Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202604-00000028
[Content Description]
【CVE-2024-27199】JetBrains TeamCity Relative Path Traversal Vulnerability (CVSS v3.1: 7.3)
【Exploited by Ransomware: Known】 A relative path traversal vulnerability exists in JetBrains TeamCity, potentially allowing limited administrator operations.
【CVE-2026-33825】Microsoft Defender Insufficient Granularity of Access Control Vulnerability (CVSS v3.1: 7.8)
【Exploited by Ransomware: Unknown】 A vulnerability exists in Microsoft Defender that lacks sufficient granularity of access control, potentially allowing an authorized attacker to escalate privileges on the local machine.
【CVE-2026-39987】Marimo Remote Code Execution Vulnerability (CVSS v3.1: 9.8)
【Exploited by Ransomware: Unknown】 Marimo contains a pre-verified remote code execution vulnerability, allowing unverified attackers to gain shell access and execute arbitrary system commands.
【CVE-2025-29635】D-Link DIR-823X Command Injection Vulnerability (CVSS v3.1: 7.2)
【Exploited by Ransomware: Unknown】 D-Link DIR-823X contains a command injection vulnerability, allowing authorized attackers to execute arbitrary commands on a remote device by sending a POST request to /goform/set_prohibiting. Affected products may have reached End-of-Life (EoL) or End-of-Service (EoS) stages. Users are advised to stop using this product.
【CVE-2024-7399】Samsung MagicINFO 9 Server Path Traversal Vulnerability (CVSS v3.1: 8.8)
【Ransomware Exploitation Possibility: Unknown】 A path traversal vulnerability exists in Samsung MagicINFO 9 Server, potentially allowing attackers to write arbitrary files with system privileges.
【CVE-2024-57728】SimpleHelp Path Traversal Vulnerability (CVSS v3.1: 7.2)
【Ransomware Exploitation Possibility: Unknown】 A path traversal vulnerability exists in SimpleHelp, allowing administrators to upload arbitrary files to any location on the file system by uploading specially crafted ZIP files. This vulnerability can be exploited to allow attackers to execute arbitrary code on the host machine posing as a SimpleHelp server user.
【CVE-2024-57726】SimpleHelp Missing Authorization Vulnerability (CVSS v3.1: 9.9)
【Exploitation by Ransomware: Unknown】 SimpleHelp contains a missing authorization vulnerability that could allow low-privilege technical personnel to create API keys with excessively high privileges. These API keys could then be used to escalate privileges to server administrator roles.
[Affected Platforms]
【CVE-2024-27199】Please refer to the official list of affected versions: https://www.jetbrains.com/privacy-security/issues-fixed/
【CVE-2026-33825】Please refer to the official list of affected versions: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825
【CVE-2026-39987】Please refer to the official list of affected versions: https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc
【CVE-2025-29635】D-Link DIR-823X 240126, D-Link DIR-823X 240802
【CVE-2024-7399】Please refer to the official affected versions listed here: https://security.samsungtv.com/securityUpdates
【CVE-2024-57728】Please refer to the official affected versions listed here: https://guides.simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier
【CVE-2024-57726】Please refer to the official affected versions listed here: https://guides.simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier
[Recommended Actions]
【CVE-2024-27199】Official updates have been released to fix the vulnerability. Please update to the relevant version: https://www.jetbrains.com/privacy-security/issues-fixed/
【CVE-2026-33825】Official updates have been released to fix the vulnerability. Please update to the relevant version: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825
【CVE-2026-39987】Official updates have been released to fix the vulnerability. Please update to the relevant version: https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc
【CVE-2025-29635】Affected products may have reached End-of-Life (EoL) or End-of-Service (EoS) stages. Users are advised to stop using the product.
【CVE-2024-7399】An official patch update has been released for this vulnerability. Please update to the relevant version: https://security.samsungtv.com/securityUpdates
【CVE-2024-57728】An official patch update has been released for this vulnerability. Please update to the relevant version: https://guides.simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier
【CVE-2024-57726】An official patch update has been released for this vulnerability. Please update to the relevant version: https://guides.simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier