• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisa alerts on active exploitation of flaws in fortinet, ivanti,

CISA Alerts on Active Exploitation of Flaws in Fortinet, Ivanti, and Nice Products

You are here: Home / General Cyber Security News / CISA Alerts on Active Exploitation of Flaws in Fortinet, Ivanti, and Nice Products
March 26, 2024

The U.S. Cybersecurity and Infrastructure Security Company (CISA) on Monday placed 3 security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation.

The vulnerabilities additional are as follows –

  • CVE-2023-48788 (CVSS rating: 9.3) – Fortinet FortiClient EMS SQL Injection Vulnerability
  • CVE-2021-44529 (CVSS rating: 9.8) – Ivanti Endpoint Supervisor Cloud Support Equipment (EPM CSA) Code Injection Vulnerability
  • CVE-2019-7256 (CVSS rating: 10.) – Pleasant Linear Emerge E3-Series OS Command Injection Vulnerability

The shortcoming impacting Fortinet FortiClient EMS arrived to light-weight earlier this thirty day period, with the company describing it as a flaw that could permit an unauthenticated attacker to execute unauthorized code or commands through precisely crafted requests.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Fortinet has since revised its advisory to confirm that it has been exploited in the wild, even though no other details about the nature of the attacks are at present offered.

CVE-2021-44529, on the other hand, worries a code injection vulnerability in Ivanti Endpoint Supervisor Cloud Company Appliance (EPM CSA) that will allow an unauthenticated user to execute malicious code with limited permissions.

Modern analysis posted by security researcher Ron Bowes implies that the flaw may well have been introduced as an intentional backdoor in a now-discontinued open up-source undertaking named csrf-magic that existed at minimum since 2014.

CVE-2019-7256, which permits an attacker to perform remote code execution on Awesome Linear Arise E3-Series obtain controllers, has been exploited by menace actors as early as February 2020.

The flaw, alongside 11 other bugs, were addressed by Nice (formerly Nortek) earlier this thirty day period. That said, these vulnerabilities had been at first disclosed by security researcher Gjoko Krstic in Might 2019.

In gentle of the energetic exploitation of the 3 flaws, federal agencies are demanded to use the vendor-supplied mitigations by April 15, 2024.

The progress arrives as CISA and the Federal Bureau of Investigation (FBI) launched a joint notify, urging program manufacturers to just take measures to mitigate SQL injection flaws.

Cybersecurity

The advisory specially highlighted the exploitation of CVE-2023-34362, a critical SQL injection vulnerability in Development Software’s MOVEit Transfer, by the Cl0p ransomware gang (aka Lace Tempest) to breach countless numbers of companies.

“Even with common awareness and documentation of SQLi vulnerabilities around the earlier two many years, along with the availability of powerful mitigations, computer software makers continue to produce products with this defect, which puts lots of clients at risk,” the companies reported.

Discovered this article intriguing? Abide by us on Twitter  and LinkedIn to study much more unique content we put up.


Some elements of this short article are sourced from:
thehackernews.com

Previous Post: «hackers hijack github accounts in supply chain attack affecting top gg Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others
Next Post: U.S. Sanctions 3 Cryptocurrency Exchanges for Helping Russia Evade Sanctions u.s. sanctions 3 cryptocurrency exchanges for helping russia evade sanctions»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.