Close Menu

    Subscribe to Updates

    Get the latest tech news from Tallwire.

      What's Hot

      Google Cracks Down On Android Apps And Developer Accounts In 2025

      March 1, 2026

      Study Signals AI Search Shift Threatens Traditional Web Traffic Model

      March 1, 2026

      Chinese Sellers Peddling Anti-Drone Weapons On TikTok Raise Security Alarms

      March 1, 2026
      Facebook X (Twitter) Instagram
      • Tech
      • AI
      • Get In Touch
      Facebook X (Twitter) LinkedIn
      TallwireTallwire
      • Tech

        Chinese Sellers Peddling Anti-Drone Weapons On TikTok Raise Security Alarms

        March 1, 2026

        Say Goodbye to the Undersea Cable That Made the Global Internet Possible

        March 1, 2026

        Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

        February 28, 2026

        Taara Beam Launch Brings 25Gbps Optical Wireless Networks to Cities

        February 27, 2026

        Global Memory Shortage Set to Push Up Prices on Phones, Laptops, and More

        February 27, 2026
      • AI

        Study Signals AI Search Shift Threatens Traditional Web Traffic Model

        March 1, 2026

        AI Password Generation Poses Major Security Risk, Experts Warn

        February 28, 2026

        Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

        February 28, 2026

        AI Productivity Gains Concentrated Among High-Skilled Workers, Study Finds

        February 28, 2026

        X to Let Users Mark Posts ‘Made With AI’ as Platform Eyes Voluntary Disclosure Feature

        February 27, 2026
      • Security

        Google Cracks Down On Android Apps And Developer Accounts In 2025

        March 1, 2026

        Massive Exposed Database With Billions of Social Security Numbers Sparks Identity Theft Fears

        March 1, 2026

        Password Managers Share a Hidden Weakness

        March 1, 2026

        AI Password Generation Poses Major Security Risk, Experts Warn

        February 28, 2026

        Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

        February 28, 2026
      • Health

        Social Media Addiction Trial Draws Grieving Parents Seeking Accountability From Tech Platforms

        February 19, 2026

        Portugal’s Parliament OKs Law to Restrict Children’s Social Media Access With Parental Consent

        February 18, 2026

        Parents Paint 108 Names, Demand Snapchat Reform After Deadly Fentanyl Claims

        February 18, 2026

        UK Kids Turning to AI Chatbots and Acting on Advice at Alarming Rates

        February 16, 2026

        Landmark California Trial Sees YouTube Defend Itself, Rejects ‘Social Media’ and Addiction Claims

        February 16, 2026
      • Science

        Astronomers Confirm Discovery Of Galaxy Nearly Entirely Composed Of Dark Matter

        March 1, 2026

        Microsoft Claims 100 Percent Renewable Energy Match Across Global Electricity Use

        February 28, 2026

        Taara Beam Launch Brings 25Gbps Optical Wireless Networks to Cities

        February 27, 2026

        Large Hadron Collider Enters Third Shutdown For Major Upgrade

        February 26, 2026

        Google Phases Out Android’s Built-In Weather App, Replacing It With Search-Based Forecasts

        February 25, 2026
      • Tech

        Sam Altman Says ‘AI Washing’ Is Being Used to Mask Corporate Layoffs

        February 28, 2026

        Zuckerberg Testifies In Landmark Trial Over Alleged Teen Social Media Harms

        February 23, 2026

        Gay Tech Networks Under Spotlight In Silicon Valley Culture Debate

        February 23, 2026

        Google Co-Founder’s Epstein Contacts Reignite Scrutiny of Elite Tech Circles

        February 7, 2026

        Bill Gates Denies “Absolutely Absurd” Claims in Newly Released Epstein Files

        February 6, 2026
      TallwireTallwire
      Home»Tech»CISA Flags Five New High-Risk Flaws in Major Software Systems — Organizations Urged to Patch Immediately
      Tech

      CISA Flags Five New High-Risk Flaws in Major Software Systems — Organizations Urged to Patch Immediately

      6 Mins Read
      Facebook Twitter Pinterest LinkedIn Tumblr Email
      CISA Flags Five New High-Risk Flaws in Major Software Systems — Organizations Urged to Patch Immediately
      CISA Flags Five New High-Risk Flaws in Major Software Systems — Organizations Urged to Patch Immediately
      Share
      Facebook Twitter LinkedIn Pinterest Email

      In a recent alert, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) officially added five newly exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, signaling real-world weaponization and elevated risk to enterprises and federal systems alike. The list includes a remotely-exploitable server-side request forgery (SSRF) flaw in Oracle E‑Business Suite (CVE-2025-61884) that requires no authentication; an improper access control weakness in the Microsoft Windows SMB Client (CVE-2025-33073) that can enable privilege escalation; two high-severity authentication bypass issues in Kentico Xperience CMS (CVE-2025-2746 & CVE-2025-2747); and an older arbitrary code execution vulnerability in JavaScriptCore (CVE-2022-48503) affecting Apple platforms. Federal civilian agencies must remediate these flaws by November 10, 2025, and private sector organizations are strongly advised to follow suit as the threat landscape continues to evolve rapidly.

      Sources: CISA.org, Hacker News

      Key Takeaways

      – These vulnerability additions reflect active exploitation or credible evidence of exploitation, meaning organizations must treat them as operational emergencies rather than theoretical risks.

      – The impacted products span critical enterprise applications (Oracle E-Business Suite, Kentico CMS) and foundational OS/network services (Microsoft SMB Client), highlighting that both vertical-market and infrastructure-level systems remain high-value targets.

      – The November 10, 2025 remediation deadline for civilian agencies underscores the compressed timeframes now faced in cybersecurity incident mitigation; any delay increases likelihood of compromise and downstream lateral attack movement.

      In-Depth

      The recent move by the Cybersecurity and Infrastructure Security Agency to add five major software vulnerabilities to its Known Exploited Vulnerabilities catalog signals a sobering reality: the pace of cyber-threats is accelerating, and the margin for proactive defense is narrowing. The vulnerabilities in question impact widely-deployed enterprise and infrastructure software from Oracle, Microsoft, Kentico and Apple — meaning the potential attack surface touches virtually every sector of the economy.

      First among the flagged flaws is CVE-2025-61884, an SSRF vulnerability within Oracle E-Business Suite’s Configurator/Runtime component. What makes it particularly alarming is the lack of required authentication: attackers may exploit it remotely, exploit internal network access or latent metadata services, and pivot into deeper access without needing valid credentials. Oracle itself confirms this vulnerability affects versions 12.2.3 through 12.2.14 and urges immediate patching — a stark reminder that if attackers can slip past perimeter defenses, they may already be inside your network. The fact that this flaw has been weaponized (or shows signs of exploitation) elevates it from ‘risk’ to ‘active threat’.

      Next is the CVE-2025-33073 vulnerability in Microsoft’s Windows SMB Client. Though classified as a privilege-escalation bug, analysis shows that via crafted scripts forcing the victim to authenticate to a malicious SMB server, remote execution (effectively) is plausible. The exploit chain here ties into the age-old problem of lateral movement: once attackers land on a workstation, they leverage SMB shortcuts to move across domains, escalate privileges and harvest credentials — bypassing many legacy detection controls. Microsoft patched this in June 2025, yet the inclusion in the KEV list means that either not all systems have been updated or the bug is being exploited despite the patch.

      The twin vulnerabilities in Kentico Xperience (CVE-2025-2746 & CVE-2025-2747) are authentication bypasses affecting the Staging Sync Server. While maybe lesser known than the Oracle or Microsoft names, they matter because content-management systems often lurk at the periphery of enterprise architectures — less hardened, often exposed to the web and used as stepping stones into production. An attacker who gains administrative control of a CMS can alter or implant content, supply-chain a trusted site, deliver malware or redirect users to attack infrastructure. These flaws underline how attackers increasingly exploit the path of least resistance: the lightly-defended, seldom-monitored systems.

      Finally, CVE-2022-48503 in Apple’s JavaScriptCore engine shows that even older bugs remain viable when patch coverage lags. In some BYOD or legacy device contexts, un-patched WebKit engines still permit arbitrary code execution via crafted web content. By including this three-year-old vulnerability, CISA is underscoring that time alone is not a defense — organizations must still account for device sprawl, unmanaged endpoints and shadow-IT.

      From a broader lens, the escalation is clear: attackers are no longer waiting weeks or months to exploit new vulnerabilities — the window is tightening and the pressure on defenders increasing. When CISA flags a KEV, it should be treated as a “bullet in motion” rather than a “bullet being loaded.” The mandated remediation deadline of November 10, 2025 for federal civilian agencies cements this urgency. Private enterprises should not assume safety simply because they are not bound by the deadline; risk is risk.

      What should organizations do right now? First, inventory all systems running the affected software and verify patches or mitigations are applied. For Oracle E-Business Suite, ensure the security alert for CVE-2025-61884 is implemented and network exposure of Configurator/Runtime components is minimized. For Windows environments, verify the June patch for CVE-2025-33073 is installed universally — including in virtual desktops, labs and test beds — and outbound SMB sessions are restricted or monitored. For Kentico CMS deployments, ensure hotfixes for the two bypass issues are applied and access to staging sync servers is tightly limited. For Apple devices, audit patch levels and consider segmentation or isolation for older un-patched endpoints.

      Additionally, apply compensating controls: enforce SMB signing, disable SMBv1 and legacy protocols, segment internal networks, monitor odd outbound traffic, and raise administrative privilege monitoring. Detecting SSRF attempts is notoriously hard, so assume an attacker may have already triggered internal requests or metadata access; inspect logs for suspicious internal HTTP requests originating from servers that should not make external calls. Segmenting web-facing systems from internal services mitigates the lateral risk that such SSRF flaws introduce.

      From a strategic viewpoint, this announcement reinforces a conservative proverb in cybersecurity: “Assume breach.” The best defense is not just patching — though that remains foundational — but reducing the opportunity for pivot, movement and attack consolidation. Attackers increasingly exploit the weakest link, and as the Kentico case shows, those links are often less visible or monitored systems.

      Finally, organizations must stress test their patch management, update cadence and incident readiness. Regulatory and compliance regimes may increasingly consider inclusion on the KEV list as evidence of risk exposure, so boards and leadership should view this not as a technical issue alone, but as a business continuity and reputational risk. The cost of not remediating extends beyond data loss — it includes supply-chain risk, cascading service failures, and potential regulatory penalties.

      In conclusion: the addition of these five vulnerabilities to CISA’s KEV catalog is more than an alert — it’s a wake-up call. Whether your organization uses Oracle, Microsoft, Kentico or Apple platforms, the threat is real and immediate. Patch rigor, inventory clarity, and a mindset that assumes attacker access are now non-optional. Delay is no longer acceptable; the time to act was yesterday.

      Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
      Previous ArticleChrome Zero-Day Turns Tool for Espionage
      Next Article CISA Orders Samsung & Pixel Users: “Update or Stop Using Your Phone”

      Related Posts

      Chinese Sellers Peddling Anti-Drone Weapons On TikTok Raise Security Alarms

      March 1, 2026

      Say Goodbye to the Undersea Cable That Made the Global Internet Possible

      March 1, 2026

      Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

      February 28, 2026

      Taara Beam Launch Brings 25Gbps Optical Wireless Networks to Cities

      February 27, 2026
      Add A Comment
      Leave A Reply Cancel Reply

      Editors Picks

      Chinese Sellers Peddling Anti-Drone Weapons On TikTok Raise Security Alarms

      March 1, 2026

      Say Goodbye to the Undersea Cable That Made the Global Internet Possible

      March 1, 2026

      Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

      February 28, 2026

      Taara Beam Launch Brings 25Gbps Optical Wireless Networks to Cities

      February 27, 2026
      Popular Topics
      Ransomware SpaceX Robotics Quantum computing Startup Tim Cook spotlight trending Sundar Pichai Tesla Cybertruck Tesla Qualcomm Satya Nadella Sam Altman picks Samsung UAE Tech Taiwan Tech Series A Series B
      Major Tech Companies
      • Apple News
      • Google News
      • Meta News
      • Microsoft News
      • Amazon News
      • Samsung News
      • Nvidia News
      • OpenAI News
      • Tesla News
      • AMD News
      • Anthropic News
      • Elbit News
      AI & Emerging Tech
      • AI Regulation News
      • AI Safety News
      • AI Adoption
      • Quantum Computing News
      • Robotics News
      Key People
      • Sam Altman News
      • Jensen Huang News
      • Elon Musk News
      • Mark Zuckerberg News
      • Sundar Pichai News
      • Tim Cook News
      • Satya Nadella News
      • Mustafa Suleyman News
      Global Tech & Policy
      • Israel Tech News
      • India Tech News
      • Taiwan Tech News
      • UAE Tech News
      Startups & Emerging Tech
      • Series A News
      • Series B News
      • Startup News
      Tallwire
      Facebook X (Twitter) LinkedIn Threads Instagram RSS
      • Tech
      • Entertainment
      • Business
      • Government
      • Academia
      • Transportation
      • Legal
      • Press Kit
      © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

      Type above and press Enter to search. Press Esc to cancel.