Snapshot
March 17, 2023 - March 24, 2023
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
No issues added to the CISA Known Exploited Vulnerability list. | ||||
Newswires |
||||
Procter & Gamble Confirms Data Breach Through GoAnywhere Zero-Day Exploit
Consumer goods giant Procter & Gamble has confirmed a data breach affecting an undisclosed number of employees after its GoAnywhere MFT secure file-sharing platform was compromised in early February. |
March 24, 2023 |
|||
City of Toronto Confirms Data Theft, Clop Ransomware Gang Claims Responsibility
The City of Toronto has confirmed unauthorized access to its data, with the Clop ransomware gang claiming responsibility for the breach. |
March 23, 2023 |
|||
Exploit Released for Veeam Bug Allowing Cleartext Credential Theft
A high-severity Backup Service vulnerability (CVE-2023-27532) impacting Veeam's Backup & Replication (VBR) software has a cross-platform exploit code available. |
March 23, 2023 |
|||
PoC Exploits Released for Critical Netgear Orbi Router Vulnerabilities
Proof-of-concept (PoC) exploits for vulnerabilities in Netgear’s Orbi 750 series router and extender satellites have been released, with one flaw being a critical severity remote command execution bug. |
March 22, 2023 |
|||
55 Zero-Day Vulnerabilities Exploited in 2022: Mandiant Report
Google-owned cybersecurity firm Mandiant has conducted an analysis of the zero-day vulnerabilities disclosed in 2022, finding that 55 of them were exploited in attacks. |
March 21, 2023 |
|||
Clop Ransomware Targets Saks Fifth Avenue, Retailer Claims Only Mock Data Stolen
The Clop ransomware gang claims to have attacked luxury retailer Saks Fifth Avenue, as listed on their dark web leak site. |
March 21, 2023 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2023-23397 (7) | Microsoft Outlook Elevation of Privilege Vulnerability | CRITICAL | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2022-42475 (5) | A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 throu... | CRITICAL | Fortinet |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2022-37337 (5) | A command execution vulnerability exists in the access control functionality of Netgear Orbi Router RBR750 4.6.8.5. | CRITICAL | Risk Context N/A | |
CVE-2022-30190 (5) | Microsoft Windows Support Diagnostic Tool Remote Code Execution Vulnerability. | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2023-27532 (3) | Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be... | HIGH | Veeam |
Remote Code Execution Public Exploits Available |
CVE-2023-0669 (5) | Fortra GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due ... | HIGH | Fortra |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CVE-2022-38452 (4) | A command execution vulnerability exists in the hidden telnet service functionality of Netgear Orbi Router RBR750 4.6.8.5. | HIGH | Risk Context N/A | |
CVE-2022-36429 (4) | A command execution vulnerability exists in the ubus backend communications functionality of Netgear Orbi Satellite RBS750 4.6.8.5. | HIGH | Risk Context N/A | |
CVE-2022-41328 (6) | A improper limitation of a pathname to a restricted directory vulnerability [CWE-22] in Fortinet FortiOS version 7.2.0 throu... | HIGH | Fortinet |
CISA Known Exploited Actively Exploited |
CISA Known Exploited Vulnerabilities
CISA added 0 vulnerabilities to the known exploited vulnerabilities list.
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2023-23397 |
CRITICAL CVSS 9.80 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: March 14, 2023 |
Microsoft Outlook Elevation of Privilege Vulnerability |
Vendor Impacted: Microsoft |
Products Impacted: Outlook, Office, 365 Apps |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-42475 |
CRITICAL CVSS 9.80 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 2, 2023 |
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. |
Vendor Impacted: Fortinet |
Products Impacted: Fortigate-6601f-Dc, Fpm-7620f, Fortios, Fpm-7630e, Fortigate-7030e, Fim-7904e, Fortigate-6500f-Dc, Fim-7920e, Fortigate-7060e, Fortigate-7040e, Fortigate-7121f, Fim-7910e, Fim-7941f, Fortigate-6601f, Fim-7921f, Fim-7901e, Fortigate-6500f, Fpm-7620e, Fortigate-6300f-Dc, Fortiproxy, Fortigate-6501f, Fortigate-6300f, Fortigate-6501f-Dc |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-37337 |
CRITICAL CVSS 9.10 |
Risk Context N/A |
Published: March 21, 2023 |
A command execution vulnerability exists in the access control functionality of Netgear Orbi Router RBR750 4.6.8.5. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-30190 |
HIGH CVSS 7.80 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: June 1, 2022 |
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability. |
Vendor Impacted: Microsoft |
Products Impacted: Windows 7, Windows 10, Windows 8.1, Windows Server 2008, Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Rt 8.1, Windows, Windows 11, Windows Server 2022 |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-27532 |
HIGH CVSS 7.50 |
Remote Code Execution Public Exploits Available |
Published: March 10, 2023 |
Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts. |
Vendor Impacted: Veeam |
Product Impacted: Backup \& Replication |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2023-0669 |
HIGH CVSS 7.20 |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: Feb. 6, 2023 |
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2. |
Vendor Impacted: Fortra |
Products Impacted: Goanywhere Mft, Goanywhere Managed File Transfer |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-38452 |
HIGH CVSS 7.20 |
Risk Context N/A |
Published: March 21, 2023 |
A command execution vulnerability exists in the hidden telnet service functionality of Netgear Orbi Router RBR750 4.6.8.5. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger this vulnerability. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-36429 |
HIGH CVSS 7.20 |
Risk Context N/A |
Published: March 21, 2023 |
A command execution vulnerability exists in the ubus backend communications functionality of Netgear Orbi Satellite RBS750 4.6.8.5. A specially-crafted JSON object can lead to arbitrary command execution. An attacker can send a sequence of malicious packets to trigger this vulnerability. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-41328 |
HIGH CVSS 7.10 |
CISA Known Exploited Actively Exploited |
Published: March 7, 2023 |
A improper limitation of a pathname to a restricted directory vulnerability ('path traversal') [CWE-22] in Fortinet FortiOS version 7.2.0 through 7.2.3, 7.0.0 through 7.0.9 and before 6.4.11 allows a privileged attacker to read and write files on the underlying Linux system via crafted CLI commands. |
Vendor Impacted: Fortinet |
Product Impacted: Fortios |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.