CISA fügt dem KEV-Katalog die Sicherheitslücke USAHERDS hinzu, die aktiv ausgenutzt wird

Teilen:

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a now-patched high-severity security flaw impacting Acclaim Systems USAHERDS to the Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild.

The vulnerability in question is CVE-2021-44207 (CVSS score: 8.1), a case of hard-coded, static credentials in Acclaim USAHERDS that could allow an attacker to ultimately execute arbitrary code on susceptible servers.

Specifically, it concerns the use of static ValidationKey and DecryptionKey values in version 7.4.0.1 and prior that could be weaponized to achieve remote code execution on the server that runs the application. That said, an attacker would have to leverage some other means to obtain the keys in the first place.

“These keys are used to provide security for the application ViewState,” Google-owned Mandiant said in advisory for the flaw back in December 2021. “A threat actor with knowledge of these keys can trick the application server into deserializing maliciously crafted ViewState data.”

“A threat actor with knowledge of the validationKey and decryptionKey for a web application can construct a malicious ViewState that passes the MAC check and will be deserialized by the server. This deserialization can result in the execution of code on the server.”

While there are no new reports of CVE-2021-44207 being weaponized in real-world attacks, the vulnerability was identified as being abused by the China-linked APT41 threat actor back in 2021 as a zero-day as part of attacks targeting six U.S. state government networks.

Federal Civilian Executive Branch (FCEB) agencies are recommended to apply vendor-provided mitigations by January 13, 2025, to safeguard their networks against active threats.

The development comes as Adobe warned of a critical security flaw in ColdFusion (CVE-2024-53961, CVSS score: 7.8), which it said already has a known proof-of-concept (PoC) exploit that could cause an arbitrary file system read.

The vulnerability has been addressed in ColdFusion 2021 Update 18 and ColdFusion 2023 Update 12. Users are advised to apply the patches as soon as possible to mitigate potential risks.

Quelle

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
9:57 am, Feb. 11, 2025
Wetter-Symbol 3°C
L: 3° | H: 4°
haze
Luftfeuchtigkeit: 92 %
Druck: 1018 mb
Wind: 6 mph WNW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 5 km
Sonnenaufgang: 7:21 am
Sonnenuntergang: 5:07 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
3° | 4°°C 0 mm 0% 4 mph 94 % 1018 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
2° | 7°°C 0 mm 0% 5 mph 96 % 1021 mb 0 mm/h
Do. Feb. 13 9:00 pm
Wetter-Symbol
3° | 7°°C 0 mm 0% 9 mph 77 % 1025 mb 0 mm/h
Fr. Feb. 14 9:00 pm
Wetter-Symbol
2° | 6°°C 0 mm 0% 8 mph 78 % 1026 mb 0 mm/h
Sa. Feb. 15 9:00 pm
Wetter-Symbol
1° | 5°°C 0 mm 0% 9 mph 75 % 1026 mb 0 mm/h
Today 12:00 pm
Wetter-Symbol
3° | 3°°C 0 mm 0% 4 mph 94 % 1018 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 4 mph 88 % 1017 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 3 mph 86 % 1018 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 3 mph 84 % 1018 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
4° | 4°°C 0 mm 0% 2 mph 88 % 1019 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 3 mph 92 % 1018 mb 0 mm/h
Tomorrow 6:00 am
Wetter-Symbol
2° | 2°°C 0 mm 0% 3 mph 96 % 1018 mb 0 mm/h
Tomorrow 9:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 3 mph 91 % 1019 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€95,144.51
0.57%
Ethereum(ETH)
€2,631.21
2.47%
XRP(XRP)
€2.42
2.71%
Fesseln(USDT)
€0.97
0.00%
Solana(SOL)
€197.31
-0.57%
USDC(USDC)
€0.97
0.01%
Dogecoin(DOGE)
€0.258128
5.94%
Shiba Inu(SHIB)
€0.000016
2.23%
Pepe(PEPE)
€0.000010
8.79%
Nach oben scrollen