Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. Multiple flaws in DrayTek residential and enterprise routers can be exploited to fully compromise vulnerable devices. The flaws impact residential and enterprise routers manufactured by DrayTek that could be exploited to take over susceptible devices. Critical Zimbra Postjournal flaw CVE-2024-45519 actively exploited in the wild. Critical Zimbra Postjournal flaw CVE-2024-45519 actively exploited in the wild. Critical Zimbra Postjournal flaw CVE-2024-45519 actively exploited in the wild. Forescout researchers discovered 14 new vulnerabilities in DrayTek routers, two of which have been rated as critical. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. This category only includes cookies that ensures basic functionalities and security features of the website. On September 18, 2024, the FBI dismantled a botnet exploiting three DrayTek CVEs, and CISA recently added two more to its Known Exploited Vulnerabilities list. DrayTek is among many vendors that does not appear to conduct the necessary variant analysis and post-mortem analysis after vulnerability reports — which could lead to long-term improvements.” concludes the report. It is mandatory to procure user consent prior to running these cookies on your website. Critical Ghostscript flaw exploited in the wild. We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. Necessary cookies are absolutely essential for the website to function properly. “The “GetCGI()” function in the Web UI, responsible for retrieving HTTP request data, is vulnerable to a buffer overflow when processing the query string parameters.” reads the advisory. “Compared to our research on OT, we found a smaller percentage of unpatched and end-of-life IT routers in DrayTek compared to OT routers (Sierra Wireless). This website uses cookies to improve your experience while you navigate through the website. The experts reported that over 704,000 DrayTek routers are exposed online in 168 countries, posing a serious risk to customers. Vulnerabilities in these devices could be exploited for cyber espionage, data theft, ransomware and DoS attacks. A successful attack could lead to significant downtime, loss of customer trust and regulatory penalties, all of which fall squarely on a CISO’s shoulders.” reads the report published by Forescout. We also use third-party cookies that help us analyze and understand how you use this website. Expert released PoC exploit code for Veeam Backup Enterprise Manager flaw CVE-2024-29849. VMware fixed a critical flaw in Aria Automation. Experts released PoC exploit code for VMware Aria Operations for Logs flaw. DrayTek already released security updates to address the vulnerabilities reported by Forescout. Critical flaw found in deprecated VMware EAP. The second critical issue, tracked as CVE-2024-41585, is an OS command exec / VM escape vulnerability. The “recvCmd” binary, which facilitates communication between the host and guest operating systems, is vulnerable to OS command injection attacks. “Since 75% of these routers are used in commercial settings, the implications for business continuity and reputation are severe. These cookies will be stored in your browser only with your consent.
This Cyber News was published on securityaffairs.com. Publication date: Wed, 02 Oct 2024 19:43:09 +0000