Snapshot
Feb. 10, 2024 - Feb. 16, 2024
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2024-21410 | Microsoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation. | CRITICAL | Microsoft | Feb. 15, 2024 |
CVE-2020-3259 | Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an information disclosure vulnerability. An attacker could retrieve memory contents on an affected device, which could lead to the disclosure of confidential information due to a buffer tracking issue when the software parses invalid URLs that are requested from the web services interface. This vulnerability affects only specific AnyConnect and WebVPN configurations. | HIGH | Cisco | Feb. 15, 2024 |
CVE-2024-21412 | Microsoft Windows Internet Shortcut Files contains an unspecified vulnerability that allows for a security feature bypass. | HIGH | Microsoft | Feb. 13, 2024 |
CVE-2024-21351 | Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience and inject code to potentially gain code execution, which could lead to some data exposure, lack of system availability, or both. | HIGH | Microsoft | Feb. 13, 2024 |
CVE-2023-43770 | Roundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that can lead to information disclosure via malicious link references in plain/text messages. | MEDIUM | Roundcube | Feb. 12, 2024 |
Newswires |
||||
SolarWinds Patches Critical RCE Vulnerabilities in Access Rights Manager
SolarWinds, a major provider of IT management software, has released patches for five remote code execution (RCE) vulnerabilities found in its Access Rights Manager (ARM) tool. |
Feb. 16, 2024 |
|||
CISA Issues Alert on Akira Ransomware Exploiting Cisco ASA/FTD Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about the Akira ransomware group exploiting a previously patched security flaw in Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. |
Feb. 16, 2024 |
|||
Critical Web Application Vulnerabilities Threatening Credit Unions Uncovered by LMG Security
LMG Security, a leading cybersecurity consulting company, has identified three critical software vulnerabilities posing a substantial threat to hundreds of U.S. organizations. |
Feb. 15, 2024 |
|||
Critical Security Flaws Leave Over 13,000 Ivanti Gateways at Risk
Several Ivanti Connect Secure and Policy Secure endpoints are still susceptible to a host of security vulnerabilities that were initially revealed over a month ago. |
Feb. 15, 2024 |
|||
CISA Adds Two Microsoft Windows Bugs to Its Known Exploited Vulnerabilities Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two Microsoft Windows vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. |
Feb. 15, 2024 |
|||
Microsoft Warns of Critical Exchange Server Bug Exploited as Zero-Day
Microsoft has updated its security advisory to warn about a critical vulnerability in Exchange Server, identified as CVE-2024-21410. |
Feb. 14, 2024 |
|||
Critical Privilege Elevation Flaw in Zoom's Windows App Patched
Zoom, a cloud-based video conferencing service used for corporate meetings, educational sessions, and social gatherings, has patched a critical flaw in its Windows applications. |
Feb. 14, 2024 |
|||
Critical RCE Vulnerability in Microsoft Outlook: Easy to Exploit, Hard to Defend
A critical security flaw in Microsoft Outlook, which can be exploited by remote unauthenticated attackers, has been discovered. |
Feb. 14, 2024 |
|||
Windows Defender Zero-Day Exploited to Deliver DarkMe RAT: Microsoft Issues Patch
Microsoft has addressed a zero-day vulnerability in its Windows Defender SmartScreen that was being exploited by a threat group, referred to as Water Hydra and DarkCasino, to distribute the DarkMe remote access trojan (RAT). |
Feb. 13, 2024 |
|||
Microsoft's February 2024 Patch Tuesday Addresses 73 Flaws and Two Zero-Days
The February 2024 Patch Tuesday from Microsoft addresses a total of 73 vulnerabilities, including two zero-days that are currently being exploited. |
Feb. 13, 2024 |
|||
Bumblebee Malware Resurfaces after Four Months, Targets US Organizations
The Bumblebee malware, first identified in April 2022, is back after a four-month pause. |
Feb. 13, 2024 |
|||
CISA Adds Roundcube Webmail XSS Vulnerability to its Known Exploited Vulnerabilities Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has included a persistent Cross-Site Scripting (XSS) vulnerability in Roundcube Webmail, tracked as CVE-2023-43770, in its Known Exploited Vulnerabilities catalog. |
Feb. 12, 2024 |
|||
Ivanti SSRF Flaw Exploited by Hackers to Deploy New DSLog Backdoor
Hackers have taken advantage of a server-side request forgery (SSRF) vulnerability in Ivanti's Connect Secure, Policy Secure, and ZTA gateways to deploy a newly identified backdoor, DSLog, on susceptible devices. |
Feb. 12, 2024 |
|||
C3RB3R Ransomware Exploits Confluence Vulnerability
Arctic Wolf Labs has discovered that the C3RB3R ransomware is being deployed by threat actors exploiting a critical template injection vulnerability (CVE-2023-22527) in Atlassian's Confluence Server and Data Center. |
Feb. 12, 2024 |
|||
Raspberry Robin Worm Incorporates Two New 1-Day LPE Exploits
Raspberry Robin, a Windows worm, was discovered by Red Canary's cybersecurity researchers. |
Feb. 11, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-21410 (17) | Microsoft Exchange Server Elevation of Privilege Vulnerability | CRITICAL | Microsoft |
CISA Known Exploited Actively Exploited |
CVE-2024-21413 (14) | Microsoft Outlook Remote Code Execution Vulnerability | CRITICAL |
Actively Exploited Remote Code Execution Public Exploits Available |
|
CVE-2024-21887 (6) | A command injection vulnerability in web components of Ivanti Connect Secure and Ivanti Policy Secure allows an authentica... | CRITICAL | Ivanti |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CVE-2023-36025 (6) | Windows SmartScreen Security Feature Bypass Vulnerability | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-21893 (9) | A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure and Ivanti Policy Secure and Iva... | HIGH | Ivanti |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2023-46805 (6) | An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote ... | HIGH | Ivanti |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CVE-2024-21412 (19) | Internet Shortcut Files Security Feature Bypass Vulnerability | HIGH | Microsoft |
CISA Known Exploited Remote Code Execution |
CVE-2023-38831 (7) | RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. | HIGH | Rarlab |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-21351 (17) | Windows SmartScreen Security Feature Bypass Vulnerability | HIGH | Microsoft |
CISA Known Exploited |
CVE-2023-43770 (6) | Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted li... | MEDIUM | Debian, Roundcube |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CISA Known Exploited Vulnerabilities
CISA added five vulnerabilities to the known exploited vulnerabilities list.
Cisco — Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) |
CVE-2020-3259 / Added: Feb. 15, 2024 |
HIGH CVSS 7.50 EPSS Score 1.93 EPSS Percentile 88.24 |
Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an information disclosure vulnerability. An attacker could retrieve memory contents on an affected device, which could lead to the disclosure of confidential information due to a buffer tracking issue when the software parses invalid URLs that are requested from the web services interface. This vulnerability affects only specific AnyConnect and WebVPN configurations. |
Headlines
|
Roundcube — Webmail |
CVE-2023-43770 / Added: Feb. 12, 2024 |
MEDIUM CVSS 6.10 EPSS Score 11.47 EPSS Percentile 95.06 |
Roundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that can lead to information disclosure via malicious link references in plain/text messages. |
Headlines
|
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-21410 |
CRITICAL CVSS 9.80 EPSS Score 0.71 EPSS Percentile 79.90 |
CISA Known Exploited Actively Exploited |
Published: Feb. 13, 2024 |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
Vendor Impacted: Microsoft |
Product Impacted: Exchange Server |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21413 |
CRITICAL CVSS 9.80 EPSS Score 0.09 EPSS Percentile 37.34 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: Feb. 13, 2024 |
Microsoft Outlook Remote Code Execution Vulnerability |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21887 |
CRITICAL CVSS 9.10 EPSS Score 97.30 EPSS Percentile 99.85 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 12, 2024 |
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. |
Vendor Impacted: Ivanti |
Products Impacted: Connect Secure And Policy Secure, Policy Secure, Connect Secure |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-36025 |
HIGH CVSS 8.80 EPSS Score 0.79 EPSS Percentile 80.94 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Nov. 14, 2023 |
Windows SmartScreen Security Feature Bypass Vulnerability |
Vendor Impacted: Microsoft |
Products Impacted: Windows, Windows Server 2022, Windows Server 2008, Windows 11 23h2, Windows Server 2019, Windows Server 2012, Windows 11 22h2, Windows 10 1809, Windows 11 21h2, Windows 10 22h2, Windows 10 1607, Windows 10 21h2, Windows Server 2016, Windows 10 1507 |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21893 |
HIGH CVSS 8.20 EPSS Score 96.25 EPSS Percentile 99.47 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 31, 2024 |
A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication. |
Vendor Impacted: Ivanti |
Products Impacted: Neurons For Zero-Trust Access, Connect Secure, Policy Secure, And Neurons, Policy Secure, Connect Secure |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-46805 |
HIGH CVSS 8.20 EPSS Score 96.27 EPSS Percentile 99.48 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 12, 2024 |
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. |
Vendor Impacted: Ivanti |
Products Impacted: Connect Secure And Policy Secure, Policy Secure, Connect Secure |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21412 |
HIGH CVSS 8.10 EPSS Score 1.01 EPSS Percentile 83.23 |
CISA Known Exploited Remote Code Execution |
Published: Feb. 13, 2024 |
Internet Shortcut Files Security Feature Bypass Vulnerability |
Vendor Impacted: Microsoft |
Product Impacted: Windows |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-38831 |
HIGH CVSS 7.80 EPSS Score 33.60 EPSS Percentile 96.92 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Aug. 23, 2023 |
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023. |
Vendor Impacted: Rarlab |
Product Impacted: Winrar |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21351 |
HIGH CVSS 7.60 EPSS Score 0.57 EPSS Percentile 77.15 |
CISA Known Exploited |
Published: Feb. 13, 2024 |
Windows SmartScreen Security Feature Bypass Vulnerability |
Vendor Impacted: Microsoft |
Product Impacted: Windows |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-43770 |
MEDIUM CVSS 6.10 EPSS Score 11.47 EPSS Percentile 95.06 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Sept. 22, 2023 |
Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior. |
Vendors Impacted: Debian, Roundcube |
Products Impacted: Webmail, Debian Linux |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.