Fortinet has patched CVE-2023-34990 in its Wireless LAN Manager (FortiWLM), which combined with CVE-2023-48782 could allow for unauthenticated remote code execution (RCE) and the ability to read all log files.
| LATEST SECURITY NEWS & COMMENTARY | Fortinet Addresses Unpatched Critical RCE Vector Fortinet has patched CVE-2023-34990 in its Wireless LAN Manager (FortiWLM), which combined with CVE-2023-48782 could allow for unauthenticated remote code execution (RCE) and the ability to read all log files. OT/ICS Engineering Workstations Face Barrage of Fresh Malware Cyberattacks against OT/ICS engineering workstations are widely underestimated, according to researchers who discovered malware designed to shut down Siemens workstation engineering processes. Orgs Scramble to Fix Actively Exploited Bug in Apache Struts 2 A newly discovered vulnerability, CVE-2024-53677, in the aging Apache framework is going to cause major headaches for IT teams, since patching isn't enough to fix it. Malvertisers Fool Google With AI-Generated Decoy Content Seemingly innocent "white pages," including an elaborate Star Wars-themed site, are bypassing Google's malvertising filters, showing up high in search results to lure users to second-stage phishing sites. Supply Chain Risk Mitigation Must Be a Priority in 2025 A balance of rigorous supplier validation, purposeful data exposure, and meticulous preparation is key to managing and mitigating risk. MORE NEWS / MORE COMMENTARY | | | PRODUCTS & RELEASES | Wallarm Releases API Honeypot Report Highlighting API Attack Trends Delinea Joins CVE Numbering Authority Program CompTIA Xpert Series Expands With SecurityX Professional Certification CISA Directs Federal Agencies to Secure Cloud Environments MORE PRODUCTS & RELEASES |
|
Dark Reading Daily -- Published By Dark Reading Operated by TechTarget, Inc. and its subsidiaries, 275 Grove Street, Newton, Massachusetts, 02466 US | To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|