
The US Cybersecurity and Infrastructure Safety Company (CISA) on Monday added a now-complex high-severity safety flaw affecting Acclaim Programs USAHERDS to the Identified Exploited Vulnerabilities (KEV) catalog, primarily based on proof of an energetic exploit within the wild.
The vulnerability in query is CVE-2021-44207 (CVSS rating: 8.1), a case of hard-coded, static credentials in Acclaim USAHERDS that might finally enable an attacker to execute arbitrary code on susceptible servers.
Particularly, it issues the usage of static ValidationKey and DecryptionKey values in model 7.4.0.1 and earlier that may be weaponized to attain distant code execution on the server working the appliance. That stated, an attacker must exploit another technique to get the keys within the first place.
“These keys are used to supply safety to the appliance view state,” Google-owned Mandant stated in a December 2021 advisory for the flaw. “A menace actor with information of those keys can trick the appliance server into deserializing maliciously crafted view state information.”

“A menace actor with information of the validationKey and decryptionKey for an internet utility can create a malicious ViewState that passes the MAC examine and is deserialized by the server. This deserialization leads to The code could also be enforced.”
Whereas there are not any new studies of CVE-2021-44207 being weaponized in real-world assaults, the vulnerability was recognized in 2021 as zero-day assaults concentrating on six Individuals by the China-linked APT41 menace actor. was executed as part of State Authorities Networks
Federal Civilian Govt Department (FCEB) businesses are advisable to use vendor-provided mitigations by January 13, 2025 to guard their networks from energetic threats.
The event got here as Adobe warned of a crucial safety flaw in ColdFusion (CVE-2024-53961, CVSS rating: 7.8), which it stated already had a identified proof-of-concept. -concept (poc) is an exploit that permits the file system to be learn. .
This vulnerability is addressed in ColdFusion 2021 Replace 18 and ColdFusion 2023 Replace 12. Customers are suggested to patch as quickly as attainable to reduce potential dangers.