• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

CISA Updates KEV Catalog with 4 Actively Exploited Software program Vulnerabilities

Admin by Admin
January 23, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Ravie LakshmananJan 23, 2026Vulnerability / Software program Safety

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Thursday added 4 safety flaws to its Identified Exploited Vulnerabilities (KEV) catalog, citing proof of lively exploitation within the wild.

The listing of vulnerabilities is as follows –

  • CVE-2025-68645 (CVSS rating: 8.8) – A PHP distant file inclusion vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that would permit a distant attacker to craft requests to the “/h/relaxation” endpoint and permit inclusion of arbitrary information from the WebRoot listing with none authentication (Mounted in November 2025 with model 10.1.13)
  • CVE-2025-34026 (CVSS rating: 9.2) – An authentication bypass within the Versa Concerto SD-WAN orchestration platform that would permit an attacker to entry administrative endpoints (Mounted in April 2025 with model 12.2.1 GA)
  • CVE-2025-31125 (CVSS rating: 5.3) – An improper entry management vulnerability in Vite Vitejs that would permit contents of arbitrary information to be returned to the browser utilizing ?inline&import or ?uncooked?import (Mounted in March 2025 with variations 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11)
  • CVE-2025-54313 (CVSS rating: 7.5) – An embedded malicious code vulnerability in eslint-config-prettier that would permit for execution of a malicious DLL dubbed Scavenger Loader that is designed to ship an info stealer
Cybersecurity

It is price noting that CVE-2025-54313 refers to a provide chain assault concentrating on eslint-config-prettier and 6 different npm packages, eslint-plugin-prettier, synckit, @pkgr/core, napi-postinstall, got-fetch, and is, that got here to mild in July 2025.

The phishing marketing campaign focused the bundle maintainers with bogus hyperlinks that harvested their credentials below the pretext of verifying their electronic mail handle as a part of common account upkeep, permitting the menace actors to publish trojanized variations.

In accordance with CrowdSec, exploitation efforts concentrating on CVE-2025-68645 have been ongoing since January 14, 2026. There are at present no particulars on how the opposite vulnerabilities are being exploited within the wild.

Pursuant to Binding Operational Directive (BOD) 22-01, Federal Civilian Govt Department (FCEB) businesses are required to use the required fixes by February 12, 2026, to safe their networks towards lively threats.

Tags: ActivelyCatalogCISAExploitedKEVSoftwareUpdatesVulnerabilities
Admin

Admin

Next Post
An in-depth take a look at the rise of relationships between people and AI companion chatbots on apps like Nomi, coinciding with a loneliness epidemic within the US (Salvador Rodriguez/CNBC)

Greenoaks, one in all Brex's prime buyers, will return twice its funding after Capital One's Brex acquisition for $5.15B in a half-cash, half-stock deal (The Info)

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

The way to create an XML sitemap?

How can content material advertising and marketing enhance my model visibility?

October 13, 2025
Introducing Inner Assault Floor Administration (IASM) for Sophos Managed Threat – Sophos Information

Introducing Inner Assault Floor Administration (IASM) for Sophos Managed Threat – Sophos Information

July 8, 2025

Trending.

10 tricks to begin getting ready! • Yoast

10 tricks to begin getting ready! • Yoast

July 21, 2025
AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

February 23, 2026
Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

September 8, 2025
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
Alibaba Workforce Open-Sources CoPaw: A Excessive-Efficiency Private Agent Workstation for Builders to Scale Multi-Channel AI Workflows and Reminiscence

Alibaba Workforce Open-Sources CoPaw: A Excessive-Efficiency Private Agent Workstation for Builders to Scale Multi-Channel AI Workflows and Reminiscence

March 1, 2026

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

What It Is and The right way to Use It in Your website positioning Technique

What It Is and The right way to Use It in Your website positioning Technique

March 14, 2026
What to Do in Vegas If You’re Right here for Enterprise (2026)

What to Do in Vegas If You’re Right here for Enterprise (2026)

March 14, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved