• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
alert: active exploitation of tp link, apache, and oracle vulnerabilities detected

Alert: Active Exploitation of TP-Link, Apache, and Oracle Vulnerabilities Detected

You are here: Home / General Cyber Security News / Alert: Active Exploitation of TP-Link, Apache, and Oracle Vulnerabilities Detected
May 2, 2023

The U.S. Cybersecurity and Infrastructure Security Company (CISA) has extra a few flaws to the Recognized Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.

The security vulnerabilities are as follows –

  • CVE-2023-1389 (CVSS score: 8.8) – TP-Website link Archer AX-21 Command Injection Vulnerability
  • CVE-2021-45046 (CVSS rating: 9.) – Apache Log4j2 Deserialization of Untrusted Data Vulnerability
  • CVE-2023-21839 (CVSS rating: 7.5) – Oracle WebLogic Server Unspecified Vulnerability

CVE-2023-1389 issues a scenario of command injection influencing TP-Website link Archer AX-21 routers that could be exploited to reach distant code execution. According to Trend Micro’s Zero Day Initiative, the flaw has been place to use by menace actors involved with the Mirai botnet considering the fact that April 11, 2023.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The next flaw to be extra to the KEV catalog is CVE-2021-45046, a remote code execution affecting the Apache Log4j2 logging library that arrived to mild in December 2021.

It truly is at present not distinct how this precise vulnerability is currently being abused in the wild, whilst knowledge collected by GreyNoise demonstrates proof of exploitation makes an attempt from as a lot of as 74 distinctive IP addresses more than the past 30 times. This, however, also contains CVE-2021-44228 (aka Log4Shell).

Completing the list is a large-severity bug in Oracle WebLogic Server versions 12.2.1.3., 12.2.1.4., and 14.1.1.. that could let unauthorized obtain to delicate data. It was patched by the enterprise as element of updates produced in January 2023.

“Oracle WebLogic Server has an unspecified vulnerability that allows an unauthenticated attacker with network obtain by means of T3, IIOP, to compromise Oracle WebLogic Server,” CISA mentioned.

Upcoming WEBINARLearn to Cease Ransomware with True-Time Security

Join our webinar and understand how to cease ransomware attacks in their tracks with genuine-time MFA and service account safety.

Help save My Seat!

Even though there exists proof-of-idea (PoC) exploits for the flaw, there do not appear to be any public reports of destructive exploitation.

Federal Civilian Government Department (FCEB) businesses are expected to utilize vendor-provided fixes by Could 22, 2023, to protected their networks in opposition to these energetic threats.

The advisory also will come a minor around a thirty day period soon after VulnCheck revealed that just about four dozen security flaws that have most likely been weaponized in the wild in 2022 are missing from the KEV catalog.

Of the 42 vulnerabilities, an too much to handle vast majority are relevant to exploitation by Mirai-like botnets (27), adopted by ransomware gangs (6) and other menace actors (9).

Located this report fascinating? Comply with us on Twitter  and LinkedIn to browse additional unique articles we write-up.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «new decoy dog malware toolkit uncovered: targeting enterprise networks New Decoy Dog Malware Toolkit Uncovered: Targeting Enterprise Networks
Next Post: North Korea’s ScarCruft Deploys RokRAT Malware via LNK File Infection Chains north korea's scarcruft deploys rokrat malware via lnk file infection»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data
  • New Russian-Linked Malware Poses “Immediate Threat” to Energy Grids
  • Predator Android Spyware: Researchers Sound the Alarm on Alarming Capabilities
  • 5 Must-Know Facts about 5G Network Security and Its Cloud Benefits
  • Romania’s Safetech Leans into UK Cybersecurity Market
  • New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids
  • Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances
  • Advanced Phishing Attacks Surge 356% in 2022
  • Expo Framework API Flaw Reveals User Data in Online Services
  • NCSC Warns Against Chinese Cyber Attacks on Critical Infrastructure

Copyright © TheCyberSecurity.News, All Rights Reserved.