Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Acclaim USAHERDS Flaw Exploited in the Wild

December 24, 2024
Reading Time: 2 mins read
in Alerts
Acclaim USAHERDS Flaw Exploited in the Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a high-severity vulnerability in Acclaim Systems’ USAHERDS software to its Known Exploited Vulnerabilities (KEV) catalog. This addition follows reports of active exploitation in the wild. The vulnerability, tracked as CVE-2021-44207, carries a CVSS score of 8.1 and is caused by hard-coded static credentials in USAHERDS versions 7.4.0.1 and earlier. These credentials, specifically the ValidationKey and DecryptionKey, can be exploited to execute arbitrary code on vulnerable servers running the application.

The flaw arises from the improper use of static keys that provide security for the application’s ViewState. Attackers who gain access to these keys can craft malicious ViewState data that bypasses the Message Authentication Code (MAC) check and triggers deserialization on the server. This process could allow attackers to execute code remotely, posing a significant security risk to organizations using the affected version of USAHERDS. While the flaw does not automatically expose the keys, acquiring them would be the first step for a successful attack.

This vulnerability was first identified in December 2021 by Mandiant, which noted that the China-linked APT41 threat actor had exploited it in attacks against six U.S. state government networks. However, there have been no recent reports of active exploitation. Despite this, the CISA’s decision to include the flaw in the KEV catalog highlights its ongoing significance and the continued risk it poses, especially for government agencies and other high-value targets.

CISA is advising Federal Civilian Executive Branch (FCEB) agencies to implement the necessary mitigations before January 13, 2025, to safeguard their systems against potential exploitation. The warning comes alongside another critical security alert: Adobe’s advisory on a vulnerability in ColdFusion (CVE-2024-53961), which has an available proof-of-concept exploit and could lead to arbitrary file system reads. Organizations using USAHERDS are strongly encouraged to apply the available patches to protect their networks from these active threats.

Reference:
  • CISA Adds Acclaim USAHERDS Flaw to Known Exploited Vulnerabilities Catalog
Tags: APT41CISACyber AlertsCyber Alerts 2024Cyber threatsDecember 2024DecryptionKeyUSAHERDSValidationKeyVulnerabilities
ADVERTISEMENT

Related Posts

Mozilla Security Advisory AV25-529

RingReaper Malware Hits Linux Servers

August 20, 2025
Mozilla Security Advisory AV25-529

Mozilla Security Advisory AV25-529

August 20, 2025
Mozilla Security Advisory AV25-529

Microsoft Issues Windows Fix Update

August 20, 2025
PyPI Blocks 1800 Expired Domain Emails

PyPI Blocks 1800 Expired Domain Emails

August 19, 2025
PyPI Blocks 1800 Expired Domain Emails

Noodlophile Infostealer Uses Fake Notices

August 19, 2025
PyPI Blocks 1800 Expired Domain Emails

XenoRAT Malware Hits South Korea Embassies

August 19, 2025

Latest Alerts

RingReaper Malware Hits Linux Servers

Mozilla Security Advisory AV25-529

Microsoft Issues Windows Fix Update

XenoRAT Malware Hits South Korea Embassies

Noodlophile Infostealer Uses Fake Notices

PyPI Blocks 1800 Expired Domain Emails

Subscribe to our newsletter

    Latest Incidents

    NY Business Council Data Breach Hits 47K

    Ransomware Gang Hacks Inotiv Firm

    Intel Employee Data Exposure Flaw

    Hackers Claim Sale of 15.8M PayPal Logins

    Allianz Life Breach Hits 1.1M Customers

    iiNet Breach Exposes 280K Records

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial