Snapshot
May 25, 2024 - May 31, 2024
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2024-24919 | Check Point Quantum Security Gateways contain an unspecified information disclosure vulnerability. The vulnerability potentially allows an attacker to access information on Gateways connected to the internet, with IPSec VPN, Remote Access VPN or Mobile Access enabled. This issue affects several product lines from Check Point, including CloudGuard Network, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark Appliances. | HIGH | Check Point | May 30, 2024 |
CVE-2024-1086 | Linux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation. | HIGH | Linux | May 30, 2024 |
CVE-2024-4978 | Justice AV Solutions (JAVS) Viewer installer contains a malicious version of ffmpeg.exe, named fffmpeg.exe (SHA256: 421a4ad2615941b177b6ec4ab5e239c14e62af2ab07c6df1741e2a62223223c4). When run, this creates a backdoor connection to a malicious C2 server. | HIGH | Justice AV Solutions | May 29, 2024 |
CVE-2024-5274 | Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. | HIGH | May 28, 2024 | |
Newswires |
||||
FlyingYeti Uses WinRAR Flaw to Deploy COOKBOX Malware in Ukraine
Cloudflare has disrupted a month-long phishing campaign in Ukraine, which was orchestrated by a Russia-aligned threat actor known as FlyingYeti. |
May 30, 2024 |
|||
Check Point VPN Zero-Day Vulnerability Exploited in Recent Cyber Attacks
Threat actors have been capitalizing on a high-severity zero-day vulnerability in Check Point's Remote Access VPN since April 30, gaining access to Active Directory data and enabling lateral movement within the networks of the victims. |
May 29, 2024 |
|||
Emergency Patch Released by Check Point for VPN Zero-Day Exploited in Recent Attacks
Check Point has launched hotfixes for a VPN zero-day vulnerability that has been exploited in attacks with the goal of remotely accessing firewalls and potentially breaching corporate networks. |
May 29, 2024 |
|||
Critical Fortinet RCE Bug Exploit Released: Immediate Patching Required
Security researchers have made public a proof-of-concept (PoC) exploit for a critical vulnerability in Fortinet's SIEM solution. |
May 28, 2024 |
|||
Critical Vulnerability Discovered in TP-Link Archer C5400X Gaming Router
The TP-Link Archer C5400X gaming router has been found to contain a critical remote code execution (RCE) vulnerability, according to researchers at OneKey. |
May 28, 2024 |
|||
Cisco Addresses High-Severity Vulnerability in Firepower Management Center
Cisco has recently dealt with a high-severity vulnerability in the web-based management interface of the Firepower Management Center (FMC) Software. |
May 27, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-23108 (5) | An improper neutralization of special elements used in an os command in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7... | CRITICAL | Fortinet |
Public Exploits Available |
CVE-2024-23109 (4) | An improper neutralization of special elements used in an os command in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7... | CRITICAL | Fortinet | Risk Context N/A |
CVE-2023-34992 (3) | A improper neutralization of special elements used in an os command in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.... | CRITICAL | Fortinet |
Remote Code Execution Public Exploits Available |
CVE-2024-23601 (2) | A code injection vulnerability exists in the scan_lib.bin functionality of AutomationDirect P3-550E 1.2.10.9. | CRITICAL | Risk Context N/A | |
CVE-2024-21785 (2) | A leftover debug code vulnerability exists in the Telnet Diagnostic Interface functionality of AutomationDirect P3-550E 1.2.10.9. | CRITICAL | Risk Context N/A | |
CVE-2024-5274 (3) | Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sa... | HIGH |
CISA Known Exploited Actively Exploited Remote Code Execution |
|
CVE-2024-24919 (10) | Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet ... | HIGH | Check Point, Checkpoint |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-1086 (3) | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privile... | HIGH | Linux |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2023-38831 (3) | RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. | HIGH | Rarlab |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-5035 (4) | The affected device expose a network service called "rftest" that is vulnerable to unauthenticated command injection on ports... | N/A |
Actively Exploited Remote Code Execution |
CISA Known Exploited Vulnerabilities
CISA added four vulnerabilities to the known exploited vulnerabilities list.
