Critical vulnerability exploited in the wild
In affected versions of Cacti v1.2.22, a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti. Gaining access to the Cacti instance of an organization could give attackers with the opportunity to learn about the types of devices on the network and their local IP addresses. Learn More »
Common Vulnerabilities and Exposures
Background
Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users.
Latest Development
Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.
December 5, 2022: The patch was released in version 1.2.23 and 1.3.0 on https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf
February 16, 2023: CISA released advisory and has added CVE-202246169 to its list of known exploited vulnerability (KEV).
FortiGuard Labs has already released an IPS signature, in January, to detect and block such attacks and also recommends Cacti admins to patch the vulnerable Cacti versions to 1.2.23, 1.3.0 and above.
FortiGuard Cybersecurity Framework
Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.
-
IPS
-
Application Firewall
-
Assisted Response Services
-
Automated Response
-
InfoSec Services
-
Attack Surface Monitoring (Inside & Outside)
Threat Intelligence
Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.
Loading ...
References
Sources of information in support and relation to this Outbreak and vendor.