The agency mentioned that successfully exploiting these vulnerabilities could allow an attacker to obtain sensitive information, bypass security restrictions, and execute arbitrary code on the targeted system. CERT-In advised users to apply appropriate security updates as mentioned by the company.
Related Posts
A comprehensive guard against social engineering in the digital age
Social engineering attacks exploit human vulnerabilities like curiosity and trust. Recent AI advancements have led to AI-driven forgeries, ChatGPT, and…
Pakistani spies used malware apps to steal classified data from BrahMos engineer
These three apps were malware that stole data from Nishant’s laptop, which contained classified information. Investigations claim that crucial documents…

Hacker uses Telegram chatbots to leak customer medical reports from Star Health
Stolen customer data from India’s largest health insurer, Star Health, is accessible via Telegram chatbots. The data includes sensitive information…