Security News > 2015 > December > Critical RCE bug in FireEye's security appliances exploitable via email (Help Net Security)
2015-12-16 09:00
Last week, FireEye has silently pushed out a patch for an extremely easy-to-exploit remote code execution bug affecting its NX, EX, FX and AX Series security appliances in their default configuration.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/3B57KhLnkyQ/secworld.php
Related news
- 80% of Critical National Infrastructure Companies Experienced an Email Security Breach in Last Year (source)
- Critical Zimbra RCE flaw exploited to backdoor servers using emails (source)
- Security measures fail to keep up with rising email attacks (source)
- D-Link fixes critical RCE, hardcoded password flaws in WiFi 6 routers (source)
- Exploit code released for critical Ivanti RCE flaw, patch now (source)
- SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE Attacks (source)
- Broadcom fixes critical RCE bug in VMware vCenter Server (source)
- MFA bypass becomes a critical security issue as ransomware tactics advance (source)
- HPE patches three critical security holes in Aruba PAPI (source)
- Critical Zimbra RCE vulnerability under mass exploitation (CVE-2024-45519) (source)