Articles tagged "CVE"

Found 168 articles

The National Institute of Standards and Technology (NIST) is narrowing its focus on analyzing Common Vulnerabilities and Exposures (CVE) due to the increasing number of vulnerabilities reported. Moving forward, NIST will concentrate its efforts on vulnerabilities found in critical software, systems utilized by the federal government, and those that are currently being exploited. This shift aims to streamline the analysis process and ensure that resources are allocated to the most pressing security issues. As the volume of vulnerabilities continues to rise, this change reflects a need for more targeted and efficient management of cybersecurity threats. It’s important for organizations and government entities to stay informed about these critical vulnerabilities to protect their systems effectively.

Impact: Vulnerabilities in critical software and systems used by the federal government.
Remediation: Organizations should prioritize monitoring for vulnerabilities in critical software and systems, particularly those under active exploitation. Regular updates and patches should be applied to these systems as they are made available.
Read Original
Actively Exploited

A severe vulnerability in nginx-ui, identified as CVE-2026-33032, is currently being exploited by attackers. This flaw allows unauthorized users to bypass authentication and gain complete control of Nginx servers, posing a significant risk to organizations using this web server technology. The vulnerability is linked to inadequate protection of the /mcp_message endpoint, which can be exploited without any prior authentication. With a CVSS score of 9.8, it is crucial for users to take immediate action to secure their systems. Organizations should prioritize patching their Nginx installations to mitigate this serious threat.

Impact: Nginx servers utilizing nginx-ui, specifically those with vulnerable configurations allowing access to the /mcp_message endpoint.
Remediation: Immediate patching of Nginx installations is recommended. Users should apply updates that address the CVE-2026-33032 vulnerability, ensuring that the /mcp_message endpoint is properly secured against unauthorized access.
Read Original

The European Union Agency for Cybersecurity (ENISA) is aiming to become a Top-Level Root CVE Numbering Authority, joining CISA and MITRE in this role. This move would allow ENISA to assign unique identifiers to vulnerabilities in software and hardware, which is crucial for tracking and addressing security issues across the EU. ENISA’s involvement in this program is expected to enhance the overall cybersecurity posture in Europe by improving coordination and communication regarding vulnerabilities. As cyber threats continue to evolve, having a dedicated authority in Europe could streamline responses and bolster the region's defenses against attacks. This initiative reflects a growing recognition of the importance of a unified approach to cybersecurity in Europe.

Impact: N/A
Remediation: N/A
Read Original
Actively Exploited

A serious security flaw has been identified in the nginx-ui MCP, specifically an authentication bypass vulnerability tracked as CVE-2026-33032. This vulnerability has a high severity score of 9.8 on the CVSS scale and is currently being exploited in the wild, making it a pressing concern for users and organizations running affected versions. Attackers could potentially gain unauthorized access to systems using this flaw, which poses significant risks to data integrity and confidentiality. It's crucial for system administrators to take immediate action to protect their environments from these attacks. Timely updates and security patches are essential to mitigate the risks associated with this vulnerability.

Impact: nginx-ui MCP; affected versions unspecified.
Remediation: Users should apply available patches for nginx-ui MCP as soon as they are released. Additionally, implementing strict access controls and monitoring for unusual activity can help mitigate potential exploitation until patches are applied.
Read Original

A serious vulnerability, identified as CVE-2026-33032, has been discovered in nginx-ui, a management tool for Nginx servers. This flaw allows attackers to bypass authentication, potentially giving them full control of the Nginx service. Dubbed MCPwn by Pluto Security, the vulnerability has a CVSS score of 9.8, indicating its critical nature. Users of nginx-ui are at risk, as the flaw is currently being actively exploited in the wild. It's crucial for affected organizations to take immediate action to secure their systems and prevent unauthorized access.

Impact: nginx-ui management tool for Nginx servers
Remediation: Users should immediately apply available patches for nginx-ui and consider implementing additional security measures, such as restricting access to the management interface and enabling stronger authentication mechanisms.
Read Original
wolfSSL Vulnerability Hits IoT, Routers and Military Systems, Update to 5.9.1 Now

Hackread – Cybersecurity News, Data Breaches, AI and More

A serious vulnerability identified as CVE-2026-5194 has been found in wolfSSL, affecting a vast array of devices, including Internet of Things (IoT) devices, routers, and military systems. This flaw allows attackers to forge digital identities, which poses a significant risk to the security of billions of devices globally. Users and organizations utilizing wolfSSL should promptly update to version 5.9.1 to mitigate this risk. The widespread impact of this vulnerability emphasizes the importance of regular software updates to maintain security across various platforms. Failure to address this issue could lead to unauthorized access and potential exploitation of sensitive systems.

Impact: Affected products include wolfSSL versions prior to 5.9.1, specifically impacting IoT devices, routers, and military systems utilizing this library.
Remediation: Update to wolfSSL version 5.9.1 to fix the vulnerability and reduce risk.
Read Original

Two serious vulnerabilities have been found in Composer, a popular package manager for PHP, which could allow attackers to execute arbitrary commands on affected systems. These flaws specifically target the Perforce VCS driver, raising concerns for developers and organizations that rely on this tool for managing PHP packages. If exploited, these vulnerabilities could lead to unauthorized access and control over systems using the affected versions. Users need to act quickly to apply the patches released to secure their environments and protect sensitive data from potential breaches. The vulnerabilities highlight the importance of maintaining updated software to mitigate risks.

Impact: Composer package manager for PHP, Perforce VCS driver
Remediation: Patches have been released for the vulnerabilities. Users are advised to update to the latest version of Composer that addresses these command injection flaws.
Read Original
Actively Exploited

A serious vulnerability has been discovered in ShowDoc, an online tool used by IT teams for document sharing and collaboration. This flaw, identified as CVE-2025-0520, allows attackers to execute remote code on unpatched servers, posing a significant risk to organizations that have not updated their systems. With a CVSS score of 9.4, this remote code execution vulnerability is currently being exploited in the wild, meaning that attackers are actively taking advantage of it. Companies using ShowDoc need to prioritize patching their servers to protect against potential breaches and unauthorized access to sensitive information. Failing to address this issue could lead to severe consequences for affected organizations.

Impact: ShowDoc servers running unpatched versions are affected by CVE-2025-0520.
Remediation: Organizations should immediately apply the latest patches for ShowDoc to mitigate the risk associated with CVE-2025-0520. Regularly updating software and monitoring for vulnerabilities is also recommended.
Read Original

A serious vulnerability, known as CVE-2026-39987, has been discovered in all versions of Marimo prior to 0.23.0, earning a high CVSS score of 9.3. This flaw allows attackers to potentially exploit systems running affected versions of the software, raising significant security concerns for users. Researchers noted that the vulnerability was actively exploited within hours of its disclosure, indicating a swift response from malicious actors. Users of Marimo are urged to update to version 0.23.0 or later to protect their systems from potential attacks. This incident emphasizes the critical need for timely software updates in response to newly identified vulnerabilities.

Impact: All versions of Marimo prior to 0.23.0
Remediation: Users should update to Marimo version 0.23.0 or later to mitigate the vulnerability.
Read Original
Actively Exploited

A serious vulnerability in the open-source Python notebook tool Marimo, identified as CVE-2026-39987, has been exploited within just 10 hours of its disclosure on April 8, 2026. This flaw has a CVSS score of 9.3, indicating its severity and potential impact. Researchers from the Sysdig Threat Research Team reported that attackers began exploiting this vulnerability almost immediately, raising alarms about the security of systems using Marimo. This incident underscores the urgency for users and organizations relying on this tool to take immediate action to protect their systems from potential breaches. Quick exploitation of such vulnerabilities demonstrates the need for timely patching and awareness in the cybersecurity community.

Impact: Marimo (open-source Python notebook tool)
Remediation: Users should apply patches as soon as they are available. It's also advisable to limit access to the Marimo tool and monitor for any unusual activity in systems that use it.
Read Original
Actively Exploited

A serious vulnerability in Marimo, an open-source Python notebook designed for data science, has been exploited within just 10 hours of being made public. The flaw, identified as CVE-2026-39987, allows attackers to execute remote code without needing authentication, affecting all versions of Marimo up to and including the latest release. Researchers from Sysdig reported this rapid exploitation, underscoring the urgency for users to address this security gap. Organizations using Marimo need to prioritize patching their installations to avoid potential breaches, as the high CVSS score of 9.3 indicates a significant risk. The swift exploitation of this vulnerability serves as a reminder of the importance of timely updates and security practices in software development.

Impact: All versions of Marimo prior to and including the latest release
Remediation: Users should immediately update to the latest version of Marimo to mitigate the risk associated with this vulnerability.
Read Original

A recent cybersecurity campaign attributed to APT28, also known as Fancy Bear, has been uncovered by Trend Micro. The attackers are using a new malware called PRISMEX to target Ukraine and its allies. They exploit recently disclosed vulnerabilities, specifically CVE-2026-21509 and CVE-2026-21513, to bypass security measures and gain unauthorized access. This type of espionage can significantly affect national security and the stability of the region, as sensitive information could be compromised. The targeting of Ukraine, in particular, raises alarms given the ongoing conflict in the area, indicating that the stakes are high for both military and political intelligence.

Impact: CVE-2026-21509, CVE-2026-21513 (specific products affected not listed)
Remediation: Organizations should apply security patches for CVE-2026-21509 and CVE-2026-21513 as they become available. It's also recommended to enhance monitoring for suspicious activity and to implement network segmentation to limit exposure.
Read Original

A serious vulnerability in Flowise, identified as CVE-2025-59528, is currently being exploited by attackers to execute malicious code remotely. This flaw, which has a CVSS score of 10, arises from insufficient validation of user-supplied JavaScript, allowing unauthorized access to systems and file systems. Organizations using Flowise are at risk, as this vulnerability can lead to significant security breaches. The exploitation of such vulnerabilities can result in data theft, system compromise, and other malicious activities. It's essential for users and administrators to be aware of this issue and take appropriate action to protect their systems.

Impact: Flowise software, specifically versions affected by CVE-2025-59528.
Remediation: Users should apply any available patches for Flowise as soon as they are released. It is also advisable to review security settings related to JavaScript validation and implement strict input validation measures to mitigate risks.
Read Original

A serious vulnerability in Docker Engine, identified as CVE-2026-34040, has been reported that allows attackers to bypass authorization plugins under certain conditions. This flaw has a high severity rating, with a CVSS score of 8.8, and it is rooted in an incomplete fix for a previous vulnerability, CVE-2024-41110, which was disclosed in July 2024. This means that systems relying on Docker for container management could be at risk, potentially allowing unauthorized access to the host system. Organizations using Docker should take immediate action to assess their exposure and implement necessary security measures. The implications of this vulnerability are significant, as it could lead to unauthorized actions on affected systems, compromising sensitive data and operations.

Impact: Docker Engine versions affected by CVE-2026-34040, specifically those relying on authorization plugins.
Remediation: Organizations should update their Docker Engine to the latest version as soon as patches are released. It's also advisable to review and strengthen authorization plugin configurations to mitigate potential risks.
Read Original

Researchers from VulnCheck have discovered that attackers are actively exploiting a severe vulnerability in Flowise, an open-source AI platform. The flaw, identified as CVE-2025-59528, has a maximum CVSS score of 10.0 and allows for remote code execution through a code injection vulnerability in the CustomMCP node. This means that unauthorized users could potentially execute commands on affected systems. Over 12,000 instances of Flowise are exposed, raising significant concerns for users and organizations relying on this platform. It's crucial for those affected to take immediate action to secure their systems against this vulnerability.

Impact: Flowise AI platform, specifically instances using the CustomMCP node feature.
Remediation: Users should immediately update their Flowise instances to the latest version that addresses CVE-2025-59528. Additionally, it is recommended to review and restrict input configurations for the CustomMCP node to prevent unauthorized code execution.
Read Original
Page 1 of 12Next