<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>vulnerability &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Thu, 14 May 2026 07:24:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>vulnerability &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>MongoDB Vulnerability Allows Arbitrary Code Execution</title>
		<link>https://firsthackersnews.com/mongodb-vulnerability-code-execution/</link>
					<comments>https://firsthackersnews.com/mongodb-vulnerability-code-execution/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 14 May 2026 07:24:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CodeExecution]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#databasesecurity]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#Hacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#mongodb]]></category>
		<category><![CDATA[#mongodbsecurity]]></category>
		<category><![CDATA[#mongodbvulnerability]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#ThreatHunting]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#ZeroTrust]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11702</guid>

					<description><![CDATA[<p>A critical vulnerability in MongoDB, tracked as CVE-2026-8053, could allow attackers to execute arbitrary code on affected database</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mongodb-vulnerability-code-execution/">MongoDB Vulnerability Allows Arbitrary Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical vulnerability in MongoDB, tracked as CVE-2026-8053, could allow attackers to execute arbitrary code on affected database servers. This issue poses a serious risk to organizations relying on MongoDB for handling sensitive data and backend operations.</p>



<p>The flaw was identified during internal security testing by <strong>MongoDB</strong> and primarily impacts core MongoDB Server deployments, particularly in self-managed environments.</p>



<h2 class="wp-block-heading"><strong>Technical Overview of the Vulnerability</strong></h2>



<p>The vulnerability enables arbitrary code execution, a class of flaws that allows threat actors to run malicious instructions directly on the host system. This effectively bypasses standard security boundaries and can grant attackers control over the database server.</p>



<p>Given that MongoDB often stores centralized and high-value data, exploitation of this flaw could lead to unauthorized data access, credential exposure, and system-level compromise. Attackers may also leverage the compromised host to establish persistence or pivot laterally within the network.</p>



<p>The issue affects MongoDB versions 5.0 and later in self-hosted deployments, where patch management depends entirely on the organization’s update practices.</p>



<h2 class="wp-block-heading"><strong>Impact and Mitigation</strong></h2>



<p>Managed cloud users of <strong>MongoDB Atlas</strong> are not impacted, as the vulnerability has already been addressed across the platform through centralized patch deployment.</p>



<p>However, self-hosted environments remain exposed until updates are applied. MongoDB has released patched versions, including updates in recent release cycles such as 7.0.31, 8.0.20, and 8.2.7, to mitigate this risk.</p>



<p>Although there is currently no evidence of active exploitation, the nature of arbitrary code execution vulnerabilities makes them highly attractive to attackers. Systems that remain unpatched could be quickly targeted once exploit techniques become publicly available.</p>



<p>Organizations should ensure their MongoDB deployments are updated to the latest secure versions and aligned with current security baselines. Maintaining timely patching and monitoring practices is essential to reduce the risk of compromise.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mongodb-vulnerability-code-execution/">MongoDB Vulnerability Allows Arbitrary Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/mongodb-vulnerability-code-execution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zoom Vulnerability Allows Privilege Escalation Attacks</title>
		<link>https://firsthackersnews.com/zoom-vulnerability-privilege-escalation/</link>
					<comments>https://firsthackersnews.com/zoom-vulnerability-privilege-escalation/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 13 May 2026 04:33:29 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#Hacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#PrivilegeEscalation]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#ThreatHunting]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#ZeroTrust]]></category>
		<category><![CDATA[#zoom]]></category>
		<category><![CDATA[#zoomflaw]]></category>
		<category><![CDATA[#zoomsecurity]]></category>
		<category><![CDATA[#zoomvulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11698</guid>

					<description><![CDATA[<p>Zoom has addressed a set of newly discovered vulnerabilities in its software that could be exploited to gain</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zoom-vulnerability-privilege-escalation/">Zoom Vulnerability Allows Privilege Escalation Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Zoom has addressed a set of newly discovered vulnerabilities in its software that could be exploited to gain elevated access or expose sensitive information. These flaws affect Zoom applications on Windows and iOS, with the most critical risks centered around privilege escalation in enterprise environments.</p>



<p>The vulnerabilities allow attackers with basic local access to increase their privileges and operate with administrative-level control. In real-world scenarios, this type of access is often used as a stepping stone for larger attacks, including lateral movement and data exfiltration.</p>



<h2 class="wp-block-heading"><strong>Privilege Escalation Risks in Windows Environments</strong></h2>



<p>Two high-severity vulnerabilities, each rated with a CVSS score of 7.8, impact Zoom’s Windows-based components.</p>



