Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Cisa adds Palo Alto Networks and Sonicwall deficiencies to use the vulnerable list
Global Security

Cisa adds Palo Alto Networks and Sonicwall deficiencies to use the vulnerable list

AdminBy AdminFebruary 19, 2025No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 19, 2025Red LakshmananIntelligence threats / vulnerability

Cybersecurity and US Infrastructure Agency (CISA) added Two disadvantages of security affectShip) A catalog based on evidence of active operation.

Disadvantages are below –

  • Cve-2025-0108 (CVSS Assessment: 7.8) -Vulnerability of Authentification Passage Palo Alto Web Interface Pan -OS, which allows unauthorized attackers with network access to the management interface to get around authentication, usually required and causes certain scenarios
  • Cve-2024-53704 (CVSS Assessment: 8.2) – Incorrect Authentication Vulnerability in SSLVPN authentication mechanism, which allows a remote attacker to bypass authentication
Cybersecurity

Palo Alto Networks has since confirmed Hacker News that she noticed active attempts to operate against CVE-2025-0108, and the company notes that it can be confined to other vulnerabilities such as CVE-20474 to allow unauthorized access to unauthorized access And a false firewall.

“Palo Alto Networks observed attempts to operate Cve-2025-0108 Cve-2024-9474 and Cve-2025-0111 On the unprotected and unsecured Internet management interfaces, “this – Note in updated consultation.

Threat of intelligence firm Greynoise – Note As many as 25 malicious IP addresses are actively exploited by the CVE-2025-0108, and the volume of the attacker’s activity increases 10 times as it was detected almost a week ago. The top three sources of the attack are the US, Germany and the Netherlands.

As for the CVE-2024-53704, the Cybersecurity Company of Arctic Wolf has shown that the threat subjects were armed shortcomings shortly after Bishop Fox was provided with evidence of the concept (POC).

In light of the active operation of the Federal Civil Executive Agency (FCEB), the revealed vulnerabilities by March 11, 2025, to ensure their networks.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.