Topic: workaround guidance

  • Critical Fortinet Flaw Actively Exploited by Hackers

    Critical Fortinet Flaw Actively Exploited by Hackers

    A critical, unauthenticated command injection vulnerability (CVE-2025-64155) in FortiSIEM versions 6.7 to 7.5 allows attackers to gain full system control. Active exploitation of this flaw is confirmed, and immediate patching to specified fixed versions or restricting access to TCP port 7900 is u...

    Read More »
  • Urgent: WatchGuard Firewalls Targeted by Critical Attack (CVE-2025-14733)

    Urgent: WatchGuard Firewalls Targeted by Critical Attack (CVE-2025-14733)

    Over 115,000 WatchGuard Firebox firewalls are actively being targeted via a critical, unauthenticated remote code execution flaw (CVE-2025-14733) in the Fireware OS's IKED process. The U.S. CISA has mandated patching due to active exploitation, requiring an immediate upgrade to specific fixed Fir...

    Read More »
  • Critical FortiSIEM Flaw: Exploit Code Now Public

    Critical FortiSIEM Flaw: Exploit Code Now Public

    A critical, unauthenticated remote code execution vulnerability (CVE-2025-25256) in Fortinet's FortiSIEM platform allows attackers to gain full administrative control, with public exploit code now available. The flaw resides in the phMonitor service (TCP port 7900), a recurring weak point, and pa...

    Read More »