Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Amazon to cut 14,000 corporate jobs

Short-chain PFAS detected in blood of Wilmington residents

Why early threat detection is essential for long-term business growth

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cisa warns about defects in Sitecore RCE. Active exploits hit next.js and draytek devices
Identity

Cisa warns about defects in Sitecore RCE. Active exploits hit next.js and draytek devices

userBy userMarch 27, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 27, 2025Ravi LakshmananVulnerability/Threat Intelligence

Based on evidence of active exploitation, the US Cybersecurity and Infrastructure Security Agency (CISA) has added two six-year-old security flaws that affect Sitecore CMS and Experience Platform (XP) to its known exploited vulnerabilities (KEV) catalogue.

The vulnerabilities are listed below –

CVE-2019-9874 (CVSS score: 9.8) – sitecore.security.anticsrf module relaxation vulnerability. This allows unauthorized attackers to send serialized .net objects with http posts in cve-2019-9875 (cve-2019-9875) in http posts. A de-izalisation vulnerability in the Sitecore.security.anticsRf module allows an authenticated attacker to send serialized .NET objects with HTTP POST PARAMETER __CSRFTOKEN to execute arbitrary code.

Currently in an update shared on March 30, 2020, Sitecore states that it is “aware of aggressive exploitation” of CVE-2019-9874, but there is no details as to whom the flaws are currently weaponized. The company has not mentioned the misuse of CVE-2019-9875.

Cybersecurity

In light of aggressive exploitation, federal agencies must ensure that they have their networks by April 16, 2025.

Akamai evolves as stated that early exploit attempts were observed to investigate potential servers with newly disclosed security flaws affecting the Next.JS Web Framework (CVE -2025‑29927, CVSS score: 9.1).

Exploitation, a vulnerability that bypasses authorization, could potentially circumvent middleware-based security checks by spoofing a header called “X-Middleware-SubRequest” that attackers use to manage internal request flows. This could allow unauthorized access to sensitive application resources, said Raphael Silva of CheckMarx.

“One of the identified payloads involves using X-Middleware-Request headers with the value SRC/Middleware: SRC/Middleware: SRC/Middleware: SRC/Middleware: SRC/Middleware: SRC/Middleware: SRC/Middleware: SRC/Middleware: SRC/Middleware”

“This approach simulates multiple internal subrequests within a single request and triggers internal redirection logic in next.js.

The disclosure also follows a warning from Greynoise about aggressive exploitation attempts recorded against some known vulnerabilities in Draytek devices.

Cybersecurity

The threat intelligence company said it saw wild activity observed for the following CVE identifiers –

CVE-2020-8515 (CVSS score: 9.8) – Operating system command injection vulnerability in multiple draytek router models that allow remote code execution as root as cgi-bin/mainfunction via shell metacharacter. An unauthorized attacker will allow downloading any file from the underlying operating system with root privileges via the download Fileservlet Endpoint CVE-2021-20124 (CVSS score: 7.5).

Indonesia, Hong Kong and the US have appeared as top countries in CVE-2020-8515 attack traffic, while Lithuania, the US and Singapore have been selected as part of the attacks that utilize CVE-2021-20123 and CVE-2021-20124.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNetAppSnapCenter flaws may allow users to gain remote admin access through plugin systems
Next Article The SPARC fusion reactor progresses with a gas injection breakthrough
user
  • Website

Related Posts

Why early threat detection is essential for long-term business growth

October 28, 2025

Is your Google Workspace as secure as you think?

October 28, 2025

Chrome zero-day exploited to deliver LeetAgent spyware from Italy’s Memento Labs

October 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Amazon to cut 14,000 corporate jobs

Short-chain PFAS detected in blood of Wilmington residents

Why early threat detection is essential for long-term business growth

America unveils Discovery and Lux ​​AI supercomputers

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.