Blogs - Security
CVE / NIST
CISA News
CISA Blog
Cybersecurity Advisories
ICS Advisories
ICS Medical Advisories
Packet Storm Security
The Hacker News
NIST News
- NIST Awards Up to $1.5 Million to Support Development of Regenerative Medicine Standards Curricula 2024-10-08The awardees will create training programs on the standards, protocols and measurements underpinning the field.Sarah Henderson
- Biden-Harris Administration to Invest up to $100 Million to Accelerate R&D and AI Technologies for Sustainable Semiconductor Materials 2024-10-02Today, the U.S. Department of Commerce issued a Notice of Intent (NOI) to announce an open competition demonstrating how AI can assist in developing new sustainable semiconductor materials and processes that meet industry needs and can be designedJoy Antwi
- U.S. National Science Foundation and Department of Commerce Announce a New $30M Funding Opportunity, Funded by the CHIPS & Science Act, to Prepare Talent for Semiconductor Jobs Nationwide 2024-09-27The Network Coordination Hub for the National Network for Microelectronics Education will establish and operate regional nodes to offer consistent, rigorous, engaging curricula, instructional materials, experiential opportunities, teacherJoy Antwi
- Biden-Harris Administration Launches NSTC Workforce Center of Excellence with Expected $250 Million Investment 2024-09-25Today, the Biden-Harris Administration announced the launch of the National Semiconductor Technology Center’s (NSTC) Workforce Center of Excellence (WCoE), making a decisive step toward solving one of the most pressing challenges facing the U.SJoy Antwi
- Biden-Harris Administration Announces First CHIPS Commercial Fabrication Facilities Award with Polar Semiconductor, Establishing Independent American Foundry 2024-09-24Today, as part of the Biden-Harris Administration’s Investing in America agenda, the U.S. Department of Commerce announced its first award under the CHIPS Incentives Program’s Funding Opportunity for Commercial Fabrication Facilities of up to $123Joy Antwi
- NIST Awards $6 Million to Carnegie Mellon University to Establish an AI Cooperative Research Center 2024-09-24The CMU/NIST AI Measurement Science & Engineering Cooperative Research Center will seek to advance AI risk management practices and evaluation approaches through stakeholder partnerships.Sarah Henderson
- NIST Awards $3 Million for Community-Based Cybersecurity Workforce Development 2024-09-23The grants of roughly $200,000 each will go to organizations that are working to address the nation’s shortage of skilled cybersecurity employees.Sarah Henderson
- NIST Funds Climate Measurements Center of Excellence at the University of Vermont 2024-09-20The agreement includes an award of $2.7 million appropriated by Congress for this purpose.Sarah Henderson
- New Smoke Alarms Are Better at Detecting Fires but Still Beep for Bacon 2024-09-18NIST research in a kitchen fire laboratory shows that updated smoke detectors still produce nuisance alarms during cooking.Sarah Henderson
- NIST Provides Update on Champlain Towers South Investigation 2024-09-12Work continues to determine cause of the 2021 tragedy and to develop science-based recommendations to improve building safety.Sarah Henderson
- NIST’s Long Phan and Marc Levitan Receive Service to America Medal 2024-09-10The award recognizes their efforts to develop standards and building codes to make structures resistant to tornadoes.Sarah Henderson
- Now Live: Living Cells Can Be Seen With Infrared Light 2024-09-09NIST researchers use new method to measure biomolecules in live cells.Sarah Henderson
- New Report Highlights Economic Value of Neutron Science to U.S. Industry 2024-09-05Research using neutron beams provides an economic return far larger than the cost of building and operating neutron facilities, according to an economic impact analysis.Sarah Henderson
- Major Leap for Nuclear Clock Paves Way for Ultraprecise Timekeeping 2024-09-04These clocks could lead to improved timekeeping and navigation, faster internet speeds, and advances in fundamental physics research.Sarah Henderson
- U.S. AI Safety Institute Signs Agreements Regarding AI Safety Research, Testing and Evaluation With Anthropic and OpenAI 2024-08-29GAITHERSBURG, Md. — Today, the U.S. Artificial Intelligence Safety Institute at the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) announced agreements that enable formal collaboration on AI safety researchRobin Materese
- Tiny New Lasers Fill a Long-Standing Gap in the Rainbow of Visible-Light Colors, Opening New Applications 2024-08-28Researchers have created orange, yellow and green lasers tiny enough to fit on a chip.Pamela L Corey
- NIST Releases Second Public Draft of Digital Identity Guidelines for Final Review 2024-08-21The guidance aims to ensure security, privacy and accessibility during the identity-proofing process for people accessing government services.Sarah Henderson
- NIST Researchers to Test New Approach for Detecting Cannabis in Breath 2024-08-15The new approach involves two breath tests separated by a specified time interval.Sarah Henderson
- NIST Releases First 3 Finalized Post-Quantum Encryption Standards 2024-08-13NIST is encouraging computer system administrators to begin transitioning to the new standards as soon as possible.Sarah Henderson
- What Time Is It on the Moon? 2024-08-12New lunar time proposal is a first step for Moon GPS.Sarah Henderson
NIST Events
- 19th Annual NICE Conference and Expo 2028-06-05The NICE Conference and Expo will take place June 5-7, 2028. Location to be announced. This event is supported by the National Initiative for Cybersecurity Education (NICE), a program of the National Institute of Standards and Technology in the U.SSusana Barraza
- 18th Annual NICE Conference and Expo 2027-06-07The NICE Conference and Expo will take place June 7-9, 2027. Location to be announced. This event is supported by the National Initiative for Cybersecurity Education (NICE), a program of the National Institute of Standards and Technology in the U.SSusana Barraza
- 17th Annual NICE Conference and Expo 2026-06-01The NICE Conference and Expo will take place June 1-3, 2026. Location to be announced. This event is supported by the National Initiative for Cybersecurity Education (NICE), a program of the National Institute of Standards and Technology in the U.SSusana Barraza
- 72 Volume Metrology Seminar 2025-09-22The 5-day OWM Volume Metrology Seminar is designed to enable metrologists to apply fundamental measurement concepts to volume calibrations. A large percentage of time is spent on hands-on measurements, applying procedures and equations discussed inYvonne A. Branden
- 73 Fundamentals of Metrology 2025-09-15Course Description The 5-day Fundamentals of Metrology seminar is an intensive course that introduces participants to the concepts of measurement systems, units, good laboratory practices, data integrity, measurement uncertainty, measurementYvonne A. Branden
- 75 Contract Review 2025-08-14This two-hour webinar will consider internal auditing techniques and best practices used by a metrology laboratory to comply with ISO/IEC 17025:2017 criteria. Learning Objectives At the end of this session, using your notes and ISO/IEC 17025:2017 orYvonne A. Branden
- 2053 Advanced Mass Seminar 2025-07-28The 9-day, hands-on Advanced Mass calibration seminar focuses on the comprehension and application of the advanced mass dissemination procedures, the equations, and associated calculations. It includes the operation of the laboratory equipmentYvonne A. Branden
- 76 State Laboratory Annual Submission Process 2025-07-10The State Laboratory Annual Submission Process webinar provides guidance on how to successfully submit all required materials to develop a complete and timely Recognition Application according to NIST Handbook (HB) 143, State Weights and MeasuresYvonne A. Branden
- 77 Software Verification and Validation Part I & II 2025-06-26Session I (June 26, 2025) and Session II (July 17, 2025) These two 2-hour sessions on Software Verification and Validation will focus on the use of Microsoft Excel in calibration laboratories and examine the ISO/IEC 17025:2017 requirements related toYvonne A. Branden
- 5x5: The Public Safety Innovation Summit 2025-06-03SAVE THE DATE 5x5 ― the confirmation of a strong and clear signal ― and the place to make your voice heard and drive public safety communications forward. In 2025, the FirstNet Authority and the National Institute of Standards and Technology’s PublicCrissy Robinson
- 16th Annual NICE Conference and Expo 2025-06-02The NICE Conference and Expo will take place June 2-4, 2025. Location to be announced. This event is supported by the National Initiative for Cybersecurity Education (NICE), a program of the National Institute of Standards and Technology in the U.SSusana Barraza
- 78 Combined Regional Measurement Assurance Program (C-RMAP) 2025-06-01NIST Handbook 143, Section 5.2, Table 2 notes that annual attendance at the RMAP training session is required for ongoing laboratory Recognition of State weights and measures metrology staff. Handbook 143, Program Handbook details the criteria usedYvonne A. Branden
- 79 Internal Auditing Best Practices 2025-05-15This 2-hour webinar will consider internal auditing techniques and best practices that are used by a metrology laboratory to comply with ISO/IEC 17025:2017 criteria. Learning Objectives During this webinar, using your notes and ISO/IEC 17025:2017 orYvonne A. Branden
- 80 Fundamentals of Metrology - SIM Participants Only 2025-04-14Course Description The 5-day Fundamentals of Metrology seminar is an intensive course that introduces participants to the concepts of measurement systems, units, good laboratory practices, data integrity, measurement uncertainty, measurementYvonne A. Branden
- 81 Fundamentals of Metrology 2025-04-07Course Description The 5-day Fundamentals of Metrology seminar is an intensive course that introduces participants to the concepts of measurement systems, units, good laboratory practices, data integrity, measurement uncertainty, measurementYvonne A. Branden
- 82 Calibration Certificate Evaluation 2025-04-03This 2-hour webinar will introduce concepts necessary to successfully implement ISO/IEC 17025:2017 compliant calibration certificates within the laboratory and evaluate service provider certificates for compliance. Learning Objectives At the end ofYvonne A. Branden
- 83 Measurement System Basics: SI & U.S. Customary Units for Regulatory Officials 2025-03-13This 1.5-hour webinar will introduce the measurement systems commonly used in the United States, including the International System of Units (SI) and U.S. Customary systems (e.g., Avoirdupois, Apothecary, and Troy units). This session is ideal forYvonne A. Branden
- 84 Mass Metrology Seminar 2025-03-03Course Description The Mass Metrology Seminar is a two-week, "hands-on" seminar. It incorporates approximately 30 percent lectures and 70 percent demonstrations and laboratory work in which the participant performs measurements by applying proceduresYvonne A. Branden
