Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

CISA Adds New Vulnerabilities to KEV List

March 11, 2025
Reading Time: 2 mins read
in Alerts

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added five security vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. These flaws impact Advantive VeraCore and Ivanti Endpoint Manager (EPM), both of which have been actively exploited in real-world attacks. The vulnerabilities in Advantive VeraCore include an unrestricted file upload vulnerability (CVE-2024-57968), which allows attackers to upload files to unintended folders. Additionally, CVE-2025-25181 describes an SQL injection vulnerability that enables attackers to execute arbitrary SQL commands on the system. Meanwhile, Ivanti EPM has three absolute path traversal vulnerabilities (CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161) that allow remote unauthenticated attackers to leak sensitive information from the system.

The exploitation of these VeraCore vulnerabilities has been attributed to a Vietnamese threat actor group known as XE Group. This group has been observed dropping reverse shells and web shells to maintain persistent remote access to compromised systems. XE Group’s activities suggest a high level of sophistication in exploiting these vulnerabilities. The exact scope and number of systems impacted by this group remain unclear, but the presence of reverse shells suggests the attackers are attempting to maintain long-term access to targeted environments. This kind of exploit could lead to significant data breaches if left unaddressed.

In contrast, the Ivanti EPM vulnerabilities currently have no public reports detailing how they are being actively exploited in the wild.

However, a proof-of-concept (PoC) exploit was released by Horizon3.ai last month, which demonstrated how these vulnerabilities could be leveraged for unauthorized access. Horizon3.ai described these vulnerabilities as “credential coercion” bugs, which may allow an unauthenticated attacker to compromise servers. These flaws, if left unpatched, could provide attackers with significant control over impacted systems, leading to potential data loss or further security breaches.

The vulnerability reports also coincide with a warning from the threat intelligence firm GreyNoise, which highlighted the mass exploitation of CVE-2024-4577, a critical vulnerability in PHP-CGI.

GreyNoise noted a significant increase in attack activity against this flaw, particularly targeting countries such as Japan, Singapore, Indonesia, the United Kingdom, Spain, and India. Notably, more than 43% of the IP addresses targeting CVE-2024-4577 over the past 30 days were from Germany and China. This widespread targeting suggests a coordinated attack campaign, likely using automated scanning tools to identify vulnerable systems across multiple countries. In light of these threats, CISA has urged Federal Civilian Executive Branch (FCEB) agencies to patch these vulnerabilities by March 31, 2025, to mitigate the risks of exploitation.

Reference:
  • CISA Adds Five Exploited Vulnerabilities to Catalog for Advantive VeraCore and Ivanti
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

Hackers Revive SEO Poisoning

Hackers Revive SEO Poisoning

July 10, 2025
Hackers Revive SEO Poisoning

RondoDox Botnet Exploits Router Flaws

July 10, 2025
Hackers Revive SEO Poisoning

ServiceNow Data Exposure via ACLs

July 10, 2025
Hackers Use Leaked Shellter License Malware

Windows BitLocker Vulnerability Flaw

July 9, 2025
Hackers Use Leaked Shellter License Malware

Hackers Use Leaked Shellter License Malware

July 9, 2025
Hackers Use Leaked Shellter License Malware

Anatsa Android Trojan Targets 90K Users

July 9, 2025

Latest Alerts

RondoDox Botnet Exploits Router Flaws

ServiceNow Data Exposure via ACLs

Hackers Revive SEO Poisoning

Windows BitLocker Vulnerability Flaw

Anatsa Android Trojan Targets 90K Users

Hackers Use Leaked Shellter License Malware

Subscribe to our newsletter

    Latest Incidents

    Bitcoin Depot Breach Exposes Data

    McDonald’s AI Hiring Bot Exposes Data

    Nippon Steel Solutions Data Breach

    Norwegian Municipalities Hit by Data Breach

    Credit Reports Breached And Sold On Dark Web

    Recruiting Software Exposed 26M Resumes

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial