The CyberThrone most exploited vulnerabilities review – October 26, 2024

The CyberThrone most exploited vulnerabilities review – October 26, 2024


Fortinet FortiManager

CVE-2024-47575: With a CVSS score of 9.8, it deemed to be a critical vulnerability. A missing authentication for critical function vulnerability [CWE-306] in FortiManager fgfmd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.

Based on the evidence of mass exploitation, this vulnerability has been added to the CISA KEV catalog

Cisco VPN Vulnerability

CVE-2024-20481: With a CVSS score of 5.8, its deemed to be a medium severity vulnerability. It resides in the RAVPN service of Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) software. This flaw allows unauthenticated, remote attackers to overwhelm the RAVPN service with a flood of authentication requests, ultimately causing a denial-of-service (DoS) condition. Cisco has confirmed active exploitation of this vulnerability and urges users to update their devices immediately.

Based on the evidence of mass exploitation, this vulnerability has been added to the CISA KEV catalog

Advertisements

Microsoft Exchange

CVE-2024-26198:- With a CVSS score of 8.8, it deemed to be a high severity vulnerability. It is a remote code execution vulnerability affecting Microsoft Exchange Servers. An attacker can exploit this flaw by sending specially crafted emails to targets, potentially gaining control over the affected system. Successful exploitation could allow the attacker to install programs, view, change, or delete data, and create new accounts with full user rights. This has been patched by Microsoft during March 2024

Fortinet FortiProxy

CVE-2024-21762:- With a CVSS score of 9.8, it deemed to be critical. A out-of-bounds write vulnerability [CWE-787] in FortiOS and FortiProxy may allow a remote unauthenticated attacker to execute arbitrary code or command via specially crafted HTTP requests.

Based on the evidence of mass exploitation, this vulnerability has been added to the CISA KEV catalog on February 09, 2024.

Roundcube Webmail

CVE-2023-5631:- With a CVSS score of 6.1, it deemed to be Medium severity vulnerability.Roundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that allows a remote attacker to run malicious JavaScript code.

Based on the evidence of mass exploitation, this vulnerability has been added to the CISA KEV catalog on October 26, 2023.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.