CyberSecurity news

FlagThis - #cisa

Divya@gbhackers.com - 84d
The Cybersecurity and Infrastructure Security Agency (CISA) has issued urgent warnings about multiple actively exploited vulnerabilities affecting popular software and hardware. These flaws impact Zyxel firewalls, CyberPanel, North Grid, and ProjectSend, allowing attackers unauthorized system access and control. Specifically, CyberPanel's CVE-2024-51378, with a critical CVSS score of 10.0, allows authentication bypass and arbitrary command execution, facilitating ransomware deployment. Other vulnerabilities include improper authentication in ProjectSend (CVE-2024-11680), improper XML External Entity restriction in North Grid Proself (CVE-2023-45727), and path traversal in Zyxel firewalls (CVE-2024-11667). These vulnerabilities have been linked to various ransomware campaigns, including PSAUX and Helldown.

Organizations utilizing these products are strongly advised to immediately implement the necessary security updates and mitigations provided by the vendors. The high severity of these vulnerabilities, particularly the perfect score given to CVE-2024-51378, underscores the urgent need for action to prevent exploitation. CISA has added these flaws to its Known Exploited Vulnerabilities catalog and urges federal agencies to remediate them by December 25, 2024. Failure to act promptly leaves organizations vulnerable to significant security breaches and data loss.

Recommended read:
References :
  • gbhackers.com: CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild
  • securityonline.info: CVE-2024-51378 (CVSS 10): Critical CyberPanel Flaw Under Active Attack, CISA Warns
  • The Hacker News: CISA Warns of Active Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel
  • The Hacker News: Information about the Mitel MiCollab zero-day vulnerability.
  • Help Net Security: Details on the Mitel MiCollab zero-day vulnerability and PoC exploit.
  • www.bleepingcomputer.com: Report on the Mitel MiCollab zero-day vulnerability.
  • www.cysecurity.news: CISA Warns of Critical Exploits in ProjectSend, Zyxel, and Proself Systems
  • watchTowr Labs: watchTowr : Mitel MiCollab is an application for voice, video, messaging, presence, audio conferencing, mobility and team collaboration. watchTowr publishes vulnerability details for CVE-2024-35286 (SQL Injection), and CVE-2024-41713 (authentication bypass). Additionally they publicly disclose a post-authenticated arbitrary file read vulnerability (unpatched) that Mitel failed to patch within 100 days of reporting. This includes proof of concept.
  • www.csoonline.com: Mitel MiCollab VoIP authentication bypass opens new attack paths
  • www.mitel.com: Mitel security advisory addressing CVE-2024-41713.
  • The Register - Security: Information about the zero-day vulnerability in Mitel MiCollab that allows attackers to access sensitive files.
  • securityaffairs.com: U.S. CISA adds CyberPanel flaw to its Known Exploited Vulnerabilities catalog
  • gbhackers.com: Report on multiple ICS advisories released by CISA, focusing on vulnerabilities and exploits in AutomationDirect and Planet Technology products.

PJCoyle (noreply@blogger.com)@chemical-facility-security-news.blogspot.com - 84d
The Cybersecurity and Infrastructure Security Agency (CISA) has added multiple actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. These include flaws affecting Zyxel firewalls, Cisco's Adaptive Security Appliance (ASA), CyberPanel, North Grid, and ProjectSend. The addition of these vulnerabilities highlights the ongoing threat landscape and the urgent need for organizations to implement timely patching and robust vulnerability management practices. A particularly concerning vulnerability is CVE-2024-51378, a critical flaw in CyberPanel with a CVSS score of 10.0, allowing attackers to bypass authentication and execute arbitrary commands, leading to ransomware deployment and data theft. Other vulnerabilities, such as the decade-old Cisco ASA flaw (CVE-2014-2120), despite its lower severity score, are also being actively exploited, emphasizing the importance of addressing even older vulnerabilities.

CISA's urgent warning focuses on the immediate need for remediation. Federal agencies face a December 25th, 2024 deadline to patch affected systems, underlining the severity of the threat. The vulnerabilities affect various systems, ranging from firewalls to open-source software, indicating a broad attack surface. The agency strongly advises organizations to implement mitigations, including patching, access restriction, and vigilant monitoring for suspicious activity. Failure to address these vulnerabilities leaves organizations vulnerable to unauthorized access, data breaches, ransomware attacks, and significant operational disruptions.

Recommended read:
References :
  • chemical-facility-security-news.blogspot.com: Information on the recent addition of the Zyxel vulnerability to the KEV catalog.
  • securityonline.info: Details on CISA adding vulnerabilities to its Known Exploited Vulnerabilities catalog.
  • gbhackers.com: Article detailing CISA's warning about actively exploited vulnerabilities in Zyxel firewalls, CyberPanel, North Grid, and ProjectSend.
  • securityonline.info: Article about a critical vulnerability in CyberPanel that is being actively exploited and urges immediate action.
  • The Hacker News: Article discussing CISA’s warning of actively exploited vulnerabilities in Zyxel, ProjectSend, and CyberPanel.
  • www.cysecurity.news: CISA warning about critical exploits in ProjectSend, Zyxel, and Proself systems.
  • securityaffairs.com: CISA alert about critical vulnerabilities actively exploited in various products.
  • gbhackers.com: Multiple ICS Advisories Released by CISA Detailing Exploits & Vulnerabilities

@feeds.feedburner.com - 71d
The Cybersecurity and Infrastructure Security Agency (CISA) is recommending that senior government and political officials use end-to-end encrypted messaging applications, such as Signal. This recommendation follows a series of telecom breaches impacting numerous countries, including eight carriers within the United States. The agency's move aims to ensure more secure communications and to prevent potential leaks of sensitive government and political conversations that could arise from these security incidents.

These breaches, some of which were confirmed by CISA and the FBI in late October, have highlighted vulnerabilities in the telecom sector. Reports indicate a Chinese-backed threat group, Salt Typhoon, is responsible for the attacks which impacted multiple US telecommunications companies including T-Mobile, AT&T, Verizon, and Lumen Technologies. While the exact timing of the breaches remains unclear, the agency's push for encrypted messaging is a step towards safeguarding sensitive information.

Recommended read:
References :
  • bsky.app: CISA urges senior government and political officials to switch to end-to-end encrypted messaging apps like Signal following a wave of telecom breaches across dozens of countries, including eight carriers in the United States.
  • BleepingComputer: CISA urges senior government and political officials to switch to end-to-end encrypted messaging apps like Signal following a wave of telecom breaches across dozens of countries, including eight carriers in the United States.
  • www.bleepingcomputer.com: CISA urges switch to Signal-like encrypted messaging apps after telecom hacks
  • www.techradar.com: Salt Typhoon: US cybersecurity watchdog urges switch to Signal-like messaging apps
  • techcrunch.com: US government urges high-ranking officials to lock down mobile devices following telecom breaches
  • www.scworld.com: E2E encrypted messaging app use urged by CISA

Juan Perez@Tenable Blog - 5d
The Ghost (Cring) ransomware group, known for exploiting vulnerabilities in software and firmware, remains a significant threat as of January 2025. A joint cybersecurity alert from the FBI, CISA, and other partners warns the global cyber defender community of increasing attacks from this financially motivated group. CISA issued a joint advisory on February 19, 2025, emphasizing the group's ongoing activity.

The Ghost (Cring) ransomware first appeared in early 2021 and has impacted organizations across more than 70 countries by compromising vulnerable, internet-facing services. Security measures such as patching known vulnerabilities and implementing basic infosec actions are crucial in defending against these attacks. The SOC Prime Platform has curated Sigma rules to help detect Ghost (Cring) ransomware activity.

Recommended read:
References :
  • SecureWorld News: The FBI, CISA, and MS-ISAC have issued a joint cybersecurity advisory warning organizations about Ghost (Cring) ransomware, a sophisticated cyber threat that has been compromising critical infrastructure, businesses, and government entities worldwide.
  • Tenable Blog: Rapid7 discusses Ghost Ransomware group targeting known Vulns.
  • aboutdfir.com: The operators of Ghost ransomware continue to claim victims and score payments, but keeping the crooks at bay is possible by patching known vulnerabilities and some basic infosec actions.
  • Resources-2: Picus Security provides Ghost (Cring) Ransomware Analysis, Simulation, and Mitigation.
  • socprime.com: Ghost (Cring) Ransomware Detection: The FBI, CISA, and Partners Warn of Increasing China-Backed Group’s Attacks for Financial Gain
  • SOC Prime Blog: The FBI, CISA, and partners have recently issued a joint cybersecurity alert warning the global cyber defender community of increasing Ghost (Cring) ransomware attacks aimed at financial gain.
  • thecyberexpress.com: A Ghost ransomware group also referred to as Cring, has been actively exploiting vulnerabilities in software and firmware as recently as January 2025.
  • Security Boulevard: [CISA AA25-050A] #StopRansomware: Ghost (Cring) Ransomware
  • www.attackiq.com: CISA AA25-050A] #StopRansomware: Ghost (Cring) Ransomware
  • industrialcyber.co: CISA, FBI, MS-ISAC warn of Ghost ransomware
  • aboutdfir.com: The operators of Ghost ransomware continue to claim victims and score payments, but keeping the crooks at bay is possible by patching known vulnerabilities and some basic infosec actions, according to a joint advisory issued Wednesday by the FBI and US Cybersecurity and
  • securebulletin.com: Secure Bulletin provides an analysis of tactics, targets, and techniques used by Ghost Ransomware.
  • Secure Bulletin: Securebulletin article on Ghost Ransomware
  • The Register - Security: Ghost ransomware crew continues to haunt IT depts with scarily bad infosec
  • cyble.com: FBI-CISA Ghost Ransomware Warning Shows Staying Power of Old Vulnerabilities
  • aboutdfir.com: News article covering the joint advisory from CISA and the FBI on the Ghost/Cring ransomware.

@github.com - 66d
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a critical vulnerability in the Acclaim Systems USAHERDS web application. This flaw, identified as CVE-2021-44207, has been actively exploited and carries a high severity score of 8.1. The vulnerability stems from the use of static ValidationKey and DecryptionKey values which are used to secure the ViewState feature, allowing malicious actors to craft malicious payloads that can bypass integrity checks. Exploiting this flaw allows attackers to execute arbitrary code on the affected server, potentially compromising the entire system and its network.

The vulnerability impacts Acclaim USAHERDS versions 7.4.0.1 and earlier, released prior to November 2021. CISA has added this flaw to its Known Exploited Vulnerabilities catalog, further underscoring the urgency of this security risk. Federal agencies are urged to apply the necessary patches and remediation by January 13, 2025. It has also been noted that APT41, a Chinese state-sponsored espionage group, has been linked to exploiting this vulnerability to compromise U.S. state government networks.

Recommended read:
References :
  • cloud.google.com: CISA : (8.1 high) Acclaim Systems USAHERDS Use of Hard-Coded Credentials Vulnerability
  • : CISA : (8.1 high) Acclaim Systems USAHERDS Use of Hard-Coded Credentials Vulnerability
  • securityaffairs.com: U.S. CISA adds Acclaim Systems USAHERDS flaw to its Known Exploited Vulnerabilities catalog
  • securityonline.info: CVE-2021-44207: Vulnerability in Acclaim USAHERDS Actively Exploited, CISA Warns
  • securityonline.info: CVE-2021-44207: Vulnerability in Acclaim USAHERDS Actively Exploited, CISA Warns
  • thecyberexpress.com: The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new vulnerability, CVE-2021-44207, to its Known Exploited Vulnerabilities (KEV) Catalog.
  • The Hacker News: CISA Adds Acclaim USAHERDS Vulnerability to KEV Catalog Amid Active Exploitation
  • ciso2ciso.com: U.S. CISA adds Acclaim Systems USAHERDS flaw to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
  • ciso2ciso.com: U.S. CISA adds Acclaim Systems USAHERDS flaw to its Known Exploited Vulnerabilities catalog
  • Osint10x: CISA Adds Acclaim USAHERDS Vulnerability to KEV Catalog Amid Active Exploitation
  • osint10x.com: CISA Adds Acclaim USAHERDS Vulnerability to KEV Catalog Amid Active Exploitation

Jessica Lyons@The Register - Software - 14d
The FBI and CISA have jointly issued an advisory urging software developers to eliminate buffer overflow vulnerabilities, labeling them "unforgivable defects." These agencies highlighted the continued presence of such vulnerabilities in products from major vendors like Microsoft and VMware. The advisory emphasizes the need for developers to adopt secure-by-design practices and memory-safe programming languages to prevent these flaws.

The agencies pointed out several recent buffer overflow vulnerabilities, including those found in Microsoft's Hyper-V, Ivanti's Connect Secure, and VMware's vCenter. These vulnerabilities, if exploited, could lead to privilege escalation, remote code execution, and full system access. The advisory stresses that buffer overflows are avoidable by using updated coding practices and safe languages. They also call on manufacturers to implement compile-time and runtime protections, conduct thorough testing, and analyze the root cause of past vulnerabilities to prevent future occurrences.

Recommended read:
References :
  • The Register - Software: Feds want devs to stop coding 'unforgivable' buffer overflow vulnerabilities
  • Information Security Buzz: CISA and FBI warn of threats exploiting buffer overflow vulnerabilities.
  • : CISA and FBI release a joint Secure by Design Alert on eliminating buffer overflow vulnerabilities.
  • industrialcyber.co: CISA, FBI urge manufacturers to eliminate buffer overflow vulnerabilities with secure-by-design practices
  • ciso2ciso.com: CISA, FBI call software with buffer overflow issues ‘unforgivable’ – Source: www.csoonline.com
  • Talkback Resources: US govt wants developers to stop coding 'unforgivable' bugs [app] [exp]
  • Tenable Blog: Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat
  • cyble.com: FBI, CISA Urge Memory-Safe Practices for Software Development
  • securityonline.info: Buffer Overflows Vulnerabilities: CISA & FBI Issue Urgent Warning

Divya@gbhackers.com - 84d
The Cybersecurity and Infrastructure Security Agency (CISA) has warned of multiple critical vulnerabilities actively exploited in popular software and hardware. A flaw in CyberPanel (CVE-2024-51378), an open-source web hosting control panel, with a CVSS score of 10.0, allows authentication bypass and remote code execution, enabling attackers to deploy ransomware and compromise systems. This vulnerability has been linked to ransomware campaigns, highlighting the urgent need for immediate patching. Further, vulnerabilities affecting Zyxel firewalls (CVE-2024-11667), ProjectSend (CVE-2024-11680), and North Grid Proself (CVE-2023-45727) have also been added to CISA's Known Exploited Vulnerabilities catalog.

These flaws enable a range of attacks including authentication bypass, remote code execution, and data exfiltration. The CyberPanel vulnerability specifically allows attackers to execute arbitrary commands through shell metacharacters, while the Zyxel firewall vulnerability allows file uploads and downloads via crafted URLs. ProjectSend's vulnerability enables configuration modification through HTTP requests, potentially leading to account creation and malicious code injection. North Grid Proself's vulnerability allows XML External Entity (XXE) attacks. CISA urges organizations using these products to apply the necessary patches immediately or discontinue use if patches aren't available to mitigate the risk of exploitation.

Recommended read:
References :
  • gbhackers.com: GBHackers report on CISA warnings about flaws exploited in the wild for Zyxel, CyberPanel, North Grid, and ProjectSend.
  • securityaffairs.com: Security Affairs article about CISA adding a CyberPanel flaw to its Known Exploited Vulnerabilities catalog.
  • securityonline.info: SecurityOnline article detailing the critical CyberPanel flaw under active attack.
  • www.cysecurity.news: CySecurity news article detailing CISA warnings about multiple critical exploits in ProjectSend, Zyxel and Proself.

@thecyberexpress.com - 35d
US cybersecurity agencies, CISA and the FBI, have issued warnings regarding the active exploitation of four critical vulnerabilities within Ivanti Cloud Service Appliances (CSA). These flaws, designated as CVE-2024-8963, CVE-2024-9379, CVE-2024-8190, and CVE-2024-9380, are being leveraged by Chinese state-sponsored actors to breach vulnerable networks. The agencies released detailed technical information, including indicators of compromise (IOCs), highlighting that attackers are using two primary exploit chains to gain unauthorized access, execute arbitrary code, and implant webshells on victim systems.

Specifically, one exploit chain combines CVE-2024-8963, CVE-2024-8190, and CVE-2024-9380, while the other uses CVE-2024-8963 along with CVE-2024-9379. These vulnerabilities affect Ivanti CSA versions 4.6x before 519, and versions 5.0.1 and below for CVE-2024-9379 and CVE-2024-9380. Notably, CSA version 4.6 is end-of-life and does not receive security patches, making it particularly susceptible. The agencies urge organizations to apply patches promptly and implement robust security measures to defend against these active threats, further highlighting the speed at which disclosed vulnerabilities are weaponized.

Recommended read:
References :
  • ciso2ciso.com: FBI/CISA Share Details on Ivanti Exploits Chains: What Network Defenders Need to Know
  • Pyrzout :vm:: Four Critical Ivanti CSA Vulnerabilities Exploited—CISA and FBI Urge Mitigation
  • www.bleepingcomputer.com: CISA and the FBI warned today that attackers are still exploiting Ivanti Cloud Service Appliances (CSA) security flaws patched since September to breach vulnerable networks.
  • thecyberexpress.com: Four Critical Ivanti CSA Vulnerabilities Exploited—CISA and FBI Urge Mitigation
  • www.helpnetsecurity.com: Report on Cisco's fixes for ClamAV vulnerability and a critical Meeting Management flaw.
  • www.scworld.com: Ivanti CSA exploit chains examined in joint CISA, FBI advisory
  • CySec Feeds: CISA and FBI Release Advisory on How Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications
  • ciso2ciso.com: FBI/CISA Share Details on Ivanti Exploits Chains: What Network Defenders Need to Know – Source: www.securityweek.com
  • Pyrzout :vm:: Anatomy of an Exploit Chain: CISA, FBI Detail Ivanti CSA Attacks  – Source:cyble.com #'Cyber
  • securityonline.info: CISA and FBI Warn of Exploited Ivanti CSA Vulnerabilities in Joint Security Advisory
  • securityonline.info: CISA and FBI Warn of Exploited Ivanti CSA Vulnerabilities in Joint Security Advisory
  • ciso2ciso.com: Anatomy of an Exploit Chain: CISA, FBI Detail Ivanti CSA Attacks

Anna Ribeiro@Industrial Cyber - 70d
References: Industrial Cyber , CyberScoop ,
The Cybersecurity and Infrastructure Security Agency (CISA) and the Office of the National Cyber Director (ONCD) have jointly released a new playbook aimed at strengthening cybersecurity within federally funded infrastructure projects. This guide provides a framework, recommended actions, and model language for grant-making agencies to integrate cybersecurity into their programs. The primary objective is to improve the cyber resilience of critical infrastructure by ensuring that projects funded by federal grants are designed with security in mind from the outset. It is also intended to be a minimal burden on the federal grant awarding process.

The playbook offers a range of tools and resources for grant program managers and recipients, such as model language for funding opportunity announcements and terms, and templates. The document is advisory and non-binding, but it emphasizes the need for agencies to incorporate cybersecurity considerations throughout the lifecycle of their grant programs. It advises setting criteria for applying the playbook to specific projects, while also providing a mechanism to support the inclusion of baseline cybersecurity best practices. The playbook also targets critical infrastructure stakeholders and organizations involved in sub-awarding grant funds, to ensure wide-spread adoption.

Recommended read:
References :
  • Industrial Cyber: CISA, ONCD playbook aims to strengthen cybersecurity, resilience of grant-funded infrastructure projects
  • CyberScoop: Playbook advises federal grant managers how to build cybersecurity into their programs
  • thecyberexpress.com: CISA and ONCD Push Cybersecurity for Federal Grants with New Playbook

Divya@gbhackers.com - 73d
The Cybersecurity and Infrastructure Security Agency (CISA) has issued urgent warnings about critical vulnerabilities impacting multiple Industrial Control Systems (ICS) products. These vulnerabilities, if exploited, could allow remote code execution (RCE) and other serious security breaches. Specifically, AutomationDirect’s C-More EA9 Programming Software and Planet Technology’s WGS-804HPT industrial switch were identified as containing severe flaws. The C-More EA9 software suffers from stack-based buffer overflow vulnerabilities, with a CVSS v4 score of 8.4, potentially enabling remote code execution. The Planet Technology switch has three critical vulnerabilities, including stack-based buffer overflow, OS command injection, and integer underflow, with a CVSS v4 score up to 9.3.

These vulnerabilities pose a significant threat to critical infrastructure, as they could enable attackers to remotely compromise systems and disrupt operations. Organizations are strongly advised to update their ICS software and hardware to the latest patched versions as soon as possible. Failure to implement these mitigations could expose organizations to severe security risks and operational disruptions. The ongoing discovery of such vulnerabilities underscores the need for continuous vigilance and proactive security measures within the industrial control systems sector.

Recommended read:
References :

Pierluigi Paganini@Security Affairs - 2d
The Cybersecurity and Infrastructure Security Agency (CISA) has recently added two critical vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. These vulnerabilities affect Adobe ColdFusion and Oracle Agile Product Lifecycle Management (PLM), posing significant risks to organizations. The advisory issued by CISA strongly urges immediate remediation to mitigate the threat of potential exploitation.

These vulnerabilities include CVE-2017-3066 in Adobe ColdFusion and CVE-2024-20953 in Oracle Agile PLM. The agency has set a deadline of March 17, 2025, for federal agencies to secure their networks against these flaws. Active exploitation attempts have been reported, highlighting the urgency of applying necessary updates.

Recommended read:
References :
  • Talkback Resources: Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA [exp] [net]
  • thecyberexpress.com: CISA Warns of Actively Exploited Adobe ColdFusion and Oracle Agile PLM Vulnerabilities
  • cyble.com: Overview The Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog.
  • Talkback Resources: Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA [exp] [net]