Critical RCE in Ivanti Connect Secure Under Active Exploitation (CVE-2025-0282)
N/A
N/A
N/A
🛡️ Immediate Defense Action
1. Inventory all Ivanti ICS and IPS instances and verify current firmware versions. 2. Apply the official security patches provided by Ivanti immediately. 3. Run the Ivanti External Integrity Checker Tool (ICT) to identify potential post-exploitation artifacts. 4. Audit all administrative accounts and rotate credentials if the appliance was exposed. 5. Restrict management interface access to trusted internal IP ranges only.
Critical Apache Struts RCE (CVE-2024-53677): Public PoCs Trigger Immediate Patching Mandate
N/A
N/A
N/A
🛡️ Immediate Defense Action
1. Upgrade to Apache Struts 6.4.0, 2.5.33, or later versions immediately. 2. Implement strict Web Application Firewall (WAF) rules to block path traversal sequences and JSP file uploads in multi-part requests. 3. Audit all web-accessible directories for unauthorized .jsp or .jspx files. 4. Disable file upload functionality if it is not a core requirement of the application.
Critical Rsync Information Disclosure (CVE-2024-12086) Under Active Exploitation
N/A
N/A
N/A
🛡️ Immediate Defense Action
Immediate action is required: Upgrade rsync to version 3.3.1 or higher across all systems. Audit internal scripts and cron jobs that utilize rsync to ensure they connect only to trusted, authenticated endpoints. Implement network-level egress filtering to restrict rsync traffic (port 873) to known-good IP addresses.
Public Exploit Released for Critical Realtek IoT Command Injection (CVE-2024-50623)
N/A
N/A
N/A
🛡️ Immediate Defense Action
1. Inventory all IoT and networking hardware to identify Realtek-based SDK usage. 2. Immediately disable WAN-side management access (HTTP/HTTPS) on all perimeter devices. 3. Deploy WAF rules or IDS signatures to detect suspicious command strings in URI parameters and POST bodies. 4. Isolate vulnerable IoT devices into dedicated VLANs with no access to internal corporate assets.
Critical GitLab Account Takeover Vulnerability (CVE-2024-11667) Targeted by Automated Exploits
N/A
N/A
N/A
🛡️ Immediate Defense Action
Apply the latest security updates provided by GitLab immediately. Enable and enforce Multi-Factor Authentication (MFA) for all users to mitigate the impact of compromised passwords. Review application logs for multiple password reset requests originating from unfamiliar IP addresses.
Critical Authorization Bypass in Microsoft Partner Center (CVE-2025-65041)
2025-12-21
None
None
CVE-2025-65041 is a critical vulnerability (CVSS 10.0) resulting from improper authorization logic within the Microsoft Partner Center platform. The flaw allows an unauthenticated, remote attacker to bypass security checks and escalate privileges to an administrative level. Because Partner Center serves as a centralized control plane for Managed Service Providers (MSPs) and partners, this vulnerability represents a significant supply chain threat; an attacker could theoretically pivot from a compromised partner account to gain unauthorized access to any customer tenant managed through that partner.
Technical Analysis
The vulnerability stems from a failure in the backend authorization service to properly validate the identity and permissions of the requesting entity before performing sensitive administrative actions. An attacker could craft specific network requests that exploit this logical breakdown, effectively tricking the system into granting high-level access without valid credentials. While Microsoft manages the infrastructure for Partner Center and has applied service-side mitigations, the risk of retrospective exploitation or the use of compromised credentials to maintain persistence remains a concern for large-scale enterprise partners.
Detection
Security teams should monitor Entra ID (Azure AD) and Partner Center audit logs for unauthorized role assignments or unusual API calls. Use the following KQL query to identify unexpected administrative role changes:
AuditLogs
| where OperationName in ("Add member to role", "Update role definition")
| where TargetResources has "Partner Center"
| extend InitiatedBy = tostring(InitiatedBy.user.userPrincipalName)
| project TimeGenerated, OperationName, InitiatedBy, TargetResourcesMitigation
As this is a hosted service, Microsoft has implemented backend patches to address the root cause. However, administrators should perform a comprehensive security audit of their Partner Center environment. Key steps include enforcing Multi-Factor Authentication (MFA) for all partner accounts, reviewing the list of 'Global Admin' and 'Admin Agent' roles, and ensuring that no unauthorized partner-to-customer relationships have been established during the window of vulnerability.
🛡️ Immediate Defense Action
Perform a mandatory audit of all Microsoft Partner Center administrative roles and review audit logs for unauthorized membership changes occurring between December 1, 2025, and the present.
Critical Sandbox Breakout RCE in n8n (CVE-2025-68613)
2025-12-21
2025-12-21
N/A
A maximum-severity vulnerability (CVE-2025-68613) has been disclosed in the n8n workflow automation platform, affecting versions from 0.211.0 up to 1.120.3. The flaw resides in the platform's workflow expression evaluation engine, where input from authenticated users is not sufficiently isolated from the underlying runtime. This allows an attacker with valid credentials to escape the JavaScript sandbox and execute arbitrary shell commands with the privileges of the n8n process.
Technical Analysis
The vulnerability stems from insecure handling of template expressions within n8n nodes and API endpoints. By crafting a malicious expression, an attacker can access sensitive Node.js global objects and utilize the child_process module to spawn shell commands. Because n8n often holds extensive API keys, database credentials, and internal network access, a successful compromise provides a high-value foothold for lateral movement.
Detection
Security teams should monitor for unusual process activity originating from the n8n service, specifically any unexpected child processes like /bin/sh, /bin/bash, or cmd.exe. Review n8n audit logs for workflow updates or manual executions containing suspicious JavaScript patterns:
process.binding('spawn_sync')
require('child_process')
this.constructor.constructor('return process')()Mitigation
The vendor has released patches in versions 1.120.4, 1.121.1, and 1.122.0. If immediate patching is not possible, restrict workflow creation and editing permissions to high-trust administrators and ensure the n8n instance is running in a low-privilege container with restricted network egress.
🛡️ Immediate Defense Action
Upgrade n8n to version 1.122.0, 1.121.1, or 1.120.4 immediately and audit all recently modified workflows for unauthorized command blocks.
WatchGuard Fireware RCE: Active Exploitation of CVE-2025-14733 in IKEv2 VPN
2025-12-19
None
2025-12-19
Vulnerability Overview
CVE-2025-14733 is a critical out-of-bounds write vulnerability identified in the Internet Key Exchange (IKE) daemon (iked) of WatchGuard Fireware OS. The vulnerability occurs during the processing of specially crafted IKEv2 packets. Because the iked process runs with high privileges to manage VPN tunnels, a successful exploit allows an unauthenticated remote attacker to gain root-level execution on the appliance.
Technical Deep Dive
The flaw is rooted in insufficient bounds checking when the iked process handles payload headers or security associations within the IKEv2 protocol stack. Attackers can trigger a memory corruption state by sending a sequence of malformed packets during the initial key exchange phase. This bypasses authentication requirements, as the vulnerability is triggered before the VPN session is fully established. Reports indicate that active exploitation is targeting internet-facing Firebox appliances with IKEv2 enabled.
Impact and Risk
Successful exploitation provides the attacker with full control over the perimeter security device. This enables traffic interception, credential theft, and lateral movement into the protected internal network. Given its position at the network edge, this vulnerability represents a Tier-1 threat to organizational infrastructure.
Detection & Indicators
Organizations should monitor system logs for frequent or unexpected restarts of the iked process, which may indicate failed exploit attempts. Look for log entries similar to:
iked: process crashed with SIGSEGVAdditionally, inspect network traffic for an unusual volume of IKEv2 (UDP 500/4500) negotiation failures originating from unknown external IP addresses.
🛡️ Immediate Defense Action
Immediately upgrade WatchGuard Firebox appliances to Fireware OS versions 12.10.5, 12.11.2, or 12.1.3 Update 10. If patching is not immediately possible, consider disabling IKEv2 VPN services as a temporary workaround.
Critical Unauthenticated RCE in HPE OneView (CVE-2025-37164) with Public PoC
2025-12-17
2025-12-19
None
Overview
CVE-2025-37164 is a maximum-severity vulnerability in HPE OneView IT infrastructure management software. The flaw allows a remote, unauthenticated attacker to execute arbitrary code on the underlying appliance by sending a specially crafted HTTP request. Given OneView's role in managing servers, storage, and networking, a compromise here grants an attacker 'keys to the kingdom' access across the data center.
Technical Deep Dive
The vulnerability originates from an insecure endpoint in the management API that fails to properly validate input before passing it to a system-level execution context. By leveraging a single POST request to the affected URI, an attacker can bypass authentication mechanisms and trigger a command injection or unsafe deserialization flow. Because the OneView appliance typically runs with elevated privileges to manage physical hardware, successful exploitation results in total root-level control of the management plane.
Detection
Organizations should monitor web server logs for suspicious activity directed at the OneView management interface. Specifically, look for high-frequency or anomalous requests to internal API paths occurring without associated authentication headers.
grep -E 'POST /rest/.* HTTP/1.1" 200' /var/log/ci/appliance_web.logRemediation
HPE has released emergency security updates to address this flaw. Administrators should immediately upgrade OneView instances to the latest patched version. In the interim, ensure the management interface is not exposed to the public internet and restrict access to trusted administrative subnets using Access Control Lists (ACLs).
🛡️ Immediate Defense Action
Immediately apply the official HPE security patch for OneView and restrict the management interface to internal, trusted networks only.
Cisco Zero-Day: APT UAT-9686 Exploiting Secure Email Gateways for Root Access
2025-12-18
None
2025-11-25
Technical Analysis
CVE-2025-20393 is a command injection vulnerability residing in the command-line interface (CLI) of Cisco AsyncOS. The vulnerability stems from improper validation of user-supplied input when processing specific configuration commands. A remote, unauthenticated attacker can exploit this by sending crafted packets or utilizing specific CLI strings to escape the restricted shell environment, granting them full root access to the underlying FreeBSD-based operating system.
Threat Intelligence: UAT-9686
The exploitation has been attributed to UAT-9686, a sophisticated state-sponsored group linked to China. Intelligence indicates that the group has been utilizing this zero-day since late November 2025 to install persistence mechanisms, such as custom web shells and backdoors, specifically targeting government and high-value corporate entities. Their objective appears to be the long-term monitoring of sensitive communications and the exfiltration of mail spools.
Detection & Indicators
Security teams should monitor for the following anomalies:
- Unauthorized modifications to the
/etc/passwdor/etc/shadowfiles. - Unusual system logs indicating
rootlogin via thecliprocess. - Inbound connections to the management interface from unknown IP ranges.
Run the following command in the diagnostic shell to check for suspicious active processes:
# Check for unauthorized shells or network listeners
shell
ps auxww | grep -E 'sh|python|perl|nc'
🛡️ Immediate Defense Action
Immediately upgrade Cisco AsyncOS to the fixed releases (15.5.1-095 or higher) and rotate all administrative credentials and SSH keys on the device.
CVE-2024-55591: FortiClientMac Insecure Credential Storage Vulnerability
2024-12-21
2024-12-22
None
Vulnerability Analysis
CVE-2024-55591 is an information disclosure vulnerability within FortiClientMac. The flaw arises from the application's failure to adequately protect sensitive authentication data stored locally. An attacker with local access—either through a shared workstation or a secondary malware infection—can bypass intended access controls to read cryptographic secrets, session tokens, or plaintext VPN credentials.
Technical Details
The core of the issue lies in insecure storage mechanisms. Analysis indicates that sensitive data may be written to local configuration files or temporary directories (such as ~/Library/Application Support/Fortinet/FortiClient/) with overly permissive file descriptors. Furthermore, the vulnerability may involve failure to zero-out credentials in memory, allowing they to be harvested via local memory dumps. An attacker can leverage these secrets to establish unauthorized VPN tunnels, facilitating lateral movement within the victim's network.
Impact and Mitigation
While the exploit requires local authenticated access, the risk is high for enterprise environments where endpoint security is a primary defense layer. The release of a PoC within 24 hours of disclosure significantly increases the likelihood of exploitation by automated malware or malicious insiders.
Targeted Path: /Library/Application Support/Fortinet/FortiClient/logs/
🛡️ Immediate Defense Action
Immediately upgrade FortiClientMac to version 7.4.1, 7.2.5, or the latest available security release.
Zero-Day Alert: CVE-2024-44308 WebKit Use-After-Free Actively Exploited
2024-11-19
2024-11-20
2024-12-21
Technical Analysis
CVE-2024-44308 is a high-severity Use-After-Free (UAF) vulnerability within JavaScriptCore, the JavaScript engine used by WebKit. The flaw is specifically tied to the Data Flow Graph (DFG) Just-In-Time (JIT) compiler. It arises from improper memory management during the allocation and deallocation of registers, specifically a corruption issue involving the scratch2GPR register. By serving a victim a specially crafted website, an attacker can trigger this memory corruption to gain control of the execution flow.
Exploitation Mechanics
The vulnerability allows for remote code execution (RCE) in the context of the browser process. In typical exploit chains, this RCE is used as an initial entry point, often followed by a separate sandbox escape vulnerability (such as CVE-2024-44309) to compromise the underlying operating system. The JavaScriptCore engine fails to properly validate the state of memory objects before use, allowing the execution of attacker-controlled payloads via a 'drive-by' download vector.
// Conceptual JIT Trigger Path
function trigger_jit(obj) {
// Force DFG JIT compilation
for (let i = 0; i < 100000; i++) {
obj.prop = "A".repeat(i % 64);
}
}Current Threat Landscape
This vulnerability was identified by Google's Threat Analysis Group (TAG) and confirmed by Apple to be under active exploitation. It has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog. While initial reports focused on Intel-based Mac systems, the underlying WebKit flaw affects all platforms utilizing the engine, including iOS, iPadOS, and visionOS.
🛡️ Immediate Defense Action
Immediately update all Apple devices to iOS 18.1.1, iOS 17.7.2, and macOS Sequoia 15.1.1.