Skip to content
  Thursday 19 June 2025
Trending
March 11, 2024UK Conservatives Reject Cyber Insurance Backstop June 17, 2025<h3>Software Vendor Hack: Landmark $5.48 Million Settlement Secured!</h3> April 5, 2024Insights from CISOs on Adhering to Cybersecurity Regulations May 3, 2025Senior Cybersecurity Penetration Tester September 19, 2023The Impact of Generative AI on CISOs January 18, 2025Account Executive – Secureworks Cybersecurity Sales – US Remote (Bay Area) December 22, 2024Principal Cybersecurity Developer March 7, 2024The Significance of Data Analysis and Reporting in Healthcare October 25, 2023Cybersecurity Operations Engineer November 18, 2024Unleashing the Power of Year-Round Network Pen Testing
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  Commvault Vulnerability CVE-2025-34028 Listed in CISA KEV Due to Confirmed Exploitation
Industry News

Commvault Vulnerability CVE-2025-34028 Listed in CISA KEV Due to Confirmed Exploitation

SecuredyouadmSecuredyouadm—May 5, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Visa Restrictions Imposed by U.S. on Individuals Involved in Illegal Spyware Surveillance

February 6, 2024

Massive Christmas 2023 Data Breach: Hospital Alerts 316,000 Victims

December 10, 2024

Chinese Botnet Exploiting Router Flaws: Microsoft’s Alert on Credential Theft

November 1, 2024

What Data-Driven Businesses Must Do Recover Data

December 18, 2024



The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a critical security flaw affecting Commvault Command Center to its Known Exploited Vulnerabilities catalog. This vulnerability, identified as CVE-2025-34028 with a CVSS score of 10.0, is a path traversal bug that impacts versions 11.38.0 through 11.38.19 of the software. The issue allows remote, unauthenticated attackers to execute arbitrary code on affected systems.

CISA highlighted that the vulnerability in Commvault Command Center could be exploited by uploading ZIP files that, when decompressed on the target server, could lead to remote code execution. The flaw was discovered and reported by cybersecurity firm watchTowr Labs, who identified the problem in an endpoint called “deployWebpackage.do,” triggering a pre-authenticated Server-Side Request Forgery (SSRF) that enables code execution with a malicious .JSP file in a ZIP archive.

This isn’t the first time Commvault software has been targeted by cyber attackers. Another vulnerability, CVE-2025-3928, was previously exploited in real-world attacks, allowing remote, authenticated attackers to create and execute web shells. While there has been no unauthorized access to customer backup data, the recent exploitation activity of CVE-2025-34028 has raised concerns.

In response to the active exploitation of the vulnerability, Federal Civilian Executive Branch (FCEB) agencies have been instructed to apply necessary patches by May 23, 2025, to secure their networks. It is crucial for organizations using Commvault Command Center to take immediate action to mitigate the risk of potential cyber threats and safeguard their systems from malicious actors.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Cyber Attack on Infusion Software Hits 118,000 Patients

ANZ Bank Ditches Passwords for Seamless Digital Banking!

Related posts
  • Related posts
  • More from author
Industry News

World Leaks Uncovers Massive Data Breach at State Contractor!

June 19, 20250
Industry News

Iran Cuts Internet Amid Rising Tensions

June 18, 20250
Industry News

Bitdefender Acquires Mesh to Enhance Email Security and Expand MDR Reach

June 18, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Industry News

World Leaks Uncovers Massive Data Breach at State Contractor!

June 19, 20250
Industry News

Iran Cuts Internet Amid Rising Tensions

June 18, 20250
Industry News

Bitdefender Acquires Mesh to Enhance Email Security and Expand MDR Reach

June 18, 20250
Industry News

WormGPT Clones Hijack Popular AI Models to Thrive

June 18, 20250
Industry News

MiniMax M1 Challenges AI Titans with Unbeatable Cost and Performance

June 18, 20250
Industry News

23andMe Hit with £2.31 Million Fine by ICO

June 18, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • World Leaks Uncovers Massive Data Breach at State Contractor!

  • Iran Cuts Internet Amid Rising Tensions

  • Bitdefender Acquires Mesh to Enhance Email Security and Expand MDR Reach

  • WormGPT Clones Hijack Popular AI Models to Thrive

  • MiniMax M1 Challenges AI Titans with Unbeatable Cost and Performance

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures