Alert da Computer Emergency Response Team internazionali (CERT-EU, CISA)
Latest publications of type Security Advisories RSS feed for the latest 10 publications of type Security Advisories.
- 2026-002: Multiple Vulnerabilities in Cisco Productson 26 Febbraio 2026 at 6:38 pm
On 25 February 2026, Cisco released security advisories addressing multiple high and critical severity vulnerabilities in Cisco Catalyst SD-WAN controllers and Cisco SD-WAN Manager. If exploited, these vulnerabilities could allow attackers to gain administrative access to compromised systems. It is recommended to capture forensic evidence, hunt for indicators of compromise, and apply updates as soon as possible. One of the vulnerabilities, CVE-2026-20127, is exploited in the wild since 2023.
- 2026-001: Critical vulnerabilities in Ivanti EPMMon 30 Gennaio 2026 at 9:09 am
On 29 January 2026, Ivanti released a security advisory addressing two critical vulnerabilities in their EPMM products. An attacker could exploit those flaws to achieve unauthenticated remote code execution on the vulnerable device. One of these vulnerabilities have been exploited in a limited number of cases.
- 2025-042: Critical Vulnerability in Cisco Secure Email and Web Manageron 18 Dicembre 2025 at 9:08 am
On December 17, 2025, Cisco released a security advisory for a critical vulnerability affecting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager products. It is recommended to follow Cisco’s recommendations to check whether vulnerable appliances have been compromised, and to remediate the issue. There is no patch available for this vulnerability yet.
- 2025-041: Critical Security Vulnerability in React Server Componentson 4 Dicembre 2025 at 1:50 pm
On December 3, 2025, the React Team publicly disclosed a critical security vulnerability affecting React Server Components (RSC) and related packages. The vulnerability allows for unauthenticated remote code execution (RCE) via maliciously crafted HTTP requests. It is recommended to update all affected component packages and any frameworks that integrate them.
- 2025-040: Critical Vulnerability in Windows Server Update Service (WSUS)on 24 Ottobre 2025 at 4:42 pm
On October 23, 2025, Microsoft released an out-of-band update to address a critical vulnerability in Windows Server Update Service (WSUS). This vulnerability could allow a remote unauthenticated attacker to execute code on the targeted systems. A proof-of-concept is publicly available for this vulnerability. It is recommended to update as soon as possible.
- 2025-039: High Severity Vulnerability in FortiOSon 15 Ottobre 2025 at 6:41 pm
On October 14, 2025, Fortinet released a security advisory addressing a high severity vulnerability in its FortiOS product. It is recommended updating affected products.
- 2025-038: Critical Vulnerabilities in Veeam Backupon 15 Ottobre 2025 at 6:40 pm
On October 14, 2025, Veeam released a security advisory addressing multiple vulnerabilities including 2 critical in its Veeam Backup product. CERT-EU recommends updating affected software as soon as possible and following Veeam implementation best practices.
- 2025-037: Multiple Vulnerabilities in F5 Productson 15 Ottobre 2025 at 5:01 pm
On October 15, 2025, F5 disclosed that a sophisticated nation-state actor breached its systems and maintained long-term persistent access into F5’s infrastructure. This included access to BIG-IP product development source code and to information related to security vulnerabilities that had not yet been disclosed nor patched. F5 released patches on the same day to address the vulnerabilities. There is currently no known exploitation of these vulnerabilities. CERT-EU strongly recommends to patch affected F5 products as soon as possible.
- 2025-036: Critical Vulnerabilities in Cisco ASA and FTDon 26 Settembre 2025 at 1:39 pm
On September 25, 2025, Cisco released several security advisories addressing 3 vulnerabilities, 2 of which are critical. Cisco warns that some of those vulnerabilities are exploited in the wild and assesses with high confidence that this new activity is related to the same threat actor as the ArcaneDoor attack campaign that Cisco reported in early 2024. It is recommended running compromise assessment on Internet facing vulnerable devices, and update as soon as possible.
- 2025-035: High Vulnerability in Cisco IOS and IOS XE Softwareon 26 Settembre 2025 at 7:03 am
On September 24, 2025, Cisco released a security advisory regarding a high severity vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software. The vulnerability is being exploited in the wild. It is recommended updating as soon as possible and conduct a compromise assessment on devices that are exposing SNMP on the Internet. It is also recommended not allowing access to SNMP over untrusted network (i.e. on the Internet).