CIS Security Advisories
CIS Security News
CISA News
ISACA SmartBrief
Cyber Security Advisories – MS-ISAC
- Multiple Vulnerabilities in Rsync Could Allow for Remote Code Execution 2025-01-15Multiple vulnerabilities have been discovered in Rsync, the most severe of which could allow for remote code execution. Rsync is an open-source file synchronization and data transferring tool valued for its ability to perform incremental transfers, reducing data transfer times and bandwidth usage. The tool is utilized extensively by backup systems like Rclone, DeltaCopy, ChronoSync, public […]
- Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution 2025-01-14Multiple vulnerabilities have been discovered Fortinet Products, the most severe of which could allow for remote code execution. FortiManager is a network and security management tool that provides centralized management of Fortinet devices from a single console. FortiOS is the Fortinet’s proprietary Operation System which is utilized across multiple product lines. FortiProxy is a secure […]
- Multiple Vulnerabilities in Ivanti Avalanche Could Allow for Authentication Bypass 2025-01-14Multiple Vulnerabilities have been discovered in Ivanti Avalanche, the most severe of which could allow for authentication bypass. Ivanti Avalanche is a mobile device management system. Network security features allow one to manage wireless settings (including encryption and authentication) and apply those settings on a schedule throughout the network. Successful exploitation could allow for a […]
- Critical Patches Issued for Microsoft Products, January 14, 2025 2025-01-14Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users […]
- Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution 2025-01-14Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install […]
- Multiple vulnerabilities in SonicWall SonicOS could allow a remote attacker to bypass authentication. 2025-01-09Multiple vulnerabilities have been discovered in SonicWall SonicOS that could allow for authentication bypass. SonicOS is SonicWall’s operating system designed for their firewalls and other security devices. Successful exploitation of the most severe of these vulnerabilities could allow for authentication bypass on the affected system. Depending on the privileges associated with the system, an attacker could […]
- Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution 2025-01-09Multiple vulnerabilities have been discovered in Ivanti Products, the most severe of which could allow for remote code execution. Ivanti Endpoint Manager is a client-based unified endpoint management software. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the system. Ivanti Connect Secure is an […]
- A Vulnerability in Apache Struts2 Could Allow for Remote Code Execution 2024-12-23A vulnerability has been discovered in Apache Struts2, which could allow for remote code execution. Apache Struts2 is an open-source web application framework used for developing Java web applications. Successful exploitation of this vulnerability could allow for remote code execution in the context of the affected service account. Depending on the privileges associated with the […]
- Multiple Vulnerabilities in Sophos Firewall Could Allow for Remote Code Execution 2024-12-20Multiple Vulnerabilities have been discovered in Sophos Firewall, the most severe of which could allow for remote code execution. Sophos Firewall is a network security solution. Successful exploitation of the most severe of these vulnerabilities could allow for unauthorized access on the system. Depending on the privileges associated with the system, an attacker could then; […]
- A Vulnerability in Multiple Cleo Products Could Allow for Remote Code Execution 2024-12-12A vulnerability has been discovered in multiple Cleo products that could allow for remote code execution. Cleo’s LexiCom, VLTransfer, and Harmony is software that is commonly used to manage file transfers. Successful exploitation of this vulnerability could allow for remote code execution in the context of the system. Depending on the privileges associated with the […]
Blog Feed – Center for Internet Security
- CIS Benchmarks January 2025 Update 2025-01-14Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for January 2025.
- Top 5 Weakest Security Configurations and How to Fix Them 2025-01-02In H2 2024, the CIS CTI team found weak security configurations through passive scans of customers' external networks. Here's how to stay secure.
- CIS Benchmarks December 2024 Update 2024-12-10Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for December 2024.
- Lynx Ransomware Pouncing on Utilities 2024-12-10The Lynx ransomware group targeted multiple U.S. facilities in 2024. Here's how your facility can strengthen your defenses against threats like Lynx.
- 2024 General Election Incident Reporting Wrap-up 2024-12-10The CIS CTI team responded to member incident reports and monitored reporting trends around the 2024 General Election. Here's what the team observed.
- 12 CIS Experts' Cybersecurity Predictions for 2025 2024-12-05We spoke to a dozen experts at the Center for Internet Security® (CIS®) about their cybersecurity predictions for 2025. Here's what they had to say.
- The Ongoing Evolution of the CIS Critical Security Controls 2024-11-26For decades, enterprises around the world have used the CIS Critical Security Controls to grow their cyber defenses. Learn how they continue to evolve.
- CIS Benchmarks November 2024 Update 2024-11-07Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for November 2024.
- Top 10 Malware Q3 2024 2024-10-25In Q3 2024, the Top 10 Malware observed via the monitoring services of the MS-ISAC® changed moderately from the previous quarter. See what's new.
- CIS Benchmarks October 2024 Update 2024-10-07Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for October 2024.
ICS Advisories
- Siemens Mendix LDAP 2025-01-16As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.4 ATTENTION: Exploitable remotely Vendor: […]CISA
- Schneider Electric Data Center Expert 2025-01-16View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.2 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Data Center Expert Vulnerabilities: Improper Verification of Cryptographic Signature, Missing Authentication for Critical Function 2. RISK EVALUATION Exploitation of these vulnerabilities could allow an attacker to expose private data or achieve remote code execution. 3. TECHNICAL DETAILS 3.1 […]CISA
- Fuji Electric Alpha5 SMART 2025-01-16View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low attack complexity Vendor: Fuji Electric Equipment: Alpha5 SMART Vulnerability: Stack-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Fuji Electric Alpha5 SMART, a servo drive […]CISA
- Hitachi Energy FOX61x Products 2025-01-16View CSAF 1. EXECUTIVE SUMMARY CVSS v3 4.9 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: FOX61x Products Vulnerability: Relative Path Traversal 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to traverse the file system to access files or directories that would otherwise be inaccessible. 3. TECHNICAL DETAILS 3.1 AFFECTED […]CISA
- Siemens SIPROTEC 5 Products 2025-01-16As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.1 ATTENTION: Exploitable remotely/low attack […]CISA
- Siemens Siveillance Video Camera 2025-01-16As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.2 ATTENTION: Exploitable locally Vendor: […]CISA
- Hitachi Energy FOX61x, FOXCST, and FOXMAN-UN Products 2025-01-16View CSAF 1. EXECUTIVE SUMMARY CVSS v3 4.9 ATTENTION: Low attack complexity Vendor: Hitachi Energy Equipment: FOX61x, FOXCST, FOXMAN-UN Vulnerability: Improper Validation of Certificate with Host Mismatch 2. RISK EVALUATION Successful exploitation of this vulnerability could allow attackers to intercept or falsify data exchanges between the client and the server. 3. TECHNICAL DETAILS 3.1 AFFECTED […]CISA
- Siemens Industrial Edge Management 2025-01-16As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 2.1 ATTENTION: Exploitable remotely Vendor: […]CISA
- Schneider Electric Vijeo Designer 2025-01-14View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low Attack Complexity Vendor: Schneider Electric Equipment: Vijeo Designer Vulnerability: Improper Privilege Management 2. RISK EVALUATION Successful exploitation of these vulnerabilities could cause a non-admin authenticated user to perform privilege escalation by tampering with the binaries. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Schneider Electric reports that […]CISA
- Hitachi Energy FOXMAN-UN 2025-01-14View CSAF 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: FOXMAN-UN Vulnerabilities: Authentication Bypass Using an Alternate Path or Channel, Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'), Heap-based Buffer Overflow, Incorrect User Management, Improper Certificate Validation, Improper Restriction of Excessive Authentication Attempts, Use of Hard-coded […]CISA
ISACA SmartBrief on Cybersecurity
- SmartBrief will be closed on Monday, Jan. 20 2025-01-17In observance of Martin Luther King Jr. Day in the US, SmartBrief will be closed on Monday, Jan. 20.
- Who Said It? Tomorrow is our permanent address. 2025-01-17Katharine Hepburn or E. E. CummingsCheck your answer here.
- Data breach at Wolf Haldenstein affects 3.5M 2025-01-17Wolf Haldenstein Adler Freeman & Herz has disclosed a data breach affecting nearly 3.5 million individuals, with exposed info -More-
- How to support data governance with generative AI 2025-01-17Generative AI can enhance data governance by automating tasks such as data ingestion and cleaning, increasing user adoption a -More-
- Cybersecurity students gain hands-on IT skills 2025-01-17A Texas school district's tech department held a workshop to teach career and technical education cybersecurity students IT t -More-
- MikroTik botnet exploits DNS flaws and spreads malware 2025-01-17Infoblox researchers have identified a botnet of 13,000 MikroTik devices exploiting DNS misconfigurations to spoof 20,000 dom -More-
- Scammers use reply tactics to bypass iMessage security 2025-01-17Scammers are exploiting a tactic to trick Apple iMessage users into disabling built-in security by sending phishing messages -More-
- Chinese hackers targeted top Treasury officials 2025-01-17Chinese hackers targeted top officials in a breach of the Treasury Department, accessing unclassified files of Secretary Jane -More-
- Cybersecurity threats to watch for in 2025 2025-01-17Cybersecurity threats are evolving rapidly, with threat actors increasingly using generative AI for sophisticated attacks, sa -More-