Take action on the latest cybersecurity events

Cybersecurity advisories and events as they happen, with a clear action you can take.

A critical vulnerability in the phpFox social platform allowes unauthorized attackers to compromise user communities, and despite initial dismissiveness, the developers eventually released a patch in version 4.8.14.
The D-Link DAR-7000 router, which reached its End of Life in 2015, has a SQL injection vulnerability (CVE-2023-42406 with a CVSS3 score of 9.8) allowing potential unauthorized access. D-Link no longer supports or updates such legacy products, and users should replace the products or if possible use open source firmware.
Ubiquiti, renowned for its networking solutions, has identified and addressed a critical vulnerability in its UniFi Network application, urging users to update to version 7.5.187 for security, especially given the company's past cybersecurity challenges.
F5 has warned its customers of a critical vulnerability (CVE-2023-46747) in its BIG-IP product, affecting multiple versions, which allows unauthenticated attackers to remotely execute code and potentially compromise over 6,000 internet-facing instances, including those of government agencies and Fortune 500 companies.
Mirth Connect by NextGen HealthCare has a critical security flaw (CVE-2023-43208) that allows unauthorized remote code execution, with versions dating back to 2015/2016 affected. Users are urged to update to version 4.4.1 released on October 6, 2023, to ensure protection.
Rockwell Automation has reported an actively exploited vulnerability in Cisco IOS XE software affecting specific versions of Stratix products. Cisco has released a patch as of October 23. Affected customers should apply mitigating measures and seek guidance from Rockwell Automation on updating their devices.
Cisco has issued patches for two zero-day vulnerabilities in its Cisco IOS XE system software, offering them for download on its software portal, addressing CVE-2023-20198 and CVE-2023-20273, which allowed attackers to gain privileged access and execute root-level commands.
VMware has addressed the critical CVE-2023-34048 security vulnerability in vCenter Server, allowing potential remote exploitation, with security patches available - even for end of life products. Although no active exploitation has been detected the company advises strict network access control.
Multiple vulnerabilities, including three classified as critical, have been discovered in SolarWinds Access Rights Manager (ARM), a tool for managing and auditing user access rights. These vulnerabilities could allow remote attackers to execute code with SYSTEM privileges, potentially granting them full control over the victim's machine. SolarWinds has released a patch in version 2023.2.1 of ARM to address these issues.
Oracle's recent Critical Patch Update includes 387 security patches for various product families, providing vulnerability information to allow customers to assess risks, urging them to apply patches promptly, while also advising consideration of product version upgrades.