Tag: firmware
-
Cyberbedrohungen in vernetzten Haushalten haben sich im letzten Jahr verdreifacht
Smart-TVs, Streaming-Boxen, Router und Kameras das Internet-of-Things-Ökosystem (IoT) in Haushalten wächst. Mit ihm nimmt auch die Gefahr dramatisch zu, dass Verbraucher Opfer von Cyberangriffen werden. Angreifer nutzen verstärkt Automatisierung, unsichere Firmware und veraltete Geräte, um digitale Haushalte in großem Umfang zu kompromittieren. Zu diesem Schluss kommen Bitdefender und Netgear im aktuellen ‘2025 IoT Security […]…
-
TP-Link urges immediate updates for Omada Gateways after critical flaws discovery
TP-Link warns of critical flaws in Omada gateways across ER, G, and FR models. Users should update firmware immediately to stay secure. TP-Link is warning users of critical flaws impacting its Omada gateway devices. The Taiwanese company published two security advisories this week, outlining four vulnerabilities that impacts more than a dozen products across the…
-
TP-Link warns of critical command injection flaw in Omada gateways
TP-Link has made firmware updates available for a broad range of Omada gateway models to address four vulnerabilities, among which a critical pre-auth OS command injection. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/tp-link-warns-of-critical-command-injection-flaw-in-omada-gateways/
-
Verbatim Keypad Secure: Sicherheits-USB-Stick trotz Patch weiterhin knackbar
Trotz schützender Firmware-Updates sind verschlüsselte Verbatim-USB-Datenträger mit PIN-Tastenfeld weiter anfällig für Brute-Force-Attacken. First seen on golem.de Jump to article: www.golem.de/news/verbatim-keypad-secure-sicherheits-usb-stick-trotz-patch-weiterhin-knackbar-2510-201366.html
-
Network security devices endanger orgs with ’90s era flaws
Tags: access, application-security, apt, authentication, breach, cisa, cisco, citrix, cloud, control, cve, cyber, cybersecurity, dos, email, endpoint, exploit, finance, firewall, firmware, flaw, government, group, incident response, infrastructure, injection, ivanti, jobs, linux, mitigation, mobile, network, open-source, penetration-testing, programming, regulation, remote-code-execution, reverse-engineering, risk, risk-management, router, service, software, threat, tool, vpn, vulnerability, zero-day2024 networking and security device zero-day flaws Product CVE Flaw type CVSS Check Point Quantum Security Gateways and CloudGuard Network Security CVE-2024-24919 Path traversal leading to information disclosure 8.6 (High) Cisco Adaptive Security Appliance CVE-2024-20359 Arbitrary code execution 6.6 (Medium) Cisco Adaptive Security Appliance CVE-2024-20353 Denial of service 8.6 (High) Cisco Adaptive Security Appliance …
-
When ‘Secure Boot’ Doesn’t Mean ‘Secure’
Eclypsium Researchers Find UEFI Weakness in Framework Laptops and Desktops. Roughly 200,000 laptops and desktops made by modular sensation Framework contain a firmware vulnerability allowing attackers to disable Secure Boot and run unsigned code, say security researchers. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/when-secure-boot-doesnt-mean-secure-a-29733
-
200,000 Linux systems from Framework are shipped with signed UEFI components vulnerable to Secure Boot bypass
About 200K Linux systems from Framework shipped with signed UEFI components vulnerable to Secure Boot bypass, allowing bootkit installation and persistence. Firmware security company Eclypsium warns that about 200,000 Linux systems from Framework are shipped with signed UEFI components vulnerable to Secure Boot bypass, allowing bootkit installation and persistence. The experts pointed out that signed…
-
200,000 Linux systems from Framework are shipped with signed UEFI components vulnerable to Secure Boot bypass
About 200K Linux systems from Framework shipped with signed UEFI components vulnerable to Secure Boot bypass, allowing bootkit installation and persistence. Firmware security company Eclypsium warns that about 200,000 Linux systems from Framework are shipped with signed UEFI components vulnerable to Secure Boot bypass, allowing bootkit installation and persistence. The experts pointed out that signed…
-
UEFI Shell Flaws Let Hackers Disable Secure Boot on Over 200,000 Laptops
Security researchers have uncovered critical vulnerabilities in signed UEFI shells that allow attackers to completely bypass Secure Boot protections on approximately 200,000 Framework laptops and desktops. These flaws expose a fundamental weakness in firmware security that could enable persistent, undetectable malware infections at the most privileged system level. The vulnerabilities center around legitimate diagnostic tools…
-
UEFI Shell Flaws Let Hackers Disable Secure Boot on Over 200,000 Laptops
Security researchers have uncovered critical vulnerabilities in signed UEFI shells that allow attackers to completely bypass Secure Boot protections on approximately 200,000 Framework laptops and desktops. These flaws expose a fundamental weakness in firmware security that could enable persistent, undetectable malware infections at the most privileged system level. The vulnerabilities center around legitimate diagnostic tools…
-
Clevo UEFI Leak Allows Signing of Malicious Firmware with BootGuard Keys
Clevo accidentally exposed private keys used in its Intel Boot Guard implementation, allowing attackers to sign malicious firmware that would be trusted during the earliest boot stages. The issue is tracked as Vulnerability Note VU#538470 and was published on October 13, 2025. Researchers warn that this leak can enable stealthy and persistent compromise on systems…
-
Aisuru’s 30 Tbps botnet traffic crashes through major US ISPs
Tags: attack, botnet, breach, cybercrime, data-breach, ddos, firmware, infrastructure, iot, malicious, router, serviceFrom Mirai roots to proxy sales: Aisuru is not new. Its foundations trace back to leaked code of the Mirai IoT botnet from 2016, which held “KrebsOnSecurity,” the investigative blog run by Krebs, offline for four days. “The 2016 assault was so large that Akamai which was providing pro-bono DDoS protection for KrebsOnSecurity at the…
-
Aisuru’s 30 Tbps botnet traffic crashes through major US ISPs
Tags: attack, botnet, breach, cybercrime, data-breach, ddos, firmware, infrastructure, iot, malicious, router, serviceFrom Mirai roots to proxy sales: Aisuru is not new. Its foundations trace back to leaked code of the Mirai IoT botnet from 2016, which held “KrebsOnSecurity,” the investigative blog run by Krebs, offline for four days. “The 2016 assault was so large that Akamai which was providing pro-bono DDoS protection for KrebsOnSecurity at the…
-
Best Website Builders of 2025
Secure Boot is a technology that ensures the system firmware checks that the system boot loader is signed with a cryptographic key authorized by a database cont First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/best-website-builders-of-2025/
-
Microsoft Defender bug triggers erroneous BIOS update alerts
Microsoft is working to resolve a bug that causes Defender for Endpoint to incorrectly tag some devices’ BIOS (Basic Input/Output System) firmware as outdated, prompting users to update it. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-defender-bug-triggers-erroneous-bios-update-alerts/
-
Microsoft Defender bug triggers erroneous BIOS update alerts
Microsoft is working to resolve a bug that causes Defender for Endpoint to incorrectly tag some devices’ BIOS (Basic Input/Output System) firmware as outdated, prompting users to update it. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-defender-bug-triggers-erroneous-bios-update-alerts/
-
TOTOLINK X6000R Routers Hit by Three Vulnerabilities Allowing Remote Code Execution
Three critical security flaws were discovered in firmware version V9.4.0cu.1360_B20241207 of the TOTOLINK X6000R router released on March 28, 2025. These vulnerabilities range from argument injection and command injection to a security bypass that can lead to remote code execution. Attackers can crash devices, corrupt system files, and execute arbitrary commands without authentication. Users must…
-
Critical WD My Cloud bug allows remote command injection
Western Digital has released firmware updates for multiple My Cloud NAS models to patch a critical-severity vulnerability that could be exploited remotely to execute arbitrary system commands. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/critical-wd-my-cloud-bug-allows-remote-command-injection/
-
Western Digital My Cloud NAS devices vulnerable to unauthenticated RCE (CVE-2025-30247)
Western Digital has fixed a critical remote code execution vulnerability (CVE-2025-30247) in the firmware powering its My Cloud network-attached storage (NAS) devices, and has … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/30/western-digital-my-cloud-nas-cve-2025-30247/
-
Gone in 60 Minutes: Akira Defeats MFA for SonicWall SSL VPNs
‘Opportunistic, Mass Exploitation’ Campaign Surging, Say Cybersecurity Researchers. Attackers wielding Akira ransomware appear to be engaged in an opportunistic, mass exploitation of SonicWall SSL VPN servers, even when they’re using the latest firmware and configured to require multifactor authentication one-time passwords, warn cybersecurity researchers. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/gone-in-60-minutes-akira-defeats-mfa-for-sonicwall-ssl-vpns-a-29590
-
Patch now: Attacker finds another zero day in Cisco firewall software
Tags: access, attack, best-practice, cisa, cisco, cve, cyber, defense, detection, exploit, firewall, firmware, Hardware, incident response, malware, monitoring, network, resilience, risk, router, software, technology, threat, tool, update, vpn, vulnerability, zero-day, zero-trustroot, which may lead to the complete compromise of the device.Affected are devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) software, Cisco Secure Firewall Threat Defense (FTD) software, as well as devices running Cisco IOS, IOS XE and IOS XR software. There are two attack scenarios:an unauthenticated, remote attacker getting into devices running Cisco…
-
Mit Exposure-Management Cyberrisiken in cyberphysischen Systemen reduzieren
Exposure-Management ist mehr als klassisches Schwachstellen-Management. Es handelt sich um einen strategischen, geschäftsorientierten Ansatz, der Cyberrisiken in Operational-Technology-Umgebungen (OT) ganzheitlich bewertet und priorisiert. Statt nur bekannte Schwachstellen aufzulisten, berücksichtigt Exposure-Management zusätzlich Faktoren wie veraltete Firmware, unsichere Protokolle, End-of-Life-Hardware oder Konfigurationsfehler. Entscheidend ist dabei nicht nur die Wahrscheinlichkeit eines Angriffs, sondern auch die Auswirkungen auf Geschäftsprozesse,…
-
Supermicro: Unzählige Server-Mainboards anfällig für Firmware-Backdoors
Angreifer können in die BMC-Firmware zahlreicher Mainboards von Supermicro Malware einschleusen und damit dauerhaft die Kontrolle übernehmen. First seen on golem.de Jump to article: www.golem.de/news/supermicro-unzaehlige-server-mainboards-anfaellig-fuer-firmware-backdoors-2509-200484.html
-
Supermicro: Unzählige Server-Mainboards anfällig für Firmware-Backdoors
Angreifer können in die BMC-Firmware zahlreicher Mainboards von Supermicro Malware einschleusen und damit dauerhaft die Kontrolle übernehmen. First seen on golem.de Jump to article: www.golem.de/news/supermicro-unzaehlige-server-mainboards-anfaellig-fuer-firmware-backdoors-2509-200484.html
-
Supermicro BMC: Schwachstelle ermöglicht persistente Backdoor
Setzt jemand Rechner mit Boards von Supermicro (speziell im Server-Bereich verbreitet) ein? In der Firmware des auf den Board verwendeten BMC wurden im Januar 2025 zwar Schwachstellen gefixt. Diese ermöglichten Angreifern potentiell eine persistente Backdoor auf den betreffenden Systemen einzurichten. … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/09/25/supermicro-bmc-schwachstelle-ermoeglicht-persistente-backdoor/

