Back

CISA Identifies Active Vulnerabilities in ConnectWise and Windows Systems

Severity: High (Score: 75.2)

Sources: Foro3D, Thehackernews

Summary

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two active vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. The first vulnerability affects ConnectWise, a remote management platform, allowing remote code execution due to poor authentication. The second vulnerability is a kernel privilege escalation flaw in the Windows operating system, which is currently being exploited in active campaigns. CISA emphasizes the urgency of applying patches for both vulnerabilities, as they pose significant risks to critical systems. Attackers with medium resources can exploit these flaws, underscoring the need for immediate updates. The Windows patch has been available for weeks, yet many systems remain unpatched. System administrators are urged to prioritize these updates to prevent potential breaches. Failure to act could leave systems vulnerable to exploitation. Key Points: • CISA added two critical vulnerabilities to its KEV catalog affecting ConnectWise and Windows. • The ConnectWise flaw allows remote code execution, while the Windows flaw enables privilege escalation. • Patches for both vulnerabilities are available, and immediate application is strongly recommended.

Key Entities

Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed