## Updated at UTC 2025-07-12T07:07:33.668739

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-6058 9.8 0.00% 1 0 2025-07-12T05:15:22.387000 The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to
CVE-2025-5777 7.5 49.70% 23 12 template 2025-07-12T03:30:20 Insufficient input validation leading to memory overread on the NetScaler Manage
CVE-2025-30402 8.1 0.00% 2 0 2025-07-11T22:57:08 A heap-buffer-overflow vulnerability in the loading of ExecuTorch methods can ca
CVE-2025-30403 8.1 0.00% 2 0 2025-07-11T20:15:24.100000 A heap-buffer-overflow vulnerability is possible in mvfst via a specially crafte
CVE-2025-7503 0 0.00% 1 0 2025-07-11T19:15:24.217000 An OEM IP camera manufactured by Shenzhen Liandian Communication Technology LTD
CVE-2025-45582 4.1 0.00% 2 0 2025-07-11T18:30:35 GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TA
CVE-2025-6771 7.2 0.66% 2 0 2025-07-11T17:29:00.883000 OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.
CVE-2025-7028 0 0.00% 1 0 2025-07-11T16:15:27.143000 A vulnerability in the Software SMI handler (SwSmiInputValue 0x20) allows a loca
CVE-2025-7027 0 0.00% 1 0 2025-07-11T16:15:27.053000 A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a loca
CVE-2025-51591 6.5 0.00% 1 0 2025-07-11T15:31:37 A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to ga
CVE-2025-52950 9.6 0.00% 5 0 2025-07-11T15:15:25.570000 A Missing Authorization vulnerability in Juniper Networks Security Director allo
CVE-2025-30025 None 0.02% 1 0 2025-07-11T06:30:36 The communication protocol used between the server process and the service contr
CVE-2025-30024 6.8 0.03% 1 0 2025-07-11T06:30:36 The communication protocol used between client and server had a flaw that could
CVE-2025-30023 9.1 0.66% 1 0 2025-07-11T06:30:36 The communication protocol used between client and server had a flaw that could
CVE-2025-30026 None 0.02% 1 0 2025-07-11T06:30:36 The AXIS Camera Station Server had a flaw that allowed to bypass authentication
CVE-2025-52579 9.4 0.03% 1 0 2025-07-11T00:15:26.597000 Emerson ValveLink Products store sensitive information in cleartext in memory. T
CVE-2025-34102 None 0.69% 2 0 2025-07-10T21:32:00 A remote code execution vulnerability exists in CryptoLog (PHP version, disconti
CVE-2025-53709 5.4 0.03% 2 0 2025-07-10T21:31:59 Secure-upload is a data submission service that validates single-use tokens when
CVE-2025-7365 5.4 0.01% 1 0 2025-07-10T21:12:15 A flaw was found in Keycloak. When an authenticated attacker attempts to merge a
CVE-2024-42516 None 0.04% 1 0 2025-07-10T18:31:34 HTTP response splitting in the core of Apache HTTP Server allows an attacker who
CVE-2025-23048 None 0.01% 1 0 2025-07-10T18:31:34 In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, a
CVE-2025-49812 None 0.02% 1 0 2025-07-10T18:31:34 In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63,
CVE-2024-47252 None 0.02% 1 0 2025-07-10T18:31:34 Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4
CVE-2025-47813 4.3 0.63% 1 0 template 2025-07-10T18:31:34 loginok.html in Wing FTP Server before 7.4.4 discloses the full local installati
CVE-2025-47812 10.0 57.30% 13 5 template 2025-07-10T18:31:28 In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0
CVE-2025-49630 None 0.02% 1 0 2025-07-10T18:31:28 In certain proxy configurations, a denial of service attack against Apache HTTP
CVE-2024-43394 None 0.03% 1 0 2025-07-10T18:31:27 Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to po
CVE-2025-53371 9.1 0.03% 1 0 2025-07-10T18:15:24.280000 DiscordNotifications is an extension for MediaWiki that sends notifications of a
CVE-2025-53020 0 0.02% 1 0 2025-07-10T17:15:48.337000 Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Ser
CVE-2025-47811 4.1 0.02% 1 0 2025-07-10T17:15:46.933000 In Wing FTP Server through 7.4.4, the administrative web interface (listening by
CVE-2024-43204 0 0.02% 1 0 2025-07-10T17:15:45.987000 SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outb
CVE-2025-44251 None 0.02% 1 0 2025-07-10T15:31:41 Ecovacs Deebot T10 1.7.2 transmits Wi-Fi credentials in cleartext during the pai
CVE-2025-38246 None 0.02% 1 0 2025-07-10T15:31:21 In the Linux kernel, the following vulnerability has been resolved: bnxt: prope
CVE-2025-47981 9.8 0.17% 6 0 2025-07-10T13:19:18.800000 Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unau
CVE-2024-36357 5.6 0.01% 1 0 2025-07-10T13:19:18.800000 A transient execution vulnerability in some AMD processors may allow an attacker
CVE-2025-48804 6.8 0.03% 1 0 2025-07-10T13:19:18.800000 Acceptance of extraneous untrusted data with trusted data in Windows BitLocker a
CVE-2025-37103 9.8 0.20% 1 0 2025-07-10T13:18:53.830000 Hard-coded login credentials were found in HPE Networking Instant On Access Poi
CVE-2025-53513 8.8 0.05% 1 0 2025-07-10T13:18:53.830000 The /charms endpoint on a Juju controller lacked sufficient authorization checks
CVE-2025-5023 7.1 0.01% 1 0 2025-07-10T13:17:30.017000 Use of Hard-coded Credentials vulnerability in Mitsubishi Electric Corporation p
CVE-2025-46406 5.6 0.01% 1 0 2025-07-10T13:17:30.017000 A Privilege Context Switching Error (CWE-270) in the Command Center Server could
CVE-2025-6948 8.7 0.02% 1 0 2025-07-10T13:17:30.017000 An issue has been discovered in GitLab CE/EE affecting all versions from 17.11 b
CVE-2025-0139 0 0.01% 1 0 2025-07-10T13:17:30.017000 An incorrect privilege assignment vulnerability in Palo Alto Networks Autonomous
CVE-2025-53546 9.1 0.03% 1 0 2025-07-10T13:17:30.017000 Folo organizes feeds content into one timeline. Using pull_request_target on .gi
CVE-2025-3498 9.9 0.05% 1 0 2025-07-10T13:17:30.017000 An unauthenticated user with management network access can get and modify the R
CVE-2024-7650 None 0.05% 1 0 2025-07-10T12:31:19 Improper Control of Generation of Code ('Code Injection') vulnerability in OpenT
CVE-2025-5022 6.5 0.01% 1 0 2025-07-10T09:32:40 Weak Password Requirements vulnerability in Mitsubishi Electric Corporation phot
CVE-2025-6168 2.7 0.01% 1 0 2025-07-10T09:32:40 An issue has been discovered in GitLab EE affecting all versions from 18.0 befor
CVE-2025-4972 2.7 0.01% 1 0 2025-07-10T09:32:40 An issue has been discovered in GitLab EE affecting all versions from 18.0 befor
CVE-2025-3396 4.3 0.01% 1 0 2025-07-10T09:32:39 An issue has been discovered in GitLab EE affecting all versions from 13.3 befor
CVE-2025-44003 4.3 0.02% 1 0 2025-07-10T03:32:17 Missing Release of Resource after Effective Lifetime (CWE-772) in the Gallagher
CVE-2025-35983 6.5 0.03% 1 0 2025-07-10T03:32:13 Improper Certificate Validation (CWE-295) in the Controller 7000 OneLink impleme
CVE-2025-0141 None 0.01% 3 0 2025-07-10T00:32:01 An incorrect privilege assignment vulnerability in the Palo Alto Networks Global
CVE-2025-0140 None 0.01% 1 0 2025-07-10T00:32:01 An incorrect privilege assignment vulnerability in the Palo Alto Networks Global
CVE-2025-53547 8.5 0.01% 7 1 2025-07-09T22:34:05 A Helm contributor discovered that a specially crafted `Chart.yaml` file along w
CVE-2025-52364 7.5 0.06% 1 0 2025-07-09T21:32:18 Insecure Permissions vulnerability in Tenda CP3 Pro Firmware V22.5.4.93 allows t
CVE-2025-32463 9.4 0.33% 2 33 2025-07-09T18:30:41 Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswi
CVE-2025-32462 2.8 0.24% 1 9 2025-07-09T18:30:40 Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that i
CVE-2025-6514 9.7 0.10% 4 1 2025-07-09T18:08:46 mcp-remote is exposed to OS command injection when connecting to untrusted MCP s
CVE-2025-38261 None 0.02% 1 0 2025-07-09T12:31:41 In the Linux kernel, the following vulnerability has been resolved: riscv: save
CVE-2025-3497 8.7 0.05% 1 0 2025-07-09T09:31:17 The Linux distribution underlying the Radiflow iSAP Smart Collector (CentOS 7 -
CVE-2025-3499 10.0 0.32% 1 0 2025-07-09T09:31:17 The device has two web servers that expose unauthenticated REST APIs on the mana
CVE-2025-7345 7.5 0.06% 1 0 2025-07-09T08:15:25.153000 A flaw exists in gdk‑pixbuf within the gdk_pixbuf__jpeg_image_load_increment fun
CVE-2025-49533 9.8 1.28% 1 0 2025-07-09T00:30:45 Adobe Experience Manager (MS) versions 6.5.23.0 and earlier are affected by a De
CVE-2025-6759 None 0.01% 1 1 2025-07-09T00:30:44 Local Privilege escalation allows a low-privileged user to gain SYSTEM privilege
CVE-2025-27203 9.7 1.50% 1 0 2025-07-09T00:30:32 Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Unt
CVE-2025-7192 6.3 0.63% 1 0 2025-07-08T21:30:37 A vulnerability was found in D-Link DIR-645 up to 1.05B01 and classified as crit
CVE-2025-37102 7.2 0.19% 1 0 2025-07-08T21:30:32 An authenticated command injection vulnerability exists in the Command line inte
CVE-2025-49719 7.5 0.23% 1 1 2025-07-08T18:31:51 Improper input validation in SQL Server allows an unauthorized attacker to discl
CVE-2025-48817 8.8 0.04% 1 0 2025-07-08T18:31:50 Relative path traversal in Remote Desktop Client allows an unauthorized attacker
CVE-2025-48799 7.8 0.07% 2 2 2025-07-08T18:31:50 Improper link resolution before file access ('link following') in Windows Update
CVE-2025-47178 8.0 0.35% 1 0 2025-07-08T18:31:50 Improper neutralization of special elements used in an sql command ('sql injecti
CVE-2024-36348 3.8 0.01% 1 0 2025-07-08T18:31:49 A transient execution vulnerability in some AMD processors may allow a user proc
CVE-2024-36349 3.8 0.01% 1 0 2025-07-08T18:31:49 A transient execution vulnerability in some AMD processors may allow a user proc
CVE-2025-49677 7.0 0.04% 1 0 2025-07-08T18:31:47 Use after free in Microsoft Brokering File System allows an authorized attacker
CVE-2025-47988 7.5 0.08% 1 0 2025-07-08T18:31:45 Improper control of generation of code ('code injection') in Azure Monitor Agent
CVE-2024-36350 5.6 0.01% 1 0 2025-07-08T18:31:43 A transient execution vulnerability in some AMD processors may allow an attacker
CVE-2012-5862 None 19.52% 1 0 2025-07-08T18:30:28 login.php on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider
CVE-2025-3648 0 0.04% 6 0 2025-07-08T17:15:34.267000 A vulnerability has been identified in the Now Platform that could result in dat
CVE-2025-42963 9.1 0.04% 1 0 2025-07-08T16:18:14.207000 A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer
CVE-2025-42966 9.1 0.04% 1 0 2025-07-08T16:18:14.207000 SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with a
CVE-2025-20686 9.8 0.02% 1 0 2025-07-08T15:33:05 In wlan AP driver, there is a possible out of bounds write due to an incorrect b
CVE-2025-6770 7.2 0.66% 2 0 2025-07-08T15:32:10 OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.
CVE-2025-36600 8.3 0.01% 1 0 2025-07-08T15:32:10 Dell Client Platform BIOS contains an Improper Access Control Applied to Mirrore
CVE-2025-50130 7.8 0.01% 1 0 2025-07-08T15:32:10 A heap-based buffer overflow vulnerability exists in VS6Sim.exe contained in V-S
CVE-2025-40736 9.8 0.07% 1 0 2025-07-08T12:31:10 A vulnerability has been identified in SINEC NMS (All versions < V4.0). The affe
CVE-2025-42964 9.1 0.05% 1 0 2025-07-08T03:31:08 SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged u
CVE-2025-42980 9.1 0.05% 1 0 2025-07-08T03:31:08 SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a pr
CVE-2025-42959 8.1 0.07% 1 0 2025-07-08T03:31:02 An unauthenticated attacker may exploit a scenario where a Hashed Message Authen
CVE-2025-42953 8.1 0.04% 1 0 2025-07-08T03:31:02 SAP Netweaver System Configuration does not perform necessary authorization chec
CVE-2025-42967 9.1 0.26% 2 0 2025-07-08T03:31:01 SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vul
CVE-2025-6543 9.8 16.12% 2 3 2025-07-01T18:30:34 Memory overflow vulnerability leading to unintended control flow and Denial of S
CVE-2025-6554 8.1 5.30% 1 5 2025-07-01T15:32:11 Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote at
CVE-2025-6191 8.8 0.06% 2 0 2025-06-18T21:30:35 Integer overflow in V8 in Google Chrome prior to 137.0.7151.119 allowed a remote
CVE-2025-6192 8.8 0.11% 2 0 2025-06-18T21:30:30 Use after free in Metrics in Google Chrome prior to 137.0.7151.119 allowed a rem
CVE-2025-33073 8.8 0.31% 1 2 2025-06-10T18:32:36 Improper access control in Windows SMB allows an authorized attacker to elevate
CVE-2025-47934 None 0.01% 2 0 2025-05-19T21:54:44 ### Impact A maliciously modified message can be passed to either `openpgp.verif
CVE-2025-30012 3.9 0.17% 1 0 2025-05-13T03:31:20 The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a de
CVE-2017-9765 8.1 23.64% 1 0 2025-04-20T01:37:25.860000 Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x befor
CVE-2025-32461 9.9 0.11% 1 0 2025-04-09T20:02:41.860000 wikiplugin_includetpl in lib/wiki-plugins/wikiplugin_includetpl.php in Tiki befo
CVE-2025-24269 9.8 0.07% 1 0 2025-04-04T18:23:37.283000 The issue was addressed with improved memory handling. This issue is fixed in ma
CVE-2024-36401 9.8 94.42% 1 20 template 2025-04-03T19:57:04.207000 GeoServer is an open source server that allows users to share and edit geospatia
CVE-2023-2868 9.4 90.10% 2 4 2025-04-02T18:19:23.680000 A remote command injection vulnerability exists in the Barracuda Email Security
CVE-2024-56346 10.0 0.11% 1 0 2025-03-18T18:30:56 IBM AIX 7.2 and 7.3 nimesis NIM master service could allow a remote attacker to
CVE-2024-3596 9.1 0.77% 4 1 2025-03-18T18:30:44 RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local atta
CVE-2023-52927 None 0.03% 1 1 2025-03-14T15:32:10 In the Linux kernel, the following vulnerability has been resolved: netfilter:
CVE-2019-9621 7.5 91.78% 1 1 2024-04-04T00:24:27 Zimbra Collaboration Suite before 8.6 patch 13, 8.7.x before 8.7.11 patch 10, an
CVE-2016-4484 6.8 0.46% 1 0 2023-01-27T05:06:05 The Debian initrd script for the cryptsetup package 2:1.7.3-2 and earlier allows
CVE-2025-25257 0 0.00% 18 3 N/A
CVE-2024-47065 0 0.00% 2 0 N/A
CVE-2025-48384 0 0.02% 17 15 N/A
CVE-2025-53629 0 0.04% 1 0 N/A
CVE-2025-53628 0 0.04% 1 0 N/A
CVE-2025-53542 0 0.02% 1 0 N/A
CVE-2025-48385 0 0.08% 3 0 N/A
CVE-2025-1729 0 0.00% 2 0 N/A
CVE-2025-44963 0 0.00% 1 0 N/A
CVE-2025-6243 0 0.00% 1 0 N/A
CVE-2025-44955 0 0.00% 1 0 N/A
CVE-2025-44962 0 0.00% 1 0 N/A
CVE-2025-44958 0 0.00% 1 0 N/A
CVE-2025-44954 0 0.00% 1 0 N/A
CVE-2025-44961 0 0.00% 1 0 N/A
CVE-2025-44960 0 0.00% 1 0 N/A
CVE-2025-44957 0 0.00% 1 0 N/A
CVE-2025-48386 0 0.01% 1 0 N/A

CVE-2025-6058
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-07-12T05:15:22.387000

1 posts

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

offseq at 2025-07-12T06:01:09.904Z ##

🚨 CRITICAL: WPBookit (≤1.0.4) allows unauthenticated arbitrary file uploads—potential RCE. Affects all sites using this plugin. Disable/uninstall immediately. CVE-2025-6058 | CVSS 9.8 radar.offseq.com/threat/cve-20

##

AAKL at 2025-07-11T18:43:50.280Z ##

Imperva: CVE-2025-5777 Exposes Citrix NetScaler to Dangerous Memory Leak Attacks imperva.com/blog/cve-2025-5777

##

undercodenews@mastodon.social at 2025-07-11T17:47:31.000Z ##

Critical CVE-2025-5777 Vulnerability in Citrix NetScaler ADC: What It Means for Your Security Posture

A New Threat Emerges in Enterprise VPN Infrastructure A newly disclosed security vulnerability, CVE-2025-5777, has sent waves through the cybersecurity landscape, especially among enterprises using Citrix NetScaler ADC and Gateway products. This flaw exposes organizations to serious risks tied to remote access and authentication tools, which are often at the core of…

undercodenews.com/critical-cve

##

GossiTheDog@cyberplace.social at 2025-07-11T17:10:21.000Z ##

If you ask Citrix support for IOCs for CVE-2025-5777 and they send you a script to run that looks for .php files - they’ve sent you an unrelated script, which has nothing to do with session hijacking or memory overread.

##

oversecurity@mastodon.social at 2025-07-11T15:11:17.000Z ##

CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch

The U.S. Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in...

🔗️ [Bleepingcomputer] link.is.it/2FCULx

##

gtronix at 2025-07-11T15:01:10.759Z ##

CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch

[...] Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in Citrix NetScaler ADC and Gateway and is giving federal agencies one day to apply fixes. The U.S.

bleepingcomputer.com/news/secu

##

GossiTheDog@cyberplace.social at 2025-07-11T14:19:20.000Z ##

Updated CitrixBleed2 scan results of vuln/not vuln
github.com/GossiTheDog/scannin

##

AAKL@infosec.exchange at 2025-07-11T18:43:50.000Z ##

Imperva: CVE-2025-5777 Exposes Citrix NetScaler to Dangerous Memory Leak Attacks imperva.com/blog/cve-2025-5777 #cybersecurity #infosec

##

GossiTheDog@cyberplace.social at 2025-07-11T17:10:21.000Z ##

If you ask Citrix support for IOCs for CVE-2025-5777 and they send you a script to run that looks for .php files - they’ve sent you an unrelated script, which has nothing to do with session hijacking or memory overread.

##

oversecurity@mastodon.social at 2025-07-11T15:11:17.000Z ##

CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch

The U.S. Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in...

🔗️ [Bleepingcomputer] link.is.it/2FCULx

##

gtronix@infosec.exchange at 2025-07-11T15:01:10.000Z ##

CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch

[...] Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in Citrix NetScaler ADC and Gateway and is giving federal agencies one day to apply fixes. The U.S.

bleepingcomputer.com/news/secu

#Cybersecurity

##

GossiTheDog@cyberplace.social at 2025-07-11T14:19:20.000Z ##

Updated CitrixBleed2 scan results of vuln/not vuln
github.com/GossiTheDog/scannin

##

jos1264@social.skynetcloud.site at 2025-07-11T12:10:02.000Z ##

CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises – Source:thehackernews.com ciso2ciso.com/cisa-adds-citrix #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #Citrix

##

jos1264@social.skynetcloud.site at 2025-07-11T05:40:02.000Z ##

CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises thehackernews.com/2025/07/cisa

##

jos1264@social.skynetcloud.site at 2025-07-11T05:40:02.000Z ##

CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises thehackernews.com/2025/07/cisa

##

jos1264@social.skynetcloud.site at 2025-07-11T05:40:02.000Z ##

CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises thehackernews.com/2025/07/cisa

##

GossiTheDog@cyberplace.social at 2025-07-10T20:04:42.000Z ##

CVE-2025-5777 aka CitrixBleed 2 has been added to CISA KEV now over evidence of active exploitation.

Citrix are still declining to comment about evidence of exploitation as of writing.

cisa.gov/news-events/alerts/20

##

GossiTheDog@cyberplace.social at 2025-07-10T19:32:00.000Z ##

CISA have modified the CVE-2025-5777 entry to link to my blog 🙌 I’m hoping this gets more visibility as a bunch of us can see from Netflow ongoing threat actor Netscaler sessions to.. sensitive orgs.

##

GossiTheDog@cyberplace.social at 2025-07-10T18:54:21.000Z ##

If you’ve detected exploitation of CitrixBleed 2 aka CVE-2025-5777 I’d be interested to hear - Signal GossiTheDog.1337, obviously I won’t publish details.

I’ve already had one contact, which is an incident with a ransomware group initial access - I’d be interested to help people compare notes on IP addresses and such so there’s a common understanding of level of activity and scale of threat.

##

cisakevtracker@mastodon.social at 2025-07-10T17:00:47.000Z ##

CVE ID: CVE-2025-5777
Vendor: Citrix
Product: NetScaler ADC and Gateway
Date Added: 2025-07-10
Notes: support.citrix.com/support-hom ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

GossiTheDog@cyberplace.social at 2025-07-09T17:27:36.000Z ##

I believe Citrix may have made a mistake in the patching instructions for CitrixBleed2 aka CVE-2025-5777.

They say to do the instructions on the left, but they appear to have missed other session types (e.g. AAA) which have session cookies that can be stolen and replayed with CitrixBleed2. On the right is the CitrixBleed1 instructions.

The net impact is, if you patched but a threat actor already took system memory, they can still reuse prior sessions.

Tell anybody you know at Citrix.

##

jos1264@social.skynetcloud.site at 2025-07-08T15:45:02.000Z ##

Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777) helpnetsecurity.com/2025/07/08 #Horizon3ai #ReliaQuest #Don'tmiss #NetScaler #WatchTowr #Hotstuff #exploit #Citrix #News #PoC

##

GossiTheDog@cyberplace.social at 2025-07-08T13:48:47.000Z ##

More from @greynoise telemetry - they now push CVE-2025-5777 (CitrixBleed 2) exploitation to June 23rd. I can push it back further, blog incoming.

##

oversecurity@mastodon.social at 2025-07-07T23:10:11.000Z ##

Public exploits released for CitrixBleed 2 NetScaler flaw, patch now

Researchers have released proof-of-concept (PoC) exploits for a critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed...

🔗️ [Bleepingcomputer] link.is.it/UNCVV1

##

CVE-2025-30402
(8.1 HIGH)

EPSS: 0.00%

updated 2025-07-11T22:57:08

2 posts

A heap-buffer-overflow vulnerability in the loading of ExecuTorch methods can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 93b1a0c15f7eda49b2bc46b5b4c49557b4e9810f

cR0w at 2025-07-11T19:03:09.870Z ##

A Friday advisory from Facebook? Nice.

facebook.com/security/advisori

Description: A heap-buffer-overflow vulnerability in the loading of ExecuTorch methods can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 93b1a0c15f7eda49b2bc46b5b4c49557b4e9810f

##

cR0w@infosec.exchange at 2025-07-11T19:03:09.000Z ##

A Friday advisory from Facebook? Nice.

facebook.com/security/advisori

Description: A heap-buffer-overflow vulnerability in the loading of ExecuTorch methods can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 93b1a0c15f7eda49b2bc46b5b4c49557b4e9810f

##

CVE-2025-30403
(8.1 HIGH)

EPSS: 0.00%

updated 2025-07-11T20:15:24.100000

2 posts

A heap-buffer-overflow vulnerability is possible in mvfst via a specially crafted message during a QUIC session. This issue affects mvfst versions prior to v2025.07.07.00.

cR0w at 2025-07-11T19:05:04.962Z ##

And another one.

facebook.com/security/advisori

A heap-buffer-overflow vulnerability is possible in mvfst via a specially crafted message during a QUIC session. This issue affects mvfst versions prior to v2025.07.07.00.

##

cR0w@infosec.exchange at 2025-07-11T19:05:04.000Z ##

And another one.

facebook.com/security/advisori

A heap-buffer-overflow vulnerability is possible in mvfst via a specially crafted message during a QUIC session. This issue affects mvfst versions prior to v2025.07.07.00.

##

CVE-2025-7503
(0 None)

EPSS: 0.00%

updated 2025-07-11T19:15:24.217000

1 posts

An OEM IP camera manufactured by Shenzhen Liandian Communication Technology LTD exposes a Telnet service (port 23) with undocumented, default credentials. The Telnet service is enabled by default and is not disclosed or configurable via the device’s web interface or user manual. An attacker with network access can authenticate using default credentials and gain root-level shell access to the devic

offseq at 2025-07-12T00:01:30.232Z ##

⚠️ CVE-2025-7503: V380 IP Camera (v1.0.6.0) has CRITICAL hard-coded Telnet creds, allowing root access! No fix—block port 23, segment cameras, monitor for Telnet. Replace devices ASAP. radar.offseq.com/threat/cve-20

##

CVE-2025-45582
(4.1 MEDIUM)

EPSS: 0.00%

updated 2025-07-11T18:30:35

2 posts

GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's nam

cR0w at 2025-07-11T16:56:37.553Z ##

sev:MED 4.1 - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L

GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of \"Member name contains '..'\" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain \"x -> ../../../../../home/victim/.ssh\" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal.

cve.org/CVERecord?id=CVE-2025-

##

cR0w@infosec.exchange at 2025-07-11T16:56:37.000Z ##

sev:MED 4.1 - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L

GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of \"Member name contains '..'\" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain \"x -> ../../../../../home/victim/.ssh\" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal.

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-6771
(7.2 HIGH)

EPSS: 0.66%

updated 2025-07-11T17:29:00.883000

2 posts

OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.5.0.2,12.4.0.3 and 12.3.0.3 allows a remote authenticated attacker with high privileges to achieve remote code execution

AAKL@infosec.exchange at 2025-07-08T16:18:49.000Z ##

Ivanti July security update and advisories: ivanti.com/blog/july-security-

- July Security Advisory Ivanti Connect Secure and Ivanti Policy Secure (Multiple CVEs) forums.ivanti.com/s/article/Ju

- Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2025-6770, CVE-2025-6771) forums.ivanti.com/s/article/Se

- Security Advisory July 2025 for Ivanti EPM 2024 SU2 and EPM 2022 SU8 forums.ivanti.com/s/article/Se #cybersecurity #infoec #Ivanti

##

cR0w@infosec.exchange at 2025-07-08T15:55:31.000Z ##

Add a post-auth RCE or two to that list.

forums.ivanti.com/s/article/Se

OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.5.0.2 allows a remote authenticated attacker with high privileges to achieve remote code execution

#patchTuesday

##

CVE-2025-7028
(0 None)

EPSS: 0.00%

updated 2025-07-11T16:15:27.143000

1 posts

A vulnerability in the Software SMI handler (SwSmiInputValue 0x20) allows a local attacker to supply a crafted pointer (FuncBlock) through RBX and RCX register values. This pointer is passed unchecked into multiple flash management functions (ReadFlash, WriteFlash, EraseFlash, and GetFlashInfo) that dereference both the structure and its nested members, such as BufAddr. This enables arbitrary read

offseq at 2025-07-12T01:31:11.315Z ##

🛑 CRITICAL: CVE-2025-7028 in GIGABYTE UEFI-SmiFlash v1.0.0 enables local attackers to corrupt/exfiltrate SMRAM or install persistent implants. No patch yet—restrict admin access & enforce Secure Boot! radar.offseq.com/threat/cve-20

##

CVE-2025-7027
(0 None)

EPSS: 0.00%

updated 2025-07-11T16:15:27.053000

1 posts

A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control both the read and write addresses used by the CommandRcx1 function. The write target is derived from an unvalidated UEFI NVRAM variable (SetupXtuBufferAddress), while the write content is read from an attacker-controlled pointer based on the RBX register. This dual-pointer dereference enables arbi

offseq at 2025-07-12T03:01:13.446Z ##

🚨 CVE-2025-7027: CRITICAL flaw in GIGABYTE UEFI-GenericComponentSmmEntry v1.0.0 allows local attackers to write arbitrary data in SMRAM for SMM-level escalation. No patch yet—restrict access, monitor, and check for updates! radar.offseq.com/threat/cve-20

##

CVE-2025-51591
(6.5 MEDIUM)

EPSS: 0.00%

updated 2025-07-11T15:31:37

1 posts

A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe.

cR0w@infosec.exchange at 2025-07-11T13:45:25.000Z ##

SSRF in JGM Pandoc.

github.com/jgm/pandoc/issues/1

A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe.

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-52950
(9.6 CRITICAL)

EPSS: 0.00%

updated 2025-07-11T15:15:25.570000

5 posts

A Missing Authorization vulnerability in Juniper Networks Security Director allows an unauthenticated network-based attacker to read or tamper with multiple sensitive resources via the web interface. Numerous endpoints on the Juniper Security Director appliance do not validate authorization and will deliver information to the caller that is outside their authorization level. An attacker can acces

offseq at 2025-07-12T04:31:23.842Z ##

🚨 CVE-2025-52950 (CRITICAL, CVSS 9.6): Juniper Security Director 24.4.1 has a missing authorization flaw letting unauthenticated attackers read/tamper with sensitive resources via the web UI. Patch ASAP, restrict access, and monitor logs! radar.offseq.com/threat/cve-20

##

beyondmachines1 at 2025-07-11T16:01:29.238Z ##

Authorization bypass flaw in Juniper Security Director enables access to sensitive resources

Juniper Networks patched a critical vulnerability (CVE-2025-52950) in its Security Director network management platform that allows unauthenticated attackers to access sensitive resources and potentially compromise downstream managed devices including firewalls, switches, and routers due to missing authorization controls.

**If you have Juniper Security Director network management platforms, make sure to isolate the web interface from the internet and make it available only through trusted networks. Then plan an update to Software Bundle Update 24.4.1-1703 or later. Not a panic mode if you have isolated the web interface, but still a lot of endpoints are problematic so better to patch.**

beyondmachines.net/event_detai

##

cR0w at 2025-07-11T14:52:04.502Z ##

Juniper has published a bunch of security advisories since Wednesday:

supportportal.juniper.net/s/gl

These two are the only ones they rated as sev:CRIT but I haven't had time to actually read through any of them yet:

supportportal.juniper.net/s/ar

supportportal.juniper.net/s/ar

##

beyondmachines1@infosec.exchange at 2025-07-11T16:01:29.000Z ##

Authorization bypass flaw in Juniper Security Director enables access to sensitive resources

Juniper Networks patched a critical vulnerability (CVE-2025-52950) in its Security Director network management platform that allows unauthenticated attackers to access sensitive resources and potentially compromise downstream managed devices including firewalls, switches, and routers due to missing authorization controls.

**If you have Juniper Security Director network management platforms, make sure to isolate the web interface from the internet and make it available only through trusted networks. Then plan an update to Software Bundle Update 24.4.1-1703 or later. Not a panic mode if you have isolated the web interface, but still a lot of endpoints are problematic so better to patch.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2025-07-11T14:52:04.000Z ##

Juniper has published a bunch of security advisories since Wednesday:

supportportal.juniper.net/s/gl

These two are the only ones they rated as sev:CRIT but I haven't had time to actually read through any of them yet:

supportportal.juniper.net/s/ar

supportportal.juniper.net/s/ar

##

CVE-2025-30025(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-07-11T06:30:36

1 posts

The communication protocol used between the server process and the service control had a flaw that could lead to a local privilege escalation.

cR0w@infosec.exchange at 2025-07-11T12:36:47.000Z ##

Axis published some interesting advisories.

Here's a sev:CRIT post-auth RCE:

axis.com/dam/public/9b/a5/72/c

and an LPE:

axis.com/dam/public/40/0e/03/c

But since those are post-auth, you first need access, right? Well you're in luck because here's an auth bypass:

axis.com/dam/public/a3/42/92/c

And an AitM attack that the description is vague on:

axis.com/dam/public/01/d9/24/c

No PoCs here but they were reported by Team82 so maybe there will be a write-up soon.

##

CVE-2025-30024
(6.8 MEDIUM)

EPSS: 0.03%

updated 2025-07-11T06:30:36

1 posts

The communication protocol used between client and server had a flaw that could be leveraged to execute a man in the middle attack.

cR0w@infosec.exchange at 2025-07-11T12:36:47.000Z ##

Axis published some interesting advisories.

Here's a sev:CRIT post-auth RCE:

axis.com/dam/public/9b/a5/72/c

and an LPE:

axis.com/dam/public/40/0e/03/c

But since those are post-auth, you first need access, right? Well you're in luck because here's an auth bypass:

axis.com/dam/public/a3/42/92/c

And an AitM attack that the description is vague on:

axis.com/dam/public/01/d9/24/c

No PoCs here but they were reported by Team82 so maybe there will be a write-up soon.

##

CVE-2025-30023
(9.1 CRITICAL)

EPSS: 0.66%

updated 2025-07-11T06:30:36

1 posts

The communication protocol used between client and server had a flaw that could lead to an authenticated user performing a remote code execution attack.

cR0w@infosec.exchange at 2025-07-11T12:36:47.000Z ##

Axis published some interesting advisories.

Here's a sev:CRIT post-auth RCE:

axis.com/dam/public/9b/a5/72/c

and an LPE:

axis.com/dam/public/40/0e/03/c

But since those are post-auth, you first need access, right? Well you're in luck because here's an auth bypass:

axis.com/dam/public/a3/42/92/c

And an AitM attack that the description is vague on:

axis.com/dam/public/01/d9/24/c

No PoCs here but they were reported by Team82 so maybe there will be a write-up soon.

##

CVE-2025-30026(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-07-11T06:30:36

1 posts

The AXIS Camera Station Server had a flaw that allowed to bypass authentication that is normally required.

cR0w@infosec.exchange at 2025-07-11T12:36:47.000Z ##

Axis published some interesting advisories.

Here's a sev:CRIT post-auth RCE:

axis.com/dam/public/9b/a5/72/c

and an LPE:

axis.com/dam/public/40/0e/03/c

But since those are post-auth, you first need access, right? Well you're in luck because here's an auth bypass:

axis.com/dam/public/a3/42/92/c

And an AitM attack that the description is vague on:

axis.com/dam/public/01/d9/24/c

No PoCs here but they were reported by Team82 so maybe there will be a write-up soon.

##

CVE-2025-52579
(9.4 CRITICAL)

EPSS: 0.03%

updated 2025-07-11T00:15:26.597000

1 posts

Emerson ValveLink Products store sensitive information in cleartext in memory. The sensitive memory might be saved to disk, stored in a core dump, or remain uncleared if the product crashes, or if the programmer does not properly clear the memory before freeing it.

beyondmachines1@infosec.exchange at 2025-07-09T18:01:28.000Z ##

CISA reports multiple vulnerabilities in Emerson ValveLink products, at least one critical

CISA reported multiple vulnerabilities in Emerson's ValveLink product line affecting critical manufacturing systems, including a critical flaw (CVE-2025-52579) that stores sensitive information in cleartext memory, potentially allowing attackers to read sensitive data, tamper with system parameters, and execute unauthorized code.

**If you have Emerson ValveLink products (SOLO, DTM, PRM, or SNAP-ON), make sure it's isolated from the internet and accessible only from trusted networks. Then check your version and plan an upgrade to ValveLink 14.0. The issues may not be immediately exploitable, but given enough time it will be exploited. Plan a regular patch.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-34102(CVSS UNKNOWN)

EPSS: 0.69%

updated 2025-07-10T21:32:00

2 posts

A remote code execution vulnerability exists in CryptoLog (PHP version, discontinued since 2009) due to a chained exploitation of SQL injection and command injection vulnerabilities. An unauthenticated attacker can gain shell access as the web server user by first exploiting a SQL injection flaw in login.php to bypass authentication, followed by command injection in logshares_ajax.php to execute a

Tylae@phpc.social at 2025-07-11T06:18:01.000Z ##

@offseq

Worth noting this: PHP version, discontinued since 2009.

Copied/pasted from nvd.nist.gov/vuln/detail/CVE-2

##

offseq@infosec.exchange at 2025-07-11T04:31:18.000Z ##

🚨 CVE-2025-34102: CRITICAL RCE in discontinued CryptoLog PHP! Unauthenticated attackers can chain SQLi (login.php) ➡️ command injection (logshares_ajax.php) for shell access. No patch—migrate or isolate now. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RCE #PHP #Infosec

##

CVE-2025-53709
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-07-10T21:31:59

2 posts

Secure-upload is a data submission service that validates single-use tokens when accepting submissions to channels. The service only installed on a small number of environments. Under specific circumstances, privileged users of secure-upload could have selected email templates not necessarily created for their enrollment when sending data upload requests. Authenticated and privileged users of one

cR0w@infosec.exchange at 2025-07-10T18:50:16.000Z ##

@Cali Probably not on the site yet.

github.com/CVEProject/cvelistV

##

cR0w@infosec.exchange at 2025-07-10T18:48:09.000Z ##

I don't see Palantir CVEs often but when I do, they definitely catch my eye.

Secure-upload is a data submission service that validates single-use tokens when accepting submissions to channels. The service only installed on a small number of environments. Under specific circumstances, privileged users of secure-upload could have selected email templates not necessarily created for their enrollment when sending data upload requests. Authenticated and privileged users of one enrollment could have abused an endpoint to redirect existing submission channels to a dataset they control. An endpoint handling domain validation allowed unauthenticated users to enumerate existing enrollments. Finally, other endpoints allowed enumerating if a resource with a known RID exists across enrollments. The affected service has been patched with version 0.815.0 and automatically deployed to all Apollo-managed Foundry instances.

An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sensitive functionality should always be protected with access controls. However configuring all but the most trivial access control systems can be very complicated and there are many opportunities for mistakes. If an attacker can learn of incorrectly configured access security settings, they may be able to exploit this in an attack.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-7365
(5.4 MEDIUM)

EPSS: 0.01%

updated 2025-07-10T21:12:15

1 posts

A flaw was found in Keycloak. When an authenticated attacker attempts to merge accounts with another existing account during an identity provider (IdP) login, the attacker will subsequently be prompted to "review profile" information. This vulnerability allows the attacker to modify their email address to match that of a victim's account, triggering a verification email sent to the victim's email

cR0w@infosec.exchange at 2025-07-10T14:35:47.000Z ##

That's an interesting workflow.

access.redhat.com/security/cve

A flaw was found in Keycloak. When an authenticated attacker attempts to merge accounts with another existing account during an identity provider (IdP) login, the attacker will subsequently be prompted to "review profile" information. This vulnerability allows the attacker to modify their email address to match that of a victim's account, triggering a verification email sent to the victim's email address. The attacker's email address is not present in the verification email content, making it a potential phishing opportunity. If the victim clicks the verification link, the attacker can gain access to the victim's account.

##

CVE-2024-42516(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-07-10T18:31:34

1 posts

HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue. Users are recommended to upgrade to version 2.4.64, which fix

CVE-2025-23048(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-07-10T18:31:34

1 posts

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a

CVE-2025-49812(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-07-10T18:31:34

1 posts

In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.

CVE-2024-47252(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-07-10T18:31:34

1 posts

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod

CVE-2025-47813
(4.3 MEDIUM)

EPSS: 0.63%

updated 2025-07-10T18:31:34

1 posts

loginok.html in Wing FTP Server before 7.4.4 discloses the full local installation path of the application when using a long value in the UID cookie.

Nuclei template

CVE-2025-47812
(10.0 CRITICAL)

EPSS: 57.30%

updated 2025-07-10T18:31:28

13 posts

In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also explo

Nuclei template

5 repos

https://github.com/0xcan1337/CVE-2025-47812-poC

https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeed

https://github.com/pevinkumar10/CVE-2025-47812

https://github.com/4m3rr0r/CVE-2025-47812-poc

https://github.com/0xgh057r3c0n/CVE-2025-47812

threatcodex at 2025-07-11T18:58:53.357Z ##

What the NULL?! Wing FTP Server RCE (CVE-2025-47812)

rcesecurity.com/2025/06/what-t

##

undercodenews@mastodon.social at 2025-07-11T17:46:57.000Z ##

Critical RCE Exploit in Wing FTP Server (CVE-2025-47812) Actively Targeted Within 24 Hours of Disclosure

A Fast-Moving Threat Demands Swift Action A newly disclosed zero-day vulnerability in the widely used Wing FTP Server has already been weaponized by threat actors within hours of its announcement. Identified as CVE-2025-47812, this remote code execution (RCE) flaw exposes countless enterprise systems to full compromise, allowing attackers to gain root or…

undercodenews.com/critical-rce

##

jos1264@social.skynetcloud.site at 2025-07-12T00:05:02.000Z ##

Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild – Source:thehackernews.com ciso2ciso.com/critical-wing-ft #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #Critical

##

linux@activitypub.awakari.com at 2025-07-11T12:29:13.000Z ## Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812) Threat actors are actively exploiting a recently fixed remote code execution vulnerability (CVE-2025-47812) in Wing FTP...

#Don't #miss #Hot #stuff #News #Censys #exploit #file-sharing #Huntress #MSP #PoC

Origin | Interest | Match ##

jos1264@social.skynetcloud.site at 2025-07-11T13:05:02.000Z ##

Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812) helpnetsecurity.com/2025/07/11 #vulnerability #WingFTPServer #filesharing #RCESecurity #Don'tmiss #Hotstuff #Huntress #exploit #Censys #News #SMBs #MSP #PoC

##

jos1264@social.skynetcloud.site at 2025-07-11T12:10:03.000Z ##

Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild thehackernews.com/2025/07/crit

##

jos1264@social.skynetcloud.site at 2025-07-11T12:10:02.000Z ##

Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild thehackernews.com/2025/07/crit

##

VirusBulletin@infosec.exchange at 2025-07-11T08:45:39.000Z ##

Huntress's John Hammond, Jamie Levy, Lindsey O'Donnell-Welch & Michael Tigges observed exploitation of a remote code execution Wing FTP Server bug (CVE-2025-47812). Organizations running Wing FTP Server should update to the fixed version. huntress.com/blog/wing-ftp-ser

##

campuscodi@mastodon.social at 2025-07-10T18:55:41.000Z ##

Threat actors started exploiting a vulnerability in Wing FTP servers a day after disclosure

The vulnerability (CVE-2025-47812) allows attackers to bypass authentication on the FTP server's web interface by appending a null byte to the username.

huntress.com/blog/wing-ftp-ser

##

cR0w@infosec.exchange at 2025-07-10T16:53:39.000Z ##

And more info ( PoCs ) on this one and its relatives. Might be of interest to @Dio9sys and @da_667

github.com/MrTuxracer/advisori

github.com/MrTuxracer/advisori

github.com/MrTuxracer/advisori

#threatIntel

##

cR0w@infosec.exchange at 2025-07-10T16:42:26.000Z ##

Per Huntress, CVE-2025-47812 is EITW.

huntress.com/blog/wing-ftp-ser

TL;DR: Huntress saw active exploitation of Wing FTP Server remote code execution (CVE-2025-47812) on a customer on July 1, 2025. Organizations running Wing FTP Server should update to the fixed version, version 7.4.4, as soon as possible.

CVE-2025-47812 is a null byte and Lua injection flaw that can lead to root/SYSTEM-level remote code execution if exploited. The vulnerability was first publicly disclosed on June 30 by Julien Ahrens in versions prior to 7.4.4 of the Wing FTP Server, its file transfer protocol software for Windows, Linux, and macOS.

Edit to add more info:

rcesecurity.com/2025/06/what-t

sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H 🥳

In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.

nvd.nist.gov/vuln/detail/CVE-2

#threatIntel

##

AAKL@infosec.exchange at 2025-07-10T16:26:32.000Z ##

Huntress: Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild huntress.com/blog/wing-ftp-ser @huntress #cybersecurity #infosec

##

_r_netsec@infosec.exchange at 2025-07-08T04:13:06.000Z ##

What the NULL?! Wing FTP Server RCE (CVE-2025-47812) rcesecurity.com/2025/06/what-t

##

CVE-2025-49630(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-07-10T18:31:28

1 posts

In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".

CVE-2024-43394(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-07-10T18:31:27

1 posts

Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via  mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note:  The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC p

CVE-2025-53371
(9.1 CRITICAL)

EPSS: 0.03%

updated 2025-07-10T18:15:24.280000

1 posts

DiscordNotifications is an extension for MediaWiki that sends notifications of actions in your Wiki to a Discord channel. DiscordNotifications allows sending requests via curl and file_get_contents to arbitrary URLs set via $wgDiscordIncomingWebhookUrl and $wgDiscordAdditionalIncomingWebhookUrls. This allows for DOS by causing the server to read large files. SSRF is also possible if there are inte

cR0w@infosec.exchange at 2025-07-10T17:35:09.000Z ##

Go hack Discord shit.

github.com/miraheze/DiscordNot

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H

DiscordNotifications is an extension for MediaWiki that sends notifications of actions in your Wiki to a Discord channel. DiscordNotifications allows sending requests via curl and file_get_contents to arbitrary URLs set via $wgDiscordIncomingWebhookUrl and $wgDiscordAdditionalIncomingWebhookUrls. This allows for DOS by causing the server to read large files. SSRF is also possible if there are internal unprotected APIs that can be accessed using HTTP POST requests, which could also possibly lead to RCE. This vulnerability is fixed in commit 1f20d850cbcce5b15951c7c6127b87b927a5415e.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-53020
(0 None)

EPSS: 0.02%

updated 2025-07-10T17:15:48.337000

1 posts

Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63. Users are recommended to upgrade to version 2.4.64, which fixes the issue.

CVE-2025-47811
(4.1 MEDIUM)

EPSS: 0.02%

updated 2025-07-10T17:15:46.933000

1 posts

In Wing FTP Server through 7.4.4, the administrative web interface (listening by default on port 5466) runs as root or SYSTEM by default. The web application itself offers several legitimate ways to execute arbitrary system commands (i.e., through the web console or the task scheduler), and they are automatically executed in the highest possible privilege context. Because administrative users of t

CVE-2024-43204
(0 None)

EPSS: 0.02%

updated 2025-07-10T17:15:45.987000

1 posts

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVE-2025-44251(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-07-10T15:31:41

1 posts

Ecovacs Deebot T10 1.7.2 transmits Wi-Fi credentials in cleartext during the pairing process.

cR0w@infosec.exchange at 2025-07-10T15:00:11.000Z ##

Ecovacs Whoopsie.

httpscolonforwardslashforwards

During the pairing process, the Ecovacs Deebot T10 creates an open Wi-Fi network, and the mobile app instructs the user to connect to this open, unencrypted Wi-Fi network. Once connected, the mobile app sends the user’s home Wi-Fi network password to the Ecovacs Deebot T10 through cleartext HTTP protocol over the cleartext open Wi-Fi network using the endpoint /rcp.do via POST request.

##

CVE-2025-38246(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-07-10T15:31:21

1 posts

In the Linux kernel, the following vulnerability has been resolved: bnxt: properly flush XDP redirect lists We encountered following crash when testing a XDP_REDIRECT feature in production: [56251.579676] list_add corruption. next->prev should be prev (ffff93120dd40f30), but was ffffb301ef3a6740. (next=ffff93120dd 40f30). [56251.601413] ------------[ cut here ]------------ [56251.611357] kernel

linux@activitypub.awakari.com at 2025-07-09T10:51:49.000Z ## You can now share your thoughts on vulnerability CVE-2025-38246 in Vulnerability-Lookup: https://vulnerability.circl.lu/vuln/CVE-2025-38246 Linux - Linux #VulnerabilityLookup #Vulnerability #Cybers...


Origin | Interest | Match ##

CVE-2025-47981
(9.8 CRITICAL)

EPSS: 0.17%

updated 2025-07-10T13:19:18.800000

6 posts

Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unauthorized attacker to execute code over a network.

authentic8@mastodon.social at 2025-07-11T23:48:08.000Z ##

The weekly Cyber Intel Brief by AJ Nash is out! ⚠️

A suspected North American APT, NightEagle, targets Chinese tech sectors. Meanwhile, AI-powered impersonation attacks hit high-profile U.S. figures like Secretary of State Marco Rubio.

🔧 Microsoft patches 137 vulnerabilities including a wormable SPNEGO flaw (CVE-2025-47981).
🛡️ CISA adds 6 more to the KEV catalog—compliance due July 28–31.

Dive into the full brief ⬇️
bit.ly/4lKU9M9

##

authentic8@mastodon.social at 2025-07-11T23:48:08.000Z ##

The weekly Cyber Intel Brief by AJ Nash is out! ⚠️

A suspected North American APT, NightEagle, targets Chinese tech sectors. Meanwhile, AI-powered impersonation attacks hit high-profile U.S. figures like Secretary of State Marco Rubio.

🔧 Microsoft patches 137 vulnerabilities including a wormable SPNEGO flaw (CVE-2025-47981).
🛡️ CISA adds 6 more to the KEV catalog—compliance due July 28–31.

Dive into the full brief ⬇️
bit.ly/4lKU9M9

##

mav@masto.hackers.town at 2025-07-09T13:43:01.000Z ##

Bad enough Microsoft patched their old shit, update your servers folks.

msrc.microsoft.com/update-guid

##

jos1264@social.skynetcloud.site at 2025-07-09T12:20:02.000Z ##

Microsoft fixes critical wormable Windows flaw (CVE-2025-47981) helpnetsecurity.com/2025/07/09 #MicrosoftEdge #WindowsServer #PatchTuesday #SharePoint #TrendMicro #Don'tmiss #Hotstuff #MSOffice #Tenable #Windows #Ivanti #Qualys #News

##

beyondmachines1@infosec.exchange at 2025-07-09T08:01:29.000Z ##

Microsoft releases July 2025 Patch fixing one critical zero-day, 129 other flaws

Microsoft's July 2025 Patch Tuesday addressed 130 vulnerabilities including one publicly disclosed zero-day in SQL Server (CVE-2025-49719) and 14 critical-severity flaws. One critical flaw (CVE-2025-47981) marked as "More Likely" to be exploited within 30 days.

**This month prioritize patching of Microsoft Office, SQL Server, SharePoint, and Windows domain controllers. Those are impacted by the critical issues. Don't forget to update your Windows PCs/Laptops, since we all use them on the internet and this list of flaws will be abused by hackers.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2025-07-08T17:20:30.000Z ##

SPNEGO RCE again.

msrc.microsoft.com/update-guid

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

##

CVE-2024-36357
(5.6 MEDIUM)

EPSS: 0.01%

updated 2025-07-10T13:19:18.800000

1 posts

A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.

AAKL@infosec.exchange at 2025-07-09T16:57:40.000Z ##

Posted yesterday: AMD Transient Scheduler Attacks, relating to CVE-2024-36350, CVE-2024-36357, CVE-2024-36348, and CVE-2024-36349 amd.com/en/resources/product-s #AMD #cybersecurity #infosec

##

CVE-2025-48804
(6.8 MEDIUM)

EPSS: 0.03%

updated 2025-07-10T13:19:18.800000

1 posts

Acceptance of extraneous untrusted data with trusted data in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

cR0w@infosec.exchange at 2025-07-08T17:57:05.000Z ##

msrc.microsoft.com/update-guid

Acceptance of extraneous untrusted data with trusted data in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

Huh, I wonder what they mean by a feature.

A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.

Oh, so like the main feature of BitLocker. Got it.

An attacker could exploit this vulnerability by loading a WinRE.wim file while the OS volume is unlocked, granting access to BitLocker encrypted data.

😶

##

CVE-2025-37103
(9.8 CRITICAL)

EPSS: 0.20%

updated 2025-07-10T13:18:53.830000

1 posts

Hard-coded login credentials were found in HPE Networking Instant On Access Points, allowing anyone with knowledge of it to bypass normal device authentication. Successful exploitation could allow a remote attacker to gain administrative access to the system.

cR0w@infosec.exchange at 2025-07-08T19:23:06.000Z ##

Oh hello, this one is even better. Hardcoded creds FTW. HPE really does copy Cisco, don't they?

support.hpe.com/hpesc/public/d

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Hard-coded login credentials were found in HPE Networking Instant On Access Points, allowing anyone with knowledge of it to bypass normal device authentication. Successful exploitation could allow a remote attacker to gain administrative access to the system.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-53513
(8.8 HIGH)

EPSS: 0.05%

updated 2025-07-10T13:18:53.830000

1 posts

The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.

cR0w@infosec.exchange at 2025-07-08T17:16:00.000Z ##

ZipSlip in Juju. That counts as a ../

github.com/juju/juju/security/

sev:HIGH 8.8 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Any user with a Juju account on a controller can upload a charm to the /charms endpoint.
No specific permissions are required - it's just sufficient for the user to exist in the controller user database.
A charm which exploits the zip slip vulnerability may be used to allow such a user to get access to a machine running a unit using the affected charm.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-5023
(7.1 HIGH)

EPSS: 0.01%

updated 2025-07-10T13:17:30.017000

1 posts

Use of Hard-coded Credentials vulnerability in Mitsubishi Electric Corporation photovoltaic system monitor “EcoGuideTAB” PV-DR004J all versions and PV-DR004JA all versions allows an attacker within the Wi-Fi communication range between the units of the product (measurement unit and display unit) to disclose information such as generated power and electricity sold back to the grid stored in the pro

cR0w@infosec.exchange at 2025-07-10T12:16:41.000Z ##

Mitsubishi Electric getting in on the hardcoded creds game. Also in the advisory is a weak password requirements vuln but that's to be expected in OT stuff.

mitsubishielectric.com/psirt/v

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-46406
(5.6 MEDIUM)

EPSS: 0.01%

updated 2025-07-10T13:17:30.017000

1 posts

A Privilege Context Switching Error (CWE-270) in the Command Center Server could allow a privileged Operator with high level access in one Division to perform limited privileged activities across the Division boundary. This issue affects Command Centre Server: 9.30 prior to 9.30.1874 (MR1), 9.20 prior to 9.20.2337 (MR3), 9.10 prior to 9.10.3194 (MR6), 9.00 prior to 9.00.3371 (MR7), all versions

CVE-2025-6948
(8.7 HIGH)

EPSS: 0.02%

updated 2025-07-10T13:17:30.017000

1 posts

An issue has been discovered in GitLab CE/EE affecting all versions from 17.11 before 17.11.6, 18.0 before 18.0.4, and 18.1 before 18.1.2 that, under certain conditions, could have allowed a successful attacker to execute actions on behalf of users by injecting malicious content.

CVE-2025-0139
(0 None)

EPSS: 0.01%

updated 2025-07-10T13:17:30.017000

1 posts

An incorrect privilege assignment vulnerability in Palo Alto Networks Autonomous Digital Experience Manager allows a locally authenticated low privileged user on macOS endpoints to escalate their privileges to root.

AAKL@infosec.exchange at 2025-07-09T17:44:03.000Z ##

New.

Palo Alto just listed several security advisories: Main portal: security.paloaltonetworks.com/

- CVE-2025-0139 Autonomous Digital Experience Manager: Privilege Escalation (PE) Vulnerability security.paloaltonetworks.com/

- CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App security.paloaltonetworks.com/

- CVE-2025-0141 GlobalProtect App: Privilege Escalation (PE) Vulnerability security.paloaltonetworks.com/

Update bulletin: security.paloaltonetworks.com/ #cybersecurity #infosec #PaloAlto

##

CVE-2025-53546
(9.1 CRITICAL)

EPSS: 0.03%

updated 2025-07-10T13:17:30.017000

1 posts

Folo organizes feeds content into one timeline. Using pull_request_target on .github/workflows/auto-fix-lint-format-commit.yml can be exploited by attackers, since untrusted code can be executed having full access to secrets (from the base repo). By exploiting the vulnerability is possible to exfiltrate GITHUB_TOKEN which has high privileges. GITHUB_TOKEN can be used to completely overtake the rep

cR0w@infosec.exchange at 2025-07-09T14:42:51.000Z ##

Heads-up, RSS nerds.

github.com/RSSNext/Folo/securi

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Folo organizes feeds content into one timeline. Using pull_request_target on .github/workflows/auto-fix-lint-format-commit.yml can be exploited by attackers, since untrusted code can be executed having full access to secrets (from the base repo). By exploiting the vulnerability is possible to exfiltrate GITHUB_TOKEN which has high privileges. GITHUB_TOKEN can be used to completely overtake the repo since the token has content write privileges. This vulnerability is fixed in commit 585c6a591440cd39f92374230ac5d65d7dd23d6a.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-3498
(9.9 CRITICAL)

EPSS: 0.05%

updated 2025-07-10T13:17:30.017000

1 posts

An unauthenticated user with management network access can get and modify the Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20) configuration. The device has two web servers that expose unauthenticated REST APIs on the management network (TCP ports 8084 and 8086). An attacker can use these APIs to get access to all system settings, modify the configuration and execute some commands (e.g., sys

cR0w@infosec.exchange at 2025-07-09T12:47:28.000Z ##

Perfect 10 and another good effort in Radiflow iSAP Smart Collector with its EoL OS. Good thing these are only used in airgapped zero trust something something networks.

cvcn.gov.it/cvcn/cve/CVE-2025-

sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

The device has two web servers that expose unauthenticated REST APIs on the management network (TCP
ports 8084 and 8086). Exploiting OS command injection through these APIs, an attacker can send arbitrary
commands that are executed with administrative permissions by the underlying operating system.

nvd.nist.gov/vuln/detail/CVE-2

cvcn.gov.it/cvcn/cve/CVE-2025-

sev:CRIT 9.9 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L

An unauthenticated user with management network access can get and
modify the Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20)
configuration. The device has two web servers that expose unauthenticated REST APIs on the management network (TCP
ports 8084 and 8086). An attacker can use these APIs to get access to all system settings, modify the configuration
and execute some commands (e.g., system reboot).

nvd.nist.gov/vuln/detail/CVE-2

cvcn.gov.it/cvcn/cve/CVE-2025-

sev:HIGH 8.7 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H

The Linux distribution underlying the Radiflow iSAP Smart Collector
(CentOS 7 - VSAP 1.20) is obsolete and
reached end of life (EOL) on
June 30, 2024. Thus, any
unmitigated vulnerability could be exploited to affect this product.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2024-7650(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-07-10T12:31:19

1 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in OpenText™ Directory Services allows Remote Code Inclusion. The vulnerability could allow access to the system via script injection.This issue affects Directory Services: 23.4.

cR0w@infosec.exchange at 2025-07-10T11:48:21.000Z ##

Code execution in OpenText Directory Services.

sev:MED 6.3 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/S:N/AU:Y/R:A/V:D/RE:L/U:Clear

Improper Control of Generation of Code ('Code Injection') vulnerability in OpenText™ Directory Services allows Remote Code Inclusion. The vulnerability could allow access to the system via script injection.This issue affects Directory Services: 23.4.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-5022
(6.5 MEDIUM)

EPSS: 0.01%

updated 2025-07-10T09:32:40

1 posts

Weak Password Requirements vulnerability in Mitsubishi Electric Corporation photovoltaic system monitor “EcoGuideTAB” PV-DR004J all versions and PV-DR004JA all versions allows an attacker within the Wi-Fi communication range between the units of the product (measurement unit and display unit) to derive the password from the SSID. However, the product is not affected by this vulnerability when it r

cR0w@infosec.exchange at 2025-07-10T12:16:41.000Z ##

Mitsubishi Electric getting in on the hardcoded creds game. Also in the advisory is a weak password requirements vuln but that's to be expected in OT stuff.

mitsubishielectric.com/psirt/v

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-6168
(2.7 LOW)

EPSS: 0.01%

updated 2025-07-10T09:32:40

1 posts

An issue has been discovered in GitLab EE affecting all versions from 18.0 before 18.0.4 and 18.1 before 18.1.2 that could have allowed authenticated maintainers to bypass group-level user invitation restrictions by sending crafted API requests.

CVE-2025-4972
(2.7 LOW)

EPSS: 0.01%

updated 2025-07-10T09:32:40

1 posts

An issue has been discovered in GitLab EE affecting all versions from 18.0 before 18.0.4 and 18.1 before 18.1.2 that could have allowed authenticated users with invitation privileges to bypass group-level user invitation restrictions by manipulating group invitation functionality.

CVE-2025-3396
(4.3 MEDIUM)

EPSS: 0.01%

updated 2025-07-10T09:32:39

1 posts

An issue has been discovered in GitLab EE affecting all versions from 13.3 before 17.11.6, 18.0 before 18.0.4, and 18.1 before 18.1.2 that could have allowed authenticated project owners to bypass group-level forking restrictions by manipulating API requests.

CVE-2025-44003
(4.3 MEDIUM)

EPSS: 0.02%

updated 2025-07-10T03:32:17

1 posts

Missing Release of Resource after Effective Lifetime (CWE-772) in the Gallagher T-Series Reader allows an attacker with physical access to the reader to perform a limited denial of service when 125 kHz Card Technology is enabled. This issue affects T-Series Readers: 9.20 prior to vCR9.20.250213a (distributed in 9.20.1827 (MR2)), 9.10 prior to vCR9.10.250213a (distributed in 9.10.2692(MR5)), 9.00

CVE-2025-35983
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-07-10T03:32:13

1 posts

Improper Certificate Validation (CWE-295) in the Controller 7000 OneLink implementation could allow an unprivileged attacker to perform a limited denial of service or perform privileged overrides during the initial configuration of the Controller, there is no risk for Controllers once they are connected. This issue affects Controller 7000: 9.30 prior to vCR9.30.250624a (distributed in 9.30.187

CVE-2025-0141(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-07-10T00:32:01

3 posts

An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on enables a locally authenticated non administrative user to escalate their privileges to root on macOS and Linux or NT\AUTHORITY SYSTEM on Windows. The GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.

mttaggart@infosec.exchange at 2025-07-09T17:50:30.000Z ##

@cR0w As I wrote elsewhere, the CVSS for CVE-2025-0141 makes no sense to me. Why is initial system Confidentiality impact Low?

##

AAKL@infosec.exchange at 2025-07-09T17:44:03.000Z ##

New.

Palo Alto just listed several security advisories: Main portal: security.paloaltonetworks.com/

- CVE-2025-0139 Autonomous Digital Experience Manager: Privilege Escalation (PE) Vulnerability security.paloaltonetworks.com/

- CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App security.paloaltonetworks.com/

- CVE-2025-0141 GlobalProtect App: Privilege Escalation (PE) Vulnerability security.paloaltonetworks.com/

Update bulletin: security.paloaltonetworks.com/ #cybersecurity #infosec #PaloAlto

##

mttaggart@infosec.exchange at 2025-07-09T16:23:09.000Z ##

I think we can quibble with the CVSS score on this one (I think it's higher), but hey: a local cross-platform privesc in Global Protect. The wording is confusing, but impacted apps suggests it's a problem on Windows/Mac/Linux.

security.paloaltonetworks.com/

##

CVE-2025-0140(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-07-10T00:32:01

1 posts

An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on macOS and Linux devices enables a locally authenticated non administrative user to disable the app even if the GlobalProtect app configuration would not normally permit them to do so. The GlobalProtect app on Windows, iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.

AAKL@infosec.exchange at 2025-07-09T17:44:03.000Z ##

New.

Palo Alto just listed several security advisories: Main portal: security.paloaltonetworks.com/

- CVE-2025-0139 Autonomous Digital Experience Manager: Privilege Escalation (PE) Vulnerability security.paloaltonetworks.com/

- CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App security.paloaltonetworks.com/

- CVE-2025-0141 GlobalProtect App: Privilege Escalation (PE) Vulnerability security.paloaltonetworks.com/

Update bulletin: security.paloaltonetworks.com/ #cybersecurity #infosec #PaloAlto

##

CVE-2025-53547
(8.5 HIGH)

EPSS: 0.01%

updated 2025-07-09T22:34:05

7 posts

A Helm contributor discovered that a specially crafted `Chart.yaml` file along with a specially linked `Chart.lock` file can lead to local code execution when dependencies are updated. ### Impact Fields in a `Chart.yaml` file, that are carried over to a `Chart.lock` file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content

1 repos

https://github.com/DVKunion/CVE-2025-53547-POC

hackernewsrobot@mastodon.social at 2025-07-09T19:43:10.000Z ##

Helm local code execution via a malicious chart – CVE-2025-53547 github.com/helm/helm/security/

##

hn50@social.lansky.name at 2025-07-09T07:20:07.000Z ##

Helm local code execution via a malicious chart – CVE-2025-53547

Link: github.com/helm/helm/security/
Discussion: news.ycombinator.com/item?id=4

##

newsycombinator@framapiaf.org at 2025-07-09T07:00:58.000Z ##

Helm local code execution via a malicious chart – CVE-2025-53547
Link: github.com/helm/helm/security/
Comments: news.ycombinator.com/item?id=4

##

ycombinator@rss-mstdn.studiofreesia.com at 2025-07-09T06:26:54.000Z ##

Helm local code execution via a malicious chart – CVE-2025-53547
github.com/helm/helm/security/
#ycombinator

##

CuratedHackerNews@mastodon.social at 2025-07-09T06:14:05.000Z ##

Helm local code execution via a malicious chart – CVE-2025-53547

github.com/helm/helm/security/

#github #security

##

h4ckernews@mastodon.social at 2025-07-09T06:13:52.000Z ##

Helm local code execution via a malicious chart – CVE-2025-53547

github.com/helm/helm/security/

#HackerNews #Helm #local #code #execution #CVE-2025-53547 #security #vulnerability #malicious #chart

##

cR0w@infosec.exchange at 2025-07-08T21:57:06.000Z ##

Code exec in Helm.

github.com/helm/helm/security/

sev:HIGH 8.5 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H

Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-52364
(7.5 HIGH)

EPSS: 0.06%

updated 2025-07-09T21:32:18

1 posts

Insecure Permissions vulnerability in Tenda CP3 Pro Firmware V22.5.4.93 allows the telnet service (telnetd) by default at boot via the initialization script /etc/init.d/eth.sh. This allows remote attackers to connect to the device s shell over the network, potentially without authentication if default or weak credentials are present

cR0w@infosec.exchange at 2025-07-09T16:43:26.000Z ##

A Tenda vuln with no credited reporter and no PoC? Huh.

nvd.nist.gov/vuln/detail/CVE-2

Insecure Permissions vulnerability in Tenda CP3 Pro Firmware V22.5.4.93 allows the telnet service (telnetd) by default at boot via the initialization script /etc/init.d/eth.sh. This allows remote attackers to connect to the device s shell over the network, potentially without authentication if default or weak credentials are present

##

CVE-2025-32463
(9.4 CRITICAL)

EPSS: 0.33%

updated 2025-07-09T18:30:41

2 posts

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

33 repos

https://github.com/mirchr/CVE-2025-32463-sudo-chwoot

https://github.com/SpongeBob-369/cve-2025-32463

https://github.com/san8383/CVE-2025-32463

https://github.com/junxian428/CVE-2025-32463

https://github.com/morgenm/sudo-chroot-CVE-2025-32463

https://github.com/4f-kira/CVE-2025-32463

https://github.com/Adonijah01/cve-2025-32463-lab

https://github.com/SysMancer/CVE-2025-32463

https://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOIT

https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC

https://github.com/nflatrea/CVE-2025-32463

https://github.com/0xAkarii/CVE-2025-32463

https://github.com/cyberpoul/CVE-2025-32463-POC

https://github.com/ill-deed/CVE-2025-32463_illdeed

https://github.com/toohau/CVE-2025-32462-32463-Detection-Script-

https://github.com/zhaduchanhzz/CVE-2025-32463_POC

https://github.com/SkylerMC/CVE-2025-32463

https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab

https://github.com/Mikivirus0/sudoinjection

https://github.com/Chocapikk/CVE-2025-32463-lab

https://github.com/kh4sh3i/CVE-2025-32463

https://github.com/neko205-mx/CVE-2025-32463_Exploit

https://github.com/lowercasenumbers/CVE-2025-32463_sudo_chroot

https://github.com/pevinkumar10/CVE-2025-32463

https://github.com/0xb0rn3/CVE-2025-32463-EXPLOIT

https://github.com/robbert1978/CVE-2025-32463_POC

https://github.com/yeremeu/CVE-2025-32463_chwoot

https://github.com/FreeDurok/CVE-2025-32463-PoC

https://github.com/CIA911/sudo_patch_CVE-2025-32463

https://github.com/pr0v3rbs/CVE-2025-32463_chwoot

https://github.com/B1ack4sh/Blackash-CVE-2025-32463

https://github.com/K1tt3h/CVE-2025-32463-POC

https://github.com/zinzloun/CVE-2025-32463

foxs@嘟文.com at 2025-07-10T07:53:21.000Z ##

@BigOld @OldBig @board
我找到了漏洞的官方文档可以看一下
stratascale.com/vulnerability-

##

foxs@嘟文.com at 2025-07-09T15:58:05.000Z ##

CVE-2025-32463
Sudo 1.9.14+ 版本存在漏洞:它在切换环境(chroot)后过早解析路径,导致攻击者能通过伪造/etc/nsswitch.conf等文件,诱骗Sudo加载恶意库(如libnss_xxx.so)。无需特殊权限即可获得root权限,危害极大。
受影响版本:Sudo 1.9.14至1.9.17全系列 
最新补丁于2025年6月30日发布
@board

##

CVE-2025-6514
(9.7 CRITICAL)

EPSS: 0.10%

updated 2025-07-09T18:08:46

4 posts

mcp-remote is exposed to OS command injection when connecting to untrusted MCP servers due to crafted input from the authorization_endpoint response URL

1 repos

https://github.com/ChaseHCS/CVE-2025-6514

AAKL@infosec.exchange at 2025-07-10T17:16:03.000Z ##

JFrog, from yesterday: Critical RCE Vulnerability in mcp-remote: CVE-2025-6514 Threatens LLM Clients jfrog.com/blog/2025-6514-criti

More:

The Hacker News: Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads @thehackernews #cybersecurity #infosec #LLM #AI

##

LLMs@activitypub.awakari.com at 2025-07-10T12:26:16.000Z ## Critical mcp-remote Vulnerability Exposes LLM Clients to Remote Code Execution Attacks A critical vulnerability CVE-2025-6514 with a CVSS score of 9.6 affecting the mcp-remote project allows attack...

#Cyber #Attack #Article #Cyber #Security #Cyber #Security #News #Vulnerability

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2025-07-10T07:46:27.000Z ## Critical mcp‑remote Flaw Allows Remote Code Execution in LLM Clients A critical security flaw, CVE-2025-6514 (CVSS 9.6), has been discovered in the widely used mcp-remote project, a proxy tool en...

#Cyber #Security #News #Cybersecurity #Cyber #Security #Cyber #security #news #vulnerability

Origin | Interest | Match ##

_r_netsec@infosec.exchange at 2025-07-09T19:28:06.000Z ##

Critical RCE Vulnerability in mcp-remote: CVE-2025-6514 Threatens LLM Clients jfrog.com/blog/2025-6514-criti

##

CVE-2025-38261(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-07-09T12:31:41

1 posts

In the Linux kernel, the following vulnerability has been resolved: riscv: save the SR_SUM status over switches When threads/tasks are switched we need to ensure the old execution's SR_SUM state is saved and the new thread has the old SR_SUM state restored. The issue was seen under heavy load especially with the syz-stress tool running, with crashes as follows in schedule_tail: Unable to handl

linux@activitypub.awakari.com at 2025-07-09T10:51:49.000Z ## You can now share your thoughts on vulnerability CVE-2025-38261 in Vulnerability-Lookup: https://vulnerability.circl.lu/vuln/CVE-2025-38261 Linux - Linux #VulnerabilityLookup #Vulnerability #Cybers...


Origin | Interest | Match ##

CVE-2025-3497
(8.7 HIGH)

EPSS: 0.05%

updated 2025-07-09T09:31:17

1 posts

The Linux distribution underlying the Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20) is obsolete and reached end of life (EOL) on June 30, 2024. Thus, any unmitigated vulnerability could be exploited to affect this product.

cR0w@infosec.exchange at 2025-07-09T12:47:28.000Z ##

Perfect 10 and another good effort in Radiflow iSAP Smart Collector with its EoL OS. Good thing these are only used in airgapped zero trust something something networks.

cvcn.gov.it/cvcn/cve/CVE-2025-

sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

The device has two web servers that expose unauthenticated REST APIs on the management network (TCP
ports 8084 and 8086). Exploiting OS command injection through these APIs, an attacker can send arbitrary
commands that are executed with administrative permissions by the underlying operating system.

nvd.nist.gov/vuln/detail/CVE-2

cvcn.gov.it/cvcn/cve/CVE-2025-

sev:CRIT 9.9 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L

An unauthenticated user with management network access can get and
modify the Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20)
configuration. The device has two web servers that expose unauthenticated REST APIs on the management network (TCP
ports 8084 and 8086). An attacker can use these APIs to get access to all system settings, modify the configuration
and execute some commands (e.g., system reboot).

nvd.nist.gov/vuln/detail/CVE-2

cvcn.gov.it/cvcn/cve/CVE-2025-

sev:HIGH 8.7 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H

The Linux distribution underlying the Radiflow iSAP Smart Collector
(CentOS 7 - VSAP 1.20) is obsolete and
reached end of life (EOL) on
June 30, 2024. Thus, any
unmitigated vulnerability could be exploited to affect this product.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-3499
(10.0 CRITICAL)

EPSS: 0.32%

updated 2025-07-09T09:31:17

1 posts

The device has two web servers that expose unauthenticated REST APIs on the management network (TCP ports 8084 and 8086). Exploiting OS command injection through these APIs, an attacker can send arbitrary commands that are executed with administrative permissions by the underlying operating system.

cR0w@infosec.exchange at 2025-07-09T12:47:28.000Z ##

Perfect 10 and another good effort in Radiflow iSAP Smart Collector with its EoL OS. Good thing these are only used in airgapped zero trust something something networks.

cvcn.gov.it/cvcn/cve/CVE-2025-

sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

The device has two web servers that expose unauthenticated REST APIs on the management network (TCP
ports 8084 and 8086). Exploiting OS command injection through these APIs, an attacker can send arbitrary
commands that are executed with administrative permissions by the underlying operating system.

nvd.nist.gov/vuln/detail/CVE-2

cvcn.gov.it/cvcn/cve/CVE-2025-

sev:CRIT 9.9 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L

An unauthenticated user with management network access can get and
modify the Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20)
configuration. The device has two web servers that expose unauthenticated REST APIs on the management network (TCP
ports 8084 and 8086). An attacker can use these APIs to get access to all system settings, modify the configuration
and execute some commands (e.g., system reboot).

nvd.nist.gov/vuln/detail/CVE-2

cvcn.gov.it/cvcn/cve/CVE-2025-

sev:HIGH 8.7 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H

The Linux distribution underlying the Radiflow iSAP Smart Collector
(CentOS 7 - VSAP 1.20) is obsolete and
reached end of life (EOL) on
June 30, 2024. Thus, any
unmitigated vulnerability could be exploited to affect this product.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-7345
(7.5 HIGH)

EPSS: 0.06%

updated 2025-07-09T08:15:25.153000

1 posts

A flaw exists in gdk‑pixbuf within the gdk_pixbuf__jpeg_image_load_increment function (io-jpeg.c) and in glib’s g_base64_encode_step (glib/gbase64.c). When processing maliciously crafted JPEG images, a heap buffer overflow can occur during Base64 encoding, allowing out-of-bounds reads from heap memory, potentially causing application crashes or arbitrary code execution.

cR0w@infosec.exchange at 2025-07-08T13:51:47.000Z ##

Post more malicious images.

access.redhat.com/security/cve

sev:HIGH 7.5 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

A flaw exists in gdk‑pixbuf within the gdk_pixbuf__jpeg_image_load_increment function (io-jpeg.c) and in glib’s g_base64_encode_step (glib/gbase64.c). When processing maliciously crafted JPEG images, a heap buffer overflow can occur during Base64 encoding, allowing out-of-bounds reads from heap memory, potentially causing application crashes or arbitrary code execution.`

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-49533
(9.8 CRITICAL)

EPSS: 1.28%

updated 2025-07-09T00:30:45

1 posts

Adobe Experience Manager (MS) versions 6.5.23.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction. Scope is unchanged.

cR0w@infosec.exchange at 2025-07-08T21:44:59.000Z ##

This one is above a 9.5 though.

helpx.adobe.com/security/produ

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Adobe Experience Manager (MS) versions 6.5.23.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction. Scope is unchanged.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-6759(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-07-09T00:30:44

1 posts

Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Windows Virtual Delivery Agent for CVAD and Citrix DaaS

1 repos

https://github.com/olljanat/TestCitrixException

cR0w@infosec.exchange at 2025-07-08T22:03:30.000Z ##

PrivEsc in Windows Virtual Delivery Agent for CVAD and Citrix DaaS.

support.citrix.com/support-hom

sev:HIGH 7.3 - CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Windows Virtual Delivery Agent for CVAD and Citrix DaaS

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-27203
(9.7 CRITICAL)

EPSS: 1.50%

updated 2025-07-09T00:30:32

1 posts

Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does require user interaction and scope is changed.

cR0w@infosec.exchange at 2025-07-08T21:39:27.000Z ##

Ooh, this one could be fun. And it's below a 9.5, @campuscodi 😉

helpx.adobe.com/security/produ

sev:CRIT 9.3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does require user interaction and scope is changed.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-7192
(6.3 MEDIUM)

EPSS: 0.63%

updated 2025-07-08T21:30:37

1 posts

A vulnerability was found in D-Link DIR-645 up to 1.05B01 and classified as critical. This issue affects the function ssdpcgi_main of the file /htdocs/cgibin of the component ssdpcgi. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported b

cR0w@infosec.exchange at 2025-07-08T19:37:35.000Z ##

Some D-Link PoCs for @Dio9sys and @da_667 .

github.com/Thir0th/Thir0th-CVE

The newest one in there just had its CVE published about five minutes ago: CVE-2025-7192

#internetOfShit

##

CVE-2025-37102
(7.2 HIGH)

EPSS: 0.19%

updated 2025-07-08T21:30:32

1 posts

An authenticated command injection vulnerability exists in the Command line interface of HPE Networking Instant On Access Points. A successful exploitation could allow a remote attacker with elevated privileges to execute arbitrary commands on the underlying operating system as a highly privileged user.

cR0w@infosec.exchange at 2025-07-08T19:18:15.000Z ##

Post-auth command injection in HPE WAPs.

support.hpe.com/hpesc/public/d

sev:HIGH 7.2 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

An authenticated command injection vulnerability exists in the Command line interface of HPE Networking Instant On Access Points. A successful exploitation could allow a remote attacker with elevated privileges to execute arbitrary commands on the underlying operating system as a highly privileged user.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-49719
(7.5 HIGH)

EPSS: 0.23%

updated 2025-07-08T18:31:51

1 posts

Improper input validation in SQL Server allows an unauthorized attacker to disclose information over a network.

1 repos

https://github.com/HExploited/CVE-2025-49719-Exploit

beyondmachines1@infosec.exchange at 2025-07-09T08:01:29.000Z ##

Microsoft releases July 2025 Patch fixing one critical zero-day, 129 other flaws

Microsoft's July 2025 Patch Tuesday addressed 130 vulnerabilities including one publicly disclosed zero-day in SQL Server (CVE-2025-49719) and 14 critical-severity flaws. One critical flaw (CVE-2025-47981) marked as "More Likely" to be exploited within 30 days.

**This month prioritize patching of Microsoft Office, SQL Server, SharePoint, and Windows domain controllers. Those are impacted by the critical issues. Don't forget to update your Windows PCs/Laptops, since we all use them on the internet and this list of flaws will be abused by hackers.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-48817
(8.8 HIGH)

EPSS: 0.04%

updated 2025-07-08T18:31:50

1 posts

Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.

mttaggart@infosec.exchange at 2025-07-09T16:28:07.000Z ##

Calling @cR0w. You probably saw this, but RCE in Remote Desktop via directory traversal seems...special.

msrc.microsoft.com/update-guid

##

CVE-2025-48799
(7.8 HIGH)

EPSS: 0.07%

updated 2025-07-08T18:31:50

2 posts

Improper link resolution before file access ('link following') in Windows Update Service allows an authorized attacker to elevate privileges locally.

2 repos

https://github.com/KOVmechatronics/CVE-2025-48799

https://github.com/Wh04m1001/CVE-2025-48799

cR0w@infosec.exchange at 2025-07-09T12:53:47.000Z ##

And another one for CVE-2025-48799:

github.com/Wh04m1001/CVE-2025-

##

obivan@infosec.exchange at 2025-07-09T07:00:01.000Z ##

PoC for CVE-2025-48799, an elevation of privilege vulnerability in Windows Update service github.com/Wh04m1001/CVE-2025-

##

CVE-2025-47178
(8.0 HIGH)

EPSS: 0.35%

updated 2025-07-08T18:31:50

1 posts

Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to execute code over an adjacent network.

cR0w@infosec.exchange at 2025-07-08T17:28:31.000Z ##

SQLi in Configuration Manager? LMAO. Copilot does it again, huh?

msrc.microsoft.com/update-guid

Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to execute code over an adjacent network.

##

CVE-2024-36348
(3.8 LOW)

EPSS: 0.01%

updated 2025-07-08T18:31:49

1 posts

A transient execution vulnerability in some AMD processors may allow a user process to infer the control registers speculatively even if UMIP feature is enabled, potentially resulting in information leakage.

AAKL@infosec.exchange at 2025-07-09T16:57:40.000Z ##

Posted yesterday: AMD Transient Scheduler Attacks, relating to CVE-2024-36350, CVE-2024-36357, CVE-2024-36348, and CVE-2024-36349 amd.com/en/resources/product-s #AMD #cybersecurity #infosec

##

CVE-2024-36349
(3.8 LOW)

EPSS: 0.01%

updated 2025-07-08T18:31:49

1 posts

A transient execution vulnerability in some AMD processors may allow a user process to infer TSC_AUX even when such a read is disabled, potentially resulting in information leakage.

AAKL@infosec.exchange at 2025-07-09T16:57:40.000Z ##

Posted yesterday: AMD Transient Scheduler Attacks, relating to CVE-2024-36350, CVE-2024-36357, CVE-2024-36348, and CVE-2024-36349 amd.com/en/resources/product-s #AMD #cybersecurity #infosec

##

CVE-2025-49677
(7.0 None)

EPSS: 0.04%

updated 2025-07-08T18:31:47

1 posts

Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.

cR0w@infosec.exchange at 2025-07-09T12:41:23.000Z ##

Exploit Wednesday is underway. Unconfirmed PoC for CVE-2025-49677:

attackerkb.com/topics/ERsooKem

##

CVE-2025-47988
(7.5 HIGH)

EPSS: 0.08%

updated 2025-07-08T18:31:45

1 posts

Improper control of generation of code ('code injection') in Azure Monitor Agent allows an unauthorized attacker to execute code over an adjacent network.

cR0w@infosec.exchange at 2025-07-08T17:27:44.000Z ##

Code injection in Azure Monitor Agent? Damn vibe coding.

msrc.microsoft.com/update-guid

Improper control of generation of code ('code injection') in Azure Monitor Agent allows an unauthorized attacker to execute code over an adjacent network.

##

CVE-2024-36350
(5.6 MEDIUM)

EPSS: 0.01%

updated 2025-07-08T18:31:43

1 posts

A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.

AAKL@infosec.exchange at 2025-07-09T16:57:40.000Z ##

Posted yesterday: AMD Transient Scheduler Attacks, relating to CVE-2024-36350, CVE-2024-36357, CVE-2024-36348, and CVE-2024-36349 amd.com/en/resources/product-s #AMD #cybersecurity #infosec

##

CVE-2012-5862(CVSS UNKNOWN)

EPSS: 19.52%

updated 2025-07-08T18:30:28

1 posts

login.php on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider Electric Ezylog photovoltaic SCADA management server), Sinapsi eSolar, and Sinapsi eSolar DUO with firmware before 2.0.2870_2.2.12 establishes multiple hardcoded accounts, which makes it easier for remote attackers to obtain administrative access by leveraging a (1) cleartext password or (2) password hash contained in

cR0w@infosec.exchange at 2025-07-08T16:29:28.000Z ##

@reverseics It's an old hardcoded password one that was updated today.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 10.0 - AV:N/AC:L/Au:N/C:C/I:C/A:C 🥳

Old Description:

login.php on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider Electric Ezylog photovoltaic SCADA management server), Sinapsi eSolar, and Sinapsi eSolar DUO with firmware before 2.0.2870_2.2.12 establishes multiple hardcoded accounts, which makes it easier for remote attackers to obtain administrative access by leveraging a (1) cleartext password or (2) password hash contained in this script, as demonstrated by a password of astridservice or 36e44c9b64.

New Description:

These Sinapsi devices store hard-coded passwords in the PHP file of the device. By using the hard-coded passwords in the device, attackers can log into the device with administrative privileges. This could allow the attacker to have unauthorized access.

The Finder got changed today too which is what caught my eye:

Roberto Paleari and Ivan Speziale identified vulnerabilities and released proof-of-concept (exploit) code for the Sinapsi eSolar Light Photovoltaic System Monitor without coordination with Sinapsi or ICS-CERT.

##

CVE-2025-3648
(0 None)

EPSS: 0.04%

updated 2025-07-08T17:15:34.267000

6 posts

A vulnerability has been identified in the Now Platform that could result in data being inferred without authorization. Under certain conditional access control list (ACL) configurations, this vulnerability could enable unauthenticated and authenticated users to use range query requests to infer instance data that is not intended to be accessible to them. To assist customers in enhancing access c

patrickcmiller at 2025-07-12T06:12:14.897Z ##

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs thehackernews.com/2025/07/serv

##

patrickcmiller@infosec.exchange at 2025-07-12T06:12:14.000Z ##

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs thehackernews.com/2025/07/serv

##

sambowne@infosec.exchange at 2025-07-10T13:33:59.000Z ##

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs thehackernews.com/2025/07/serv

##

jbhall56@infosec.exchange at 2025-07-10T12:01:35.000Z ##

The vulnerability, tracked as CVE-2025-3648 (CVSS score: 8.2), has been described as a case of data inference in Now Platform through conditional access control list (ACL) rules. It has been codenamed Count(er) Strike. thehackernews.com/2025/07/serv

##

jos1264@social.skynetcloud.site at 2025-07-10T11:25:02.000Z ##

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs – Source:thehackernews.com ciso2ciso.com/servicenow-flaw- #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #ServiceNow

##

cR0w@infosec.exchange at 2025-07-08T16:21:38.000Z ##

support.servicenow.com/kb?id=k

sev:HIGH 8.2 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

A vulnerability has been identified in the Now Platform that could result in data being inferred without authorization. Under certain conditional access control list (ACL) configurations, this vulnerability could enable unauthenticated and authenticated users to use range query requests to infer instance data that is not intended to be accessible to them.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-42963
(9.1 CRITICAL)

EPSS: 0.04%

updated 2025-07-08T16:18:14.207000

1 posts

A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the applica

cR0w@infosec.exchange at 2025-07-08T01:16:35.000Z ##

Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2025-42966
(9.1 CRITICAL)

EPSS: 0.04%

updated 2025-07-08T16:18:14.207000

1 posts

SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.

cR0w@infosec.exchange at 2025-07-08T01:16:35.000Z ##

Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2025-20686
(9.8 CRITICAL)

EPSS: 0.02%

updated 2025-07-08T15:33:05

1 posts

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00415570; Issue ID: MSV-3404.

offseq@infosec.exchange at 2025-07-08T03:01:24.000Z ##

⚠️ CRITICAL: CVE-2025-20686 heap overflow in MediaTek MT6890/MT7915/MT7916/MT7981/MT7986. Remote code execution possible via Wi-Fi, no user interaction needed. Patch when available; segment networks & monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #CVE202520686 #MediaTek #Infosec

##

CVE-2025-6770
(7.2 HIGH)

EPSS: 0.66%

updated 2025-07-08T15:32:10

2 posts

OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.5.0.2 allows a remote authenticated attacker with high privileges to achieve remote code execution

AAKL@infosec.exchange at 2025-07-08T16:18:49.000Z ##

Ivanti July security update and advisories: ivanti.com/blog/july-security-

- July Security Advisory Ivanti Connect Secure and Ivanti Policy Secure (Multiple CVEs) forums.ivanti.com/s/article/Ju

- Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2025-6770, CVE-2025-6771) forums.ivanti.com/s/article/Se

- Security Advisory July 2025 for Ivanti EPM 2024 SU2 and EPM 2022 SU8 forums.ivanti.com/s/article/Se #cybersecurity #infoec #Ivanti

##

cR0w@infosec.exchange at 2025-07-08T15:55:31.000Z ##

Add a post-auth RCE or two to that list.

forums.ivanti.com/s/article/Se

OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.5.0.2 allows a remote authenticated attacker with high privileges to achieve remote code execution

#patchTuesday

##

CVE-2025-36600
(8.3 HIGH)

EPSS: 0.01%

updated 2025-07-08T15:32:10

1 posts

Dell Client Platform BIOS contains an Improper Access Control Applied to Mirrored or Aliased Memory Regions vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.

cR0w@infosec.exchange at 2025-07-08T14:29:11.000Z ##

Dell published a BIOS security advisory.

dell.com/support/kbdoc/en-us/0

sev:HIGH 8.2 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Dell Client Platform BIOS contains an Improper Access Control Applied to Mirrored or Aliased Memory Regions vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2025-50130
(7.8 HIGH)

EPSS: 0.01%

updated 2025-07-08T15:32:10

1 posts

A heap-based buffer overflow vulnerability exists in VS6Sim.exe contained in V-SFT and TELLUS provided by FUJI ELECTRIC CO., LTD. Opening V9 files or X1 files specially crafted by an attacker on the affected product may lead to arbitrary code execution.

cR0w@infosec.exchange at 2025-07-08T14:05:12.000Z ##

Code exec in Fuji Electronic V-SFT and TELLUS provided by FUJI ELECTRIC CO., LTD.

sev:HIGH 8.5 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Opening V9 files or X1 files specially crafted by an attacker on the affected product may lead to arbitrary code execusion.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-40736
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-07-08T12:31:10

1 posts

A vulnerability has been identified in SINEC NMS (All versions < V4.0). The affected application exposes an endpoint that allows an unauthorized modification of administrative credentials. This could allow an unauthenticated attacker to reset the superadmin password and gain full control of the application (ZDI-CAN-26569).

beyondmachines1@infosec.exchange at 2025-07-11T14:01:29.000Z ##

Multiple vulnerabilities reported in Siemens SINEC NMS, at least one critical

Siemens patched multiple critical vulnerabilities in its SINEC NMS network management system, including a critical flaw (CVE-2025-40736). The company released SINEC NMS version V4.0 to address the vulnerabilities.

**If you have Siemens SINEC NMS network management systems, make sure they are islated from the internet and accessible only from trusted networks. If you are running versions prior to V4.0, plan an update to version V4.0. There is at least one critical flaw that can easily be exploited if a hacker reaches the system. And given enough time, they will. No isolation is perfect.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-42964
(9.1 CRITICAL)

EPSS: 0.05%

updated 2025-07-08T03:31:08

1 posts

SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

cR0w@infosec.exchange at 2025-07-08T01:16:35.000Z ##

Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2025-42980
(9.1 CRITICAL)

EPSS: 0.05%

updated 2025-07-08T03:31:08

1 posts

SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

cR0w@infosec.exchange at 2025-07-08T01:16:35.000Z ##

Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2025-42959
(8.1 HIGH)

EPSS: 0.07%

updated 2025-07-08T03:31:02

1 posts

An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.

cR0w@infosec.exchange at 2025-07-08T01:16:35.000Z ##

Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2025-42953
(8.1 HIGH)

EPSS: 0.04%

updated 2025-07-08T03:31:02

1 posts

SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.

cR0w@infosec.exchange at 2025-07-08T01:16:35.000Z ##

Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2025-42967
(9.1 CRITICAL)

EPSS: 0.26%

updated 2025-07-08T03:31:01

2 posts

SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.

cR0w@infosec.exchange at 2025-07-08T12:19:33.000Z ##

CVE-2025-42967 was updated and almost got that perfect 10.

sev:CRIT 9.9 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

The rest of the SAP #patchTuesday advisories are here:

support.sap.com/en/my-support/

##

cR0w@infosec.exchange at 2025-07-08T01:16:35.000Z ##

Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

nvd.nist.gov/vuln/detail/CVE-2

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.

nvd.nist.gov/vuln/detail/CVE-2

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2025-6543
(9.8 CRITICAL)

EPSS: 16.12%

updated 2025-07-01T18:30:34

2 posts

Memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server

3 repos

https://github.com/abrewer251/CVE-2025-6543_CitrixNetScaler_PoC

https://github.com/grupooruss/Citrix-cve-2025-6543

https://github.com/seabed-atavism/CVE-2025-6543

definity at 2025-07-11T17:58:01.385Z ##

@GossiTheDog this one is for CVE-2025-6543

##

definity@infosec.exchange at 2025-07-11T17:58:01.000Z ##

@GossiTheDog this one is for CVE-2025-6543

##

CVE-2025-6554
(8.1 HIGH)

EPSS: 5.30%

updated 2025-07-01T15:32:11

1 posts

Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)

5 repos

https://github.com/9Insomnie/CVE-2025-6554

https://github.com/ghostn4444/POC-CVE-2025-6554

https://github.com/PwnToday/CVE-2025-6554

https://github.com/gmh5225/CVE-2025-6554-2

https://github.com/windz3r0day/CVE-2025-6554

wasm@activitypub.awakari.com at 2025-07-03T21:47:14.000Z ## Chrome Zero-Day Exploit: CVE-2025-6554 A critical Chrome zero-day exploit (CVE-2025-6554) targets the V8 engine and has been exploited in the wild. Learn how this Chrome vulnerability works and how...

#Threat #Analysis #Malware #Research

Origin | Interest | Match ##

CVE-2025-6191
(8.8 HIGH)

EPSS: 0.06%

updated 2025-06-18T21:30:35

2 posts

Integer overflow in V8 in Google Chrome prior to 137.0.7151.119 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

AAKL at 2025-07-11T16:36:32.555Z ##

AhnLab: Grafana Labs Product Security Update Advisory Affecting CVE-2025-6191 and CVE-2025-6192 asec.ahnlab.com/en/89002/

##

AAKL@infosec.exchange at 2025-07-11T16:36:32.000Z ##

AhnLab: Grafana Labs Product Security Update Advisory Affecting CVE-2025-6191 and CVE-2025-6192 asec.ahnlab.com/en/89002/ #cybersecurity #infosec

##

CVE-2025-6192
(8.8 HIGH)

EPSS: 0.11%

updated 2025-06-18T21:30:30

2 posts

Use after free in Metrics in Google Chrome prior to 137.0.7151.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AAKL at 2025-07-11T16:36:32.555Z ##

AhnLab: Grafana Labs Product Security Update Advisory Affecting CVE-2025-6191 and CVE-2025-6192 asec.ahnlab.com/en/89002/

##

AAKL@infosec.exchange at 2025-07-11T16:36:32.000Z ##

AhnLab: Grafana Labs Product Security Update Advisory Affecting CVE-2025-6191 and CVE-2025-6192 asec.ahnlab.com/en/89002/ #cybersecurity #infosec

##

CVE-2025-33073
(8.8 HIGH)

EPSS: 0.31%

updated 2025-06-10T18:32:36

1 posts

Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.

2 repos

https://github.com/obscura-cert/CVE-2025-33073

https://github.com/mverschu/CVE-2025-33073

CVE-2025-47934(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-05-19T21:54:44

2 posts

### Impact A maliciously modified message can be passed to either `openpgp.verify` or `openpgp.decrypt`, causing these functions to return a valid signature verification result while returning data that was not actually signed. This flaw allows signature verifications of inline (non-detached) signed messages (using `openpgp.verify`) and signed-and-encrypted messages (using `openpgp.decrypt` with

AAKL at 2025-07-11T16:43:05.653Z ##

From yesterday.

Coadean Labs: A Write-up of CVE-2025-47934 – Spoofing OpenPGP.js signature verification codeanlabs.com/blog/research/c

##

AAKL@infosec.exchange at 2025-07-11T16:43:05.000Z ##

From yesterday.

Coadean Labs: A Write-up of CVE-2025-47934 – Spoofing OpenPGP.js signature verification codeanlabs.com/blog/research/c #cybersecurity #infosec

##

CVE-2025-30012
(3.9 LOW)

EPSS: 0.17%

updated 2025-05-13T03:31:20

1 posts

The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component within the affected SRM stack to accept binary Java objects in specific encoding format. On successful exploitation, an authenticated attacker with high privileges could send malicious payload request and receive an outbound DNS request, resulting in deserialization of data in the applica

beyondmachines1@infosec.exchange at 2025-07-09T09:01:28.000Z ##

SAP July 2025 patch day fixes 31 vulnerabilities, one maximum severity

SAP's July 2025 Security Patch Day fixes 31 vulnerabilities across its enterprise software, including a maximum severity vulnerability (CVE-2025-30012) that allows unauthenticated attackers to execute arbitrary OS commands on SAP Supplier Relationship Management systems.

**If you use SAP products, review the advisory in detail. Prioritize SAP Supplier Relationship Management which has a critical unauthenticated remote code execution vulnerability (CVE-2025-30012), then SAP S/4HANA and SAP SCM as well as SAP NetWeaver sustems.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2017-9765
(8.1 HIGH)

EPSS: 23.64%

updated 2025-04-20T01:37:25.860000

1 posts

Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via a large XML document, aka Devil's Ivy. NOTE: the large document would be blocked by many common web-server configurations on general

scott@sfba.social at 2025-07-09T00:07:25.000Z ##

If you have a #Brother #printer, take a quick #security break, so your printer doesn’t get commandeered into a botnet! 🖨️💪

1. Check if your printer model is on this list and has updated firmware available:

support.brother.com/g/s/id/sec

2. If new firmware is available, download the appropriate updater here:

support.brother.com/g/b/midlin

(EDIT: See replies to this post for alternative, better ideas!)

3. Story for context:

securityweek.com/new-vulnerabi

##

CVE-2025-32461
(9.9 CRITICAL)

EPSS: 0.11%

updated 2025-04-09T20:02:41.860000

1 posts

wikiplugin_includetpl in lib/wiki-plugins/wikiplugin_includetpl.php in Tiki before 28.3 mishandles input to an eval. The fixed versions are 21.12, 24.8, 27.2, and 28.3.

_r_netsec@infosec.exchange at 2025-07-08T10:13:06.000Z ##

[CVE-2025-32461] Tiki Wiki CMS Groupware <= 28.3 Two SSTI Vulnerabilities karmainsecurity.com/KIS-2025-03

##

CVE-2025-24269
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-04-04T18:23:37.283000

1 posts

The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.4. An app may be able to cause unexpected system termination.

beyondmachines1@infosec.exchange at 2025-07-09T10:01:28.000Z ##

Critical macOS SMBClient flaws enable remote code execution

Security researchers discovered three vulnerabilities in macOS SMBClient, including a critical remote code execution flaw (CVE-2025-24269) that allows malicious SMB servers to execute with minimal user interaction. Apple has patched all vulnerabilities in macOS Sequoia 15.4.

**Another reason to update to macOS Sequoia 15.4. In the meantime, disable SMB services if you don't need file sharing, and avoid clicking smb:// links from untrusted sources until you've patched.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

linux@activitypub.awakari.com at 2025-07-10T07:40:32.000Z ## Cybercriminals Exploiting GeoServer RCE Vulnerability to Deploy Crypto Miners A surge in cyberattacks leveraging the GeoServer Remote Code Execution (RCE) vulnerability (CVE-2024-36401) has been re...

#cryptocurrency #Cyber #Security #News #Cybersecurity #Vulnerability #Cyber #Security #Cyber #security #news

Origin | Interest | Match ##

CVE-2023-2868
(9.4 CRITICAL)

EPSS: 90.10%

updated 2025-04-02T18:19:23.680000

2 posts

A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the

4 repos

https://github.com/cfielding-r7/poc-cve-2023-2868

https://github.com/krmxd/CVE-2023-2868

https://github.com/cashapp323232/CVE-2023-2868CVE-2023-2868

https://github.com/getdrive/PoC

cR0w at 2025-07-11T20:58:57.882Z ##

There is a lot less stuff so far using GNU tar than I expected. Lots of roll-your-own shit though like we saw with CVE-2023-2868 in Barracudas.

##

cR0w@infosec.exchange at 2025-07-11T20:58:57.000Z ##

There is a lot less stuff so far using GNU tar than I expected. Lots of roll-your-own shit though like we saw with CVE-2023-2868 in Barracudas.

##

CVE-2024-56346
(10.0 CRITICAL)

EPSS: 0.11%

updated 2025-03-18T18:30:56

1 posts

IBM AIX 7.2 and 7.3 nimesis NIM master service could allow a remote attacker to execute arbitrary commands due to improper process controls.

cR0w@infosec.exchange at 2025-07-08T15:27:52.000Z ##

Remember the perfect 10 CVE-2024-56346 in IBM NIM? They are just now publishing an advisory that IBM Virtualization Engine TS7700 is vulnerable to it. I know IBM is large, but that seems like a long time to wait to publish that an IBM product is impacted by another IBM vulnerability, especially that one.

ibm.com/support/pages/node/723

#patchTuesday

##

CVE-2024-3596
(9.1 CRITICAL)

EPSS: 0.77%

updated 2025-03-18T18:30:44

4 posts

RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.

1 repos

https://github.com/alperenugurlu/CVE-2024-3596-Detector

beyondmachines1 at 2025-07-11T17:01:28.462Z ##

Juniper releases patches for Junos OS and Junos OS Evolved to fix "BlastRADIUS" RADIUS protocol flaw

Juniper Networks patched a critical vulnerability called "BlastRADIUS" (CVE-2024-3596) affecting the RADIUS protocol in Junos OS and Junos OS Evolved that allows attackers to bypass authentication and gain unauthorized access to network devices due to improper validation of integrity check values.

**Review your Juniper device configuration. If you have Juniper devices using RADIUS authentication (configurations with [access radius-server]), update to the latest patched Junos OS or Junos OS Evolved versions to fix the BlastRADIUS flaw. If you can't patch, enable RADIUS over TLS (RADSEC) as a temporary workaround to encrypt RADIUS traffic and prevent exploitation of BlastRadius.**

beyondmachines.net/event_detai

##

cR0w at 2025-07-11T14:52:04.502Z ##

Juniper has published a bunch of security advisories since Wednesday:

supportportal.juniper.net/s/gl

These two are the only ones they rated as sev:CRIT but I haven't had time to actually read through any of them yet:

supportportal.juniper.net/s/ar

supportportal.juniper.net/s/ar

##

beyondmachines1@infosec.exchange at 2025-07-11T17:01:28.000Z ##

Juniper releases patches for Junos OS and Junos OS Evolved to fix "BlastRADIUS" RADIUS protocol flaw

Juniper Networks patched a critical vulnerability called "BlastRADIUS" (CVE-2024-3596) affecting the RADIUS protocol in Junos OS and Junos OS Evolved that allows attackers to bypass authentication and gain unauthorized access to network devices due to improper validation of integrity check values.

**Review your Juniper device configuration. If you have Juniper devices using RADIUS authentication (configurations with [access radius-server]), update to the latest patched Junos OS or Junos OS Evolved versions to fix the BlastRADIUS flaw. If you can't patch, enable RADIUS over TLS (RADSEC) as a temporary workaround to encrypt RADIUS traffic and prevent exploitation of BlastRadius.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2025-07-11T14:52:04.000Z ##

Juniper has published a bunch of security advisories since Wednesday:

supportportal.juniper.net/s/gl

These two are the only ones they rated as sev:CRIT but I haven't had time to actually read through any of them yet:

supportportal.juniper.net/s/ar

supportportal.juniper.net/s/ar

##

CVE-2023-52927(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-03-14T15:32:10

1 posts

In the Linux kernel, the following vulnerability has been resolved: netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in some scenario, we expect the exp not to be removed when the created ct will not be confirmed, like in OVS and TC conntrack in the following patches. T

1 repos

https://github.com/seadragnol/CVE-2023-52927

CVE-2019-9621
(7.5 HIGH)

EPSS: 91.78%

updated 2024-04-04T00:24:27

1 posts

Zimbra Collaboration Suite before 8.6 patch 13, 8.7.x before 8.7.11 patch 10, and 8.8.x before 8.8.10 patch 7 or 8.8.x before 8.8.11 patch 3 allows SSRF via the ProxyServlet component.

1 repos

https://github.com/k8gege/ZimbraExploit

beyondmachines1@infosec.exchange at 2025-07-09T11:01:28.000Z ##

CISA warns of actively exploited Zimbra Collaboration Suite flaw

CISA has issued a warning about the active exploitation of CVE-2019-9621, a server-side request forgery (SSRF) vulnerability in Synacor's Zimbra Collaboration Suite that enables remote attackers to achieve code execution, data exfiltration, and system compromise through the ProxyServlet component.

**If you are using Zimbra Collaboration Suite and haven't patched it since 2019, it's time to patch it YESTERDAY! Since you can't patch then, patch now to the latest patched versions. There is an actively exploited SSRF flaw, and Zimbra is by design exposed to the internet. So don't wait for the hackers to call you.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2016-4484
(6.8 MEDIUM)

EPSS: 0.46%

updated 2023-01-27T05:06:05

1 posts

The Debian initrd script for the cryptsetup package 2:1.7.3-2 and earlier allows physically proximate attackers to gain shell access via many log in attempts with an invalid password.

linux@activitypub.awakari.com at 2025-07-08T06:00:19.000Z ## Bypassing Secure Boot: A Linux Initramfs Vulnerability (CVE-2016-4484) Modern Linux systems implement layers of security, including Secure Boot, full-disk encryption, and bootloader passwords. Howe...

#Category(Default) #- #Do #Not #Use #This

Origin | Interest | Match ##

RedTeamNews at 2025-07-11T19:52:35.460Z ##

🚨 Critical alert: A pre-auth RCE exploit (CVE-2025-25257) targeting Fortinet FortiWeb is now public. Patch to 7.6.4+/7.4.8+ immediately or disable HTTP admin interfaces. Unpatched systems are at high risk. Details: redteamnews.com/red-team/cve/c

##

DarkWebInformer at 2025-07-11T19:45:36.698Z ##

🚨CVE-2025-25257: Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector

PoC: github.com/watchtowrlabs/watch

Write-up: labs.watchtowr.com/pre-auth-sq

##

AAKL at 2025-07-11T19:23:25.659Z ##

New.

WatchTower: Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257) labs.watchtowr.com/pre-auth-sq @watchtower

##

undercodenews@mastodon.social at 2025-07-11T18:15:31.000Z ##

Critical SQL Injection Flaw in FortiWeb: Urgent Patch Required

Fortinet's Latest Security Challenge Fortinet has disclosed a critical SQL injection vulnerability affecting its FortiWeb product, posing a significant risk to unpatched systems. The flaw, identified as CVE-2025-25257, carries a CVSS severity score of 9.6/10, making it one of the most serious vulnerabilities reported this year. This vulnerability allows unauthenticated attackers to execute arbitrary SQL…

undercodenews.com/critical-sql

##

raptor at 2025-07-11T17:42:46.006Z ##

Pre-Auth (CVE-2025-25257)

pwner.gg/blog/2025-07-10-forti

##

jos1264@social.skynetcloud.site at 2025-07-12T00:05:03.000Z ##

Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) – Source:thehackernews.com ciso2ciso.com/fortinet-release #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #Fortinet

##

RedTeamNews@infosec.exchange at 2025-07-11T19:52:35.000Z ##

🚨 Critical alert: A pre-auth RCE exploit (CVE-2025-25257) targeting Fortinet FortiWeb is now public. Patch to 7.6.4+/7.4.8+ immediately or disable HTTP admin interfaces. Unpatched systems are at high risk. Details: redteamnews.com/red-team/cve/c

##

DarkWebInformer@infosec.exchange at 2025-07-11T19:45:36.000Z ##

🚨CVE-2025-25257: Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector

PoC: github.com/watchtowrlabs/watch

Write-up: labs.watchtowr.com/pre-auth-sq

##

AAKL@infosec.exchange at 2025-07-11T19:23:25.000Z ##

New.

WatchTower: Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257) labs.watchtowr.com/pre-auth-sq @watchtower #cybersecurity #infosec

##

raptor@infosec.exchange at 2025-07-11T17:42:46.000Z ##

#FortiWeb Pre-Auth #RCE (CVE-2025-25257)

pwner.gg/blog/2025-07-10-forti

##

jos1264@social.skynetcloud.site at 2025-07-11T15:25:02.000Z ##

Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) thehackernews.com/2025/07/fort

##

jos1264@social.skynetcloud.site at 2025-07-11T15:25:02.000Z ##

Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) thehackernews.com/2025/07/fort

##

_r_netsec@infosec.exchange at 2025-07-11T13:28:06.000Z ##

FortiWeb Pre-Auth RCE (CVE-2025-25257) pwner.gg/blog/2025-07-10-forti

##

cR0w@infosec.exchange at 2025-07-11T12:25:18.000Z ##

watchTowr has an even better write-up on CVE-2025-25257 in Fortinet FortiWeb.

labs.watchtowr.com/pre-auth-sq

##

_r_netsec@infosec.exchange at 2025-07-11T10:28:06.000Z ##

Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257) - watchTowr Labs labs.watchtowr.com/pre-auth-sq

##

beyondmachines1@infosec.exchange at 2025-07-11T09:01:28.000Z ##

Critical SQL injection vulnerability in Fortinet FortiWeb enables unauthenticated remote code execution

Fortinet patched a critical SQL injection vulnerability (CVE-2025-25257) in its FortiWeb web application firewall that allows unauthenticated attackers to execute unauthorized SQL commands and achieve remote code execution through the GUI component.

**If you have Fortinet FortiWeb systems running versions 7.0 through 7.6.3, make sure it's web admin interface is isolated from the internet and accessible from trusted networks. Then plan a quick patch. If you can't patch for extended period (more than a few weeks), consider disabling the web admin interface since that blocks the attacks, but also blocks your normal admin work. Seems easier to patch.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2025-07-10T20:32:41.000Z ##

I must have posted my Fortinet post too early because I missed this sev:CRIT SQLi in FortiWeb.

fortiguard.fortinet.com/psirt/

Which has a write-up by Arctic Wolf.

arcticwolf.com/resources/blog/

##

benzogaga33@mamot.fr at 2025-07-10T09:40:02.000Z ##

Fortinet : cette injection SQL dans FortiWeb ouvre la porte à l’exécution de commandes malveillantes it-connect.fr/fortinet-fortiwe #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet

##

CVE-2024-47065
(0 None)

EPSS: 0.00%

2 posts

N/A

cR0w at 2025-07-11T17:12:35.153Z ##

Looks like this was reported a while ago. CVE was reserved in September 2024.

cve.org/CVERecord?id=CVE-2024-

##

cR0w@infosec.exchange at 2025-07-11T17:12:35.000Z ##

Looks like this was reported a while ago. CVE was reserved in September 2024.

cve.org/CVERecord?id=CVE-2024-

##

cR0w@infosec.exchange at 2025-07-10T20:28:34.000Z ##

Datadog has a write-up on CVE-2025-48384 in git.

securitylabs.datadoghq.com/art

##

raesene@infosec.exchange at 2025-07-09T14:23:41.000Z ##

Definitely a day to patch your git installs. There's a PoC for a new git CVE.

I wanted to test it but we all know you don't run PoC code on machines you care about... literally 1 min later on a fresh labs.iximiuz.com/ playground test confirms it works!

##

dalias@hachyderm.io at 2025-07-09T13:45:37.000Z ##

@dgl git CVE-2025-48384 👆

Mitigation is not to use submodule functionality from untrusted repos, including via git clone --recursive, which certain IDEs/tools might be doing automatically.

##

cR0w@infosec.exchange at 2025-07-09T12:55:13.000Z ##

And another one for CVE-2025-48384:

dgl.cx/2025/07/git-clone-submo

##

hackernewsrobot@mastodon.social at 2025-07-09T01:21:20.000Z ##

CVE-2025-48384: Breaking Git with a carriage return and cloning RCE dgl.cx/2025/07/git-clone-submo

##

dgl@infosec.exchange at 2025-07-09T00:21:50.000Z ##

I found a vulnerability in git. CVE-2025-48384: Breaking git with a carriage return and cloning RCE - dgl.cx/2025/07/git-clone-submo

As the post explains this is one of my favourite classes of vulnerability, using characters that are old and sometimes forgotten.

#git #security #rce #ascii

##

hn250@social.lansky.name at 2025-07-09T00:20:11.000Z ##

Breaking Git with a carriage return and cloning RCE

Link: dgl.cx/2025/07/git-clone-submo
Discussion: news.ycombinator.com/item?id=4

##

newsycombinator@framapiaf.org at 2025-07-08T21:00:59.000Z ##

Breaking Git with a carriage return and cloning RCE
Link: dgl.cx/2025/07/git-clone-submo
Comments: news.ycombinator.com/item?id=4

##

lobsters@mastodon.social at 2025-07-08T19:20:16.000Z ##

CVE-2025-48384: Breaking git with a carriage return and cloning RCE lobste.rs/s/awmqgc #security #vcs
dgl.cx/2025/07/git-clone-submo

##

hn100@social.lansky.name at 2025-07-08T18:40:11.000Z ##

CVE-2025-48384: Breaking Git with a carriage return and cloning RCE

Link: dgl.cx/2025/07/git-clone-submo
Discussion: news.ycombinator.com/item?id=4

##

nixCraft@mastodon.social at 2025-07-08T18:38:07.000Z ##

On Unix-like platforms, if you use git clone --recursive on an untrusted repo, it could achieve remote code execution. Update to a fixed version of git and other software that embeds Git (including GitHub Desktop) dgl.cx/2025/07/git-clone-submo

##

technotenshi@infosec.exchange at 2025-07-08T18:33:42.000Z ##

CVE-2025-48384: A Git flaw allows RCE when cloning malicious repos with --recursive, due to mishandling of carriage returns in .gitmodules. Affects GitHub Desktop too. Update now.

dgl.cx/2025/07/git-clone-submo

#GitSecurity #CVE2025 #RCE #Infosec

##

cR0w@infosec.exchange at 2025-07-08T18:31:56.000Z ##

Three new advisories in git.

github.com/git/git/security/ad

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout.

nvd.nist.gov/vuln/detail/CVE-2

github.com/git/git/security/ad

sev:HIGH 8.6 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.

This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution.

nvd.nist.gov/vuln/detail/CVE-2

github.com/git/git/security/ad

sev:MED 6.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

The wincred credential helper uses a static buffer (target) as a unique key for storing and comparing against internal storage. This credential helper does not properly bounds check the available space remaining in the buffer before appending to it with wcsncat(), leading to potential buffer overflows.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

hn50@social.lansky.name at 2025-07-08T18:10:06.000Z ##

CVE-2025-48384: Breaking Git with a carriage return and cloning RCE

Link: dgl.cx/2025/07/git-clone-submo
Discussion: news.ycombinator.com/item?id=4

#git

##

ycombinator@rss-mstdn.studiofreesia.com at 2025-07-08T18:06:33.000Z ##

CVE-2025-48384: Breaking Git with a carriage return and cloning RCE
dgl.cx/2025/07/git-clone-submo
#ycombinator

##

newsycombinator@framapiaf.org at 2025-07-08T18:00:58.000Z ##

CVE-2025-48384: Breaking Git with a carriage return and cloning RCE
Link: dgl.cx/2025/07/git-clone-submo
Comments: news.ycombinator.com/item?id=4

##

h4ckernews@mastodon.social at 2025-07-08T17:50:59.000Z ##

CVE-2025-48384: Breaking Git with a carriage return and cloning RCE

dgl.cx/2025/07/git-clone-submo

#HackerNews #CVE202548384 #Git #Vulnerability #RCE #Cybersecurity #Exploit

##

CVE-2025-53629
(0 None)

EPSS: 0.04%

1 posts

N/A

cR0w@infosec.exchange at 2025-07-10T20:06:30.000Z ##

CVE-2025-53628

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.20.1, cpp-httplib does not have a limit for a unique line, permitting an attacker to explore this to allocate memory arbitrarily. This vulnerability is fixed in 0.20.1. NOTE: This vulnerability is related to CVE-2025-53629.

CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')

infosec.exchange/@cR0w/1148307

##

CVE-2025-53628
(0 None)

EPSS: 0.04%

1 posts

N/A

cR0w@infosec.exchange at 2025-07-10T20:06:30.000Z ##

CVE-2025-53628

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.20.1, cpp-httplib does not have a limit for a unique line, permitting an attacker to explore this to allocate memory arbitrarily. This vulnerability is fixed in 0.20.1. NOTE: This vulnerability is related to CVE-2025-53629.

CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')

infosec.exchange/@cR0w/1148307

##

CVE-2025-53542
(0 None)

EPSS: 0.02%

1 posts

N/A

cR0w@infosec.exchange at 2025-07-10T18:39:50.000Z ##

Go hack more Kubernetes shit.

github.com/kubernetes-sigs/hea

sev:HIGH 7.8 - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

An attacker who can control any of the affected environment variables can execute arbitrary shell commands on the macOS build system during the packaging process. This is particularly impactful in CI/CD environments where workflows might automatically set environment variables or build unsigned packages without strict checks.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-48385
(0 None)

EPSS: 0.08%

3 posts

N/A

dgl@infosec.exchange at 2025-07-09T13:01:37.000Z ##

@stsp thanks! Agree, definitely would limit the possibility of code execution; although I'd be careful saying "fairly harmless", consider some sort of supply chain attack that drops an object file but covered by .gitignore. (This is less relevant with the submodule issue, as it's still covered by the submodule's checksum, but potentially more relevant for the other issue I found in bundle-uri -- CVE-2025-48385, luckily that one is not yet on by default).

##

jrt@infosec.exchange at 2025-07-08T19:18:45.000Z ##

Coordinated #git vuln disclosure:
lwn.net/ml/all/xmqq5xg2wrd1.fs

"CVE-2025-48385, Git:

When cloning a repository Git knows to optionally fetch a bundle
advertised by the remote server, which allows the server-side to
offload parts of the clone to a CDN. The Git client does not
perform sufficient validation of the advertised bundles, which
allows the remote side to perform protocol injection.

This protocol injection can cause the client to write the fetched
bundle to a location controlled by the adversary. The fetched
content is fully controlled by the server, which can in the worst
case lead to arbitrary code execution."

##

cR0w@infosec.exchange at 2025-07-08T18:31:56.000Z ##

Three new advisories in git.

github.com/git/git/security/ad

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout.

nvd.nist.gov/vuln/detail/CVE-2

github.com/git/git/security/ad

sev:HIGH 8.6 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.

This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution.

nvd.nist.gov/vuln/detail/CVE-2

github.com/git/git/security/ad

sev:MED 6.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

The wincred credential helper uses a static buffer (target) as a unique key for storing and comparing against internal storage. This credential helper does not properly bounds check the available space remaining in the buffer before appending to it with wcsncat(), leading to potential buffer overflows.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2025-1729
(0 None)

EPSS: 0.00%

2 posts

N/A

LCSC_IE@infosec.exchange at 2025-07-09T11:08:46.000Z ##

🟥𝐋𝐂𝐒𝐂-𝐈𝐄 𝐃𝐚𝐢𝐥𝐲 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐅𝐢𝐧𝐝𝐢𝐧𝐠𝐬-𝟗 𝐉𝐮𝐥𝐲 𝟐𝟎𝟐𝟓🟥

News:

1. NIS2 Revamps Ireland’s Cybersecurity Landscape: Old Regulators, New Powers

jdsupra.com/legalnews/ireland-

2. Russian actors suspected of AI deepfakes impersonating US State Secretary Marco Rubio

cybernews.com/security/marco-r

3. Hackers Target Employee Credentials Amid Spike in ID Attacks

infosecurity-magazine.com/news

4. Sanctions Imposed on DPRK IT Workers Generating Revenue for the Kim Regime

home.treasury.gov/news/press-r

5. M&S Chair Details Ransomware Attack, Declines to Confirm if Payment Was Made

committees.parliament.uk/event

6. Malicious Open Source Packages Surge 188% Annually

infosecurity-magazine.com/news

7. Microsoft fixes 130 bugs, 12 critical, in July Patch Tuesday release

scworld.com/news/microsoft-fix

8. Anatsa mobile malware returns to victimize North American bank customers

threatfabric.com/blogs/anatsa-

9. Gulf Bank Partners with CrowdStrike to Strengthen Cybersecurity in Kuwait

techafricanews.com/2025/07/09/

10. German defense faces major cyberattack as investigators trace Russian link

newsukraine.rbc.ua/news/german

---

Global Breaches and Data Leaks:

1. Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users Personal Information

nssol.nipponsteel.com/press/20

2. IES Communications notifies 6,000+ employees of data breach that compromised SSNs and payroll info

comparitech.com/news/ies-commu

---

Tactical Reports with IOCs:

1. Pay2Key’s Resurgence: Iranian Cyber Warfare Targets the West

engage.morphisec.com/hubfs/Pay

2. ClickFix Campaign: How Clipboard Injection Leads to RAT Infection (Part 2)

h3xstone.medium.com/clickfix-c

3. From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities

trellix.com/blogs/research/fro

4. Technical Analysis of Ducex: Packer of Triada Android Malware

any.run/cybersecurity-blog/duc

5. CoinMiner Attacks Exploiting GeoServer Vulnerability

asec.ahnlab.com/en/88917/

6. Gafgyt aka Bashlite Malware

rewterz.com/threat-advisory/ga

7. BlackMoon Banking Trojan aka KrBanker

rewterz.com/threat-advisory/bl

8. AsyncRAT

rewterz.com/threat-advisory/as

9. An Emerging Ducktail Infostealer

rewterz.com/threat-advisory/an

10. June 2025 Security Issues in Korean & Global Financial Sector

asec.ahnlab.com/en/88936/

11. Malicious pull request infects VS Code extension

reversinglabs.com/blog/malicio

12. Defending the Cloud: Stopping Cyber Threats in Azure and AWS with Darktrace

darktrace.com/blog/defending-t

---

APT IOCs:

1. Kimsuky
http://27.102.137[.]242
verifyserve.live-on[.]net
an.verifyserve.live-on[.]net

---

Threat Hunting / DFIR/ Malware:

1. GIFTEDCROOK’s Strategic Pivot: UAC-0226’s Espionage Surge Amid Ukraine’s Geopolitical Flashpoints

blog.alphahunt.io/giftedcrooks

2. BaitTrap: The Rise of Baiting News Sites behind online Investment Fraud

cdn.prod.website-files.com/66f

3. SafePay ransomware: Threat Profile and Analysis

porthas.com/blog/safepay-ranso

4. AmateraStealer Analysis

github.com/VenzoV/MalwareAnaly

5. Threat Actor Profile: Mustang Panda

blog.dexpose.io/threat-actor-p

6. CVE-2025-1729 - Privilege Escalation Using TPQMAssistant.exe

trustedsec.com/blog/cve-2025-1

7. Revisiting Cross Session Activation Attacks

r-tec.net/r-tec-blog-revisitin

8. Set Sail: Remote Code Execution in SailPoint IQService via Default Encryption Key

netspi.com/blog/technical-blog

9. TapTrap: Animation-Driven Tapjacking on Android

taptrap.click/usenix25_taptrap

10. Root Shell on Credit Card Terminal

stefan-gloor.ch/yomani-hack

---

Light Reading:

1. Mobilizing Cyber Power: The Growing Role of Cyber Militias in China’s Network Warfare Force Structure

margin.re/mobilizing-cyber-pow

margin.re/content/files/2025/0

margin.re/content/files/2025/0

2. The Urgent Cybersecurity Imperative for Europe’s Critical Sectors

medium.com/@laszlo.daniel/the-

3. The Cosmos Bank Cyber Attack: How Hackers Stole ?94 Crore in Minutes

medium.com/@lomasasodariya0007

4. Statistics Report on Malware Targeting Windows Database Servers in Q2 2025

asec.ahnlab.com/en/88920/

5. Statistics Report on Malware Targeting Windows Web Servers in Q2 2025

asec.ahnlab.com/en/88925/

6. Statistics Report on Malware Targeting Linux SSH Servers in Q2 2025

asec.ahnlab.com/en/88927/

7. Threat Group Intelligence Report: American Futurist (AmFut)

notion.so/stealthmole-intellig

---

##

_r_netsec@infosec.exchange at 2025-07-08T16:28:06.000Z ##

Privilege Escalation Using TPQMAssistant.exe on Lenovo trustedsec.com/blog/cve-2025-1

##

CVE-2025-44963
(0 None)

EPSS: 0.00%

1 posts

N/A

cR0w@infosec.exchange at 2025-07-08T19:55:01.000Z ##

Ruckus getting in on that sweet hardcoded secrets game.

kb.cert.org/vuls/id/613753

Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:

[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.

[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.

[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.

[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.

[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.

[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.

[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.

[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.

[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.

#patchTuesday

##

CVE-2025-6243
(0 None)

EPSS: 0.00%

1 posts

N/A

cR0w@infosec.exchange at 2025-07-08T19:55:01.000Z ##

Ruckus getting in on that sweet hardcoded secrets game.

kb.cert.org/vuls/id/613753

Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:

[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.

[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.

[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.

[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.

[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.

[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.

[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.

[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.

[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.

#patchTuesday

##

CVE-2025-44955
(0 None)

EPSS: 0.00%

1 posts

N/A

cR0w@infosec.exchange at 2025-07-08T19:55:01.000Z ##

Ruckus getting in on that sweet hardcoded secrets game.

kb.cert.org/vuls/id/613753

Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:

[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.

[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.

[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.

[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.

[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.

[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.

[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.

[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.

[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.

#patchTuesday

##

CVE-2025-44962
(0 None)

EPSS: 0.00%

1 posts

N/A

cR0w@infosec.exchange at 2025-07-08T19:55:01.000Z ##

Ruckus getting in on that sweet hardcoded secrets game.

kb.cert.org/vuls/id/613753

Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:

[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.

[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.

[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.

[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.

[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.

[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.

[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.

[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.

[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.

#patchTuesday

##

CVE-2025-44958
(0 None)

EPSS: 0.00%

1 posts

N/A

cR0w@infosec.exchange at 2025-07-08T19:55:01.000Z ##

Ruckus getting in on that sweet hardcoded secrets game.

kb.cert.org/vuls/id/613753

Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:

[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.

[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.

[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.

[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.

[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.

[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.

[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.

[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.

[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.

#patchTuesday

##

CVE-2025-44954
(0 None)

EPSS: 0.00%

1 posts

N/A

cR0w@infosec.exchange at 2025-07-08T19:55:01.000Z ##

Ruckus getting in on that sweet hardcoded secrets game.

kb.cert.org/vuls/id/613753

Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:

[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.

[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.

[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.

[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.

[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.

[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.

[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.

[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.

[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.

#patchTuesday

##

CVE-2025-44961
(0 None)

EPSS: 0.00%

1 posts

N/A

cR0w@infosec.exchange at 2025-07-08T19:55:01.000Z ##

Ruckus getting in on that sweet hardcoded secrets game.

kb.cert.org/vuls/id/613753

Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:

[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.

[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.

[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.

[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.

[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.

[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.

[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.

[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.

[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.

#patchTuesday

##

CVE-2025-44960
(0 None)

EPSS: 0.00%

1 posts

N/A

cR0w@infosec.exchange at 2025-07-08T19:55:01.000Z ##

Ruckus getting in on that sweet hardcoded secrets game.

kb.cert.org/vuls/id/613753

Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:

[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.

[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.

[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.

[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.

[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.

[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.

[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.

[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.

[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.

#patchTuesday

##

CVE-2025-44957
(0 None)

EPSS: 0.00%

1 posts

N/A

cR0w@infosec.exchange at 2025-07-08T19:55:01.000Z ##

Ruckus getting in on that sweet hardcoded secrets game.

kb.cert.org/vuls/id/613753

Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:

[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.

[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.

[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.

[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.

[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.

[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.

[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.

[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.

[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.

#patchTuesday

##

CVE-2025-48386
(0 None)

EPSS: 0.01%

1 posts

N/A

cR0w@infosec.exchange at 2025-07-08T18:31:56.000Z ##

Three new advisories in git.

github.com/git/git/security/ad

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout.

nvd.nist.gov/vuln/detail/CVE-2

github.com/git/git/security/ad

sev:HIGH 8.6 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.

This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution.

nvd.nist.gov/vuln/detail/CVE-2

github.com/git/git/security/ad

sev:MED 6.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

The wincred credential helper uses a static buffer (target) as a unique key for storing and comparing against internal storage. This credential helper does not properly bounds check the available space remaining in the buffer before appending to it with wcsncat(), leading to potential buffer overflows.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

Visit counter For Websites