HomeCyber BalkansCISA Alert: Four Active Vulnerabilities Exploited in the Wild

CISA Alert: Four Active Vulnerabilities Exploited in the Wild

Published on

spot_img

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a warning regarding four critical vulnerabilities that are currently being exploited in the wild. These vulnerabilities affect a range of products, from routers to software platforms, and pose significant risks to users globally.

Among the vulnerable products identified are D-Link, DrayTek, Motion Spell, and SAP. The vulnerabilities in these products can be exploited by attackers to gain unauthorized access and potentially compromise sensitive information.

The first vulnerability, designated as CVE-2023-25280, targets the D-Link DIR-820 router. This flaw allows remote attackers to escalate privileges by exploiting the ping_addr parameter in the ping.ccp component. As a result, users are advised to discontinue the use of this product immediately, as it has reached its end-of-life and end-of-service status.

In a separate development, CVE-2020-15415 impacts DrayTek’s Vigor3900, Vigor2960, and Vigor300B routers, enabling remote code execution through shell metacharacters in a filename. Users are urged to implement vendor-suggested mitigations or cease use of the affected routers to prevent potential exploitation.

Another critical vulnerability, CVE-2021-4043, has been found in Motion Spell’s GPAC software, allowing a local attacker to trigger a denial-of-service condition. While there is no evidence linking this vulnerability to ransomware activities, users should take precautions and follow vendor recommendations to safeguard their systems.

Lastly, CVE-2019-0344 affects SAP Commerce Cloud, with a vulnerability in the mediaconversion and virtualjdbc extensions that could lead to code injection attacks. Organizations and individuals using these products must address these vulnerabilities promptly to mitigate the risk of exploitation.

CISA has underscored the urgency of addressing these vulnerabilities by October 21, 2024. Users are strongly advised to apply available patches or mitigations and discontinue the use of affected products where necessary to protect their systems from potential exploitation.

In conclusion, the exploitation of these vulnerabilities poses a significant threat to the cybersecurity of users worldwide. It is crucial for organizations and individuals to take immediate action to secure their systems and prevent unauthorized access or data breaches. Vigilance and adherence to best practices for cybersecurity are essential in safeguarding against potential threats in the evolving threat landscape.

Source link

Latest articles

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

More like this

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...