Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fortinet, Ivanti, Nvidia Release Security Updates

Posted on September 10, 2025September 10, 2025 By CWS

Fortinet, Ivanti, and Nvidia on Tuesday introduced safety updates that handle over a dozen high- and medium-severity vulnerabilities throughout their product portfolios.

Ivanti resolved two high-severity inadequate filename validation points in Endpoint Supervisor (EPM) that may very well be exploited remotely, with out authentication, to execute arbitrary code. The exploitation of each defects, nonetheless, require consumer interplay.

Moreover, the corporate introduced patches for 5 high- and 6 medium-severity vulnerabilities in Join Safe, Coverage Safe, ZTA Gateways, and Neurons for Safe Entry.

Probably the most extreme of the safety holes embrace a lacking authorization situation resulting in HTML5 connection hijacking, a CSRF bug resulting in the unauthenticated execution of delicate actions, and lacking authorization flaws that permit attackers to configure authentication-related settings.

Patches had been included in EPM variations 2024 SU3 SR 1 and 2022 SU8 SR 2, Join Safe variations 22.7R2.9 and 22.8R2, Coverage Safe model 22.7R1.5, ZTA Gateways model 22.8R2.3-723, and Neurons for Safe Entry model 22.8R1.4.

“We have now no proof of any of those vulnerabilities being exploited within the wild,” Ivanti notes in its safety replace announcement.

Fortinet launched fixes for a medium-severity OS command injection bug in FortiDDoS that would result in code execution, and for a medium-severity path traversal flaw in FortiWeb resulting in arbitrary file learn.

Nvidia rolled out fixes for one high- and two medium-severity defects within the NVDebug device that would permit attackers to entry privileged accounts, write information to restricted parts, or run code as non-privileged customers.Commercial. Scroll to proceed studying.

The problems may very well be exploited for code execution, privilege escalation, denial-of-service (DoS), data disclosure, or knowledge tampering, and had been resolved in NVDebug device model 1.7.0.

Neither Fortinet nor Nvidia make any point out of those vulnerabilities being exploited within the wild, however customers are suggested to replace their purposes as quickly as potential.

Associated: SAP Patches Important NetWeaver Vulnerabilities

Associated: ICS Patch Tuesday: Rockwell Automation Leads With 8 Safety Advisories

Associated: Two Exploited Vulnerabilities Patched in Android

Associated: Tailoring Safety Coaching to Particular Sorts of Threats

Security Week News Tags:Fortinet, Ivanti, Nvidia, Release, Security, Updates

Post navigation

Previous Post: US Offers $10 Million Reward for Ukrainian Ransomware Operator
Next Post: China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations

Related Posts

Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments Security Week News
Coyote Banking Trojan First to Abuse Microsoft UIA Security Week News
Pharmaceutical Company Inotiv Confirms Ransomware Attack Security Week News
Microsoft Offers $5 Million at Zero Day Quest Hacking Contest Security Week News
Organizations Warned of Exploited Git Vulnerability Security Week News
Europol-Coordinated Global Operation Takes Down Pro-Russian Cybercrime Network Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used
  • Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack
  • CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems
  • Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform
  • GitLab Patches Multiple Vulnerabilities That Enables Denial Of Service And SSRF Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used
  • Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack
  • CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems
  • Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform
  • GitLab Patches Multiple Vulnerabilities That Enables Denial Of Service And SSRF Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News