Overview
Description
Statistics
- 9 Posts
Fediverse
Aktuelle Neuigkeiten: Aktuelle Angriffswelle gegen CVE-2025-59718, Patches unzureichend
https://www.cert.at/de/aktuelles/2026/1/aktuelle-angriffswelle-gegen-cve-2025-59718-patch-unzureichend
https://www.reddit.com/r/fortinet/comments/1qibdcb/possible_new_sso_exploit_cve202559718_on_749/
/via @Hetti
#Fortinet
CVE-2025-59718 – Des firewalls FortiGate piratés malgré l’installation des derniers patchs https://www.it-connect.fr/cve-2025-59718-des-firewalls-fortigate-pirates-malgre-linstallation-des-derniers-patchs/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet
Si vous administrez des FortiGate/FortiOS : des admins signalent un contournement du patch de la vulnérabilité critique CVE-2025-59718 (FortiCloud SSO https://fortiguard.fortinet.com/psirt/FG-IR-25-647 ) → compromission possible même sur des firewalls « patchés » (ex. 7.4.9/7.4.10).
( https://www.reddit.com/r/fortinet/comments/1qibdcb/possible_new_sso_exploit_cve202559718_on_749/ )
Préreq : “Allow administrative login using FortiCloud SSO” activé (souvent après enregistrement FortiCare).
Mitigation : désactiver admin-forticloud-sso-login + restreindre l’accès admin + vérifier logs/nouveaux comptes.
Chaîne d'exploitation: CVE-2025-59718 (+ CVE-2025-59719 côté FortiWeb) ➡️ envoi de messages SAML forgés ➡️ bypass de vérification de signature ➡️ accès admin non autorisé.
[Références]
"Fortinet admins report patched FortiGate firewalls getting hacked"
👇
https://www.bleepingcomputer.com/news/security/fortinet-admins-report-patched-fortigate-firewalls-getting-hacked/
Bluesky
Overview
Description
Statistics
- 6 Posts
- 9 Interactions
Fediverse
‼️Attackers Actively Probing RCE Vulnerability in Cisco Enterprise Communications Products
CVE-2026-20045: Cisco Unified Communications Products Code Injection Vulnerability
CVSS: 8.2
CISA KEV: Added today; January 21st, 2026
CVE Published: January 21st, 2026
Advisory: https://nvd.nist.gov/vuln/detail/CVE-2026-20045
Description: A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root. Note: Cisco has assigned this security advisory a Security Impact Rating (SIR) of Critical rather than High as the score indicates. The reason is that exploitation of this vulnerability could result in an attacker elevating privileges to root.
🟠 CVE-2026-20045 - High (8.2)
A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Uni...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20045/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Bluesky
Overview
Description
Statistics
- 2 Posts
- 10 Interactions
Fediverse
Our January 2026 maintenance releases of BIND 9 are available and can be downloaded from the links below. Packages and container images provided by ISC will be updated later today.
In addition to bug fixes and feature improvements, these releases also contain fixes for a security vulnerability. More information can be found in the following Security Advisory:
https://kb.isc.org/docs/cve-2025-13878
Download software and release notes at: https://www.isc.org/download/
🟠 CVE-2025-13878 - High (7.5)
Malformed BRID/HHIT records can cause `named` to terminate unexpectedly.
This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13878/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- GNU
- Inetutils
Description
Statistics
- 2 Posts
- 7 Interactions
Fediverse
La vulnérabilité CVE-2026-24061 permet à un attaquant de se connecter en root en contournant l'authentification d'un service telnetd. Un code d'exploitation est disponible et son exploitation est triviale.
https://www.cert.ssi.gouv.fr/actualite/CERTFR-2026-ACT-003/
I shot a 📄 to the team to 👀 later today but we've seen some activity on the recent Inetutils Telnetd -f Auth Bypass vuln (CVE-2026-24061) — https://viz.greynoise.io/tags/inetutils-telnetd--f-auth-bypass-attempt?days=30
We stood up some full vulnerable systems and a cpl IPs only hit those, so the targeting precision was oddly fast.
If they don't do a main GN blog I'll post deets on the Labs blog (I'm OOO today).
Rly glad this was a nothingburger.
Spidey-sense says something yuge (not related to this) is coming soon tho. The internet feels “off”.
Overview
- Oracle Corporation
- Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in product of Oracle Fusion Middleware (component: Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS).
📰 Oracle Issues Critical Patch for CVSS 10.0 Auth Bypass in WebLogic Server
🚨 CRITICAL PATCH: Oracle's January 2026 update fixes 337 flaws, including a CVSS 10.0 auth bypass (CVE-2026-21962) in WebLogic Server. This is remotely exploitable with no user interaction. Patch immediately! ⚠️ #Oracle #PatchTuesday #CVE
Overview
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
Node.js – CVE-2026-23745 : cette faille de sécurité dans la bibliothèque node-tar est à prendre au sérieux https://www.it-connect.fr/node-js-cve-2026-23745-node-tar-vulnerabilite/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
Overview
Description
Statistics
- 1 Post
- 3 Interactions
Overview
- MCPJam
- inspector
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
‼️CVE-2026-23744: Versions 1.4.2 and earlier of MCPJam inspector are vulnerable to remote code execution (RCE)
CVSS: 9.8
CVE Published: January 16th, 2026
PoC/Exploit Published: January 20th, 2026
GitHub PoC: https://github.com/boroeurnprach/CVE-2026-23744-PoC/
Advisory: https://github.com/advisories/GHSA-232v-j27c-5pp6
MCPJam inspector is the local-first development platform for MCP servers. Versions 1.4.2 and earlier are vulnerable to remote code execution (RCE) vulnerability, which allows an attacker to send a crafted HTTP request that triggers the installation of an MCP server, leading to RCE. Since MCPJam inspector by default listens on 0.0.0.0 instead of 127.0.0.1, an attacker can trigger the RCE remotely via a simple HTTP request. Version 1.4.3 contains a patch.
Overview
- choijun
- LA-Studio Element Kit for Elementor
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
🔴 CVE-2026-0920 - Critical (9.8)
The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Administrative User Creation in all versions up to, and including, 1.5.6.3. This is due to the 'ajax_register_handle' function not restricting what user roles a user can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0920/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
https://exploit.az/posts/wor/
CVE-2025-48941