• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

U.S. Cybersecurity Agency CISA Adds Three New Vulnerabilities in KEV Catalog

You are here: Home / Cyber Security News / U.S. Cybersecurity Agency CISA Adds Three New Vulnerabilities in KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday additional three security flaws to its Recognised Exploited Vulnerabilities (KEV) catalog, primarily based on evidence of lively exploitation.

The record of shortcomings is as follows –

  • CVE-2022-47986 (CVSS score: 9.8) – IBM Aspera Faspex Code Execution Vulnerability
  • CVE-2022-41223 (CVSS rating: 6.8) – Mitel MiVoice Connect Code Injection Vulnerability
  • CVE-2022-40765 (CVSS score: 6.8) – Mitel MiVoice Link Command Injection Vulnerability

CVE-2022-47986 is described as a YAML deserialization flaw in the file transfer solution that could allow a distant attacker to execute code on the program.

Information of the flaw and a evidence-of-principle (PoC) were being shared by Assetnote on February 2, a day just after which the Shadowserver Foundation reported it “picked up exploitation tries” in the wild.

The lively exploitation of the Aspera Faspex flaw arrives shortly right after a vulnerability in Fortra’s GoAnywhere MFT-managed file transfer software program (CVE-2023-0669) was abused by danger actors with possible links to the Clop ransomware procedure.

CISA also extra two flaws impacting Mitel MiVoice Link (CVE-2022-41223 and CVE-2022-40765) that could allow an authenticated attacker with interior network obtain to execute arbitrary code.

Specific specifics encompassing the mother nature of the attacks are unclear. The vulnerabilities were being patched by Mitel in Oct 2022.

In gentle of in-the-wild exploitation, Federal Civilian Government Branch (FCEB) organizations are required to apply the needed updates by March 14, 2023, to safe networks versus possible threats.

CISA, in a similar development, also unveiled an Industrial Handle Devices (ICS) advisory that relates to critical flaws (CVE-2022-26377 and CVE-2022-31813) in Mitsubishi Electric’s MELSOFT iQ AppPortal.

“Successful exploitation of these vulnerabilities could enable a malicious attacker to make unidentified impacts such as authentication bypass, information disclosure, denial-of-services, or bypass IP address authentication,” the company explained.

Discovered this posting fascinating? Stick to us on Twitter  and LinkedIn to study more distinctive content material we publish.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « VMware Patches Critical Vulnerability in Carbon Black App Control Product
Next Post: Gcore Thwarts Massive 650 Gbps DDoS Attack on Free Plan Client »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals
  • Watch the Webinar — AI vs. AI: Harnessing AI Defenses Against AI-Powered Risks
  • Are You Willing to Pay the High Cost of Compromised Credentials?
  • From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese
  • New Report Uncovers Three Distinct Clusters of China-Nexus Attacks on Southeast Asian Government

Copyright © 2023 · AllTech.News, All Rights Reserved.