Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation

CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation

Posted on December 15, 2025December 15, 2025 By CWS

A crucial vulnerability affecting Sierra Wi-fi routers has been added to its Identified Exploited Vulnerabilities (KEV) catalog.

This choice comes after proof emerged that the flaw is being actively exploited within the wild. Posing important dangers to organizations that also make the most of these legacy gadgets.

Federal companies and personal organizations at the moment are urged to take rapid motion to safe their networks towards this particular menace.

The vulnerability, tracked as CVE-2018-4063, impacts the Sierra Wi-fi AirLink ALEOS working system. It’s described as an “Unrestricted Add of File with Harmful Sort” flaw.

CVE IDCVE-2018-4063DescriptionSierra Wi-fi AirLink ALEOS accommodates an unrestricted add of file with harmful kind vulnerability.Vulnerability NameSierra Wi-fi AirLink ALEOS Unrestricted Add of File with Harmful Sort VulnerabilityRelated CWECWE-434

Safety researchers have decided that the problem permits an authenticated attacker to take advantage of the net server. By sending a specifically crafted HTTP request, a menace actor can add malicious recordsdata on to the machine.

As soon as a malicious file is uploaded, it can lead to the execution of arbitrary code on the internet server. This Distant Code Execution (RCE) functionality successfully provides attackers management over the compromised router.

Though the vulnerability requires authentication to set off, attackers typically exploit it together with weak or default credentials to realize preliminary entry.

The severity of this flaw is compounded by the truth that it permits for persistent entry and potential lateral motion inside a community.

Finish-of-Life Dangers and Mitigation

A crucial side of this alert is the standing of the impacted {hardware}. CISA has famous that the affected Sierra Wi-fi AirLink merchandise could also be Finish-of-Life (EoL) or Finish-of-Service (EoS).

This implies the seller is probably going now not releasing safety updates or patches for these gadgets. Consequently, the usual recommendation to “patch instantly” is just not relevant right here. As a substitute, CISA strongly advises customers to discontinue utilizing these merchandise.

Continued use of EoL {hardware} leaves networks uncovered to identified exploits that can not be remediated by way of software program updates.

Federal Civilian Government Department (FCEB) companies have been given a strict deadline to take away these gadgets from their infrastructure to adjust to Binding Operational Directive (BOD) 22-01.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Active, Adds, Catalogue, CISA, Exploitation, KEV, Router, Sierra, Vulnerability

Post navigation

Previous Post: VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption
Next Post: Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

Related Posts

New Phishing Attack Impersonate as DocuSign Deploys Stealthy Malware on Windows Systems New Phishing Attack Impersonate as DocuSign Deploys Stealthy Malware on Windows Systems Cyber Security News
Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory Cyber Security News
New Linux Kernel Vulnerability Directly Exploited from Chrome Renderer Sandbox New Linux Kernel Vulnerability Directly Exploited from Chrome Renderer Sandbox Cyber Security News
New BRICKSTORM Stealthy Backdoor Attacking Tech and Legal Sectors New BRICKSTORM Stealthy Backdoor Attacking Tech and Legal Sectors Cyber Security News
Transparent Tribe Targets India’s Tech Startups Transparent Tribe Targets India’s Tech Startups Cyber Security News
Critical AdonisJS Vulnerability Allow Remote Attacker to Write Files On Server Critical AdonisJS Vulnerability Allow Remote Attacker to Write Files On Server Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark