Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

As people look for ways to make new friends, here are some apps that may come in handy.

Pi has been calculated to trillions of digits, but is it completely irrational?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cisa adds 3 flaws to the Kev catalog, affecting Ami Megarac, D-Link and Fortinet
Identity

Cisa adds 3 flaws to the Kev catalog, affecting Ami Megarac, D-Link and Fortinet

userBy userJune 26, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 26, 2025Ravi LakshmananVulnerability/Firmware Security

CISA adds 3 defects to the KEV catalog

The US Cybersecurity and Infrastructure Security Agency (CISA) added three security flaws on Wednesday. Each influenced Ami Megarac, D-Link Dir-859 router, and Fortinet Fortios, and was added to the Known Exploited Vulnerabilities (KEV) catalog based on evidence of active exploitation.

Here’s the list of vulnerabilities –

CVE-2024-54085 (CVSS score: 10.0) – Authentication bypass fraudulent control by spoofing Redfish host interface on Ami Megarac SPX that allows remote attackers to control CVE-2024-0769 (CVSS score: 5.3) (Ami Megarac SPX) CVE-2019-6693 (CVSS score: 4.2) – Fortios, Fortimager, and Fortianalyzer hard-coded encryption key vulnerability used to encrypt password data in CLI configurations.

Firmware security company Eclypsium, which disclosed CVE-2024-54085 earlier this year, said the flaws could be exploited to perform a wide range of malicious actions, including malware deployment and device firmware tampering.

Cybersecurity

Currently there is no details on how its shortcomings are weaponized in the wild, who may be exploiting it, or the scale of the attack. Hacker News contacted Eclipsium for comments and if we respond, we will update the story.

The exploitation of CVE-2024-0769 was revealed by threat intelligence company Greynoise exactly a year ago as part of a campaign designed to dump account names, passwords, groups and descriptions of all users on the device.

As of December 2020, this means that the D-Link DIR-859 router has reached the end of life (EOL). This means that vulnerabilities remain below these devices. Users are encouraged to retire and replace the product.

Regarding CVE-2019-6693 abuse, several security vendors report that threat actors linked to the Akira ransomware scheme have exploited the vulnerability to gain initial access to the target network.

In light of the active exploitation of these flaws, federal civil enforcement division (FCEB) agencies must ensure that they have networks by July 16, 2025.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpinion: Illinois Transportation Bill could revolutionize intercity travel
Next Article How data analysis is transforming modern industry
user
  • Website

Related Posts

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

March 14, 2026

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

March 14, 2026

Chinese hackers target Southeast Asian militaries with AppleChris and MemFun malware

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

As people look for ways to make new friends, here are some apps that may come in handy.

Pi has been calculated to trillions of digits, but is it completely irrational?

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.