Unauthenticated remote code execution
https://securityaffairs.com/181453/apt/china-linked-silk-typhoon-apt-targets-north-america.html
https://www.securityweek.com/chinese-silk-typhoon-hackers-exploited-commvault-zero-day/
https://www.darkreading.com/cloud-security/silk-typhoon-north-american-orgs-cloud
https://thehackernews.com/2025/08/chinese-hackers-murky-genesis-and.html
https://www.crowdstrike.com/en-us/blog/murky-panda-trusted-relationship-threat-in-cloud/
https://cyberscoop.com/crowdstrike-silk-typhoon-murky-panda-china-espionage/
https://horizon3.ai/attack-research/attack-blogs/cve-2025-5777-citrixbleed-2-write-up-maybe/
https://www.theregister.com/2025/03/05/china_silk_typhoon_update/
https://www.microsoft.com/en-us/security/blog/2025/03/05/silk-typhoon-targeting-it-supply-chain/
https://www.darkreading.com/remote-workforce/china-silk-typhoon-it-supply-chain-attacks
https://thehackernews.com/2025/03/china-linked-silk-typhoon-expands-cyber.html
https://www.security.com/threat-intelligence/ransomware-trends-2025
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a
https://www.reliaquest.com/blog/inc-ransom-attack-analysis-extortion-methodologies/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-242a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a
https://securityaffairs.com/164838/breaking-news/excobalt-cybercrime-group-targets-russian-orgs.html
https://services.google.com/fh/files/misc/m-trends-2024.pdf
https://therecord.media/xerox-xbs-cyberattack?&web_view=true
Published: 2023-07-19
Updated: 2025-10-24
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.94052
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Concern