Snapshot
Dec. 28, 2024 - Jan. 3, 2025
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2024-3393 | Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malicious DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode. | HIGH | Palo Alto Networks | Dec. 30, 2024 |
Newswires |
||||
LDAPNightmare: PoC Exploit Targets Windows LDAP Flaw CVE-2024-49113
The vulnerability CVE-2024-49113, also known as LDAPNightmare, is a Windows Lightweight Directory Access Protocol (LDAP) Denial of Service flaw that was identified by Yuki Chen. |
Jan. 3, 2025 |
|||
US Treasury Department Cyberattack Traced to Chinese State-Sponsored Threat Actors Through Breached Remote Support Platform
A cyberattack on the US Treasury Department has been traced back to Chinese state-sponsored threat actors. |
Dec. 30, 2024 |
|||
Four-Faith Routers Under Attack: Hackers Exploit Vulnerability to Open Reverse Shells
A post-authentication remote command injection vulnerability, labeled as CVE-2024-12856, in Four-Faith routers is being exploited by cybercriminals to establish reverse shells, a channel that allows them to communicate with the compromised systems. |
Dec. 30, 2024 |
|||
Outdated D-Link Routers Targeted by Ficora and Capsaicin Botnets
Recent cyberattacks have seen two botnets, known as 'Ficora' and 'Capsaicin', exploiting outdated D-Link routers. |
Dec. 29, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-45387 (2) | An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role... | CRITICAL |
Remote Code Execution |
|
CVE-2024-12356 (5) | A critical vulnerability has been discovered in Privileged Remote Access and Remote Support products which can allow an una... | CRITICAL | Beyondtrust |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-49112 (5) | Windows Lightweight Directory Access Protocol Remote Code Execution Vulnerability | CRITICAL | Microsoft |
Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2022-37056 (3) | D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 is vulnerable to Command Injection via /cgibin, hnap_main, | CRITICAL | Dlink | Risk Context N/A |
CVE-2019-10891 (3) | An issue was discovered in D-Link DIR-806 devices. | CRITICAL | Dlink | Risk Context N/A |
CVE-2015-2051 (3) | The D-Link DIR-645 Wired/Wireless Router Rev. | CRITICAL | D-Link, Dlink |
CISA Known Exploited Actively Exploited Remote Code Execution |
CVE-2024-49113 (3) | Windows Lightweight Directory Access Protocol Denial of Service Vulnerability | HIGH | Microsoft |
Public Exploits Available |
CVE-2024-33112 (3) | D-Link DIR-845L router v1.01KRb03 and before is vulnerable to Command injection via the hnap_mainfunc. | HIGH | Risk Context N/A | |
CVE-2024-12856 (4) | The Four-Faith router models F3x24 and F3x36 are affected by an operating system command injection vulnerability. | HIGH |
Actively Exploited Remote Code Execution Public Exploits Available |
|
CVE-2024-12686 (4) | A vulnerability has been discovered in Privileged Remote Access and Remote Support which can allow an attacker with existin... | HIGH | Beyondtrust |
CISA Known Exploited Actively Exploited Remote Code Execution |
CISA Known Exploited Vulnerabilities
CISA added one vulnerability to the known exploited vulnerabilities list.
Palo Alto Networks — PAN-OS |
CVE-2024-3393 / Added: Dec. 30, 2024 |
HIGH CVSS 7.50 EPSS Score 0.78 EPSS Percentile 81.42 |
Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malicious DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode. |
Headlines
|
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-45387 |
CRITICAL CVSS 9.90 EPSS Score 0.04 EPSS Percentile 11.48 |
Remote Code Execution |
Published: Dec. 23, 2024 |
An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role "admin", "federation", "operations", "portal", or "steering" to execute arbitrary SQL against the database by sending a specially-crafted PUT request. Users are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-12356 |
CRITICAL CVSS 9.80 EPSS Score 1.30 EPSS Percentile 85.80 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Dec. 17, 2024 |
A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user. |
Vendor Impacted: Beyondtrust |
Products Impacted: Privileged Remote Access (Pra) And Remote Support (Rs) , Privileged Remote Access, Remote Support |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-49112 |
CRITICAL CVSS 9.80 EPSS Score 0.05 EPSS Percentile 23.46 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: Dec. 12, 2024 |
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
Vendor Impacted: Microsoft |
Products Impacted: Windows Server 2016, Windows 10 1607, Windows Server 2012, Windows Server 2025, Windows 10 22h2, Windows 10 1507, Windows Server 2008, Windows Server 2022 23h2, Windows 10 21h2, Windows 11 22h2, Windows Server 2019, Windows 11 24h2, Windows Server 2022, Windows 10 1809 |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-37056 |
CRITICAL CVSS 9.80 EPSS Score 0.95 EPSS Percentile 83.23 |
Risk Context N/A |
Published: Aug. 28, 2022 |
D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 is vulnerable to Command Injection via /cgibin, hnap_main, |
Vendor Impacted: Dlink |
Products Impacted: Go-Rt-Ac750 Firmware, Go-Rt-Ac750 |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2019-10891 |
CRITICAL CVSS 9.80 EPSS Score 3.07 EPSS Percentile 90.95 |
Risk Context N/A |
Published: Sept. 6, 2019 |
An issue was discovered in D-Link DIR-806 devices. There is a command injection in function hnap_main, which calls system() without checking the parameter that can be controlled by user, and finally allows remote attackers to execute arbitrary shell commands with a special HTTP header. |
Vendor Impacted: Dlink |
Products Impacted: Dir-806 Firmware, Dir-806 |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2015-2051 |
CRITICAL CVSS 9.80 EPSS Score 94.62 EPSS Percentile 99.45 |
CISA Known Exploited Actively Exploited Remote Code Execution |
Published: Feb. 23, 2015 |
The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface. |
Vendors Impacted: D-Link, Dlink |
Products Impacted: Dir-645, Dir-645 Router, Dir-645 Firmware |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-49113 |
HIGH CVSS 7.50 EPSS Score 0.05 EPSS Percentile 23.46 |
Public Exploits Available |
Published: Dec. 12, 2024 |
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability |
Vendor Impacted: Microsoft |
Products Impacted: Windows Server 2016, Windows 10 1607, Windows Server 2012, Windows Server 2025, Windows 10 22h2, Windows 10 1507, Windows Server 2008, Windows Server 2022 23h2, Windows 10 21h2, Windows 11 22h2, Windows Server 2019, Windows 11 24h2, Windows Server 2022, Windows 10 1809 |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-33112 |
HIGH CVSS 7.50 EPSS Score 0.04 EPSS Percentile 11.76 |
Risk Context N/A |
Published: May 6, 2024 |
D-Link DIR-845L router v1.01KRb03 and before is vulnerable to Command injection via the hnap_main()func. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-12856 |
HIGH CVSS 7.20 EPSS Score 0.05 EPSS Percentile 19.33 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: Dec. 27, 2024 |
The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-12686 |
HIGH CVSS 7.20 EPSS Score 6.18 EPSS Percentile 93.56 |
CISA Known Exploited Actively Exploited Remote Code Execution |
Published: Dec. 18, 2024 |
A vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) which can allow an attacker with existing administrative privileges to inject commands and run as a site user. |
Vendor Impacted: Beyondtrust |
Products Impacted: Privileged Remote Access, Privileged Remote Access (Pra) And Remote Support (Rs), Remote Support |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.