Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Zuckerberg Signal Meta does not open source all of its “Superintelligence” AI models

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cisa warns about defects in Sitecore RCE. Active exploits hit next.js and draytek devices
Identity

Cisa warns about defects in Sitecore RCE. Active exploits hit next.js and draytek devices

userBy userMarch 27, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 27, 2025Ravi LakshmananVulnerability/Threat Intelligence

Based on evidence of active exploitation, the US Cybersecurity and Infrastructure Security Agency (CISA) has added two six-year-old security flaws that affect Sitecore CMS and Experience Platform (XP) to its known exploited vulnerabilities (KEV) catalogue.

The vulnerabilities are listed below –

CVE-2019-9874 (CVSS score: 9.8) – sitecore.security.anticsrf module relaxation vulnerability. This allows unauthorized attackers to send serialized .net objects with http posts in cve-2019-9875 (cve-2019-9875) in http posts. A de-izalisation vulnerability in the Sitecore.security.anticsRf module allows an authenticated attacker to send serialized .NET objects with HTTP POST PARAMETER __CSRFTOKEN to execute arbitrary code.

Currently in an update shared on March 30, 2020, Sitecore states that it is “aware of aggressive exploitation” of CVE-2019-9874, but there is no details as to whom the flaws are currently weaponized. The company has not mentioned the misuse of CVE-2019-9875.

Cybersecurity

In light of aggressive exploitation, federal agencies must ensure that they have their networks by April 16, 2025.

Akamai evolves as stated that early exploit attempts were observed to investigate potential servers with newly disclosed security flaws affecting the Next.JS Web Framework (CVE -2025‑29927, CVSS score: 9.1).

Exploitation, a vulnerability that bypasses authorization, could potentially circumvent middleware-based security checks by spoofing a header called “X-Middleware-SubRequest” that attackers use to manage internal request flows. This could allow unauthorized access to sensitive application resources, said Raphael Silva of CheckMarx.

“One of the identified payloads involves using X-Middleware-Request headers with the value SRC/Middleware: SRC/Middleware: SRC/Middleware: SRC/Middleware: SRC/Middleware: SRC/Middleware: SRC/Middleware: SRC/Middleware: SRC/Middleware”

“This approach simulates multiple internal subrequests within a single request and triggers internal redirection logic in next.js.

The disclosure also follows a warning from Greynoise about aggressive exploitation attempts recorded against some known vulnerabilities in Draytek devices.

Cybersecurity

The threat intelligence company said it saw wild activity observed for the following CVE identifiers –

CVE-2020-8515 (CVSS score: 9.8) – Operating system command injection vulnerability in multiple draytek router models that allow remote code execution as root as cgi-bin/mainfunction via shell metacharacter. An unauthorized attacker will allow downloading any file from the underlying operating system with root privileges via the download Fileservlet Endpoint CVE-2021-20124 (CVSS score: 7.5).

Indonesia, Hong Kong and the US have appeared as top countries in CVE-2020-8515 attack traffic, while Lithuania, the US and Singapore have been selected as part of the attacks that utilize CVE-2021-20123 and CVE-2021-20124.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNetAppSnapCenter flaws may allow users to gain remote admin access through plugin systems
Next Article The SPARC fusion reactor progresses with a gas injection breakthrough
user
  • Website

Related Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

July 30, 2025

Funksec Ransomware Decryptor was published for free after the group was dormant

July 30, 2025

Enabling remote hijacking via critical duffer camera defect ONVIF and file upload exploit

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Zuckerberg Signal Meta does not open source all of its “Superintelligence” AI models

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

Skechers make kids shoes with hidden air tag compartments

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.