Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm

Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm
Summary: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified five critical security vulnerabilities affecting various software from organizations including Cisco, Hitachi Vantara, Microsoft, and Progress. These vulnerabilities have been added to the Known Exploited Vulnerabilities (KEV) catalog due to documented instances of exploitation. Agencies are advised to implement mitigations to protect their networks against these threats.

Affected: Cisco, Hitachi Vantara, Microsoft, Progress

Keypoints :

  • CVE-2023-20118: Command injection vulnerability in Cisco routers allowing root-level access (Unpatched).
  • CVE-2022-43939: Authorization bypass in Hitachi’s Pentaho BA Server leading to unauthorized access (Fix scheduled for August 2024).
  • CVE-2022-43769: Special element injection vulnerability in Pentaho BA Server enabling arbitrary command execution (Fix scheduled for August 2024).
  • CVE-2018-8639: Windows kernel privilege escalation vulnerability (Fixed in December 2018).
  • CVE-2024-4885: Path traversal in Progress WhatsUp Gold enabling remote code execution (Fix scheduled for June 2024).
  • Exploitation of CVE-2023-20118 noted in the wild, contributing to botnet activities.
  • Ongoing exploitation attempts for CVE-2024-4885 observed from multiple global IP addresses.
  • FCEB agencies are urged to make necessary mitigations by March 24, 2025.

Source: https://thehackernews.com/2025/03/cisco-hitachi-microsoft-and-progress.html