VulnHub

AI-Powered Cybersecurity Intelligence

Last Update Check:

Latest Intelligence

SecurityWeek
Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers

NIST and CISA researchers have proposed the Likely Exploited Vulnerabilities (LEV) equations to enhance remediation prioritization based on KEV and EPSS metrics. This development is significant as it aims to improve the effectiveness of addressing vulnerabilities that are likely to be exploited.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Vulnerability

Published:

SecurityWeek
Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit

The 2025 Threat Detection & Incident Response Summit is a virtual event set to occur on May 21st, focusing on cybersecurity strategies and solutions. This summit highlights the importance of effective threat detection and response mechanisms in the evolving landscape of cyber threats.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

SecurityWeek
TrustCloud Raises $15 Million for Security Assurance Platform

TrustCloud, an AI-native security assurance firm, has successfully raised $15 million in funding to enhance its security assurance platform. This financial boost is significant as it highlights the growing investment in cybersecurity solutions amidst increasing security challenges.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

All CISA Advisories
Danfoss AK-SM 8xxA Series

The Danfoss AK-SM 8xxA Series has a vulnerability due to improper authentication, allowing remote attackers to bypass authentication and execute arbitrary code. This issue is significant as it affects critical infrastructure and could lead to serious security breaches if exploited.


Impact: ["Danfoss AK-SM 8xxA Series", "AK-SM 800A system manager"]

In the Wild: No

Age: Recently disclosed

Remediation: Users should update to release R4.2 and follow the AK-SM 800A Software Upgrade Process.

Phishing CVE Vulnerability Update

Published:

All CISA Advisories
Vertiv Liebert RDU101 and UNITY

The Vertiv Liebert RDU101 and UNITY products have critical vulnerabilities that allow for authentication bypass and stack-based buffer overflow, posing risks of denial-of-service and remote code execution. Users are urged to update their systems to mitigate these risks.


Impact: ["Liebert RDU101: Versions 1.9.0.0 and prior", "Liebert IS-UNITY: Versions 8.4.1.0 and prior"]

In the Wild: No

Age: Recently disclosed

Remediation: Update Liebert RDU101 to v1.9.1.2_0000001 and IS-UNITY to v8.4.3.1_00160.

CVE Exploit Vulnerability Update

Published:

All CISA Advisories
Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products

Mitsubishi Electric Iconics Digital Solutions has reported a vulnerability in their ICONICS Product Suite and MC Works64 that allows for execution with unnecessary privileges, potentially leading to information tampering. This vulnerability poses a significant risk as it could result in a denial-of-service condition on affected workstations.


Impact: ["ICONICS Product Suite", "Mitsubishi Electric MC Works64"]

In the Wild: No

Age: Recently disclosed

Remediation: Users should uninstall the multi-agent notification feature if not needed, restrict access to affected PCs, and apply the latest security patches.

Phishing CVE Vulnerability Update

Published:

All CISA Advisories
AutomationDirect MB-Gateway

The AutomationDirect MB-Gateway has a critical vulnerability due to missing authentication for critical functions, allowing unauthorized remote access and potential for configuration changes or arbitrary code execution. This vulnerability has a CVSS score of 10.0, indicating its severity and the urgent need for remediation.


Impact: ["MB-Gateway"]

In the Wild: No

Age: Recently disclosed

Remediation: Replace MB-Gateway with EKI-1221-CE or restrict network exposure and access until replacement is feasible.

Phishing CVE Vulnerability Update

Published:

All CISA Advisories
ABUP IoT Cloud Platform

The ABUP IoT Cloud Platform has a vulnerability related to incorrect privilege assignment, allowing unauthorized access to device profiles through a crafted JSON Web Token. Although the vendor has removed the vulnerable method, users are advised to modify authentication information due to a prior exposure period.


Impact: ["ABUP Internet of Things (IoT) Cloud Platform"]

In the Wild: No

Age: Discovered in April 2025

Remediation: The vulnerable method has been removed; users should consider modifying authentication information.

CVE Exploit Vulnerability Update

Published:

All CISA Advisories
Assured Telematics Inc (ATI) Fleet Management System with Geotab Integration

Assured Telematics Inc. has reported a vulnerability in their Fleet Management System that allows unauthorized access to sensitive system information, potentially leading to the exposure of administrative credentials. This issue is significant as it could compromise critical infrastructure in transportation systems worldwide.


Impact: ["Fleet Management System: Versions prior to February 6th, 2025", "Assured Telematics Inc."]

In the Wild: No

Age: Recently disclosed

Remediation: Assured Telematics has fixed the exposure of sensitive information. Users are advised to minimize network exposure and implement secure remote access methods.

CVE Vulnerability Update

Published:

All CISA Advisories
Schneider Electric PrismaSeT Active - Wireless Panel Server

The Schneider Electric PrismaSeT Active - Wireless Panel Server has a critical vulnerability (CVE-2023-4041) that allows unauthorized code execution due to a buffer overflow issue, posing risks to voltage loss monitoring. This vulnerability, which has a CVSS score of 9.8, affects all versions of the product and could lead to significant operational disruptions.


Impact: ["PrismaSeT Active - Wireless Panel Server", "Schneider Electric"]

In the Wild: No

Age: Recently disclosed

Remediation: Deactivate Bluetooth Low communication when not in use, review audit logs, check physical security, and follow cybersecurity recommendations.

Phishing CVE Apple Google Exploit Vulnerability Update

Published:

All CISA Advisories
Schneider Electric Modicon Controllers

Schneider Electric's Modicon Controllers have a vulnerability that allows unauthenticated attackers to manipulate a controller's webserver URL, potentially leading to a loss of confidentiality. This issue affects multiple product versions and poses a significant risk, particularly in critical infrastructure sectors.


Impact: ["Schneider Electric Modicon Controllers M241", "Schneider Electric Modicon Controllers M251", "Schneider Electric Modicon Controllers M258", "Schneider Electric Modicon Controllers LMC058"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: Update firmware to version 5.3.12.48 for M241/M251; apply mitigations for M258/LMC058 until a fix is available.

Phishing CVE Exploit Vulnerability Update

Published:

All CISA Advisories
CISA Releases Thirteen Industrial Control Systems Advisories

CISA has released thirteen advisories addressing vulnerabilities in various Industrial Control Systems (ICS) as of May 20, 2025. These advisories are crucial for enhancing security measures in critical infrastructure, as they inform users of potential exploits and necessary mitigations.


Impact: ["ABUP IoT Cloud Platform", "National Instruments Circuit Design Suite", "Danfoss AK-SM 8xxA Series", "Mitsubishi Electric Iconics Digital Solutions", "Siemens Siveillance Video", "Schneider Electric PrismaSeT Active - Wireless Panel Server", "Schneider Electric Galaxy VS, Galaxy VL, Galaxy VXL", "Schneider Electric Modicon Controllers", "AutomationDirect MB-Gateway", "Vertiv Liebert RDU101 and UNITY", "Assured Telematics Inc (ATI) Fleet Management System with Geotab Integration", "Schneider Electric EcoStruxure Power Monitoring Expert (PME)", "Schneider Electric EcoStruxure Power Build Rapsody"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: CISA encourages users and administrators to review the advisories for technical details and mitigations.

Update

Published:

All CISA Advisories
Schneider Electric Galaxy VS, Galaxy VL, Galaxy VXL

Schneider Electric's Galaxy VS, Galaxy VL, and Galaxy VXL products are affected by a critical vulnerability that allows for unauthenticated remote code execution due to missing authentication in the SSH server. This vulnerability poses significant risks to critical infrastructure sectors and requires immediate attention to mitigate potential exploits.


Impact: ["Galaxy VS", "Galaxy VL", "Galaxy VXL"]

In the Wild: No

Age: Recently disclosed

Remediation: Disable SSH server or implement firewall rules; apply patches when available.

Phishing CVE Exploit Vulnerability Update

Published:

All CISA Advisories
Siemens Siveillance Video

Siemens Siveillance Video has a vulnerability related to missing encryption of sensitive data, which could allow unauthorized access to system configuration files and affect backup data. The vulnerability, identified as CVE-2025-1688, poses a significant risk as it can be exploited remotely, necessitating immediate attention from users to mitigate potential security breaches.


Impact: ["Siemens Siveillance Video: Versions V24.1 and later"]

In the Wild: No

Age: Recently disclosed

Remediation: Change system configuration password settings; currently no fix available.

Phishing CVE Vulnerability Update

Published:

All CISA Advisories
National Instruments Circuit Design Suite

The National Instruments Circuit Design Suite has multiple vulnerabilities, including out-of-bounds writes and reads, as well as a stack-based buffer overflow, which could allow attackers to execute arbitrary code or disclose information. Users are advised to update to version 14.3.1 or later to mitigate these risks.


Impact: ["National Instruments Circuit Design Suite: Versions 14.3.0 and prior"]

In the Wild: No

Age: Recently disclosed

Remediation: Update to version 14.3.1 or later

CVE Exploit Vulnerability Update

Published: