Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation

Posted on December 15, 2025December 15, 2025 By CWS

A crucial vulnerability affecting Sierra Wi-fi routers has been added to its Identified Exploited Vulnerabilities (KEV) catalog.

This choice comes after proof emerged that the flaw is being actively exploited within the wild. Posing important dangers to organizations that also make the most of these legacy gadgets.

Federal companies and personal organizations at the moment are urged to take rapid motion to safe their networks towards this particular menace.

The vulnerability, tracked as CVE-2018-4063, impacts the Sierra Wi-fi AirLink ALEOS working system. It’s described as an “Unrestricted Add of File with Harmful Sort” flaw.

CVE IDCVE-2018-4063DescriptionSierra Wi-fi AirLink ALEOS accommodates an unrestricted add of file with harmful kind vulnerability.Vulnerability NameSierra Wi-fi AirLink ALEOS Unrestricted Add of File with Harmful Sort VulnerabilityRelated CWECWE-434

Safety researchers have decided that the problem permits an authenticated attacker to take advantage of the net server. By sending a specifically crafted HTTP request, a menace actor can add malicious recordsdata on to the machine.

As soon as a malicious file is uploaded, it can lead to the execution of arbitrary code on the internet server. This Distant Code Execution (RCE) functionality successfully provides attackers management over the compromised router.

Though the vulnerability requires authentication to set off, attackers typically exploit it together with weak or default credentials to realize preliminary entry.

The severity of this flaw is compounded by the truth that it permits for persistent entry and potential lateral motion inside a community.

Finish-of-Life Dangers and Mitigation

A crucial side of this alert is the standing of the impacted {hardware}. CISA has famous that the affected Sierra Wi-fi AirLink merchandise could also be Finish-of-Life (EoL) or Finish-of-Service (EoS).

This implies the seller is probably going now not releasing safety updates or patches for these gadgets. Consequently, the usual recommendation to “patch instantly” is just not relevant right here. As a substitute, CISA strongly advises customers to discontinue utilizing these merchandise.

Continued use of EoL {hardware} leaves networks uncovered to identified exploits that can not be remediated by way of software program updates.

Federal Civilian Government Department (FCEB) companies have been given a strict deadline to take away these gadgets from their infrastructure to adjust to Binding Operational Directive (BOD) 22-01.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Active, Adds, Catalogue, CISA, Exploitation, KEV, Router, Sierra, Vulnerability

Post navigation

Previous Post: VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption
Next Post: Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

Related Posts

New Phishing Attack Via OneDrive Attacking C-level Employs for Corporate Credentials Cyber Security News
Endpoint Security Reimagined EDR vs XDR Comparison Cyber Security News
Weaponized ScreenConnect RMM Tool Tricks Users into Downloading Xworm RAT Cyber Security News
Chinese PlushDaemon Hackers use EdgeStepper Tool to Hijack Legitimate Updates and Redirect to Malicious Servers Cyber Security News
Hackers Actively Exploiting Langflow RCE Vulnerability to Deploy Flodrix Botnet Cyber Security News
Detecting Lateral Movement in Windows-Based Network Infrastructures Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data
  • CISO Communities – Cybersecurity’s Secret Weapon
  • Fortinet FortiWeb Vulnerability (CVE-2025-64446) Exploited in the Wild for Full Admin Takeover
  • 700,000 Records Compromised in Askul Ransomware Attack
  • Echo Raises $35 Million in Series A Funding

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data
  • CISO Communities – Cybersecurity’s Secret Weapon
  • Fortinet FortiWeb Vulnerability (CVE-2025-64446) Exploited in the Wild for Full Admin Takeover
  • 700,000 Records Compromised in Askul Ransomware Attack
  • Echo Raises $35 Million in Series A Funding

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark