Here are the CVE updates for the week of March 10th through the 16th.
CRITICAL SEVERITY VULNERABILITIES
Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | CVE-2024-13161 (CISA KEV)
Description: A path traversal vulnerability has been identified in Ivanti Endpoint Manager (EPM) versions prior to the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update. This flaw allows a remote unauthenticated attacker to exploit improper path validation and gain unauthorized access to sensitive information stored on the system.
Potential Impacts:
- Sensitive Information Disclosure: Attackers could retrieve configuration files, credentials, or other confidential data.
- Increased Attack Surface: Leaked information may be leveraged for further attacks, including privilege escalation.
- Regulatory and Compliance Risks: Exposure of sensitive data may lead to non-compliance with security regulations.
Mitigation Recommendations:
- Apply Security Updates: Upgrade Ivanti EPM to the latest security update to patch the vulnerability.
- Restrict Network Access: Limit exposure by restricting access to the affected service to trusted IP ranges.
- Monitor and Audit Logs: Regularly review logs for unusual access patterns or unauthorized file requests.
- Implement Web Application Firewall (WAF): Use a WAF to detect and block malicious path traversal attempts.
Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | CVE-2024-13160 (CISA KEV)
Description: A path traversal vulnerability in Ivanti Endpoint Manager (EPM) versions prior to the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to access files outside the intended directory. This could lead to unauthorized disclosure of sensitive information due to improper input validation.
Potential Impacts:
- Sensitive Data Exposure: Attackers may access confidential files, including credentials and configuration files.
- Increased Attack Surface: Leaked information could facilitate further exploitation, such as privilege escalation.
- Compliance Risks: Unauthorized access to sensitive data may result in regulatory violations and legal consequences.
Mitigation Recommendations:
- Apply Security Patches: Upgrade Ivanti EPM to the latest security update to address the vulnerability.
- Restrict Access: Limit network exposure by allowing only trusted IPs to access affected systems.
- Enable Logging and Monitoring: Regularly review logs to detect unusual file access or unauthorized requests.
- Use a Web Application Firewall (WAF): Deploy a WAF to block potential path traversal attempts.
Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | CVE-2024-13159 (CISA KEV)
Description: A path traversal vulnerability exists in Ivanti Endpoint Manager (EPM) versions prior to the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update. A remote unauthenticated attacker can exploit this flaw to access files outside the intended directory, potentially exposing sensitive information.
Potential Impacts:
- Sensitive Data Exposure: Attackers may access confidential files, including credentials and configuration files.
- Increased Attack Surface: Leaked information could facilitate further exploitation, such as privilege escalation.
- Compliance Risks: Unauthorized access to sensitive data may result in regulatory violations and legal consequences.
Mitigation Recommendations:
- Apply Security Patches: Upgrade Ivanti EPM to the latest security update to address the vulnerability.
- Restrict Access: Limit network exposure by allowing only trusted IPs to access affected systems.
- Enable Logging and Monitoring: Regularly review logs to detect unusual file access or unauthorized requests.
- Use a Web Application Firewall (WAF): Deploy a WAF to block potential path traversal attempts.
Advantive VeraCore Unrestricted File Upload Vulnerability | CVE-2024-57968 (CISA KEV)
Description: A vulnerability in Advantive VeraCore before version 2024.4.2.1 allows remote authenticated users to upload files to unintended directories, including ones that may be publicly accessible through web browsing. This issue arises due to improper file upload restrictions in upload.aspx, potentially leading to data exposure or further exploitation.
Potential Impacts:
- Unauthorized File Access: Uploaded files may be accessible to other users, leading to data leaks.
- Malicious File Execution: Attackers may upload scripts or executable files, enabling further exploitation.
- Compliance and Privacy Risks: Sensitive files could be exposed, violating security policies or regulations.
Mitigation Recommendations:
- Update to the Latest Version: Upgrade to Advantive VeraCore 2024.4.2.1 or later to patch the vulnerability.
- Restrict File Upload Locations: Configure the system to allow uploads only to secure and intended directories.
- Validate Uploaded Files: Implement strict file validation to prevent unauthorized file types.
- Monitor and Audit Upload Activity: Regularly review file uploads for suspicious activity.
- Apply Access Controls: Limit file access to authorized users and prevent public exposure.
HIGH SEVERITY VULNERABILITIES
Advantive VeraCore SQL Injection Vulnerability | CVE-2025-25181 (CISA KEV): A SQL injection vulnerability exists in timeoutWarning.asp in Advantive VeraCore through version 2025.1.0. This vulnerability allows remote attackers to execute arbitrary SQL commands by exploiting improper input validation in the PmSess1 parameter. Successful exploitation could lead to unauthorized database access, data manipulation, or full compromise of the affected system.
Use-After-Free Vulnerability in Microsoft Office Access | CVE-2025-26630: A use-after-free vulnerability has been identified in Microsoft Office Access, which could allow a local attacker to execute arbitrary code. This issue occurs due to improper memory handling, where a freed memory object is accessed, leading to potential code execution with the privileges of the affected application.
Denial of Service Vulnerability in Zoom Workplace Apps for iOS | CVE-2025-0150: A use-after-free vulnerability has been identified in Microsoft Office Access, which could allow a local attacker to execute arbitrary code. This issue occurs due to improper memory handling, where a freed memory object is accessed, leading to potential code execution with the privileges of the affected application.
Privilege Escalation Vulnerability in Zoom Workplace Apps | CVE-2025-27439: A buffer underflow vulnerability has been identified in some Zoom Workplace Apps, which may allow an authenticated user to escalate privileges via network access. This issue occurs due to improper memory handling, potentially enabling an attacker to gain higher-level access within the application or operating system.
Improper Verification of Cryptographic Signature in Samsung SmartThings | CVE-2025-2233: A vulnerability in Samsung SmartThings allows network-adjacent attackers to bypass authentication due to improper verification of cryptographic signatures. The flaw exists in the Hub Local API service, which listens on TCP port 8766 by default. Since authentication is not required to exploit this issue, an attacker within the same network can leverage this flaw to gain unauthorized access to the system.
MEDIUM SEVERITY VULNERABILITIES
Sensitive Information Exposure in Windows NTFS Logs | CVE-2025-24984: A vulnerability in Windows NTFS allows sensitive information to be improperly recorded in log files. An unauthorized attacker with physical access to the affected system could exploit this issue to retrieve confidential data from NTFS logs. This vulnerability could lead to unintended information disclosure, potentially exposing sensitive user or system data.
Improper Access Control Vulnerability in NVIDIA Riva | CVE-2025-23243: A vulnerability in NVIDIA Riva could allow an attacker to exploit improper access control mechanisms, potentially leading to data tampering or a denial-of-service (DoS) condition. A successful exploit may enable unauthorized modifications to sensitive data or disrupt system functionality.
Missing Authorization Vulnerability in Jogesh Responsive Google Map | CVE-2025-28920: A missing authorization vulnerability in Jogesh Responsive Google Map (versions up to 3.1.5) allows attackers to exploit improperly configured access control security levels. This flaw could enable unauthorized users to access or modify restricted settings within the plugin.
Directory Traversal Vulnerability in WordPress Download Manager Plugin | CVE-2025-1785: A directory traversal vulnerability exists in the Download Manager plugin for WordPress, affecting all versions up to and including 3.3.08. The vulnerability is exploitable via the wpdm_newfile action, allowing authenticated attackers with Author-level access or higher to overwrite files outside the intended directory. This could lead to denial of service (DoS) or other unintended consequences.