<p>The first issue affects Zoom Rooms for Windows and is caused by an untrusted search path vulnerability within the installer. This means the application may load files from unintended locations, allowing attackers to inject malicious code during execution.</p>



<p>The second flaw targets the Zoom Workplace VDI Plugin. It stems from improper control over file names and paths in the installation process. By manipulating these paths, an attacker can execute arbitrary code and escalate privileges.</p>



<p>These vulnerabilities are particularly dangerous because they require minimal effort to exploit once initial access is obtained. Attackers can leverage them to:</p>



<ul class="wp-block-list">
<li>Disable or bypass endpoint security controls</li>



<li>Access and extract sensitive enterprise data</li>



<li>Maintain persistence within the environment</li>



<li>Move laterally across systems inside the network</li>



<li>Deploy additional payloads such as ransomware</li>
</ul>



<p>Such privilege escalation flaws are highly valuable in targeted attacks, especially in corporate environments where Zoom is widely used.</p>



<h2 class="wp-block-heading"><strong>iOS Vulnerability and Overall Impact</strong></h2>



<p>A separate vulnerability affects Zoom Workplace on iOS devices, though its severity is significantly lower. This issue involves a failure in a protection mechanism that could allow limited data exposure.</p>



<p>However, exploitation requires physical access to the device, which reduces the likelihood of large-scale attacks. Still, it highlights the importance of securing mobile endpoints alongside desktop systems.</p>



<p>The key concern across all these vulnerabilities is the potential for unauthorized access to sensitive data and system resources, particularly in organizations that rely heavily on collaboration tools.</p>



<p>To address these risks, <strong>Zoom Video Communications</strong> has released security patches for all affected components. Because these flaws are now publicly disclosed, unpatched systems may become targets for active exploitation.</p>



<p>Users and organizations should immediately update:</p>



<ul class="wp-block-list">
<li>Zoom Rooms for Windows to version 7.0.0 or later</li>



<li>Zoom Workplace VDI Plugin to version 6.6.11 or newer</li>



<li>Zoom Workplace for iOS to version 7.0.0 or above</li>
</ul>



<p>Timely patching, combined with proper access controls and endpoint monitoring, is essential to prevent these vulnerabilities from being exploited in real-world attacks.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zoom-vulnerability-privilege-escalation/">Zoom Vulnerability Allows Privilege Escalation Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zoom-vulnerability-privilege-escalation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SonicWall Flaw Allows Access Bypass and Firewall Crash</title>
		<link>https://firsthackersnews.com/sonicwall-security-flaw/</link>
					<comments>https://firsthackersnews.com/sonicwall-security-flaw/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 07:01:08 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#FirewallSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityRisk]]></category>
		<category><![CDATA[#SonicOS]]></category>
		<category><![CDATA[#SonicWall]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[sonicwall]]></category>
		<category><![CDATA[SonicWall Firewall]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11663</guid>

					<description><![CDATA[<p>SonicWall has disclosed multiple security issues in its SonicOS software that could impact firewall security and availability. These</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sonicwall-security-flaw/">SonicWall Flaw Allows Access Bypass and Firewall Crash</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>SonicWall has disclosed multiple security issues in its SonicOS software that could impact firewall security and availability. These vulnerabilities, revealed in a recent advisory, could allow attackers to bypass access controls, access restricted areas, and even crash firewall systems.</p>



<p>While some of these issues require prior access or valid credentials, the overall risk remains significant—especially for organizations relying heavily on SonicWall firewalls to protect their networks. Immediate attention and updates are strongly recommended.</p>



<h2 class="wp-block-heading"><strong>Major Security Risks Identified</strong></h2>



<p>The most serious issue involves a flaw in how access controls are handled. Under certain conditions, an attacker on a nearby network could bypass normal authentication checks and gain access to sensitive management functions.</p>



<p>This type of access can be highly dangerous. If exploited, attackers may be able to:</p>



<ul class="wp-block-list">
<li>Change firewall rules</li>



<li>Disable security protections</li>



<li>Modify system configurations</li>
</ul>



<p>In addition to this, two other vulnerabilities affect users who already have access to the system. One allows attackers to move outside restricted directories and interact with protected services, while another can overload the system and force the firewall to crash.</p>



<h2 class="wp-block-heading"><strong>Breakdown of the Vulnerabilities</strong></h2>



<p>The advisory highlights three key issues that administrators should be aware of:</p>



<ul class="wp-block-list">
<li><strong>Access control bypass flaw</strong> – Allows unauthorized access to management functions from adjacent networks</li>



<li><strong>Path traversal issue</strong> – Lets authenticated users reach restricted system areas</li>



<li><strong>Buffer overflow vulnerability</strong> – Can be used to crash the firewall and disrupt operations</li>
</ul>



<p>Each of these issues presents a different level of risk, but together they create a serious security concern for affected systems.</p>



<h2 class="wp-block-heading"><strong>What Organizations Should Do</strong></h2>



<p>SonicWall has provided fixes and recommended actions to reduce the risk. Organizations using SonicOS should review the advisory and apply updates as soon as possible.</p>



<p>Delaying patches could leave systems exposed to attacks that impact both security and uptime. Ensuring that firewall software is up to date is critical to maintaining a strong defense.</p>



<p>These vulnerabilities highlight how even core security systems like firewalls can become targets. A single flaw can lead to access bypass or service disruption, affecting the entire network.</p>



<p>Staying updated, applying patches quickly, and monitoring systems closely remain essential steps in preventing such risks.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sonicwall-security-flaw/">SonicWall Flaw Allows Access Bypass and Firewall Crash</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/sonicwall-security-flaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apple Notification Privacy Flaw Fixed in iOS Update</title>
		<link>https://firsthackersnews.com/apple-notification-privacy-flaw/</link>
					<comments>https://firsthackersnews.com/apple-notification-privacy-flaw/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 06:23:04 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#ApplePrivacy]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataPrivacy]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#iOSUpdate]]></category>
		<category><![CDATA[#iPhoneSecurity]]></category>
		<category><![CDATA[#NotificationBug]]></category>
		<category><![CDATA[#PrivacyProtection]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11626</guid>

					<description><![CDATA[<p>Apple has released iOS 26.4.2 and iPadOS 26.4.2 to fix a serious privacy issue related to notifications. This</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apple-notification-privacy-flaw/">Apple Notification Privacy Flaw Fixed in iOS Update</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Apple has released iOS 26.4.2 and iPadOS 26.4.2 to fix a serious privacy issue related to notifications. This issue affected how message previews were stored on devices and could expose sensitive information even after apps were removed.</p>



<p>The flaw impacted apps like Signal, where message previews could remain on the device even after the app was deleted. This created a privacy risk, as users would assume their data was completely removed.</p>



<h2 class="wp-block-heading">Apple Notification Privacy Flaw Explained</h2>



<p>The vulnerability, tracked as CVE-2026-28950, was caused by a problem in Apple’s notification logging system. Instead of fully deleting notifications, some data was still being stored in system logs.</p>



<p>This meant that message previews, including private conversations, could still exist on the device. Reports showed that investigators were able to recover this data, even after the app had been uninstalled.</p>



<h2 class="wp-block-heading">Why This Matters</h2>



<p>This issue is important because it shows that even secure apps can be affected by system-level behavior. While Signal uses strong encryption, the operating system storing notification previews created an unexpected privacy gap.</p>



<p>Key concerns included:</p>



<ul class="wp-block-list">
<li>Notifications not being fully deleted</li>



<li>Sensitive message previews remaining accessible</li>



<li>Data exposure happening outside the app itself</li>
</ul>



<h2 class="wp-block-heading">Apple’s Fix and Improvements</h2>



<p>Apple resolved the issue by improving how notification data is handled and cleared from the system.</p>



<p>With the update:</p>



<ul class="wp-block-list">
<li>Notification data is properly removed</li>



<li>Previously stored data is cleared automatically</li>



<li>Future notifications are no longer retained after deletion</li>
</ul>



<p>Signal also acknowledged the fix and supported the update, highlighting its importance for user privacy.</p>



<h2 class="wp-block-heading">Devices That Receive the Update</h2>



<p>The update is available for multiple Apple devices, including:</p>



<ul class="wp-block-list">
<li>iPhone 11 and newer</li>



<li>iPad Pro (recent models)</li>



<li>iPad Air (3rd generation and later)</li>



<li>iPad (8th generation and later)</li>



<li>iPad mini (5th generation and later)</li>
</ul>



<p>Older supported devices can receive similar security fixes through updated versions.</p>



<h2 class="wp-block-heading">What Users Should Do</h2>



<p>Users should update their devices as soon as possible to stay protected. Keeping your system updated helps prevent privacy risks and ensures your data is secure.</p>



<p>To install the update, go to Settings, tap General, and select Software Update.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apple-notification-privacy-flaw/">Apple Notification Privacy Flaw Fixed in iOS Update</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/apple-notification-privacy-flaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISA Alerts on Active Fortinet SQL Injection Exploit</title>
		<link>https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/</link>
					<comments>https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 05:41:17 +0000</pubDate>
				<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CISA]]></category>
		<category><![CDATA[#CVE202621643]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EMS]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#Fortinet]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#KEV]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#RiskManagement]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#SQLInjection]]></category>
		<category><![CDATA[#ThreatAlert]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11588</guid>

					<description><![CDATA[<p>The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority warning that demands immediate attention from security</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/">CISA Alerts on Active Fortinet SQL Injection Exploit</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority warning that demands immediate attention from security teams across industries. A critical vulnerability affecting Fortinet products is now being actively exploited in the wild, significantly increasing the risk to exposed enterprise environments.</p>



<p>On April 13, 2026, the vulnerability identified as CVE-2026-21643 was officially added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. This inclusion is not routine—it signals confirmed attacker activity and indicates that exploitation is no longer theoretical. Threat actors are already leveraging this weakness to target organizations, making immediate remediation critical.</p>



<h2 class="wp-block-heading"><strong>Understanding the Vulnerability</strong></h2>



<p>The flaw exists in FortiClient Enterprise Management Server (EMS), a centralized platform used by organizations to manage endpoint security, enforce policies, and monitor device compliance. Because EMS sits at the core of endpoint control, any compromise can have far-reaching consequences across the entire network.</p>



<p>Technically, this issue is classified as a SQL injection vulnerability (CWE-89). It arises when user-supplied input is not properly validated before being processed by the backend database. Attackers can exploit this weakness by sending specially crafted HTTP requests that manipulate database queries and execute unintended commands.</p>



<p>What elevates the severity of this vulnerability is its unauthenticated nature. An attacker does not need valid credentials or prior access to the environment. If the EMS instance is exposed to the internet, it becomes a direct target. By simply interacting with the vulnerable interface, an attacker can execute arbitrary commands on the system.</p>



<h2 class="wp-block-heading"><strong>Real-World Risk and Exploitation Impact</strong></h2>



<p>The ability to execute code remotely without authentication places this vulnerability in the highest risk category. Once exploited, attackers can gain control over the EMS server, which often acts as a central authority for endpoint devices within an organization.</p>



<p>This level of access can enable attackers to move laterally across the network, deploy malicious payloads, manipulate endpoint configurations, or establish persistent backdoors. In many environments, EMS servers are trusted systems, which makes them an ideal pivot point for deeper compromise.</p>



<p>Although there is no confirmed evidence yet linking this vulnerability to ransomware campaigns, the attack pattern aligns closely with how ransomware operators typically gain initial access. Vulnerabilities that allow remote execution without authentication are frequently weaponized early in attack chains.</p>



<h2 class="wp-block-heading"><strong>Why Immediate Action Is Critical</strong></h2>



<p>CISA’s KEV listing is a clear indicator that organizations cannot afford delays. The window between public disclosure and widespread exploitation is often extremely short, and in this case, that window has already closed.</p>



<p>Organizations should treat this as an active incident risk rather than a routine patching task. Security teams are strongly advised to prioritize this vulnerability above regular update cycles and respond with urgency.</p>



<ul class="wp-block-list">
<li>Apply the latest Fortinet security patches immediately</li>



<li>Review system and application logs for unusual or malformed HTTP requests</li>



<li>Monitor for signs of unauthorized access or unexpected command execution</li>



<li>Follow all mitigation guidance provided by Fortinet</li>



<li>Disable or isolate affected systems if patching cannot be completed right away</li>
</ul>



<p>Under Binding Operational Directive 22-01, U.S. federal agencies are required to remediate this vulnerability by April 16, 2026. This aggressive timeline reflects the severity of the threat and should serve as a benchmark for private organizations as well.</p>



<h2 class="wp-block-heading"><strong>Final Thoughts</strong></h2>



<p>This vulnerability highlights a recurring issue in modern enterprise security—critical systems exposed to the internet without sufficient protection layers. When combined with an unauthenticated exploit, even a single overlooked patch can lead to full-scale compromise.</p>



<p>Organizations that rely on Fortinet EMS must act immediately, not only to patch the vulnerability but also to validate that their systems have not already been targeted. Proactive monitoring, rapid patching, and strict access controls remain essential in defending against threats of this nature.</p>



