<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CISA &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/cisa/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Tue, 14 Apr 2026 10:51:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>CISA &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CISA Alerts on Active Fortinet SQL Injection Exploit</title>
		<link>https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/</link>
					<comments>https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 05:41:17 +0000</pubDate>
				<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CISA]]></category>
		<category><![CDATA[#CVE202621643]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EMS]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#Fortinet]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#KEV]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#RiskManagement]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#SQLInjection]]></category>
		<category><![CDATA[#ThreatAlert]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11588</guid>

					<description><![CDATA[<p>The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority warning that demands immediate attention from security</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/">CISA Alerts on Active Fortinet SQL Injection Exploit</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority warning that demands immediate attention from security teams across industries. A critical vulnerability affecting Fortinet products is now being actively exploited in the wild, significantly increasing the risk to exposed enterprise environments.</p>



<p>On April 13, 2026, the vulnerability identified as CVE-2026-21643 was officially added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. This inclusion is not routine—it signals confirmed attacker activity and indicates that exploitation is no longer theoretical. Threat actors are already leveraging this weakness to target organizations, making immediate remediation critical.</p>



<h2 class="wp-block-heading"><strong>Understanding the Vulnerability</strong></h2>



<p>The flaw exists in FortiClient Enterprise Management Server (EMS), a centralized platform used by organizations to manage endpoint security, enforce policies, and monitor device compliance. Because EMS sits at the core of endpoint control, any compromise can have far-reaching consequences across the entire network.</p>



<p>Technically, this issue is classified as a SQL injection vulnerability (CWE-89). It arises when user-supplied input is not properly validated before being processed by the backend database. Attackers can exploit this weakness by sending specially crafted HTTP requests that manipulate database queries and execute unintended commands.</p>



<p>What elevates the severity of this vulnerability is its unauthenticated nature. An attacker does not need valid credentials or prior access to the environment. If the EMS instance is exposed to the internet, it becomes a direct target. By simply interacting with the vulnerable interface, an attacker can execute arbitrary commands on the system.</p>



<h2 class="wp-block-heading"><strong>Real-World Risk and Exploitation Impact</strong></h2>



<p>The ability to execute code remotely without authentication places this vulnerability in the highest risk category. Once exploited, attackers can gain control over the EMS server, which often acts as a central authority for endpoint devices within an organization.</p>



<p>This level of access can enable attackers to move laterally across the network, deploy malicious payloads, manipulate endpoint configurations, or establish persistent backdoors. In many environments, EMS servers are trusted systems, which makes them an ideal pivot point for deeper compromise.</p>



<p>Although there is no confirmed evidence yet linking this vulnerability to ransomware campaigns, the attack pattern aligns closely with how ransomware operators typically gain initial access. Vulnerabilities that allow remote execution without authentication are frequently weaponized early in attack chains.</p>



<h2 class="wp-block-heading"><strong>Why Immediate Action Is Critical</strong></h2>



<p>CISA’s KEV listing is a clear indicator that organizations cannot afford delays. The window between public disclosure and widespread exploitation is often extremely short, and in this case, that window has already closed.</p>



<p>Organizations should treat this as an active incident risk rather than a routine patching task. Security teams are strongly advised to prioritize this vulnerability above regular update cycles and respond with urgency.</p>



<ul class="wp-block-list">
<li>Apply the latest Fortinet security patches immediately</li>



<li>Review system and application logs for unusual or malformed HTTP requests</li>



<li>Monitor for signs of unauthorized access or unexpected command execution</li>



<li>Follow all mitigation guidance provided by Fortinet</li>



<li>Disable or isolate affected systems if patching cannot be completed right away</li>
</ul>



<p>Under Binding Operational Directive 22-01, U.S. federal agencies are required to remediate this vulnerability by April 16, 2026. This aggressive timeline reflects the severity of the threat and should serve as a benchmark for private organizations as well.</p>



<h2 class="wp-block-heading"><strong>Final Thoughts</strong></h2>



<p>This vulnerability highlights a recurring issue in modern enterprise security—critical systems exposed to the internet without sufficient protection layers. When combined with an unauthenticated exploit, even a single overlooked patch can lead to full-scale compromise.</p>



<p>Organizations that rely on Fortinet EMS must act immediately, not only to patch the vulnerability but also to validate that their systems have not already been targeted. Proactive monitoring, rapid patching, and strict access controls remain essential in defending against threats of this nature.</p>



<p>In the current threat landscape, speed is not just an advantage—it is a necessity.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/">CISA Alerts on Active Fortinet SQL Injection Exploit</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</title>
		<link>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/</link>
					<comments>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 07:07:44 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#APM]]></category>
		<category><![CDATA[#CISA]]></category>
		<category><![CDATA[#CVE202553521]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EdgeSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#F5BIGIP]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfrastructureSecurity]]></category>
		<category><![CDATA[#KEV]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#RCE]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityUpdates]]></category>
		<category><![CDATA[#ThreatActors]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11526</guid>

					<description><![CDATA[<p>A newly identified vulnerability in F5 BIG-IP systems is now under active exploitation, prompting urgent warnings from the</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/">Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly identified vulnerability in F5 BIG-IP systems is now under active exploitation, prompting urgent warnings from the Cybersecurity and Infrastructure Security Agency. The flaw, tracked as CVE-2025-53521, has been added to the Known Exploited Vulnerabilities catalog, highlighting its real-world impact and immediate risk to organizations.</p>



<p>Tracked as <strong>CVE-2025-53521</strong>, the flaw impacts the Access Policy Manager (APM) component and could allow remote code execution. While detailed technical information has not yet been fully disclosed, the nature of the vulnerability makes it particularly dangerous. BIG-IP devices often sit at the edge of networks, handling authentication, traffic management, and secure application delivery — making them a prime target for attackers seeking initial access.</p>



<p>CISA’s decision to add this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog is a clear indicator that organizations cannot afford to delay response. This is not a theoretical risk — threat actors are already leveraging it. Historically, similar vulnerabilities in BIG-IP systems have been quickly adopted by both financially motivated attackers and advanced threat groups because compromising these devices can provide deep visibility and control over network traffic.</p>



<h3 class="wp-block-heading">Why This Vulnerability Matters</h3>



<p>What makes this issue more concerning is the potential ease of exploitation. Even without full public disclosure, vulnerabilities that enable remote code execution are often rapidly weaponized. Once exploited, attackers can move laterally across the network, escalate privileges, and potentially access sensitive data.</p>



<p>Edge infrastructure like BIG-IP plays a critical role in enterprise environments. When such systems are compromised, they can act as a gateway for broader attacks. This aligns with a growing trend where attackers focus on perimeter devices rather than traditional endpoints, as these systems offer higher impact with less resistance.</p>



<h3 class="wp-block-heading">Immediate Actions for Security Teams</h3>



<p>Organizations using F5 BIG-IP products should treat this vulnerability as a high-priority security event and respond without delay.</p>



<p>• Apply vendor-provided patches or mitigation steps immediately<br>• If fixes are unavailable, restrict or temporarily disable affected services<br>• Continuously monitor logs for unusual administrative actions or configuration changes<br>• Enforce strict access controls and reduce unnecessary exposure<br>• Implement network segmentation to limit potential spread after compromise</p>



<p>In addition to these steps, security teams should remain vigilant for evolving attack techniques, as exploitation methods may become more sophisticated over time.</p>



<h3 class="wp-block-heading">Final Thoughts</h3>



<p>The rapid inclusion of CVE-2025-53521 in the KEV catalog highlights an ongoing shift in attacker strategy — targeting critical infrastructure components that sit at the heart of enterprise networks. Organizations must move beyond reactive security and adopt a proactive approach that prioritizes visibility, rapid patching, and strong access controls.</p>



<p>Delaying action in cases like this significantly increases the risk of widespread compromise. For organizations relying on BIG-IP systems, the message is clear: act fast, monitor closely, and assume attackers are already attempting to exploit this weakness.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/">Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DarkSword iOS Chain: CISA Warns of Exploited Apple Vulnerabilities</title>
		<link>https://firsthackersnews.com/darksword-ios-chain-apple-vulnerabilities/</link>
					<comments>https://firsthackersnews.com/darksword-ios-chain-apple-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 06:25:50 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#AppleSecurity]]></category>
		<category><![CDATA[#AppleVulnerabilities]]></category>
		<category><![CDATA[#CISA]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DarkSwordiOSChain]]></category>
		<category><![CDATA[#ExploitChain]]></category>
		<category><![CDATA[#iOSSecurity]]></category>
		<category><![CDATA[#KEVCatalog]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11482</guid>

					<description><![CDATA[<p>CISA has issued a serious warning about three Apple vulnerabilities that are now being actively exploited as part</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/darksword-ios-chain-apple-vulnerabilities/">DarkSword iOS Chain: CISA Warns of Exploited Apple Vulnerabilities</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>CISA has issued a serious warning about three Apple vulnerabilities that are now being actively exploited as part of the DarkSword iOS chain. The flaws were added to the Known Exploited Vulnerabilities catalog on March 20, 2026, highlighting the urgency of the threat and the growing concern around real-world attacks targeting Apple devices.</p>



<h2 class="wp-block-heading"><strong>DarkSword iOS chain exposes serious Apple security risk</strong></h2>



<p>What makes this campaign especially dangerous is the way the vulnerabilities can be chained together to move from initial access to deep system control. Instead of relying on a typical malware download, the attack can begin when a victim simply opens malicious web content through Safari or an in-app browser. That first stage gives attackers a foothold, which can then be expanded through additional flaws that target kernel memory and shared system processes.</p>



<p>This multi-step technique is what gives the DarkSword iOS chain its strength. One flaw is used to trigger memory corruption through crafted web content, another allows direct interaction with kernel memory, and a third helps attackers manipulate memory shared between active processes. When combined, these weaknesses can give threat actors a powerful path to compromise the device at a much deeper level than a standard application-level attack.</p>



<p>The vulnerabilities linked to this activity include:</p>



<ul class="wp-block-list">
<li><strong>CVE-2025-31277</strong> — a memory corruption vulnerability triggered through malicious web content</li>



<li><strong>CVE-2025-43520</strong> — a classic buffer overflow flaw that may allow writes to kernel memory</li>



<li><strong>CVE-2025-43510</strong> — an improper locking issue that can affect shared memory between processes</li>
</ul>



<p>The reach of this threat is broad because it affects multiple Apple platforms, including iPhone, iPad, Mac, Apple Watch, Apple TV, and Vision Pro devices. That wide impact makes the issue important not only for individual users but also for enterprises managing mixed Apple environments. A single unpatched device could become an entry point for a more serious compromise, especially in organizations that depend heavily on mobile access and Apple endpoints.</p>



<p>Another reason this warning stands out is the stealth of the attack path. Since the initial trigger can come from normal-looking web content, users may not realize anything suspicious has happened. There may be no obvious file download, no fake installer, and no immediate sign that the device has been targeted. That lowers the barrier for exploitation and increases the importance of rapid patching.</p>



<p>At this stage, there is no public confirmation that the DarkSword chain is being used in ransomware attacks. Still, the level of access these flaws can provide makes them highly attractive for advanced threat actors seeking persistence, surveillance, credential access, or follow-on compromise. In practical terms, this is the kind of exploit chain that can support much more than a one-off intrusion.</p>



<p>CISA has set an April 3, 2026 remediation deadline for federal agencies under Binding Operational Directive 22-01. While that formal requirement applies to government networks, the broader message is clear: organizations and individual users should not delay updates. Security teams should make sure Apple devices are running the latest available software, verify patch coverage across managed assets, and remove or isolate systems that cannot be updated quickly.</p>



<p>For defenders, the bigger lesson is that exploit chains like DarkSword show how modern attacks are no longer built around a single bug. They are built around combinations of weaknesses that, together, can bypass normal security assumptions. That is exactly why timely patching, asset visibility, and strong device management remain essential.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/darksword-ios-chain-apple-vulnerabilities/">DarkSword iOS Chain: CISA Warns of Exploited Apple Vulnerabilities</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/darksword-ios-chain-apple-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISA Alerts Active Exploitation of Wing FTP Vulnerability</title>
		<link>https://firsthackersnews.com/wing-ftp-vulnerability-cisa-alert/</link>
					<comments>https://firsthackersnews.com/wing-ftp-vulnerability-cisa-alert/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 17 Mar 2026 18:40:59 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CISAAlert]]></category>
		<category><![CDATA[#CVE202547813]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#FileTransferSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[#WingFTP]]></category>
		<category><![CDATA[#WingFTPVulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11479</guid>

