-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 cPanel TSR-2021-0002 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated this update as having a CVSSv3.1 score of 1.8. Information on cPanel's security ratings is available at https://go.cpanel.net/securitylevels. If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience. RELEASES The following cPanel & WHM versions address all known vulnerabilities: 94.0.3 & Greater 92.0.12 & Greater 86.0.38 & Greater The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net. SECURITY ISSUE INFORMATION The cPanel Security Team identified the resolved security issue. There is no reason to believe that this vulnerability has been made known to the public. As such, cPanel will only release limited information about the vulnerability at this time. Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issue. This Targeted Security Release addresses one vulnerabilities in cPanel & WHM software versions 94, 92, and 86. Additional information is scheduled for release on March 16th, 2021. For information on cPanel & WHM Versions and the Release Process, read our documentation at: https://go.cpanel.net/versionformat -----BEGIN PGP SIGNATURE----- iQJIBAEBCgAyFiEEtnCbTMb0IHf2mEGRlSG+3KvZTd8FAmBPnAMUHHNlY3VyaXR5 QGNwYW5lbC5uZXQACgkQlSG+3KvZTd+jUQ/+LTdAE194lYxUbxtirLt0g5hTm2D6 29gYPa4+Lt1vfXJSq/ms+8RiE7CK9VVNtDI3BVRGDzzVYWRfcyX4nk4LxZjfHERh dYnzyP/yZG5KC8j23D/rrST4jITau2z37Z2VrXo4HPqBW88PTC5nNA3w8JyZ9oo+ IAq7fXSyJFgH8e/h3Ae8LqdF25+GqbMFWxmNCOTeDW+ZdoRJ/X+ejKnsSJw+achU xVrsTumtiQG1TFxpO5FdRaduqFdBrwY8XDse/12kjMHZABas8q2Lb3urX8n86A0b m27aNkD3OMIbujDMIZ1TQA8v/aWb7EBqIbJ5vos1vYxLHhYB0Y4QPvyzQahSbE1S m1rPh0nwhNXk+T5ENRfOZjEoDrrSLmzbt0+k3T3JnktMGSmYMZMHUIzo8EOTme72 B4/E0ipkRsi2X9EdIakgzh328hfrvS5fl942j3B69f+ABd+aFQWI+UA6UkVu0yZ7 cHuz++e8mm3bbvBsBdjpoF18lhn2tfzhxmDU1K8jWWyw8rxaPQyyZ8lSkkyQJFfB MVd4LAZ1Ln7p1f2szQv9wUWA4Eq1Xk39Cocizl2u91qMWOUhJTROZow5Q7qKOMYz s/RshTf1ETWcdglnPsQ4TyA9WVMuRe3pLO/M5hmxUcpNbIm9UO7qBu8dp8MdOfSZ AI62WsIjc9VAd2I= =vNlG -----END PGP SIGNATURE-----