HomeCyber BalkansCISA issues warning of another BeyondTrust vulnerability being actively exploited in the...

CISA issues warning of another BeyondTrust vulnerability being actively exploited in the wild

Published on

spot_img

The Cybersecurity and Infrastructure Security Agency (CISA) recently added two critical flaws to its Known Exploited Vulnerabilities (KEV) catalog, indicating that these vulnerabilities have been actively exploited by threat actors. The first flaw, identified as CVE-2024-12356, was added to the catalog on 19 December. This revelation raised suspicions that this flaw may have been the one exploited in the attack that compromised workstations at the US Treasury.

However, CISA also added a second medium-risk vulnerability, known as CVE-2024-12686, to the KEV catalog on Monday. It remains unclear whether this second flaw was exploited in the same attacks that targeted the US Treasury workstations or if it was part of new attacks that occurred after the disclosure by BeyondTrust.

CISA has instructed government agencies to identify any vulnerable deployments and ensure that the necessary patches are applied by 3 February. This proactive measure is aimed at mitigating the risk of exploitation and protecting critical systems and data from cyber threats.

In a recent update on the investigation into the Treasury breach, CISA stated that there is no evidence to suggest that other government agencies have been impacted by the attack. This indicates that the scope of the breach may be limited to the US Treasury and does not extend to other federal entities at this time.

The inclusion of these vulnerabilities in the KEV catalog underscores the ongoing threats posed by cyber actors who exploit software weaknesses for malicious purposes. It serves as a reminder for organizations to maintain strong cybersecurity practices, such as timely patch management and risk assessments, to safeguard against potential attacks.

The disclosure of these vulnerabilities also highlights the importance of information sharing and collaboration among government agencies and cybersecurity experts. By sharing intelligence and insights on emerging threats and vulnerabilities, organizations can better protect themselves and mitigate the impact of potential cyber incidents.

As the cybersecurity landscape continues to evolve, it is crucial for organizations to stay vigilant and proactive in addressing vulnerabilities and strengthening their defense mechanisms. By staying informed about the latest threats and taking proactive steps to mitigate risks, organizations can enhance their resilience to cyber threats and protect their critical assets from exploitation.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...