Cisco Talos researchers have disclosed a series of security vulnerabilities affecting enterprise and consumer devices. The findings were shared with respective vendors, who have since issued patches in accordance with third-party disclosure policies. These issues span design tools, networking hardware, and surveillance equipment.
Researchers identified nineteen distinct flaws within Canva Affinity, a graphic design utility. Eighteen involve out-of-bounds reads in the EMF functionality, which could expose sensitive information via crafted files. One additional type confusion flaw allows for arbitrary code execution through memory corruption.
Ten vulnerabilities were discovered in TP-Link Archer AX53 routers. These include multiple buffer overflows in the SSH server opcode and a misconfiguration risking credential leaks during man-in-the-middle attacks. Network packets are required to trigger the conditions.
A single stack-based buffer overflow was found in HikVision terminals. This flaw impacts the SADP XML parsing functionality on Ultra Face Recognition Terminals. Exploitation could lead to remote code execution.
Organizations should verify patch status on affected inventory lists. Cisco Talos provides rule sets for Snort detection, and advisories are available on the vendor website for monitoring exploitation attempts.