24h | 7d | 30d

Overview

  • Google
  • Chrome

30 Jun 2025
Published
02 Jul 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 11 Posts
  • 8 Interactions

Fediverse

Profile picture

Chrome in crisis: a dangerous zero-day in its V8 engine was exploited in the wild—but Google moved fast to patch it. Did your browser make it through the breach?

thedefendopsdiaries.com/unders





  • 1
  • 2
  • 19 hours ago
Profile picture

CVE-2025-6554
该漏洞潜藏于Chrome核心引擎中,只需访问恶意网页,攻击者就能远程控制你的电脑。   
网络安全研究人员证实,该漏洞正在真实攻击中被利用,企业数据和个人隐私面临裸奔风险。
@board

  • 1
  • 1
  • 5 hours ago
Profile picture

@beyondmachines1 I know it's pedantic, but the Chrome advisory does not state that it is in fact EITW. It says that there is an exploit in the wild, but not that it's known to have been used successfully.

Google is aware that an exploit for CVE-2025-6554 exists in the wild.

  • 1
  • 0
  • 15 hours ago
Profile picture

Microsoft Edge 138.0.3351.65 korrigiert die schon ausgenutzte Sicherheitslücke (CVE-2025-6554)

deskmodder.de/blog/2025/07/02/

  • 1
  • 0
  • 2 hours ago
Profile picture

🚨 A new Chrome zero-day is already being exploited in the wild.

Discovered by Google TAG on June 25, CVE-2025-6554 lets attackers run malicious code via a crafted web page.

It targets Chrome’s V8 engine—again.

Update now → thehackernews.com/2025/07/goog

  • 0
  • 1
  • 21 hours ago
Profile picture

"Google is aware that an exploit for CVE-2025-6554 exists in the wild," the browser vendor said in a security advisory issued on Monday. bleepingcomputer.com/news/secu

  • 0
  • 0
  • 18 hours ago
Profile picture

Google Chrome 138 – CVE-2025-6554 : patchez pour vous protéger de cette nouvelle faille zero-day it-connect.fr/google-chrome-13 #ActuCybersécurité #Cybersécurité #Vulnérabilité #googlechrome

  • 0
  • 0
  • 15 hours ago
Profile picture

Critical Google Chrome Vulnerability Exploited in the Wild: Patch Now to Stay Safe

A Wake-Up Call for Browser Security In late June 2025, Google raced to patch a severe zero-day vulnerability in its Chrome browser—one that had already been exploited in real-world attacks. The flaw, cataloged as CVE-2025-6554, was embedded in Chrome’s V8 JavaScript and WebAssembly engine and enabled attackers to hijack systems through malicious web pages. While Google acted swiftly to…

undercodenews.com/critical-goo

  • 0
  • 0
  • 14 hours ago
Profile picture

Google Rushes to Patch Critical Chrome Vulnerability Exploited in the Wild

Introduction: Chrome Users at Risk from Zero-Day Exploit Google has swiftly responded to a high-severity security flaw in its Chrome browser that is actively being exploited by attackers. The vulnerability, identified as CVE-2025-6554, resides in the V8 JavaScript and WebAssembly engine, a critical component responsible for rendering code on websites. With attackers already leveraging this flaw,…

undercodenews.com/google-rushe

  • 0
  • 0
  • 8 hours ago
Profile picture

Update your Chrome, patch for CVE-2025-6554 (Type Confusion in V8):
chromereleases.googleblog.com/

  • 0
  • 0
  • 7 hours ago
Profile picture

Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update thehackernews.com/2025/07/goog

  • 0
  • 0
  • 4 hours ago

Overview

  • Sudo project
  • Sudo

30 Jun 2025
Published
01 Jul 2025
Updated

CVSS v3.1
CRITICAL (9.3)
EPSS
0.01%

KEV

Description

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

Statistics

  • 8 Posts
  • 57 Interactions

Fediverse

Profile picture

Vulnerability Advisory: Sudo chroot Elevation of Privilege stratascale.com/vulnerability-

#linux #unix

  • 13
  • 17
  • 10 hours ago
Profile picture

Linux-Server: sudo hat ein riesiges Loch. Severity 9.3! Möglichst rasch Updates installieren.

nvd.nist.gov/vuln/detail/CVE-2

sudo.ws/security/advisories/ch

ubuntu.com/security/CVE-2025-3

access.redhat.com/security/cve

Für RHEL + Alma Linux ist anscheinend noch kein Update verfügbar.

  • 6
  • 4
  • 17 hours ago
Profile picture

Important for #OpenBSD users is the comment in the ports-update commit message. #CVE-2025-32463 #SUDO

  • 3
  • 0
  • 1 hour ago
Profile picture

⚠️ sudo has a very critical security vulnerability. You should therefore update sudo ASAP!
stratascale.com/vulnerability-
nvd.nist.gov/vuln/detail/CVE-2
#ITSecurity

  • 2
  • 0
  • 14 hours ago
Profile picture

Kurzer Check bei mir, welche Distros die kritische #sudo Lücke CVE-2025-32463 bis jetzt behoben haben:

- Alpine 3.22: OK
- Arch Linux: OK
- Debian 12 / Devuan 5: OK
- Fedora 42: FAIL
- Void Linux: OK

#itsec

  • 0
  • 2
  • 10 hours ago
Profile picture

RT @0xm1rch@x.com
I published blogs detailing two vulnerabilities I recently discovered in Sudo. Update to 1.9.17p1.

CVE-2025-32462 - Sudo Host option Elevation of Privilege Vulnerability stratascale.com/vulnerability-

CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability stratascale.com/vulnerability-

#infosec #sudo #sysadmin

  • 3
  • 0
  • 5 hours ago
Profile picture

Following a recent incident, here's a reminder: #SudoConsideredHarmful

What I do use instead of #sudo? "ssh root@localhost" with keys: github.com/xtaran/sshudo and "alias sudo sshudo" or "ln -vis /usr/bin/sshudo /usr/bin/sudo".

(For those who wonder what I refer to: stratascale.com/vulnerability- and stratascale.com/vulnerability-)

#SSHudo #SSH #CVE_2025_32462 #CVE_2025_32463

  • 2
  • 3
  • 18 hours ago
Profile picture

I think I boosted information about these sudo EoP vulns yesterday but in case I didn't, here's some basic info on them.

stratascale.com/vulnerability-

sev:LOW 2.8 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N

Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.

nvd.nist.gov/vuln/detail/CVE-2

stratascale.com/vulnerability-

sev:CRIT 9.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

nvd.nist.gov/vuln/detail/CVE-2

  • 1
  • 1
  • 16 hours ago

Overview

  • NetScaler
  • ADC

17 Jun 2025
Published
26 Jun 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.06%

KEV

Description

Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server

Statistics

  • 4 Posts
  • 61 Interactions

Fediverse

Profile picture

If you see this GitHub PoC for CVE-2025-5777 doing the rounds:

github.com/mingshenhk/CitrixBl

It’s not for CVE-2025-5777. It’s AI generated. The links in the README still have ChatGPT UTM sources.

The PoC itself is for a vuln addressed in 2023 - ChatGPT has hallucinated (made up) the cause of the vuln using an old BishopFox write up of the other vuln.

  • 17
  • 30
  • 21 hours ago
Profile picture

Citrix NetScaler Under Siege: Critical Vulnerabilities Leave Thousands Exposed

Urgent Warning for IT Teams and CISOs A recent cybersecurity alert has sent shockwaves through IT infrastructures worldwide: thousands of Citrix NetScaler instances are now vulnerable to active exploitation due to two newly disclosed critical vulnerabilities. These security flaws—CVE-2025-5777 and CVE-2025-6543—pose a severe risk to organizations relying on Citrix NetScaler for remote access…

undercodenews.com/citrix-netsc

  • 0
  • 0
  • 8 hours ago

Overview

  • Sudo project
  • Sudo

30 Jun 2025
Published
01 Jul 2025
Updated

CVSS v3.1
LOW (2.8)
EPSS
0.02%

KEV

Description

Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.

Statistics

  • 4 Posts
  • 12 Interactions

Fediverse

Profile picture

Leute patched eure Systeme

stratascale.com/vulnerability-

"As a result, any command allowed by the remote host rule can be executed on the local machine."

#cve_2025_32462 #security

  • 1
  • 1
  • 16 hours ago
Profile picture

RT @0xm1rch@x.com
I published blogs detailing two vulnerabilities I recently discovered in Sudo. Update to 1.9.17p1.

CVE-2025-32462 - Sudo Host option Elevation of Privilege Vulnerability stratascale.com/vulnerability-

CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability stratascale.com/vulnerability-

#infosec #sudo #sysadmin

  • 3
  • 0
  • 5 hours ago
Profile picture

Following a recent incident, here's a reminder: #SudoConsideredHarmful

What I do use instead of #sudo? "ssh root@localhost" with keys: github.com/xtaran/sshudo and "alias sudo sshudo" or "ln -vis /usr/bin/sshudo /usr/bin/sudo".

(For those who wonder what I refer to: stratascale.com/vulnerability- and stratascale.com/vulnerability-)

#SSHudo #SSH #CVE_2025_32462 #CVE_2025_32463

  • 2
  • 3
  • 18 hours ago
Profile picture

I think I boosted information about these sudo EoP vulns yesterday but in case I didn't, here's some basic info on them.

stratascale.com/vulnerability-

sev:LOW 2.8 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N

Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.

nvd.nist.gov/vuln/detail/CVE-2

stratascale.com/vulnerability-

sev:CRIT 9.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

nvd.nist.gov/vuln/detail/CVE-2

  • 1
  • 1
  • 16 hours ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 2 Posts
  • 13 Interactions

Fediverse

Profile picture

RCE Security has found major vulnerabilities in the Wind FTP server.

Attackers can bypass authentication on the server's web interface just by appending a NULL byte to the username followed by any random string.

rcesecurity.com/2025/06/what-t

  • 7
  • 6
  • 14 hours ago

Overview

  • Pilz
  • IndustrialPI 4 with IndustrialPI webstatus

01 Jul 2025
Published
01 Jul 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.06%

KEV

Description

An unauthenticated remote attacker can bypass the login to the web application of the affected devices making it possible to access and change all available settings of the IndustrialPI.

Statistics

  • 3 Posts
  • 7 Interactions

Fediverse

Profile picture
  • 1
  • 1
  • 23 hours ago
Profile picture

🚨 CVE-2025-41648 (CRITICAL, CVSS 9.8): Pilz IndustrialPI 4 w/ webstatus lets remote attackers bypass authentication & change all settings. No patch yet—segment networks & monitor traffic. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 22 hours ago
Profile picture

July is starting off with a perfect 10 in some OT kit. 🥳

certvde.com/en/advisories/VDE-

sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.

nvd.nist.gov/vuln/detail/CVE-2

certvde.com/en/advisories/VDE-

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

An unauthenticated remote attacker can bypass the login to the web application of the affected devices making it possible to access and change all available settings of the IndustrialPI.

nvd.nist.gov/vuln/detail/CVE-2

  • 1
  • 4
  • 19 hours ago

Overview

  • Brother Industries, Ltd
  • HL-L8260CDN

25 Jun 2025
Published
27 Jun 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
2.68%

KEV

Description

An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.

Statistics

  • 1 Post
  • 10 Interactions

Fediverse

Profile picture

Are Brother's Insecure Printers Illegal in the UK?

shkspr.mobi/blog/2025/07/are-b

Another day, another security disaster! This time, multiple printers from Brother have an unfixable security flaw. That's bad, obviously, but is it illegally bad0?

Let's take a look at details of the vulnerability:

An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device.

Recently, the UK brought in some laws aimed at strengthening consumer protection - the Product Security and Telecommunications Infrastructure act (PSTI). There's a readable summary on the National Cyber Security Centre's website.

There are three interesting points to note in that blog post. The first is about passwords:

The law means manufacturers must ensure that all their smart devices meet basic cyber security requirements. Specifically:

  1. The manufacturer must not supply devices that use default passwords, which can be easily discovered online, and shared.

Secondly, is a question of jurisdiction:

Most smart devices are manufactured outside the UK, but the PSTI act also applies to all organisations importing or retailing products for the UK market. Failure to comply with the act is a criminal offence

Thirdly, what is actually covered:

The law applies to any ‘consumer smart device’ that connects either to the internet, or to a home network (for example by wifi).

Is a WiFi enabled printer a "consumer smart device"? One of the things that techies find confusing is that the law is not code. It usually doesn't enumerate a definitive list of what is and what isn't in scope. It gives a general outline and then allows case-law to develop. This means laws don't need to be updated when someone invents, say, an Internet connected tinfoil dispenser.

Let's move beyond the consumer-friendly summary and go to the actual law. The Product Security and Telecommunications Infrastructure (Security Requirements for Relevant Connectable Products) Regulations 2023

  1. Passwords must be—

    a. unique per product; or

    b. defined by the user of the product.

  2. Passwords which are unique per product must not be—

    a. based on incremental counters;

    b. based on or derived from publicly available information;

    c. based on or derived from unique product identifiers, such as serial numbers, unless this is done using an encryption method, or keyed hashing algorithm, that is accepted as part of good industry practice;

    d. otherwise guessable in a manner unacceptable as part of good industry practice.

How does this apply to the printers? Rapid7, who discovered the vulnerability, have this to say about how it works:

[The vulnerability] allows an attacker to leak a serial number via the target's HTTP, HTTPS, and IPP services. However, should an attacker not be able to leverage [the vulnerability], a remote unauthenticated attacker can still discover a target device's serial number via either a PJL or SNMP query

So, yes. The default password is unique but it can be automatically derived from the serial number. That serial number is available to anyone with a network connection to the printer.

But, do printers fall under the scope of this act?

The Product Security and Telecommunications Infrastructure Act 2022 says:

4 Relevant connectable products

  1. In this Part “relevant connectable product” means a product that meets conditions A and B.

  2. Condition A is that the product is—

    A. an internet-connectable product, or

    B. a network-connectable product.

  3. Condition B is that the product is not an excepted product (see section 6).

It goes on to define what Internet-connectable means, along with some other clarifying details. But is there a get-out clause here? Are printers an "excepted product"?

In this Part “excepted product” means a product of a description specified in regulations made by the Secretary of State.

OK, let's look at the regulations. I've expanded out the relevant bit:

Schedule 3 Excepted connectable products

  1. Computers

    1. Products are excepted under this paragraph if they are computers which are—

      a. desktop computers;

      b. laptop computers;

      c. tablet computers which do not have the capability to connect to cellular networks.

Nope! The Brother printers don't appear to be exempt1. What's the maximum penalty Brother could be subject to?

The greater of £10 million or 4% of worldwide revenue.

Ouch!

Of course, much like GDPR fines, these are headline grabbing numbers. The prosaic reality is that the enforcement policy is much more likely to suggest remedial steps. Only the most flagrant transgressors are likely to be punished harshly2.

So, to recap. The law says an Internet-connected device (including printers) must have a password which is not "based on or derived from publicly available information". As I understand it, having a serial-number based password is OK as long as you don't publicise the serial number. I expect that if it were printed on a sticker that would be fine. But because the serial can be discovered remotely, it fails at this point.

In Brother's (slight) defence, unless the user has specifically connected the printer to the Internet this is only a local vulnerability. Someone on the same network would be able to monkey around with the printer but, similarly, they could plug in a USB cable for some illicit printing or break it with a hammer. Any damage is confined to the LAN.

Should users change default passwords? Yes. But manufacturers have a legal duty to ensure that people who don't are still protected.

  1. I'm not a lawyer. This is not legal advice. This is just my interpretation of what's going on. If in doubt, consult someone qualified. ↩︎

  2. With thanks to m'learned colleague Neil Brown who came to much the same conclusion ↩︎

  3. You can see the actions they've previously taken. Because PSTI is so new, there aren't any actions against insecure IoT devices - so we'll have to wait and see how they choose to proceed. ↩︎

#CyberSecurity #IoT #law #legal #Legislation

  • 9
  • 1
  • 19 hours ago

Overview

  • Apache Software Foundation
  • Apache Tomcat

20 Dec 2024
Published
03 Jan 2025
Updated

CVSS
Pending
EPSS
5.03%

KEV

Description

Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. The mitigation for CVE-2024-50379 was incomplete. Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat: - running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true) - running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false) - running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed) Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.

Statistics

  • 2 Posts
  • 5 Interactions

Fediverse

Profile picture

Hey vulnerability people: Any scuttlebutt on active exploitation of CVE-2024-56337? It isn't in the KEV but ... well ....

  • 3
  • 1
  • 13 hours ago
Profile picture

@Sempf Are you specifically asking about EITW when the mitigation for CVE-2024-50379 was applied or regardless of the CVE-2024-50379 mitigation since CVE-2024-56337 was basically a bypass for the incomplete CVE-2024-50379 fix, right?

  • 0
  • 1
  • 12 hours ago

Overview

  • Pilz
  • IndustrialPI 4 with Firmware Bullseye

01 Jul 2025
Published
01 Jul 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.10%

KEV

Description

An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.

Statistics

  • 2 Posts
  • 7 Interactions

Fediverse

Profile picture
  • 1
  • 1
  • 23 hours ago
Profile picture

July is starting off with a perfect 10 in some OT kit. 🥳

certvde.com/en/advisories/VDE-

sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.

nvd.nist.gov/vuln/detail/CVE-2

certvde.com/en/advisories/VDE-

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

An unauthenticated remote attacker can bypass the login to the web application of the affected devices making it possible to access and change all available settings of the IndustrialPI.

nvd.nist.gov/vuln/detail/CVE-2

  • 1
  • 4
  • 19 hours ago

Overview

  • Cisco
  • Cisco Identity Services Engine Software

25 Jun 2025
Published
26 Jun 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.14%

KEV

Description

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.

Statistics

  • 2 Posts

Fediverse

Profile picture

Cisco is warning about two critical vulnerabilities in Identity Services Engine (ISE)

Vulnerabilities: Insufficient validation of user input; Poor file validation

Impact: Allows an attacker to execute arbitrary commands, and upload arbitrary files and execute with root privileges

Vulnerability IDs: CVE-2025-20281, CVE-20282

Remediation: Upgrade ISE to 3.3 Patch 6 or 3.4 Patch 2 or later

#cybersecurity #vulnerabilitymanagement #Cisco

bleepingcomputer.com/news/secu

  • 0
  • 0
  • 18 hours ago
Profile picture

Cisco centra il bersaglio: 9,8 su 10 per due RCE su Identity Services Engine e Passive Identity Connector

Cisco ha segnalato due vulnerabilità RCE critiche che non richiedono autenticazione e interessano Cisco Identity Services Engine (ISE) e Passive Identity Connector (ISE-PIC). Alle vulnerabilità sono stati assegnati gli identificatori CVE-2025-20281 e CVE-2025-20282 e hanno ottenuto il punteggio massimo di 9,8 punti su 10 sulla scala CVSS. Il primo problema riguarda le versioni 3.4 e 3.3 di ISE e ISE-PIC, mentre il secondo riguarda solo la versione 3.4.

La causa principale dell’errore CVE-2025-20281 era l’insufficiente convalida dell’input utente in un’API esposta. Ciò consentiva a un aggressore remoto e non autenticato di inviare richieste API contraffatte per eseguire comandi arbitrari come utente root. Il secondo problema, CVE-2025-20282, era causato da una convalida dei file insufficiente nell’API interna, che consentiva la scrittura di file in directory privilegiate. Questo bug consentiva ad aggressori remoti non autenticati di caricare file arbitrari sul sistema di destinazione ed eseguirli con privilegi di root.

La piattaforma Cisco Identity Services Engine (ISE) è progettata per gestire le policy di sicurezza di rete e il controllo degli accessi e in genere funge da motore di controllo degli accessi alla rete (NAC), gestione delle identità e applicazione delle policy. Questo prodotto è un elemento chiave della rete aziendale ed è spesso utilizzato da grandi aziende, enti governativi, università e fornitori di servizi.

Gli esperti Cisco segnalano che finora non si sono verificati casi di sfruttamento attivo di nuove vulnerabilità (né exploit resi pubblici), ma si consiglia a tutti gli utenti di installare gli aggiornamenti il prima possibile. Gli utenti dovrebbero aggiornare alla versione 3.3 Patch 6 (ise-apply-CSCwo99449_3.3.0.430_patch4) e alla versione 3.4 Patch 2 (ise-apply-CSCwo99449_3.4.0.608_patch1) o successive. Non esistono soluzioni alternative per risolvere i problemi senza applicare patch.

E’ ovvio che con vulnerabilità di tale entità, sia necessario procedere con urgenza all’aggiornamento delle patch, al fine di prevenire possibili tentativi di violazione. Il fornitore raccomanda pertanto di effettuare tempestivamente gli aggiornamenti necessari.

L'articolo Cisco centra il bersaglio: 9,8 su 10 per due RCE su Identity Services Engine e Passive Identity Connector proviene da il blog della sicurezza informatica.

  • 0
  • 0
  • 21 hours ago
Showing 1 to 10 of 42 CVEs