Source: Ministry of education information & communication security contingency platform
"" "" ""
| Publication Number | TACERT-ANA-2026012808010202 | Publication Time | 2026/01/28 08:56 |
| Incident Type | ANA-Vulnerability Alert | Discovery Time | 2026/01/28 08:56 |
| Impact Level | Low | ||
| [Subject] 【Vulnerability Alert】CISA Adds Six Known Exploited Vulnerabilities to the KEV Catalog (2026/01/19–2026/01/25) |
|||
|
[Content] 【Whether Ransomware Exploitation Occurred: Unknown】 A code injection vulnerability exists in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance. This vulnerability may allow an attacker to gain user-level access to the underlying operating system and further escalate privileges to root. 【CVE-2025-68645】Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability (CVSS v3.1: 8.8) 【Whether Ransomware Exploitation Occurred: Unknown】 A PHP Remote File Inclusion vulnerability exists in Synacor Zimbra Collaboration Suite (ZCS). This vulnerability may allow a remote attacker to send specially crafted requests to the /h/rest endpoint, thereby affecting internal request dispatching and including arbitrary files within the WebRoot directory. 【CVE-2025-34026】Versa Concerto Improper Authentication Vulnerability (CVSS v3.1: 7.5) 【Whether Ransomware Exploitation Occurred: Unknown】 An improper authentication vulnerability exists in the Traefik reverse proxy configuration of the Versa Concerto SD-WAN orchestration platform, which may allow attackers to access management endpoints. Internal Actuator endpoints may be abused to obtain heap dumps and trace logs. 【CVE-2025-31125】Vite Vitejs Improper Access Control Vulnerability (CVSS v3.1: 5.3) 【Whether Ransomware Exploitation Occurred: Unknown】 An improper access control vulnerability exists in Vite Vitejs. Attackers may access unauthorized file contents via specific query parameters. Only applications that expose the Vite development server externally (using the --host or server.host configuration options) are affected. 【CVE-2025-54313】Prettier eslint-config-prettier Embedded Malicious Code Vulnerability (CVSS v3.1: 7.5) 【Whether Ransomware Exploitation Occurred: Unknown】 An embedded malicious code vulnerability exists in Prettier eslint-config-prettier. When installing the affected package, the system executes the install.js file, which launches the malicious program node-gyp.dll on Windows systems. 【CVE-2024-37079】Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability (CVSS v3.1: 9.8) 【Whether Ransomware Exploitation Occurred: Unknown】 An out-of-bounds write vulnerability exists in Broadcom VMware vCenter Server in its implementation of the DCERPC protocol. A malicious attacker with network access to the vCenter Server may send specially crafted network packets, potentially resulting in remote code execution." |
|||
|
[Affected Platform] 【CVE-2025-68645】Please refer to the affected versions listed by the official source: https://wiki.zimbra.com/wiki/Security_Center 【CVE-2025-34026】Please refer to the affected versions listed by the official source: https://security-portal.versa-networks.com/emailbulletins/6830f94328defa375486ff2e 【CVE-2025-31125】Please refer to the affected versions listed by the official source: https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8 【CVE-2025-54313】Please refer to the affected versions listed by the official source: https://github.com/advisories/GHSA-f29h-pxvx-f335 【CVE-2024-37079】Please refer to the affected versions listed by the official source: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453 |
|||
|
[Recommended Actions] 【CVE-2025-68645】The vendor has released a patch for this vulnerability. Please update to the relevant versions: https://wiki.zimbra.com/wiki/Security_Center 【CVE-2025-34026】The vendor has released a patch for this vulnerability. Please update to the relevant versions: https://security-portal.versa-networks.com/emailbulletins/6830f94328defa375486ff2e 【CVE-2025-31125】The vendor has released a patch for this vulnerability. Please update to the relevant versions: https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8 【CVE-2025-54313】The vendor has released a patch for this vulnerability. Please update to the relevant versions: https://github.com/advisories/GHSA-f29h-pxvx-f335 【CVE-2024-37079】The vendor has released a patch for this vulnerability. Please update to the relevant versions: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453 |
|||
| [Reference] |
|||