					<description><![CDATA[<p>CISA has issued an urgent warning about a critical vulnerability in Wing FTP Server that is now being</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wing-ftp-vulnerability-cisa-alert/">CISA Alerts Active Exploitation of Wing FTP Vulnerability</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>CISA has issued an urgent warning about a critical vulnerability in Wing FTP Server that is now being actively exploited. The flaw has been added to the Known Exploited Vulnerabilities (KEV) catalog, confirming that attackers are already using it in real-world scenarios.</p>



<p>This is a strong signal for organizations to act immediately. Systems exposed to the internet, especially file transfer servers, are high-value targets because they often handle sensitive business data and provide a direct entry point into internal networks.</p>



<h2 class="wp-block-heading"><strong>Technical Details and Mitigation Steps</strong></h2>



<p>The vulnerability, tracked as CVE-2025-47813, is an information disclosure issue caused by improper handling of user-supplied input. Specifically, when an attacker sends an unusually large value in the UID cookie, the server fails to handle the request securely and returns detailed error messages.</p>



<p>These error responses can unintentionally reveal internal system details such as file paths, configurations, or backend logic. While this does not directly allow code execution, it significantly lowers the barrier for attackers by giving them insight into how the system works, which can be used to plan targeted attacks or bypass protections.</p>



<p>Because this vulnerability is now listed in the KEV catalog, it is confirmed to be under active exploitation, increasing the urgency for remediation.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>Organizations should take the following actions without delay:</p>



<ul class="wp-block-list">
<li>Apply the latest security patches or updates provided by the vendor</li>



<li>Review and follow infrastructure security guidance for exposed services</li>



<li>Avoid processing untrusted input without proper validation and error handling</li>



<li>Temporarily disable or restrict access to the server if patching is not possible</li>
</ul>



<p>Federal agencies are expected to address this issue within a strict timeline, and private organizations are strongly advised to follow the same urgency.</p>



<p>Overall, even though this is categorized as an information disclosure flaw, its real risk lies in enabling deeper, more targeted attacks. Immediate patching, proper input handling, and limiting exposure are essential to reducing the attack surface.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wing-ftp-vulnerability-cisa-alert/">CISA Alerts Active Exploitation of Wing FTP Vulnerability</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/wing-ftp-vulnerability-cisa-alert/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISA Alerts Organizations to Oracle Identity Manager RCE Attack</title>
		<link>https://firsthackersnews.com/known-exploited-vulnerabilities/</link>
					<comments>https://firsthackersnews.com/known-exploited-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 23 Nov 2025 02:51:41 +0000</pubDate>
				<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[Identity and Access Management]]></category>
		<category><![CDATA[Known Exploited Vulnerabilities]]></category>
		<category><![CDATA[Oracle Fusion Middleware]]></category>
		<category><![CDATA[Oracle Identity Manager]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10674</guid>

					<description><![CDATA[<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a newly identified Oracle vulnerability to its Known</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/known-exploited-vulnerabilities/">CISA Alerts Organizations to Oracle Identity Manager RCE Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a newly identified Oracle vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.</p>



<p>The flaw, tracked as CVE-2025-61757, affects Oracle Identity Manager, a core component of Oracle Fusion Middleware. CISA has classified it as a “missing authentication for critical function” issue, which enables remote, unauthenticated attackers to access privileged functionality. Successful exploitation can lead to remote code execution (RCE) and full compromise of the identity platform.</p>



<h2 class="wp-block-heading"><strong>Vulnerability Summary -CVE-2025-61757</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th><strong>Field</strong></th><th><strong>Value</strong></th></tr></thead><tbody><tr><td><strong>CVE ID</strong></td><td>CVE-2025-61757</td></tr><tr><td><strong>Vulnerability Type</strong></td><td>Missing Authentication for Critical Function</td></tr><tr><td><strong>Affected Product</strong></td><td>Oracle Fusion Middleware / Oracle Identity Manager</td></tr><tr><td><strong>Affected Versions</strong></td><td>12c 12.2.1.4.0 (and potentially additional versions)</td></tr></tbody></table></figure>



<h2 class="wp-block-heading">I<strong>mpact on Identity and Access Management Environments</strong></h2>



<p>Oracle Identity Manager—also known as Oracle Identity Governance—is widely deployed across enterprise and government environments to manage user accounts, credentials, and access rights.<br>Because identity platforms sit at the center of authentication workflows, a compromise can quickly escalate to domain-wide or cloud-wide access.</p>



<p>Security researchers from Searchlight Cyber’s Assetnote team discovered that several REST API endpoints in Oracle Identity Manager failed to enforce proper authentication. </p>



<p>By manipulating how the product handles URL patterns and filters, attackers can cause the system to treat protected endpoints as publicly accessible.</p>



<p>Once beyond the authentication boundary, attackers can reach functionality responsible for processing Groovy scripts. Although intended only for syntax validation, this feature can be abused to execute arbitrary code during compilation—effectively turning a logic flaw into a powerful <strong>pre-authentication RCE</strong> pathway.</p>



<p>This discovery follows an earlier major breach of Oracle Cloud’s login service in January, where attackers reportedly exploited a separate Oracle Access Manager vulnerability (CVE-2021-35587) to gain RCE and exfiltrate millions of records.</p>



<p>CVE-2025-61757 affects related identity components and, if unpatched, could have enabled similar exploitation against Oracle’s own infrastructure.</p>



<p>CISA warns that the vulnerability is particularly concerning due to its remote, unauthenticated attack vector. With many Oracle Identity Manager instances accessible over the internet, the exposure is significant.</p>



<p>The vulnerability was added to the KEV catalog on <strong>November 21, 2025</strong>.<br>Federal civilian agencies are required to apply Oracle’s patches, adhere to Binding Operational Directive BOD 22-01 for cloud services, or discontinue use of the affected product by December 12, 2025.</p>



<h2 class="wp-block-heading"><strong>Recommended Actions for Organizations</strong></h2>



<ul class="wp-block-list">
<li>Apply the latest Oracle Critical Patch Update without delay</li>



<li>Limit external exposure of identity and administrative services</li>



<li>Review identity and access management configurations</li>



<li>Monitor for suspicious access to REST APIs and script-processing features</li>



<li>Strengthen logging and detection around identity infrastructure</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/known-exploited-vulnerabilities/">CISA Alerts Organizations to Oracle Identity Manager RCE Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/known-exploited-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISA Adds Gladinet and Control Web Panel Flaws to Known Exploited Vulnerabilities List</title>
		<link>https://firsthackersnews.com/cisa-adds-gladinet-control-web-panel-vulnerabilities-2025/</link>
					<comments>https://firsthackersnews.com/cisa-adds-gladinet-control-web-panel-vulnerabilities-2025/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 05 Nov 2025 07:13:50 +0000</pubDate>
				<category><![CDATA[CISA]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[ControlWebPanel]]></category>
		<category><![CDATA[CVE202511371]]></category>
		<category><![CDATA[CVE202548703]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Gladinet]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[KEV]]></category>
		<category><![CDATA[PatchNow]]></category>
		<category><![CDATA[VulnerabilityAlert]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10588</guid>

					<description><![CDATA[<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two new security flaws affecting Gladinet and Control</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisa-adds-gladinet-control-web-panel-vulnerabilities-2025/">CISA Adds Gladinet and Control Web Panel Flaws to Known Exploited Vulnerabilities List</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The <strong>U.S. Cybersecurity and Infrastructure Security Agency (CISA)</strong> has added two new security flaws affecting Gladinet and Control Web Panel (CWP) to its Known Exploited Vulnerabilities (KEV) catalog. The agency warned that attackers are actively exploiting these vulnerabilities in real-world attacks.</p>



<h2 class="wp-block-heading"><strong>Details of the Vulnerabilities</strong></h2>



<p><strong>CVE-2025-11371 (CVSS 7.5):</strong><br>A flaw in <strong>Gladinet CentreStack</strong> and <strong>Triofox</strong> allows outside users to access files or folders that should be private. This can lead to the <strong>unintended leak of system files</strong> and sensitive data.</p>



<p><strong>CVE-2025-48703 (CVSS 9.0):</strong><br>A command injection vulnerability in Control Web Panel (formerly CentOS Web Panel) lets attackers run commands remotely without logging in. The flaw is found in the <em>t_total</em> parameter of the file manager’s <em>changePerm</em> request and can result in full remote code execution.</p>



<h3 class="wp-block-heading"><strong>Evidence of Active Exploitation</strong></h3>



<p>Cybersecurity firm Huntress recently observed attack attempts that target CVE-2025-11371. Attackers used Base64-encoded payloads to send system commands like <code>ipconfig /all</code> to gather information from compromised systems.</p>



