CsirtPost Profile Banner
CSIRT POST CyberForce Profile
CSIRT POST CyberForce

@CsirtPost

Followers
244
Following
29
Media
470
Statuses
668

Computer Security Incident Response Team of POST Luxembourg

Luxembourg
Joined October 2020
Don't wanna be here? Send us removal request.
@CsirtPost
CSIRT POST CyberForce
2 years
🚨CVE-2024-21762 (CVSS 9.6/10)🚨 Critical vulnerability affecting FortiOS SSL VPN is exploited in the wild and allows unauthenticated attackers to gain remote code execution (RCE) via maliciously crafted requests. Follow mitigations steps now ! https://t.co/4HhOxbB1Jd
fortiguard.com
None
0
2
3
@CsirtPost
CSIRT POST CyberForce
2 years
🚨CVE-2024-0519 (CVSS 8.8/10)🚨 Critical Zero-Day vulnerability affecting Chrome and Chromium-based browsers is exploited in the wild and allows out-of-bounds memory access and remote code execution. No patch available! Apply mitigations now! https://t.co/KsDKyF7Fj4
0
0
0
@CsirtPost
CSIRT POST CyberForce
2 years
🚨CVE-2024-21887 (CVSS 9.1/10)🚨 Critical zero-day vulnerability affecting Ivanti Policy Secure gateways is exploited in the wild and allows an authenticated user to execute arbitrary commands on the systems. No patch available! Follow mitigation steps!
0
0
0
@CsirtPost
CSIRT POST CyberForce
2 years
🚨CVE-2023-46805 (CVSS 8.5/10)🚨 Critical zero-day vulnerability affecting Ivanti Policy Secure gateways is exploited in the wild and allows attackers to bypass authentication and access restricted resources on the systems. Follow the mitigation steps now!
0
0
0
@CsirtPost
CSIRT POST CyberForce
2 years
🚨CVE-2023-20198 (CVSS 10.0/10)🚨Critical zero-day vulnerability affecting Cisco IOS XE Software and allows a remote, unauthenticated attacker to create an account on an affected system with administrative privileges. https://t.co/bfXeDAtooz
sec.cloudapps.cisco.com
Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the...
0
0
0
@CsirtPost
CSIRT POST CyberForce
2 years
🚨CVE-2023-44487🚨Critical vulnerability affecting HTTP/2 protocol is exploited and could lead to potential massive DDoS attacks. Patch now ! https://t.co/TjC4LaScus
0
0
0
@CsirtPost
CSIRT POST CyberForce
2 years
🚨CVE-2023-41992 (CVSS 9.8/10)🚨Critical zero-day vulnerability affecting Apple products is exploited and allows attackers to perform kernel privilege escalation. Update your devices now! https://t.co/rRcF3r5aXR
0
0
0
@CsirtPost
CSIRT POST CyberForce
2 years
🚨CVE-2023-41993 (CVSS 9.8/10)🚨 Critical zero-day vulnerability affecting Safari is actively exploited and allow attackers to perform remote code execution. Update your iOS and iPadOS devices immediately! https://t.co/eKlF2UiCBC
0
0
0
@CsirtPost
CSIRT POST CyberForce
2 years
🚨CVE-2023-26369 (CVSS 7.8/10)🚨Critical zero-day vulnerability affecting Adobe Acrobat & Reader is exploited and allows attackers to execute out-of-bounds writes, leading to unauthorized access, data manipulation, or system compromise. Patch now! https://t.co/5PseJUZziW
0
0
0
@CsirtPost
CSIRT POST CyberForce
2 years
Threat actors actively exploiting critical exploit chain involving CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, and CVE-2023-36847 and targeting Juniper Networks EX Switches and SRX firewalls through J-Web configuration interface. Patch available since August 17, 2023.
0
1
0
@CsirtPost
CSIRT POST CyberForce
2 years
🚨CVE-2023-38035🚨Critical API authentication vulnerability in Ivanti MobileIron Sentry MICS allows unauthenticated actor with access to the Admin Portal to make configuration changes to Sentry and execute OS commands as root. Follow vendor steps ASAP. https://t.co/JFMIKP8uo9
1
0
0
@CsirtPost
CSIRT POST CyberForce
2 years
🚨 CVE-2023-32560 🚨 Two critical stack-based buffer overflow vulnerabilities found in Ivanti Avalanche 💻 Attackers can disrupt services or execute arbitrary code Affected: Ivanti Avalanche 6.4.0.0 and earlier 🔒 Apply security update 6.4.1 ASAP
0
1
1
@CsirtPost
CSIRT POST CyberForce
2 years
🚨 CVE-2023-35082 🚨 Critical API access vulnerability in IEMM and MobileIron Core exploited in the wild allowing unauthenticated API access including the ability to disclose personally identifiable information and perform modifications to the platform. Patch and monitor ASAP.
0
5
1
@CsirtPost
CSIRT POST CyberForce
2 years
🚨 CVE-2023-35081 🚨 Directory traversal vulnerability in Ivanti Endpoint Manager Mobile actively exploited in the wild and allowing admin privileges combined with CVE-2023-35078. Immediate patching and monitoring recommended.
0
2
1
@CsirtPost
CSIRT POST CyberForce
2 years
🔒#CVE-2023-35078📢: Critical zero-day vulnerability in Ivanti Endpoint Manager Mobile (EPMM) allowing unauthenticated access to restricted resources. Exploited in attacks against the Norwegian government. Apply patch released by Ivanti ASAP & monitor systems for compromise.
0
1
1
@CsirtPost
CSIRT POST CyberForce
2 years
🚨URGENT! CVE-2023-33308 affecting Fortinet's FortiOS / FortiProxy is actively exploited and allows an attacker to perform remote code execution. Highly Critical Vulnerability CVSS 9.8 ! Update now ! https://t.co/RgURFzbFRt
fortiguard.com
None
0
0
0
@CsirtPost
CSIRT POST CyberForce
2 years
🚨URGENT! CVE-2023-35311 (CVSS score: 8.8/10) affecting MS Office 365, Office 2019-2021 LTSC, Outlook 2013-2016 is exploited and allows an attacker to bypass the Outlook Security Notice prompt. Update now ! https://t.co/5FS3NORe4U
0
0
0
@CsirtPost
CSIRT POST CyberForce
3 years
🚨URGENT! Patch your Fortigate Firewall for CVE-2023-27997 now! It's actively exploited, targeting government, and critical infrastructure. Public exploit available for remote code execution. CVSS score: 9.8/10. 70% vulnerable!!!
fortiguard.com
None
0
0
1
@CsirtPost
CSIRT POST CyberForce
3 years
New #phishing against POST customers. hXXps://postonlindetelcom.weebly.com/ We are currently dealing with this incident.
0
0
0
https://t.co/vGozIhG8Eo "FortiOS / FortiProxy / FortiSwitchManager - Authentication bypass on administrative interface" The advisory includes a hint/indicator to find out if your device was compromised. CVE-2022-40684
0
3
10