Snapshot
Jan. 13, 2024 - Jan. 19, 2024
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2023-35082 | Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core contain an authentication bypass vulnerability that allows unauthorized users to access restricted functionality or resources of the application. | CRITICAL | Ivanti | Jan. 18, 2024 |
CVE-2023-6549 | Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for a denial-of-service when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. | HIGH | Citrix | Jan. 17, 2024 |
CVE-2023-6548 | Citrix NetScaler ADC and NetScaler Gateway contain a code injection vulnerability that allows for authenticated remote code execution on the management interface with access to NSIP, CLIP, or SNIP. | MEDIUM | Citrix | Jan. 17, 2024 |
CVE-2024-0519 | Google Chromium V8 contains an out-of-bounds memory access vulnerability. Specific impacts from exploitation are not available at this time. | N/A | Jan. 17, 2024 | |
CVE-2018-15133 | Laravel Framework contains a deserialization of untrusted data vulnerability, allowing for remote command execution. This vulnerability may only be exploited if a malicious user has accessed the application encryption key (APP_KEY environment variable). | HIGH | Laravel | Jan. 16, 2024 |
Newswires |
||||
CISA Issues Emergency Directive to Address Ivanti Zero-Day Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) has issued its first emergency directive for the year, instructing Federal Civilian Executive Branch (FCEB) agencies to urgently address two zero-day vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure. |
Jan. 19, 2024 |
|||
Chinese Hackers Utilized VMware Vulnerability as Zero-Day for Two Years
A Chinese hacking group, UNC3886, has been found to have exploited a critical vulnerability in the vCenter Server (CVE-2023-34048) as a zero-day for approximately two years. |
Jan. 19, 2024 |
|||
Critical vCenter Server Vulnerability Now Actively Exploited
VMware has officially confirmed that the critical vCenter Server vulnerability, CVE-2023-34048, has been exploited in the wild. |
Jan. 19, 2024 |
|||
Critical Ivanti Authentication Bypass Bug Now Actively Exploited, Warns CISA
The Cybersecurity and Infrastructure Security Agency (CISA) has alerted about a critical authentication bypass vulnerability in Ivanti's Endpoint Manager Mobile (EPMM) and MobileIron Core device management software that is currently being actively exploited. |
Jan. 18, 2024 |
|||
CISA Mandates Federal Agencies to Address Citrix and Google Chrome Zero-Days Within Set Timeframes
CISA has issued an urgent directive to U.S. federal agencies, calling for immediate action against three recently patched zero-day vulnerabilities in Citrix NetScaler and Google Chrome. |
Jan. 17, 2024 |
|||
GitHub Takes Precautionary Measures Following Discovery of Credential-Exposing Flaw
GitHub has taken steps to address a vulnerability, identified as CVE-2024-0200, that could have allowed attackers to access credentials within production containers via environment variables. |
Jan. 16, 2024 |
|||
Citrix Issues Urgent Warning for Two Actively Exploited Zero-Day Vulnerabilities
Citrix has issued a warning to its customers about two zero-day vulnerabilities (CVE-2023-6548 and CVE-2023-6549) that are currently being exploited in attacks. |
Jan. 16, 2024 |
|||
Google Addresses First Actively Exploited Chrome Zero-Day Vulnerability of 2024
Google has patched the first Chrome zero-day vulnerability of 2024 that has been actively exploited. |
Jan. 16, 2024 |
|||
Androxgh0st Malware Botnet Targets AWS and Microsoft Credentials: FBI and CISA Alert
The FBI and CISA issued a warning regarding threat actors utilizing the Androxgh0st malware to construct a botnet focusing on cloud credential theft, and using the stolen credentials to deliver further malicious payloads. |
Jan. 16, 2024 |
|||
Critical Vulnerability in VMware Aria Automation Addressed: Immediate Update Recommended
VMware has recently addressed a serious security flaw in its Aria Automation platform, which was previously known as vRealize Automation. |
Jan. 16, 2024 |
|||
Critical RCE Vulnerability Found in Older Atlassian Confluence Versions
Atlassian has alerted users to a critical remote code execution (RCE) vulnerability affecting older versions of Confluence Data Center and Confluence Server, including out-of-support releases. |
Jan. 16, 2024 |
|||
Ivanti's Connect Secure VPN and Policy Secure NAC Appliances Face Mass Exploitation
Volexity, a threat intelligence company, has discovered two zero-day vulnerabilities in Ivanti's Connect Secure VPN and Policy Secure network access control (NAC) appliances, which have been under mass exploitation since December. |
Jan. 16, 2024 |
|||
Over 178,000 SonicWall Firewalls Exposed to Potential Hacks Due to Unpatched Vulnerabilities
Two unpatched vulnerabilities, tracked as CVE-2022-22274 and CVE-2023-0656, have been discovered in SonicWall next-generation firewall (NGFW) series 6 and 7 devices, potentially exposing over 178,000 of these firewalls online to hacking attempts. |
Jan. 15, 2024 |
|||
Phemedrone Malware Campaign Exploits Windows SmartScreen Bypass Vulnerability
Trend Micro researchers have discovered a malware campaign that leverages the CVE-2023-36025 vulnerability to deploy a new strain of malware called Phemedrone Stealer. |
Jan. 15, 2024 |
|||
Over 7,100 WordPress Sites Compromised by Balada Injector Malware Exploiting Plugin Vulnerability
The Balada Injector malware has infected more than 7,100 WordPress sites by exploiting a vulnerability in a plugin called Popup Builder. |
Jan. 15, 2024 |
|||
Denmark's Energy Sector Cyber Attacks Not Executed by Russia-Linked APT, Reveals Forescout
The cyber attacks that targeted Denmark's energy sector in 2023 were previously linked to the Russia-associated Advanced Persistent Threat (APT) group, Sandworm. |
Jan. 14, 2024 |
|||
Akira Ransomware Attacks Escalate in Finland: NCSC-FI Reports
The National Cybersecurity Center of Finland (NCSC-FI) has observed a significant increase in Akira ransomware attacks against Finnish organizations. |
Jan. 13, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2023-22527 (9) | A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker ... | CRITICAL |
Actively Exploited Remote Code Execution Public Exploits Available |
|
CVE-2023-34063 (8) | Aria Automation contains a Missing Access Control vulnerability. | CRITICAL |
Remote Code Execution |
|
CVE-2023-35078 (7) | An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resourc... | CRITICAL | Ivanti |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2023-35082 (6) | An authentication bypass vulnerability in Ivanti EPMM 11.10 and older, allows unauthorized users to access restricted functio... | CRITICAL | Ivanti |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CVE-2024-21887 (17) | A command injection vulnerability in web components of Ivanti Connect Secure and Ivanti Policy Secure allows an authentica... | CRITICAL | Ivanti |
CISA Known Exploited Public Exploits Available |
CVE-2023-36025 (7) | Windows SmartScreen Security Feature Bypass Vulnerability | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2023-46805 (17) | An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote ... | HIGH | Ivanti |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CVE-2023-6549 (8) | Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthe... | HIGH | Citrix |
CISA Known Exploited |
CVE-2023-6548 (8) | Improper Control of Generation of Code in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP o... | MEDIUM | Citrix |
CISA Known Exploited Remote Code Execution |
CVE-2024-0519 (9) | Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit h... | N/A |
CISA Known Exploited Actively Exploited Remote Code Execution |
CISA Known Exploited Vulnerabilities
CISA added five vulnerabilities to the known exploited vulnerabilities list.
Google — Chromium V8 |
CVE-2024-0519 / Added: Jan. 17, 2024 |
CVSS Not Assigned |
Google Chromium V8 contains an out-of-bounds memory access vulnerability. Specific impacts from exploitation are not available at this time. |
Headlines
|
Laravel — Laravel Framework |
CVE-2018-15133 / Added: Jan. 16, 2024 |
HIGH CVSS 8.10 EPSS Score 62.42 EPSS Percentile 97.56 |
Laravel Framework contains a deserialization of untrusted data vulnerability, allowing for remote command execution. This vulnerability may only be exploited if a malicious user has accessed the application encryption key (APP_KEY environment variable). |
Headlines
|
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2023-22527 |
CRITICAL CVSS 10.00 EPSS Score 0.04 EPSS Percentile 8.15 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 16, 2024 |
A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action. Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-34063 |
CRITICAL CVSS 9.90 EPSS Score 0.04 EPSS Percentile 6.82 |
Remote Code Execution |
Published: Jan. 16, 2024 |
Aria Automation contains a Missing Access Control vulnerability. An authenticated malicious actor may exploit this vulnerability leading to unauthorized access to remote organizations and workflows. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-35078 |
CRITICAL CVSS 9.80 EPSS Score 95.34 EPSS Percentile 99.20 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: July 25, 2023 |
An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication. |
Vendor Impacted: Ivanti |
Products Impacted: Endpoint Manager Mobile (Epmm), Endpoint Manager Mobile |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-35082 |
CRITICAL CVSS 9.80 EPSS Score 92.45 EPSS Percentile 98.79 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: Aug. 15, 2023 |
An authentication bypass vulnerability in Ivanti EPMM 11.10 and older, allows unauthorized users to access restricted functionality or resources of the application without proper authentication. This vulnerability is unique to CVE-2023-35078 announced earlier. |
Vendor Impacted: Ivanti |
Products Impacted: Endpoint Manager Mobile (Epmm) And Mobileiron Core, Endpoint Manager Mobile |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21887 |
CRITICAL CVSS 9.10 EPSS Score 95.69 EPSS Percentile 99.29 |
CISA Known Exploited Public Exploits Available |
Published: Jan. 12, 2024 |
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. |
Vendor Impacted: Ivanti |
Products Impacted: Connect Secure, Connect Secure And Policy Secure, Policy Secure |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-36025 |
HIGH CVSS 8.80 EPSS Score 0.69 EPSS Percentile 78.08 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Nov. 14, 2023 |
Windows SmartScreen Security Feature Bypass Vulnerability |
Vendor Impacted: Microsoft |
Products Impacted: Windows Server 2008, Windows Server 2022, Windows 10 1507, Windows 11 23h2, Windows Server 2016, Windows Server 2012, Windows, Windows 11 21h2, Windows 10 22h2, Windows 10 21h2, Windows 10 1607, Windows 11 22h2, Windows Server 2019, Windows 10 1809 |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-46805 |
HIGH CVSS 8.20 EPSS Score 92.41 EPSS Percentile 98.78 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 12, 2024 |
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. |
Vendor Impacted: Ivanti |
Products Impacted: Connect Secure, Connect Secure And Policy Secure, Policy Secure |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-6549 |
HIGH CVSS 8.20 |
CISA Known Exploited |
Published: Jan. 17, 2024 |
Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service |
Vendor Impacted: Citrix |
Product Impacted: Netscaler Adc And Netscaler Gateway |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-6548 |
MEDIUM CVSS 5.50 |
CISA Known Exploited Remote Code Execution |
Published: Jan. 17, 2024 |
Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface. |
Vendor Impacted: Citrix |
Product Impacted: Netscaler Adc And Netscaler Gateway |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-0519 |
CVSS Not Assigned |
CISA Known Exploited Actively Exploited Remote Code Execution |
Published: Jan. 16, 2024 |
Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
Vendor Impacted: Google |
Product Impacted: Chromium V8 |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.