/
/
Weekly Threat & Vulnerabilities Report

Weekly Threat & Vulnerabilities Report

Report
July 19, 2024
CVE-2024-36401
arrow pointing top right
Remote code execution
CISA-KEV
OSS
Zero Day
Critical
Affected Product
GeoServer
CVSS Score
9.8
EPSS Score
0.94638
CVE-2024-28995
arrow pointing top right
Path Traversal
CISA-KEV
OSS
Zero Day
High
Affected Product
SolarWinds Serv-U
Exploited-in-Wild
CVSS Score
8.6
EPSS Score
0.96002
CVE-2024-34102
arrow pointing top right
Improper Restriction of XML External Entity
CISA-KEV
OSS
Zero Day
Critical
Affected Product
Adobe Commerce
Exploited-in-Wild
CVSS Score
9.8
EPSS Score
0.9708
CVE-2022-22948
arrow pointing top right
Information disclosure
CISA-KEV
OSS
Zero Day
Medium
Affected Product
vCenter Server
CVSS Score
6.5
EPSS Score
0.00777
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned.  As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.
CVE-2024-4577
arrow pointing top right
CISA-KEV
Critical

Critical argument injection vulnerability in PHP on Windows servers

Affected Products
PHP-CGI on Windows
Exploited-in-Wild
CVE-2024-3273
arrow pointing top right
CISA-KEV
Critical

Command Injection Vulnerability in D-Link NASdevices

Affected Products
D-Link NAS devices
Exploited-in-Wild
CVE-2023-38646
arrow pointing top right
CISA-KEV
Critical

Remote code execution vulnerability in Metabaseopen source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1.

Affected Products
Metabase open source/Enterprise
CVE-2023-33010
arrow pointing top right
CISA-KEV
Critical

Buffer overflow vulnerability in the ID processingfunction in Zyxel ATP series firmware versions leads to denial of service orremote code execution on affected device

Affected Products
Zyxel ATP series firmware
Exploited-in-Wild
CVE-2023-26801
arrow pointing top right
CISA-KEV
Critical

Command injection vulnerability in LB-LINK devices.

Affected Products
LB-LINK
Exploited-in-Wild
CVE-2023-1389
arrow pointing top right
CISA-KEV
High

Command Injection Vulnerability in TP-Link ArcherAX-21.

Affected Products
TP-Link Archer AX-21
Exploited-in-Wild
CVE-2022-41040
arrow pointing top right
CISA-KEV
High

Server-Side Request Forgery Vulnerability inMicrosoft Exchange Server

Affected Products
Microsoft Exchange Server
Exploited-in-Wild
CVE-2022-34045
arrow pointing top right
CISA-KEV
Critical

Hardcoded encryption/decryption key vulnerability in Wavlink

Affected Products
Wavlink Devices
Exploited-in-Wild

False

CVE-2022-30489
arrow pointing top right
CISA-KEV
Medium

cross-site scripting vulnerability in Wavlink Devices

Affected Products
Wavlink Devices
Exploited-in-Wild

False

CVE-2022-30023
arrow pointing top right
CISA-KEV
High

Command injection vulnerability via the Ping function in Tenda Products

Affected Products
Tenda Devices
Exploited-in-Wild

False

Vulnerabilities abused by Botnet
Identified vulnerabilities exploited by Botnets, including recent CVEs logged in Malware Information Sharing Platform (MISP). Presenting the top 5 CVEs with payloads suggestive of Botnet activities, like utilizing wget with IP addresses.

An unauthenticated command injection vulnerabilityfound in the TP-Link Archer AX21 WiFi router.

Affected Product
TP-Link Archer AX21

Command injection vulnerability in LB-LINK BL-AC1900_2.0 1.0.1, BL-WR9000 2.4.9, BL-X26 1.2.5 and BL-LTE300 1.0.8

Affected Product
LB-LINK BL Devices
Abused by Botnet

Path traversal vulnerability in Apache HTTP Server

Affected Product
Apache HTTP Server
Abused by Botnet

Remote code execution vulnerability in Huawei HG532 router

Affected Product
Huawei HG532
Abused by Botnet

Improper protocol access control vulnerability in Eir D1000 modem.

Affected Product
Eir D1000 modem
Abused by Botnet

Remote code execution vulnerability in MVPower CCTVDVR models

Affected Product
MVPower CCTV DVR models
Abused by Botnet
Vulnerabilities Abused by Malware
We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak sites and more.

Spoofing vulnerability in Microsoft Windows MSHTML Platform

PRE-NVD observed for this week
It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.
CVE-2024-24737
arrow pointing top right
Denial-of-Service
Affected Product
Silicon Labs Gecko OS
CVE-2024-24731
arrow pointing top right
Stack-based Buffer Overflow
Affected Product
Silicon Labs Gecko OS
CVE-2024-23938
arrow pointing top right
Stack-based Buffer Overflow
Affected Product
Silicon Labs Gecko OS
CVE-2024-37372
arrow pointing top right
Improper Handling of Values
Affected Product
node package
Reference
CVE-2024-31143
arrow pointing top right
Denial of Service
Affected Product
xen package
Reference
CVE-2024-5762
arrow pointing top right
Remote Code Execution
Affected Product
Zen Cart
Reference

Subscribe to our Reports

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.