Snapshot
Dec. 28, 2024 - Jan. 3, 2025
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2024-3393 | Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malicious DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode. | N/A | Palo Alto Networks | Dec. 30, 2024 |
Newswires |
||||
LDAPNightmare: PoC Exploit Targets Windows LDAP Flaw CVE-2024-49113
The vulnerability CVE-2024-49113, also known as LDAPNightmare, is a Windows Lightweight Directory Access Protocol (LDAP) Denial of Service flaw that was identified by Yuki Chen. |
Jan. 3, 2025 |
|||
US Treasury Department Cyberattack Traced to Chinese State-Sponsored Threat Actors Through Breached Remote Support Platform
A cyberattack on the US Treasury Department has been traced back to Chinese state-sponsored threat actors. |
Dec. 30, 2024 |
|||
Four-Faith Routers Under Attack: Hackers Exploit Vulnerability to Open Reverse Shells
A post-authentication remote command injection vulnerability, labeled as CVE-2024-12856, in Four-Faith routers is being exploited by cybercriminals to establish reverse shells, a channel that allows them to communicate with the compromised systems. |
Dec. 30, 2024 |
|||
Outdated D-Link Routers Targeted by Ficora and Capsaicin Botnets
Recent cyberattacks have seen two botnets, known as 'Ficora' and 'Capsaicin', exploiting outdated D-Link routers. |
Dec. 29, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-12356 (5) | A critical vulnerability has been discovered in Privileged Remote Access and Remote Support products which can allow an una... | CRITICAL | Beyondtrust |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-49112 (5) | Windows Lightweight Directory Access Protocol Remote Code Execution Vulnerability | CRITICAL |
Actively Exploited Remote Code Execution Public Exploits Available |
|
CVE-2022-37056 (3) | D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 is vulnerable to Command Injection via /cgibin, hnap_main, | CRITICAL | Dlink | Risk Context N/A |
CVE-2019-10891 (3) | An issue was discovered in D-Link DIR-806 devices. | CRITICAL | Dlink | Risk Context N/A |
CVE-2015-2051 (3) | The D-Link DIR-645 Wired/Wireless Router Rev. | CRITICAL | D-Link, Dlink |
CISA Known Exploited Actively Exploited Remote Code Execution |
CVE-2024-49113 (3) | Windows Lightweight Directory Access Protocol Denial of Service Vulnerability | HIGH |
Public Exploits Available |
|
CVE-2024-33112 (3) | D-Link DIR-845L router v1.01KRb03 and before is vulnerable to Command injection via the hnap_mainfunc. | HIGH | Risk Context N/A | |
CVE-2024-12856 (4) | The Four-Faith router models F3x24 and F3x36 are affected by an operating system command injection vulnerability. | HIGH |
Actively Exploited Remote Code Execution |
|
CVE-2019-12168 (2) | Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell screen. | HIGH | Four-Faith |
Remote Code Execution |
CVE-2024-12686 (4) | A vulnerability has been discovered in Privileged Remote Access and Remote Support which can allow an attacker with existin... | MEDIUM | Risk Context N/A |
CISA Known Exploited Vulnerabilities
CISA added one vulnerability to the known exploited vulnerabilities list.
Palo Alto Networks — PAN-OS |
CVE-2024-3393 / Added: Dec. 30, 2024 |
CVSS Not Assigned EPSS Score 1.18 EPSS Percentile 84.81 |
Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malicious DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode. |
Headlines
|
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-12356 |
CRITICAL CVSS 9.80 EPSS Score 1.30 EPSS Percentile 85.61 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Dec. 17, 2024 |
A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user. |
Vendor Impacted: Beyondtrust |
Products Impacted: Privileged Remote Access, Privileged Remote Access (Pra) And Remote Support (Rs) , Remote Support |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-49112 |
CRITICAL CVSS 9.80 EPSS Score 0.09 EPSS Percentile 40.23 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: Dec. 12, 2024 |
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-37056 |
CRITICAL CVSS 9.80 EPSS Score 0.70 EPSS Percentile 80.14 |
Risk Context N/A |
Published: Aug. 28, 2022 |
D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 is vulnerable to Command Injection via /cgibin, hnap_main, |
Vendor Impacted: Dlink |
Products Impacted: Go-Rt-Ac750 Firmware, Go-Rt-Ac750 |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2019-10891 |
CRITICAL CVSS 9.80 EPSS Score 4.74 EPSS Percentile 92.57 |
Risk Context N/A |
Published: Sept. 6, 2019 |
An issue was discovered in D-Link DIR-806 devices. There is a command injection in function hnap_main, which calls system() without checking the parameter that can be controlled by user, and finally allows remote attackers to execute arbitrary shell commands with a special HTTP header. |
Vendor Impacted: Dlink |
Products Impacted: Dir-806 Firmware, Dir-806 |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2015-2051 |
CRITICAL CVSS 9.80 EPSS Score 94.89 EPSS Percentile 99.47 |
CISA Known Exploited Actively Exploited Remote Code Execution |
Published: Feb. 23, 2015 |
The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface. |
Vendors Impacted: D-Link, Dlink |
Products Impacted: Dir-645, Dir-645 Router, Dir-645 Firmware |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-49113 |
HIGH CVSS 7.50 EPSS Score 0.05 EPSS Percentile 18.91 |
Public Exploits Available |
Published: Dec. 12, 2024 |
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-33112 |
HIGH CVSS 7.50 EPSS Score 0.04 EPSS Percentile 11.01 |
Risk Context N/A |
Published: May 6, 2024 |
D-Link DIR-845L router v1.01KRb03 and before is vulnerable to Command injection via the hnap_main()func. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-12856 |
HIGH CVSS 7.20 EPSS Score 0.05 EPSS Percentile 18.38 |
Actively Exploited Remote Code Execution |
Published: Dec. 27, 2024 |
The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2019-12168 |
HIGH CVSS 7.20 EPSS Score 0.55 EPSS Percentile 77.45 |
Remote Code Execution |
Published: May 17, 2019 |
Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell (aka Administration > Commands) screen. |
Vendor Impacted: Four-Faith |
Products Impacted: F3x24 Firmware, F3x24 |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-12686 |
MEDIUM CVSS 6.60 EPSS Score 0.04 EPSS Percentile 11.28 |
Risk Context N/A |
Published: Dec. 18, 2024 |
A vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) which can allow an attacker with existing administrative privileges to inject commands and run as a site user. |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.