Security News > 2015 > December > Critical RCE bug in FireEye's security appliances exploitable via email (Help Net Security)
2015-12-16 09:00
Last week, FireEye has silently pushed out a patch for an extremely easy-to-exploit remote code execution bug affecting its NX, EX, FX and AX Series security appliances in their default configuration.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/3B57KhLnkyQ/secworld.php
Related news
- Synology Urges Patch for Critical Zero-Click RCE Flaw Affecting Millions of NAS Devices (source)
- HPE warns of critical RCE flaws in Aruba Networking access points (source)
- Critical Veeam RCE bug now used in Frag ransomware attacks (source)
- HPE Issues Critical Security Patches for Aruba Access Point Vulnerabilities (source)
- Palo Alto Networks warns of critical RCE zero-day exploited in attacks (source)
- Major security audit of critical FreeBSD components now available (source)
- Critical RCE bug in VMware vCenter Server now exploited in attacks (source)
- Critical 9.8-rated VMware vCenter RCE bug exploited after patch fumble (source)
- Phishers send corrupted documents to bypass email security (source)
- Veeam warns of critical RCE bug in Service Provider Console (source)