INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 7h Global ransomware Financial Services / Cybersecurity CRITICAL 7h Global vulnerability Information Technology / Cybersecurity CRITICAL 9h Global malware Energy and Utilities CRITICAL 10h Global ransomware Multiple sectors CRITICAL 10h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 13h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 13h Global phishing Multiple sectors HIGH 14h Global insider Cybersecurity Services CRITICAL 14h Global ransomware Multiple sectors (U.S. companies) CRITICAL 14h Global data_breach Government CRITICAL 7h Global ransomware Financial Services / Cybersecurity CRITICAL 7h Global vulnerability Information Technology / Cybersecurity CRITICAL 9h Global malware Energy and Utilities CRITICAL 10h Global ransomware Multiple sectors CRITICAL 10h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 13h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 13h Global phishing Multiple sectors HIGH 14h Global insider Cybersecurity Services CRITICAL 14h Global ransomware Multiple sectors (U.S. companies) CRITICAL 14h Global data_breach Government CRITICAL 7h Global ransomware Financial Services / Cybersecurity CRITICAL 7h Global vulnerability Information Technology / Cybersecurity CRITICAL 9h Global malware Energy and Utilities CRITICAL 10h Global ransomware Multiple sectors CRITICAL 10h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 13h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 13h Global phishing Multiple sectors HIGH 14h Global insider Cybersecurity Services CRITICAL 14h Global ransomware Multiple sectors (U.S. companies) CRITICAL 14h
Vulnerabilities

CVE-2023-29298

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Critical Adobe ColdFusion Improper Access Control Vulnerability (CVE-2023-29298)
Published: Jul 20, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Adobe ColdFusion Improper Access Control Vulnerability — Adobe ColdFusion contains an improper access control vulnerability that allows for a security feature bypass.

🤖 AI Executive Summary

Adobe ColdFusion contains a critical improper access control vulnerability (CVE-2023-29298) with a CVSS score of 9.0 that allows attackers to bypass security features. This vulnerability is actively exploited in the wild and has been added to CISA's Known Exploited Vulnerabilities catalog. Patches are available from Adobe and should be applied immediately.

📄 Description (Arabic)

تم اكتشاف ثغرة حرجة في Adobe ColdFusion تتعلق بالتحكم غير السليم في الوصول مما يسمح بتجاوز ميزات الأمان المطبقة. يمكن للمهاجمين استغلال هذه الثغرة للوصول غير المصرح به إلى موارد النظام المحمية وتنفيذ إجراءات ضارة. تم تأكيد وجود استغلال نشط لهذه الثغرة في الهجمات الفعلية مما يزيد من خطورتها بشكل كبير. يجب على جميع المؤسسات التي تستخدم Adobe ColdFusion تطبيق التحديثات الأمنية بشكل عاجل وفحص أنظمتها للتأكد من عدم تعرضها للاختراق.

🤖 ملخص تنفيذي (AI)

يحتوي Adobe ColdFusion على ثغرة حرجة في التحكم بالوصول (CVE-2023-29298) بدرجة خطورة 9.0 تسمح للمهاجمين بتجاوز ميزات الأمان. يتم استغلال هذه الثغرة بشكل نشط وقد أُضيفت إلى قائمة الثغرات المستغلة المعروفة لدى CISA. التحديثات الأمنية متوفرة من Adobe ويجب تطبيقها فوراً.

🤖 AI Intelligence Analysis Analyzed: Apr 11, 2026 00:46
🇸🇦 Saudi Arabia Impact Assessment
Organizations in Saudi Arabia using Adobe ColdFusion for web applications and enterprise services are at critical risk. Government portals, financial institutions, and e-commerce platforms running ColdFusion could be compromised, leading to unauthorized access to sensitive data, service disruption, and potential violations of PDPL data protection requirements. Given the active exploitation status, Saudi entities are likely being targeted as part of broader campaigns.
🏢 Affected Saudi Sectors
الجهات الحكومية القطاع المالي والمصرفي قطاع التجارة الإلكترونية قطاع الاتصالات وتقنية المعلومات قطاع التعليم قطاع الرعاية الصحية قطاع الطاقة
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately apply Adobe ColdFusion security updates (APSB23-40 and subsequent patches) to all affected installations. Verify patch completeness as initial patches were found to be incomplete.
2. Conduct thorough incident response and forensic analysis on all ColdFusion servers to identify any signs of compromise, including unauthorized access, webshells, or suspicious file modifications. Restrict access to ColdFusion admin panels using network-level controls.
3. Implement Web Application Firewall (WAF) rules to detect and block exploitation attempts, enable comprehensive logging and monitoring, and segment ColdFusion servers from critical internal networks. Review and harden access control configurations.
🔧 خطوات المعالجة (العربية)
1. تطبيق تحديثات Adobe ColdFusion الأمنية (APSB23-40 والتحديثات اللاحقة) فوراً على جميع الأنظمة المتأثرة. التحقق من اكتمال التصحيح حيث وُجد أن التصحيحات الأولية كانت غير مكتملة.
2. إجراء تحليل جنائي شامل واستجابة للحوادث على جميع خوادم ColdFusion لتحديد أي علامات اختراق بما في ذلك الوصول غير المصرح به وملفات الويب شل والتعديلات المشبوهة على الملفات. تقييد الوصول إلى لوحات إدارة ColdFusion باستخدام ضوابط على مستوى الشبكة.
3. تطبيق قواعد جدار حماية تطبيقات الويب لكشف ومنع محاولات الاستغلال وتفعيل التسجيل والمراقبة الشاملة وعزل خوادم ColdFusion عن الشبكات الداخلية الحرجة ومراجعة وتقوية إعدادات التحكم بالوصول.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2:2-1 (Asset Management) ECC-2:3-1 (Vulnerability Management) ECC-2:5-1 (Access Control) ECC-2:6-2 (Incident Management)
🔵 SAMA CSF
3.3.3 (Patch Management) 3.3.5 (Vulnerability Management) 3.3.7 (Access Control) 3.4.1 (Incident Response)
🟡 ISO 27001:2022
A.8.8 (Management of Technical Vulnerabilities) A.8.5 (Secure Authentication) A.5.15 (Access Control) A.8.16 (Monitoring Activities)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Adobe:ColdFusion
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.29%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-08-10
Published 2023-07-20
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.