<p>Meanwhile, there are no confirmed public reports of active attacks using CVE-2025-48703. However, the flaw was disclosed responsibly by researcher Maxime Rinaudo in May 2025 and patched a month later in version 0.9.8.1205.</p>



<p>According to Rinaudo, “It allows a remote attacker who knows a valid username on a CWP instance to run commands on the server without authentication.”</p>



<h2 class="wp-block-heading"><strong>CISA’s Warning and Deadline</strong></h2>



<p>Due to the confirmed exploitation, <strong>CISA</strong> has directed <strong>Federal Civilian Executive Branch (FCEB)</strong> agencies to apply the required patches no later than November 25, 2025.<br>Organizations using Gladinet CentreStack, Triofox, or Control Web Panel should update immediately, review their systems for suspicious activity, and monitor logs for signs of intrusion.</p>



<h2 class="wp-block-heading"><strong>Other Exploited WordPress Vulnerabilities</strong></h2>



<p>In related news, Wordfence recently warned of critical vulnerabilities being exploited in several WordPress plugins and themes.</p>



<ul class="wp-block-list">
<li><strong>CVE-2025-11533 (CVSS 9.8)</strong> – A privilege escalation flaw in WP Freeio lets attackers gain admin rights during registration.</li>



<li><strong>CVE-2025-5397 (CVSS 9.8)</strong> – An authentication bypass in Noo JobMonster allows unauthenticated access to admin accounts when social login is enabled.</li>



<li><strong>CVE-2025-11833 (CVSS 9.8)</strong> – A flaw in Post SMTP lets attackers view email logs and reset admin passwords, potentially leading to full site takeover.</li>
</ul>



<p>Website owners should update these plugins immediately, use strong passwords, and check their sites for unauthorized users or malware.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisa-adds-gladinet-control-web-panel-vulnerabilities-2025/">CISA Adds Gladinet and Control Web Panel Flaws to Known Exploited Vulnerabilities List</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cisa-adds-gladinet-control-web-panel-vulnerabilities-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISA Issues Three ICS Advisories Addressing Vulnerabilities and Exploitation Risks</title>
		<link>https://firsthackersnews.com/cisa-ics-vulnerability-advisories-july-2025/</link>
					<comments>https://firsthackersnews.com/cisa-ics-vulnerability-advisories-july-2025/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 11:04:02 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[#AccessControl]]></category>
		<category><![CDATA[#CISA]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DLLHijacking]]></category>
		<category><![CDATA[#VulnerabilityAlert]]></category>
		<category><![CDATA[#XSS]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10397</guid>

					<description><![CDATA[<p>On July 17, 2025, CISA released three important advisories concerning Industrial Control Systems (ICS), targeting critical vulnerabilities in</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisa-ics-vulnerability-advisories-july-2025/">CISA Issues Three ICS Advisories Addressing Vulnerabilities and Exploitation Risks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>On July 17, 2025, CISA released three important advisories concerning Industrial Control Systems (ICS), targeting critical vulnerabilities in energy monitoring, healthcare imaging, and access control technologies.</p>



<p>The advisories warn of high-severity flaws, each with CVSS v4 scores between 8.5 and 8.7, posing serious risks of cyberattacks and unauthorized access to vital infrastructure across various sectors.</p>



<p><strong>Key Takeaways</strong></p>



<ol class="wp-block-list">
<li><strong>Leviton’s AcquiSuite and Energy Monitoring Hub</strong> are impacted by a high-severity cross-site scripting (XSS) vulnerability.</li>



<li><strong>Panoramic Corporation’s Digital Imaging Software</strong> is susceptible to <strong>DLL hijacking</strong>, which could allow malicious code execution.</li>



<li><strong>Johnson Controls’ C•CURE 9000 Site Server</strong> contains misconfigured default permissions, exposing executable directories to potential abuse.</li>
</ol>



<h2 class="wp-block-heading"><strong>Leviton XSS Vulnerability Detailed in CISA Advisory ICSA-25-198-01</strong></h2>



<p>CISA’s advisory <strong>ICSA-25-198-01</strong> discloses a critical <strong>cross-site scripting (XSS) vulnerability</strong> in Leviton AcquiSuite Version A8810 and Energy Monitoring Hub Version A8812.</p>



<ul class="wp-block-list">
<li>Tracked as CVE-2025-6185, the flaw has a CVSS v4 score of 8.7, indicating high severity.</li>



<li>The vulnerability, classified under CWE-79, allows attackers to embed malicious scripts into URL parameters, which execute in users’ browsers.</li>



<li>Exploitation could result in theft of session tokens and remote control of services, despite requiring low attack complexity.</li>



<li>The affected products are part of global communications infrastructure, increasing the potential impact.</li>



<li>The issue was responsibly reported by security researcher notnotnotveg.</li>
</ul>



<p><strong>Crucially</strong>, Leviton has not engaged with CISA regarding mitigation efforts. As a result, affected users are advised to contact Leviton customer support directly for updates and potential patch information.</p>



<h2 class="wp-block-heading"><strong>DLL Hijacking Vulnerability Threatens Healthcare Imaging Systems</strong></h2>



<p>CISA advisory ICSMA-25-198-01 warns of a critical CWE-427 uncontrolled search path element vulnerability in Panoramic Corporation’s Digital Imaging Software Version 9.1.2.7600.</p>



<ul class="wp-block-list">
<li>Tracked as CVE-2024-22774, the flaw holds a CVSS v4 score of 8.5 and allows DLL hijacking, enabling privilege escalation from a standard user to NT AUTHORITY\SYSTEM.</li>



<li>Though <strong>l</strong>ocal access is required, successful exploitation can result in full system compromise.</li>



<li>This vulnerability poses a serious risk to healthcare and public health infrastructure, especially across North America.</li>



<li>The underlying issue stems from an unsupported SDK component developed by Oy Ajat Ltd, which complicates patching and mitigation efforts.</li>



<li>The flaw was responsibly disclosed by Damian Semon Jr. of Blue Team Alpha LLC.</li>
</ul>



<p>Healthcare providers using this software should assess exposure and explore containment measures immediately due to the potential for widespread disruption.</p>



<h2 class="wp-block-heading"><strong>Johnson Controls Access Control Flaw Impacts Multiple Critical Sectors</strong></h2>



<p>CISA’s advisory ICSA-24-191-05 Update B highlights a serious default permission misconfiguration in Johnson Controls’ Software House C•CURE 9000 Site Server Version 2.80 and earlier.</p>



<ul class="wp-block-list">
<li>Identified as CVE-2024-32861, the vulnerability holds a CVSS v4 score of 8.5 and affects systems running the optional C•CURE IQ Web and/or C•CURE Portal components.</li>



<li>Categorized under CWE-276, the flaw arises from insufficient protection on executable directories, particularly affecting the <code>C:\CouchDB\bin</code> path.</li>



<li>Under certain conditions, non-administrator users may have Full control or Write access, creating opportunities for privilege escalation or execution of malicious code.</li>



<li>The issue affects a broad range of sectors globally, including critical manufacturing, commercial and government facilities, transportation, and energy systems.</li>
</ul>



<p>Johnson Controls has issued mitigation guidance via a Product Security Advisory, urging administrators to remove Full control and Write permissions for non-admin users on affected directories to reduce the risk of exploitation.</p>



<h2 class="wp-block-heading"><strong>Security Recommendations from CISA</strong></h2>



<p>CISA urges all organizations to adopt <strong>defense-in-depth strategies</strong> and <strong>network segmentation</strong> to reduce the risk of exploitation associated with these ICS vulnerabilities.</p>



<h2 class="wp-block-heading"><strong>Key Mitigation Measures:</strong></h2>



<ul class="wp-block-list">
<li><strong>Isolate control systems</strong> from direct internet access.</li>



<li><strong>Implement firewalls</strong> to separate business networks from control networks.</li>



<li><strong>Use secure VPNs</strong> for any necessary remote access.</li>



<li>Conduct <strong>impact analysis and risk assessments</strong> before applying changes to ensure operational stability.</li>



<li>Follow <strong>established incident response protocols</strong> and promptly <strong>report any suspicious activity</strong>.</li>
</ul>



<p>Although no known public exploitation has been observed to date, the high CVSS scores and broad deployment of the affected products across critical infrastructure sectors demand immediate evaluation and remediation.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisa-ics-vulnerability-advisories-july-2025/">CISA Issues Three ICS Advisories Addressing Vulnerabilities and Exploitation Risks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cisa-ics-vulnerability-advisories-july-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
