Remove Engineering Remove Firewall Remove Internet Remove VPN
article thumbnail

VulnRecap 1/16/24 – Major Firewall Issues Persist

eSecurity Planet

Keep an eye out for security announcements from your firewall vendors; it’s possible additional similar vulnerabilities will come to light. The problem: Juniper Networks released a bulletin about a remote code execution vulnerability in its SRX firewalls and EX switches. This vulnerability is tracked as CVE-2024-21591.

article thumbnail

Zyxel fixed firewall unauthenticated remote command injection issue

Security Affairs

Zyxel addressed a critical flaw affecting Zyxel firewall devices that allows unauthenticated, remote attackers to gain arbitrary code execution. affecting Zyxel firewall devices that enables unauthenticated and remote attackers to gain arbitrary code execution as the “nobody” user. USG FLEX 50(W) / USG20(W)-VPN ZLD V5.10

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA adds CVE-2022-30525 flaw in Zyxel Firewalls to its Known Exploited Vulnerabilities Catalog

Security Affairs

US Critical Infrastructure Security Agency (CISA) adds critical CVE-2022-30525 RCE flaw in Zyxel Firewalls to its Known Exploited Vulnerabilities Catalog. affecting Zyxel firewall devices that enables unauthenticated and remote attackers to gain arbitrary code execution as the “nobody” user. USG FLEX 50(W) / USG20(W)-VPN ZLD V5.10

article thumbnail

CISA Order Highlights Persistent Risk at Network Edge

Krebs on Security

government agency in charge of improving the nation’s cybersecurity posture is ordering all federal agencies to take new measures to restrict access to Internet-exposed networking equipment. “This is reachable pre-authentication, on every SSL VPN appliance,” French vulnerability researcher Charles Fol tweeted.

Risk 213
article thumbnail

Best Enterprise VPN Solutions for 2021

eSecurity Planet

The internet and, now, cloud computing transformed the way we conduct business. Enter VPN technology. One longtime cybersecurity solution for small teams up to global enterprise networks is virtual private networks (VPN). Top VPN products. CyberGhost VPN. The CyberGhost VPN app has an average 4.1/5

VPN 57
article thumbnail

Vulnerability Recap 4/15/24 – Palo Alto, Microsoft, Ivanti Exploits

eSecurity Planet

Threats range from severe weaknesses in Ivanti’s VPN appliances to zero-day exploits in popular software such as Palo Alto Networks’ PAN-OS and Telegram’s Windows client. You can strengthen your cybersecurity defenses by using reliable antivirus software, firewalls, intrusion detection systems, and virtual private networks (VPNs).

article thumbnail

Announcing General Availability of Remote Desktop Protocol Support for Duo Network?Gateway

Duo's Security Blog

The DNG now allows users to access on-premises applications and desktops securely and easily via RDP, without requiring a VPN connection. To learn how this feature works, check out the blog post How New Duo Feature Lets Users Skip the VPN Hassle from two Duo Engineering team members. Once you go for DNG, you never go back.”

VPN 98