A critical, unauthenticated remote code execution vulnerability known as React2Shell has been added to the Cybersecurity and Infrastructure Security Agency’s Known Exploited Vulnerabilities Catalog. The vulnerability impacts applications using versions of React 19, a free, open-source JavaScript library commonly used for building web and native user interfaces. The vulnerability is also listed with a maximum score of 10 by the Common Vulnerability Scoring System.  
 
“It is extremely rare to score a 10 out of 10,” said Scott Gee, AHA deputy national advisor for cybersecurity and risk. “This is an easily exploitable vulnerability and there are Chinese actors actively using it, according to Amazon’s threat intelligence teams. If this vulnerability exists in your environment, it is critical that you patch it as soon as possible.” 

For more information on this or other cyber and risk issues, contact Gee at sgee@aha.org. For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity

Related News Articles

Headline
The FBI has public resources available to help prevent exploitation by cybercriminals, who use artificial intelligence for deception. An infographic by the FBI…
Headline
A critical vulnerability has been identified in 7-Zip, a free software program used for archiving data, according to the National Institute of Standards and…
Headline
U.S. and international agencies Nov. 19 released a guide on mitigating potential cybercrimes from bulletproof hosting providers. A BPH provider is an internet…
Headline
A joint advisory issued yesterday by U.S. and international agencies provides updated guidance to defend against the Akira ransomware group, which…
Headline
The National Security Agency, Cybersecurity and Infrastructure Security Agency and international partners released joint guidance Oct. 30 on best practices for…
Headline
Microsoft has released a security update to address a critical remote code execution vulnerability impacting multiple versions of Windows Server Update…