RSS Parrot

BETA

🦜 Latest publications of type Security Advisories

@cert.europa.eu.publications.security-advisories@rss-parrot.net

I'm an automated parrot! I relay a website's RSS feed to the Fediverse. Every time a new post appears in the feed, I toot about it. Follow me to get all new posts in your Mastodon timeline! Brought to you by the RSS Parrot.

---

RSS feed for the latest 10 publications of type Security Advisories.

Your feed and you don't want it here? Just e-mail the birb.

Site URL: cert.europa.eu/publications/security-advisories/

Feed URL: cert.europa.eu/publications/security-advisories-rss

Posts: 11

Followers: 1

2025-040: Critical Vulnerability in Windows Server Update Service (WSUS)

Published: October 24, 2025 18:42

On October 23, 2025, Microsoft released an out-of-band update to address a critical vulnerability in Windows Server Update Service (WSUS). This vulnerability could allow a remote unauthenticated attacker to execute code on the targeted systems. A…

2025-038: Critical Vulnerabilities in Veeam Backup

Published: October 15, 2025 20:40

On October 14, 2025, Veeam released a security advisory addressing multiple vulnerabilities including 2 critical in its Veeam Backup product. CERT-EU recommends updating affected software as soon as possible and following Veeam implementation best…

2025-037: Multiple Vulnerabilities in F5 Products

Published: October 15, 2025 19:01

On October 15, 2025, F5 disclosed that a sophisticated nation-state actor breached its systems and maintained long-term persistent access into F5's infrastructure. This included access to BIG-IP product development source code and to information related to…

2025-036: Critical Vulnerabilities in Cisco ASA and FTD

Published: September 26, 2025 09:04

On September 25, 2025, Cisco released several security advisories addressing 3 vulnerabilities, 2 of which are critical. Cisco warns that some of those vulnerabilities are exploited in the wild and assesses with high confidence that this new activity is…

2025-035: High Vulnerability in Cisco IOS and IOS XE Software

Published: September 26, 2025 09:03

On September 24, 2025, Cisco released a security advisory regarding a high severity vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software. The vulnerability is being exploited in the wild.…

2025-034: Critical Vulnerability in SolarWinds Web Help Desk

Published: September 24, 2025 17:35

On September 17, 2025, SolarWinds released a security advisory addressing a critical vulnerability in its Web Help Desk product. The fix provided as part of this advisory is a patch bypass of CVE-24-28988, which in turn is a patch bypass of CVE-2024-28986.…

2025-033: Critical Vulnerabilities in Citrix NetScaler Products

Published: August 26, 2025 17:40

On 26 August 2025, Citrix released a security advisory addressing one critical and two high severity vulnerabilities in NetScaler ADC and NetScaler Gateway. Citrix warns that exploits of the critical vulnerability, CVE-2025-7775, have been observed on…

2025-032: Multiple Vulnerabilities in Microsoft Products

Published: August 18, 2025 11:18

On August 13, 2025, Microsoft released its August 2025 Patch Tuesday advisory addressing 111 security flows in various products among which 16 are rated as critical. It is recommended updating as soon as possible, prioritising public facing and critical…

2025-031: Multiple Vulnerabilities in Fortinet Products

Published: August 13, 2025 12:13

On August 12, 2025, Fortinet released security advisories addressing several vulnerabilities, including a critical one exploited in the wild, and two high severity ones. It is recommended updating as soon as possible.

2025-030: High Severity Vulnerability in Microsoft Exchange

Published: August 8, 2025 09:58

On August 6, 2025, Microsoft issued an advisory for a high-severity vulnerability affecting Microsoft Exchange hybrid environments. The vulnerability tracked as CVE-2025-53786 allows an attacker with administrative access to an on-premises Exchange Server…