Vulnerability Summary for the Week of November 22, 2021

Original release date: November 29, 2021  High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info 4mosan -- gcb_doctor 4MOSAn GCB Doctor’s login page has improper…

Comments Off on Vulnerability Summary for the Week of November 22, 2021

CISA Releases Capacity Enhancement Guides to Enhance Mobile Device Cybersecurity for Consumers and Organizations

Original release date: November 24, 2021CISA has released actionable Capacity Enhancement Guides (CEGs) to help users and organizations improve mobile device cybersecurity. The CEG: Mobile Device Cybersecurity Checklist for Consumers…

Comments Off on CISA Releases Capacity Enhancement Guides to Enhance Mobile Device Cybersecurity for Consumers and Organizations

Vulnerability Summary for the Week of November 15, 2021

Original release date: November 22, 2021  High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info adobe -- after_effects Adobe After Effects version 18.4.1 (and earlier)…

Comments Off on Vulnerability Summary for the Week of November 15, 2021

CISA Adds Four Known Exploited Vulnerabilities to Catalog

Original release date: November 17, 2021CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, which require remediation from federal civilian executive branch (FCEB) agencies by December 1,…

Comments Off on CISA Adds Four Known Exploited Vulnerabilities to Catalog

AA21-321A: Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities

Original release date: November 17, 2021SummaryActions to Take Today to Protect Against Iranian State-Sponsored Malicious Cyber Activity • Immediately patch software affected by the following vulnerabilities: CVE-2021-34473, 2018-13379, 2020-12812, and…

Comments Off on AA21-321A: Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities