Attack

Critical vulnerability in ScienceLogic SL1 exploited - at least one major victim

Take action: If you are running ScienceLogic SL1, time to patch ASAP. Reach out to the vendor for latest patches and start patching. Rackspace was already hacked, don't be next.


Learn More

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-9537 to its Known Exploited Vulnerabilities (KEV) Catalog, highlighting active exploitation of this vulnerability in the wild.

ScienceLogic SL1 is an IT infrastructure monitoring and management platform that provides visibility, automation, and analytics in on-premises, cloud, and hybrid systems.

This critical vulnerability involves an unspecified third-party component included with ScienceLogic SL1, potentially allowing unauthorized access or remote code execution.

Affected Product is ScienceLogic SL1 (formerly EM7)
  • Versions prior to 12.1.3
  • Versions prior to 12.2.3
  • Versions prior to 12.3

RackSpace was already hacked through this vulnerability.

Users are advised to update to SL1 versions 12.1.3+, 12.2.3+, or 12.3+.

Patches are also are available for older versions - 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x

Given the active exploitation, it's imperative to apply the patches immediately.

Critical vulnerability in ScienceLogic SL1 exploited - at least one major victim