Source: Ministry of education information & communication security contingency platform
"" "" ""
| Publication Number | TACERT-ANA-2026021002022424 | Publication Time | 2026/02/10 14:15 |
| Incident Type | ANA-Vulnerability Alert | Discovery Time | 2026/02/10 14:15 |
| Impact Level | Low | ||
| [Subject] 【Security Advisory】CISA Adds 6 Known Exploited Vulnerabilities to the KEV Catalog (2026/02/02-2026/02/08) |
|||
|
[Content] 【Exploited by Ransomware: Unknown】 GitLab Community and Enterprise Editions contain a Server-Side Request Forgery (SSRF) vulnerability that may allow an unauthorized external user to perform server-side requests via the CI Lint API. 【CVE-2025-64328】Sangoma FreePBX OS Command Injection Vulnerability (CVSS v3.1: 7.2) 【Exploited by Ransomware: Unknown】 Sangoma FreePBX Endpoint Manager contains an OS command injection vulnerability. An authenticated, known user may inject commands via the testconnection - check_ssh_connect() function, thereby remotely accessing the system with asterisk user privileges. 【CVE-2019-19006】Sangoma FreePBX Improper Authentication Vulnerability (CVSS v3.1: 9.8) 【Exploited by Ransomware: Unknown】 Sangoma FreePBX contains an improper authentication vulnerability that may allow an unauthorized user to bypass the password authentication mechanism and gain access to services provided by the FreePBX administrative interface. 【CVE-2025-40551】SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 9.8) 【Exploited by Ransomware: Unknown】 SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that may lead to remote code execution, allowing an attacker to execute arbitrary commands on the host system. 【CVE-2025-11953】React Native Community CLI OS Command Injection Vulnerability (CVSS v3.1: 9.8) 【Exploited by Ransomware: Unknown】 React Native Community CLI contains an OS command injection vulnerability that may allow an unauthenticated network attacker to send POST requests to the Metro Development Server and execute arbitrary executables through exposed vulnerable endpoints. In a Windows environment, the attacker may also execute arbitrary shell commands with fully controllable parameters. 【CVE-2026-24423】SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability (CVSS v3.1: 9.8) 【Exploited by Ransomware: Yes】 The ConnectToHub API method in SmarterTools SmarterMail contains a missing authentication for critical function vulnerability. This may allow an attacker to direct a SmarterMail instance to a malicious HTTP server, potentially resulting in the execution of malicious operating system commands." |
|||
|
[Affected Platform] 【CVE-2025-64328】 Please refer to the affected versions listed in the official advisory: https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw 【CVE-2019-19006】 FreePBX versions 13.0.0.0 to 13.0.197.13 (including 13.0.197.13) FreePBX versions 14.0.0.0 to 14.0.13.11 (including 14.0.13.11) FreePBX versions 15.0.0.0 to 15.0.16.26 (including 15.0.16.26) 【CVE-2025-40551】 Please refer to the affected versions listed in the official advisory: https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40551 【CVE-2025-11953】 Please refer to the affected versions listed in the official advisory: https://github.com/advisories/GHSA-399j-vxmf-hjvr 【CVE-2026-24423】 SmarterMail versions prior to Build 9511 |
|||
|
[Recommended Actions] https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/ 【CVE-2025-64328】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory: https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw 【CVE-2019-19006】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory: https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-001/62772 【CVE-2025-40551】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory: https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40551 【CVE-2025-11953】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory: https://github.com/advisories/GHSA-399j-vxmf-hjvr 【CVE-2026-24423】 Upgrade the affected product to the following version (or later): SmarterMail Build 9511 |
|||
| [Reference] |
|||