Research Alerts
- CVE-2024-3400: Details on exploitation of this flaw are now available publicy and patches have begun being released by the vendor. Immediate patching is recommended.
- CVE-2024-3273: Active exploitation has been detected for this flaw, which will not be patched as the devices have reached end of life. Customers recommended to retire/ replace devices ASAP.
- CVE-2023-48788: Researchers observed attackers exploiting this flaw to install unauthorized remote management and monitoring tools and PowerShell backdoors. Patching is strongly advised.
- CVE-2024-31497: This critical vulnerability can be used to compromise a private key, although exploitation requires compromise of a server the key has been used to authenticate to.