ServiceNow, Outlook, and Docker Engine Patching Service

Published:

spot_img

Cyble Research & Intelligence Labs (CRIL) Top Vulnerabilities Report

Cyble Research & Intelligence Labs (CRIL) researchers have identified six critical vulnerabilities that security teams need to prioritize this week. These vulnerabilities include flaws in ServiceNow, Acronis, VMware, Microsoft Outlook, Progress Telerik, and Docker Engine.

One of the highlighted vulnerabilities is CVE-2024-37085, affecting VMware ESXi, an enterprise-class hypervisor. This high-severity authentication bypass vulnerability is actively being exploited by ransomware groups, allowing attackers to gain full access to ESXi hosts and potentially encrypting the hypervisor’s file system, causing business disruptions.

Another critical vulnerability is CVE-2017-11774, impacting Microsoft Outlook and allowing attackers to execute arbitrary commands. Researchers have developed a new post-exploitation framework named “Specula,” which can turn Outlook into a command and control beacon for remote code execution, making it easier for attackers to evade detection.

Other vulnerabilities include CVE-2024-4879 affecting ServiceNow, CVE-2024-6327 impacting Progress Telerik Report Server, CVE-2024-41110 targeting Docker Engine, and CVE-2023-45249 affecting Acronis Cyber Infrastructure. These vulnerabilities range from input validation issues to remote command execution flaws, posing significant risks to organizations.

In addition to these vulnerabilities, Cyble researchers also analyzed dark web exploits, industrial control system vulnerabilities, and web asset exposures in their weekly report. With the increasing sophistication of cyber threats, it is crucial for security teams to prioritize patching these vulnerabilities to protect their organizations from potential attacks.

spot_img

Related articles

Recent articles

Leaked iPhone Hacking Tool Hits Dark Web: Government Resource in the Hands of Cyber Criminals

Cybersecurity Alert: Hacking Toolkit Coruna Falls into Criminal Hands In a troubling development, security researchers have revealed that a sophisticated hacking toolkit, initially linked to...

149 DDoS Attacks Target 110 Organizations Across 16 Countries in Wake of Middle East Conflict

Surge in Hacktivist Activity Amid U.S.-Israel Military Actions Recent developments in cybersecurity have raised alarms among experts regarding a notable uptick in hacktivist operations. This...

Ajman Ruler Enacts Law for Managing Lost and Abandoned Property

New Law on Lost and Abandoned Property in Ajman Introduction of Law No. (2) of 2026 His Highness Sheikh Humaid bin Rashid Al Nuaimi, the Ruler...

Mobile Banking Evolution: Access Your CIBIL Score Instantly

New Delhi | The digital banking landscape in India is evolving at an astonishing pace, significantly altering how customers interact with their financial institutions....