LOADING

Type to search

Cisco, Hitachi, Microsoft, and Progress Software Face Critical Vulnerabilities

News

Cisco, Hitachi, Microsoft, and Progress Software Face Critical Vulnerabilities

Share
Cisco, Hitachi, Microsoft, and Progress Software Face Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently identified critical vulnerabilities in Cisco, Hitachi, Microsoft, and Progress Software, exposing organizations to potential cyberattacks that could compromise sensitive data, disrupt operations, and facilitate unauthorized access. These vulnerabilities are actively being exploited by threat actors, heightening the urgency for immediate mitigation. As attackers continuously evolve their techniques, organizations must adopt a proactive approach to cybersecurity, reinforcing their defense mechanisms and implementing swift remediation strategies. Failure to act could leave networks vulnerable to breaches, financial losses, and reputational damage.

Cisco Small Business RV Series Routers Vulnerability (CVE-2023-20118)

A command injection vulnerability has been discovered in the web-based management interface of Cisco Small Business RV Series routers. This flaw allows authenticated remote attackers to execute arbitrary commands with root-level privileges, potentially accessing unauthorized data. Critical vulnerabilities in Cisco, Hitachi, Microsoft, and Progress Software have raised alarms among cybersecurity experts, particularly for enterprises relying on outdated infrastructure. Notably, Cisco has not released a patch for this vulnerability, as the affected routers have reached end-of-life status.

Hitachi Vantara Pentaho BA Server Vulnerabilities (CVE-2022-43939 and CVE-2022-43769)

Two significant vulnerabilities have been identified in Hitachi Vantara’s Pentaho Business Analytics (BA) Server, contributing to the growing concerns about critical vulnerabilities in Cisco, Hitachi, Microsoft, and Progress Software:

  • CVE-2022-43939: This authorization bypass vulnerability arises from the use of non-canonical URL paths for authorization decisions, allowing unauthorized access to restricted areas.
  • CVE-2022-43769: This special element injection vulnerability enables attackers to inject Spring templates into properties files, leading to arbitrary command execution.

Both vulnerabilities have been addressed in updates released in August 2024, specifically in versions 9.3.0.2 and 9.4.0.1. However, organizations must remain vigilant against critical vulnerabilities in Cisco, Hitachi, Microsoft, and Progress Software to ensure long-term security.

Microsoft Windows Win32k Vulnerability (CVE-2018-8639)

An improper resource shutdown or release vulnerability exists in Microsoft Windows’ Win32k component. This flaw allows local, authenticated users to escalate privileges and execute arbitrary code in kernel mode. Critical vulnerabilities in Cisco, Hitachi, Microsoft, and Progress Software continue to be a pressing concern, highlighting the need for proactive patch management. Microsoft addressed this vulnerability in December 2018.

Progress WhatsUp Gold Vulnerability (CVE-2024-4885)

A critical path traversal vulnerability has been identified in Progress WhatsUp Gold, permitting unauthenticated attackers to achieve remote code execution. This issue was resolved in version 2023.1.3, released in June 2024. Cybersecurity experts warn that critical vulnerabilities in Cisco, Hitachi, Microsoft, and Progress Software could serve as entry points for cybercriminals targeting unpatched systems.

Active Exploitation and Mitigation Efforts

While specific details on the exploitation of these vulnerabilities are limited, notable instances include:

  • CVE-2023-20118: French cybersecurity firm Sekoia reported that threat actors are exploiting this vulnerability to incorporate vulnerable routers into a botnet known as PolarEdge.
  • CVE-2024-4885: The Shadowserver Foundation observed exploitation attempts targeting this flaw as of August 1, 2024. Data from GreyNoise indicates that multiple unique IP addresses from regions including Hong Kong, Russia, Brazil, South Korea, and the United Kingdom are involved in these malicious activities.

In response to these threats, CISA has added these vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. Federal Civilian Executive Branch (FCEB) agencies are mandated to apply necessary mitigations by March 24, 2025, to secure their networks against potential exploits. Critical vulnerabilities in Cisco, Hitachi, Microsoft, and Progress Software remain a significant concern for security teams worldwide.

Recommendations for Organizations

Cisco Small Business RV Series Routers (CVE-2023-20118)

  • Action Required: Discontinue the use of affected routers as no patch is available.
  • Alternative: Replace with newer, supported Cisco models or use a third-party firewall to mitigate risks.
  • Temporary Mitigation: Restrict management access to trusted networks only.

Hitachi Vantara Pentaho BA Server (CVE-2022-43939 & CVE-2022-43769)

  • Action Required: Upgrade immediately to version 9.3.0.2 or 9.4.0.1.
  • Verification: Ensure non-canonical URL paths are restricted in access control settings.
  • Additional Precaution: Regularly scan for unauthorized file modifications or access attempts.

Microsoft Windows Win32k (CVE-2018-8639)

  • Action Required: Verify that December 2018 security updates have been installed across all Windows systems.
  • For Legacy Systems: If using an unsupported Windows version, apply available mitigations or transition to a newer OS.
  • Additional Precaution: Limit administrative privileges to reduce attack surface.

Progress WhatsUp Gold (CVE-2024-4885)

  • Action Required: Update to version 2023.1.3 immediately.
  • Verification: Conduct a vulnerability scan post-update to confirm the fix is applied.
  • Additional Precaution: Restrict network access to the affected application and monitor for unauthorized requests.

Summary

The vulnerabilities in Cisco, Hitachi, Microsoft, and Progress Software highlight the ongoing cybersecurity risks that organizations face. These security flaws, actively exploited by cybercriminals, pose severe threats, from unauthorized access to potential system takeovers. Each identified vulnerability—whether in routers, analytics platforms, or operating systems—requires immediate attention and remediation.

Organizations should prioritize upgrading or replacing outdated hardware, applying necessary security patches, and strengthening access control measures. The inclusion of these vulnerabilities in CISA’s Known Exploited Vulnerabilities (KEV) catalog underscores their urgency. Without prompt action, businesses risk exposure to cyberattacks that could lead to operational disruption, financial losses, and reputational damage. By proactively addressing these issues, organizations can strengthen their security posture and safeguard their digital assets.

Author

  • Maya Pillai is a tech writer with 20+ years of experience curating engaging content. She can translate complex ideas into clear, concise information for all audiences.

    View all posts
Tags:
Maya Pillai

Maya Pillai is a tech writer with 20+ years of experience curating engaging content. She can translate complex ideas into clear, concise information for all audiences.

  • 1

You Might also Like

Leave a Comment

Your email address will not be published. Required fields are marked *