Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
CISA Confirms Critical Dassault and XWiki Flaws Are Under Active Attack
Advertisements

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two new critical vulnerabilities affecting products from Dassault Systèmes and XWiki to its Known Exploited Vulnerabilities (KEV) catalog. This action confirms that both security flaws are being actively exploited in real-world attacks.

The inclusion in the KEV catalog serves as an official alert to federal agencies and private organizations about the immediate and ongoing threats posed by these vulnerabilities. CISA has mandated that Federal Civilian Executive Branch (FCEB) agencies must apply the necessary patches by a specified deadline to secure their networks against these confirmed exploits.

Dassault Systèmes RCE Flaw Exploited

The first vulnerability noted by CISA impacts Dassault Systèmes’ CATIA, DELMIA, and ENOVIA V5-6R2022 product line. This critical flaw allows for remote code execution (RCE), enabling attackers to run arbitrary code on affected systems. The presence of this vulnerability in the KEV catalog confirms that threat actors have developed and are using exploits to compromise systems running the vulnerable software. Organizations using these specific Dassault products are advised to prioritize the installation of security updates provided by the vendor.

XWiki Privilege Escalation and RCE Under Attack

The second vulnerability added to the KEV catalog affects the XWiki open-source collaboration platform. This security flaw permits privilege escalation and remote code execution. Attackers are leveraging this vulnerability to gain elevated permissions on a target XWiki instance, which can then be used to execute unauthorized commands. The active exploitation of this flaw poses a significant risk to data integrity and system control for users of the platform. XWiki has released patches, and administrators are urged to update their installations immediately to prevent compromise.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading