Snapshot
Dec. 7, 2024 - Dec. 13, 2024
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2024-50623 | Cleo Harmony, VLTrader, and LexiCom, which are managed file transfer products, contain an unrestricted file upload and download vulnerability that can lead to remote code execution with elevated privileges. | HIGH | Cleo | Dec. 13, 2024 |
CVE-2024-49138 | Microsoft Windows Common Log File System (CLFS) driver contains a heap-based buffer overflow vulnerability that allows a local attacker to escalate privileges. | HIGH | Microsoft | Dec. 10, 2024 |
Newswires |
||||
Cleo MFT Zero-Day Exploits Set to Surge: Cleopatra Backdoor and Ransomware Campaigns in Focus
The Cleo managed file transfer tool is currently under threat from an active ransomware campaign, which is expected to intensify following the public availability of a proof-of-concept exploit for a zero-day flaw in the software. |
Dec. 13, 2024 |
|||
Russian Cyber-Espionage Group Turla Uses Other Hackers' Infrastructure to Target Ukraine Military Devices
Russian cyber-espionage group Turla, also known as 'Secret Blizzard', is reportedly using the infrastructure of other threat actors to target Ukrainian military devices linked to Starlink. |
Dec. 11, 2024 |
|||
Ivanti Addresses Critical Vulnerabilities in its Cloud Services Appliance Solution
Ivanti has patched a critical vulnerability in its Cloud Services Appliance (CSA) solution that could have allowed an unauthenticated attacker to bypass authentication and gain administrative access. |
Dec. 11, 2024 |
|||
Microsoft Resolves 72 Security Flaws, Including an Actively Exploited CLFS Vulnerability
Microsoft's final Patch Tuesday updates for 2024 included fixes for 72 security flaws across its software range, one of which is currently being exploited. |
Dec. 11, 2024 |
|||
U.S. Accuses Chinese National of Hacking 81,000 Sophos Firewalls Using Zero-Day Exploit
On Tuesday, the U.S. government unveiled charges against a Chinese individual named Guan Tianfeng, also known as gbigmao and gxiaomao. |
Dec. 11, 2024 |
|||
Termite Ransomware Group Suspected Behind Zero-Day Exploits in Cleo Software
The ransomware group known as 'Termite' is believed to be responsible for a string of attacks exploiting a zero-day vulnerability in Cleo's LexiCom, VLTransfer, and Harmony file transfer software. |
Dec. 10, 2024 |
|||
High-Severity Bug in WPForms Plugin Exposes Millions of WordPress Sites to Stripe Refunds
A serious security flaw has been identified in WPForms, a WordPress plugin deployed across more than 6 million websites. |
Dec. 10, 2024 |
|||
Microsoft NTLM Zero-Day Vulnerability Unresolved Until April
A second zero-day vulnerability has been discovered in Windows NTLM, following the one found two months prior, creating a path for potential relay attacks and credential theft. |
Dec. 9, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-11639 (4) | An authentication bypass in the admin web console of Ivanti CSA before 5.0.3 allows a remote unauthenticated attacker to gain... | CRITICAL | Risk Context N/A | |
CVE-2024-49112 (9) | Windows Lightweight Directory Access Protocol Remote Code Execution Vulnerability | CRITICAL |
Remote Code Execution |
|
CVE-2020-12271 (4) | A SQL injection issue was found in SFOS 17.0, 17.1, 17.5, and 18.0 before 2020-04-25 on Sophos XG Firewall devices, as exploi... | CRITICAL | Sophos |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware |
CVE-2024-11773 (3) | SQL injection in the admin web console of Ivanti CSA before version 5.0.3 allows a remote authenticated attacker with admin p... | CRITICAL | Risk Context N/A | |
CVE-2024-11772 (3) | Command injection in the admin web console of Ivanti CSA before version 5.0.3 allows a remote authenticated attacker with adm... | CRITICAL |
Remote Code Execution |
|
CVE-2024-8963 (3) | Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality. | CRITICAL | Ivanti |
CISA Known Exploited Public Exploits Available |
CVE-2024-50623 (14) | In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload ... | HIGH | Cleo |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CVE-2024-49117 (5) | Windows Hyper-V Remote Code Execution Vulnerability | HIGH |
Remote Code Execution |
|
CVE-2024-49138 (12) | Windows Common Log File System Driver Elevation of Privilege Vulnerability | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution |
CVE-2024-54143 (4) | openwrt/asu is an image on demand server for OpenWrt based distributions. | N/A |
Actively Exploited Remote Code Execution |
CISA Known Exploited Vulnerabilities
CISA added two vulnerabilities to the known exploited vulnerabilities list.
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-11639 |
CRITICAL CVSS 10.00 EPSS Score 0.04 EPSS Percentile 10.84 |
Risk Context N/A |
Published: Dec. 10, 2024 |
An authentication bypass in the admin web console of Ivanti CSA before 5.0.3 allows a remote unauthenticated attacker to gain administrative access |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-49112 |
CRITICAL CVSS 9.80 EPSS Score 0.04 EPSS Percentile 10.84 |
Remote Code Execution |
Published: Dec. 12, 2024 |
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2020-12271 |
CRITICAL CVSS 9.80 EPSS Score 1.67 EPSS Percentile 88.14 |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware |
Published: April 27, 2020 |
A SQL injection issue was found in SFOS 17.0, 17.1, 17.5, and 18.0 before 2020-04-25 on Sophos XG Firewall devices, as exploited in the wild in April 2020. This affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. A successful attack may have caused remote code execution that exfiltrated usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access (but not external Active Directory or LDAP passwords) |
Vendor Impacted: Sophos |
Products Impacted: Xg Firewall, Sfos |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-11773 |
CRITICAL CVSS 9.10 EPSS Score 0.04 EPSS Percentile 10.84 |
Risk Context N/A |
Published: Dec. 10, 2024 |
SQL injection in the admin web console of Ivanti CSA before version 5.0.3 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-11772 |
CRITICAL CVSS 9.10 EPSS Score 0.04 EPSS Percentile 10.84 |
Remote Code Execution |
Published: Dec. 10, 2024 |
Command injection in the admin web console of Ivanti CSA before version 5.0.3 allows a remote authenticated attacker with admin privileges to achieve remote code execution. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-8963 |
CRITICAL CVSS 9.10 EPSS Score 96.72 EPSS Percentile 99.72 |
CISA Known Exploited Public Exploits Available |
Published: Sept. 19, 2024 |
Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality. |
Vendor Impacted: Ivanti |
Products Impacted: Cloud Services Appliance (Csa), Endpoint Manager Cloud Services Appliance |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-50623 |
HIGH CVSS 8.80 EPSS Score 0.05 EPSS Percentile 23.41 |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: Oct. 28, 2024 |
In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload and download that could lead to remote code execution. |
Vendor Impacted: Cleo |
Product Impacted: Multiple Products |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-49117 |
HIGH CVSS 8.80 EPSS Score 0.04 EPSS Percentile 10.84 |
Remote Code Execution |
Published: Dec. 12, 2024 |
Windows Hyper-V Remote Code Execution Vulnerability |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-49138 |
HIGH CVSS 7.80 EPSS Score 1.18 EPSS Percentile 85.69 |
CISA Known Exploited Actively Exploited Remote Code Execution |
Published: Dec. 12, 2024 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Vendor Impacted: Microsoft |
Products Impacted: Windows, Windows Server 2012, Windows Server 2019, Windows Server 2016, Windows 10 1507, Windows Server 2022 23h2, Windows 11 23h2, Windows 10 21h2, Windows Server 2008, Windows Server 2025, Windows 10 1809, Windows 10 1607, Windows 11 22h2, Windows Server 2022, Windows 11 24h2, Windows 10 22h2 |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-54143 |
CVSS Not Assigned EPSS Score 0.04 EPSS Percentile 10.84 |
Actively Exploited Remote Code Execution |
Published: Dec. 6, 2024 |
openwrt/asu is an image on demand server for OpenWrt based distributions. The request hashing mechanism truncates SHA-256 hashes to only 12 characters. This significantly reduces entropy, making it feasible for an attacker to generate collisions. By exploiting this, a previously built malicious image can be served in place of a legitimate one, allowing the attacker to "poison" the artifact cache and deliver compromised images to unsuspecting users. This can be combined with other attacks, such as a command injection in Imagebuilder that allows malicious users to inject arbitrary commands into the build process, resulting in the production of malicious firmware images signed with the legitimate build key. This has been patched with 920c8a1. |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.