#authentication-bypass

[ follow ]
#solarwinds
fromSecurityWeek
1 day ago
Information security

SolarWinds Patches Critical Web Help Desk Vulnerabilities

SolarWinds released patches for six Web Help Desk vulnerabilities, including four critical unauthenticated deserialization and authentication-bypass flaws enabling remote code execution.
fromThe Hacker News
1 day ago
Information security

SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

SolarWinds Web Help Desk has multiple critical vulnerabilities, including deserialization flaws enabling unauthenticated remote code execution; updates fixed issues in WHD 2026.1.
Information security
fromSecurityWeek
2 days ago

Fortinet Patches Exploited FortiCloud SSO Authentication Bypass

A FortiCloud SSO authentication bypass (CVE-2026-24858) was exploited in the wild; Fortinet released emergency patches for FortiOS, FortiManager, and FortiAnalyzer.
fromThe Hacker News
1 week ago

Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access

A critical security flaw has been disclosed in the GNU InetUtils telnet daemon ( telnetd) that went unnoticed for nearly 11 years. The vulnerability, tracked as CVE-2026-24061, is rated 9.8 out of 10.0 on the CVSS scoring system. It affects all versions of GNU InetUtils from version 1.9.3 up to and including version 2.7. "Telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a '-f root' value for the USER environment variable," according to a description of the flaw in the NIST National Vulnerability Database (NVD).
Information security
Information security
fromThe Hacker News
1 week ago

SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release

An authentication bypass in SmarterMail allows unauthenticated users to reset any system administrator password via /api/v1/auth/force-reset-password, enabling potential full system compromise.
Information security
fromZero Day Initiative
1 week ago

Zero Day Initiative - Pwn2Own Automotive 2026 - Day Two Results

Julien Cohen-Scali chained an authentication bypass and privilege escalation on Phoenix Contact CHARX SEC-3150, earning $20,000 and 4 Master of Pwn points; Autocrypt failed to demonstrate a Grizzl‑E exploit in time.
#ibm-api-connect
fromThe Hacker News
1 month ago

FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE

CVE-2025-61675 (CVSS score: 8.6) - Numerous authenticated SQL injection vulnerabilities impacting four unique endpoints (basestation, model, firmware, and custom extension) and 11 affected parameters that enable read and write access to the underlying SQL database CVE-2025-61678 (CVSS score: 8.6) - An authenticated arbitrary file upload vulnerability that allows an attacker to exploit the firmware upload endpoint to upload a PHP web shell after obtaining a valid PHPSESSID and run arbitrary commands to leak the contents of sensitive files (e.g., "/etc/passwd")
Information security
fromThe Hacker News
2 months ago

CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability

Searchlight Cyber researchers Adam Kues and Shubham Shah, who discovered the flaw, said it can permit an attacker to access API endpoints that, in turn, can allow them "to manipulate authentication flows, escalate privileges, and move laterally across an organization's core systems." Specifically, it stems from a bypass of a security filter that tricks protected endpoints into being treated as publicly accessible by simply adding "?WSDL" or ";.wadl" to any URI.
Information security
fromTechzine Global
2 months ago

FortiWeb vulnerability actively exploited to create admin accounts

A vulnerability in Fortinet FortiWeb is being actively exploited worldwide to create new administrator accounts without authentication on devices that are directly accessible from the internet. This involves a path traversal that makes it possible to call an internal CGI script via the management path. Researchers have observed attackers scanning large numbers of devices and bombarding them with automated requests, immediately affecting any system with an open management interface.
Information security
Information security
fromIT Pro
3 months ago

Critical Dell Storage Manager flaws could let hackers access sensitive data - patch now

Critical authentication and XML entity vulnerabilities in Dell Storage Manager prior to 20.1.21 allow unauthenticated attackers to access APIs, disclose data, and access files.
fromThe Hacker News
3 months ago

Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control

Red Lion's Sixnet RTUs provide advanced automation, control, and data acquisition capabilities in industrial automation and control systems, primarily across energy, water, and wastewater treatment, transportation, utilities, and manufacturing sectors. These industrial devices are configured using a Windows utility called Sixnet IO Tool Kit, with a proprietary Sixnet "Universal" protocol used to interface and enable communication between the kit and the RTUs.
Information security
Information security
fromThe Hacker News
4 months ago

Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

Two critical authentication-bypass vulnerabilities in Wondershare RepairIt exposed unencrypted user data and cloud resources, enabling AI model tampering, supply-chain attacks, and remote code execution.
#passwordstate
Information security
fromTechzine Global
7 months ago

Eight vulnerabilities hit HPE StoreOnce, upgrade required

HPE StoreOnce has critical vulnerabilities, including an authentication bypass that enables further attacks.
Users need to upgrade to StoreOnce Software v4.3.11 to mitigate vulnerabilities.
fromThe Hacker News
9 months ago

How Breaches Start: Breaking Down 5 Real Vulns

Not every security vulnerability is high risk on its own - but in the hands of an advanced attacker, even small weaknesses can escalate into major breaches.
Information security
[ Load more ]