Center for Internet Security

Cyber Security Advisories – MS-ISAC The latest MS-ISAC cyber security advisories. Feed provided by Center for Internet Security.

  • Multiple Vulnerabilities in Cisco Security Products Could Allow for Arbitrary Code Execution
    on August 15, 2025 at 5:37 am

    Multiple vulnerabilities have been discovered in Cisco security products that could allow for arbitrary code execution.Cisco Secure Firewall Management Center (FMC) is a centralized management solution for Cisco Secure Firewall devices, enabling policy control, event monitoring, and threat analysis.Cisco Firepower 2100 Series is a family of threat-focused firewalls designed for high-performance security and visibility across enterprise networks.Cisco Secure Firewall ASA Software is a firewall software platform that delivers advanced threat protection, VPN services, and access control.Cisco Secure Firewall Threat Defense (FTD) Software is an integrated threat management solution combining firewall, IPS, and malware protection capabilities.Cisco Identity Services Engine (ISE) is a policy-based access control and identity management system that enforces network segmentation and compliance.Cisco IOS Software is the foundational operating system for Cisco networking devices, providing routing, switching, and network services.Cisco IOS XE Software is a modular and programmable network OS designed for enterprise-grade routers and switches with enhanced automation and security features. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the user associated with the service. Depending on the privileges associated with the account, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution
    on August 14, 2025 at 5:52 am

    Multiple vulnerabilities have been discovered in Fortinet products, the most severe of which could allow for remote code execution. FortiSIEM is a Security Information and Event Management (SIEM) solution from Fortinet that provides real-time infrastructure and user awareness for accurate threat detection, analysis, and reporting.FortiManager is a network and security management tool that provides centralized management of Fortinet devices from a single console.FortiManager Cloud is a cloud-based service for centralized management, monitoring, and automation of Fortinet devices across multiple sitesFortiOS is the Fortinet’s proprietary Operation System which is utilized across multiple product lines.FortiPAM provides privileged account management, session monitoring and management, and role-based access control to secure access to sensitive assets and mitigate data breaches.FortiProxy is a secure web gateway that attempts to protects users against internet-borne attacks and provides protection and visibility to the network against unauthorized access and threats.FortiSwitchManager enables network administrators to cut through the complexities of non-FortiGate-managed FortiSwitch deployments. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the affected service account. Depending on the privileges associated with the service account an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
    on August 13, 2025 at 3:43 am

    Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe Commerce is a comprehensive, enterprise-grade e-commerce platform, formerly known as Magento Commerce, that allows businesses to build, personalize, and manage online stores.Adobe Substance 3D Viewer is a tool that allows users to view, customize, and create imagery from 3D files.Adobe Animate is a 2D animation software developed by Adobe, formerly known as Adobe Flash Professional and Macromedia Flash.Adobe Illustrator is industry-leading, vector graphics software used for creating logos, icons, illustrations, and more.Adobe Photoshop is a powerful raster graphics editor.Adobe Substance 3D Modeler is a 3D modeling and sculpting application designed to make 3D creation as intuitive as working with physical clay.Adobe Substance 3D Painter is a 3D texturing and material application software.Adobe Substance 3D Sampler is a 3D scanning and material creation software.Adobe InDesign is a professional desktop publishing and page layout application used for creating designs for both print and digital publishing.Adobe InCopy is a word processor within Adobe Creative Cloud that allows copywriters and editors to write, edit, and format text in InDesign documents, while designers work on the same file in InDesign simultaneously.Adobe Substance 3D Stager is a professional software for assembling and rendering 3D scenes.Adobe FrameMaker is a powerful software application designed for creating and publishing long, complex, and structured documents, particularly for technical communication and documentation.Adobe Dimension is a 3D design and rendering software.Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights

  • Critical Patches Issued for Microsoft Products, August 12, 2025
    on August 12, 2025 at 6:50 pm

    Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • A Vulnerability in SonicWall SonicOS management access and SSLVPN Could Allow for Unauthorized Access
    on August 8, 2025 at 4:04 am

    A vulnerability has been discovered in SonicWall SonicOS Management Access and SSLVPN, which could allow for unauthorized resource access and in specific conditions, causing the firewall to crash. SonicOS is SonicWall’s operating system designed for their firewalls and other security devices. Successful exploitation of the most severe of these vulnerabilities could allow for unauthorized access on the system. Depending on the privileges associated with the system, an attacker could then; view, change, or delete data.

  • Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
    on July 30, 2025 at 11:40 pm

    Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
    on July 30, 2025 at 4:51 am

    A Vulnerability has been discovered in Google Chrome which could allow for arbitrary code execution. Successful exploitation of the the vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
    on July 23, 2025 at 2:04 am

    Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.  Adobe After Effects – Used for creating motion graphics, visual effects, and compositing in film, television, and online content.Adobe Substance 3D Viewer – A 3D visualization and editing tool for opening, adjusting, and rendering 3D models.Adobe Audition – Professional audio editing and mixing software for recording, restoring, and producing high-quality sound.Adobe InCopy – A writing and editing tool that integrates with Adobe InDesign for collaborative publishing workflows.Adobe InDesign – Used to design and publish brochures, digital magazines, eBooks, posters, and presentations.Adobe Connect – A web conferencing platform for hosting virtual meetings, webinars, and online training sessions.Adobe Dimension – A 3D design tool for creating photorealistic product mockups and brand visualizations.Adobe Substance 3D Stager – A 3D scene design and rendering tool for assembling and lighting photorealistic compositions.Adobe Illustrator – A vector graphics editor for creating logos, icons, illustrations, and typography.Adobe FrameMaker – A document processor for authoring and publishing large, structured technical documentation.Adobe Experience Manager (AEM) Forms – Enables creation and deployment of digital forms integrated with backend systems.Adobe Experience Manager (AEM) Screens – A digital signage solution for managing interactive experiences across physical displays.Adobe ColdFusion – A rapid web application development platform that supports integration with databases, APIs, and cloud services.  Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights

  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
    on July 23, 2025 at 12:22 am

    Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • Multiple Vulnerabilities in Microsoft SharePoint Server Could Allow for Remote Code Execution
    on July 22, 2025 at 3:58 pm

    Multiple Vulnerabilities have been discovered in Microsoft SharePoint Server, which could allow for remote code execution. Microsoft SharePoint Server is a web-based collaborative platform that integrates with Microsoft Office. Successful exploitation of these vulnerabilities allows for unauthenticated access to systems and enables malicious actors to fully access SharePoint content, including file systems and internal configurations, and execute code over the network

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.