HomeCyber BalkansCISA Alert: Four Active Vulnerabilities Exploited in the Wild

CISA Alert: Four Active Vulnerabilities Exploited in the Wild

Published on

spot_img

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a warning regarding four critical vulnerabilities that are currently being exploited in the wild. These vulnerabilities affect a range of products, from routers to software platforms, and pose significant risks to users globally.

Among the vulnerable products identified are D-Link, DrayTek, Motion Spell, and SAP. The vulnerabilities in these products can be exploited by attackers to gain unauthorized access and potentially compromise sensitive information.

The first vulnerability, designated as CVE-2023-25280, targets the D-Link DIR-820 router. This flaw allows remote attackers to escalate privileges by exploiting the ping_addr parameter in the ping.ccp component. As a result, users are advised to discontinue the use of this product immediately, as it has reached its end-of-life and end-of-service status.

In a separate development, CVE-2020-15415 impacts DrayTek’s Vigor3900, Vigor2960, and Vigor300B routers, enabling remote code execution through shell metacharacters in a filename. Users are urged to implement vendor-suggested mitigations or cease use of the affected routers to prevent potential exploitation.

Another critical vulnerability, CVE-2021-4043, has been found in Motion Spell’s GPAC software, allowing a local attacker to trigger a denial-of-service condition. While there is no evidence linking this vulnerability to ransomware activities, users should take precautions and follow vendor recommendations to safeguard their systems.

Lastly, CVE-2019-0344 affects SAP Commerce Cloud, with a vulnerability in the mediaconversion and virtualjdbc extensions that could lead to code injection attacks. Organizations and individuals using these products must address these vulnerabilities promptly to mitigate the risk of exploitation.

CISA has underscored the urgency of addressing these vulnerabilities by October 21, 2024. Users are strongly advised to apply available patches or mitigations and discontinue the use of affected products where necessary to protect their systems from potential exploitation.

In conclusion, the exploitation of these vulnerabilities poses a significant threat to the cybersecurity of users worldwide. It is crucial for organizations and individuals to take immediate action to secure their systems and prevent unauthorized access or data breaches. Vigilance and adherence to best practices for cybersecurity are essential in safeguarding against potential threats in the evolving threat landscape.

Source link

Latest articles

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

More like this

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...