INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h
Vulnerabilities

CVE-2018-15961

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Adobe ColdFusion Unrestricted File Upload Vulnerability — Adobe ColdFusion contains an unrestricted file upload vulnerability that could allow for code execution.
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Adobe ColdFusion Unrestricted File Upload Vulnerability — Adobe ColdFusion contains an unrestricted file upload vulnerability that could allow for code execution.

🤖 AI Executive Summary

CVE-2018-15961 is a critical unrestricted file upload vulnerability in Adobe ColdFusion that allows remote attackers to upload arbitrary files, including web shells, leading to remote code execution. This vulnerability has a CVSS score of 9.0 and has been actively exploited in the wild, including by nation-state actors and cybercriminal groups. It was added to CISA's Known Exploited Vulnerabilities catalog, indicating confirmed real-world exploitation. Organizations running unpatched ColdFusion instances are at immediate risk of complete system compromise.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 10, 2026 11:17
🇸🇦 Saudi Arabia Impact Assessment
Adobe ColdFusion is used across multiple Saudi sectors for web application development. Government portals and e-services platforms (NCA-regulated entities) that rely on ColdFusion are at critical risk of web shell deployment and full server compromise. Banking and financial institutions under SAMA regulation may use ColdFusion for internal or customer-facing applications. Energy sector organizations including ARAMCO subsidiaries and contractors, as well as telecom providers like STC, could be impacted if legacy ColdFusion instances remain unpatched. Given that this vulnerability has known public exploits and has been weaponized by APT groups, Saudi organizations face elevated risk from both opportunistic and targeted attacks, particularly given the Kingdom's strategic importance and the prevalence of legacy web infrastructure in some government entities.
🏢 Affected Saudi Sectors
Government Banking Energy Telecom Healthcare Education Retail
⚖️ Saudi Risk Score (AI)
9.5
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Adobe ColdFusion instances across the organization using asset discovery tools
2. Apply Adobe security update APSB18-33 immediately — this patch has been available since September 2018
3. If immediate patching is not possible, restrict access to ColdFusion administrator and file upload endpoints via WAF rules and network segmentation

DETECTION AND INVESTIGATION:
4. Search web server logs for suspicious file uploads, particularly .jsp, .cfm, .php files uploaded to unexpected directories
5. Scan ColdFusion web roots for web shells — check for recently created or modified files
6. Monitor for outbound connections from ColdFusion servers to unknown IPs
7. Deploy YARA rules for known web shells associated with CVE-2018-15961 exploitation

COMPENSATING CONTROLS:
8. Implement WAF rules to block file upload requests containing executable file extensions
9. Restrict ColdFusion server network access using firewall rules — limit outbound connectivity
10. Enable ColdFusion sandbox security to restrict file system access
11. Remove or disable the FCKeditor component if not required (primary attack vector)

LONG-TERM:
12. Consider migrating off unsupported ColdFusion versions
13. Implement regular vulnerability scanning for all web application servers
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع مثيلات Adobe ColdFusion عبر المؤسسة باستخدام أدوات اكتشاف الأصول
2. تطبيق تحديث Adobe الأمني APSB18-33 فوراً — هذا التصحيح متاح منذ سبتمبر 2018
3. إذا لم يكن التصحيح الفوري ممكناً، قم بتقييد الوصول إلى مدير ColdFusion ونقاط رفع الملفات عبر قواعد WAF وتجزئة الشبكة

الكشف والتحقيق:
4. البحث في سجلات خادم الويب عن عمليات رفع ملفات مشبوهة خاصة ملفات .jsp و .cfm و .php المرفوعة إلى مجلدات غير متوقعة
5. فحص مجلدات ColdFusion الجذرية بحثاً عن أصداف الويب — التحقق من الملفات المنشأة أو المعدلة حديثاً
6. مراقبة الاتصالات الصادرة من خوادم ColdFusion إلى عناوين IP غير معروفة
7. نشر قواعد YARA لأصداف الويب المعروفة المرتبطة باستغلال CVE-2018-15961

الضوابط التعويضية:
8. تنفيذ قواعد WAF لحظر طلبات رفع الملفات التي تحتوي على امتدادات ملفات قابلة للتنفيذ
9. تقييد وصول شبكة خادم ColdFusion باستخدام قواعد جدار الحماية — تقييد الاتصال الصادر
10. تمكين أمان صندوق الحماية في ColdFusion لتقييد الوصول إلى نظام الملفات
11. إزالة أو تعطيل مكون FCKeditor إذا لم يكن مطلوباً (ناقل الهجوم الرئيسي)

على المدى الطويل:
12. النظر في الترحيل من إصدارات ColdFusion غير المدعومة
13. تنفيذ فحص الثغرات المنتظم لجميع خوادم تطبيقات الويب
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
2-3-1 (Patch Management) 2-3-4 (Web Application Security) 2-5-1 (Vulnerability Management) 2-2-1 (Asset Management)
🔵 SAMA CSF
3.3.3 (Patch Management) 3.3.5 (Vulnerability Management) 3.3.7 (Web Application Security) 3.4.1 (Incident Management)
🟡 ISO 27001:2022
A.8.8 (Management of Technical Vulnerabilities) A.8.9 (Configuration Management) A.8.23 (Web Filtering) A.8.28 (Secure Coding)
🟣 PCI DSS v4.0
6.3.3 (Security Patches) 6.4 (Web Application Firewall) 11.3 (Penetration Testing) 6.2 (Custom Application Security)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Adobe:ColdFusion
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.42%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-05-03
Published 2021-11-03
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.5
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.