Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Google plans to reduce its relationship with scale AI

Review Week: WWDC 2025 Summary

New AI-generated tags in the App Store are in beta

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » CISA adds Nakivo vulnerability to KEV catalog amid aggressive exploitation
Identity

CISA adds Nakivo vulnerability to KEV catalog amid aggressive exploitation

userBy userMarch 20, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 20, 2025Ravi LakshmananCybersecurity/Vulnerability

The US Cybersecurity and Infrastructure Security Agency (CISA) has added high-strength security flaws that affect Nakivo backup and replication software to its known Exploited Vulnerabilities (KEV) catalogues, citing evidence of active exploitation.

The vulnerability in question is CVE-2024-48248 (CVSS score: 8.6). This is an absolute path traversal bug that allows you to read files on the target host to the target host containing sensitive hosts such as “/etc/shadow” via the endpoint. It affects all versions of the software before version 10.11.3.86570.

“Nakivo backups and replications contain an absolute path traversal vulnerability that allows an attacker to read any file,” CISA said in its advisory.

Cybersecurity

The successful exploitation of the flaws allows the enemy to read sensitive data, including configuration files, backups and credentials, and could even serve as a stepping stone for compromise.

Currently, there is no details on how vulnerabilities are being exploited in the wild, but development will take place after WatchTowr Labs announced its exploitation of a proof of concept (POC) towards the end of last month. This issue was addressed in version V11.0.0.88174 in November 2024.

The cybersecurity company also noted that it could weaponize the unauthenticated arbitrary file read vulnerability to retrieve all stored credentials used in the target Nakivo solution and hosted in the database “Product01.h2.db”.

Also, two other flaws added to the KEV catalog –

CVE-2025-1316 (CVSS score: 9.3) – edimax IC-7100 IP camera contains OS command injection vulnerabilities due to inappropriate input sanitization that allows attackers to achieve remote code execution via specially created requests. Java contains a directory traversal vulnerability for Scheduler/UI/JS/FFFFFFFFBCA41EB4/UIUTILJAVASCRIPTJS.

Cybersecurity

Last week, Akamai revealed that since May 2024, CVE-2025-1316 has been weaponized by bad actors to target cameras with default credentials to deploy at least two different Mirai Botnet variants.

In light of active exploitation, a Federal Private Enforcement Division (FCEB) agency is required to apply the necessary mitigation and ensure the network by April 9, 2025.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHouthis claims missile launch in Israel amid new battles in Gaza | Houthis News
Next Article Evcom extends the deadline for the Clarion Award
user
  • Website

Related Posts

Discord Invite Link Hijacking offers Asyncrat and Skuld Stealer targeted at crypto wallets

June 14, 2025

Over 269,000 websites infected with JSFiretruck JavaScript malware

June 13, 2025

Ransomware gang exploits flaws in less than simple help to target victims with double fear tor

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google plans to reduce its relationship with scale AI

Review Week: WWDC 2025 Summary

New AI-generated tags in the App Store are in beta

Anne Wojcicki’s nonprofit reaches a deal to win 23andMe

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Ranking 5 casino games from the easiest to the hardest

Top 10 Startup and Tech Funding News for the Week Ending June 13, 2025

Brazilian Melluses raised $32 million to buy Bitcoin, becoming the country’s first “Bitcoin Treasury” Fintech

Archer Airlines raises $850 million after Trump signs executive orders to support air taxis

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.