Close Menu

    Subscribe to Updates

    Get the latest tech news from Tallwire.

      What's Hot

      The Gaming World as of April 2026

      April 15, 2026

      Amazon Buys Satellite Company Globalstar- It’s About Control of Space-Based Connectivity

      April 15, 2026

      Artemis II Splashdown Signals A Step Closer to Mass Space Travel

      April 12, 2026
      Facebook X (Twitter) Instagram
      • Tech
      • AI
      • Get In Touch
      Facebook X (Twitter) LinkedIn
      TallwireTallwire
      • Tech

        The Gaming World as of April 2026

        April 15, 2026

        Amazon Buys Satellite Company Globalstar- It’s About Control of Space-Based Connectivity

        April 15, 2026

        NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

        April 8, 2026

        OpenAI Expands Influence With Strategic TBPN Media Acquisition

        April 8, 2026

        Cybersecurity Veteran Turns Focus To Drone Hacking After Decades Battling Malware

        April 6, 2026
      • AI

        Anthropic Code Leak Raises Questions About AI Security and Industry Oversight

        April 8, 2026

        The Rise Of Agentic AI Signals A Shift From Tools To Autonomous Digital Actors

        April 8, 2026

        AI Chatbots Draw Scrutiny As Teens Engage In Intimate Roleplay And Emotional Dependency

        April 8, 2026

        Ai-Powered Startup Signals Rise Of One-Person Billion-Dollar Companies

        April 8, 2026

        OpenAI Secures Historic $122 Billion Funding Round at $852 Billion Valuation

        April 7, 2026
      • Security

        Anthropic Code Leak Raises Questions About AI Security and Industry Oversight

        April 8, 2026

        DeFi Platform Drift Halts Operations After Multi-Million Dollar Crypto Hack

        April 7, 2026

        Fake WhatsApp App Exposes Users To Government Spyware Operation

        April 7, 2026

        ICE Deploys Controversial Spyware Tool In Drug Trafficking Investigations

        April 7, 2026

        Telehealth Firm Discloses Breach Amid Rising Digital Health Vulnerabilities

        April 6, 2026
      • Health

        European Crackdown Targets Social Media’s Impact on Children

        April 8, 2026

        AI Chatbots Draw Scrutiny As Teens Engage In Intimate Roleplay And Emotional Dependency

        April 8, 2026

        Australia Moves To Curb Social Media Addiction Among Youth With Expanded Under-16 Ban

        April 5, 2026

        Australia’s eSafety Regulator Warns Big Tech As Teens Circumvent Social Media Restrictions

        April 5, 2026

        Meta Finally Held Accountable For Harming Teens, But Real Reform Remains Uncertain

        April 2, 2026
      • Science

        Amazon Buys Satellite Company Globalstar- It’s About Control of Space-Based Connectivity

        April 15, 2026

        Artemis II Splashdown Signals A Step Closer to Mass Space Travel

        April 12, 2026

        Peter Thiel’s Bold Ag-Tech Gamble Signals High-Tech Disruption of Traditional Ranching

        April 6, 2026

        White House Tech Advisor David Sacks Steps Down To Lead Presidential Science Advisory

        March 31, 2026

        Blue Origin’s Orbital Data Center Push Signals New Frontier in Tech Infrastructure

        March 27, 2026
      • Tech

        Peter Thiel’s Bold Ag-Tech Gamble Signals High-Tech Disruption of Traditional Ranching

        April 6, 2026

        Zuckerberg Quietly Offers Musk Support As Tech Titans Align Around Government Power

        April 4, 2026

        White House Tech Advisor David Sacks Steps Down To Lead Presidential Science Advisory

        March 31, 2026

        Another Billionaire Signals Exit As California’s Taxes Drives Out High-Profile Entrepreneurs

        March 28, 2026

        Bezos Eyes $100 Billion War Chest To Rewire Legacy Industry With AI

        March 28, 2026
      TallwireTallwire
      Home»Tech»CISA Flags Five New High-Risk Flaws in Major Software Systems — Organizations Urged to Patch Immediately
      Tech

      CISA Flags Five New High-Risk Flaws in Major Software Systems — Organizations Urged to Patch Immediately

      Updated:March 21, 20266 Mins Read
      Facebook Twitter Pinterest LinkedIn Tumblr Email
      CISA Flags Five New High-Risk Flaws in Major Software Systems — Organizations Urged to Patch Immediately
      CISA Flags Five New High-Risk Flaws in Major Software Systems — Organizations Urged to Patch Immediately
      Share
      Facebook Twitter LinkedIn Pinterest Email

      In a recent alert, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) officially added five newly exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, signaling real-world weaponization and elevated risk to enterprises and federal systems alike. The list includes a remotely-exploitable server-side request forgery (SSRF) flaw in Oracle E‑Business Suite (CVE-2025-61884) that requires no authentication; an improper access control weakness in the Microsoft Windows SMB Client (CVE-2025-33073) that can enable privilege escalation; two high-severity authentication bypass issues in Kentico Xperience CMS (CVE-2025-2746 & CVE-2025-2747); and an older arbitrary code execution vulnerability in JavaScriptCore (CVE-2022-48503) affecting Apple platforms. Federal civilian agencies must remediate these flaws by November 10, 2025, and private sector organizations are strongly advised to follow suit as the threat landscape continues to evolve rapidly.

      Sources: CISA.org, Hacker News

      Key Takeaways

      – These vulnerability additions reflect active exploitation or credible evidence of exploitation, meaning organizations must treat them as operational emergencies rather than theoretical risks.

      – The impacted products span critical enterprise applications (Oracle E-Business Suite, Kentico CMS) and foundational OS/network services (Microsoft SMB Client), highlighting that both vertical-market and infrastructure-level systems remain high-value targets.

      – The November 10, 2025 remediation deadline for civilian agencies underscores the compressed timeframes now faced in cybersecurity incident mitigation; any delay increases likelihood of compromise and downstream lateral attack movement.

      In-Depth

      The recent move by the Cybersecurity and Infrastructure Security Agency to add five major software vulnerabilities to its Known Exploited Vulnerabilities catalog signals a sobering reality: the pace of cyber-threats is accelerating, and the margin for proactive defense is narrowing. The vulnerabilities in question impact widely-deployed enterprise and infrastructure software from Oracle, Microsoft, Kentico and Apple — meaning the potential attack surface touches virtually every sector of the economy.

      First among the flagged flaws is CVE-2025-61884, an SSRF vulnerability within Oracle E-Business Suite’s Configurator/Runtime component. What makes it particularly alarming is the lack of required authentication: attackers may exploit it remotely, exploit internal network access or latent metadata services, and pivot into deeper access without needing valid credentials. Oracle itself confirms this vulnerability affects versions 12.2.3 through 12.2.14 and urges immediate patching — a stark reminder that if attackers can slip past perimeter defenses, they may already be inside your network. The fact that this flaw has been weaponized (or shows signs of exploitation) elevates it from ‘risk’ to ‘active threat’.

      Next is the CVE-2025-33073 vulnerability in Microsoft’s Windows SMB Client. Though classified as a privilege-escalation bug, analysis shows that via crafted scripts forcing the victim to authenticate to a malicious SMB server, remote execution (effectively) is plausible. The exploit chain here ties into the age-old problem of lateral movement: once attackers land on a workstation, they leverage SMB shortcuts to move across domains, escalate privileges and harvest credentials — bypassing many legacy detection controls. Microsoft patched this in June 2025, yet the inclusion in the KEV list means that either not all systems have been updated or the bug is being exploited despite the patch.

      The twin vulnerabilities in Kentico Xperience (CVE-2025-2746 & CVE-2025-2747) are authentication bypasses affecting the Staging Sync Server. While maybe lesser known than the Oracle or Microsoft names, they matter because content-management systems often lurk at the periphery of enterprise architectures — less hardened, often exposed to the web and used as stepping stones into production. An attacker who gains administrative control of a CMS can alter or implant content, supply-chain a trusted site, deliver malware or redirect users to attack infrastructure. These flaws underline how attackers increasingly exploit the path of least resistance: the lightly-defended, seldom-monitored systems.

      Finally, CVE-2022-48503 in Apple’s JavaScriptCore engine shows that even older bugs remain viable when patch coverage lags. In some BYOD or legacy device contexts, un-patched WebKit engines still permit arbitrary code execution via crafted web content. By including this three-year-old vulnerability, CISA is underscoring that time alone is not a defense — organizations must still account for device sprawl, unmanaged endpoints and shadow-IT.

      From a broader lens, the escalation is clear: attackers are no longer waiting weeks or months to exploit new vulnerabilities — the window is tightening and the pressure on defenders increasing. When CISA flags a KEV, it should be treated as a “bullet in motion” rather than a “bullet being loaded.” The mandated remediation deadline of November 10, 2025 for federal civilian agencies cements this urgency. Private enterprises should not assume safety simply because they are not bound by the deadline; risk is risk.

