Description
Statistics
- 8 Posts
Fediverse
CISA has added two vulnerabilities to the KEV Catalog:
CVE-2025-48633: Android Framework Information Disclosure Vulnerability
CVE-2025-48572: Android Framework Privilege Escalation Vulnerability
CISA has added two Android Framework 0-days (CVE-2025-48572 & CVE-2025-48633) to the KEV list, confirming active exploitation.
Together, they enable privilege escalation and information disclosure, forming a potentially complete compromise path for targeted devices.
Federal agencies have a December 23 patch deadline, and wider organizations are encouraged to roll out updates and monitor for related indicators.
💬 Mobile ecosystems remain a critical attack surface - what best practices have worked for your teams?
Source: https://cybersecuritynews.com/android-0-day-vulnerability-exploited/
Follow us for ongoing vulnerability and threat intelligence updates.
#Cybersecurity #AndroidSecurity #KEV #CISA #ZeroDay #MobileThreats #ThreatIntel #Infosec #SecurityUpdates #DeviceSecurity
Bluesky
Description
Statistics
- 8 Posts
Fediverse
CISA has added two vulnerabilities to the KEV Catalog:
CVE-2025-48633: Android Framework Information Disclosure Vulnerability
CVE-2025-48572: Android Framework Privilege Escalation Vulnerability
CISA has added two Android Framework 0-days (CVE-2025-48572 & CVE-2025-48633) to the KEV list, confirming active exploitation.
Together, they enable privilege escalation and information disclosure, forming a potentially complete compromise path for targeted devices.
Federal agencies have a December 23 patch deadline, and wider organizations are encouraged to roll out updates and monitor for related indicators.
💬 Mobile ecosystems remain a critical attack surface - what best practices have worked for your teams?
Source: https://cybersecuritynews.com/android-0-day-vulnerability-exploited/
Follow us for ongoing vulnerability and threat intelligence updates.
#Cybersecurity #AndroidSecurity #KEV #CISA #ZeroDay #MobileThreats #ThreatIntel #Infosec #SecurityUpdates #DeviceSecurity
Bluesky
Overview
- Industrial Video & Control
- Longwatch
Description
Statistics
- 2 Posts
- 14 Interactions
Fediverse
Always look at the credits in CVE records, they’re full of insightful details.
I particularly enjoyed this one. By the way, in Vulnerability Lookup we also have a nice display of the actual credits: finder, coordinator, and so on.
🔗 https://vulnerability.circl.lu/vuln/cve-2025-13658
"A vulnerability in Longwatch devices allows unauthenticated HTTP GET requests to execute arbitrary code via an exposed endpoint, due to the absence of code signing and execution controls. Exploitation results in SYSTEM-level privileges.
"
⚠️ CRITICAL: CVE-2025-13658 hits Industrial Video & Control Longwatch v6.309 — remote unauthenticated code execution via HTTP GET grants SYSTEM privileges. No patch yet. Segment, restrict access, monitor traffic. Full advisory: https://radar.offseq.com/threat/cve-2025-13658-cwe-94-improper-control-of-generati-128a847f #OffSeq #OTSecurity #CVE2025
Overview
- Go standard library
- crypto/x509
- crypto/x509
Description
Statistics
- 2 Posts
- 42 Interactions
Bluesky
Overview
- Red Hat
- Red Hat OpenShift Dev Spaces
- devspaces/code-rhel9
Description
Statistics
- 1 Post
- 28 Interactions
Fediverse
lolwut
https://access.redhat.com/security/cve/CVE-2025-57850
This issue stems from the
/etc/passwdfile being created with group-writable permissions during build time.
Overview
- hwk-fr
- Advanced Custom Fields: Extended
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
🚨 CVE-2025-13486: CRITICAL RCE in Advanced Custom Fields: Extended for WordPress (v0.9.0.5–0.9.1.1). Unauthenticated attackers can inject code via prepare_form(). Remove or restrict plugin ASAP—no patch yet! https://radar.offseq.com/threat/cve-2025-13486-cwe-94-improper-control-of-generati-abf63164 #OffSeq #WordPress #RCE #Infosec
Description
Statistics
- 3 Posts
Bluesky
Overview
Description
Statistics
- 2 Posts
Bluesky
Overview
Description
Statistics
- 1 Post
- 42 Interactions
Overview
Description
Statistics
- 1 Post
- 4 Interactions