A flaw was found in linux-pam
Description
A flaw was found in linux-pam
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
29 vulnerabilities from Linux
← Back to all CVEsA flaw was found in linux-pam
A flaw was found in linux-pam
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricte...
In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricted functionality in the compliance service via im...
Update In Progress Chef Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Vacron Camera ping Command Injection Remote Code Execution Vulnerability
Vacron Camera ping Command Injection Remote Code Execution Vulnerability
Executive Summary:
A high-severity vulnerability has been identified in multiple Vacron camera products, allowing for remote code execution. An unauthenticated attacker can exploit this flaw by sending a malicious command through the device's ping utility, potentially gaining complete control over the affected camera, leading to data breaches or further network intrusion.
Vulnerability Details
CVE-ID: CVE-2025-8613
Affected Software: Vacron Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is a command injection flaw within the web-based diagnostic utility, specifically the ping function. An attacker can craft a malicious request to the device's web interface containing an IP address or hostname followed by arbitrary shell commands (e.g., using characters like ;, |, or &&). The system fails to properly sanitize this input, executing the injected commands with the privileges of the web server process, which could be root-level on the underlying embedded Linux operating system.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.2. Successful exploitation could grant an attacker complete control over the affected camera system. This could lead to a severe breach of confidentiality, as attackers could view and exfiltrate live or recorded video feeds. Additionally, a compromised camera could be used as a pivot point to launch further attacks against the internal corporate network, or be co-opted into a botnet for use in Distributed Denial-of-Service (DDoS) attacks. The potential for reputational damage and data leakage presents a significant risk to the organization.
Remediation Plan
Immediate Action: Apply the security patches released by Vacron to all affected systems immediately, prioritizing any devices that are accessible from the internet. Following the patch, review system and web access logs for any signs of past exploitation attempts or unauthorized access.
Proactive Monitoring: Security teams should monitor for exploitation attempts by inspecting web server logs for requests to the ping utility that contain shell metacharacters (e.g., ;, |, &, $(), `). Monitor network traffic for unusual outbound connections from cameras to unknown destinations, which could indicate a successful compromise.
Compensating Controls: If immediate patching is not feasible, implement the following controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 2, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, command injection vulnerabilities are often trivial to exploit, and it is highly likely that exploit code will become publicly available in the near future.
Analyst Recommendation
Given the high severity (CVSS 7.2) and the risk of remote code execution, this vulnerability poses a significant threat to the organization. It is strongly recommended that all internet-facing Vacron devices be patched immediately. For internal devices, a patching plan should be implemented based on risk and asset criticality. Although this CVE is not currently on the CISA KEV list, its potential for widespread impact means organizations must act swiftly to apply vendor patches and implement compensating controls where necessary to mitigate the risk of compromise.
Apply security patches immediately for internet-facing systems. Monitor for exploitation attempts and review access logs.
AOMEI Cyber Backup Missing Authentication for Critical Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to exe...
AOMEI Cyber Backup Missing Authentication for Critical Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of A...
Executive Summary:
A critical remote code execution vulnerability has been discovered in AOMEI Cyber Backup, identified as CVE-2025-8611 with a CVSS score of 9.8. This flaw allows a remote, unauthenticated attacker to bypass security checks and execute arbitrary code, leading to a complete compromise of the affected backup server. Successful exploitation could result in data theft, ransomware deployment, and significant disruption to business continuity and disaster recovery capabilities.
Vulnerability Details
CVE-ID: CVE-2025-8611
Affected Software: AOMEI Cyber Backup
Affected Versions: See vendor advisory for specific affected versions.
Vulnerability: The vulnerability exists due to a missing authentication check on a critical function within the AOMEI Cyber Backup application's web interface. A remote attacker can craft a specialized, unauthenticated request to a specific API endpoint on an exposed server. This request can include a malicious payload, which the application will execute with the same privileges as the backup service, potentially leading to full system control (e.g., SYSTEM on Windows or root on Linux).
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a severe and immediate risk to the organization. A successful exploit allows for unauthenticated Remote Code Execution (RCE), which could lead to a complete system compromise of the backup server. Potential consequences include the theft or destruction of sensitive backup data, deployment of ransomware across the network, installation of persistent backdoors for long-term access, and the ability for an attacker to pivot to other critical systems. The compromise of a backup system directly threatens an organization's ability to recover from any incident, magnifying the overall business impact.
Remediation Plan
Immediate Action: The primary remediation is to apply the vendor-supplied security patch immediately. Update AOMEI Cyber Backup to the latest version to resolve the missing authentication vulnerability. After patching, it is crucial to monitor for any signs of post-exploitation activity and thoroughly review application and system access logs for indicators of compromise that may have occurred prior to the update.
Proactive Monitoring: Implement enhanced monitoring on AOMEI Cyber Backup servers. Security teams should look for anomalous network traffic to and from the server, especially direct connections from untrusted IP addresses. Monitor system processes for any unexpected child processes spawned by the AOMEI service. Review web server and application logs for unusual requests, particularly those targeting API endpoints without authentication tokens or session cookies.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce the risk of exploitation:
Exploitation Status
Public Exploit Available: False (as of Aug 20, 2025)
Analyst Notes: This vulnerability was publicly disclosed on August 20, 2025. While there are no known public exploits at this time, the simplicity of exploiting a missing authentication flaw means that threat actors are likely to develop and deploy exploits rapidly. Backup systems are high-value targets for ransomware groups, and this vulnerability provides a direct path to compromising an organization's recovery infrastructure.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the unauthenticated remote code execution nature of this vulnerability, we strongly recommend that immediate action be taken. The risk of complete system compromise is exceptionally high. Organizations must prioritize the deployment of the vendor-provided patch to all affected AOMEI Cyber Backup installations. While this CVE is not yet listed on the CISA KEV catalog, its severity makes it a prime candidate for future inclusion. If patching is delayed, the compensating controls listed above should be implemented without exception to mitigate the immediate threat.
Update AOMEI Cyber Backup Missing Authentication for Critical Function Remote Code Execution Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
In GnuPG through 2
In GnuPG through 2
Executive Summary:
A high-severity vulnerability has been discovered in multiple GnuPG products, a widely used encryption software suite. This flaw could allow a local attacker with basic user access to escalate their privileges and execute arbitrary code, potentially leading to a full compromise of the affected system. Organizations should prioritize applying the vendor-supplied security updates to mitigate the risk of unauthorized system access and data compromise.
Vulnerability Details
CVE-ID: CVE-2025-68973
Affected Software: GnuPG Multiple Products
Affected Versions: See vendor advisory for specific affected versions. The vulnerability is reported to affect versions through the GnuPG 2.x series.
Vulnerability: This vulnerability is a heap-based buffer overflow within the gpg-agent, a core component of GnuPG that manages private keys. The flaw can be triggered when the agent processes a specially crafted request from a local user through its Unix domain socket. An authenticated but unprivileged local attacker can send a malformed request that overflows a buffer during parsing, leading to a controllable memory corruption state. A successful exploit could allow the attacker to execute arbitrary code with the permissions of the gpg-agent process, which can lead to privilege escalation on the host system.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.8. Successful exploitation could lead to a complete compromise of the host system's confidentiality, integrity, and availability. Since GnuPG is a foundational tool for data encryption and digital signatures, an attacker gaining control of the system could bypass these security measures, access sensitive encrypted data, tamper with critical system files, or install persistent malware. This poses a significant risk to multi-user systems, such as shared development servers or production environments, where a low-privileged user or compromised service account could escalate their access to take full control of the machine.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the GnuPG project and respective downstream distribution vendors immediately. After patching, it is crucial to monitor systems for any signs of attempted exploitation by reviewing system and application logs for unusual activity or crashes related to GnuPG processes.
Proactive Monitoring: Organizations should monitor for anomalous behavior related to GnuPG components. This includes looking for unexpected crashes or error messages from gpg-agent in system logs (e.g., journalctl, /var/log/syslog). Additionally, security teams should use system auditing tools (e.g., auditd) to monitor for unexpected process execution originating from GnuPG daemons or unauthorized attempts to access sensitive key material.
Compensating Controls: If immediate patching is not feasible, organizations can implement compensating controls to reduce the risk. This includes restricting shell access for untrusted users on shared systems, applying strict application control policies (e.g., SELinux, AppArmor) to confine GnuPG processes, and using containerization or sandboxing to limit the impact of a potential compromise.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 29, 2025, there are no known public proof-of-concept exploits or active attacks targeting this vulnerability. However, local privilege escalation vulnerabilities are highly valued by threat actors. It is anticipated that security researchers and malicious actors will actively work to develop an exploit, especially for common Linux distributions where GnuPG is installed by default.
Analyst Recommendation
Due to the high severity (CVSS 7.8) and the critical role GnuPG plays in securing data and system communications, organizations are strongly advised to prioritize the deployment of vendor-supplied patches across all affected systems. This vulnerability represents a direct path for privilege escalation on any system where an attacker can gain initial low-privileged access. While this vulnerability is not currently listed on the CISA KEV catalog, its potential impact warrants immediate attention. Systems that cannot be patched immediately should have compensating controls applied and be placed under enhanced monitoring for suspicious local activity.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper Privilege Management vulnerability in ZTE ElasticNet UME R32 on Linux allows Accessing Functionality Not Properly Constrained by ACLs
Improper Privilege Management vulnerability in ZTE ElasticNet UME R32 on Linux allows Accessing Functionality Not Properly Constrained by ACLs
Executive Summary:
A high-severity vulnerability has been identified in multiple ZTE ElasticNet UME products, which could allow an authenticated user to perform actions beyond their authorized permission level. Successful exploitation could lead to unauthorized access to sensitive network management functions, potentially resulting in configuration changes, service disruption, or data exposure. Organizations are strongly advised to apply the vendor-provided security updates to mitigate this risk.
Vulnerability Details
CVE-ID: CVE-2025-66314
Affected Software: ZTE ElasticNet UME Multiple Products
Affected Versions: The vulnerability is confirmed in version R32 on Linux. See the vendor advisory for a complete list of specific affected products and versions.
Vulnerability: The software suffers from an Improper Privilege Management vulnerability. The system's Access Control Lists (ACLs) do not correctly enforce restrictions on certain functionalities. An authenticated attacker with low-level privileges could exploit this flaw by sending a specially crafted request to an administrative function, bypassing the intended security checks and executing it with elevated permissions.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could have a significant business impact by allowing an unauthorized user to gain administrative control over network management functions. Potential consequences include unauthorized modification of network device configurations, disruption of critical network services managed by the UME platform, and exposure of sensitive network topology or configuration data. These actions could lead to operational downtime, data breaches, and a compromise of network integrity.
Remediation Plan
Immediate Action: Apply the security updates released by ZTE immediately across all affected ElasticNet UME instances. Prioritize patching for internet-facing or critical internal systems. After patching, review system access and audit logs for any signs of unauthorized privileged activity that may have occurred prior to remediation.
Proactive Monitoring: Implement enhanced monitoring on affected systems. Specifically, security teams should look for logs indicating low-privilege user accounts successfully accessing or attempting to access high-privilege administrative functions or APIs. Monitor for unusual or unauthorized configuration changes within the UME platform and the network devices it manages.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 27, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, due to the nature of privilege escalation flaws, it is anticipated that threat actors will actively work to develop exploits. Organizations should assume that exploitation is likely in the near future.
Analyst Recommendation
Given the high CVSS score of 7.5 and the risk of privilege escalation, we recommend that organizations treat this vulnerability with high urgency. The primary and most effective course of action is to apply the vendor-supplied patches immediately. Although this CVE is not currently listed on the CISA KEV (Known Exploited Vulnerabilities) catalog, its severity makes it a prime target for future exploitation. If patching is delayed, the compensating controls listed above should be implemented without delay to reduce the attack surface.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An eval injection in the malware de-obfuscation routines of CloudLinux ai-bolit before v32
An eval injection in the malware de-obfuscation routines of CloudLinux ai-bolit before v32
Executive Summary:
A high-severity vulnerability has been discovered in the CloudLinux ai-bolit malware scanner, which could allow an attacker to execute arbitrary code and take full control of the affected server. The flaw exists within the scanner's file analysis routines, where a specially crafted malicious file can trick the scanner into running embedded commands. Successful exploitation could lead to a complete system compromise, data theft, and further intrusion into the network.
Vulnerability Details
CVE-ID: CVE-2025-65530
Affected Software: CloudLinux ai-bolit
Affected Versions: All versions prior to v32
Vulnerability: This vulnerability is an eval injection flaw within the malware de-obfuscation routines of the CloudLinux ai-bolit scanner. An attacker can craft a malicious file that, when scanned, is processed by the vulnerable de-obfuscation function. This function improperly uses an eval()-like construct to interpret the file's contents, leading to the execution of code embedded within the malicious file. To exploit this, an attacker only needs to place a crafted file on a system in a location that will be scanned by an affected version of ai-bolit, allowing for remote code execution with the privileges of the scanner process.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8, posing a significant risk to the organization. Successful exploitation grants an attacker Remote Code Execution (RCE) on the server where the scanner is running, which can lead to a complete system compromise. Potential consequences include the exfiltration of sensitive data, deployment of ransomware, service disruption, and the use of the compromised server as a pivot point to attack other internal systems. This could result in severe financial loss, reputational damage, and potential regulatory non-compliance.
Remediation Plan
Immediate Action: Administrators must update CloudLinux ai-bolit to version 32 or later to patch this vulnerability. Applying the vendor-supplied security update is the most direct and effective method of remediation. In parallel, security teams should actively monitor for signs of exploitation and review historical access, system, and application logs for any suspicious activity related to file uploads or unusual process execution.
Proactive Monitoring: Monitor for unusual child processes spawned by the ai-bolit scanner process. Scrutinize web server and application logs for suspicious file uploads that may be designed to trigger the scanner. Implement network monitoring to detect unexpected outbound connections from servers running ai-bolit, which could indicate communication with an attacker's command-and-control infrastructure.
Compensating Controls: If immediate patching is not feasible, consider the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 14, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the high severity (CVSS 8.8) and the straightforward nature of eval injection vulnerabilities, it is highly probable that a functional proof-of-concept exploit will be developed and released by security researchers or malicious actors. Organizations should treat this as an imminent threat.
Analyst Recommendation
Given the high severity CVSS score of 8.8 and the potential for complete system compromise, this vulnerability poses a critical risk to the organization. We strongly recommend that all systems running affected versions of CloudLinux ai-bolit be patched immediately to version 32 or newer. Although this CVE is not currently listed in the CISA KEV catalog, its critical impact warrants urgent attention. If patching cannot be performed immediately, implement the suggested compensating controls and elevate monitoring to detect any potential exploitation attempts.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execu...
A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
OpenWrt Project is a Linux operating system targeting embedded devices
OpenWrt Project is a Linux operating system targeting embedded devices
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
OpenWrt Project is a Linux operating system targeting embedded devices
OpenWrt Project is a Linux operating system targeting embedded devices
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM)
A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM)
Update to patched version immediately. Review user permissions and access controls.
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
LinuxServer
LinuxServer
1Panel is a web interface and MCP Server that manages websites, files, containers, databases, and LLMs on a Linux server
1Panel is a web interface and MCP Server that manages websites, files, containers, databases, and LLMs on a Linux server
Executive Summary:
A high-severity vulnerability has been identified in the MCP 1Panel server management software, assigned a CVSS score of 8.1. This flaw could allow an unauthenticated remote attacker to execute arbitrary code, potentially leading to a complete compromise of the managed Linux server. Immediate patching is required to prevent data theft, service disruption, and unauthorized access to critical infrastructure.
Vulnerability Details
CVE-ID: CVE-2025-54424
Affected Software: MCP 1Panel
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: A critical vulnerability exists within the MCP Server component of the 1Panel web interface. An unauthenticated API endpoint fails to properly sanitize user-supplied input, allowing a remote attacker to inject and execute arbitrary commands on the host operating system. An attacker can exploit this by sending a specially crafted request to the vulnerable endpoint, gaining control of the server with the permissions of the web service account.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Successful exploitation would grant an attacker full administrative control over the affected Linux server. This could lead to severe business consequences, including the theft of sensitive data from databases and files, manipulation or theft of proprietary Large Language Models (LLMs), complete disruption of hosted websites and containerized applications, and reputational damage. The compromised server could also serve as a foothold for attackers to move laterally and compromise other systems within the organization's network.
Remediation Plan
Immediate Action: Apply vendor security updates immediately across all affected 1Panel instances. After patching, monitor systems for any new exploitation attempts and conduct a thorough review of historical web server and application access logs for any indicators of compromise that may have occurred prior to the patch application.
Proactive Monitoring: System administrators should monitor for anomalous activity, including unexpected processes being spawned by the web server user (e.g., www-data, nginx). Scrutinize web access logs for unusual requests containing shell metacharacters (e.g., |, &, ;, $). Monitor network traffic for suspicious outbound connections from the server, which could indicate a reverse shell or data exfiltration.
Compensating Controls: If patching cannot be performed immediately, restrict network access to the 1Panel management interface at the network firewall level, allowing connections only from trusted IP addresses. If available, deploy a Web Application Firewall (WAF) with rulesets designed to detect and block command injection attack patterns.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 1, 2025, there are no known public proof-of-concept exploits or active in-the-wild attacks targeting this vulnerability. However, given the high severity and the critical nature of the affected software, it is highly probable that threat actors will develop an exploit in the near future.
Analyst Recommendation
This vulnerability poses a significant and immediate risk to the organization. The high CVSS score of 8.1 reflects the potential for a complete system takeover with low attack complexity. Although CVE-2025-54424 is not currently on the CISA KEV list, its characteristics make it a prime candidate for future exploitation. We strongly recommend that all system owners prioritize the immediate application of the vendor-provided security patches to mitigate this threat before it can be actively exploited.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Akamai Guardicore Platform Agent before 52
Akamai Guardicore Platform Agent before 52
Executive Summary:
A high-severity vulnerability has been discovered in the Akamai Guardicore Platform Agent. This flaw could potentially allow a local attacker to escalate their privileges on a protected system, bypassing security controls and gaining administrative access. Successful exploitation could lead to a complete compromise of the affected endpoint, enabling data theft, malware installation, and further lateral movement within the network.
Vulnerability Details
CVE-ID: CVE-2025-53841
Affected Software: Akamai Guardicore Platform Agent
Affected Versions: All versions before 52
Vulnerability: This vulnerability is a local privilege escalation flaw within the Akamai Guardicore Platform Agent. An authenticated, low-privileged local user can exploit an issue in how the agent's service handles inter-process communication (IPC) requests. By sending a specially crafted request to the agent's service, an attacker can trigger a condition that allows them to execute arbitrary code with the high-level privileges of the agent service (e.g., SYSTEM on Windows or root on Linux), leading to a full compromise of the host operating system.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.8. The Guardicore agent is a critical security control responsible for enforcing micro-segmentation policies and detecting threats. A successful exploit would completely neutralize its security function on the compromised asset, rendering it invisible to the Guardicore platform. An attacker with administrative privileges could disable security software, install persistent malware or ransomware, exfiltrate sensitive data, and use the compromised machine as a staging point to attack other systems on the network, severely impacting data confidentiality, integrity, and availability.
Remediation Plan
Immediate Action: Organizations must immediately apply vendor-supplied security updates to upgrade all instances of the Akamai Guardicore Platform Agent to version 52 or later. After patching, system administrators should review system and application logs for any unusual activity or access patterns that may indicate a prior compromise.
Proactive Monitoring: Security teams should actively monitor for indicators of exploitation. This includes looking for unexpected processes running with SYSTEM or root privileges, unusual child processes spawned by the Guardicore agent service, and any logs indicating the agent service has crashed or restarted unexpectedly. Enhanced endpoint monitoring should be configured to alert on unauthorized modifications to the Guardicore agent's installation directory or configuration files.
Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. These include strictly enforcing the principle of least privilege to limit local user access, utilizing application whitelisting to prevent unauthorized code execution, and ensuring that Endpoint Detection and Response (EDR) solutions are deployed and configured to detect suspicious process behavior.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 3, 2025, there are no known public proof-of-concept exploits or observed in-the-wild exploitation of this vulnerability. However, given the high-severity rating and the critical role of the affected software in enterprise security, it is highly probable that threat actors will develop exploits in the near future.
Analyst Recommendation
This vulnerability represents a significant risk to the security of any organization utilizing the affected Akamai Guardicore Platform Agent. Due to the high CVSS score of 7.8 and the potential for a complete system compromise, this vulnerability should be prioritized for immediate remediation. Although not currently listed on the CISA KEV catalog, its impact is severe. We strongly recommend that all affected systems be patched on an emergency basis, treating this as a critical priority in your patch management program.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Nix is a package manager for Linux and other Unix systems
Nix is a package manager for Linux and other Unix systems
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue was discovered in the demo/LINUXTCP implementation of cwalter-at freemodbus v
An issue was discovered in the demo/LINUXTCP implementation of cwalter-at freemodbus v
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Within tcpreplay's tcprewrite, a double free vulnerability has been identified in the dlt_linuxsll2_cleanup() function in plugins/dlt_linuxsll2/linuxs...
Within tcpreplay's tcprewrite, a double free vulnerability has been identified in the dlt_linuxsll2_cleanup() function in plugins/dlt_linuxsll2/linuxsll2
LinuxServer.io heimdall 2.6.3-ls307 contains a vulnerability in how it handles user-supplied HTTP headers, specifically `X-Forwarded-Host` and `Refere...
LinuxServer.io heimdall 2.6.3-ls307 contains a vulnerability in how it handles user-supplied HTTP headers, specifically `X-Forwarded-Host` and `Referer`. An unauthenticated remote attacker can manipul...
Executive Summary:
A critical vulnerability has been identified in a specific version of the LinuxServer.io heimdall application. This flaw allows an unauthenticated remote attacker to manipulate HTTP headers to potentially take control of the application, redirect users to malicious sites, or access sensitive information. Due to its critical severity and the ease of exploitation, this vulnerability poses a significant and immediate risk to the organization's security posture.
Vulnerability Details
CVE-ID: CVE-2025-50578
Affected Software: LinuxServer.io heimdall
Affected Versions: 2.6.3-ls307
Vulnerability: The vulnerability exists in the application's processing of user-supplied HTTP headers, specifically the X-Forwarded-Host and Referer headers. The application improperly trusts the values in these headers, which can be controlled by an attacker. A remote, unauthenticated attacker can craft a malicious HTTP request with a manipulated header value to trigger various attacks, such as web cache poisoning, password reset link poisoning, or Server-Side Request Forgery (SSRF), potentially leading to a full compromise of the application and the underlying server.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, indicating a high potential for severe business impact. Successful exploitation could grant an attacker complete control over the Heimdall application dashboard, which often serves as a central hub for accessing other critical internal applications and services. This could lead to the exposure of sensitive credentials, unauthorized access to internal systems, data breaches, and lateral movement within the network. The compromised server could also be used to launch further attacks, resulting in significant operational disruption and reputational damage.
Remediation Plan
Immediate Action: Immediately update all instances of LinuxServer.io heimdall to the latest version as recommended by the developer. After patching, review web server and application access logs for any signs of attempted or successful exploitation that may have occurred prior to the update.
Proactive Monitoring: Implement monitoring rules to detect and alert on suspicious web requests to the Heimdall application. Specifically, look for unusual or malformed values in the X-Forwarded-Host and Referer headers in web server logs (e.g., Nginx, Apache). Monitor for unexpected outbound network connections from the server hosting Heimdall, which could indicate a successful SSRF attack.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) to inspect, sanitize, and block malicious requests containing manipulated X-Forwarded-Host and Referer headers. Additionally, restrict network access to the Heimdall dashboard to only trusted IP addresses and networks to reduce the external attack surface.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Jul 30, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, given the critical CVSS score and the unauthenticated nature of the vulnerability, it is highly likely that threat actors will develop exploits in the near future.
Analyst Recommendation
Given the critical severity (CVSS 9.8) of this vulnerability, we strongly recommend that immediate action be taken. All vulnerable instances of LinuxServer.io heimdall must be patched without delay. Although there is no evidence of active exploitation at this time, the risk of compromise is severe. Organizations should prioritize this update and implement the recommended compensating controls and proactive monitoring to defend against potential future attacks.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone...
OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology
Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability - Active in CISA KEV catalog.
Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability - Active in CISA KEV catalog.
FEDERAL DEADLINE: September 24, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. FEDERAL DEADLINE: September 24, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Deadline: September 24, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Out-of-bounds Read vulnerability in ASR1903、ASR3901 in ASR Lapwing_Linux on Linux (nr_fw modules)
Out-of-bounds Read vulnerability in ASR1903、ASR3901 in ASR Lapwing_Linux on Linux (nr_fw modules)
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper handling of the authentication token in the Amazon WorkSpaces client for Linux, versions 2023
Improper handling of the authentication token in the Amazon WorkSpaces client for Linux, versions 2023
Executive Summary:
A high-severity vulnerability has been identified in the Amazon WorkSpaces client for Linux which could allow an attacker to gain unauthorized access to corporate cloud environments. The flaw stems from the improper handling of authentication tokens, enabling a malicious actor with local access to a user's machine to potentially hijack their WorkSpaces session, leading to data theft and further network compromise. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this significant risk.
Vulnerability Details
CVE-ID: CVE-2025-12779
Affected Software: WorkSpaces Multiple Products
Affected Versions: Amazon WorkSpaces client for Linux, versions 2023
Vulnerability: The vulnerability exists due to the insecure storage or handling of session authentication tokens by the Amazon WorkSpaces client on the local Linux system. An attacker with local, low-privileged access to a Linux machine running the client could potentially access these tokens from memory or insecurely stored files. By stealing a valid token, the attacker can impersonate the legitimate user and gain direct access to their active Amazon WorkSpaces session, bypassing standard authentication mechanisms like passwords and MFA.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8, posing a significant risk to the organization. Successful exploitation could lead to a complete compromise of the user's virtual desktop environment. This would grant an attacker access to all sensitive data, applications, and network resources available from within the WorkSpace. Potential consequences include data exfiltration of confidential information, intellectual property theft, deployment of ransomware, and using the compromised WorkSpace as a pivot point to attack the broader corporate network.
Remediation Plan
Immediate Action:
Proactive Monitoring:
Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 5, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the high severity score, threat actors are likely to begin reverse-engineering the patch to develop an exploit. The vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog, but this status could change rapidly if exploitation is observed in the wild.
Analyst Recommendation
Given the high CVSS score of 8.8 and the critical access this vulnerability provides, we strongly recommend that organizations treat this as a high-priority issue. The potential for an attacker to bypass authentication and gain full access to a corporate cloud desktop presents a direct threat to sensitive data and network integrity. All affected Amazon WorkSpaces clients for Linux must be patched immediately. Although not yet on the CISA KEV list, its severity warrants urgent action to prevent future exploitation.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems
A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A flaw was found in the Linux kernel's ksmbd component
A flaw was found in the Linux kernel's ksmbd component
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
MiniDVBLinux 5.4 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands as root through...
MiniDVBLinux 5.4 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands as root through the 'command' GET parameter. Attackers can exploit the /tpl/commands.sh endpoint by sending malicious command values to gain root-level system access.
Executive Summary:
A critical vulnerability has been identified in multiple MiniDVBLinux products, designated CVE-2022-50691. This flaw allows any unauthenticated attacker on the network to remotely execute arbitrary commands with the highest system privileges (root), leading to a complete compromise of the affected device. Due to the ease of exploitation and the severity of its impact, this vulnerability poses a significant and immediate threat to the confidentiality, integrity, and availability of the system.
Vulnerability Details
CVE-ID: CVE-2022-50691
Affected Software: MiniDVBLinux Multiple Products
Affected Versions: Version 5.4. See vendor advisory for specific affected versions.
Vulnerability: This is an unauthenticated remote command execution (RCE) vulnerability. The /tpl/commands.sh script improperly handles user-supplied input from the 'command' GET parameter. An attacker can craft a malicious HTTP GET request to this endpoint, embedding arbitrary system commands within the 'command' parameter, which are then executed on the underlying operating system with root privileges.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation grants an attacker complete control over the affected MiniDVBLinux device. The potential consequences include theft or modification of sensitive data, complete service disruption, installation of malware or ransomware, and using the compromised device as a pivot point to launch further attacks against the internal network. The lack of authentication required for exploitation significantly increases the risk, as any attacker with network access to the device can exploit it.
Remediation Plan
Immediate Action: The primary remediation is to apply the security patches provided by the vendor. System administrators should immediately update all instances of MiniDVBLinux Multiple Products to the latest version. Refer to the official vendor security advisory for specific patch information and installation instructions.
Proactive Monitoring: Security teams should actively monitor web server access logs for any requests to the /tpl/commands.sh endpoint. Specifically, look for suspicious or unexpected commands (e.g., wget, curl, nc, bash) within the 'command' GET parameter. Monitor for unusual outbound network traffic from affected devices and any unexpected processes running with root privileges.
Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:
/tpl/commands.sh endpoint.Exploitation Status
Public Exploit Available: true
Analyst Notes: As of Dec 30, 2025, this vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, given the simplicity of the exploit (a single crafted GET request), proof-of-concept code is widely available, and it is highly likely that this vulnerability is being actively scanned for and exploited by threat actors.
Analyst Recommendation
Due to the critical CVSS score of 9.8 and the unauthenticated, remote nature of this vulnerability, immediate remediation is strongly recommended. Organizations must prioritize patching all affected MiniDVBLinux devices without delay. If patching cannot be performed immediately, the compensating controls listed above should be implemented as an urgent temporary measure. The high potential for complete system compromise makes this a top-priority security issue.
Update MiniDVBLinux Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
Denver SHC-150 Smart Wifi Camera contains a hardcoded telnet credential vulnerability that allows unauthenticated attackers to access a Linux shell. A...
Denver SHC-150 Smart Wifi Camera contains a hardcoded telnet credential vulnerability that allows unauthenticated attackers to access a Linux shell. Attackers can connect to port 23 using the default credential to execute arbitrary commands on the camera's operating system.
Update Denver Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
Linux Kernel Heap Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
Linux Kernel Heap Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
FEDERAL DEADLINE: October 26, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. FEDERAL DEADLINE: October 26, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Deadline: October 26, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Linux Kernel Integer Overflow Vulnerability - Active in CISA KEV catalog.
Linux Kernel Integer Overflow Vulnerability - Active in CISA KEV catalog.
FEDERAL DEADLINE: February 15, 2026 (20 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. FEDERAL DEADLINE: February 15, 2026 (20 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Deadline: February 15, 2026
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Executive Summary:
A critical vulnerability, identified as CVE-2025-8868, has been discovered in multiple In Progress Chef products, specifically affecting Chef Automate versions prior to 4.13.295. This flaw allows an authenticated attacker to bypass security restrictions and access sensitive functions within the compliance service. Successful exploitation could lead to a complete compromise of the Chef Automate platform, enabling an attacker to control managed infrastructure and access sensitive data.
Vulnerability Details
CVE-ID: CVE-2025-8868
Affected Software: In Progress Chef Multiple Products
Affected Versions: Chef Automate versions earlier than 4.13.295. See vendor advisory for other specific affected products and versions.
Vulnerability: The vulnerability is an improper access control flaw within the compliance service of Chef Automate on the Linux x86 platform. An attacker who has already authenticated to the system, even with low privileges, can send a specially crafted request to the service to bypass authorization checks. This allows the attacker to access and execute restricted, high-privilege functionality, effectively escalating their privileges and gaining administrative control over the Chef Automate instance.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, indicating a high risk of compromise with low exploit complexity once an attacker has authenticated. A successful exploit could lead to a complete takeover of the organization's infrastructure-as-code environment. The potential consequences include unauthorized modification of infrastructure configurations, deployment of malicious software across all managed nodes, exfiltration of sensitive credentials and data stored within Chef, and significant disruption to business operations that rely on automated deployments and compliance scanning.
Remediation Plan
Immediate Action: Organizations must immediately upgrade affected In Progress Chef products to the latest secure version, ensuring that Chef Automate is updated to version 4.13.295 or later. Following the update, review access logs for any anomalous activity related to the compliance service to identify potential past exploitation attempts.
Proactive Monitoring: Implement enhanced monitoring of the Chef Automate platform. Specifically, look for unusual API calls to the compliance service, access to administrative functions from non-administrative accounts, and unexpected configuration changes originating from the Chef server. Monitor for outbound network connections from the Chef server to untrusted destinations.
Compensating Controls: If immediate patching is not possible, implement the following compensating controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 29, 2025, this vulnerability has been publicly disclosed by the vendor. There are currently no known public proof-of-concept exploits or reports of active exploitation in the wild. However, given the critical severity and the detailed nature of the vulnerability, security researchers and threat actors are expected to develop exploitation methods quickly.
Analyst Recommendation
Given the critical severity (CVSS 9.8) of this vulnerability and its potential to grant attackers full control over automated infrastructure, immediate action is required. We strongly recommend that all organizations using affected versions of In Progress Chef products apply the security updates provided by the vendor without delay. If patching cannot be performed immediately, the compensating controls listed above should be implemented as a temporary measure to reduce risk. Although this CVE is not currently listed on the CISA KEV catalog, its high impact and ease of exploitation for an authenticated user make it a high-priority target for remediation.