Snapshot
March 9, 2024 - March 15, 2024
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
No issues added to the CISA Known Exploited Vulnerability list. | ||||
Newswires |
||||
CISA Systems Compromised Through Ivanti Vulnerabilities, Prompting System Shutdown
In an alarming cybersecurity incident, unidentified threat actors successfully breached the systems of the Cybersecurity and Infrastructure Security Agency (CISA) by exploiting vulnerabilities in Ivanti products. |
March 11, 2024 |
|||
Magnet Goblin Exploits 1-Day Vulnerabilities with New Linux Variant of NerbianRAT Malware
The threat actor known as Magnet Goblin is making headlines for its ability to quickly exploit 1-day vulnerabilities in internet-facing services. |
March 11, 2024 |
|||
BianLian Threat Actors Utilize JetBrains TeamCity Vulnerabilities in Ransomware Assaults
BianLian ransomware actors have been identified exploiting security vulnerabilities in JetBrains TeamCity software to execute their ransom-focused attacks. |
March 11, 2024 |
|||
US CISA Systems Breached: Cybersecurity Measures Under Review
In an unsettling development, two vital systems of the US Cybersecurity and Infrastructure Security Agency (CISA) were compromised earlier this year. |
March 9, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-27198 (8) | In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible | CRITICAL | Jetbrains |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CVE-2023-42793 (4) | In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible | CRITICAL | Jetbrains |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CVE-2024-21762 (2) | A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 thro... | CRITICAL | Fortinet |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2022-24086 (2) | Adobe Commerce versions 2.4.3-p1 and 2.3.7-p2 are affected by an improper input validation vulnerability during the checkou... | CRITICAL | Adobe, Magento |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-22252 (2) | VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. | CRITICAL |
Public Exploits Available |
|
CVE-2024-21887 (4) | A command injection vulnerability in web components of Ivanti Connect Secure and Ivanti Policy Secure allows an authentica... | CRITICAL | Ivanti |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2023-46805 (4) | An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote ... | HIGH | Ivanti |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CVE-2024-21893 (3) | A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure and Ivanti Policy Secure and Iva... | HIGH | Ivanti |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-27199 (4) | In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible | HIGH | Risk Context N/A | |
CVE-2023-6000 (3) | The Popup Builder WordPress plugin before 4.2.3 does not prevent simple visitors from updating existing popups, and injecting... | MEDIUM | Sygnoos |
Actively Exploited Remote Code Execution Public Exploits Available |
CISA Known Exploited Vulnerabilities
CISA added 0 vulnerabilities to the known exploited vulnerabilities list.
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-27198 |
CRITICAL CVSS 9.80 EPSS Score 97.05 EPSS Percentile 99.74 |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: March 4, 2024 |
In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible |
Vendor Impacted: Jetbrains |
Product Impacted: Teamcity |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-42793 |
CRITICAL CVSS 9.80 EPSS Score 97.34 EPSS Percentile 99.88 |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: Sept. 19, 2023 |
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible |
Vendor Impacted: Jetbrains |
Product Impacted: Teamcity |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21762 |
CRITICAL CVSS 9.80 EPSS Score 2.29 EPSS Percentile 89.36 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Feb. 9, 2024 |
A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests |
Vendor Impacted: Fortinet |
Products Impacted: Fortiproxy, Fortios |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2022-24086 |
CRITICAL CVSS 9.80 EPSS Score 28.86 EPSS Percentile 96.74 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Feb. 16, 2022 |
Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution. |
Vendors Impacted: Adobe, Magento |
Products Impacted: Commerce, Magento, Commerce And Magento Open Source |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-22252 |
CRITICAL CVSS 9.30 EPSS Score 0.04 EPSS Percentile 7.08 |
Public Exploits Available |
Published: March 5, 2024 |
VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-21887 |
CRITICAL CVSS 9.10 EPSS Score 97.30 EPSS Percentile 99.86 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 12, 2024 |
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. |
Vendor Impacted: Ivanti |
Products Impacted: Connect Secure And Policy Secure, Policy Secure, Connect Secure |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-46805 |
HIGH CVSS 8.20 EPSS Score 96.27 EPSS Percentile 99.49 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 12, 2024 |
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. |
Vendor Impacted: Ivanti |
Products Impacted: Connect Secure And Policy Secure, Policy Secure, Connect Secure |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-21893 |
HIGH CVSS 8.20 EPSS Score 96.25 EPSS Percentile 99.48 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 31, 2024 |
A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication. |
Vendor Impacted: Ivanti |
Products Impacted: Connect Secure, Policy Secure, And Neurons, Policy Secure, Neurons For Zero-Trust Access, Connect Secure |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-27199 |
HIGH CVSS 7.30 EPSS Score 0.05 EPSS Percentile 19.45 |
Risk Context N/A |
Published: March 4, 2024 |
In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-6000 |
MEDIUM CVSS 6.10 EPSS Score 0.05 EPSS Percentile 14.15 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 1, 2024 |
The Popup Builder WordPress plugin before 4.2.3 does not prevent simple visitors from updating existing popups, and injecting raw JavaScript in them, which could lead to Stored XSS attacks. |
Vendor Impacted: Sygnoos |
Product Impacted: Popup Builder |
Quotes
|
Headlines |
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.