- 85 Metric System Estimation 2025-02-27The International System of Units (SI), commonly known as the metric system, is easy to use and learn when taught using metric tools. The ability to interpret measurement scales, magnitude, and approximate a quantity are essential Science, TechnologyYvonne A. Branden
- 86 Metric System Education Resources 2025-02-13The International System of Units (SI), commonly known as the metric system, is easy to use and learn when taught using metric tools. The ability to interpret measurement scales, magnitude, and approximate a quantity are essential Science, TechnologyYvonne A. Branden
CISA Blog
- Region 8 Invites You to Secure Our World 2024-10-02 CISA
- CISA Director Jen Easterly Remarks at the Election Center 39th Annual National Conference in Detroit 2024-09-09 CISA
- Learn with Region 8’s Webinar Program 2024-08-23Join us each month for special events and webinars featuring topics crucial to infrastructure security.CISA
- Shaping the legacy of partnership between government and private sector globally: JCDC 2024-08-21 CISA
- SAFECOM and NCSWIC Develop Global Positioning System (GPS) for Public Safety Location Services: Use Cases and Best Practices 2024-08-19 CISA
- Region 10 Team Provides Vital Election Security Training for Idaho 2024-08-15Working with Region 10 cybersecurity, protective security, and election security advisors, the Idaho Secretary of State Office recently spearheaded a comprehensive initiative aimed at bolstering election security readiness through a virtual webinar training series.CISA
- SAFECOM Membership Spotlight ft. Red Grasso, North Carolina Department of Information Technology 2024-08-12 CISA
- SAFECOM Releases New Resource for Cloud Adoption 2024-07-30 CISA
- With Open Source Artificial Intelligence, Don’t Forget the Lessons of Open Source Software 2024-07-29 CISA
- SAFECOM and NCSWIC Publish Fall 2023 Joint SAFECOM-NCSWIC Bi-Annual Meeting Executive Summaries 2024-07-24 CISA
CISA Blog
- Region 8 Invites You to Secure Our World 2024-10-02 CISA
- CISA Director Jen Easterly Remarks at the Election Center 39th Annual National Conference in Detroit 2024-09-09 CISA
- Learn with Region 8’s Webinar Program 2024-08-23Join us each month for special events and webinars featuring topics crucial to infrastructure security.CISA
- Shaping the legacy of partnership between government and private sector globally: JCDC 2024-08-21 CISA
- SAFECOM and NCSWIC Develop Global Positioning System (GPS) for Public Safety Location Services: Use Cases and Best Practices 2024-08-19 CISA
- Region 10 Team Provides Vital Election Security Training for Idaho 2024-08-15Working with Region 10 cybersecurity, protective security, and election security advisors, the Idaho Secretary of State Office recently spearheaded a comprehensive initiative aimed at bolstering election security readiness through a virtual webinar training series.CISA
- SAFECOM Membership Spotlight ft. Red Grasso, North Carolina Department of Information Technology 2024-08-12 CISA
- SAFECOM Releases New Resource for Cloud Adoption 2024-07-30 CISA
- With Open Source Artificial Intelligence, Don’t Forget the Lessons of Open Source Software 2024-07-29 CISA
- SAFECOM and NCSWIC Publish Fall 2023 Joint SAFECOM-NCSWIC Bi-Annual Meeting Executive Summaries 2024-07-24 CISA
ICS Advisories
- Subnet Solutions Inc. PowerSYSTEM Center 2024-10-03View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/Low attack complexity Vendor: Subnet Solutions Inc. Equipment: PowerSYSTEM Center Vulnerabilities: Server-Side Request Forgery (SSRF), Inefficient Regular Expression Complexity, Cross-Site Request Forgery (CSRF) 2. RISK EVALUATION Successful exploitation of these vulnerabilities could result in an attacker bypassing a proxy, creating a denial-of-service condition, or viewing […]CISA
- TEM Opera Plus FM Family Transmitter 2024-10-03View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: TEM Equipment: Opera Plus FM Family Transmitter Vulnerabilities: Missing Authentication for Critical Function, Cross-Site Request Forgery (CSRF) 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to perform remote code execution. 3. TECHNICAL DETAILS 3.1 […]CISA
- Delta Electronics DIAEnergie 2024-10-03View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Delta Electronics Equipment: DIAEnergie Vulnerabilities: SQL Injection 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to retrieve records or cause a denial of service. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Delta Electronics DIAEnergie, […]CISA
- Optigo Networks ONS-S8 Spectra Aggregation Switch 2024-10-01View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/Low attack complexity Vendor: Optigo Networks Equipment: ONS-S8 - Spectra Aggregation Switch Vulnerabilities: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion'), Weak Authentication 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code […]CISA
- Mitsubishi Electric MELSEC iQ-F FX5-OPC 2024-10-01View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Mitsubishi Electric Equipment: MELSEC iQ-F FX5-OPC Vulnerability: NULL Pointer Dereference 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a remote attacker to cause a Denial-of-Service (DoS) condition on the product by getting a legitimate user to import a specially […]CISA
- Atelmo Atemio AM 520 HD Full HD Satellite Receiver 2024-09-26View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Atelmo Equipment: Atemio AM 520 HD Full HD Satellite Receiver Vulnerability: OS Command Injection 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an unauthorized attacker to execute system commands with elevated privileges. 3. TECHNICAL DETAILS 3.1 […]CISA
- goTenna Pro ATAK Plugin 2024-09-26View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.1 ATTENTION: Low attack complexity Vendor: goTenna Equipment: Pro ATAK Plugin Vulnerabilities: Weak Password Requirements, Insecure Storage of Sensitive Information, Missing Support for Integrity Check, Cleartext Transmission of Sensitive Information, Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG), Weak Authentication, Insertion of Sensitive Information Into Sent Data, Observable […]CISA
- Advantech ADAM-5630 2024-09-26View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low attack complexity Vendor: Advantech Equipment: ADAM-5630 Vulnerabilities: Use of Persistent Cookies Containing Sensitive Information 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to hijack a legitimate user's session, perform cross-site request forgery, or cause a denial-of-service condition. 3. TECHNICAL DETAILS 3.1 […]CISA
- goTenna Pro X and Pro X2 2024-09-26View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Low attack complexity Vendor: goTenna Equipment: Pro series Vulnerabilities: Weak Password Requirements, Insecure Storage of Sensitive Information, Missing Support for Integrity Check, Cleartext Transmission of Sensitive Information, Improper Restriction of Communication Channel to Intended Endpoints, Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG), Weak Authentication, Insertion […]CISA
- Advantech ADAM-5550 2024-09-26View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Low attack complexity Vendor: Advantech Equipment: ADAM-5550 Vulnerabilities: Weak Encoding for Password, Cross-site Scripting 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow a remote attacker to intercept the easily decodable credentials of a legitimate user to gain full access to the device and could […]CISA
- Franklin Fueling Systems TS-550 EVO 2024-09-24View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Franklin Fueling Systems Equipment: TS-550 EVO Automatic Tank Gauge Vulnerability: Absolute Path Traversal 2. RISK EVALUATION Successful exploitation of this vulnerability allow an attacker to gain administrative access over the affected device. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Franklin […]CISA
- Moxa MXview One 2024-09-24View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Moxa Equipment: MXview One, MXview One Central Manager Series Vulnerabilities: Cleartext Storage In A File or On Disk, Path Traversal, Time-of-Check Time-of-Use Race Condition 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to expose local credentials and […]CISA
- Alisonic Sibylla 2024-09-24View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/Low attack complexity Vendor: Alisonic Equipment: Sibylla Vulnerability: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 2. RISK EVALUATION Successful exploitation of this vulnerability could result in an attacker obtaining device information from the database, dumping credentials, or potentially gaining administrator […]CISA
- Dover Fueling Solutions ProGauge MAGLINK LX CONSOLE 2024-09-24View CSAF 1. EXECUTIVE SUMMARY CVSS v4 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Dover Fueling Solutions (DFS) Equipment: ProGauge MAGLINK LX CONSOLE Vulnerabilities: Command Injection, Improper Privilege Management, Use of Hard-coded Password, Cross-site Scripting, Authentication Bypass Using an Alternate Path or Channel 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow a remote […]CISA
- OPW Fuel Management Systems SiteSentinel 2024-09-24View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: OPW Fuel Managements Systems Equipment: SiteSentinel Vulnerability: Missing Authentication For Critical Function 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to bypass authentication and obtain full administrative privileges to the server. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS […]CISA
- OMNTEC Proteus Tank Monitoring 2024-09-24View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: OMNTEC Mfg., Inc. Equipment: Proteus Tank Monitoring Vulnerability: Missing Authentication for Critical Function 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to perform administrative actions without proper authentication. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following version […]CISA
- Kastle Systems Access Control System 2024-09-19View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.2 ATTENTION: Exploitable remotely/low attack complexity Vendor: Kastle Systems Equipment: Access Control System Vulnerabilities: Use of Hard-coded Credentials, Cleartext Storage of Sensitive Information 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to access sensitive information on the affected product. 3. TECHNICAL DETAILS 3.1 AFFECTED […]CISA
- IDEC PLCs 2024-09-19View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.3 ATTENTION: Low Attack Complexity Vendor: IDEC Corporation Equipment: IDEC PLCs Vulnerabilities: Cleartext Transmission of Sensitive Information, Generation of Predictable Identifiers 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to obtain user authentication information or disrupt communication. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The […]CISA
- MegaSys Computer Technologies Telenium Online Web Application 2024-09-19View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: MegaSys Computer Technologies Equipment: Telenium Online Web Application Vulnerability: Improper Input Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to inject arbitrary Perl code through a crafted HTTP request, leading to remote code execution on the […]CISA
- Rockwell Automation RSLogix 5 and RSLogix 500 2024-09-19View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.8 ATTENTION: Exploitable locally/high attack complexity Vendor: Rockwell Automation Equipment: RSLogix 5 and RSLogix 500 Vulnerability: Insufficient verification of data authenticity 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to perform remote code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of […]CISA
ICS Medical Advisories
- BPL Medical Technologies PWS-01-BT and BPL Be Well Android Application 2024-09-10View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.1 ATTENTION: Low attack complexity/public exploits are available Vendor: BPL Medical Technologies Equipment: PWS-01-BT, Be Well Android App Vulnerability: Cleartext Transmission of Sensitive Information 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to intercept and modify information as it being processed 3. TECHNICAL DETAILS […]CISA
- Baxter Connex Health Portal 2024-09-05View CSAF 1. EXECUTIVE SUMMARY CVSS v3.1 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Baxter Equipment: Connex Health Portal Vulnerabilities: SQL Injection, Improper Access Control 2. RISK EVALUATION Successful exploitation of these vulnerabilities could lead to malicious code injection, shutdown of database service, or the ability to access, modify, or delete sensitive data from the […]CISA
- Philips Vue PACS 2024-07-18View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Philips Equipment: Vue PACS Vulnerabilities: Out-of-bounds Write, Deserialization of Untrusted Data, Uncontrolled Resource Consumption, Improper Privilege Management, Use of Default Credentials, Weak Password Requirements, Exposure of Sensitive Information to an Unauthorized Actor 2. RISK EVALUATION Successful exploitation of these vulnerabilities could […]CISA
- MicroDicom DICOM Viewer 2024-06-11View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: MicroDicom Equipment: DICOM Viewer Vulnerabilities: Improper Authorization in Handler for Custom URL Scheme, Stack-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to both retrieve and plant medical image files on a victim's system and […]CISA
- Baxter Welch Allyn Connex Spot Monitor 2024-05-30View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.1 ATTENTION: Exploitable remotely Vendor: Baxter Equipment: Welch Allyn Connex Spot Monitor (CSM) Vulnerability: Use of Default Cryptographic Key 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to modify device configuration and firmware data. Tampering with this data could lead to device compromise, resulting […]CISA
- Baxter Welch Allyn Configuration Tool 2024-05-30View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.4 ATTENTION: Exploitable remotely Vendor: Baxter Equipment: Welch Allyn Configuration Tool Vulnerability: Insufficiently Protected Credentials 2. RISK EVALUATION Successful exploitation of this vulnerability could lead to the unintended exposure of credentials to unauthorized users. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Baxter (formerly Hillrom and Welch Allyn) […]CISA
- Santesoft Sante FFT Imaging 2024-03-05View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Santesoft Equipment: Sante FFT Imaging Vulnerability: Out-of-Bounds Write 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a local attacker to execute arbitrary code once a user opens a malicious DCM file on affected FFT Imaging installations. 3. TECHNICAL DETAILS 3.1 […]CISA
- MicroDicom DICOM Viewer 2024-02-29View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: MicroDicom Equipment: DICOM Viewer Vulnerabilities: Heap-based Buffer Overflow, Out-of-Bounds Write 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to cause memory corruption issues leading to execution of arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions […]CISA
- Santesoft Sante DICOM Viewer Pro 2024-02-27View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Santesoft Equipment: Sante DICOM Viewer Pro Vulnerability: Out-of-Bounds Read 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to disclose information and execute arbitrary code on affected installations of the product. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following […]CISA
- Orthanc Osimis DICOM Web Viewer 2024-01-23View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.1 ATTENTION: Exploitable remotely/low attack complexity Vendor: Orthanc Equipment: Osimis Web Viewer Vulnerability: Cross-site Scripting 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code inside the victim's browser. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Osimis Web […]CISA
- BD FACSChorus 2023-11-28View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.4 ATTENTION: Low attack complexity Vendor: Becton, Dickinson and Company (BD) Equipment: FACSChorus Vulnerabilities: Missing Protection Mechanism for Alternate Hardware Interface, Missing Authentication for Critical Function, Improper Authentication, Use of Hard-coded Credentials, Insecure Inherited Permissions, 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker with […]CISA
- Santesoft Sante FFT Imaging 2023-10-11View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Santesoft Equipment: Sante FFT Imaging Vulnerability: Out-of-Bounds Read 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to disclose information and execute arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Santesof products are affected: Sante FFT Imaging: […]CISA
- Santesoft Sante DICOM Viewer Pro 2023-10-11View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Santesoft Equipment: Sante DICOM Viewer Pro Vulnerabilities: Out-of-bounds Write, Stack-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to disclose information and execute arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Santesoft products are […]CISA
- Softneta MedDream PACS 2023-09-051. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Softneta Equipment: MedDream PACS Vulnerabilities: Exposed Dangerous Method or Function, Plaintext Storage of a Password 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to obtain and leak plaintext credentials or remotely execute arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED […]CISA
- BD Alaris System with Guardrails Suite MX (Update A) 2023-07-13View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.2 ATTENTION: Low attack complexity Vendor: Becton, Dickinson and Company (BD) Equipment: Alaris PCU, Guardrails Editor, Systems Manager, Calculation Services, CQI Reporter Vulnerabilities: Insufficient Verification of Data Authenticity, Missing Authentication for Critical Function, Improper Verification of Cryptographic Signature, Missing Support for Integrity Check, Cross-site Scripting, Cleartext Transmission of […]CISA
- Medtronic Paceart Optima System 2023-06-291. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Medtronic Equipment: Paceart Optima System Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could result in remote code execution or a denial-of-service condition impacting a healthcare delivery organization’s Paceart Optima system. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The […]CISA
- Illumina Universal Copy Service 2023-04-271. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Illumina Equipment: Universal Copy Service (UCS) Vulnerabilities: Binding to an Unrestricted IP Address, Execution with Unnecessary Privileges 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to take any action at the operating system level. A threat actor could impact settings, configurations, software, or […]CISA
- B. Braun Battery Pack SP with Wi-Fi 2023-04-121. EXECUTIVE SUMMARY CVSS v3 5.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: B. Braun Melsungen AG Equipment: Battery Pack SP with Wi-Fi Vulnerability: Improper neutralization of directives in dynamically evaluated code ('Eval Injection') 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a sophisticated and authenticated attacker to compromise the security of the Space communication device Battery Pack […]CISA
- Medtronic Micro Clinician and InterStim Apps 2023-03-021. EXECUTIVE SUMMARY CVSS v3 6.4 ATTENTION: Low attack complexity Vendor: Medtronic Equipment: Micros Clinician (A51200) app and InterStim X Clinician (A51300) app Vulnerabilities: Unverified Password Change 2. RISK EVALUATION Successful exploitation of this vulnerability could cause the clinician application’s custom password to be reset to default, resulting in unauthorized control of the clinician therapy […]CISA
- BD Alaris Infusion Central (Update A) 2023-02-161. EXECUTIVE SUMMARY CVSS v3 7.3 ATTENTION: Low attack complexity Vendor: Becton, Dickinson and Company (BD) Equipment: Alaris Infusion Central --------- Begin Update A part 1 of 2 --------- Vulnerability: Storing Passwords in a Recoverable Format --------- End Update A part 1 of 2 --------- 2. UPDATE INFORMATION This updated advisory is a follow-up to […]CISA
Packet Storm
- Ukrainian Malware Operator Pleads Guilty In US Court 2024-10-08
- Okta Classic Customers Told To Check Logs For Sign-On Bypass 2024-10-08
- American Water Shuts Down Customer Portal Amid Cybersecurty Incident 2024-10-08
- You Might Have The Skills That Cyber-Security Wants 2024-10-08
- Healthcare Orgs Warned Of Trinity Ransomware Attacks 2024-10-08
- Grav CMS 1.7.44 Server-Side Template Injection 2024-10-07GenGravSSTIExploit is a proof of concept Python script that exploits an authenticated server-side template injection (SSTI) vulnerability in Grav CMS versions 1.7.44 and below. This vulnerability allows a user with editor permissions to execute OS commands on a remote server.
- Ruby-SAML / GitLab Authentication Bypass 2024-10-07This script exploits the issue noted in CVE-2024-45409 that allows an unauthenticated attacker with access to any signed SAML document issued by the IDP to forge a SAML Response/Assertion and gain access as any user on GitLab. Ruby-SAML versions below or equal to 12.2 and versions 1.13.0 through 1.16.0 do not properly verify the signature […]
- iTunes For Windows 12.13.2.3 Local Privilege Escalation 2024-10-07This is a thorough write up of how to exploit a local privilege escalation vulnerability in iTunes for Windows version 12.13.2.3. Apple fixed this in version 12.13.3.
- ABB Cylon Aspect 3.08.00 syslogSwitch.php Remote Code Execution 2024-10-07ABB Cylon Aspect versions 3.08.00 and below suffer from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the SYSLOG HTTP POST parameter called by the syslogSwitch.php script.
- ABB Cylon Aspect 3.08.01 caldavUtil.php Remote Code Execution 2024-10-07ABB Cylon Aspect versions 3.08.01 and below suffer from an unauthenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the Footer HTTP POST parameter called by the caldavUtil.php script.
- ABB Cylon Aspect 3.08.00 setTimeServer.php Remote Code Execution 2024-10-07ABB Cylon Aspect versions 3.08.00 and below suffer from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the timeserver HTTP POST parameter called by the setTimeServer.php script.
- ABB Cylon Aspect 3.08.01 logYumLookup.php Unauthenticated File Disclosure 2024-10-07ABB Cylon Aspect versions 3.08.01 and below suffer from an unauthenticated arbitrary file disclosure vulnerability. Input passed through the logFile GET parameter via the logYumLookup.php script is not properly verified before being used to download log files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.
- Ubuntu Security Notice USN-7056-1 2024-10-07Ubuntu Security Notice 7056-1 - Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. Masato Kinugawa discovered that Firefox did not properly validate javascript under […]
- ManageEngine ADManager Plus Privilege Escalation 2024-10-07ManageEngine ADManager Plus builds prior to 7210 suffers from a privilege escalation vulnerability.
- Book Recording App 2024-09-24 Cross Site Scripting 2024-10-07Book Recording App, as submitted on 2024-09-24, suffers from a persistent cross site scripting vulnerability.
- Debian Security Advisory 5786-1 2024-10-07Debian Linux Security Advisory 5786-1 - Integer overflows flaws were discovered in the Compound Document Binary File format parser of libgsf, the GNOME Project G Structured File Library, which could result in the execution of arbitrary code if a specially crafted file is processed.
- Debian Security Advisory 5785-1 2024-10-07Debian Linux Security Advisory 5785-1 - Dom Walden discovered that the AbuseFilter extension in MediaWiki, a website engine for collaborative work, performed incomplete authorisation checks.
- OpenMediaVault 7.4.2-2 Code Injection 2024-10-07OpenMediaVault version 7.4.2-2 suffers from a PHP code injection vulnerability.
- Netis MW5360 Code Injection 2024-10-07Netis MW5360 suffers from a PHP code injection vulnerability.
- Hikvision IP Camera Cross Site Request Forgery 2024-10-07Hikvision IP Cameras suffer from a cross site request forgery vulnerability.
The Hacker News
- Cyberattack Group 'Awaken Likho' Targets Russian Government with Advanced Tools 2024-10-08Russian government agencies and industrial entities are the target of an ongoing activity cluster dubbed Awaken Likho. "The attackers now prefer using the agent for the legitimate MeshCentral platform instead of the UltraVNC module, which they had previously used to gain remote access to systems," Kaspersky said, detailing a new campaign that began in June […]
- GoldenJackal Target Embassies and Air-Gapped Systems Using Malware Toolsets 2024-10-08A little-known threat actor tracked as GoldenJackal has been linked to a series of cyber attacks targeting embassies and governmental organizations with an aim to infiltrate air-gapped systems using two disparate bespoke toolsets. Victims included a South Asian embassy in Belarus and a European Union government (E.U.) organization, Slovak cybersecurity company ESET said. "The ultimate […]
- New Case Study: The Evil Twin Checkout Page 2024-10-08Is your store at risk? Discover how an innovative web security solution saved one global online retailer and its unsuspecting customers from an “evil twin” disaster. Read the full real-life case study here. The Invisible Threat in Online Shopping When is a checkout page, not a checkout page? When it's an “evil twin”! Malicious redirects […]
- The Value of AI-Powered Identity 2024-10-08Introduction Artificial intelligence (AI) deepfakes and misinformation may cause worry in the world of technology and investment, but this powerful, foundational technology has the potential to benefit organizations of all kinds when harnessed appropriately. In the world of cybersecurity, one of the most important areas of application of AI is augmenting and enhancing identity management
- Pro-Ukrainian Hackers Strike Russian State TV on Putin's Birthday 2024-10-08Ukraine has claimed responsibility for a cyber attack that targeted Russia state media company VGTRK and disrupted its operations, according to reports from Bloomberg and Reuters. The incident took place on the night of October 7, VGTRK confirmed, describing it as an "unprecedented hacker attack." However, it said "no significant damage" was caused and that […]
- Qualcomm Urges OEMs to Patch Critical DSP and WLAN Flaws Amid Active Exploits 2024-10-08Qualcomm has rolled out security updates to address nearly two dozen flaws spanning proprietary and open-source components, including one that has come under active exploitation in the wild. The high-severity vulnerability, tracked as CVE-2024-43047 (CVSS score: 7.8), has been described as a user-after-free bug in the Digital Signal Processor (DSP) Service that could lead to […]
- New Gorilla Botnet Launches Over 300,000 DDoS Attacks Across 100 Countries 2024-10-07Cybersecurity researchers have discovered a new botnet malware family called Gorilla (aka GorillaBot) that draws its inspiration from the leaked Mirai botnet source code. Cybersecurity firm NSFOCUS, which identified the activity last month, said the botnet "issued over 300,000 attack commands, with a shocking attack density" between September 4 and September 27, 2024. No less […]
- Vulnerable APIs and Bot Attacks Costing Businesses Up to $186 Billion Annually 2024-10-07Organizations are losing between $94 - $186 billion annually to vulnerable or insecure APIs (Application Programming Interfaces) and automated abuse by bots. That’s according to The Economic Impact of API and Bot Attacks report from Imperva, a Thales company. The report highlights that these security threats account for up to 11.8% of global cyber events […]
- Modernization of Authentication: Webinar on MFA, Passwords, and the Shift to Passwordless 2024-10-07The interest in passwordless authentication has increased due to the rise of hybrid work environments and widespread digitization. This has led to a greater need for reliable data security and user-friendly interfaces. Without these measures, organizations are at risk of experiencing data breaches, leaks, and significant financial losses. While traditional password-based systems offer
- Critical Apache Avro SDK Flaw Allows Remote Code Execution in Java Applications 2024-10-07A critical security flaw has been disclosed in the Apache Avro Java Software Development Kit (SDK) that, if successfully exploited, could allow the execution of arbitrary code on susceptible instances. The flaw, tracked as CVE-2024-47561, impacts all versions of the software prior to 1.11.4. "Schema parsing in the Java SDK of Apache Avro 1.11.3 and […]
- THN Cybersecurity Recap: Top Threats and Trends (Sep 30 - Oct 6) 2024-10-07Ever heard of a "pig butchering" scam? Or a DDoS attack so big it could melt your brain? This week's cybersecurity recap has it all – government showdowns, sneaky malware, and even a dash of app store shenanigans. Get the scoop before it's too late! ⚡ Threat of the Week Double Trouble: Evil Corp & […]
- Google Blocks Unsafe Android App Sideloading in India for Improved Fraud Protection 2024-10-07Google has announced that it's piloting a new security initiative that automatically blocks sideloading of potentially unsafe Android apps in India, after similar tests in Singapore, Thailand, and Brazil. The enhanced fraud protection feature aims to keep users safe when they attempt to install malicious apps from sources other than the Google Play Store, such […]
- E.U. Court Limits Meta's Use of Personal Facebook Data for Targeted Ads 2024-10-07Europe's top court has ruled that Meta Platforms must restrict the use of personal data harvested from Facebook for serving targeted ads even when users consent to their information being used for advertising purposes, a move that could have serious consequences for ad-driven companies operating in the region. "An online social network such as Facebook […]
- Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability 2024-10-05Apple has released iOS and iPadOS updates to address two security issues, one of which could have allowed a user's passwords to be read out aloud by its VoiceOver assistive technology. The vulnerability, tracked as CVE-2024-44204, has been described as a logic problem in the new Passwords app impacting a slew of iPhones and iPads. […]
- U.S. and Microsoft Seize 107 Russian Domains in Major Cyber Fraud Crackdown 2024-10-04Microsoft and the U.S. Department of Justice (DoJ) on Thursday announced the seizure of 107 internet domains used by state-sponsored threat actors with ties to Russia to facilitate computer fraud and abuse in the country. "The Russian government ran this scheme to steal Americans' sensitive information, using seemingly legitimate email accounts to trick victims into […]
- How to Get Going with CTEM When You Don't Know Where to Start 2024-10-04Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks down the complex task of managing security threats into five distinct stages: Scoping, Discovery, Prioritization, Validation, and Mobilization. Each of these stages plays a crucial role in identifying, addressing, and mitigating vulnerabilities -
- Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors 2024-10-04Cloudflare has disclosed that it mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 3.8 terabits per second (Tbps) and lasted 65 seconds. The web infrastructure and security company said it fended off "over one hundred hyper-volumetric L3/4 DDoS attacks throughout last month, with many exceeding 2 billion packets per second (Bpps) and 3 […]
- WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks 2024-10-04A new high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable malicious actors to execute arbitrary JavaScript code under certain conditions. The flaw, tracked as CVE-2024-47374 (CVSS score: 7.2), has been described as a stored cross-site scripting (XSS) vulnerability impacting all versions of the plugin up to and […]
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks 2024-10-03Google has revealed the various security guardrails that have been incorporated into its latest Pixel devices to counter the rising threat posed by baseband security attacks. The cellular baseband (i.e., modem) refers to a processor on the device that's responsible for handling all connectivity, such as LTE, 4G, and 5G, with a mobile phone cell […]
- The Secret Weakness Execs Are Overlooking: Non-Human Identities 2024-10-03For years, securing a company’s systems was synonymous with securing its “perimeter.” There was what was safe “inside” and the unsafe outside world. We built sturdy firewalls and deployed sophisticated detection systems, confident that keeping the barbarians outside the walls kept our data and systems safe. The problem is that we no longer operate within […]