Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025

The new FileFix method is a threat

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » CISA adds 3 flaws to KEV directory, affecting AMI Megarac, D-Link, Fortinet
Global Security

CISA adds 3 flaws to KEV directory, affecting AMI Megarac, D-Link, Fortinet

AdminBy AdminJune 26, 2025No Comments2 Mins Read
CISA Adds 3 Flaws to KEV Catalog
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 26, 2025Red LakshmananVulnerability / firmware safety

Cisa adds 3 flaws to KEV directory

US Cybersecurity Agency and US Infrastructure (CISA) added Three disadvantages of security, each affecting AMI Megarac, D-Link Dir-859 router and Fortinet Fortos, to known exploited vulnerabilities (Ship) A catalog based on evidence of active operation.

The list of vulnerabilities is the following –

  • Cve-2024-54085 (CVSS Assessment: 10.0) – Auctivated by False vulnerability in host Redfish AMI Megarac SPX, which can allow a remote attacker to take control
  • Cve-2024-0769 (CVSS Assessment: 5.3) -Touity of the D-Link Dir-859 router, which allows you to privilege escalation and unauthorized control (invalid)
  • Cve-2019-6693 (CVSS assessment: 4.2) – vulnerability of cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic cryptographic crypto crypto crypto crypto crypto crypto crypto crypto crypto crypto crypt

ECLIPSIUM Software Safety Company disclosed The CVE-2024-54085 said earlier this year that the deficiency could be used to carry out a wide range of malware, including the deployment of malware and firmware firmware.

Cybersecurity

Currently, there are no details about how the deficit is armed in the wild that can use it and the scale of the attacks. The Hacker News addressed Eclypsium for comments and we will update the story when we get the answer.

Operation Cve-2024-0769 was disclosed A Greynoise Representative Intelligence Firm Around a year ago as part of a company designed to reset accounts, passwords, groups and descriptions for all the device users.

It is worth noting that D-Link Dir-859 routers reached the end of life (EOL) As of December 2020, that is, the vulnerability will remain unnamed on these devices. Users are advised to retire and replace the product.

With regard to Cve-2019-6693 abuse, multiple Security providers It is reported that the subjects of the threat associated with the AKIRA Ransomware Ransomware Ransomware Coarding have used vulnerabilities to get initial access to target networks.

In the light of the active exploitation of these deficiencies of the Federal Civil Executive Agency (FCEB), the necessary mitigations are required by July 16, 2025 to ensure their networks.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025

The new FileFix method is a threat

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025

Cyber-Cyber ​​Use open source tools to compromise financial institutions across Africa

June 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025

The new FileFix method is a threat

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025

Cyber-Cyber ​​Use open source tools to compromise financial institutions across Africa

June 26, 2025

CISA adds 3 flaws to KEV directory, affecting AMI Megarac, D-Link, Fortinet

June 26, 2025

WhatsApp adds resumes that run on AI, for faster preview chat

June 26, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025

The new FileFix method is a threat

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.