Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label CISA warning. Show all posts

CISA Warns of Renewed Exploits Targeting TP-Link Routers with Critical Flaws

 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has raised fresh concerns about several outdated TP-Link router models that are being actively exploited by cybercriminals. Despite the flaw being identified years ago, it has re-emerged in recent attack campaigns, prompting its addition to CISA’s Known Exploited Vulnerabilities (KEV) catalog. 

The security issue is a command injection vulnerability with a high severity rating of 8.8. It impacts three specific models: TP-Link TL-WR940N, TL-WR841N, and TL-WR740N. The flaw exists within the routers’ web-based management interface, where improperly validated input allows hackers to execute unauthorized commands directly on the devices. This makes it possible for attackers to gain control of the routers remotely if remote access is enabled, or locally if they’re on the same network. 

Although this vulnerability has been publicly known for years, recent activity suggests that malicious actors are targeting these devices once again. According to cybersecurity researchers, the attack surface remains significant because these routers are still in use across many households and small offices. 

CISA has mandated that all federal agencies remove the affected router models from their networks by July 7, 2025. It also strongly recommends that other organizations and individuals replace the devices to avoid potential exploitation. 

The affected routers are particularly vulnerable because they are no longer supported by the manufacturer. The TL-WR940N last received a firmware update in 2016, the TL-WR841N in 2015, and the TL-WR740N has gone without updates for over 15 years. As these devices have reached end-of-life status, no further security patches will be provided. Users are urged to upgrade to newer routers that are regularly updated by manufacturers. 

Modern Wi-Fi routers often include enhanced performance, support for more devices, and built-in security protections. Some brands even offer network-wide security features to safeguard connected devices against malware and intrusion attempts. Additionally, using antivirus software with extra security tools, such as VPNs and threat detection, can further protect against online threats. 

Outdated routers not only put your personal information at risk but also slow down internet speed and struggle to manage today’s connected home environments. Replacing obsolete hardware is an important step in defending your digital life. 

Ensuring you’re using a router that receives timely security updates, combined with good cybersecurity habits, can significantly reduce your exposure to cyberattacks. 

CISA’s warning is a clear signal that relying on aging technology leaves both individuals and organizations vulnerable to renewed threats.

CISA Urges Immediate Fixes for Four Critical Microsoft Vulnerabilities Exploited by Hackers

 

Federal agencies across the U.S. must address four significant vulnerabilities in Microsoft products by the end of the month, following their public disclosure on Tuesday. The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about these flaws, which are already being exploited by cybercriminals.

The vulnerabilities, identified as CVE-2024-38226, CVE-2024-43491, CVE-2024-38014, and CVE-2024-38217, were part of Microsoft’s latest security release, which included 79 flaws. Experts emphasize the urgency of patching these issues, especially for sectors like healthcare, finance, and government.

Randy Watkins, CTO of Critical Start, stressed the importance of addressing these vulnerabilities, warning that neglect could result in data breaches and operational disruptions.

Among the vulnerabilities, CVE-2024-43491 is particularly concerning, with a 9.8 severity score, although it only affects a specific Windows 10 version from July 2015. Action1's Mike Walters highlighted that the vulnerability resulted from a rollback of previous fixes.

CVE-2024-38226, affecting Microsoft Publisher, and CVE-2024-38014, targeting Windows Installer, are also part of attack chains, potentially allowing hackers to escalate system privileges and take control of devices.

The final vulnerability, CVE-2024-38217, targets Windows Mark of the Web, a tool that flags risky downloaded files. Hackers have been exploiting this feature to bypass security warnings, increasing the risk of ransomware attacks. According to Saeed Abbasi from Qualys, the vulnerability poses a significant threat, as exploit codes are already publicly available.

Several other companies, including Ivanti, Cisco, Adobe, and Fortinet, also released critical patches for their products as part of Patch Tuesday updates.