in OpenHarmony v5
Description
in OpenHarmony v5
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Search and filter 8341 vulnerabilities with AI analyst insights
in OpenHarmony v5
in OpenHarmony v5
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
FEDERAL DEADLINE: November 9, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. FEDERAL DEADLINE: November 9, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Deadline: November 9, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] There are multiple i...
[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] There are multiple issues related to the handling and accessing of gue...
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
During startup, the device automatically logs in the EPC2 Windows user without requesting a password
During startup, the device automatically logs in the EPC2 Windows user without requesting a password
The hard drives of the device are not encrypted using a full volume encryption feature such as BitLocker
The hard drives of the device are not encrypted using a full volume encryption feature such as BitLocker
Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability - Active in CISA KEV catalog.
FEDERAL DEADLINE: November 9, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. FEDERAL DEADLINE: November 9, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Deadline: November 9, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
The SMB server's login mechanism does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame,...
The SMB server's login mechanism does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks
The MEAC300-FNADE4 does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susc...
The MEAC300-FNADE4 does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks
The web application is susceptible to cross-site-scripting attacks
The web application is susceptible to cross-site-scripting attacks
HTML injection in Project Release in Altium Enterprise Server (AES) 7
HTML injection in Project Release in Altium Enterprise Server (AES) 7
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
AES contains a SQL injection vulnerability due to an inactive configuration that prevents the latest SQL parsing logic from being applied
AES contains a SQL injection vulnerability due to an inactive configuration that prevents the latest SQL parsing logic from being applied
Apply vendor patches immediately. Review database access controls and enable query logging.
TRUfusion Enterprise through 7
TRUfusion Enterprise through 7
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/fileupload endpoint to upload files. However, the application doesn't properly sanitiz...
TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/fileupload endpoint to upload files. However, the application doesn't properly sanitize the input to this endpoint, ultimately allowing ...
Executive Summary:
A critical vulnerability exists in multiple TRUfusion Enterprise products that allows for an unauthenticated file upload. This flaw could be exploited by a remote attacker to upload a malicious file, leading to arbitrary code execution on the server. Successful exploitation would result in a complete compromise of the affected system, allowing an attacker to steal data, disrupt services, and gain a foothold into the broader network.
Vulnerability Details
CVE-ID: CVE-2025-27224
Affected Software: TRUfusion Enterprise through Multiple Products
Affected Versions: All versions up to and including 7.10.4.0
Vulnerability: The TRUfusion Enterprise software contains an unrestricted file upload vulnerability in the /trufusionPortal/fileupload endpoint. The application fails to properly validate or sanitize the types of files being uploaded, allowing an unauthenticated remote attacker to upload a malicious file, such as a web shell (e.g., a .jsp or .php file). After a successful upload, the attacker can navigate to the file's location on the server and execute arbitrary code with the permissions of the web server's user account, leading to a full system compromise.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could lead to severe business consequences, including the complete compromise of the TRUfusion server. An attacker could exfiltrate sensitive corporate or customer data, cause significant service disruption, or use the compromised server as a pivot point to launch further attacks against the internal network. The potential for data breaches carries significant risks, including reputational damage, financial loss, and regulatory penalties.
Remediation Plan
Immediate Action: The primary remediation is to immediately apply the vendor-supplied security patches. Organizations should update all instances of TRUfusion Enterprise to a version later than 7.10.4.0. Before and after patching, it is crucial to review web server access logs for any suspicious POST requests to the /trufusionPortal/fileupload endpoint to identify potential signs of compromise.
Proactive Monitoring: Implement enhanced monitoring of the TRUfusion server. Security teams should look for an increase in POST requests to the /trufusionPortal/fileupload endpoint, especially those originating from unknown IP addresses or containing suspicious file extensions (e.g., .jsp, .php, .aspx, .sh). Monitor for any outbound network connections from the server to untrusted destinations and for the creation of unexpected files or processes in the web application's directories.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce risk:
/trufusionPortal/fileupload endpoint.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of October 27, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, given the critical severity (CVSS 9.8) and the relative simplicity of exploiting unrestricted file upload vulnerabilities, it is highly probable that threat actors will develop exploits in the near future. The vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Given the critical CVSS score of 9.8, this vulnerability represents a significant and immediate threat to the organization. We strongly recommend that all affected TRUfusion Enterprise instances be patched immediately to prevent potential system compromise. Although this CVE is not yet on the CISA KEV list, its high severity makes it an attractive target for attackers. Organizations must prioritize the deployment of the vendor's patch and implement the recommended monitoring and compensating controls without delay.
Update TRUfusion Enterprise through Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
TRUfusion Enterprise through 7
TRUfusion Enterprise through 7
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
TRUfusion Enterprise through 7
TRUfusion Enterprise through 7
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A Server-Side Request Forgery (SSRF) in the UISP Application may allow a malicious actor with certain permissions to make requests outside of UISP App...
A Server-Side Request Forgery (SSRF) in the UISP Application may allow a malicious actor with certain permissions to make requests outside of UISP Application scope.
Update A Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
Multiple Incorrect Permission Assignment for Critical Resource in UISP Application may allow a malicious actor with certain permissions to escalate pr...
Multiple Incorrect Permission Assignment for Critical Resource in UISP Application may allow a malicious actor with certain permissions to escalate privileges
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An Improper Access Control could allow a malicious actor authenticated in the API of certain UniFi Connect Display Cast devices to make unsupported ch...
An Improper Access Control could allow a malicious actor authenticated in the API of certain UniFi Connect Display Cast devices to make unsupported changes to the system
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A Missing Authentication for Critical Function vulnerability in the UniFi Connect EV Station Pro may allow a malicious actor with physical or adjacent...
A Missing Authentication for Critical Function vulnerability in the UniFi Connect EV Station Pro may allow a malicious actor with physical or adjacent access to perform an unauthorized factory reset. ...
Update A Missing Authentication for Critical Function vulnerability in the UniFi Connect EV Station Pro may allow a malicious actor with physical or adjacent access to perform an unauthorized factory Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access manageme...
An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network. Affected Products: UniFi Acce...
Update An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
An Improper Input Validation in EdgeMAX EdgeSwitch (Version 1
An Improper Input Validation in EdgeMAX EdgeSwitch (Version 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution...
Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does re...
Executive Summary:
A critical vulnerability has been identified in Adobe Connect, rated 9.6 out of 10.0 in severity. This flaw, a Deserialization of Untrusted Data, allows a remote, unauthenticated attacker to execute arbitrary code on the server. Successful exploitation could lead to a complete system compromise, enabling attackers to steal sensitive data, disrupt services, or use the server to launch further attacks on the internal network.
Vulnerability Details
CVE-ID: CVE-2025-27203
Affected Software: Adobe Connect
Affected Versions: 24.0 and earlier
Vulnerability: This vulnerability is a Deserialization of Untrusted Data flaw. The Adobe Connect application fails to properly validate data it receives before deserializing it (the process of restoring a data stream to an object). An unauthenticated remote attacker can craft a malicious serialized object and send it to the application. When the application processes this malicious object, it can trigger the execution of arbitrary code with the privileges of the Adobe Connect service account, leading to a full compromise of the server.
Business Impact
This vulnerability is rated as critical with a CVSS score of 9.6. Successful exploitation would have a severe business impact, leading to Remote Code Execution (RCE) on the underlying server. Potential consequences include a complete compromise of the Adobe Connect server, theft of sensitive information such as user credentials, meeting recordings, and proprietary documents, and service disruption. A compromised server could also serve as a pivot point for attackers to gain access to the broader corporate network, escalating the incident significantly.
Remediation Plan
Immediate Action: Organizations must immediately apply the security updates provided by Adobe. All instances of Adobe Connect version 24.0 and earlier should be upgraded to the latest patched version as specified in the vendor's security advisory.
Proactive Monitoring: Monitor Adobe Connect application logs and underlying web server logs for unusual or malformed requests, especially those containing serialized data patterns. System administrators should monitor for unexpected processes spawned by the Adobe Connect service, unusual outbound network connections from the server, and high CPU or memory utilization that could indicate malicious activity.
Compensating Controls: If immediate patching is not feasible, consider implementing a Web Application Firewall (WAF) with rules specifically designed to detect and block deserialization attack payloads. Additionally, restrict network access to the Adobe Connect server's management interfaces and application ports to only trusted IP addresses and network segments.
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of the publication date (2025-07-08), there are no known public exploits for this vulnerability. However, deserialization vulnerabilities are a well-understood class of bug, and proof-of-concept (PoC) exploit code is often developed quickly by security researchers and threat actors. Organizations should assume this vulnerability will be actively targeted in the near future due to its high severity and potential for reliable exploitation.
Analyst Recommendation
Given the critical CVSS score of 9.6 and the high potential for full system compromise, this vulnerability poses a significant risk to the organization. We strongly recommend that all system owners apply the vendor-provided patches to affected Adobe Connect instances with the utmost urgency. Although this CVE is not currently on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity makes it a prime candidate for future inclusion. Prioritize patching these systems immediately to prevent potential data breaches and unauthorized access to your network.
Update Adobe Connect versions Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
An authentication bypass vulnerability exists in the HTTP authentication functionality of Tenda AC6 V5.0 V02.03.01.110. A specially crafted HTTP reque...
An authentication bypass vulnerability exists in the HTTP authentication functionality of Tenda AC6 V5.0 V02.03.01.110. A specially crafted HTTP request can lead to arbitrary code execution. An attack...
Update An authentication bypass vulnerability exists in the HTTP authentication functionality of Tenda Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
in OpenHarmony v5
in OpenHarmony v5
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing message in guest VM
Memory corruption while processing message in guest VM
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing simultaneous requests via escape path
Memory corruption while processing simultaneous requests via escape path
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing IOCTL command with larger buffer in Bluetooth Host
Memory corruption while processing IOCTL command with larger buffer in Bluetooth Host
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing a GP command response
Memory corruption while processing a GP command response
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Transient DOS while creating NDP instance
Transient DOS while creating NDP instance
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing specific files in Powerline Communication Firmware
Memory corruption while processing specific files in Powerline Communication Firmware
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while performing encryption and decryption commands
Memory corruption while performing encryption and decryption commands
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing DDI command calls
Memory corruption while processing DDI command calls
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing an IOCTL command with an arbitrary address
Memory corruption while processing an IOCTL command with an arbitrary address
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing DDI call with invalid buffer
Memory corruption while processing DDI call with invalid buffer
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Transient DOS while processing an ANQP message
Transient DOS while processing an ANQP message
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Transient DOS while processing a frame with malformed shared-key descriptor
Transient DOS while processing a frame with malformed shared-key descriptor
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption during video playback when video session open fails with time out error
Memory corruption during video playback when video session open fails with time out error
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while handling client exceptions, allowing unauthorized channel access
Memory corruption while handling client exceptions, allowing unauthorized channel access
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption whhile handling the subsystem failure memory during the parsing of video packets received from the video firmware
Memory corruption whhile handling the subsystem failure memory during the parsing of video packets received from the video firmware
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while performing SCM call with malformed inputs
Memory corruption while performing SCM call with malformed inputs
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while performing SCM call
Memory corruption while performing SCM call
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing packet data with exceedingly large packet
Memory corruption while processing packet data with exceedingly large packet
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption during sub-system restart while processing clean-up to free up resources
Memory corruption during sub-system restart while processing clean-up to free up resources
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption during the image encoding process
Memory corruption during the image encoding process
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing a malformed license file during reboot
Memory corruption while processing a malformed license file during reboot
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption during PlayReady APP usecase while processing TA commands
Memory corruption during PlayReady APP usecase while processing TA commands
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing data packets in diag received from Unix clients
Memory corruption while processing data packets in diag received from Unix clients
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing command message in WLAN Host
Memory corruption while processing command message in WLAN Host
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing event close when client process terminates abruptly
Memory corruption while processing event close when client process terminates abruptly
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Memory corruption while processing camera platform driver IOCTL calls
Memory corruption while processing camera platform driver IOCTL calls
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical vulnerability, identified as CVE-2025-27466, has been discovered affecting multiple products from an unknown vendor. This flaw carries a CVSS score of 9.8, indicating a high risk of exploitation by an unauthenticated remote attacker, which could lead to a complete system compromise, data theft, and significant operational disruption. Immediate patching and proactive monitoring are required to mitigate this severe threat.
Vulnerability Details
CVE-ID: CVE-2025-27466
Affected Software: Unknown Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: Based on the critical CVSS score of 9.8, this vulnerability likely allows for unauthenticated remote code execution (RCE). The partial description suggests the flaw resides in the improper handling of guest sessions or user input. An unauthenticated remote attacker could likely send a specially crafted request to an affected system, bypassing access controls and executing arbitrary commands with the privileges of the application service, leading to a full system compromise.
Business Impact
The business impact of this vulnerability is rated as critical. A successful exploit could grant an attacker complete control over the affected systems, leading to severe consequences such as the exfiltration of sensitive corporate or customer data, manipulation of critical information, and deployment of ransomware. The resulting operational downtime, reputational damage, and potential regulatory fines for data breaches pose a significant risk to the organization.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected products immediately. Prioritize patching for internet-facing systems. After patching, verify that the update has been successfully installed and the vulnerability is resolved.
Proactive Monitoring: Implement enhanced monitoring on affected systems. Security teams should actively look for unusual patterns in network traffic, unexpected outbound connections, anomalous guest user activity in application logs, and any signs of unauthorized processes or command execution on the underlying servers.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of Sep 11, 2025, there are no known public exploits for this vulnerability, and it is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, due to the critical 9.8 CVSS score, it is highly probable that threat actors and security researchers are actively working to develop an exploit. The lack of a public exploit should not diminish the urgency of remediation.
Analyst Recommendation
Given the critical severity (CVSS 9.8) of CVE-2025-27466, we strongly recommend that immediate action is taken to patch all vulnerable systems. The potential for unauthenticated remote code execution presents a direct and severe threat to the confidentiality, integrity, and availability of organizational data and systems. While this CVE is not yet on the CISA KEV list, its high score makes it an attractive target for exploitation. Organizations must prioritize the vendor-supplied updates and implement the recommended monitoring and compensating controls without delay.