Overview
Description
Statistics
- 4 Posts
Fediverse

Akamai has spotted two Mirai botnets abusing a recently patched RCE (CVE-2025-24016) in the Wazuh SIEM

Akamai, which first discovered the exploitation efforts in late March 2025, said the malicious campaign targets CVE-2025-24016 (CVSS score: 9.9), an unsafe deserialization vulnerability that allows for remote code execution on Wazuh servers. https://thehackernews.com/2025/06/botnet-wazuh-server-vulnerability.html

https://nvd.nist.gov/vuln/detail/CVE-2025-24016 has been added to the KEV Catalog too.

I've created a passive detection script for this Wazuh vulnerability. It is currently being exploited in the wild (as reported by CISA). The script can be found here:
https://github.com/rxerium/CVE-2025-24016
Original article:
https://thehackernews.com/2025/06/botnet-wazuh-server-vulnerability.html
Overview
Description
Statistics
- 4 Posts
- 3 Interactions
Fediverse

This month, Microsoft patched 67 vulnerabilities, including one actively exploited zero-days—CVE-2025-33053, a WebDAV RCE discovered by Check Point
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-33053

Write-up from Check Point Research on CVE-2025-33053: https://research.checkpoint.com/2025/stealth-falcon-zero-day/
Overview
- SAP_SE
- SAP NetWeaver Application Server for ABAP
Description
Statistics
- 3 Posts
- 3 Interactions
Fediverse

SAP Patch Tuesday has begun. I'm too tired to go through them all but here's a taste if you're interested in a sev:CRIT
:

SAP released 14 security patches, including a critical fix for a NetWeaver vulnerability (CVE-2025-42989) allowing attackers to bypass authorization checks and escalate privileges. The patch day also addressed high, medium, and low-severity flaws in various SAP products.
https://www.securityweek.com/critical-vulnerability-patched-in-sap-netweaver/

Tracked as CVE-2025-42989 (CVSS score of 9.6), the critical bug is described as a missing authorization check in the NetWeaver application server for ABAP. https://www.securityweek.com/critical-vulnerability-patched-in-sap-netweaver/
Overview
- openpgpjs
- openpgpjs
Description
Statistics
- 3 Posts
- 1 Interaction
Fediverse

"CVE-2025-47934 – Spoofing OpenPGP.js signature verification"
https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/

My posts on CVE-2025-47934 have rolled off but there's a write-up for it now.
https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/

https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/
Overview
- Microsoft
- Windows 10 Version 1809
Description
Statistics
- 3 Posts
Fediverse

🚨🚨🚨 Just a heads-up: Microsoft will release a fix for a vulnerability we discovered as part of Patch Tuesday, today. MS classified CVE-2025-33073 as "important" and we recommend patching soon.
Stay tuned for our blog post and paper about it tomorrow at 10:00 am CEST 🔥

Kleiner Hinweis zum Juni 2025-Patchday von Microsoft. Es gibt eine Schwachstelle im Windows-Netzwerk, die zeitnah gepatcht oder durch Gegenmaßnahmen abgeschwächt werden sollte. Hier vorab was - Disclosure erfolgt Mittwoch 10:00 Uhr durch die Entdecker sowie bei mir im Blog.
Overview
- Hewlett Packard Enterprise (HPE)
- HPE Aruba Networking Private 5G Core
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse

Info disclosure in HPE Aruba Private 5G Core APIs.
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04883en_us&docLocale=en_US
sev:HIGH 7.7 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
A vulnerability in the APIs of HPE Aruba Networking Private 5G Core could potentially expose sensitive information to unauthorized users.
A successful exploitation could allow an attacker to iteratively navigate through the filesystem and ultimately download protected system files containing sensitive information.
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse

../
-> command exec in IBM AIX.
https://www.ibm.com/support/pages/node/7236103
sev:HIGH 8.4 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability in AIX's Perl could allow an attacker to execute arbitrary commands (CVE-2025-33112). AIX uses Perl in various operating system components.
Overview
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Fediverse

#OT #Advisory VDE-2025-047
AUMA: Incorrect delivery status of the Bluetooth configuration
#CVE CVE-2025-41657
https://certvde.com/en/advisories/VDE-2025-047
#CSAF https://auma.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-047.json
Overview
- DT Research
- BiosFlashShell
Description
Statistics
- 1 Post
Fediverse

New Secure Boot bypass (CVE-2025-3052) lets attackers install bootkit malware by breaking UEFI trust. Patches are out, but firmware issues complicate fixes. Critical update for admins. Details: https://redteamnews.com/red-team/cve/new-secure-boot-bypass-cve-2025-3052-enables-bootkit-malware-installation/