• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

US Adds 17 Exploited Bugs to “Must Patch” List

You are here: Home / General Cyber Security News / US Adds 17 Exploited Bugs to “Must Patch” List
January 24, 2022

A US government’s security agency has additional 17 vulnerabilities at this time being actively exploited in the wild to a database of bugs that federal companies have to correct.

The Known Exploited Vulnerabilities Catalog was released in November last 12 months as part of Binding Operational Directive (BOD) 22-01, made to make civilian federal government agencies far more cyber-resilient.

An preliminary checklist of just around 300 CVEs, some of which dated as far back again as 2010, has been steadily additional to because. The latest update consists of vulnerabilities that could be exploited for various ends, which include denial of company, privilege escalation, authentication bypass and information and facts disclosure.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Attackers are using them to steal data and credentials, execute malware, access networks and far more.

Amongst the most fascinating are CVE-2021-32648, which arrived to light very last week and is an improper authentication flaw in the Oct CMS. It was exploited in a vast-ranging campaign to hijack and deface Ukrainian government web-sites.

One more is CVE-2021-35247, listed as an improper input validation vulnerability in SolarWinds Serv-U file servers.

Microsoft researchers discovered it being exploited in Log4j attacks in an attempt to compromise Windows domain controllers. This kind of attacks failed mainly because Windows area controllers are not susceptible to Log4Shell.

However, it have to be patched by February 4, according to the purchase from the Cybersecurity and Infrastructure Security Company (CISA).

There is an even tighter time body for CVE-2021-32648 and 8 other CVEs outlined: these should be fixed by February 1. The remaining 7 bugs should be patched by July, according to the update.

Although the BOD to patch any vulnerabilities included to the database is only obligatory for civilian federal businesses, the governing administration desires other corporations to comply with the very same procedures.

“While this directive applies to federal civilian businesses, we know that corporations throughout the region, including critical infrastructure entities, are focused using these similar vulnerabilities,” it said back again in November.

“It is consequently critical that each individual group undertake this directive and prioritize mitigation of vulnerabilities shown in CISA’s community catalog.”


Some parts of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «unusual ‘donald trump’ packer malware delivers rats, infostealers Unusual ‘Donald Trump’ Packer Malware Delivers RATs, Infostealers
Next Post: US Data Breaches Surge 68% to All-Time High Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Another Destructive Wiper Targets Organizations in Ukraine
  • New “B1txor20” Linux Botnet Uses DNS Tunnel and Exploits Log4J Flaw
  • New Infinite Loop Bug in OpenSSL Could Let Attackers Crash Remote Servers
  • FBI, CISA Warn of Russian Hackers Exploiting MFA and PrintNightmare Bug
  • Unpatched RCE Bug in dompdf Project Affects HTML to PDF Converters
  • NortonLifeLock and Avast merger could reduce competition, CMA warns
  • Thousands of Mobile Apps Expose User Data Via Cloud Misconfigurations
  • NSW ditches e-voting system for 2023 election
  • Kaspersky Hits Back at “Politically Motivated” BSI Advisory
  • Germany advises against using Kaspersky software due to hacking risk

Copyright © TheCyberSecurity.News, All Rights Reserved.