CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability
好的,我现在要帮用户总结这篇文章的内容。用户的要求是用中文,控制在100字以内,不需要特定的开头,直接写描述即可。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是美国网络安全和基础设施安全局(CISA)将FileZen中的一个漏洞添加到已知被利用的漏洞目录中。这个漏洞编号是CVE-2026-25108,CVSS评分是8.7分,属于操作系统命令注入漏洞。 接下来,漏洞影响的版本包括4.2.1到4.2.8以及5.0.0到5.0.10。攻击者需要通过恶意HTTP请求执行任意命令。Soliton公司指出,只有在启用了杀毒检查选项时才可能被利用,并且已经有报告称该漏洞导致了损害。 建议用户更新到5.0.11或更高版本,并更改所有用户密码作为预防措施。FCEB机构需要在2026年3月17日前应用补丁。 现在我要把这些信息浓缩到100字以内。重点包括:CISA添加了FileZen的高危漏洞,影响特定版本,攻击者可执行命令,需更新和更改密码,机构有截止日期。 最后检查一下字数是否符合要求,并确保语言简洁明了。 </think> 美国网络安全机构CISA将FileZen软件中的高危漏洞(CVE-2026-25108)加入已知被利用漏洞目录。该漏洞允许攻击者通过恶意HTTP请求执行任意命令,影响版本4.2.1至4.2.8及5.0.0至5.0.10。建议用户更新至5.0.11或更高版本,并更改密码以防范威胁。 2026-2-25 05:23:0 Author: thehackernews.com(查看原文) 阅读量:13 收藏

Vulnerability / Software Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed vulnerability in FileZen to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

The vulnerability, tracked as CVE-2026-25108 (CVSS v4 score: 8.7), is a case of operating system (OS) command injection that could allow an authenticated user to execute arbitrary commands via specially crafted HTTP requests.

"Soliton Systems K.K FileZen contains an OS command injection vulnerability when a user logs-in to the affected product and sends a specially crafted HTTP request," CISA said.

According to the Japan Vulnerability Notes (JVN), the vulnerability affects the following versions of the file transfer product -

  • Versions 4.2.1 to 4.2.8
  • Versions 5.0.0 to 5.0.10

Soliton noted in its advisory that successful exploitation of the issue is only possible when FileZen Antivirus Check Option is enabled, adding it has "received at least one report of damage caused by the exploitation of this vulnerability."

The Japanese technology company also revealed that a bad actor must sign in to the web interface with general user privileges to be able to pull off an attack. Users are advised to update to version 5.0.11 or later to mitigate the threat.

"If you have been attacked or suspect that you have been victimized by this vulnerability, please consider not only updating to V5.0.11 or later, but also changing all user passwords as a precaution, as an attacker can log on with at least one real account," it added.

Federal Civilian Executive Branch (FCEB) agencies are advised to apply the necessary fixes by March 17, 2026, to secure their networks.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/cisa-confirms-active-exploitation-of.html
如有侵权请联系:admin#unsafe.sh