Critical RCE in Ivanti Connect Secure Under Active Exploitation (CVE-2025-0282)

[CRITICAL]

Ivanti has issued an urgent advisory for a critical heap overflow vulnerability (CVE-2025-0282) affecting Connect Secure and Policy Secure gateways. The flaw allows unauthenticated remote code execution (RCE) and is currently being exploited in the wild. Immediate patching is required to prevent full system compromise.

🚨 ACTION: 1. Inventory all Ivanti ICS and IPS instances and verify current firmware versions. 2. Apply the official security patches provided by Ivanti immediately. 3. Run the Ivanti External Integrity Checker Tool (ICT) to identify potential post-exploitation artifacts. 4. Audit all administrative accounts and rotate credentials if the appliance was exposed. 5. Restrict management interface access to trusted internal IP ranges only.

Read Full Technical Analysis →

Critical Apache Struts RCE (CVE-2024-53677): Public PoCs Trigger Immediate Patching Mandate

[CRITICAL]

A critical remote code execution vulnerability in Apache Struts (CVE-2024-53677) is currently under active threat after the release of public PoC scripts and Nuclei templates. The flaw allows attackers to bypass file upload restrictions to gain full system control. Immediate patching is required.

🚨 ACTION: 1. Upgrade to Apache Struts 6.4.0, 2.5.33, or later versions immediately. 2. Implement strict Web Application Firewall (WAF) rules to block path traversal sequences and JSP file uploads in multi-part requests. 3. Audit all web-accessible directories for unauthorized .jsp or .jspx files. 4. Disable file upload functionality if it is not a core requirement of the application.

Read Full Technical Analysis →

Critical Rsync Information Disclosure (CVE-2024-12086) Under Active Exploitation

[CRITICAL]

A severe information disclosure vulnerability in rsync (CVE-2024-12086) is being targeted by attackers using weaponized Nuclei templates. The flaw allows for the leakage of sensitive memory contents from the rsync client, potentially exposing credentials and cryptographic keys.

🚨 ACTION: Immediate action is required: Upgrade rsync to version 3.3.1 or higher across all systems. Audit internal scripts and cron jobs that utilize rsync to ensure they connect only to trusted, authenticated endpoints. Implement network-level egress filtering to restrict rsync traffic (port 873) to known-good IP addresses.

Read Full Technical Analysis →

Public Exploit Released for Critical Realtek IoT Command Injection (CVE-2024-50623)

[CRITICAL]

A functional exploit for CVE-2024-50623, a critical command injection vulnerability in Realtek-based IoT firmware, has been published to public repositories within the last 24 hours. This vulnerability allows unauthenticated remote attackers to execute arbitrary commands on a wide range of IoT devices, including routers and IP cameras. Organizations should immediately audit their hardware inventory for Realtek-based chips and restrict network access to management interfaces.

🚨 ACTION: 1. Inventory all IoT and networking hardware to identify Realtek-based SDK usage. 2. Immediately disable WAN-side management access (HTTP/HTTPS) on all perimeter devices. 3. Deploy WAF rules or IDS signatures to detect suspicious command strings in URI parameters and POST bodies. 4. Isolate vulnerable IoT devices into dedicated VLANs with no access to internal corporate assets.

Read Full Technical Analysis →

Critical GitLab Account Takeover Vulnerability (CVE-2024-11667) Targeted by Automated Exploits

[CRITICAL]

A critical vulnerability in GitLab (CVE-2024-11667) allows for unauthorized account takeover through password reset token leakage. With the recent submission of a Metasploit module to automate exploitation, the risk to self-managed instances has escalated to critical status.

🚨 ACTION: Apply the latest security updates provided by GitLab immediately. Enable and enforce Multi-Factor Authentication (MFA) for all users to mitigate the impact of compromised passwords. Review application logs for multiple password reset requests originating from unfamiliar IP addresses.

