9.3 C
New York
Saturday, March 22, 2025

CISA Provides NAKIVO Vulnerability to KEV Catalog Amid Energetic Exploitation


Mar 20, 2025Ravie LakshmananCybersecurity / Vulnerability

CISA Provides NAKIVO Vulnerability to KEV Catalog Amid Energetic Exploitation

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has added a high-severity safety flaw impacting NAKIVO Backup & Replication software program to its Recognized Exploited Vulnerabilities (KEV) catalog, citing proof of lively exploitation.

The vulnerability in query is CVE-2024-48248 (CVSS rating: 8.6), an absolute path traversal bug that would permit an unauthenticated attacker to learn information on the goal host, together with delicate ones similar to “/and many others/shadow” through the endpoint “/c/router.” It impacts all variations of the software program previous to model 10.11.3.86570.

“NAKIVO Backup and Replication comprises an absolute path traversal vulnerability that permits an attacker to learn arbitrary information,” CISA stated in an advisory.

Cybersecurity

Profitable exploitation of the shortcoming may permit an adversary to learn delicate knowledge, together with configuration information, backups, and credentials, which may then act as a stepping stone for additional compromises.

There are presently no particulars on how the vulnerability is being exploited within the wild, however the growth comes after watchTowr Labs revealed a proof-of-concept (PoC) exploit in direction of the top of final month. The problem has been addressed as of November 2024 with model v11.0.0.88174.

The cybersecurity agency additional famous that the unauthenticated arbitrary file learn vulnerability may very well be weaponized to acquire all saved credentials utilized by the goal NAKIVO answer and hosted on the database “product01.h2.db.”

Additionally added to the KEV catalog are two different flaws –

  • CVE-2025-1316 (CVSS rating: 9.3) – Edimax IC-7100 IP digital camera comprises an OS command injection vulnerability as a consequence of improper enter sanitization that enables an attacker to attain distant code execution through specifically crafted requests (Unpatched because of the machine reaching end-of-life)
  • CVE-2017-12637 (CVSS rating: 7.5) – SAP NetWeaver Software Server (AS) Java comprises a listing traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS that enables a distant attacker to learn arbitrary information through a .. (dot dot) within the question string
Cybersecurity

Final week, Akamai revealed that CVE-2025-1316 is being weaponized by dangerous actors to focus on cameras with default credentials so as to deploy not less than two totally different Mirai botnet variants since Might 2024.

In mild of lively exploitation, Federal Civilian Govt Department (FCEB) businesses are required to use the required mitigations by April 9, 2025, to safe their networks.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles