VulnerabilitiesHIGH

Vulnerabilities - CISA Flags Apple and CMS Bugs for Patching

THThe Hacker News
CVE-2025-31277CVE-2025-43510CVE-2025-32432CISAMuddyWater
🎯

Basically, CISA found serious bugs in Apple and CMS software that need fixing soon.

Quick Summary

CISA has flagged critical vulnerabilities in Apple and CMS platforms. Federal agencies must patch these by April 2026 to avoid exploitation. Stay ahead of threats by ensuring timely updates.

The Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently flagged five significant vulnerabilities affecting Apple, Craft CMS, and Laravel Livewire. These flaws have been added to the Known Exploited Vulnerabilities (KEV) catalog. Federal agencies are urged to patch these vulnerabilities by April 3, 2026, to prevent potential exploitation.

Among the vulnerabilities, CVE-2025-31277 stands out with a CVSS score of 8.8. This flaw in Apple WebKit can lead to memory corruption when maliciously crafted web content is processed. Other notable vulnerabilities include CVE-2025-32432, a code injection vulnerability in Craft CMS with a critical CVSS score of 10.0, allowing remote attackers to execute arbitrary code.

What's at Risk

The identified vulnerabilities pose significant risks to users and organizations relying on these platforms. For instance, the memory corruption issues in Apple's kernel components could lead to unexpected behavior in applications, potentially allowing attackers to manipulate system operations. Additionally, the code injection vulnerabilities in Craft CMS and Laravel Livewire could enable unauthorized access to sensitive data and systems.

The exploitation of these vulnerabilities has already been observed in the wild. Threat actors are leveraging these flaws to deploy various malware families, including the GHOSTBLADE and GHOSTKNIFE malware, aimed at data theft and system disruption. As these vulnerabilities are actively exploited, the urgency for patching cannot be overstated.

Patch Status

CISA has indicated that fixes for these vulnerabilities are already available. For example, CVE-2025-31277 was addressed in July 2025, while CVE-2025-32432 was fixed in April 2025. However, the urgency remains for organizations to implement these patches, especially given the looming deadline of April 3, 2026. Failure to do so could result in severe consequences, including data breaches and system compromises.

Organizations must prioritize these patches in their security protocols. Regular updates and monitoring of vulnerability disclosures are essential to maintain a robust security posture against emerging threats.

Immediate Actions

To mitigate risks associated with these vulnerabilities, organizations should take immediate action. Here are some recommended steps:

  • Patch Systems: Ensure that all affected systems are updated with the latest security patches as soon as possible.
  • Monitor for Exploitation: Keep an eye on threat intelligence reports for any signs of exploitation related to these vulnerabilities.
  • Enhance Security Measures: Implement additional security layers, such as intrusion detection systems and firewalls, to protect against potential attacks.

By taking these proactive measures, organizations can significantly reduce their risk exposure and protect their sensitive data from malicious actors.

🔒 Pro insight: The integration of these vulnerabilities into the KEV catalog highlights an urgent need for organizations to prioritize patch management strategies.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHVulnerabilities

Vulnerabilities - CodeBreach Exposes AWS Console Supply Chain

A critical vulnerability in AWS CodeBuild has been uncovered, allowing attackers to hijack GitHub repositories. This flaw poses a significant risk of credential theft and malicious code injection. AWS has addressed the issue, but organizations must remain vigilant against similar vulnerabilities.

CyberWire Daily·
HIGHVulnerabilities

Trivy Vulnerability Scanner - Backdoored with Credential Stealer

A serious breach has compromised the Trivy vulnerability scanner, injecting malware into its official releases. Thousands of developers are at risk as the attack targets CI/CD workflows. Immediate action is needed to rotate secrets and secure environments against potential supply chain attacks.

CSO Online·
CRITICALVulnerabilities

Chrome Vulnerabilities - Critical Update Released

Google has released a critical update for Chrome, fixing 26 vulnerabilities. Users must update to avoid remote code execution risks. Stay secure with the latest version.

Cyber Security News·
CRITICALVulnerabilities

Oracle Vulnerability - Urgent RCE Flaw Update Issued

Oracle has announced a critical RCE vulnerability affecting Identity Manager and Web Services Manager. This flaw could allow attackers to take full control of systems. Immediate patching is essential to protect sensitive data and infrastructure.

Cyber Security News·
CRITICALVulnerabilities

Critical Langflow RCE Vulnerability Exploited Within 20 Hours

A critical vulnerability in Langflow was exploited within 20 hours of disclosure. Attackers can execute arbitrary code, risking sensitive data. Immediate updates and monitoring are essential for protection.

SC Media·
CRITICALVulnerabilities

Ubiquiti - Critical Vulnerabilities in UniFi Patched

Ubiquiti has patched critical vulnerabilities in its UniFi Network Application that could allow account takeovers. Users need to update their software immediately to protect sensitive data and configurations. Ignoring these updates could lead to severe security risks.

SC Media·