Read Full Technical Analysis →

Critical Authorization Bypass in Microsoft Partner Center (CVE-2025-65041)

[CRITICAL]

Microsoft has disclosed a critical improper authorization vulnerability in the Partner Center platform, tracked as CVE-2025-65041, which allows unauthenticated remote attackers to achieve full privilege escalation. This flaw poses a severe supply chain risk by potentially granting attackers control over partner accounts and downstream customer tenants. Organizations are advised to immediately audit administrative access logs and enforce strict least-privilege policies.

🚨 ACTION: Perform a mandatory audit of all Microsoft Partner Center administrative roles and review audit logs for unauthorized membership changes occurring between December 1, 2025, and the present.

Read Full Technical Analysis →

Critical Sandbox Breakout RCE in n8n (CVE-2025-68613)

[CRITICAL]

A critical remote code execution (RCE) vulnerability, CVE-2025-68613, has been identified in n8n workflow automation software, allowing authenticated attackers to execute system commands. With public proof-of-concept exploits now available, attackers can bypass the execution sandbox via vulnerable API endpoints and workflow expressions. Organizations should immediately update n8n to version 1.122.0 or later to prevent full system compromise and data exfiltration.

🚨 ACTION: Upgrade n8n to version 1.122.0, 1.121.1, or 1.120.4 immediately and audit all recently modified workflows for unauthorized command blocks.

Read Full Technical Analysis →

WatchGuard Fireware RCE: Active Exploitation of CVE-2025-14733 in IKEv2 VPN

[CRITICAL]

A critical out-of-bounds write vulnerability in the WatchGuard Fireware OS 'iked' process is currently being exploited in the wild. This flaw allows unauthenticated remote attackers to execute arbitrary code on Firebox devices specifically configured for IKEv2 VPN services. Immediate firmware updates are required to mitigate the risk of full device compromise and network intrusion.

🚨 ACTION: Immediately upgrade WatchGuard Firebox appliances to Fireware OS versions 12.10.5, 12.11.2, or 12.1.3 Update 10. If patching is not immediately possible, consider disabling IKEv2 VPN services as a temporary workaround.

Read Full Technical Analysis →

Critical Unauthenticated RCE in HPE OneView (CVE-2025-37164) with Public PoC

[CRITICAL]

A maximum-severity unauthenticated Remote Code Execution vulnerability (CVE-2025-37164) has been disclosed in HPE OneView, enabling full system compromise via a single HTTP request. While active exploitation is currently unconfirmed, a functional Proof-of-Concept (PoC) was released on December 19, drastically lowering the barrier for attackers. Immediate patching is mandatory to prevent unauthorized access to core IT infrastructure management systems.

🚨 ACTION: Immediately apply the official HPE security patch for OneView and restrict the management interface to internal, trusted networks only.

Read Full Technical Analysis →

Cisco Zero-Day: APT UAT-9686 Exploiting Secure Email Gateways for Root Access

[CRITICAL]

A critical zero-day vulnerability (CVE-2025-20393) in Cisco AsyncOS for Secure Email Gateway is being actively exploited by the China-linked threat actor UAT-9686. This flaw allows attackers to execute arbitrary commands with root-level privileges, potentially compromising all sensitive email traffic. Organizations must apply emergency patches immediately and conduct forensic audits for signs of lateral movement.

🚨 ACTION: Immediately upgrade Cisco AsyncOS to the fixed releases (15.5.1-095 or higher) and rotate all administrative credentials and SSH keys on the device.

Read Full Technical Analysis →

CVE-2024-55591: FortiClientMac Insecure Credential Storage Vulnerability

[CRITICAL]

A critical information disclosure vulnerability (CVE-2024-55591) has been identified in FortiClient for macOS. This flaw allows a local attacker to retrieve sensitive VPN credentials and session tokens due to insecure storage practices on the host system. With a public Proof of Concept (PoC) released on December 22, 2024, organizations using FortiClientMac should prioritize updating to patched versions to prevent unauthorized access to corporate networks via credential theft.

🚨 ACTION: Immediately upgrade FortiClientMac to version 7.4.1, 7.2.5, or the latest available security release.

Read Full Technical Analysis →

Zero-Day Alert: CVE-2024-44308 WebKit Use-After-Free Actively Exploited

[CRITICAL]

CISA has reported continued active exploitation of CVE-2024-44308, a critical Use-After-Free vulnerability in Apple WebKit's JavaScriptCore component. Attackers are leveraging maliciously crafted web content to achieve arbitrary code execution on macOS and iOS devices. This flaw has been observed in targeted attacks, particularly against Intel-based Mac systems. Organizations are advised to update all Apple assets to the latest security releases immediately.

🚨 ACTION: Immediately update all Apple devices to iOS 18.1.1, iOS 17.7.2, and macOS Sequoia 15.1.1.

Read Full Technical Analysis →

CVE-2024-12543: Critical Unauthenticated RCE in Themeisle Content Blocks Plugin

[CRITICAL]

A critical PHP Object Injection vulnerability (CVE-2024-12543) in the Themeisle Content Blocks WordPress plugin allows unauthenticated attackers to execute arbitrary code. With a public PoC released on December 21, immediate patching is required to prevent full server takeover.

🚨 ACTION: Update Themeisle Content Blocks to version 3.2.0 or later immediately via the WordPress Dashboard or via WP-CLI using: 'wp plugin update custom-post-widget'.

Read Full Technical Analysis →

Active Exploitation of Android Framework EoP (CVE-2024-43093) Targets Sensitive Data

[CRITICAL]

A critical logic error in the Android Framework (CVE-2024-43093) is being actively exploited to bypass file path filters. The vulnerability allows local attackers to gain unauthorized access to sensitive directories, including 'Android/data' and 'Android/obb', by exploiting incorrect Unicode normalization in the ExternalStorageProvider. CISA has added this to the KEV catalog following confirmed targeted exploitation. Immediate patching to the November 2024 security level is required to protect device integrity and user privacy.

🚨 ACTION: Mandate the installation of the November 2024 security patch level (2024-11-01 or later) on all enterprise Android devices.

Read Full Technical Analysis →

Critical Stored XSS in GitLab CE/EE (CVE-2024-48357) Leading to Session Hijacking

[CRITICAL]

A critical Stored Cross-Site Scripting (XSS) vulnerability, identified as CVE-2024-48357, has been discovered in GitLab Community Edition (CE) and Enterprise Edition (EE). Disclosed on December 19, 2024, this flaw allows attackers to inject malicious scripts into crafted content—such as Wiki pages, Issue descriptions, or Merge Requests. If a user (including administrators) views this content, the attacker can hijack their session, exfiltrate sensitive data, or perform actions with the victim's privileges. Public proof-of-concept (PoC) scripts emerged on December 21, 2024, significantly increasing the risk of exploitation. We strongly recommend upgrading to GitLab version 17.7.0 or the latest security patches immediately.

🚨 ACTION: Immediately upgrade GitLab self-managed instances to version 17.7.0 or apply the security patches for versions 17.6.x, 17.5.x, and 17.4.x released on December 19, 2024.

Read Full Technical Analysis →

Urgent: Critical RCE in CyberPanel (CVE-2024-51567) Exploitation Surging via Middleware Bypass

[CRITICAL]

A critical pre-authentication Remote Code Execution (RCE) vulnerability in CyberPanel (CVE-2024-51567) is under heavy active exploitation as of December 22, 2024. Attackers are utilizing updated scanning templates to bypass security middleware and execute arbitrary shell commands. Immediate upgrade to CyberPanel v2.3.7 or higher is required to mitigate total server takeover.

🚨 ACTION: sh <(curl https://raw.githubusercontent.com/usmannasir/cyberpanel/stable/v2.3.7/install/upgrade.sh || wget -O - https://raw.githubusercontent.com/usmannasir/cyberpanel/stable/v2.3.7/install/upgrade.sh)

Read Full Technical Analysis →

Keep Reading