, identified as CVE-2025-11953, to execute remote commands and deploy stealthy Rust-based malware. This flaw arises from the React Native CLI's Metro server, which, by default, binds to external interfaces, making it susceptible to unauthorized access. This exploitation occurred weeks before the vulnerability was publicly disclosed, indicating that attackers are actively targeting this weakness. Users of React Native should be particularly vigilant, as the impact could extend to various applications built on this framework. Prompt action is necessary to secure affected systems and prevent further malicious activities.

Impact: React Native CLI, Metro server
Remediation: Users should immediately restrict access to the Metro server by modifying configuration settings to bind only to local interfaces. Additionally, they should monitor their systems for any signs of unauthorized access or malware installation. Regular updates and patches from React Native should be applied as they become available.
Read Original

A serious security vulnerability, identified as CVE-2025-11953 and nicknamed Metro4Shell, has been discovered in the Metro Development Server, which is part of the '@react-native-community/cli' npm package. This flaw, rated 9.8 on the CVSS scale, allows remote attackers to execute arbitrary code without authentication. Researchers from VulnCheck first detected active exploitation of this vulnerability on December 21, 2025. This poses a significant risk for developers and organizations using this package, as it could lead to unauthorized control over their systems. Users of the affected npm package need to take immediate action to protect their applications.

Impact: Metro Development Server in the '@react-native-community/cli' npm package.
Remediation: Developers should update their '@react-native-community/cli' package to the latest version to mitigate the vulnerability. They should also review their server configurations and implement security best practices to limit exposure to such attacks.
Read Original

Ukraine's Computer Emergency Response Team (CERT) has reported that Russian hackers are taking advantage of a newly patched vulnerability in Microsoft Office, identified as CVE-2026-21509. This flaw affects multiple versions of the software, which could leave users open to various cyberattacks. The exploitation of this vulnerability is concerning, especially as Microsoft Office is widely used in both personal and professional settings. Users and organizations are urged to ensure that their systems are updated with the latest security patches to mitigate the risk of being targeted. The situation underscores the need for vigilance in maintaining software security, especially with ongoing geopolitical tensions.

Impact: Microsoft Office (multiple versions)
Remediation: Users should apply the latest updates and patches provided by Microsoft for their respective versions of Office. Regularly check for updates to ensure protection against this vulnerability.
Read Original
Ivanti Issues Urgent Fix for Critical Zero-Day Flaws Under Active Attack

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Ivanti has reported two serious vulnerabilities in its Endpoint Manager Mobile (EPMM) software, identified as CVE-2026-1281 and CVE-2026-1340. These flaws allow remote code execution, meaning attackers could potentially take control of affected systems without needing physical access. The company warns that these vulnerabilities are currently being actively exploited, putting users at risk. Organizations using EPMM should prioritize applying the necessary security updates to safeguard their systems. Failure to address these vulnerabilities could lead to significant security breaches, affecting both the integrity of user data and the overall security posture of the organization.

Impact: Ivanti Endpoint Manager Mobile (EPMM) software
Remediation: Users should apply the latest patches provided by Ivanti for EPMM to mitigate the vulnerabilities. Specific patch numbers or versions were not mentioned in the article, but it is critical to ensure that the software is updated to the latest version available.
Read Original
Page 1 of 8Next