INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 35m Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 35m Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 35m Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h
Vulnerabilities

CVE-2012-0391

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Apache Struts 2 ExceptionDelegator Remote Code Execution Vulnerability (CVE-2012-0391)
Published: Jan 21, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Apache Struts 2 Improper Input Validation Vulnerability — The ExceptionDelegator component in Apache Struts 2 before 2.2.3.1 contains an improper input validation vulnerability that allows for remote code execution.

🤖 AI Executive Summary

Apache Struts 2 versions prior to 2.2.3.1 contain a critical remote code execution vulnerability in the ExceptionDelegator component due to improper input validation. Active exploits exist with no official patch available, allowing attackers to execute arbitrary code on vulnerable systems. Organizations using affected versions face immediate compromise risk.

📄 Description (Arabic)

تؤثر هذه الثغرة الأمنية الحرجة على مكون ExceptionDelegator في Apache Struts 2 قبل الإصدار 2.2.3.1، حيث يفشل في التحقق بشكل صحيح من المدخلات المقدمة من المستخدم. يمكن للمهاجمين استغلال هذا الضعف لتنفيذ تعليمات برمجية عشوائية على الخادم المستهدف دون الحاجة إلى مصادقة. مع وجود استغلالات نشطة متاحة للجمهور وعدم توفر تصحيح رسمي، تمثل هذه الثغرة تهديداً خطيراً لجميع التطبيقات التي تعتمد على الإصدارات المتأثرة من Apache Struts 2. يجب على المؤسسات اتخاذ إجراءات فورية للتخفيف من المخاطر.

🤖 ملخص تنفيذي (AI)

تحتوي إصدارات Apache Struts 2 الأقدم من 2.2.3.1 على ثغرة حرجة تسمح بتنفيذ التعليمات البرمجية عن بُعد في مكون ExceptionDelegator بسبب التحقق غير السليم من المدخلات. توجد استغلالات نشطة دون وجود تصحيح رسمي، مما يسمح للمهاجمين بتنفيذ تعليمات برمجية تعسفية على الأنظمة المعرضة للخطر. المؤسسات التي تستخدم الإصدارات المتأثرة تواجه خطر اختراق فوري.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 09:24
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using Apache Struts 2 in web applications, particularly in banking, government portals, and e-commerce platforms, face critical risk of complete system compromise. Given the prevalence of Java-based enterprise applications in Saudi financial and government sectors, this vulnerability could enable attackers to breach sensitive systems, steal confidential data, and disrupt critical services.
🏢 Affected Saudi Sectors
القطاع المصرفي والمالي الجهات الحكومية التجارة الإلكترونية الاتصالات وتقنية المعلومات الرعاية الصحية التعليم
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately upgrade Apache Struts 2 to version 2.2.3.1 or later, or migrate to the latest stable version (2.5.x or 6.x series) which includes comprehensive security fixes.
2. Implement Web Application Firewall (WAF) rules to detect and block exploitation attempts targeting ExceptionDelegator component, including filtering suspicious OGNL expressions and parameter manipulation.
3. Conduct thorough security assessment of all applications using Apache Struts 2, implement network segmentation to isolate affected systems, enable comprehensive logging and monitoring for suspicious activities, and establish incident response procedures for potential compromises.
🔧 خطوات المعالجة (العربية)
1. الترقية الفورية لـ Apache Struts 2 إلى الإصدار 2.2.3.1 أو أحدث، أو الانتقال إلى أحدث إصدار مستقر (سلسلة 2.5.x أو 6.x) الذي يتضمن إصلاحات أمنية شاملة.
2. تطبيق قواعد جدار حماية تطبيقات الويب (WAF) لاكتشاف وحظر محاولات الاستغلال التي تستهدف مكون ExceptionDelegator، بما في ذلك تصفية تعبيرات OGNL المشبوهة والتلاعب بالمعاملات.
3. إجراء تقييم أمني شامل لجميع التطبيقات التي تستخدم Apache Struts 2، وتنفيذ تجزئة الشبكة لعزل الأنظمة المتأثرة، وتفعيل التسجيل والمراقبة الشاملة للأنشطة المشبوهة، ووضع إجراءات الاستجابة للحوادث للاختراقات المحتملة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 ECC-2-1 ECC-3-1 ECC-4-1 ECC-5-1
🔵 SAMA CSF
CYB-SEC-3.1 CYB-SEC-3.2 CYB-SEC-4.1 CYB-TRM-2.1 CYB-IRM-2.1
🟡 ISO 27001:2022
A.12.6.1 A.14.2.1 A.18.2.2 A.18.2.3
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Apache:Struts 2
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS88.32%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-07-21
Published 2022-01-21
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.