Security Advisories: Jan 13 to 19, 2025

Title: January Security Update

Published Date: Jan 09, 2025

Risk Index: 4.67 of 10 (Medium)

Summary: A critical vulnerability has been identified in Ivanti Avalanche, specifically a Path Traversal vulnerability that allows a remote unauthenticated attacker to bypass authentication in versions prior to 6.4.7. This CVE (CVE-2024-13181) addresses incomplete fixes from the previous CVE-2024-47010.

If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data or execute arbitrary code on the affected system. They could potentially extract confidential information, disrupt system operations, and further exploit the compromised network for broader attacks.

Title: January Security Update

Published Date: Jan 09, 2025

Risk Index: 4.67 of 10 (Medium)

Summary: A critical vulnerability has been identified in the Path Traversal mechanism of Ivanti Avalanche before version 6.4.7 that allows a remote unauthenticated attacker to bypass authentication.

If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data or execute arbitrary code on the affected system. The potential impact includes unauthorized access to critical system files and directories, leading to data breaches, system compromises, and potentially allowing attackers to install malicious software, manipulate data, and further exploit the compromised system for additional attacks. The critical nature of these vulnerabilities, with a CVSS v3 score of 9.8, underscores the urgent need for remediation to prevent severe security breaches.

Title: Windows OLE Remote Code Execution Vulnerability

Published Date: Jan 14, 2025

Risk Index: 8.75 of 10 (High)

Summary: A critical vulnerability has been identified in the OLE component of Microsoft Windows. This vulnerability, identified as CVE-2025-21298, allows for remote code execution, potentially giving attackers a foothold into targeted systems.

If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data or execute arbitrary code on the affected system. This means an attacker could potentially take control of the system, manipulate or delete data, or even result in further lateral movement within a network to compromise additional systems.

Title: Command Injection vulnerability in Remote Support(RS) & Privilege Remote Access (PRA)

Published Date: Dec 18, 2024

Risk Index: 9.45 of 10 (Critical)

Summary: A critical vulnerability has been identified in Privileged Remote Access (PRA) and Remote Support (RS)

If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data and execute arbitrary commands on the affected system. The ramifications could include data breaches, unauthorized system modifications, and potential system takeovers, jeopardizing the security and stability of the entire IT infrastructure.

Title: Authentication bypass in FortiOS and FortiProxy

Published Date: Jan 14, 2025

Risk Index: 9.94 of 10 (Critical)

Summary: A critical vulnerability has been identified in the authentication mechanism of Fortinet’s FortiOS and FortiProxy software.

If exploited, this vulnerability could allow an attacker to gain super-admin privileges on the affected system, leading to unauthorized access to sensitive data, configuration manipulation, the execution of arbitrary commands, and widespread control over the network and devices managed by the compromised Fortinet systems.

Check out our Vulnerability Notices to keep up to date with the vulnerabilities to watch out for.ย 

Share This Post On