Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Discover practical AI tactics for GRC — join our free expert webinar

Scale Up Europe Fund boosts technology leadership across the continent

NHS launches AI tool to speed up prostate cancer diagnosis

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA adds Nakivo vulnerability to KEV catalog amid aggressive exploitation
Identity

CISA adds Nakivo vulnerability to KEV catalog amid aggressive exploitation

userBy userMarch 20, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 20, 2025Ravi LakshmananCybersecurity/Vulnerability

The US Cybersecurity and Infrastructure Security Agency (CISA) has added high-strength security flaws that affect Nakivo backup and replication software to its known Exploited Vulnerabilities (KEV) catalogues, citing evidence of active exploitation.

The vulnerability in question is CVE-2024-48248 (CVSS score: 8.6). This is an absolute path traversal bug that allows you to read files on the target host to the target host containing sensitive hosts such as “/etc/shadow” via the endpoint. It affects all versions of the software before version 10.11.3.86570.

“Nakivo backups and replications contain an absolute path traversal vulnerability that allows an attacker to read any file,” CISA said in its advisory.

Cybersecurity

The successful exploitation of the flaws allows the enemy to read sensitive data, including configuration files, backups and credentials, and could even serve as a stepping stone for compromise.

Currently, there is no details on how vulnerabilities are being exploited in the wild, but development will take place after WatchTowr Labs announced its exploitation of a proof of concept (POC) towards the end of last month. This issue was addressed in version V11.0.0.88174 in November 2024.

The cybersecurity company also noted that it could weaponize the unauthenticated arbitrary file read vulnerability to retrieve all stored credentials used in the target Nakivo solution and hosted in the database “Product01.h2.db”.

Also, two other flaws added to the KEV catalog –

CVE-2025-1316 (CVSS score: 9.3) – edimax IC-7100 IP camera contains OS command injection vulnerabilities due to inappropriate input sanitization that allows attackers to achieve remote code execution via specially created requests. Java contains a directory traversal vulnerability for Scheduler/UI/JS/FFFFFFFFBCA41EB4/UIUTILJAVASCRIPTJS.

Cybersecurity

Last week, Akamai revealed that since May 2024, CVE-2025-1316 has been weaponized by bad actors to target cameras with default credentials to deploy at least two different Mirai Botnet variants.

In light of active exploitation, a Federal Private Enforcement Division (FCEB) agency is required to apply the necessary mitigation and ensure the network by April 9, 2025.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHouthis claims missile launch in Israel amid new battles in Gaza | Houthis News
Next Article Evcom extends the deadline for the Clarion Award
user
  • Website

Related Posts

Discover practical AI tactics for GRC — join our free expert webinar

October 29, 2025

10 npm packages discovered stealing developer credentials on Windows, macOS, and Linux

October 29, 2025

Active exploit hits Dassault and XWiki — confirms critical flaw CISA is under attack

October 29, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Discover practical AI tactics for GRC — join our free expert webinar

Scale Up Europe Fund boosts technology leadership across the continent

NHS launches AI tool to speed up prostate cancer diagnosis

10 npm packages discovered stealing developer credentials on Windows, macOS, and Linux

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.