<p>In the current threat landscape, speed is not just an advantage—it is a necessity.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/">CISA Alerts on Active Fortinet SQL Injection Exploit</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Adobe Reader Zero-Day Targets Users</title>
		<link>https://firsthackersnews.com/adobe-reader-zero-day/</link>
					<comments>https://firsthackersnews.com/adobe-reader-zero-day/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 03:24:25 +0000</pubDate>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[#AdobeReader]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#PDFSecurity]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[#ZeroDayExploit]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11578</guid>

					<description><![CDATA[<p>Security researchers from EXPMON have uncovered a critical zero-day vulnerability in Adobe Reader that is actively being exploited</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/adobe-reader-zero-day/">Adobe Reader Zero-Day Targets Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers from EXPMON have uncovered a critical zero-day vulnerability in Adobe Reader that is actively being exploited in targeted attacks. The flaw enables attackers to steal sensitive data and potentially execute malicious code, all triggered when a victim simply opens a crafted PDF file.</p>



<h3 class="wp-block-heading">Attack Execution and Evasion Techniques</h3>



<p>The malicious PDF is designed to evade traditional detection mechanisms. Initial samples showed extremely low detection rates, indicating that the payload is carefully crafted to bypass antivirus engines.</p>



<p>Once opened, the document executes obfuscated JavaScript hidden within its structure. This script leverages legitimate application functions to interact with the system and external servers, making the activity appear less suspicious.</p>



<p>Key attack characteristics:</p>



<ul class="wp-block-list">
<li>Uses heavily obfuscated JavaScript to avoid detection</li>



<li>Leverages trusted application APIs for malicious actions</li>



<li>Collects system-level data to profile the victim environment</li>



<li>Communicates with external infrastructure to exfiltrate data</li>



<li>Maintains in-memory execution to reduce forensic traces</li>
</ul>



<p>The attack chain is adaptive. Based on the victim’s system profile, the attacker may choose to deliver additional payloads, increasing the likelihood of a successful compromise.</p>



<h3 class="wp-block-heading">Impact and Exploitation Capabilities</h3>



<p>This vulnerability presents a high-risk scenario due to its stealth and ease of exploitation. No advanced interaction is required, making it highly effective in phishing campaigns or targeted attacks.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>Potential impact includes:</p>



<ul class="wp-block-list">
<li>Unauthorized access to sensitive local files</li>



<li>Exposure of system and environment information</li>



<li>Remote code execution leading to full system compromise</li>



<li>Possible sandbox escape, bypassing built-in protections</li>
</ul>



<p>In controlled testing, researchers confirmed that the communication channel used by the malware can support delivery of further payloads, enabling deeper system control.</p>



<h3 class="wp-block-heading">Defensive Measures and Monitoring</h3>



<p>With no official patch currently available, proactive defense becomes critical. Organizations must rely on layered security controls and behavioral monitoring to detect and mitigate threats.</p>



<p>Recommended defensive strategies:</p>



<ul class="wp-block-list">
<li>Block known malicious endpoints and monitor for new suspicious connections</li>



<li>Inspect outbound traffic for unusual patterns linked to PDF processes</li>



<li>Detect anomalies in application behavior, especially unexpected file access</li>



<li>Monitor for suspicious User-Agent strings such as “Adobe Synchronizer”</li>



<li>Restrict execution of active content within PDF files where possible</li>
</ul>



<h3 class="wp-block-heading">Operational Security Considerations</h3>



<p>This incident highlights a broader trend of attackers weaponizing trusted file formats like PDFs to deliver advanced exploits. Since these files are widely used in business environments, they present an effective entry point.</p>



<p>Security teams should strengthen awareness around file-based threats and ensure that users are trained to handle unsolicited documents with caution. Developers and defenders alike must also stay updated with threat intelligence to quickly adapt to evolving attack techniques.</p>



<p>Until an official patch is released, maintaining strict control over document handling and network activity is essential to minimizing risk.<audio autoplay=""></audio></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/adobe-reader-zero-day/">Adobe Reader Zero-Day Targets Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/adobe-reader-zero-day/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>TP-Link Tapo Camera Vulnerabilities Put Devices at Risk</title>
		<link>https://firsthackersnews.com/tp-link-camera-vulnerability/</link>
					<comments>https://firsthackersnews.com/tp-link-camera-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 10:31:53 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CameraVulnerability]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#dosattack]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#IoTSecurity]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#TapoCamera]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<category><![CDATA[#TPLink]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11555</guid>

					<description><![CDATA[<p>TP-Link has fixed multiple serious security issues affecting the Tapo C520WS security camera. These devices are widely used</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/tp-link-camera-vulnerability/">TP-Link Tapo Camera Vulnerabilities Put Devices at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>TP-Link has fixed multiple serious security issues affecting the Tapo C520WS security camera. These devices are widely used for surveillance, so any weakness can directly impact both home and business security.</p>



<p>If attackers are able to crash the device or change its configuration, it can disrupt monitoring and create security gaps. This makes it important for users to install the latest firmware updates as soon as possible.</p>



<h2 class="wp-block-heading"><strong>Multiple Memory Handling Flaws</strong></h2>



<p>Several vulnerabilities were discovered in how the camera processes incoming data. These issues are mainly related to improper validation of HTTP requests and video stream inputs.</p>



<p>Because the system does not correctly check data size limits, an attacker on the same network can send specially crafted inputs that overflow memory and cause instability.</p>



<p>The identified issues include:</p>



<ul class="wp-block-list">
<li>CVE-2026-34118: Weak validation in HTTP POST request handling after memory allocation</li>



<li>CVE-2026-34119: Improper handling of segmented HTTP request data without boundary checks</li>



<li>CVE-2026-34120: Insecure processing of video stream inputs leading to overflow</li>



<li>CVE-2026-34122: Stack-based overflow caused by oversized configuration values</li>



<li>CVE-2026-34124: Path expansion issue where processed request paths exceed memory limits</li>
</ul>



<p>These vulnerabilities can lead to memory corruption, causing the device to freeze, crash, or reboot, resulting in denial-of-service conditions.</p>



<h2 class="wp-block-heading"><strong>Authentication Bypass – Critical Risk</strong></h2>



<p>The most severe issue in this set is an authentication bypass vulnerability.</p>



<ul class="wp-block-list">
<li>CVE-2026-34121: Allows attackers to bypass login checks</li>
</ul>



<p>This flaw exists due to inconsistent validation during request processing. An attacker can craft a request that combines permitted and restricted actions, tricking the system into skipping authentication.</p>



<p>As a result, unauthorized users can execute restricted commands and modify device settings without logging in.</p>



<h3 class="wp-block-heading"><strong>Impact and Risk</strong></h3>



<p>All these vulnerabilities carry high severity scores, with most rated around 7.1 and the authentication bypass reaching a higher critical score.</p>



<p>These issues are especially dangerous because they can be exploited by attackers on the same network, making local access a key risk factor.</p>



<p>Older or unpatched devices are more vulnerable, particularly those running firmware versions earlier than 1.2.4 Build 260326 Rel.24666n.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h3 class="wp-block-heading"><strong>What Users Should Do</strong></h3>



<ul class="wp-block-list">
<li>Update the device firmware to the latest available version immediately</li>



<li>Use the Tapo app or device interface to check for updates</li>



<li>Avoid running outdated firmware on security devices</li>



<li>Regularly review and maintain IoT device security</li>
</ul>



<p>Applying updates ensures that these vulnerabilities are patched and reduces the risk of unauthorized access or service disruption.</p>



<h3 class="wp-block-heading"><strong>Final Thoughts</strong></h3>



<p>This case highlights an important reality: even security devices can become weak points if not properly maintained.</p>



<p>Keeping firmware up to date is one of the simplest and most effective ways to protect your network and ensure your surveillance systems remain reliable.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener">&nbsp;Instagram</a>,&nbsp;<a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong>&nbsp;to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/tp-link-camera-vulnerability/">TP-Link Tapo Camera Vulnerabilities Put Devices at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/tp-link-camera-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</title>
		<link>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/</link>
					<comments>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 07:07:44 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#APM]]></category>
		<category><![CDATA[#CISA]]></category>
		<category><![CDATA[#CVE202553521]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EdgeSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#F5BIGIP]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfrastructureSecurity]]></category>
		<category><![CDATA[#KEV]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#RCE]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityUpdates]]></category>
		<category><![CDATA[#ThreatActors]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11526</guid>

					<description><![CDATA[<p>A newly identified vulnerability in F5 BIG-IP systems is now under active exploitation, prompting urgent warnings from the</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/">Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly identified vulnerability in F5 BIG-IP systems is now under active exploitation, prompting urgent warnings from the Cybersecurity and Infrastructure Security Agency. The flaw, tracked as CVE-2025-53521, has been added to the Known Exploited Vulnerabilities catalog, highlighting its real-world impact and immediate risk to organizations.</p>



