Skip to content
  Sunday 15 March 2026
Trending
October 1, 2025Cybersecurity Specialist, State Auditor Appointed March 23, 2025Cybersecurity Incident Handler – Intermediate – TS/SCI – Lackland AFB, Texas July 23, 2025Schneider Electric EcoStruxure Power Operation December 10, 2023How AI Can Benefit Your Small Business: 3 Key Ways May 15, 2025<h3>UK NHS Launches Innovative Cyber Charter for IT Suppliers</h3> February 26, 2025As an original author, let me introduce you to the fascinating world of astronomy and the recent discovery of a new planet in our solar system. Astronomers have detected a distant object beyond Neptune that appears to be a new planet, which they have named “Planet Nine.” This discovery has sparked excitement and curiosity among scientists and space enthusiasts alike.<br /> <br /> Planet Nine is estimated to be about 10 times the mass of Earth, making it a substantial addition to our solar system. Its existence was hypothesized based on the unusual orbits of other objects in the Kuiper Belt, a region of icy bodies beyond Neptune. The gravitational influence of Planet Nine is believed to be responsible for the unique orbits of these distant objects.<br /> <br /> The discovery of Planet Nine has opened up new possibilities for understanding the formation and evolution of our solar system. Scientists are eager to study this mysterious planet and learn more about its composition, atmosphere, and orbit. The existence of Planet Nine could also provide insights into the origins of our solar system and how it compares to other planetary systems in the universe.<br /> <br /> The search for Planet Nine is ongoing, with astronomers using powerful telescopes and advanced computer simulations to track its elusive orbit. The discovery of this distant planet has reignited interest in the outer reaches of our solar system and the mysteries that lie beyond. As we continue to explore the cosmos, Planet Nine serves as a reminder of the vastness and complexity of the universe.<br /> <br /> In conclusion, the discovery of Planet Nine is a significant milestone in our understanding of the solar system and the forces that shape it. This newfound planet offers us a glimpse into the mysteries of the outer solar system and the potential for new discoveries beyond. As we delve deeper into the cosmos, the search for Planet Nine will undoubtedly lead to further revelations about the nature of our universe. November 8, 2023CISA Adds One Known Exploited Vulnerability to Catalog June 2, 2025In recent years, there has been a growing trend towards sustainable living and eco-friendly practices. One of the key components of this movement is reducing waste and finding ways to reuse and recycle materials. This has led to the rise of upcycling, a creative and innovative way to transform old or discarded items into something new and useful.<br /> <br /> Upcycling is different from traditional recycling in that it involves taking a material or object and giving it a new purpose, rather than breaking it down and turning it into something else. This process requires imagination and skill, as well as a willingness to think outside the box and see the potential in items that others might consider trash.<br /> <br /> There are many benefits to upcycling, both for the individual and for the environment. By upcycling items, we can reduce the amount of waste that ends up in landfills and cut down on the resources needed to create new products from scratch. Upcycling also allows us to save money by repurposing items we already have, rather than buying new ones.<br /> <br /> In addition to the environmental and financial benefits, upcycling can also be a fun and fulfilling hobby. It allows us to express our creativity and individuality, and gives us a sense of accomplishment when we are able to turn something old and unwanted into something beautiful and useful. Upcycling can also be a great way to connect with others who share our passion for sustainability and creativity.<br /> <br /> Overall, upcycling is a simple yet powerful way to make a positive impact on the world around us. By finding new uses for old items and reducing our consumption of new goods, we can help to create a more sustainable future for ourselves and for future generations. So next time you’re thinking about throwing something away, consider whether it could be upcycled instead – you might just be surprised at what you can create. July 6, 2025Associate Technical Product Analyst – Cybersecurity Analyst May 7, 2025<h3>Ox Security Secures $60M to Tackle AI-Driven Code Risks</h3>
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  Keysight N8844A Data Analytics Web Service
Threat Advisories

Keysight N8844A Data Analytics Web Service

Mister CybersecurityMister Cybersecurity—April 25, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


1. EXECUTIVE SUMMARY

  • CVSS v3 9.8
  • ATTENTION: Exploitable remotely/low attack complexity 
  • Vendor: Keysight 
  • Equipment: N8844A Data Analytics Web Service 
  • Vulnerability: Deserialization of Untrusted Data 

2. RISK EVALUATION

Successful exploitation of this vulnerability could lead to remote code execution. 

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

Keysight reports this vulnerability affects the following data analytics web service software:  

  • N8844A Data Analytics Web Service: Version 2.1.7351 and prior 

3.2 VULNERABILITY OVERVIEW

3.2.1 DESERIALIZATION OF UNTRUSTED DATA CWE-502 

Keysight N8844A Data Analytics Web Service deserializes untrusted data without sufficiently verifying the resulting data will be valid. 

More stories

Rockwell Automation Micro850/870 | CISA

August 13, 2024

NIHON KOHDEN Central Monitor CNS-6201

October 23, 2025

CISA Releases Four Industrial Control Systems Advisories

July 25, 2023

CISA Releases Three Industrial Control Systems Advisories

July 18, 2024

CVE-2023-1967 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Communications, Government 
  • COUNTRIES/AREAS DEPLOYED: Worldwide 
  • COMPANY HEADQUARTERS LOCATION: United States 

3.4 RESEARCHER

An anonymous researcher working with Trend Micro Zero Day Initiative reported this vulnerability to CISA. 

4. MITIGATIONS

Keysight N8844A Data Analytics Web Service is discontinued and is no longer available to download. Keysight made available a replacement product that is not vulnerable to the ZDI discovered exploit. 

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:

  • Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet.
  • Locate control system networks and remote devices behind firewalls and isolate them from business networks.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploits specifically target this vulnerability.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

CISA Adds Three Known Exploited Vulnerabilities to Catalog
Abuse of the Service Location Protocol May Lead to DoS Attacks
Related posts
  • Related posts
  • More from author
Threat Advisories

CISA Adds Two Known Exploited Vulnerabilities to Catalog

March 13, 20260
Threat Advisories

Siemens SIDIS Prime | CISA

March 12, 20260

Siemens RUGGEDCOM APE1808 Devices | CISA

March 12, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity – Information System Security Manager (ISSM)

March 15, 20260
Careers

Sr. Cybersecurity Engineer Security Controls Assessor Representative

March 15, 20260
Careers

Consultant, Cybersecurity

March 15, 20260
Careers

Senior Cybersecurity Manager

March 15, 20260
Careers

Senior Cybersecurity Analyst

March 15, 20260
Careers

Space Intelligence and Weapon Systems Classified Cybersecurity Operations Senior Manager

March 15, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity – Information System Security Manager (ISSM)
  • Sr. Cybersecurity Engineer Security Controls Assessor Representative
  • Consultant, Cybersecurity
  • Senior Cybersecurity Manager
  • Senior Cybersecurity Analyst

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures