CISA Adds Cacti Vulnerability to Known Exploited Vulnerabilities Catalog
The Cybersecurity and Infrastructure Security Agency has added a cyber vulnerability to its Known Exploited Vulnerabilities Catalog. The Cacti Command Injection Vulnerability allows unauthenticated users to execute arbitrary code on a server that runs the Cacti open-source platform. Specifically, it allows hackers to retrieve the client’s internet protocol address by bypassing authentication processes. The vulnerability […]
