All archived alerts and advisories Title TypeAdvisoryAlert StatusCRITICALHIGHMEDIUMLOW AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 15 Jul 2020 Alert rating: Critical Remote code execution vulnerability in Windows DNS (CVE-2020-1350) On 14 July 2020, Microsoft acknowledged a critical remote code execution vulnerability in Windows Domain Name System (DNS), which could allow an adversary to run arbitrary code. Audience focus: Small & medium businesses Organisations & Critical Infrastructure Government 15 Jul 2020 Advisory ASD's ACSC Advisory 2020-012: Critical remote code execution vulnerability in Windows DNS server (CVE-2020-1350) An adversary who successfully exploits the vulnerability could run arbitrary code in the context of the Local System Account. The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) strongly recommends users apply the security patch to their Windows DNS servers to prevent an adversary from exploiting this vulnerability. Audience focus: Small & medium businesses Organisations & Critical Infrastructure Government 14 Jul 2020 Advisory 2020-011: Critical Vulnerability in SAP NetWeaver Application Server (CVE-2020-6287) The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) recommends users of these products urgently apply available security patches to prevent an adversary from exploiting this vulnerability. Audience focus: Individuals & families Small & medium businesses Organisations & Critical Infrastructure Government 06 Jul 2020 Alert rating: Medium TMUI remote code execution vulnerability - CVE-2020-5902 The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) advises users of F5’s enterprise and data centre BIG-IP products to ensure their systems are promptly patched after the recent disclosure of new remote code execution vulnerability. Audience focus: Organisations & Critical Infrastructure 25 May 2020 Alert rating: High DDoS threats being made against Australian organisations Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) is aware of a number of Denial of Service (DoS) for ransom threats being made against Australian organisations, primarily in the banking and finance sector. Audience focus: Organisations & Critical Infrastructure Government 22 May 2020 Alert rating: High 2019-126: Vulnerable version of Telerik UI being actively exploited by APT actor The Australian Cyber Security Centre (ACSC) has become aware that Advanced Persistent Threat (APT) actors have been scanning for and attempting exploitation against unpatched versions of Telerik UI for ASP.NET AJAX using publicly available exploits. Successful exploitation could allow an attacker to upload files to the vulnerable server to facilitate further compromise. Audience focus: Small & medium businesses Organisations & Critical Infrastructure Government Pagination Previous page ‹‹ Page 18 Next page ›› Alerts and Advisories View our recent alerts and advisories Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary