Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ivanti, Fortinet, Splunk Release Security Updates

Posted on July 9, 2025July 9, 2025 By CWS

Ivanti, Fortinet, and Splunk on Tuesday introduced patches for dozens of vulnerabilities throughout their product portfolios, together with critical- and high-severity flaws.

Safety updates launched for Ivanti Join Safe (ICS) and Coverage Safe (IPS), Endpoint Supervisor Cell (EPMM), and Endpoint Supervisor (EPM) resolve a complete of 11 bugs that require authentication to be exploited.

The EPM replace resolves three high-severity defects that might permit attackers to decrypt different customers’ passwords or learn arbitrary knowledge from the database, whereas the EPMM refresh fixes two high-severity OS command injection flaws resulting in distant code execution.

Ivanti fastened six medium-severity points in ICS and IPS, warning they may very well be exploited to change restricted settings, trigger a denial-of-service (DoS) situation, extract delicate info from log information, write to a protected configuration file on disk, and entry inner community providers.

“We’ve got no proof of any of those vulnerabilities being exploited within the wild,” Ivanti notes in its advisory.

On Tuesday, Fortinet printed eight advisories detailing one critical-, one high-, 5 medium-, and one low-severity vulnerability impacting FortiAnalyzer, FortiIsolator, FortiManager, FortiOS, FortiProxy, FortiSandbox, FortiSASE, FortiVoice, and FortiWeb.

Tracked as CVE-2025-25257 (CVSS rating of 9.6), the vital bug is an SQL injection flaw in FortiWeb that may very well be exploited through crafted HTTP or HTTPS requests to execute unauthorized SQL code or instructions. No authentication is required for profitable exploitation.

Crafted HTTP/HTTPS or CLI requests may be used to take advantage of two high-severity OS command injection defects in FortiVoice. Tracked as CVE-2025-47856 (CVSS rating of seven.2), these points might permit a privileged attacker to run arbitrary code or instructions.Commercial. Scroll to proceed studying.

Fortinet makes no point out of any of the newly addressed vulnerabilities being exploited within the wild. Extra info will be discovered on the corporate’s PSIRT advisories web page.

An important of the 12 advisories that Splunk printed this week resolve critical- and high-severity flaws in third-party dependencies in Splunk SOAR, Enterprise, and DB Join. Most of those are bugs disclosed final 12 months, with a number of 2022 and 2023 CVEs additionally resolved. One difficulty was disclosed in 2013.

Moreover, the corporate introduced fixes for seven medium- and one low-severity difficulty in Splunk Enterprise that may very well be exploited to execute instructions remotely, trigger a DoS situation, change SHC membership state, disable the scheduled search throughout the Archiver utility, create or overwrite system supply sort configurations, suppress a selected alert, and expose the search head cluster splunk.secret key.

Associated: Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday

Associated: Adobe Patches Important Code Execution Bugs

Associated: SAP Patches Important Flaws That May Enable Distant Code Execution, Full System Takeover

Associated: Grafana Patches Chromium Bugs, Together with Zero-Day Exploited within the Wild

Security Week News Tags:Fortinet, Ivanti, Release, Security, Splunk, Updates

Post navigation

Previous Post: Top 10 Best Endpoint Security Tools
Next Post: Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks

Related Posts

US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a ‘Smear Campaign’ Security Week News
Should We Trust AI? Three Approaches to AI Fallibility Security Week News
Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft Security Week News
Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products Security Week News
Ransomware Gang Leaks Alleged Kettering Health Data Security Week News
Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How SOCs Triage Incidents in Seconds with Threat Intelligence
  • Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775
  • New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station
  • First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption
  • New Attack Targeting ScreenConnect Cloud Administrators to Steal Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How SOCs Triage Incidents in Seconds with Threat Intelligence
  • Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775
  • New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station
  • First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption
  • New Attack Targeting ScreenConnect Cloud Administrators to Steal Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News