CSIRT POST CyberForce
@CsirtPost
Followers
244
Following
29
Media
470
Statuses
668
Computer Security Incident Response Team of POST Luxembourg
Luxembourg
Joined October 2020
🚨CVE-2024-21762 (CVSS 9.6/10)🚨 Critical vulnerability affecting FortiOS SSL VPN is exploited in the wild and allows unauthenticated attackers to gain remote code execution (RCE) via maliciously crafted requests. Follow mitigations steps now ! https://t.co/4HhOxbB1Jd
fortiguard.com
None
0
2
3
🚨CVE-2024-0519 (CVSS 8.8/10)🚨 Critical Zero-Day vulnerability affecting Chrome and Chromium-based browsers is exploited in the wild and allows out-of-bounds memory access and remote code execution. No patch available! Apply mitigations now! https://t.co/KsDKyF7Fj4
0
0
0
🚨CVE-2024-21887 (CVSS 9.1/10)🚨 Critical zero-day vulnerability affecting Ivanti Policy Secure gateways is exploited in the wild and allows an authenticated user to execute arbitrary commands on the systems. No patch available! Follow mitigation steps!
0
0
0
🚨CVE-2023-46805 (CVSS 8.5/10)🚨 Critical zero-day vulnerability affecting Ivanti Policy Secure gateways is exploited in the wild and allows attackers to bypass authentication and access restricted resources on the systems. Follow the mitigation steps now!
0
0
0
🚨CVE-2023-20198 (CVSS 10.0/10)🚨Critical zero-day vulnerability affecting Cisco IOS XE Software and allows a remote, unauthenticated attacker to create an account on an affected system with administrative privileges. https://t.co/bfXeDAtooz
sec.cloudapps.cisco.com
Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the...
0
0
0
🚨CVE-2023-44487🚨Critical vulnerability affecting HTTP/2 protocol is exploited and could lead to potential massive DDoS attacks. Patch now ! https://t.co/TjC4LaScus
0
0
0
🚨CVE-2023-41992 (CVSS 9.8/10)🚨Critical zero-day vulnerability affecting Apple products is exploited and allows attackers to perform kernel privilege escalation. Update your devices now! https://t.co/rRcF3r5aXR
0
0
0
🚨CVE-2023-41993 (CVSS 9.8/10)🚨 Critical zero-day vulnerability affecting Safari is actively exploited and allow attackers to perform remote code execution. Update your iOS and iPadOS devices immediately! https://t.co/eKlF2UiCBC
0
0
0
🚨CVE-2023-26369 (CVSS 7.8/10)🚨Critical zero-day vulnerability affecting Adobe Acrobat & Reader is exploited and allows attackers to execute out-of-bounds writes, leading to unauthorized access, data manipulation, or system compromise. Patch now! https://t.co/5PseJUZziW
0
0
0
Threat actors actively exploiting critical exploit chain involving CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, and CVE-2023-36847 and targeting Juniper Networks EX Switches and SRX firewalls through J-Web configuration interface. Patch available since August 17, 2023.
0
1
0
🚨CVE-2023-38035🚨Critical API authentication vulnerability in Ivanti MobileIron Sentry MICS allows unauthenticated actor with access to the Admin Portal to make configuration changes to Sentry and execute OS commands as root. Follow vendor steps ASAP. https://t.co/JFMIKP8uo9
1
0
0
🚨 CVE-2023-32560 🚨 Two critical stack-based buffer overflow vulnerabilities found in Ivanti Avalanche 💻 Attackers can disrupt services or execute arbitrary code Affected: Ivanti Avalanche 6.4.0.0 and earlier 🔒 Apply security update 6.4.1 ASAP
0
1
1
🚨 CVE-2023-35082 🚨 Critical API access vulnerability in IEMM and MobileIron Core exploited in the wild allowing unauthenticated API access including the ability to disclose personally identifiable information and perform modifications to the platform. Patch and monitor ASAP.
0
5
1
🚨 CVE-2023-35081 🚨 Directory traversal vulnerability in Ivanti Endpoint Manager Mobile actively exploited in the wild and allowing admin privileges combined with CVE-2023-35078. Immediate patching and monitoring recommended.
0
2
1
🔒#CVE-2023-35078📢: Critical zero-day vulnerability in Ivanti Endpoint Manager Mobile (EPMM) allowing unauthenticated access to restricted resources. Exploited in attacks against the Norwegian government. Apply patch released by Ivanti ASAP & monitor systems for compromise.
0
1
1
🚨URGENT! CVE-2023-33308 affecting Fortinet's FortiOS / FortiProxy is actively exploited and allows an attacker to perform remote code execution. Highly Critical Vulnerability CVSS 9.8 ! Update now ! https://t.co/RgURFzbFRt
fortiguard.com
None
0
0
0
🚨URGENT! CVE-2023-35311 (CVSS score: 8.8/10) affecting MS Office 365, Office 2019-2021 LTSC, Outlook 2013-2016 is exploited and allows an attacker to bypass the Outlook Security Notice prompt. Update now ! https://t.co/5FS3NORe4U
0
0
0
🚨URGENT! Patch your Fortigate Firewall for CVE-2023-27997 now! It's actively exploited, targeting government, and critical infrastructure. Public exploit available for remote code execution. CVSS score: 9.8/10. 70% vulnerable!!!
fortiguard.com
None
0
0
1
New #phishing against POST customers. hXXps://postonlindetelcom.weebly.com/ We are currently dealing with this incident.
0
0
0
https://t.co/vGozIhG8Eo "FortiOS / FortiProxy / FortiSwitchManager - Authentication bypass on administrative interface" The advisory includes a hint/indicator to find out if your device was compromised. CVE-2022-40684
0
3
10