Ethical Hacking News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added several device flaws to its Known Exploited Vulnerabilities catalog, including the GeoVision Devices OS Command Injection Vulnerability with a CVSS score of 9.8. This vulnerability allows an unauthenticated remote attacker to inject and execute arbitrary system commands on affected devices. To address these vulnerabilities, organizations must review their systems and configurations, update software and firmware, and implement additional security measures such as firewalls and intrusion detection systems.
U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added several device flaws to its Known Exploited Vulnerabilities catalog. The catalog now includes the GeoVision Devices OS Command Injection Vulnerability with a CVSS score of 9.8, Broadcom Brocade Fabric OS vulnerability with a CVSS score of 8.3, and Qualitia Active! Mail vulnerability with a CVSS score of 7.8. These vulnerabilities were added to the catalog on May 8, 2025, and affect multiple devices from different manufacturers. The U.S. CISA orders federal agencies to fix these vulnerabilities by May 28, 2025. Private organizations are also advised to review the catalog and address the vulnerabilities in their infrastructure. Experts recommend that organizations take immediate action to patch these vulnerabilities and implement additional security measures such as firewalls and intrusion detection systems.
U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added several device flaws to its Known Exploited Vulnerabilities catalog, including the GeoVision Devices OS Command Injection Vulnerability with a CVSS score of 9.8. This vulnerability allows an unauthenticated remote attacker to inject and execute arbitrary system commands on affected devices. The same vulnerability was discovered by Shadowserver Foundation researchers in November 2024 and has been exploited by attackers to carry out DDoS or cryptomining attacks.
The catalog now includes the following device flaws:
* GeoVision Devices OS Command Injection Vulnerability with a CVSS score of 9.8
* Broadcom Brocade Fabric OS vulnerability with a CVSS score of 8.3
* Qualitia Active! Mail vulnerability with a CVSS score of 7.8
These vulnerabilities were added to the catalog on May 8, 2025.
The U.S. CISA adds GoVision device flaws to its Known Exploited Vulnerabilities catalog.
Pierluigi Paganini
May 08, 2025
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds GoVision device flaws to its Known Exploited Vulnerabilities catalog.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Qualitia Active! Mail, Broadcom Brocade Fabric OS, and Commvault Web Server flaws to its Known Exploited Vulnerabilities (KEV) catalog.
Below are the descriptions for these flaws:
CVE-2024-6047 (CVSS score 9.8) GeoVision Devices OS Command Injection Vulnerability. Multiple EOL GeoVision devices fail to properly filter user input for the specific functionality. An unauthenticated remote attacker can exploit the CVE-2024-6047 vulnerability to inject and execute arbitrary system commands on the device.
CVE-2024-11120 (CVSS score 9.8) GeoVision Devices OS Command Injection Vulnerability. An unauthenticated remote attacker can exploit this vulnerability to inject and execute arbitrary system commands on the device. The vulnerability has already been exploited by attackers in the wild. In November 2024, researchers at the Shadowserver Foundation observed a botnet exploiting the zero-day flaw CVE-2024-11120 in GeoVision EOL (end-of-Life) devices to compromise devices in the wild.
The vulnerabilities were added to the catalog on May 8, 2025. The U.S. CISA orders federal agencies to fix the vulnerabilities by May 28, 2025.
Private organizations are also advised to review the catalog and address the vulnerabilities in their infrastructure to protect against potential attacks.
In light of these recent additions to the Known Exploited Vulnerabilities catalog, device manufacturers and network administrators must take immediate action to address the vulnerabilities in their systems. The CVSS scores of these vulnerabilities indicate a high level of risk and impact for affected devices and networks. By implementing patches and updates as soon as possible, organizations can significantly reduce the risk of exploitation and minimize the potential damage caused by attackers.
In addition to device manufacturers, network administrators must also review their systems and configurations to ensure that they are not vulnerable to these exploits. This may involve conducting a thorough security audit, updating software and firmware, and implementing additional security measures such as firewalls and intrusion detection systems.
Experts recommend that organizations take the following steps to address the vulnerabilities:
1. Review the catalog: Organizations must review the Known Exploited Vulnerabilities catalog to identify affected devices and networks.
2. Conduct a security audit: A thorough security audit can help identify potential vulnerabilities in an organization's systems and configurations.
3. Update software and firmware: Organizations must update their software and firmware as soon as possible to patch the vulnerabilities identified in the catalog.
4. Implement additional security measures: Organizations can implement additional security measures such as firewalls, intrusion detection systems, and antivirus software to further reduce the risk of exploitation.
By taking these steps, organizations can significantly reduce the risk of exploitation and minimize the potential damage caused by attackers.
The U.S. CISA catalog is a growing concern for device manufacturers and network administrators, with several vulnerabilities added in recent days. Device manufacturers must take immediate action to address the vulnerabilities in their devices, while network administrators must review their systems and configurations to ensure that they are not vulnerable to these exploits.
In conclusion, the addition of GeoVision device flaws to the U.S. CISA catalog highlights the growing concern for vulnerability management in device manufacturing and network administration. Organizations must take immediate action to address these vulnerabilities to minimize the risk of exploitation and protect against potential attacks.
Related Information:
https://www.ethicalhackingnews.com/articles/The-US-CISA-Catalog-A-Growing-Concern-for-Device-Manufacturers-and-Network-Administrators-ehn.shtml
https://securityaffairs.com/177599/security/u-s-cisa-adds-govision-device-flaws-to-its-known-exploited-vulnerabilities-catalog.html
https://nvd.nist.gov/vuln/detail/CVE-2024-6047
https://www.cvedetails.com/cve/CVE-2024-6047/
https://nvd.nist.gov/vuln/detail/CVE-2024-11120
https://www.cvedetails.com/cve/CVE-2024-11120/
Published: Thu May 8 04:29:06 2025 by llama3.2 3B Q4_K_M