Critical RCE in Ivanti Connect Secure Under Active Exploitation (CVE-2025-0282)

CRITICAL CVSS 9.0+
Threat Timeline: Critical RCE in Ivanti Connect Secure Under Active Exploitation (CVE-2025-0282)
📅
Disclosed
N/A
POC
N/A
🔥
Active
N/A
CVE-2025-0282 is a critical heap-based buffer overflow vulnerability residing in the web component of Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) gateways. An attacker can exploit this by sending specially crafted requests to the appliance, bypassing authentication to execute arbitrary code with root privileges. Because these appliances function as the primary entry point for remote access, exploitation grants attackers a significant foothold for lateral movement within the internal network. This vulnerability follows a pattern of high-frequency targeting against Ivanti edge devices by sophisticated threat actors. Ivanti and CISA have both confirmed active exploitation, and organizations are advised that traditional security layers may not detect the initial exploit traffic.

🛡️ Immediate Defense Action

1. Inventory all Ivanti ICS and IPS instances and verify current firmware versions. 2. Apply the official security patches provided by Ivanti immediately. 3. Run the Ivanti External Integrity Checker Tool (ICT) to identify potential post-exploitation artifacts. 4. Audit all administrative accounts and rotate credentials if the appliance was exposed. 5. Restrict management interface access to trusted internal IP ranges only.


Critical Apache Struts RCE (CVE-2024-53677): Public PoCs Trigger Immediate Patching Mandate

CRITICAL CVSS 9.0+
Threat Timeline: Critical Apache Struts RCE (CVE-2024-53677): Public PoCs Trigger Immediate Patching Mandate
📅
Disclosed
N/A
POC
N/A
🔥
Active
N/A
CVE-2024-53677 is a high-severity vulnerability affecting Apache Struts versions 2.0.0 through 2.5.32 and 6.0.0 through 6.3.0.1. The root cause lies in the FileUploadInterceptor, where improper validation of parameters allows an attacker to manipulate the upload path and file extension. By exploiting this, an adversary can upload a malicious JSP shell to a web-accessible directory, leading to unauthenticated Remote Code Execution (RCE). The recent release of functional Python-based exploit scripts on GitHub and their subsequent integration into the Nuclei vulnerability scanner significantly lowers the barrier for entry, enabling script kiddies and sophisticated threat actors alike to conduct mass scanning and exploitation.

🛡️ Immediate Defense Action

1. Upgrade to Apache Struts 6.4.0, 2.5.33, or later versions immediately. 2. Implement strict Web Application Firewall (WAF) rules to block path traversal sequences and JSP file uploads in multi-part requests. 3. Audit all web-accessible directories for unauthorized .jsp or .jspx files. 4. Disable file upload functionality if it is not a core requirement of the application.


Critical Rsync Information Disclosure (CVE-2024-12086) Under Active Exploitation

CRITICAL CVSS 9.0+
Threat Timeline: Critical Rsync Information Disclosure (CVE-2024-12086) Under Active Exploitation
📅
Disclosed
N/A
POC
N/A
🔥
Active
N/A
CVE-2024-12086 originates from an out-of-bounds read vulnerability within the rsync client's processing of file lists and checksums. By delivering a specially crafted response from a malicious or compromised rsync server, an attacker can induce the client to transmit adjacent memory segments. This memory can contain highly sensitive data, including session tokens, environment variables, and private keys. The threat landscape has escalated rapidly following the release of Nuclei templates that automate the identification of vulnerable endpoints, leading to widespread scanning of automated backup routines and CI/CD pipelines.

🛡️ Immediate Defense Action

Immediate action is required: Upgrade rsync to version 3.3.1 or higher across all systems. Audit internal scripts and cron jobs that utilize rsync to ensure they connect only to trusted, authenticated endpoints. Implement network-level egress filtering to restrict rsync traffic (port 873) to known-good IP addresses.


Public Exploit Released for Critical Realtek IoT Command Injection (CVE-2024-50623)

CRITICAL CVSS 9.0+
Threat Timeline: Public Exploit Released for Critical Realtek IoT Command Injection (CVE-2024-50623)
📅
Disclosed
N/A
POC
N/A
🔥
Active
N/A
CVE-2024-50623 targets a flaw in the input validation logic within the web server component of the Realtek SDK, which is utilized by hundreds of white-label manufacturers. The vulnerability is triggered by sending specially crafted HTTP requests to diagnostic or configuration endpoints, leading to full system compromise under root privileges. With functional Python-based exploit scripts now available on GitHub, the risk of mass exploitation by Mirai-like botnets has increased significantly. The supply-chain nature of this flaw means many secondary vendors have yet to release downstream patches for their specific branded hardware.

🛡️ Immediate Defense Action

1. Inventory all IoT and networking hardware to identify Realtek-based SDK usage. 2. Immediately disable WAN-side management access (HTTP/HTTPS) on all perimeter devices. 3. Deploy WAF rules or IDS signatures to detect suspicious command strings in URI parameters and POST bodies. 4. Isolate vulnerable IoT devices into dedicated VLANs with no access to internal corporate assets.


Critical GitLab Account Takeover Vulnerability (CVE-2024-11667) Targeted by Automated Exploits

CRITICAL CVSS 9.0+
Threat Timeline: Critical GitLab Account Takeover Vulnerability (CVE-2024-11667) Targeted by Automated Exploits
📅
Disclosed
N/A
POC
N/A
🔥
Active
N/A
CVE-2024-11667 involves a flaw in GitLab's authentication logic where sensitive password reset tokens are leaked to unauthorized parties or logged in accessible locations. This allows an attacker to intercept the token and reset the password of any user, including administrators, without requiring access to the user's email. The emergence of automated exploit tooling in the Metasploit framework indicates that weaponization is now accessible to a broader range of threat actors. This vulnerability mirrors previous high-impact GitLab flaws, emphasizing the critical nature of securing dev-ops infrastructure which often contains sensitive source code and production credentials.

🛡️ Immediate Defense Action

Apply the latest security updates provided by GitLab immediately. Enable and enforce Multi-Factor Authentication (MFA) for all users to mitigate the impact of compromised passwords. Review application logs for multiple password reset requests originating from unfamiliar IP addresses.


Critical Authorization Bypass in Microsoft Partner Center (CVE-2025-65041)

CRITICAL CVSS 9.0+
Threat Timeline: CVE-2025-65041
📅
Disclosed
2025-12-21
POC
None
🔥
Active
None

CVE-2025-65041 is a critical vulnerability (CVSS 10.0) resulting from improper authorization logic within the Microsoft Partner Center platform. The flaw allows an unauthenticated, remote attacker to bypass security checks and escalate privileges to an administrative level. Because Partner Center serves as a centralized control plane for Managed Service Providers (MSPs) and partners, this vulnerability represents a significant supply chain threat; an attacker could theoretically pivot from a compromised partner account to gain unauthorized access to any customer tenant managed through that partner.

Technical Analysis

The vulnerability stems from a failure in the backend authorization service to properly validate the identity and permissions of the requesting entity before performing sensitive administrative actions. An attacker could craft specific network requests that exploit this logical breakdown, effectively tricking the system into granting high-level access without valid credentials. While Microsoft manages the infrastructure for Partner Center and has applied service-side mitigations, the risk of retrospective exploitation or the use of compromised credentials to maintain persistence remains a concern for large-scale enterprise partners.

Detection

Security teams should monitor Entra ID (Azure AD) and Partner Center audit logs for unauthorized role assignments or unusual API calls. Use the following KQL query to identify unexpected administrative role changes:

AuditLogs | where OperationName in ("Add member to role", "Update role definition") | where TargetResources has "Partner Center" | extend InitiatedBy = tostring(InitiatedBy.user.userPrincipalName) | project TimeGenerated, OperationName, InitiatedBy, TargetResources

Mitigation

As this is a hosted service, Microsoft has implemented backend patches to address the root cause. However, administrators should perform a comprehensive security audit of their Partner Center environment. Key steps include enforcing Multi-Factor Authentication (MFA) for all partner accounts, reviewing the list of 'Global Admin' and 'Admin Agent' roles, and ensuring that no unauthorized partner-to-customer relationships have been established during the window of vulnerability.

🛡️ Immediate Defense Action

Perform a mandatory audit of all Microsoft Partner Center administrative roles and review audit logs for unauthorized membership changes occurring between December 1, 2025, and the present.


Critical Sandbox Breakout RCE in n8n (CVE-2025-68613)

CRITICAL CVSS 9.0+
Threat Timeline: CVE-2025-68613
📅
Disclosed
2025-12-21
POC
2025-12-21
🔥
Active
N/A

A maximum-severity vulnerability (CVE-2025-68613) has been disclosed in the n8n workflow automation platform, affecting versions from 0.211.0 up to 1.120.3. The flaw resides in the platform's workflow expression evaluation engine, where input from authenticated users is not sufficiently isolated from the underlying runtime. This allows an attacker with valid credentials to escape the JavaScript sandbox and execute arbitrary shell commands with the privileges of the n8n process.

Technical Analysis

The vulnerability stems from insecure handling of template expressions within n8n nodes and API endpoints. By crafting a malicious expression, an attacker can access sensitive Node.js global objects and utilize the child_process module to spawn shell commands. Because n8n often holds extensive API keys, database credentials, and internal network access, a successful compromise provides a high-value foothold for lateral movement.

Detection

Security teams should monitor for unusual process activity originating from the n8n service, specifically any unexpected child processes like /bin/sh, /bin/bash, or cmd.exe. Review n8n audit logs for workflow updates or manual executions containing suspicious JavaScript patterns:

process.binding('spawn_sync')
require('child_process')
this.constructor.constructor('return process')()

Mitigation

The vendor has released patches in versions 1.120.4, 1.121.1, and 1.122.0. If immediate patching is not possible, restrict workflow creation and editing permissions to high-trust administrators and ensure the n8n instance is running in a low-privilege container with restricted network egress.

🛡️ Immediate Defense Action

Upgrade n8n to version 1.122.0, 1.121.1, or 1.120.4 immediately and audit all recently modified workflows for unauthorized command blocks.


WatchGuard Fireware RCE: Active Exploitation of CVE-2025-14733 in IKEv2 VPN

CRITICAL CVSS 9.0+
Threat Timeline: CVE-2025-14733
📅
Disclosed
2025-12-19
POC
None
🔥
Active
2025-12-19

Vulnerability Overview

CVE-2025-14733 is a critical out-of-bounds write vulnerability identified in the Internet Key Exchange (IKE) daemon (iked) of WatchGuard Fireware OS. The vulnerability occurs during the processing of specially crafted IKEv2 packets. Because the iked process runs with high privileges to manage VPN tunnels, a successful exploit allows an unauthenticated remote attacker to gain root-level execution on the appliance.

Technical Deep Dive

The flaw is rooted in insufficient bounds checking when the iked process handles payload headers or security associations within the IKEv2 protocol stack. Attackers can trigger a memory corruption state by sending a sequence of malformed packets during the initial key exchange phase. This bypasses authentication requirements, as the vulnerability is triggered before the VPN session is fully established. Reports indicate that active exploitation is targeting internet-facing Firebox appliances with IKEv2 enabled.

Impact and Risk

Successful exploitation provides the attacker with full control over the perimeter security device. This enables traffic interception, credential theft, and lateral movement into the protected internal network. Given its position at the network edge, this vulnerability represents a Tier-1 threat to organizational infrastructure.

Detection & Indicators

Organizations should monitor system logs for frequent or unexpected restarts of the iked process, which may indicate failed exploit attempts. Look for log entries similar to:

iked: process crashed with SIGSEGV

Additionally, inspect network traffic for an unusual volume of IKEv2 (UDP 500/4500) negotiation failures originating from unknown external IP addresses.

🛡️ Immediate Defense Action

Immediately upgrade WatchGuard Firebox appliances to Fireware OS versions 12.10.5, 12.11.2, or 12.1.3 Update 10. If patching is not immediately possible, consider disabling IKEv2 VPN services as a temporary workaround.


Critical Unauthenticated RCE in HPE OneView (CVE-2025-37164) with Public PoC

CRITICAL CVSS 9.0+
Threat Timeline: CVE-2025-37164
📅
Disclosed
2025-12-17
POC
2025-12-19
🔥
Active
None

Overview

CVE-2025-37164 is a maximum-severity vulnerability in HPE OneView IT infrastructure management software. The flaw allows a remote, unauthenticated attacker to execute arbitrary code on the underlying appliance by sending a specially crafted HTTP request. Given OneView's role in managing servers, storage, and networking, a compromise here grants an attacker 'keys to the kingdom' access across the data center.

Technical Deep Dive

The vulnerability originates from an insecure endpoint in the management API that fails to properly validate input before passing it to a system-level execution context. By leveraging a single POST request to the affected URI, an attacker can bypass authentication mechanisms and trigger a command injection or unsafe deserialization flow. Because the OneView appliance typically runs with elevated privileges to manage physical hardware, successful exploitation results in total root-level control of the management plane.

Detection

Organizations should monitor web server logs for suspicious activity directed at the OneView management interface. Specifically, look for high-frequency or anomalous requests to internal API paths occurring without associated authentication headers.

grep -E 'POST /rest/.* HTTP/1.1" 200' /var/log/ci/appliance_web.log

Remediation

HPE has released emergency security updates to address this flaw. Administrators should immediately upgrade OneView instances to the latest patched version. In the interim, ensure the management interface is not exposed to the public internet and restrict access to trusted administrative subnets using Access Control Lists (ACLs).

🛡️ Immediate Defense Action

Immediately apply the official HPE security patch for OneView and restrict the management interface to internal, trusted networks only.


Cisco Zero-Day: APT UAT-9686 Exploiting Secure Email Gateways for Root Access

CRITICAL CVSS 9.0+
Threat Timeline: CVE-2025-20393
📅
Disclosed
2025-12-18
POC
None
🔥
Active
2025-11-25

Technical Analysis

CVE-2025-20393 is a command injection vulnerability residing in the command-line interface (CLI) of Cisco AsyncOS. The vulnerability stems from improper validation of user-supplied input when processing specific configuration commands. A remote, unauthenticated attacker can exploit this by sending crafted packets or utilizing specific CLI strings to escape the restricted shell environment, granting them full root access to the underlying FreeBSD-based operating system.

Threat Intelligence: UAT-9686

The exploitation has been attributed to UAT-9686, a sophisticated state-sponsored group linked to China. Intelligence indicates that the group has been utilizing this zero-day since late November 2025 to install persistence mechanisms, such as custom web shells and backdoors, specifically targeting government and high-value corporate entities. Their objective appears to be the long-term monitoring of sensitive communications and the exfiltration of mail spools.

Detection & Indicators

Security teams should monitor for the following anomalies:

  • Unauthorized modifications to the /etc/passwd or /etc/shadow files.
  • Unusual system logs indicating root login via the cli process.
  • Inbound connections to the management interface from unknown IP ranges.

Run the following command in the diagnostic shell to check for suspicious active processes:

# Check for unauthorized shells or network listeners shell ps auxww | grep -E 'sh|python|perl|nc'

🛡️ Immediate Defense Action

Immediately upgrade Cisco AsyncOS to the fixed releases (15.5.1-095 or higher) and rotate all administrative credentials and SSH keys on the device.


CVE-2024-55591: FortiClientMac Insecure Credential Storage Vulnerability

CRITICAL CVSS 9.0+
Threat Timeline: CVE-2024-55591
📅
Disclosed
2024-12-21
POC
2024-12-22
🔥
Active
None

Vulnerability Analysis

CVE-2024-55591 is an information disclosure vulnerability within FortiClientMac. The flaw arises from the application's failure to adequately protect sensitive authentication data stored locally. An attacker with local access—either through a shared workstation or a secondary malware infection—can bypass intended access controls to read cryptographic secrets, session tokens, or plaintext VPN credentials.

Technical Details

The core of the issue lies in insecure storage mechanisms. Analysis indicates that sensitive data may be written to local configuration files or temporary directories (such as ~/Library/Application Support/Fortinet/FortiClient/) with overly permissive file descriptors. Furthermore, the vulnerability may involve failure to zero-out credentials in memory, allowing they to be harvested via local memory dumps. An attacker can leverage these secrets to establish unauthorized VPN tunnels, facilitating lateral movement within the victim's network.

Impact and Mitigation

While the exploit requires local authenticated access, the risk is high for enterprise environments where endpoint security is a primary defense layer. The release of a PoC within 24 hours of disclosure significantly increases the likelihood of exploitation by automated malware or malicious insiders.

Targeted Path: /Library/Application Support/Fortinet/FortiClient/logs/

🛡️ Immediate Defense Action

Immediately upgrade FortiClientMac to version 7.4.1, 7.2.5, or the latest available security release.


Zero-Day Alert: CVE-2024-44308 WebKit Use-After-Free Actively Exploited

CRITICAL CVSS 9.0+
Threat Timeline: CVE-2024-44308
📅
Disclosed
2024-11-19
POC
2024-11-20
🔥
Active
2024-12-21

Technical Analysis

CVE-2024-44308 is a high-severity Use-After-Free (UAF) vulnerability within JavaScriptCore, the JavaScript engine used by WebKit. The flaw is specifically tied to the Data Flow Graph (DFG) Just-In-Time (JIT) compiler. It arises from improper memory management during the allocation and deallocation of registers, specifically a corruption issue involving the scratch2GPR register. By serving a victim a specially crafted website, an attacker can trigger this memory corruption to gain control of the execution flow.

Exploitation Mechanics

The vulnerability allows for remote code execution (RCE) in the context of the browser process. In typical exploit chains, this RCE is used as an initial entry point, often followed by a separate sandbox escape vulnerability (such as CVE-2024-44309) to compromise the underlying operating system. The JavaScriptCore engine fails to properly validate the state of memory objects before use, allowing the execution of attacker-controlled payloads via a 'drive-by' download vector.

// Conceptual JIT Trigger Path
function trigger_jit(obj) {
// Force DFG JIT compilation
for (let i = 0; i < 100000; i++) {
obj.prop = "A".repeat(i % 64);
}
}

Current Threat Landscape

This vulnerability was identified by Google's Threat Analysis Group (TAG) and confirmed by Apple to be under active exploitation. It has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog. While initial reports focused on Intel-based Mac systems, the underlying WebKit flaw affects all platforms utilizing the engine, including iOS, iPadOS, and visionOS.

🛡️ Immediate Defense Action

Immediately update all Apple devices to iOS 18.1.1, iOS 17.7.2, and macOS Sequoia 15.1.1.


CVE-2024-12543: Critical Unauthenticated RCE in Themeisle Content Blocks Plugin

CRITICAL CVSS 9.0+

Keep Reading