Vulnerability Report: November 2024

RivanorthRivanorth
2 min read

Welcome to the monthly Vulnerability Report. In this report, we provide an overview of the most significant security vulnerabilities identified in the past month. Our focus is on vulnerabilities that are being actively exploited, which pose the biggest risk to you. Stay informed about the latest threats and take proactive steps to secure your systems against the latest attacks.

First things first, what is a CVE?

A CVE, or Common Vulnerabilities and Exposures, is a standardised identifier for known cybersecurity vulnerabilities. The purpose of CVEs is to provide a standardised method for identifying and cataloging security vulnerabilities, which helps organisations prioritise their vulnerability management efforts.

Why are CVEs important?

CVEs are publicly known vulnerabilities, some of them, like the ones listed below are currently being exploited, making sure you have the correct patches installed ensures your systems are safe from these attacks.

Actively Exploited

The following vulnerabilities are being actively exploited.

  1. CVE-2024-45519 - A vulnerability in Zimbra Collaboration (ZCS), affecting versions before 8.8.15 Patch 46, 9.0.0 Patch 41, 10.0.9, and 10.1.1 - Severity Rating: 10.0 (Critical).

  2. CVE-2024-47575 - A vulnerability in FortiManager, affecting versions 6.2.0-7.6.0 and FortiManager Cloud 6.4.1-7.4.4 - Severity Rating: 9.8 (Critical).

  3. CVE-2024-9537 - A vulnerability in ScienceLogic SL1 (formerly EM7), affecting SL1 versions up to 12.3+ - Severity Rating: 9.8 (Critical).

  4. CVE-2024-9680 - A vulnerability in Firefox, Firefox ESR, and Thunderbird, affecting versions below Firefox 131.0.2, ESR 128.3.1, and Thunderbird 131.0.1 - Severity Rating: 9.8 (Critical).

  5. CVE-2024-43573 - A vulnerability in Windows MSHTML Platform - Severity Rating: 8.1 (High).

  6. CVE-2024-43572 - A vulnerability in Microsoft Management Console - Severity Rating: 7.8 (High).

  7. CVE-2024-43047 - A memory corruption vulnerability in HLOS Memory Map Handling - Severity Rating: 7.8 (High).

  8. CVE-2024-9380 - An OS command injection vulnerability in Ivanti CSA, affecting versions below 5.0.2 - Severity Rating: 7.2 (High).

  9. CVE-2024-9379 - An SQL injection vulnerability in Ivanti CSA, affecting versions below 5.0.2 - Severity Rating: 7.2 (High).

  10. CVE-2024-20481 - A denial of service vulnerability in Cisco Adaptive Security Appliance (ASA) RAVPN, affecting Cisco ASA and Firepower Threat Defence (FTD) Software - Severity Rating: 5.8 (Medium).

What To Do

If you are currently running software listed above, make sure you install the latest version to stay secure.


As a leading cybersecurity company, we are on the forefront of security research, constantly monitoring for emerging threats. With best in class security expertise, we are able to help you secure your assets to the highest levels.

Visit rivanorth.com to find out more.

You build the future. We help you secure it.

0
Subscribe to my newsletter

Read articles from Rivanorth directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Rivanorth
Rivanorth

State of the art Cybersecurity services, always a step ahead. You build the future. We help you secure it.