Close Menu
geekfence.comgeekfence.com
    What's Hot

    Health and wellness influencers dominate social media. A new report shines a light on who they actually are.

    May 7, 2026

    The Best Risk Mitigation Strategy in Data? A Single Source of Truth – O’Reilly

    May 7, 2026

    Build streaming applications on Amazon Managed Service for Apache Flink with AI-assisted guidance

    May 7, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»CISA flags critical Microsoft SCCM flaw as exploited in attacks
    Cyber Security

    CISA flags critical Microsoft SCCM flaw as exploited in attacks

    AdminBy AdminFebruary 13, 2026No Comments2 Mins Read2 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    CISA flags critical Microsoft SCCM flaw as exploited in attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email


    CISA flags critical Microsoft SCCM flaw as exploited in attacks

    CISA ordered U.S. government agencies on Thursday to secure their systems against a critical Microsoft Configuration Manager vulnerability patched in October 2024 and now exploited in attacks.

    Microsoft Configuration Manager (also known as ConfigMgr and formerly System Center Configuration Manager, or SCCM) is an IT administration tool for managing large groups of Windows servers and workstations.

    Tracked as CVE-2024-43468 and reported by offensive security company Synacktiv, this SQL injection vulnerability allows remote attackers with no privileges to gain code execution and run arbitrary commands with the highest level of privileges on the server and/or the underlying Microsoft Configuration Manager site database.

    Wiz

    “An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database,” Microsoft explained when it patched the flaw in October 2024.

    At the time, Microsoft tagged it as “Exploitation Less Likely,” saying that “an attacker would likely have difficulty creating the code, requiring expertise and/or sophisticated timing, and/or varied results when targeting the affected product.”

    However, Synacktiv shared proof-of-concept exploitation code for CVE-2024-43468 on November 26th, 2024, almost two months after Microsoft released security updates to mitigate this remote code execution vulnerability.

    While Microsoft has not yet updated its advisory with additional information, CISA has now flagged CVE-2024-43468 as actively exploited in the wild and has ordered Federal Civilian Executive Branch (FCEB) agencies to patch their systems by March 5th, as mandated by the Binding Operational Directive (BOD) 22-01.

    “These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise,” the U.S. cybersecurity agency warned.

    “Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.”

    Even though BOD 22-01 applies only to federal agencies, CISA encouraged all network defenders, including those in the private sector, to secure their devices against ongoing CVE-2024-43468 attacks as soon as possible.


    tines

    Modern IT infrastructure moves faster than manual workflows can handle.

    In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    The Race to Autonomous Transport Networks: A New Study

    May 7, 2026

    Teenager alleged to be Scattered Spider hacker arrested in Finland, faces US extradition

    May 6, 2026

    FTC to ban data broker Kochava from selling Americans’ location data

    May 5, 2026

    The Year of AI-Assisted Attacks

    May 4, 2026

    Anti-DDoS Firm Heaped Attacks on Brazilian ISPs – Krebs on Security

    May 3, 2026

    This month in security with Tony Anscombe – April 2026 edition

    May 2, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202538 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202626 Views

    Redefining AI efficiency with extreme compression

    March 25, 202625 Views
    Don't Miss

    Health and wellness influencers dominate social media. A new report shines a light on who they actually are.

    May 7, 2026

    A generation or two ago, when you had a medical question, the solution was obvious:…

    The Best Risk Mitigation Strategy in Data? A Single Source of Truth – O’Reilly

    May 7, 2026

    Build streaming applications on Amazon Managed Service for Apache Flink with AI-assisted guidance

    May 7, 2026

    Microsoft’s clean energy target under pressure from AI data centres

    May 7, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Health and wellness influencers dominate social media. A new report shines a light on who they actually are.

    May 7, 2026

    The Best Risk Mitigation Strategy in Data? A Single Source of Truth – O’Reilly

    May 7, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.