Check the status of CVEs. Learn More.
Keeping your systems up 100% of the time requires live patching. Our solutions will align strongly with your risk, compliance, and operational uptime requirements.
TuxCare is trusted by the most innovative companies across the globe.
Learn about TuxCare's modern approach to reducing cybersecurity risk with Blogs, White Papers, and more.
Continually increasing Cybersecurity, stability, and availability of Linux servers and open source software since 2009.
TuxCare provides live security patching for numerous industries. Learn how TuxCare is minimizing risk for companies around the world.
Follow Us on Social
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a Bitbucket Server RCE and two Microsoft Exchange zero-days to its list of exploited vulnerabilities.
The Bitbucket flaw is a critical vulnerability in Atlassian’s Bitbucket Server and Data Center that is tracked as CVE-2022-36804.
There is a publicly available proof of concept exploit code for the vulnerability that could increase hackers targeting the flaw.
Exploiting the vulnerability via malicious HTTP requests allows attackers to gain remote code execution. This vulnerability affects all Bitbucket Server and Data Center versions after 6.10.17, including 7.0.0 and up to 8.3.0. According to security researchers from BinaryEdge and GreyNoise, attackers have started searching for the vulnerability since September 20 to exploit it.
The other two vulnerabilities added to the CISA list of exploited vulnerabilities are the two Microsoft Exchange zero-days (CVE-2022-41040 and CVE-2022-41082) exploited in limited targeted attacks. Although the company has yet to release security updates to fix the exploited bugs, it urges its customers to add an IIS server-blocking rule that would block attack attempts.
CISA asked all Federal Civilian Executive Branch Agencies (FCEB) to apply patches or mitigation measures for the three actively exploited bugs. The federal agencies were given three weeks until October 21 to ensure that exploitation attempts were blocked.
Since appropriate and timely patching will help reduce the scope of potential attacks, the U.S. Cybersecurity Agency urged all private and public organizations worldwide to prioritize patching these vulnerabilities, even though BOD 22-01 applies only to U.S. FCEB agencies.
The sources for this piece include an article in BleepingComputer.
TALK TO A CYBERSECURITY EXPERT
Stay updated with the latest news and announcements from TuxCare.com
ESET researchers discovered an ongoing campaign by the Bahamut APT...
A memory leak bug on Local Security Authority Subsystem Service...
After discovering malicious behaviors in 1,652 of 250,000 unverified Linux...
Despite fixes released by the chipmaker, a set of five...
The APT group DefrayX has launched a new version of...
DuckDuckGo, a privacy-focused search engine, has added an App Tracking...