Source |
Cyble |
Identifiant |
8647402 |
Date de publication |
2025-02-07 11:44:32 (vue: 2025-02-07 12:08:33) |
Titre |
Critical Vulnerabilities Reported in Cyble\\'s Weekly Vulnerability Insights |
Texte |
Overview
Cyble Research & Intelligence Labs (CRIL) published their Weekly Vulnerability Insights Report to clients, covering key vulnerabilities reported from January 29 to February 4, 2025. The analysis highlights critical security flaws that have posed cyber threats to various IT infrastructures globally. Notably, the Cybersecurity and Infrastructure Security Agency (CISA) added five vulnerabilities to the Known Exploited Vulnerability (KEV) catalog.
This report highlights vulnerabilities in several widely used software products and services, including Paessler PRTG Network Monitor, Microsoft .NET Framework, and Zyxel DSL devices. These vulnerabilities could impact a range of industries that rely on these systems to monitor, manage, and protect critical infrastructure.
Incorporation of Vulnerabilities into the KEV Catalog
CISA\'s inclusion of vulnerabilities in the KEV catalog is an important step in highlighting serious risks associated with widely deployed software. During this period, CISA added five vulnerabilities, including two dating back to 2018, that have been actively exploited and affect major IT infrastructure tools like Paessler PRTG Network Monitor. These vulnerabilities were assessed for their active exploitation and listed accordingly to ensure better protection for organizations globally.
Among the newly added vulnerabilities, CVE-2018-19410 and |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
0411 1024x512 19410 2018 2024 2025 21293 21298 21298: 24118 300x150 53104: 55591 56161: 9276 about access accordingly across action active actively activity actors added additional additionally admin advanced advisories affect affecting affects against agency ahead all allow allowing allows along also amd among analysis analyzed android another any apple application apts arbitrary archiver are assessed assessment assessments associated attachment attack attackers attacks attention authentication back become been behaviors being best better blog borne both breeding businesses bypass can caption= catalog channels cisa clear click clients code codes com/wp complete compromise concepts concerns conclusion conduct confidentiality consistent content/uploads/2025/02/cyble continues continuous controls could covering covers cpu cpus crafted cril critical criticality crucial cve cyber cybercriminals cybersecurity cyble cyble's cyble’s danger dangerous data dating defend deployed despite details develop devices directory disclosed discovered discoveries disruption domain driven dsl during email emails embedding emerging enable enforce enhance ensure ensures enterprises escalate escalation event execute execution exploit exploitation exploited exploits exposure extensively external factor february file file= firewalls five flaw flaws focused fortios forums framework from full functions further future gain globally ground growing hardware have hawk helping here high highlighting highlights highlights vulnerabilities in highly https://cyble identified identify image impact impacting implement important improperly including inclusion incorporation increasing indicate industries information informed infrastructure infrastructures insights instance: integrating integrity intelligence intelligence: interesting invest iocs january kernel kev key known labs landscape large latest lead leading less leverage like linking linux listed load looking loss macos major making malicious manage management may medium mfa microcode microsoft millions minimize mitigate mitigation monitor monitoring monitoring: most multi need net network networks new newly notable notably object observed offer offered official often ole open opening opportunity organizations other outlook oversee overview paessler parsed particularly past patch patches patching penetration performance period persistent platforms png poc popular posed poses potential potentially powered practices practices: previewing prioritizes privilege privileges proactive processes: products proof protect protection protocols provide prtg published putting range rce real received recent recommendation recommends regular regularly relate rely remote report reported reports research respectively risk risks run running secure security segmentation: segregate sensitive series serious services several severely severity share siem significant simply software solutions some source specially spread stay stems step strategies strategy subscribing such super surrounding suspicious swift system systems systems: telegram testing tests them these those threat threats through time timely title= tool tools triggered two unauthorized underground update updated updates used users using utilizing vapt various versions vigilance vision vlans vulnerabilities vulnerability vulnerable weaknesses weaponized week weekly when where which widely wild window windows within zen zip zyxel |
Tags |
Tool
Vulnerability
Threat
Patching
Mobile
|
Stories |
|
Move |
|