Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation

Posted on December 15, 2025December 15, 2025 By CWS

A crucial vulnerability affecting Sierra Wi-fi routers has been added to its Identified Exploited Vulnerabilities (KEV) catalog.

This choice comes after proof emerged that the flaw is being actively exploited within the wild. Posing important dangers to organizations that also make the most of these legacy gadgets.

Federal companies and personal organizations at the moment are urged to take rapid motion to safe their networks towards this particular menace.

The vulnerability, tracked as CVE-2018-4063, impacts the Sierra Wi-fi AirLink ALEOS working system. It’s described as an “Unrestricted Add of File with Harmful Sort” flaw.

CVE IDCVE-2018-4063DescriptionSierra Wi-fi AirLink ALEOS accommodates an unrestricted add of file with harmful kind vulnerability.Vulnerability NameSierra Wi-fi AirLink ALEOS Unrestricted Add of File with Harmful Sort VulnerabilityRelated CWECWE-434

Safety researchers have decided that the problem permits an authenticated attacker to take advantage of the net server. By sending a specifically crafted HTTP request, a menace actor can add malicious recordsdata on to the machine.

As soon as a malicious file is uploaded, it can lead to the execution of arbitrary code on the internet server. This Distant Code Execution (RCE) functionality successfully provides attackers management over the compromised router.

Though the vulnerability requires authentication to set off, attackers typically exploit it together with weak or default credentials to realize preliminary entry.

The severity of this flaw is compounded by the truth that it permits for persistent entry and potential lateral motion inside a community.

Finish-of-Life Dangers and Mitigation

A crucial side of this alert is the standing of the impacted {hardware}. CISA has famous that the affected Sierra Wi-fi AirLink merchandise could also be Finish-of-Life (EoL) or Finish-of-Service (EoS).

This implies the seller is probably going now not releasing safety updates or patches for these gadgets. Consequently, the usual recommendation to “patch instantly” is just not relevant right here. As a substitute, CISA strongly advises customers to discontinue utilizing these merchandise.

Continued use of EoL {hardware} leaves networks uncovered to identified exploits that can not be remediated by way of software program updates.

Federal Civilian Government Department (FCEB) companies have been given a strict deadline to take away these gadgets from their infrastructure to adjust to Binding Operational Directive (BOD) 22-01.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Active, Adds, Catalogue, CISA, Exploitation, KEV, Router, Sierra, Vulnerability

Post navigation

Previous Post: VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption
Next Post: Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

Related Posts

Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems Cyber Security News
Microsoft Office.com Suffers Major Outage, Investigation Underway Cyber Security News
Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Cyber Security News
New ‘Win-DoS’ Zero-Click Vulnerabilities Turns Windows Domain Controllers into DDOS Botnet Cyber Security News
Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities Cyber Security News
Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical FortiGate Devices SSO Vulnerabilities Actively Exploited in the Wild
  • PornHub Breached by ShinyHunters Group and Premium Members Data Stolen
  • Google to Shut Down Dark Web Monitoring Tool in February 2026
  • ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices
  • Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical FortiGate Devices SSO Vulnerabilities Actively Exploited in the Wild
  • PornHub Breached by ShinyHunters Group and Premium Members Data Stolen
  • Google to Shut Down Dark Web Monitoring Tool in February 2026
  • ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices
  • Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark