-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 cPanel TSR-2022-0001 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated this update as having a CVSSv3.1 score of 2.2 to 9.6. Information on cPanel's security ratings is available at https://go.cpanel.net/securitylevels. If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience. RELEASES The following cPanel & WHM versions address all known vulnerabilities: 94.0.23 & Greater 100.0.10 & Greater 102.0.5 & Greater The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net. SECURITY ISSUE INFORMATION There is no reason to believe that these vulnerabilities have been made known to the public. As such, cPanel will only release limited information about the vulnerabilities at this time. Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issue. This Targeted Security Release addresses two vulnerabilities in cPanel & WHM software versions 94, 100, and 102. Additional information is scheduled for release the following day. For information on cPanel & WHM Versions and the Release Process, read our documentation at: https://go.cpanel.net/versionformat -----BEGIN PGP SIGNATURE----- iQJIBAEBCgAyFiEEtnCbTMb0IHf2mEGRlSG+3KvZTd8FAmIUBfsUHHNlY3VyaXR5 QGNwYW5lbC5uZXQACgkQlSG+3KvZTd+tvg//VUlbwZZB8NL2iP1VpdxLIvKqxmxu 011hapiOpK517GMRc00AZ3Bv/Bj9S0LyiZhYGZ3ylLggwPmI7eOb2uH6AHE4tXL9 QLmUjVkkE8sRZdeOFH7Lbe8kZn8XzNKtCGJUrCtFqd2DV2AoCNPCpnOMSbqdTSEf YHkHklnDdNjOUa/Bg2dTATTK1FGLWMQJCZdDAmP4Vux7IZ6uvG0IF4KkNZtC0N0f N/O8+fsb4JyM1zlA/mJEmlTpPst+NcU4udCP3YbceCCh1Sf8sL2KqSmYTaBFgwOZ bOXEdOMuvkyf10kVMOWz+AqStE3mpQhYW109sCXvpklBMP/PslU3Mqu04yI4tZJH fQGcpLjygB75sZBMvUSjWF1EeXLgjDp2tQ4LsLkSRh9mbDusCNSI2/RE6mwVR5tp QQ3+0buhe5UBWfd65oxJb3pZ7AFN5prcD5RAaCGNiBwFvVzBnktGJTzBOHqhCiCw z1DV+1yb7+dFeuG/k3GMwlp9lI0HywHACViHPf7YFybYV802doSGf1gh0cOC9Nz0 gESWBwN2XZQX/y13sniLLGNG++PnPIuRJZmgO7bVZTUsugvHbl2Sug3vCAF+8zX6 +4e1iyUIV8xdcEIirnA6mqXakfOX3aCZmzT3+MjWcOq6ir3XhcnjWsc7vv975N3c Sq2RCwSKUM5nHNc= =/Jzd -----END PGP SIGNATURE-----