Source |
Cyble |
Identifiant |
8655309 |
Date de publication |
2025-03-12 15:03:52 (vue: 2025-03-12 15:08:10) |
Titre |
CISA ajoute cinq nouvelles vulnérabilités à son catalogue de vulnérabilités exploitées connues CISA Adds Five New Vulnerabilities to Its Known Exploited Vulnerabilities Catalog |
Texte |
aperçu
L'Agence de sécurité de la cybersécurité et de l'infrastructure (CISA) a récemment mis à jour son catalogue connu sur les vulnérabilités exploitées (KEV) en ajoutant cinq vulnérabilités exploitées par les cybercriminels. Ces nouvelles entrées mettent en évidence les défauts critiques dans les systèmes logiciels largement utilisés, y compris ceux qui ont un impact sur le Veracore Advantive et Ivanti Endpoint Manager (EPM). L'identification de ces vulnérabilités met l'accent Cybersecurity Les risques pour les stratégies fédérales et privées, ainsi que la nécessité de l'urg des organisations.
Dans le cadre de ses efforts en cours pour protéger les infrastructures critiques, CISA a mis en évidence le |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
the these 13159 13159: 13159 13160 13160: 13160 13161 13161: 13161 2022 2024 2025 25181 25181: 25181 300x150 57968 57968: 57968 absolute access active actively activity: actors added adding address adds advantive advised affected affecting affects against agency all allowing allows although another applied apply applying arbitrary are asp associated attack attacker attackers attacks attempts authenticated authorized based been being better block breach breaches browsing can caption= carries catalog catalog cataloged catalog cause cisa classified code com/wp commands commonly concerning conclusion confidentiality content/uploads/2025/03/vulnerabilities continuously control controls: could critical crucial cve cvss cybercriminals cybersecurity damage data defenses defensive detection directories directory discovered during each efforts emerge emphasized emphasizes enable endpoint enforce ensure ensuring enterprise entries environments epm escalating especially essential events/alerts/2025/03/10/cisa evidence execute execution exfiltration exploit exploitation exploitation: exploited expose exposing failing failure february federal file file= files five flaw flaws follow following frequently further gain given gov/news guidance has have helps higher highest highlight highlighted highlighting https://cyble https://www id=cve identification identified identify image immediate immediately immediately: impacting implement incidents includes including increasingly indicates information informed infrastructure injection injection intended intrusion issues its ivanti january jpg kev known large latest lead leaking leaves like limit linked login looking making malicious manage manager manipulates manipulating measures medium mitigate mitigating mitigation monitor nature necessary need networks new newer not occur ongoing only org/cverecord organizational organizations other outside overview parameter part particularly patch patches patching path paths patterns pmsess1 policies posed possible potential potentially present prevent prevention prior prioritize private proactive proper protect protection provided published recently recommendation recommendations recommended references: related remote remotely resource resources respond result risk risks risks score security sensitive several severe severity should signs software soon sql staying strategies strategies strict strongly su6 such suspicious system systems taking target targeted targeting them these those threats through timely timeoutwarning title= tools: traversal types unauthenticated unauthorized unintended unrestricted unusual update updated updating upload upload uploads urged urgent use used users using utilize variety vectors veracore version versions vulnerabilities vulnerabilities vulnerabilities: vulnerability vulnerability vulnerable web well when where which who wide widely within yet |
Tags |
Tool
Vulnerability
Threat
Patching
|
Stories |
|
Move |
|