HomeCyber BalkansCISA issues warning of another BeyondTrust vulnerability being actively exploited in the...

CISA issues warning of another BeyondTrust vulnerability being actively exploited in the wild

Published on

spot_img

The Cybersecurity and Infrastructure Security Agency (CISA) recently added two critical flaws to its Known Exploited Vulnerabilities (KEV) catalog, indicating that these vulnerabilities have been actively exploited by threat actors. The first flaw, identified as CVE-2024-12356, was added to the catalog on 19 December. This revelation raised suspicions that this flaw may have been the one exploited in the attack that compromised workstations at the US Treasury.

However, CISA also added a second medium-risk vulnerability, known as CVE-2024-12686, to the KEV catalog on Monday. It remains unclear whether this second flaw was exploited in the same attacks that targeted the US Treasury workstations or if it was part of new attacks that occurred after the disclosure by BeyondTrust.

CISA has instructed government agencies to identify any vulnerable deployments and ensure that the necessary patches are applied by 3 February. This proactive measure is aimed at mitigating the risk of exploitation and protecting critical systems and data from cyber threats.

In a recent update on the investigation into the Treasury breach, CISA stated that there is no evidence to suggest that other government agencies have been impacted by the attack. This indicates that the scope of the breach may be limited to the US Treasury and does not extend to other federal entities at this time.

The inclusion of these vulnerabilities in the KEV catalog underscores the ongoing threats posed by cyber actors who exploit software weaknesses for malicious purposes. It serves as a reminder for organizations to maintain strong cybersecurity practices, such as timely patch management and risk assessments, to safeguard against potential attacks.

The disclosure of these vulnerabilities also highlights the importance of information sharing and collaboration among government agencies and cybersecurity experts. By sharing intelligence and insights on emerging threats and vulnerabilities, organizations can better protect themselves and mitigate the impact of potential cyber incidents.

As the cybersecurity landscape continues to evolve, it is crucial for organizations to stay vigilant and proactive in addressing vulnerabilities and strengthening their defense mechanisms. By staying informed about the latest threats and taking proactive steps to mitigate risks, organizations can enhance their resilience to cyber threats and protect their critical assets from exploitation.

Source link

Latest articles

AMD and Google reveal vulnerability in Zen processor microcode

A high-severity microcode signature verification vulnerability in AMD's Zen CPUs was recently disclosed following...

Episode 154: Hijacked Line – The Cyber Post

Conor Freeman, a notorious online thief, has recently been the subject of much controversy...

The AI Chatbot Fueling Cybercrime Threats.

Cybersecurity professionals have expressed mixed opinions about the recent emergence of GhostGPT, an AI...

The API security crisis and the risk to businesses

In a recent video on Help Net Security, Ivan Novikov, CEO of Wallarm, delved...

More like this

AMD and Google reveal vulnerability in Zen processor microcode

A high-severity microcode signature verification vulnerability in AMD's Zen CPUs was recently disclosed following...

Episode 154: Hijacked Line – The Cyber Post

Conor Freeman, a notorious online thief, has recently been the subject of much controversy...

The AI Chatbot Fueling Cybercrime Threats.

Cybersecurity professionals have expressed mixed opinions about the recent emergence of GhostGPT, an AI...