CISA orders feds to patch actively exploited Dell flaw within 3 days

Summary

CISA has issued an emergency directive requiring federal agencies to patch a critical, actively exploited Dell vulnerability within three days. The vulnerability has a CVSS score of 10.0 and is present in the Dell iDRAC9 product.

IFF Assessment

FOE

An actively exploited critical vulnerability in a widely used product requires immediate patching.

Severity

10.0 Critical

Defender Context

Defenders should immediately prioritize patching the Dell vulnerability, and monitor for signs of exploitation, especially on systems accessible from the internet. Rapid patching and vulnerability management are crucial defenses against active exploitation, and CISA's directive highlights the urgency of addressing known vulnerabilities.

Read Full Story →