INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Technology and Software Development CRITICAL 53m Global ddos Technology and Social Media HIGH 1h Global phishing Financial Services, Telecommunications, General Public HIGH 1h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors / Critical Infrastructure CRITICAL 2h Global malware Financial Services CRITICAL 3h Global general Software/Technology LOW 3h Global malware Energy CRITICAL 3h Global spyware Software/Technology HIGH 3h Global malware Telecommunications and ISP HIGH 3h Global malware Technology and Software Development CRITICAL 53m Global ddos Technology and Social Media HIGH 1h Global phishing Financial Services, Telecommunications, General Public HIGH 1h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors / Critical Infrastructure CRITICAL 2h Global malware Financial Services CRITICAL 3h Global general Software/Technology LOW 3h Global malware Energy CRITICAL 3h Global spyware Software/Technology HIGH 3h Global malware Telecommunications and ISP HIGH 3h Global malware Technology and Software Development CRITICAL 53m Global ddos Technology and Social Media HIGH 1h Global phishing Financial Services, Telecommunications, General Public HIGH 1h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors / Critical Infrastructure CRITICAL 2h Global malware Financial Services CRITICAL 3h Global general Software/Technology LOW 3h Global malware Energy CRITICAL 3h Global spyware Software/Technology HIGH 3h Global malware Telecommunications and ISP HIGH 3h
Vulnerabilities

CVE-2010-1428

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Red Hat JBoss Web Console Authentication Bypass via HTTP Verb Tampering
Published: May 25, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Red Hat JBoss Information Disclosure Vulnerability — Unauthenticated access to the JBoss Application Server Web Console (/web-console) is blocked by default. However, it was found that this block was incomplete, and only blocked GET and POST HTTP verbs. A remote attacker could use this flaw to gain access to sensitive information.

🤖 AI Executive Summary

Red Hat JBoss Application Server contains an authentication bypass vulnerability in the Web Console (/web-console) that allows unauthenticated remote attackers to access sensitive administrative information. The default security block only restricts GET and POST methods, enabling attackers to use alternative HTTP verbs to bypass authentication controls and gain unauthorized access to management interfaces.

📄 Description (Arabic)

تؤثر هذه الثغرة الأمنية الحرجة على خادم تطبيقات Red Hat JBoss حيث تم تطبيق آلية حماية غير كاملة على واجهة الإدارة الويب. بينما تم حظر الوصول غير المصادق للمسار /web-console باستخدام أفعال HTTP التقليدية GET و POST، فإن المهاجم يمكنه استخدام أفعال HTTP أخرى مثل HEAD أو OPTIONS أو PUT لتجاوز هذه القيود الأمنية. يؤدي هذا إلى كشف معلومات حساسة عن التطبيقات المنشورة، إعدادات الخادم، وبيانات اعتماد محتملة. تُصنف الثغرة بدرجة خطورة 9.0 مع وجود استغلالات عملية متاحة، مما يجعلها هدفاً سهلاً للمهاجمين الذين يسعون للحصول على موطئ قدم في البنية التحتية للتطبيقات.

🤖 ملخص تنفيذي (AI)

يحتوي خادم تطبيقات Red Hat JBoss على ثغرة تجاوز المصادقة في واجهة الإدارة (/web-console) تسمح للمهاجمين عن بُعد بالوصول إلى معلومات إدارية حساسة دون مصادقة. الحماية الافتراضية تقيد فقط طرق GET و POST، مما يمكّن المهاجمين من استخدام أفعال HTTP بديلة لتجاوز ضوابط المصادقة والحصول على وصول غير مصرح به لواجهات الإدارة.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 09:02
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations running legacy JBoss Application Servers face critical risk of unauthorized access to administrative consoles, potentially exposing sensitive business logic, database configurations, and deployed application details. Financial institutions under SAMA supervision and government entities under NCA oversight must immediately assess their JBoss deployments, as exploitation could lead to data breaches, regulatory non-compliance, and compromise of critical national infrastructure.
🏢 Affected Saudi Sectors
القطاع المالي والمصرفي الجهات الحكومية قطاع الاتصالات وتقنية المعلومات قطاع الطاقة والمرافق قطاع الرعاية الصحية
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately implement network-level access controls to restrict /web-console access to authorized IP addresses only using firewalls or web application firewalls, and configure comprehensive HTTP verb filtering to block all methods except explicitly required ones.
2. Upgrade Red Hat JBoss Application Server to the latest patched version that addresses CVE-2010-1428, or apply vendor-provided security patches and hotfixes while testing thoroughly in non-production environments before deployment.
3. Deploy additional authentication layers such as reverse proxy with strong authentication, implement network segmentation to isolate management interfaces, enable comprehensive logging for all web console access attempts, and conduct immediate security audits to identify any historical unauthorized access.
🔧 خطوات المعالجة (العربية)
1. تطبيق ضوابط الوصول على مستوى الشبكة فوراً لتقييد الوصول إلى /web-console للعناوين المصرح بها فقط باستخدام جدران الحماية أو جدران حماية تطبيقات الويب، وتكوين تصفية شاملة لأفعال HTTP لحظر جميع الطرق باستثناء المطلوبة صراحةً.
2. ترقية خادم تطبيقات Red Hat JBoss إلى أحدث إصدار مُصحح يعالج CVE-2010-1428، أو تطبيق التصحيحات الأمنية والإصلاحات العاجلة المقدمة من المورّد مع الاختبار الشامل في بيئات غير إنتاجية قبل النشر.
3. نشر طبقات مصادقة إضافية مثل الوكيل العكسي مع مصادقة قوية، تطبيق تجزئة الشبكة لعزل واجهات الإدارة، تفعيل التسجيل الشامل لجميع محاولات الوصول لواجهة الإدارة، وإجراء تدقيق أمني فوري لتحديد أي وصول غير مصرح به سابق.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
5-2-1 5-2-2 4-1-1 4-2-1 6-1-1
🔵 SAMA CSF
CCC-1.1 CCC-2.1 CCC-4.1 TVM-1.1 IAM-1.1
🟡 ISO 27001:2022
A.9.1.1 A.9.1.2 A.13.1.1 A.12.6.1 A.18.2.3
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Red Hat:JBoss
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS65.34%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-06-15
Published 2022-05-25
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.