Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

High-Severity Vulnerabilities Patched by Cisco, Atlassian

Posted on June 19, 2025June 19, 2025 By CWS

Cisco and Atlassian on Wednesday introduced the rollout of patches for a number of high-severity vulnerabilities of their merchandise, many resulting in denial-of-service (DoS) situations.

Cisco launched firmware updates for Meraki gadgets to resolve a high-severity flaw permitting attackers to trigger the AnyConnect VPN server on these merchandise to restart, resulting in a DoS situation. Tracked as CVE-2025-20271 (CVSS rating of 8.6), the bug could be exploited remotely.

“This vulnerability is because of variable initialization errors when an SSL VPN session is established. […] A sustained assault may forestall new SSL VPN connections from being established, successfully making the Cisco AnyConnect VPN service unavailable for all reliable customers,” Cisco explains.

The safety defect impacts roughly two dozen Meraki MX and Meraki Z gadgets and was resolved in Meraki MX firmware variations 18.107.13, 18.211.6, and 19.1.8.

The corporate additionally rolled out fixes for a DoS bug within the Common Disk Format (UDF) processing of ClamAV. Tracked as CVE-2025-20234, it may be exploited by submitting crafted recordsdata containing UDF content material to the ClamAV, the corporate notes.

Cisco says it isn’t conscious of any of those vulnerabilities being exploited within the wild, however customers are suggested to use the obtainable patches as quickly as potential.

Atlassian introduced patches for 5 vulnerabilities in third-party dependencies in Bamboo, Bitbucket, Confluence, Crowd, and Jira.

These embrace CVE-2025-22228 (an improper authorization in Spring), CVE-2025-24970 (a DoS flaw within the Netty framework), CVE-2024-38816 (a path traversal associated to the WebMvc.fn and WebFlux.fn internet frameworks), CVE-2024-57699 (a DoS bug in Netplex Json-smart), and CVE-2025-31650 (DoS in Apache Tomcat).Commercial. Scroll to proceed studying.

To resolve these points, Atlassian launched software program updates for Bamboo Information Middle and Server, Bitbucket Information Middle and Server, Confluence Information Middle and Server, Crowd Information Middle and Server, Jira Information Middle and Server, and Jira Service Administration Information Middle and Server.

Customers are suggested to replace their cases as quickly as potential, even when Atlassian makes no point out of any of those safety defects being exploited.

Associated: Essential Vulnerability Patched in Citrix NetScaler

Associated: Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Merchandise

Associated: Excessive-Severity Vulnerabilities Patched in Tenable Nessus Agent

Associated: Palo Alto Networks Patches Privilege Escalation Vulnerabilities

Security Week News Tags:Atlassian, Cisco, HighSeverity, Patched, Vulnerabilities

Post navigation

Previous Post: Password Reset Poisoning Attack Allows Account Takeover Using the Password Reset Link
Next Post: Authorities Busted Ransomware Gang – Nine Laptops and 15 Mobile Devices Were Seized

Related Posts

Iranian Hackers’ Preferred ICS Targets Left Open Amid Fresh US Attack Warning Security Week News
SonicWall Patches Critical SMA 100 Vulnerability, Warns of Recent Malware Attack Security Week News
Noma Security Raises $100 Million for AI Security Platform Security Week News
Booz Allen Invests in Machine Identity Firm Corsha Security Week News
MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats  Security Week News
Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction
  • Several Vulnerabilities Patched in AI Code Editor Cursor 
  • Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities
  • Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online
  • Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction
  • Several Vulnerabilities Patched in AI Code Editor Cursor 
  • Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities
  • Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online
  • Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News