Article Details

Scrape Timestamp (UTC): 2024-03-26 05:03:48.998

Source: https://thehackernews.com/2024/03/cisa-alerts-on-active-exploitation-of.html

Original Article Text

Click to Toggle View

CISA Alerts on Active Exploitation of Flaws in Fortinet, Ivanti, and Nice Products. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday placed three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities added are as follows - The shortcoming impacting Fortinet FortiClient EMS came to light earlier this month, with the company describing it as a flaw that could allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted requests. Fortinet has since revised its advisory to confirm that it has been exploited in the wild, although no other details regarding the nature of the attacks are currently available. CVE-2021-44529, on the other hand, concerns a code injection vulnerability in Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) that allows an unauthenticated user to execute malicious code with limited permissions. Recent research published by security researcher Ron Bowes indicates that the flaw may have been introduced as an intentional backdoor in a now-discontinued open-source project called csrf-magic that existed at least since 2014. CVE-2019-7256, which permits an attacker to conduct remote code execution on Nice Linear eMerge E3-Series access controllers, has been exploited by threat actors as early as February 2020. The flaw, alongside 11 other bugs, were addressed by Nice (formerly Nortek) earlier this month. That said, these vulnerabilities were originally disclosed by security researcher Gjoko Krstic in May 2019. In light of the active exploitation of the three flaws, federal agencies are required to apply the vendor-provided mitigations by April 15, 2024. The development comes as CISA and the Federal Bureau of Investigation (FBI) released a joint alert, urging software manufacturers to take steps to mitigate SQL injection flaws. The advisory specifically highlighted the exploitation of CVE-2023-34362, a critical SQL injection vulnerability in Progress Software's MOVEit Transfer, by the Cl0p ransomware gang (aka Lace Tempest) to breach thousands of organizations. "Despite widespread knowledge and documentation of SQLi vulnerabilities over the past two decades, along with the availability of effective mitigations, software manufacturers continue to develop products with this defect, which puts many customers at risk," the agencies said. The Strategic Guide to Cloud Security Unlock practical steps to securing everything you build and run in the cloud. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. Take Action Fast with Censys Search for Security Teams Stay ahead of advanced threat actors with best-in-class Internet intelligence from Censys Search.

Daily Brief Summary

CYBERCRIME // CISA Issues Alert on Exploits in Popular Security Products

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three vulnerabilities to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.

Flaws in Fortinet, Ivanti, and Nice products are flagged as serious enough that federal agencies are mandated to patch them by April 15, 2024.

Fortinet's FortiClient EMS vulnerability allows unauthenticated attackers to execute unauthorized code via crafted requests, with confirmed in-the-wild exploitation.

Ivanti Endpoint Manager Cloud Service Appliance has a code injection vulnerability, which may stem from an intentional backdoor in a discontinued open-source project.

Nice Linear eMerge E3-Series access controllers have been vulnerable since at least May 2019, with a remote code execution exploit observed as of February 2020.

CISA and the FBI are also warning software manufacturers about the persistent threat from SQL injection vulnerabilities, highlighted by a recent exploitation by the Cl0p ransomware gang.

The alerts demonstrate the agencies' commitment to urging organizations to improve cybersecurity by addressing known vulnerabilities promptly.