Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fortinet, Ivanti, Nvidia Release Security Updates

Posted on September 10, 2025September 10, 2025 By CWS

Fortinet, Ivanti, and Nvidia on Tuesday introduced safety updates that handle over a dozen high- and medium-severity vulnerabilities throughout their product portfolios.

Ivanti resolved two high-severity inadequate filename validation points in Endpoint Supervisor (EPM) that may very well be exploited remotely, with out authentication, to execute arbitrary code. The exploitation of each defects, nonetheless, require consumer interplay.

Moreover, the corporate introduced patches for 5 high- and 6 medium-severity vulnerabilities in Join Safe, Coverage Safe, ZTA Gateways, and Neurons for Safe Entry.

Probably the most extreme of the safety holes embrace a lacking authorization situation resulting in HTML5 connection hijacking, a CSRF bug resulting in the unauthenticated execution of delicate actions, and lacking authorization flaws that permit attackers to configure authentication-related settings.

Patches had been included in EPM variations 2024 SU3 SR 1 and 2022 SU8 SR 2, Join Safe variations 22.7R2.9 and 22.8R2, Coverage Safe model 22.7R1.5, ZTA Gateways model 22.8R2.3-723, and Neurons for Safe Entry model 22.8R1.4.

“We have now no proof of any of those vulnerabilities being exploited within the wild,” Ivanti notes in its safety replace announcement.

Fortinet launched fixes for a medium-severity OS command injection bug in FortiDDoS that would result in code execution, and for a medium-severity path traversal flaw in FortiWeb resulting in arbitrary file learn.

Nvidia rolled out fixes for one high- and two medium-severity defects within the NVDebug device that would permit attackers to entry privileged accounts, write information to restricted parts, or run code as non-privileged customers.Commercial. Scroll to proceed studying.

The problems may very well be exploited for code execution, privilege escalation, denial-of-service (DoS), data disclosure, or knowledge tampering, and had been resolved in NVDebug device model 1.7.0.

Neither Fortinet nor Nvidia make any point out of those vulnerabilities being exploited within the wild, however customers are suggested to replace their purposes as quickly as potential.

Associated: SAP Patches Important NetWeaver Vulnerabilities

Associated: ICS Patch Tuesday: Rockwell Automation Leads With 8 Safety Advisories

Associated: Two Exploited Vulnerabilities Patched in Android

Associated: Tailoring Safety Coaching to Particular Sorts of Threats

Security Week News Tags:Fortinet, Ivanti, Nvidia, Release, Security, Updates

Post navigation

Previous Post: US Offers $10 Million Reward for Ukrainian Ransomware Operator
Next Post: China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations

Related Posts

GeoServer Flaw Exploited in US Federal Agency Hack Security Week News
Details Emerge on Chinese Hacking Operation Impersonating US Lawmaker Security Week News
The ZTNA Blind Spot: Why Unmanaged Devices Threaten Your Hybrid Workforce Security Week News
Undetectable Android Spyware Backfires, Leaks 62,000 User Logins Security Week News
Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks Security Week News
Salesforce AI Hack Enabled CRM Data Theft Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
  • Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
  • Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News