Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Airbnb Shifts One-Third Of Customer Support To AI In North America

    February 17, 2026

    Meta Plans Facial Recognition for Smart Glasses Amid Privacy Pushback

    February 17, 2026

    Spotify Developers Haven’t Written Code Since December Thanks to AI Transformation

    February 16, 2026
    Facebook X (Twitter) Instagram
    • Tech
    • AI News
    • Get In Touch
    Facebook X (Twitter) LinkedIn
    TallwireTallwire
    • Tech

      Meta Plans Facial Recognition for Smart Glasses Amid Privacy Pushback

      February 17, 2026

      Spotify Developers Haven’t Written Code Since December Thanks to AI Transformation

      February 16, 2026

      Waymo Goes Fully Autonomous in Nashville, Tennessee

      February 16, 2026

      Roku Plans Streaming Bundles Push to Boost Profitability in 2026

      February 15, 2026

      Russia Officially Blocks WhatsApp After Telegram Crackdown

      February 15, 2026
    • AI News

      Meta Plans Facial Recognition for Smart Glasses Amid Privacy Pushback

      February 17, 2026

      Airbnb Shifts One-Third Of Customer Support To AI In North America

      February 17, 2026

      Spotify Developers Haven’t Written Code Since December Thanks to AI Transformation

      February 16, 2026

      Australia Puts Roblox on Notice Amid Reports of Child Grooming and Harmful Content

      February 16, 2026

      UK Kids Turning to AI Chatbots and Acting on Advice at Alarming Rates

      February 16, 2026
    • Security

      US Lawmakers Urge Tighter Export Controls to Curb China’s Access to Chipmaking Equipment

      February 16, 2026

      Senator Raises Questions On eSafety Crackdown And Potential Strain On US-Australia Relationship

      February 16, 2026

      AI Safety Researcher Resigns, Warns ‘World Is in Peril’ Amid Broader Industry Concerns

      February 15, 2026

      Microsoft Warns Hackers Are Exploiting Critical Zero-Day Bugs Targeting Windows, Office Users

      February 15, 2026

      Microsoft Exchange Online’s Aggressive Filters Mistake Legitimate Emails for Phishing

      February 13, 2026
    • Health

      UK Kids Turning to AI Chatbots and Acting on Advice at Alarming Rates

      February 16, 2026

      Landmark California Trial Sees YouTube Defend Itself, Rejects ‘Social Media’ and Addiction Claims

      February 16, 2026

      Instagram Top Executive Says ‘Addiction’ Doesn’t Exist in Landmark Social Media Trial

      February 15, 2026

      Amazon Pharmacy Rolls Out Same-Day Prescription Delivery To 4,500 U.S. Cities

      February 14, 2026

      AI Advances Aim to Bridge Labor Gaps in Rare Disease Treatment

      February 12, 2026
    • Science

      XAI Publicly Unveils Elon Musk’s Interplanetary AI Vision In Rare All-Hands Release

      February 14, 2026

      Elon Musk Shifts SpaceX Priority From Mars Colonization to Building a Moon City

      February 14, 2026

      NASA Artemis II Spacesuit Mobility Concerns Ahead Of Historic Mission

      February 13, 2026

      AI Agents Build Their Own MMO Playground After Moltbook Ignites Agent-Only Web Communities

      February 12, 2026

      AI Advances Aim to Bridge Labor Gaps in Rare Disease Treatment

      February 12, 2026
    • People

      Google Co-Founder’s Epstein Contacts Reignite Scrutiny of Elite Tech Circles

      February 7, 2026

      Bill Gates Denies “Absolutely Absurd” Claims in Newly Released Epstein Files

      February 6, 2026

      Informant Claims Epstein Employed Personal Hacker With Zero-Day Skills

      February 5, 2026

      Starlink Becomes Critical Internet Lifeline Amid Iran Protest Crackdown

      January 25, 2026

      Musk Pledges to Open-Source X’s Recommendation Algorithm, Promising Transparency

      January 21, 2026
    TallwireTallwire
    Home»Tech»CISA Flags Five New High-Risk Flaws in Major Software Systems — Organizations Urged to Patch Immediately
    Tech

    CISA Flags Five New High-Risk Flaws in Major Software Systems — Organizations Urged to Patch Immediately

    6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    CISA Flags Five New High-Risk Flaws in Major Software Systems — Organizations Urged to Patch Immediately
    CISA Flags Five New High-Risk Flaws in Major Software Systems — Organizations Urged to Patch Immediately
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In a recent alert, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) officially added five newly exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, signaling real-world weaponization and elevated risk to enterprises and federal systems alike. The list includes a remotely-exploitable server-side request forgery (SSRF) flaw in Oracle E‑Business Suite (CVE-2025-61884) that requires no authentication; an improper access control weakness in the Microsoft Windows SMB Client (CVE-2025-33073) that can enable privilege escalation; two high-severity authentication bypass issues in Kentico Xperience CMS (CVE-2025-2746 & CVE-2025-2747); and an older arbitrary code execution vulnerability in JavaScriptCore (CVE-2022-48503) affecting Apple platforms. Federal civilian agencies must remediate these flaws by November 10, 2025, and private sector organizations are strongly advised to follow suit as the threat landscape continues to evolve rapidly.

    Sources: CISA.org, Hacker News

    Key Takeaways

    – These vulnerability additions reflect active exploitation or credible evidence of exploitation, meaning organizations must treat them as operational emergencies rather than theoretical risks.

    – The impacted products span critical enterprise applications (Oracle E-Business Suite, Kentico CMS) and foundational OS/network services (Microsoft SMB Client), highlighting that both vertical-market and infrastructure-level systems remain high-value targets.

    – The November 10, 2025 remediation deadline for civilian agencies underscores the compressed timeframes now faced in cybersecurity incident mitigation; any delay increases likelihood of compromise and downstream lateral attack movement.

    In-Depth

    The recent move by the Cybersecurity and Infrastructure Security Agency to add five major software vulnerabilities to its Known Exploited Vulnerabilities catalog signals a sobering reality: the pace of cyber-threats is accelerating, and the margin for proactive defense is narrowing. The vulnerabilities in question impact widely-deployed enterprise and infrastructure software from Oracle, Microsoft, Kentico and Apple — meaning the potential attack surface touches virtually every sector of the economy.

    First among the flagged flaws is CVE-2025-61884, an SSRF vulnerability within Oracle E-Business Suite’s Configurator/Runtime component. What makes it particularly alarming is the lack of required authentication: attackers may exploit it remotely, exploit internal network access or latent metadata services, and pivot into deeper access without needing valid credentials. Oracle itself confirms this vulnerability affects versions 12.2.3 through 12.2.14 and urges immediate patching — a stark reminder that if attackers can slip past perimeter defenses, they may already be inside your network. The fact that this flaw has been weaponized (or shows signs of exploitation) elevates it from ‘risk’ to ‘active threat’.

    Next is the CVE-2025-33073 vulnerability in Microsoft’s Windows SMB Client. Though classified as a privilege-escalation bug, analysis shows that via crafted scripts forcing the victim to authenticate to a malicious SMB server, remote execution (effectively) is plausible. The exploit chain here ties into the age-old problem of lateral movement: once attackers land on a workstation, they leverage SMB shortcuts to move across domains, escalate privileges and harvest credentials — bypassing many legacy detection controls. Microsoft patched this in June 2025, yet the inclusion in the KEV list means that either not all systems have been updated or the bug is being exploited despite the patch.

    The twin vulnerabilities in Kentico Xperience (CVE-2025-2746 & CVE-2025-2747) are authentication bypasses affecting the Staging Sync Server. While maybe lesser known than the Oracle or Microsoft names, they matter because content-management systems often lurk at the periphery of enterprise architectures — less hardened, often exposed to the web and used as stepping stones into production. An attacker who gains administrative control of a CMS can alter or implant content, supply-chain a trusted site, deliver malware or redirect users to attack infrastructure. These flaws underline how attackers increasingly exploit the path of least resistance: the lightly-defended, seldom-monitored systems.

    Finally, CVE-2022-48503 in Apple’s JavaScriptCore engine shows that even older bugs remain viable when patch coverage lags. In some BYOD or legacy device contexts, un-patched WebKit engines still permit arbitrary code execution via crafted web content. By including this three-year-old vulnerability, CISA is underscoring that time alone is not a defense — organizations must still account for device sprawl, unmanaged endpoints and shadow-IT.

    From a broader lens, the escalation is clear: attackers are no longer waiting weeks or months to exploit new vulnerabilities — the window is tightening and the pressure on defenders increasing. When CISA flags a KEV, it should be treated as a “bullet in motion” rather than a “bullet being loaded.” The mandated remediation deadline of November 10, 2025 for federal civilian agencies cements this urgency. Private enterprises should not assume safety simply because they are not bound by the deadline; risk is risk.

    What should organizations do right now? First, inventory all systems running the affected software and verify patches or mitigations are applied. For Oracle E-Business Suite, ensure the security alert for CVE-2025-61884 is implemented and network exposure of Configurator/Runtime components is minimized. For Windows environments, verify the June patch for CVE-2025-33073 is installed universally — including in virtual desktops, labs and test beds — and outbound SMB sessions are restricted or monitored. For Kentico CMS deployments, ensure hotfixes for the two bypass issues are applied and access to staging sync servers is tightly limited. For Apple devices, audit patch levels and consider segmentation or isolation for older un-patched endpoints.

    Additionally, apply compensating controls: enforce SMB signing, disable SMBv1 and legacy protocols, segment internal networks, monitor odd outbound traffic, and raise administrative privilege monitoring. Detecting SSRF attempts is notoriously hard, so assume an attacker may have already triggered internal requests or metadata access; inspect logs for suspicious internal HTTP requests originating from servers that should not make external calls. Segmenting web-facing systems from internal services mitigates the lateral risk that such SSRF flaws introduce.

    From a strategic viewpoint, this announcement reinforces a conservative proverb in cybersecurity: “Assume breach.” The best defense is not just patching — though that remains foundational — but reducing the opportunity for pivot, movement and attack consolidation. Attackers increasingly exploit the weakest link, and as the Kentico case shows, those links are often less visible or monitored systems.

    Finally, organizations must stress test their patch management, update cadence and incident readiness. Regulatory and compliance regimes may increasingly consider inclusion on the KEV list as evidence of risk exposure, so boards and leadership should view this not as a technical issue alone, but as a business continuity and reputational risk. The cost of not remediating extends beyond data loss — it includes supply-chain risk, cascading service failures, and potential regulatory penalties.

    In conclusion: the addition of these five vulnerabilities to CISA’s KEV catalog is more than an alert — it’s a wake-up call. Whether your organization uses Oracle, Microsoft, Kentico or Apple platforms, the threat is real and immediate. Patch rigor, inventory clarity, and a mindset that assumes attacker access are now non-optional. Delay is no longer acceptable; the time to act was yesterday.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleChrome Zero-Day Turns Tool for Espionage
    Next Article CISA Orders Samsung & Pixel Users: “Update or Stop Using Your Phone”

    Related Posts

    Meta Plans Facial Recognition for Smart Glasses Amid Privacy Pushback

    February 17, 2026

    Spotify Developers Haven’t Written Code Since December Thanks to AI Transformation

    February 16, 2026

    Waymo Goes Fully Autonomous in Nashville, Tennessee

    February 16, 2026

    Roku Plans Streaming Bundles Push to Boost Profitability in 2026

    February 15, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Meta Plans Facial Recognition for Smart Glasses Amid Privacy Pushback

    February 17, 2026

    Spotify Developers Haven’t Written Code Since December Thanks to AI Transformation

    February 16, 2026

    Waymo Goes Fully Autonomous in Nashville, Tennessee

    February 16, 2026

    Roku Plans Streaming Bundles Push to Boost Profitability in 2026

    February 15, 2026
    Top Reviews
    Tallwire
    Facebook X (Twitter) LinkedIn Threads Instagram RSS
    • Tech
    • Entertainment
    • Business
    • Government
    • Academia
    • Transportation
    • Legal
    • Press Kit
    © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

    Type above and press Enter to search. Press Esc to cancel.