<p>Tracked as <strong>CVE-2025-53521</strong>, the flaw impacts the Access Policy Manager (APM) component and could allow remote code execution. While detailed technical information has not yet been fully disclosed, the nature of the vulnerability makes it particularly dangerous. BIG-IP devices often sit at the edge of networks, handling authentication, traffic management, and secure application delivery — making them a prime target for attackers seeking initial access.</p>



<p>CISA’s decision to add this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog is a clear indicator that organizations cannot afford to delay response. This is not a theoretical risk — threat actors are already leveraging it. Historically, similar vulnerabilities in BIG-IP systems have been quickly adopted by both financially motivated attackers and advanced threat groups because compromising these devices can provide deep visibility and control over network traffic.</p>



<h3 class="wp-block-heading">Why This Vulnerability Matters</h3>



<p>What makes this issue more concerning is the potential ease of exploitation. Even without full public disclosure, vulnerabilities that enable remote code execution are often rapidly weaponized. Once exploited, attackers can move laterally across the network, escalate privileges, and potentially access sensitive data.</p>



<p>Edge infrastructure like BIG-IP plays a critical role in enterprise environments. When such systems are compromised, they can act as a gateway for broader attacks. This aligns with a growing trend where attackers focus on perimeter devices rather than traditional endpoints, as these systems offer higher impact with less resistance.</p>



<h3 class="wp-block-heading">Immediate Actions for Security Teams</h3>



<p>Organizations using F5 BIG-IP products should treat this vulnerability as a high-priority security event and respond without delay.</p>



<p>• Apply vendor-provided patches or mitigation steps immediately<br>• If fixes are unavailable, restrict or temporarily disable affected services<br>• Continuously monitor logs for unusual administrative actions or configuration changes<br>• Enforce strict access controls and reduce unnecessary exposure<br>• Implement network segmentation to limit potential spread after compromise</p>



<p>In addition to these steps, security teams should remain vigilant for evolving attack techniques, as exploitation methods may become more sophisticated over time.</p>



<h3 class="wp-block-heading">Final Thoughts</h3>



<p>The rapid inclusion of CVE-2025-53521 in the KEV catalog highlights an ongoing shift in attacker strategy — targeting critical infrastructure components that sit at the heart of enterprise networks. Organizations must move beyond reactive security and adopt a proactive approach that prioritizes visibility, rapid patching, and strong access controls.</p>



<p>Delaying action in cases like this significantly increases the risk of widespread compromise. For organizations relying on BIG-IP systems, the message is clear: act fast, monitor closely, and assume attackers are already attempting to exploit this weakness.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/">Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>xz Backdoor Vulnerability Exposes Linux Systems to Remote Access</title>
		<link>https://firsthackersnews.com/xz-backdoor-vulnerability-linux/</link>
					<comments>https://firsthackersnews.com/xz-backdoor-vulnerability-linux/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 19:14:56 +0000</pubDate>
				<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Linux Malware]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#Backdoor]]></category>
		<category><![CDATA[#CVE20243094]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#LinuxSecurity]]></category>
		<category><![CDATA[#LinuxVulnerability]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#OpenSourceSecurity]]></category>
		<category><![CDATA[#PatchNow]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#ssh]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#xz]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11512</guid>

					<description><![CDATA[<p>Red Hat has raised a critical alert after a supply chain attack was discovered in the widely used</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/xz-backdoor-vulnerability-linux/">xz Backdoor Vulnerability Exposes Linux Systems to Remote Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Red Hat has raised a critical alert after a supply chain attack was discovered in the widely used xz compression tool. Security researchers found that certain recent versions of the library were tampered with, introducing hidden malicious functionality.</p>



<p>This issue, identified as <strong>CVE-2024-3094</strong>, impacts versions 5.6.0 and 5.6.1. The injected code is designed to stay hidden during normal review processes and only becomes active during the software build stage. Once active, it can interfere with SSH authentication, potentially allowing attackers to gain unauthorized access to affected systems.</p>



<h2 class="wp-block-heading">Technical Impact and Mitigation</h2>



<p>The attack is highly sophisticated, as the malicious components are not fully visible in the main source code. Instead, they rely on additional build-time elements to assemble and execute the payload. This makes detection difficult using standard code inspection methods.</p>



<p>Once deployed, the compromised library can alter how SSH authentication behaves, creating an opportunity for attackers to bypass normal security checks and access systems remotely.</p>



<p>Key highlights:</p>



<ul class="wp-block-list">
<li>CVE-2024-3094 affects xz and xz-libs versions 5.6.0 and 5.6.1</li>



<li>Malicious code is triggered during the build process</li>



<li>Targets SSH authentication mechanisms</li>



<li>Impacts Fedora Rawhide, Fedora 40 Beta, Debian unstable, and openSUSE</li>



<li>Red Hat Enterprise Linux (RHEL) remains unaffected</li>
</ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h3 class="wp-block-heading">Immediate Actions</h3>



<ul class="wp-block-list">
<li>Downgrade to trusted xz version 5.4.x</li>



<li>Stop using Fedora Rawhide until systems are secured</li>



<li>Apply official patches and updates from Red Hat</li>



<li>Monitor systems for unusual SSH behavior</li>
</ul>



<p>Even though active exploitation has not been widely reported, the nature of this compromise makes it a high-risk issue. Prompt action is necessary to protect systems from potential unauthorized access.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/xz-backdoor-vulnerability-linux/">xz Backdoor Vulnerability Exposes Linux Systems to Remote Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/xz-backdoor-vulnerability-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical BIND 9 Vulnerabilities Require Immediate Attention</title>
		<link>https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/</link>
					<comments>https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 16:31:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#ACLBypass]]></category>
		<category><![CDATA[#BIND9]]></category>
		<category><![CDATA[#CVE]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DNS]]></category>
		<category><![CDATA[#DNSVulnerability]]></category>
		<category><![CDATA[#DoS]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchNow]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#ServerCrash]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11508</guid>

					<description><![CDATA[<p>The Internet Systems Consortium (ISC) has disclosed three new vulnerabilities in BIND 9, a widely used DNS software.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/">Critical BIND 9 Vulnerabilities Require Immediate Attention</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Internet Systems Consortium (ISC) has disclosed three new vulnerabilities in BIND 9, a widely used DNS software. These issues can allow attackers to bypass access controls, overload system resources, or even crash DNS servers if left unpatched.</p>



<p>Announced on March 25, 2026, the vulnerabilities impact both authoritative servers and DNS resolvers, making them a serious concern for organizations relying on BIND 9 for critical network operations. Administrators are strongly advised to apply patches immediately to avoid service disruption or unauthorized access.</p>



<h2 class="wp-block-heading"><strong>CVE Breakdown and Security Impact</strong></h2>



<p>The most severe issue, <strong>CVE-2026-1519 (CVSS 7.5 &#8211; High)</strong>, can lead to a Denial of Service. It is triggered when a resolver performs DNSSEC validation on a specially crafted zone, causing excessive NSEC3 processing. This results in high CPU usage and significantly reduces the server’s ability to handle queries. While disabling DNSSEC validation can reduce the impact, it is not recommended as it weakens security.</p>



<p>The second issue, <strong>CVE-2026-3119 (CVSS 6.5 &#8211; Medium)</strong>, can cause the BIND “named” process to crash. This happens when handling a valid query containing a TKEY record. However, exploitation requires access to a trusted TSIG key already configured on the server. As a temporary measure, administrators should review and remove any unnecessary or potentially compromised TSIG keys.</p>



<p>The third vulnerability, <strong>CVE-2026-3591 (CVSS 5.4 &#8211; Medium)</strong>, is related to improper memory handling in SIG(0) processing. A crafted DNS request can lead to incorrect ACL checks, potentially allowing unauthorized access in environments where permissive access rules are used. There are no effective workarounds for this issue, making patching essential.</p>



<h2 class="wp-block-heading"><strong>Affected Versions and Fixes</strong></h2>



<p>These vulnerabilities impact multiple BIND 9 versions, including:</p>



<ul class="wp-block-list">
<li>9.11.0 to 9.16.50</li>



<li>9.18.0 to 9.18.46</li>



<li>9.20.0 to 9.20.20</li>



<li>9.21.0 to 9.21.19</li>
</ul>



<p>To address these issues, ISC has released patched versions:</p>



<ul class="wp-block-list">
<li>9.18.47</li>



<li>9.20.21</li>



<li>9.21.20</li>
</ul>



<p>Users of the BIND Supported Preview Edition should also apply the relevant S1 patches immediately.</p>



<p>At the time of disclosure, there are no confirmed reports of active exploitation. However, due to the potential impact on DNS infrastructure, organizations should prioritize updates, verify their deployed versions, and ensure proper monitoring to reduce risk.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/">Critical BIND 9 Vulnerabilities Require Immediate Attention</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
