Common Vulnerabilities and Exposures August 2021

Share This Post

Vulnerability 1: ManageEngine ADSelfService Plus CSV Injection Vulnerability (9.3 Critical)

 Description: A CSV injection vulnerability lies within ManageEngine AD Self Service Plus system. A CSV injection attack involves an attacker exploiting improper validation techniques used by websites and web applications and by doing this they can execute applications and code. These types of attacks can be exploited by unauthenticated users, granting them access to key systems.

Likelihood: High – This vulnerability could enable an attacker to generate a ‘reverse shell’ which would mean that they would be able to gain access to systems from a completely different location. Furthermore, the ability to be unauthenticated makes it easier for an attacker to exploit this vulnerability.

Recommendation: No solution has yet been identified for this vulnerability, but it would be advised to not use the ManageEngine AD Self Service Plus solution, until a solution is found. Also, ensure to update from 6.100 to 6.111 immediately.

Vulnerability 2Fortinet FortiWeb OS Command Injection (8.0 High)

Description: The Fortinet FortiWeb OS has a command injection vulnerability. A command injection attack is where an attacker compromises an OS through the use of arbitrary command execution on the via a vulnerable application. So, in Fortinet’s case the attacker can leverage the FortiWeb application to infiltrate and compromise your system. The impact is that an attacker would be able to take complete control of an affected device, with the highest possible privileges.

Likelihood: High – Due to the nature of the vulnerability, an attacker would just have to take control over the application itself, this is possible through Social Engineering and MiTM attacks.

Recommendation: A patch for this vulnerability has not yet been developed, as a result, it is recommended that the FortiWeb device management interface be disabled for untrusted networks and shouldn’t be exposed in any way to the internet.

Vulnerability 3: Citrix ADC & Gateway Session Fixation (5.8 Medium)

Description: A session fixation vulnerability in Citrix ADC & Gateway devices. A session fixation attack enables attackers the ability to ‘hijack’ a valid user session. This is a common vulnerability in web applications and the implications of this is that attackers will be able to take control of high value users with higher privileges to conduct further probing of the site or even delete, change or add users, in a legitimate manner. In this instance, it would enable an attacker the ability to modify and control Citrix infrastructure.

Likelihood: High – The reward for exploiting such a vulnerability is high as the attackers will be able to have full control, if they target the user well, over Citrix systems.

Recommendation: It is recommended that Citrix ADC & Citrix Gateway versions be updated to that latest to ensure that security holes are patched. Brace168 also provides a SIEM/SOAR solution which will enable us to ingest your Citrix logs so that they can be monitored 24/7.

More To Explore

cyber-security

Excite Cyber Whitepaper – Data Loss Prevention (DLP) as an Enabler for Secure AI Adoption

AI has moved from experiment to operating model, but its real value—and risk—comes down to your data. With 75% of knowledge workers already using AI tools, often without IT oversight, shadow AI is driving a costly wave of breaches that organisations can’t afford to ignore. This whitepaper cuts through the anxiety to show how Microsoft Purview gives you the discovery, classification, and policy controls to make AI safe and productive, turning data security from a blocker into an AI enabler.

cyber-security

Excite Cyber Threat Intelligence Report – Q1 2026

Q1 2026 has been defined by speed. Storm-1175, a financially motivated affiliate of the Medusa ransomware-as-a-service operation, has emerged as the quarter’s most aggressive threat to Australian businesses, weaponising newly disclosed vulnerabilities in internet-facing systems and moving from initial breach to full ransomware deployment in as little as 24 hours.