Vulnerabilidades exploradas conhecidas da CISA • atualizado 21/12/2025 14:11 UTC • exibindo 10 itens
Fonte: CISA Known Exploited Vulnerabilities
-
CVE-2025-14733 - WatchGuard Firebox Out of Bounds Write Vulnerability
Fornecedor: WatchGuard | Produto: Firebox | Adicionado: 2025-12-19
WatchGuard Fireware OS iked process contains an out of bounds write vulnerability in the OS iked process. This vulnerability may allow a remote unauthenticated attacker to execute arbitrary code and affects both the mobile user VPN with IKEv2 and the branch office VPN using IKEv2 when configured with a dynamic gateway peer.
Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. -
CVE-2025-59374 - ASUS Live Update Embedded Malicious Code Vulnerability
Fornecedor: ASUS | Produto: Live Update | Adicionado: 2025-12-17
ASUS Live Update contains an embedded malicious code vulnerability client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. -
CVE-2025-40602 - SonicWall SMA1000 Missing Authorization Vulnerability
Fornecedor: SonicWall | Produto: SMA1000 appliance | Adicionado: 2025-12-17
SonicWall SMA1000 contains a missing authorization vulnerability that could allow for privilege escalation appliance management console (AMC) of affected devices.
Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable -
CVE-2025-20393 - Cisco Multiple Products Improper Input Validation Vulnerability
Fornecedor: Cisco | Produto: Multiple Products | Adicionado: 2025-12-17
Cisco Secure Email Gateway, Secure Email, AsyncOS Software, and Web Manager appliances contains an improper input validation vulnerability that allows threat actors to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance.
Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. -
CVE-2025-59718 - Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability
Fornecedor: Fortinet | Produto: Multiple Products | Adicionado: 2025-12-16
Fortinet FortiOS, FortiSwitchMaster, FortiProxy, and FortiWeb contain an improper verification of cryptographic signature vulnerability that may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML message. Please be aware that CVE-2025-59719 pertains to the same problem and is mentioned in the same vendor advisory. Ensure to apply all patches mentioned in the advisory.
Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. -
CVE-2025-14611 - Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability
Fornecedor: Gladinet | Produto: CentreStack and Triofox | Adicionado: 2025-12-15
Gladinet CentreStack and TrioFox contain a hardcoded cryptographic keys vulnerability for their implementation of the AES cryptoscheme. This vulnerability degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication.
Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. -
CVE-2025-43529 - Apple Multiple Products Use-After-Free WebKit Vulnerability
Fornecedor: Apple | Produto: Multiple Products | Adicionado: 2025-12-15
Apple iOS, iPadOS, macOS, and other Apple products contain a use-after-free vulnerability in WebKit. Processing maliciously crafted web content may lead to memory corruption. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.
Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. -
CVE-2018-4063 - Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability
Fornecedor: Sierra Wireless | Produto: AirLink ALEOS | Adicionado: 2025-12-12
Sierra Wireless AirLink ALEOS contains an unrestricted upload of file with dangerous type vulnerability. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. -
CVE-2025-14174 - Google Chromium Out of Bounds Memory Access Vulnerability
Fornecedor: Google | Produto: Chromium | Adicionado: 2025-12-12
Google Chromium contains an out of bounds memory access vulnerability in ANGLE that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. -
CVE-2025-58360 - OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability
Fornecedor: OSGeo | Produto: GeoServer | Adicionado: 2025-12-11
OSGeo GeoServer contains an improper restriction of XML external entity reference vulnerability that occurs when the application accepts XML input through a specific endpoint /geoserver/wms operation GetMap and could allow an attacker to define external entities within the XML request.
Ação requerida: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Fonte: feeds públicos de segurança
- Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
- RansomHouse upgrades encryption with multi-layered data processing
- U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware
- Microsoft confirms Teams is down and messages are delayed
- Nigeria arrests dev of Microsoft 365 'Raccoon0365' phishing platform
Ferramenta de análise de ameaças que automatiza a consulta de IPs/URLs em múltiplas fontes, gera relatórios e cria resumos com IA local.
Portfólio no formato de um sistema operacional, com terminal web, comandos, easter eggs e assistente com RAG.