• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
weekly threat roundup: froala, wordpress, siemens

Weekly threat roundup: Froala, WordPress, Siemens

You are here: Home / General Cyber Security News / Weekly threat roundup: Froala, WordPress, Siemens
June 3, 2021

Shutterstock

Patch management is much easier claimed than performed, and security teams could normally be forced into prioritising fixes for numerous organization-critical devices, all unveiled at when. It really is grow to be regular, for example, to assume dozens of patches to be released on Microsoft’s Patch Tuesday, with other vendors also routinely having in on the act.

Down below, IT Pro has collated the most pressing disclosures from the final 7 days, together with particulars these kinds of as a summary of the exploit system, and whether the vulnerability is staying exploited in the wild. This is in order to give teams a feeling of which bugs and flaws could possibly pose the most unsafe quick security challenges.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


XSS flaw identified in Froala web editor

Bishop Fox researcher Chris David has uncovered a cross-internet site scripting (XSS) vulnerability in the Froala site editor utilized to develop about 30,000. 

Tracked as CVE-2021-28114, the vulnerability affects Foala versions 3.2.5 and previously and is embedded in its HTML sanitisation parsing protocol, which makes it possible for attackers to bypass existing XSS protections. This is a significant-risk flaw and can be triggered remotely. 

Fraola is a what-you-see-is-what-you-get (WYSIWYG) HTML wealthy-textual content editor that is applied in third-party internet sites to present textual content enhancing performance, like HTML text. The most recent edition of the software was released on 18 Might this 12 months and incorporates a patch for the flaw.

Critical zero-day found in WordPress plugin

A critical file upload vulnerability in the Extravagant Item Designer WordPress plugin has been actively exploited by cyber criminals, in accordance to researchers with Wordfence. 

The flaw, tracked as CVE-2021-24370, is rated 9.8 on the CVSS danger severity scale and has been disclosed publicly with minimum facts owing to the truth it really is under energetic exploitation. Hackers have been abusing the flaw in the plugin, which makes it possible for users to upload images and PDF data files that can be extra to detailed products and solutions on their web sites. 

The flaw is doable to exploit in some configurations even if the plugin has been deactivated. All users, hence, have been in the beginning urged to uninstall Fancy Product or service Designer until eventually a patched variation was made offered, whilst this has now been launched. 

Siemens fixes collection of automation products 

Siemens has released patches for a critical memory defense flaw embedded in a set of automation products, which hackers could exploit to run arbitrary code to entry memory.

The vulnerability, tagged CVE-2020-15782, is very critical and impacts seven merchandise throughout Siemens’ automation item sequence SIMATIC S7-1200 and S7-1500 CPU. These appliances are conventionally made use of to manage programs and duties for medium and complicated mechanical engineering and manufacturing facility plant buildings. 

Hackers could exploit these flaws to remotely obtain read-write memory access, which can permit them to read information, as nicely as use this as a springboard to start more attacks. 

Siemens has strongly advised that operators enable password protection for S8 interaction and configure extra entry protections. They really should also block remote customer connections, prevent bodily entry to critical elements, and make certain the susceptible programs aren’t related to untrusted networks. 


Some parts of this posting are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News Ransomware Disrupts Largest Ferry Service in Massachusetts
Next Post: Researchers Warn of Critical Bugs Affecting Realtek Wi-Fi Module researchers warn of critical bugs affecting realtek wi fi module»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.