Palo Alto warns firewalls flaws are under active attackPalo Alto Networks addressed multiple vulnerabilities, one of which is actively being exploited to gain root access to systems. Immediate upgrades are necessary.
right to root accessConsumers should have the right to install any software on devices they own.Locked devices limit user control and infringe on consumer rights.
Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access RiskA critical vulnerability in Kubernetes Image Builder could lead to root access; it has been fixed in version 0.1.38.
Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access AttacksSecurity vulnerabilities in Ewon Cosy+ could lead to root access, decryption of firmware files, and hijacking VPN sessions.