      What should organizations do right now? First, inventory all systems running the affected software and verify patches or mitigations are applied. For Oracle E-Business Suite, ensure the security alert for CVE-2025-61884 is implemented and network exposure of Configurator/Runtime components is minimized. For Windows environments, verify the June patch for CVE-2025-33073 is installed universally — including in virtual desktops, labs and test beds — and outbound SMB sessions are restricted or monitored. For Kentico CMS deployments, ensure hotfixes for the two bypass issues are applied and access to staging sync servers is tightly limited. For Apple devices, audit patch levels and consider segmentation or isolation for older un-patched endpoints.

      Additionally, apply compensating controls: enforce SMB signing, disable SMBv1 and legacy protocols, segment internal networks, monitor odd outbound traffic, and raise administrative privilege monitoring. Detecting SSRF attempts is notoriously hard, so assume an attacker may have already triggered internal requests or metadata access; inspect logs for suspicious internal HTTP requests originating from servers that should not make external calls. Segmenting web-facing systems from internal services mitigates the lateral risk that such SSRF flaws introduce.

      From a strategic viewpoint, this announcement reinforces a conservative proverb in cybersecurity: “Assume breach.” The best defense is not just patching — though that remains foundational — but reducing the opportunity for pivot, movement and attack consolidation. Attackers increasingly exploit the weakest link, and as the Kentico case shows, those links are often less visible or monitored systems.

      Finally, organizations must stress test their patch management, update cadence and incident readiness. Regulatory and compliance regimes may increasingly consider inclusion on the KEV list as evidence of risk exposure, so boards and leadership should view this not as a technical issue alone, but as a business continuity and reputational risk. The cost of not remediating extends beyond data loss — it includes supply-chain risk, cascading service failures, and potential regulatory penalties.

      In conclusion: the addition of these five vulnerabilities to CISA’s KEV catalog is more than an alert — it’s a wake-up call. Whether your organization uses Oracle, Microsoft, Kentico or Apple platforms, the threat is real and immediate. Patch rigor, inventory clarity, and a mindset that assumes attacker access are now non-optional. Delay is no longer acceptable; the time to act was yesterday.

      Apple Meta Microsoft Software
      Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
      Previous ArticleChrome Zero-Day Turns Tool for Espionage
      Next Article CISA Orders Samsung & Pixel Users: “Update or Stop Using Your Phone”

      Related Posts

      The Gaming World as of April 2026

      April 15, 2026

      Amazon Buys Satellite Company Globalstar- It’s About Control of Space-Based Connectivity

      April 15, 2026

      NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

      April 8, 2026

      The Rise Of Agentic AI Signals A Shift From Tools To Autonomous Digital Actors

      April 8, 2026
      Add A Comment
      Leave A Reply Cancel Reply

      Editors Picks

      The Gaming World as of April 2026

      April 15, 2026

      Amazon Buys Satellite Company Globalstar- It’s About Control of Space-Based Connectivity

      April 15, 2026

      NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

      April 8, 2026

      OpenAI Expands Influence With Strategic TBPN Media Acquisition

      April 8, 2026
      Popular Topics
      Samsung Series B Space Satellite Taiwan Tech Tesla Cybertruck trending Startup Series A Tesla Stocks UAE Tech Satya Nadella Software Sam Altman Sundar Pichai SpaceX Tim Cook spotlight Viral
      Major Tech Companies
      • Apple News
      • Google News
      • Meta News
      • Microsoft News
      • Amazon News
      • Samsung News
      • Nvidia News
      • OpenAI News
      • Tesla News
      • AMD News
      • Anthropic News
      • Elbit News
      AI & Emerging Tech
      • AI Regulation News
      • AI Safety News
      • AI Adoption
      • Quantum Computing News
      • Robotics News
      Key People
      • Sam Altman News
      • Jensen Huang News
      • Elon Musk News
      • Mark Zuckerberg News
      • Sundar Pichai News
      • Tim Cook News
      • Satya Nadella News
      • Mustafa Suleyman News
      Global Tech & Policy
      • Israel Tech News
      • India Tech News
      • Taiwan Tech News
      • UAE Tech News
      Startups & Emerging Tech
      • Series A News
      • Series B News
      • Startup News
      Tallwire
      Facebook X (Twitter) LinkedIn Threads Instagram RSS
      • Tech
      • Entertainment
      • Business
      • Government
      • Academia
      • Transportation
      • Legal
      • Press Kit
      © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

      Type above and press Enter to search. Press Esc to cancel.