Linux — Kernel |
CVE-2024-1086 / Added: May 30, 2024 |
HIGH CVSS 7.80 EPSS Score 0.26 EPSS Percentile 65.46 |
Linux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation. |
Headlines
|
Justice AV Solutions — Viewer |
CVE-2024-4978 / Added: May 29, 2024 |
HIGH CVSS 8.40 EPSS Score 0.23 EPSS Percentile 61.53 |
Justice AV Solutions (JAVS) Viewer installer contains a malicious version of ffmpeg.exe, named fffmpeg.exe (SHA256: 421a4ad2615941b177b6ec4ab5e239c14e62af2ab07c6df1741e2a62223223c4). When run, this creates a backdoor connection to a malicious C2 server. |
Headlines
|
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-23108 |
CRITICAL CVSS 9.80 EPSS Score 0.08 EPSS Percentile 33.17 |
Public Exploits Available |
Published: Feb. 5, 2024 |
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests. |
Vendor Impacted: Fortinet |
Product Impacted: Fortisiem |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-23109 |
CRITICAL CVSS 9.80 EPSS Score 0.07 EPSS Percentile 29.38 |
Risk Context N/A |
Published: Feb. 5, 2024 |
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests. |
Vendor Impacted: Fortinet |
Product Impacted: Fortisiem |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-34992 |
CRITICAL CVSS 9.80 EPSS Score 0.08 EPSS Percentile 33.17 |
Remote Code Execution Public Exploits Available |
Published: Oct. 10, 2023 |
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via crafted API requests. |
Vendor Impacted: Fortinet |
Product Impacted: Fortisiem |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-23601 |
CRITICAL CVSS 9.80 EPSS Score 0.09 EPSS Percentile 38.93 |
Risk Context N/A |
Published: May 28, 2024 |
A code injection vulnerability exists in the scan_lib.bin functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted scan_lib.bin can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-21785 |
CRITICAL CVSS 9.80 EPSS Score 0.09 EPSS Percentile 38.93 |
Risk Context N/A |
Published: May 28, 2024 |
A leftover debug code vulnerability exists in the Telnet Diagnostic Interface functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted series of network requests can lead to unauthorized access. An attacker can send a sequence of requests to trigger this vulnerability. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-5274 |
HIGH CVSS 8.80 EPSS Score 1.37 EPSS Percentile 86.26 |
CISA Known Exploited Actively Exploited Remote Code Execution |
Published: May 28, 2024 |
Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
Vendor Impacted: Google |
Products Impacted: Chromium V8, Chrome |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-24919 |
HIGH CVSS 8.60 EPSS Score 1.85 EPSS Percentile 88.34 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: May 28, 2024 |
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available. |
Vendors Impacted: Check Point, Checkpoint |
Products Impacted: Quantum Spark Firmware, Cloudguard Network Security, Quantum Security Gateway Firmware, Quantum Security Gateway, Quantum Security Gateways, Quantum Spark |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-1086 |
HIGH CVSS 7.80 EPSS Score 0.26 EPSS Percentile 65.46 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 31, 2024 |
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660. |
Vendor Impacted: Linux |
Products Impacted: Kernel, Linux Kernel |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-38831 |
HIGH CVSS 7.80 EPSS Score 33.85 EPSS Percentile 97.08 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Aug. 23, 2023 |
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023. |
Vendor Impacted: Rarlab |
Product Impacted: Winrar |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-5035 |
CVSS Not Assigned EPSS Score 0.04 EPSS Percentile 8.74 |
Actively Exploited Remote Code Execution |
Published: May 27, 2024 |
The affected device expose a network service called "rftest" that is vulnerable to unauthenticated command injection on ports TCP/8888, TCP/8889, and TCP/8890. By successfully exploiting this flaw, remote unauthenticated attacker can gain arbitrary command execution on the device with elevated privileges.This issue affects Archer C4500X: through 1_1.1.6. |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.