Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

CISA Adds New Vulnerabilities to KEV List

March 11, 2025
Reading Time: 2 mins read
in Alerts

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added five security vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. These flaws impact Advantive VeraCore and Ivanti Endpoint Manager (EPM), both of which have been actively exploited in real-world attacks. The vulnerabilities in Advantive VeraCore include an unrestricted file upload vulnerability (CVE-2024-57968), which allows attackers to upload files to unintended folders. Additionally, CVE-2025-25181 describes an SQL injection vulnerability that enables attackers to execute arbitrary SQL commands on the system. Meanwhile, Ivanti EPM has three absolute path traversal vulnerabilities (CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161) that allow remote unauthenticated attackers to leak sensitive information from the system.

The exploitation of these VeraCore vulnerabilities has been attributed to a Vietnamese threat actor group known as XE Group. This group has been observed dropping reverse shells and web shells to maintain persistent remote access to compromised systems. XE Group’s activities suggest a high level of sophistication in exploiting these vulnerabilities. The exact scope and number of systems impacted by this group remain unclear, but the presence of reverse shells suggests the attackers are attempting to maintain long-term access to targeted environments. This kind of exploit could lead to significant data breaches if left unaddressed.

In contrast, the Ivanti EPM vulnerabilities currently have no public reports detailing how they are being actively exploited in the wild.

However, a proof-of-concept (PoC) exploit was released by Horizon3.ai last month, which demonstrated how these vulnerabilities could be leveraged for unauthorized access. Horizon3.ai described these vulnerabilities as “credential coercion” bugs, which may allow an unauthenticated attacker to compromise servers. These flaws, if left unpatched, could provide attackers with significant control over impacted systems, leading to potential data loss or further security breaches.

The vulnerability reports also coincide with a warning from the threat intelligence firm GreyNoise, which highlighted the mass exploitation of CVE-2024-4577, a critical vulnerability in PHP-CGI.

GreyNoise noted a significant increase in attack activity against this flaw, particularly targeting countries such as Japan, Singapore, Indonesia, the United Kingdom, Spain, and India. Notably, more than 43% of the IP addresses targeting CVE-2024-4577 over the past 30 days were from Germany and China. This widespread targeting suggests a coordinated attack campaign, likely using automated scanning tools to identify vulnerable systems across multiple countries. In light of these threats, CISA has urged Federal Civilian Executive Branch (FCEB) agencies to patch these vulnerabilities by March 31, 2025, to mitigate the risks of exploitation.

Reference:
  • CISA Adds Five Exploited Vulnerabilities to Catalog for Advantive VeraCore and Ivanti
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

HelloTDS Spreads Malware Via Fake CAPTCHAs

Sabotage Theft Malware On npm And PyPI

June 9, 2025
HelloTDS Spreads Malware Via Fake CAPTCHAs

Salesforce SOQL Flaw Exposed User Records

June 9, 2025
HelloTDS Spreads Malware Via Fake CAPTCHAs

HelloTDS Spreads Malware Via Fake CAPTCHAs

June 9, 2025
Chrome Extensions Leak Data And API Keys

Chrome Extensions Leak Data And API Keys

June 6, 2025
Chrome Extensions Leak Data And API Keys

AMOS Stealer Hits macOS Via Fake CAPTCHA

June 6, 2025
Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

June 6, 2025

Latest Alerts

Sabotage Theft Malware On npm And PyPI

Salesforce SOQL Flaw Exposed User Records

HelloTDS Spreads Malware Via Fake CAPTCHAs

AMOS Stealer Hits macOS Via Fake CAPTCHA

Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

Subscribe to our newsletter

    Latest Incidents

    Hack Shuts Down Brazil City Health Systems

    Sorbonne University Hit By Staff Data Breach

    Chaos Gang Leaks Optima Tax Client Data

    German Dog Rescue IG Hacked For Ransom

    Hack Attempt Hits German Police Phone System

    InfoJobs Spain Hit By Credential Stuffing

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial