Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

CISA Adds New Vulnerabilities to KEV List

March 11, 2025
Reading Time: 2 mins read
in Alerts

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added five security vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. These flaws impact Advantive VeraCore and Ivanti Endpoint Manager (EPM), both of which have been actively exploited in real-world attacks. The vulnerabilities in Advantive VeraCore include an unrestricted file upload vulnerability (CVE-2024-57968), which allows attackers to upload files to unintended folders. Additionally, CVE-2025-25181 describes an SQL injection vulnerability that enables attackers to execute arbitrary SQL commands on the system. Meanwhile, Ivanti EPM has three absolute path traversal vulnerabilities (CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161) that allow remote unauthenticated attackers to leak sensitive information from the system.

The exploitation of these VeraCore vulnerabilities has been attributed to a Vietnamese threat actor group known as XE Group. This group has been observed dropping reverse shells and web shells to maintain persistent remote access to compromised systems. XE Group’s activities suggest a high level of sophistication in exploiting these vulnerabilities. The exact scope and number of systems impacted by this group remain unclear, but the presence of reverse shells suggests the attackers are attempting to maintain long-term access to targeted environments. This kind of exploit could lead to significant data breaches if left unaddressed.

In contrast, the Ivanti EPM vulnerabilities currently have no public reports detailing how they are being actively exploited in the wild.

However, a proof-of-concept (PoC) exploit was released by Horizon3.ai last month, which demonstrated how these vulnerabilities could be leveraged for unauthorized access. Horizon3.ai described these vulnerabilities as “credential coercion” bugs, which may allow an unauthenticated attacker to compromise servers. These flaws, if left unpatched, could provide attackers with significant control over impacted systems, leading to potential data loss or further security breaches.

The vulnerability reports also coincide with a warning from the threat intelligence firm GreyNoise, which highlighted the mass exploitation of CVE-2024-4577, a critical vulnerability in PHP-CGI.

GreyNoise noted a significant increase in attack activity against this flaw, particularly targeting countries such as Japan, Singapore, Indonesia, the United Kingdom, Spain, and India. Notably, more than 43% of the IP addresses targeting CVE-2024-4577 over the past 30 days were from Germany and China. This widespread targeting suggests a coordinated attack campaign, likely using automated scanning tools to identify vulnerable systems across multiple countries. In light of these threats, CISA has urged Federal Civilian Executive Branch (FCEB) agencies to patch these vulnerabilities by March 31, 2025, to mitigate the risks of exploitation.

Reference:
  • CISA Adds Five Exploited Vulnerabilities to Catalog for Advantive VeraCore and Ivanti
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

Russian APT28 Deploys Outlook Backdoor

SAP S4hana Exploited Vulnerability

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Virustotal Finds Undetected SVG Files

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Russian APT28 Deploys Outlook Backdoor

September 5, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Lazarus Hackers Exploit ZeroDay, Deploy Rats

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

CISA Flags TP Link Router Flaws

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

September 4, 2025

Latest Alerts

SAP S4hana Exploited Vulnerability

Virustotal Finds Undetected SVG Files

Russian APT28 Deploys Outlook Backdoor

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

Subscribe to our newsletter

    Latest Incidents

    North Korean Hackers Fake Interviews

    Bridgestone Confirms Cyberattack

    Cybersecurity Firms Hit By Breach

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial