24h | 7d | 30d

Overview

  • Red Hat
  • Red Hat Enterprise Linux 6
  • openssh

18 Feb 2025
Published
19 Feb 2025
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

Statistics

  • 3 Posts
  • 50 Interactions

Fediverse

Profile picture

Qualys dropped another two OpenSSH vulns this week - CVE-2025-26465 & CVE-2025-26466

I don’t think either are bad, you should keep calm and patch as per usual.

The first one needs a non-default config, and PoC for the second also uses a non-default config. Neither are RCE and I doubt will ever see in the wild exploitation.

Blog: blog.qualys.com/vulnerabilitie

Proof of concept: qualys.com/2025/02/18/openssh-

  • 19
  • 24
  • 13 hours ago
Profile picture

OpenSSH CVE fixes are now available in the new Flatcar Alpha, Beta, Stable, LTS-2024 releases!
🔒 CVE fixes & security patches: OpenSSH (CVE-2025-26465, CVE-2025-26466)
📜 Release notes at the usual spot: flatcar.org/releases/

  • 2
  • 2
  • 9 hours ago
Profile picture

New #OpenSSH flaws expose #SSH servers to #MiTM and #DoS attacks
The MiTM vulnerability, tracked under CVE-2025-26465, was introduced in December 2014 with the release of OpenSSH 6.8p1, so the issue remained undetected for over a decade. The flaw affects OpenSSH clients when the '#VerifyHostKeyDNS' option is enabled.
The denial of service vulnerability is CVE-2025-26466, a pre-authentication denial of service flaw introduced in OpenSSH 9.5p1, released in August 2023.
bleepingcomputer.com/news/secu

  • 2
  • 1
  • 7 hours ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 3 Posts
  • 50 Interactions

Fediverse

Profile picture

Qualys dropped another two OpenSSH vulns this week - CVE-2025-26465 & CVE-2025-26466

I don’t think either are bad, you should keep calm and patch as per usual.

The first one needs a non-default config, and PoC for the second also uses a non-default config. Neither are RCE and I doubt will ever see in the wild exploitation.

Blog: blog.qualys.com/vulnerabilitie

Proof of concept: qualys.com/2025/02/18/openssh-

  • 19
  • 24
  • 13 hours ago
Profile picture

OpenSSH CVE fixes are now available in the new Flatcar Alpha, Beta, Stable, LTS-2024 releases!
🔒 CVE fixes & security patches: OpenSSH (CVE-2025-26465, CVE-2025-26466)
📜 Release notes at the usual spot: flatcar.org/releases/

  • 2
  • 2
  • 9 hours ago
Profile picture

New #OpenSSH flaws expose #SSH servers to #MiTM and #DoS attacks
The MiTM vulnerability, tracked under CVE-2025-26465, was introduced in December 2014 with the release of OpenSSH 6.8p1, so the issue remained undetected for over a decade. The flaw affects OpenSSH clients when the '#VerifyHostKeyDNS' option is enabled.
The denial of service vulnerability is CVE-2025-26466, a pre-authentication denial of service flaw introduced in OpenSSH 9.5p1, released in August 2023.
bleepingcomputer.com/news/secu

  • 2
  • 1
  • 7 hours ago

Overview

  • pbatard
  • rufus

18 Feb 2025
Published
19 Feb 2025
Updated

CVSS v4.0
MEDIUM (6.8)
EPSS
0.04%

KEV

Description

Rufus is a utility that helps format and create bootable USB flash drives. A DLL hijacking vulnerability in Rufus 4.6.2208 and earlier versions allows an attacker loading and executing a malicious DLL with escalated privileges (since the executable has been granted higher privileges during the time of launch) due to the ability to inject a malicious `cfgmgr32.dll` in the same directory as the executable and have it side load automatically. This is fixed in commit `74dfa49`, which will be part of version 4.7. Users are advised to upgrade as soon as version 4.7 becomes available. There are no known workarounds for this vulnerability.

Statistics

  • 1 Post
  • 7 Interactions

Fediverse

Profile picture

Y'all seem like the kind of nerds that use Rufus so here's an LPE DLL hijack fixed in v4.7:

github.com/pbatard/rufus/secur

A DLL hijacking vulnerability in Rufus 4.6.2208 and earlier versions allows an attacker loading and executing a malicious DLL with escalated privileges (since the executable has been granted higher privileges during the time of launch) due to the ability to inject a malicious cfgmgr32.dll in the same directory as the executable and have it side load automatically.

nvd.nist.gov/vuln/detail/CVE-2

  • 3
  • 4
  • 23 hours ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 7
  • grub2

19 Feb 2025
Published
19 Feb 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections.

Statistics

  • 1 Post
  • 8 Interactions

Fediverse

Profile picture

I guess technically it's grub_strcpy() but close enough.

bugzilla.redhat.com/show_bug.c

A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections.

nvd.nist.gov/vuln/detail/CVE-2

  • 2
  • 6
  • 1 hour ago

Overview

  • Red Hat
  • Enterprise Linux 7
  • xorg-server

30 Oct 2024
Published
26 Dec 2024
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.

Statistics

  • 1 Post
  • 4 Interactions

Fediverse

Overview

  • Dell
  • Dell Client Platform BIOS

19 Feb 2025
Published
19 Feb 2025
Updated

CVSS v3.1
HIGH (8.2)
EPSS
Pending

KEV

Description

Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Statistics

  • 1 Post
  • 2 Interactions

Fediverse

Profile picture

Does anyone have any more info on this one?

dell.com/support/kbdoc/en-us/0

sev:HIGH 8.2 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

What constitutes a high privileged attacker with local access when you're talking about a BIOS vuln, especially when the vulnerability specifically leads to EoP?

nvd.nist.gov/vuln/detail/CVE-2

  • 1
  • 1
  • 5 hours ago

Overview

  • iniparser
  • iniparser

19 Feb 2025
Published
19 Feb 2025
Updated

CVSS v4.0
MEDIUM (5.1)
EPSS
Pending

KEV

Description

Heap-based Buffer Overflow vulnerability in iniparser_dumpsection_ini() in iniparser allows attacker to read out of bound memory

Statistics

  • 1 Post
  • 1 Interaction

Fediverse

Profile picture

I don't know what all devices use this vulnerable version of iniparser dot c but some of y'all are really good at hacking on devices and also fuck Samsung anyway and the fact this got a CVE instead of getting silently patched is nice.

gitlab.com/iniparser/iniparser

Heap-based Buffer Overflow vulnerability in iniparser_dumpsection_ini() in iniparser allows attacker to read out of bound memory

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 1
  • 8 hours ago

Overview

  • nuxt-modules
  • mdc

06 Feb 2025
Published
12 Feb 2025
Updated

CVSS v3.1
CRITICAL (9.3)
EPSS
0.04%

KEV

Description

MDC is a tool to take regular Markdown and write documents interacting deeply with a Vue component. In affected versions unsafe parsing logic of the URL from markdown can lead to arbitrary JavaScript code due to a bypass to the existing guards around the `javascript:` protocol scheme in the URL. The parsing logic implement in `props.ts` maintains a deny-list approach to filtering potential malicious payload. It does so by matching protocol schemes like `javascript:` and others. These security guards can be bypassed by an adversarial that provides JavaScript URLs with HTML entities encoded via hex string. Users who consume this library and perform markdown parsing from unvalidated sources could result in rendering vulnerable XSS anchor links. This vulnerability has been addressed in version 0.13.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Statistics

  • 1 Post

Fediverse

Profile picture

I found a vulnerability in Nuxt MDC: nodejs-security.com/blog/nuxt-

Are you using the Nuxt MDC library to render LLM generated content in your Nuxt.js apps? You want to read this article to understand how I came to find a Cross-site Scripting vulnerability identified today as CVE-2025-24981

  • 0
  • 0
  • 4 hours ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post

Fediverse

Profile picture

The security flaw (tracked as CVE-2025-21589) was found during internal product security testing, and it also affects Session Smart Conductor and WAN Assurance Managed Routers. bleepingcomputer.com/news/secu

  • 0
  • 0
  • 11 hours ago

Overview

  • Palo Alto Networks
  • Cloud NGFW

12 Feb 2025
Published
12 Feb 2025
Updated

CVSS v4.0
HIGH (7.1)
EPSS
0.04%

KEV

Description

An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.

Statistics

  • 2 Posts

Fediverse

Profile picture

**Deutsche Version (Umschrieben):**

Moin Leute! CISA KEV meldet sich mal wieder zu Wort 🚨 Und diesmal geht's um Palo Alto (CVE-2025-0108) und SonicWall (CVE-2024-53704). Die haben's echt faustdick hinter den Ohren! Wir reden hier von Authentication Bypass und Improper Auth, und zwar direkt im VPN-Bereich. Das tut weh!

Als Pentester sehe ich sowas ja leider täglich. 😩 VPNs sind halt oft die Haupteinfallsrouten. Wenn da Unbefugte reinkommen, ist das natürlich megaätzend. Und hinterher heißt es dann immer: "Hätten wir doch bloß..."

Und das Schlimmste: Palo Alto kann man sogar noch chainen (CVE-2024-9474 & CVE-2025-0111) 🤯 GreyNoise hat bereits Exploits entdeckt! Also, Leute, was heißt das? Patchen, patchen, patchen! Security by Design muss einfach Standard sein!

Habt ihr eure Systeme schon geupdatet? Wie sind eure Erfahrungen mit Palo Alto/SonicWall? Erzählt mal, bin gespannt!

**Englische Version (Umschrieben und Übersetzt):**

Hey everyone! CISA KEV is back with an update 🚨 This time it's about Palo Alto (CVE-2025-0108) and SonicWall (CVE-2024-53704), and let me tell you, these are nasty! We're talking about Authentication Bypass and Improper Auth, right in the VPN space. Ouch!

As a pentester, I see this stuff all the time, unfortunately. 😩 VPNs are often the number one entry point. Unauthorized access? That's a big no-no. And then everyone says, "If only we had..."

But here's the kicker: you can even chain Palo Alto (CVE-2024-9474 & CVE-2025-0111) 🤯 GreyNoise has already spotted exploits in the wild! So what does that mean? Patch, patch, patch! Security by Design simply has to be the standard!

Have you updated your systems yet? What are your experiences with Palo Alto/SonicWall? Let me know in the comments!

  • 0
  • 0
  • 11 hours ago
Profile picture

Allarme CISA: vulnerabilità critiche in PAN-OS e SonicOS sotto attacco!

La Cybersecurity and Infrastructure Security Agency (CISA) degli Stati Uniti ha aggiunto al suo catalogo delle vulnerabilità note sfruttate ( KEV ) due falle di sicurezza che interessano Palo Alto Networks PAN-OS e SonicWall SonicOS SSLVPN, sulla base di prove concrete di sfruttamento attivo.

La società di intelligence sulle minacce GreyNoise ha affermato che ben 25 indirizzi IP dannosi stanno sfruttando attivamente CVE-2025-0108, con il volume di attività degli aggressori in aumento di 10 volte da quando è stato rilevato quasi una settimana fa. Le prime tre fonti di traffico di attacco sono Stati Uniti, Germania e Paesi Bassi.

I difetti sono elencati di seguito:

  • CVE-2025-0108 (punteggio CVSS: 7,8) – Una vulnerabilità di bypass dell’autenticazione nell’interfaccia web di gestione PAN-OS di Palo Alto Networks che consente a un aggressore non autenticato con accesso di rete all’interfaccia web di bypassare l’autenticazione normalmente richiesta e richiamare determinati script PHP
  • CVE-2024-53704 (punteggio CVSS: 8,2) – Una vulnerabilità di broken authentication nel meccanismo di autenticazione SSLVPN che consente a un aggressore remoto di aggirare l’autenticazione

“Palo Alto Networks ha osservato tentativi di exploit che collegano CVE-2025-0108 con CVE-2024-9474 e CVE-2025-0111 su interfacce di gestione web PAN-OS non protette e non corrette”, si legge in un avviso aggiornato.

Per quanto riguarda il CVE-2024-53704, la società di sicurezza informatica Arctic Wolf ha rivelato che gli autori della minaccia stanno sfruttando la falla come arma poco dopo che Bishop Fox ha reso disponibile una proof-of-concept (PoC).

L'articolo Allarme CISA: vulnerabilità critiche in PAN-OS e SonicOS sotto attacco! proviene da il blog della sicurezza informatica.

  • 0
  • 0
  • 6 hours ago
Showing 1 to 10 of 32 CVEs