Snapshot
Jan. 18, 2025 - Jan. 24, 2025
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2025-23006 | SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) contain a deserialization of untrusted data vulnerability, which can enable a remote, unauthenticated attacker to execute arbitrary OS commands. | CRITICAL | SonicWall | Jan. 24, 2025 |
CVE-2020-11023 | JQuery contains a persistent cross-site scripting (XSS) vulnerability. When passing maliciously formed, untrusted input enclosed in HTML tags, JQuery's DOM manipulators can execute untrusted code in the context of the user's browser. | MEDIUM | JQuery | Jan. 23, 2025 |
Newswires |
||||
SonicWall SMA1000 Vulnerability Added to CISA's Known Exploited Vulnerabilities Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a known vulnerability in SonicWall's SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) to its Known Exploited Vulnerabilities catalog. |
Jan. 24, 2025 |
|||
Critical Zero-Day Vulnerability in SonicWall's SMA 1000 Series Under Active Exploitation
SonicWall has alerted its customers about a critical security vulnerability, identified as CVE-2025-23006, which affects its Secure Mobile Access (SMA) 1000 Series appliances. |
Jan. 24, 2025 |
|||
CISA Alerts on Ivanti Vulnerabilities Exploited in Cyber Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have issued a warning about threat actors exploiting a series of vulnerabilities in Ivanti's Cloud Service Appliance (CSA). |
Jan. 23, 2025 |
|||
Mirai Botnet Offshoots Instigate Global DDoS Attack Surge
Two distinct campaigns are currently exploiting vulnerabilities in a variety of IoT devices across the globe, with the objective of compromising these devices and disseminating malware on a global scale. |
Jan. 21, 2025 |
|||
13,000 MikroTik Routers Co-opted into Botnet for Malicious Spam and Cyberattacks
A botnet made up of approximately 13,000 commandeered MikroTik routers has been used to distribute malware through spam campaigns. |
Jan. 21, 2025 |
|||
Tunneling Protocol Vulnerabilities Put 4.2 Million Hosts at Risk, Including VPNs and Routers
New findings highlight security flaws in several tunneling protocols, which could potentially expose 4.2 million hosts to cyberattacks. |
Jan. 20, 2025 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2025-20156 (5) | A vulnerability in the REST API of Cisco Meeting Management could allow a remote, authenticated attacker with low privileges ... | CRITICAL |
Actively Exploited Remote Code Execution |
|
CVE-2025-21556 (2) | Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain . | CRITICAL | Risk Context N/A | |
CVE-2025-23006 (4) | Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Co... | CRITICAL | Sonicwall |
CISA Known Exploited Actively Exploited Remote Code Execution |
CVE-2025-21535 (2) | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware . | CRITICAL |
Actively Exploited Remote Code Execution |
|
CVE-2024-8963 (4) | Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality. | CRITICAL | Ivanti |
CISA Known Exploited Public Exploits Available |
CVE-2017-17215 (2) | Huawei HG532 with some customized versions has a remote code execution vulnerability. | HIGH | Huawei |
Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-9380 (4) | An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticat... | HIGH | Ivanti |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CVE-2024-9379 (4) | SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin p... | HIGH | Ivanti |
CISA Known Exploited Public Exploits Available |
CVE-2024-8190 (4) | An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote au... | HIGH | Ivanti |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CISA Known Exploited Vulnerabilities
CISA added two vulnerabilities to the known exploited vulnerabilities list.
JQuery — JQuery |
CVE-2020-11023 / Added: Jan. 23, 2025 |
MEDIUM CVSS 6.10 EPSS Score 38.15 EPSS Percentile 97.30 |
JQuery contains a persistent cross-site scripting (XSS) vulnerability. When passing maliciously formed, untrusted input enclosed in HTML tags, JQuery's DOM manipulators can execute untrusted code in the context of the user's browser. |
Headlines |
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2025-20156 |
CRITICAL CVSS 9.90 EPSS Score 0.04 EPSS Percentile 17.83 |
Actively Exploited Remote Code Execution |
Published: Jan. 22, 2025 |
A vulnerability in the REST API of Cisco Meeting Management could allow a remote, authenticated attacker with low privileges to elevate privileges to administrator on an affected device. This vulnerability exists because proper authorization is not enforced upon REST API users. An attacker could exploit this vulnerability by sending API requests to a specific endpoint. A successful exploit could allow the attacker to gain administrator-level control over edge nodes that are managed by Cisco Meeting Management. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2025-21556 |
CRITICAL CVSS 9.90 EPSS Score 0.04 EPSS Percentile 11.48 |
Risk Context N/A |
Published: Jan. 21, 2025 |
Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Agile Integration Services). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM Framework. While the vulnerability is in Oracle Agile PLM Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Agile PLM Framework. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2025-23006 |
CRITICAL CVSS 9.80 EPSS Score 1.37 EPSS Percentile 86.18 |
CISA Known Exploited Actively Exploited Remote Code Execution |
Published: Jan. 23, 2025 |
Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands. |
Vendor Impacted: Sonicwall |
Products Impacted: Sra Ex9000 Firmware, Sma7210, Sma7200 Firmware, Sma6200 Firmware, Sma7210 Firmware, Sma6210 Firmware, Sra Ex6000, Sma6200, Sra Ex7000, Sra Ex9000, Sra Ex6000 Firmware, Sra Ex7000 Firmware, Sma1000 Appliances, Sma8200v, Sma6210, Sma7200 |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2025-21535 |
CRITICAL CVSS 9.80 EPSS Score 0.04 EPSS Percentile 11.48 |
Actively Exploited Remote Code Execution |
Published: Jan. 21, 2025 |
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-8963 |
CRITICAL CVSS 9.10 EPSS Score 96.72 EPSS Percentile 99.78 |
CISA Known Exploited Public Exploits Available |
Published: Sept. 19, 2024 |
Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality. |
Vendor Impacted: Ivanti |
Products Impacted: Endpoint Manager Cloud Services Appliance, Cloud Services Appliance (Csa) |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2017-17215 |
HIGH CVSS 8.80 EPSS Score 27.98 EPSS Percentile 96.88 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: March 20, 2018 |
Huawei HG532 with some customized versions has a remote code execution vulnerability. An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code. |
Vendor Impacted: Huawei |
Products Impacted: Hg532, Hg532 Firmware |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-9380 |
HIGH CVSS 7.20 EPSS Score 4.27 EPSS Percentile 92.28 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: Oct. 8, 2024 |
An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution. |
Vendor Impacted: Ivanti |
Products Impacted: Endpoint Manager Cloud Services Appliance, Cloud Services Appliance (Csa) |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-9379 |
HIGH CVSS 7.20 EPSS Score 0.61 EPSS Percentile 78.69 |
CISA Known Exploited Public Exploits Available |
Published: Oct. 8, 2024 |
SQL injection in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements. |
Vendor Impacted: Ivanti |
Products Impacted: Endpoint Manager Cloud Services Appliance, Cloud Services Appliance (Csa) |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-8190 |
HIGH CVSS 7.20 EPSS Score 11.33 EPSS Percentile 95.24 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Sept. 10, 2024 |
An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability. |
Vendor Impacted: Ivanti |
Product Impacted: Cloud Services Appliance |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.