24h | 7d | 30d

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
06 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
77.80%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 36 Posts
  • 66 Interactions

Last activity: Last hour

Fediverse

Profile picture

React2Shell blog update 🚨 compromised Next.js nodes are rapidly being enlisted into botnets; threat actor activity reaches ~80 source countries; and more. greynoise.io/blog/cve-2025-551

  • 3
  • 7
  • 0
  • 14h ago
Profile picture
  • 2
  • 1
  • 0
  • 12h ago
Profile picture

En las últimas 24 horas se han detectado vulnerabilidades graves en dispositivos KVM chinos, explotación de 13 años en QEMU y fallos que permiten desactivar BitLocker en Windows, además de un análisis profundo de React2Shell y una alerta del FBI sobre secuestros virtuales por manipulación fotográfica, mientras un banco de Chipre fortalece su defensa ante ciberataques con Cloudflare. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 09/12/25 📆 |====

🔓 VULNERABILIDADES GRAVES EN SWITCH KVM CHINO

Un dispositivo de gestión remota de bajo costo fabricado por Sipeed presenta una grave vulnerabilidad que permite la grabación no autorizada de audio y otros fallos de seguridad críticos. Esta brecha pone en riesgo la confidencialidad y la integridad de la información gestionada a través del switch. Recomendamos evaluar el uso de estos dispositivos y aplicar parches o mitigaciones específicas. Conoce más detalles sobre estas fallas y cómo proteger tus sistemas 👉 djar.co/vddme

🛡️ POSESIÓN DE OBJETOS COM PARA DESACTIVAR BITLOCKER

Investigadores han descubierto que múltiples interfaces COM poco documentadas en Windows pueden ser explotadas para desactivar el cifrado Bitlocker sin autorización. Esta técnica podría permitir a atacantes evitar las protecciones de cifrado y acceder a datos sensibles almacenados en discos duros. Es vital reforzar las políticas de seguridad y controlar estrictamente los accesos a estas interfaces internas. Explora el método y recomendaciones para blindar Bitlocker aquí 👉 djar.co/gmEf

🐚 ANÁLISIS PROFUNDO DE LA VULNERABILIDAD REACT2SHELL CVE-2025-55182

Se presenta un estudio técnico detallado sobre la vulnerabilidad React2Shell, que aprovecha errores de deserialización para ejecutar código malicioso en frameworks afectados. El análisis incluye la identificación de cadenas de gadgets, escenarios de explotación, y su impacto en aplicaciones web modernas. Entender esta amenaza es esencial para desarrolladores y equipos de seguridad que buscan proteger sus entornos. Descubre el informe completo y cómo mitigar este riesgo 👉 djar.co/ZV3Jr

📸 ALERTA DEL FBI: SECUESTROS VIRTUALES MEDIANTE MANIPULACIÓN DE FOTOS ONLINE

El FBI ha alertado sobre una modalidad de fraude en la que criminales manipulan fotografías compartidas en redes sociales para crear falsas pruebas de vida de supuestas víctimas y exigir rescates por secuestros virtuales. Esta técnica sofisticada pone en evidencia la importancia de una gestión cuidadosa de la información personal en internet y la implementación de medidas de verificación ante solicitudes sospechosas. Infórmate sobre cómo evitar ser víctima de estas estafas 👉 djar.co/yN5Vwg

🏦 CASO DE ÉXITO: BANCO DE CHIPRE Y CLOUDFLARE PARA DEFENDERSE DE CIBERATAQUES

Uno de los bancos más grandes de Chipre ha logrado eliminar retrasos críticos en la respuesta a ciberataques y mantener la disponibilidad continua de sus servicios esenciales mediante soluciones integradas con Cloudflare. Este caso evidencia cómo las alianzas tecnológicas estratégicas y la implementación de protecciones avanzadas permiten fortalecer la resiliencia de infraestructuras financieras ante amenazas persistentes. Descubre los detalles y aprendizajes clave de esta colaboración 👉 djar.co/Bh1sQG

🐛 EXPLOTACIÓN DE UNA VULNERABILIDAD DE 13 AÑOS EN QEMU

Se ha documentado la explotación de un bug en QEMU, el popular emulador y virtualizador de código abierto, que se remonta a más de una década. Este caso resalta la importancia crítica de mantener actualizado el software de virtualización para evitar que vulnerabilidades antiguas sean aprovechadas por atacantes. Mantener los sistemas parches al día es fundamental para proteger entornos virtuales. Conoce más sobre esta vulnerabilidad y mejores prácticas para mitigación 👉 djar.co/8mhb1

  • 1
  • 1
  • 0
  • 20h ago
Profile picture

React2Shell Exploitation in the Wild: CVE-2025-55182 Analysis

Within 24 hours of the React Server Components RCE disclosure (CVE-2025-55182, CVSS 10.0), we observed active exploitation campaigns targeting vulnerable Next.JS applications, leading to cryptojacking operations across multiple continents.

Our latest blog post details:

• Real-world incident response from compromised production servers
• Timeline of attack progression from initial recon to persistence
• Multiple threat actor clusters exploiting the same vulnerability
• AI-assisted malware development patterns
• Forensic analysis of deployed cryptominers and backdoors

Key Findings:
- First exploitation attempts detected as early as December 5th, 2025
- Attackers refined their tooling within 18 hours between reinfection attempts
- Targets span US, Europe, and Southeast Asia, including large enterprise environments
- Multiple persistence mechanisms: systemd units, shell injection, custom SSH servers

Full technical analysis on our blog:

tlpblack.net/blog/20251209-the

Hashes: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C2 IP Addresses:
39.97.229[.]220
43.247.134[.]215
45.76.155[.]14
45.157.233[.]80
46.36.37[.]85
47.84.113[.]198
192.9.245[.]121
193.34.213[.]150

Stay safe!

  • 1
  • 0
  • 0
  • 9h ago
Profile picture

🚨 Plugin update: React2ShellPlugin (CVE-2025-55182).

Backdoor detection added - 16k+ Next.js servers detected with in-memory webshells allowing remote code execution.

Results: leakix.net/search?scope=leak&q

  • 0
  • 3
  • 1
  • 16h ago
Profile picture

New analysis of CVE-2025-55182 probes and payloads hitting our canaries via @albinolobster. Upshot is that attackers don't seem to be doing all they *could* do with this vulnerability yet, have mostly been sticking to familiar patterns for now.

vulncheck.com/blog/react2shell

  • 0
  • 3
  • 0
  • 15h ago
Profile picture

CVE-2025-55182

GG, no re.
And people wonder why we serve only static web pages at work. (it's a lot more effort, but at least nobody is gonna take over the web server itself)

  • 0
  • 3
  • 0
  • 9h ago
Profile picture

Exploitation of recent React RCE vul (CVE-2025-55182 - #React2Shell) leading to #Mirai infection ⤵️

Botnet Mirai C2 domains 📡:
effeminate.fuckphillipthegerman .ru
trap.fuckphillipthegerman .ru
tranny.fuckphillipthegerman .ru

Botnet Mirai C2 servers , all hosted at FORTIS 🇷🇺:
138.124.72.251:52896
138.124.69.154:60328
5.144.176.19:60328

Mirai #malware sample 🤖:
bazaar.abuse.ch/sample/ee2fe11

Payload delivery host 🌐:
urlhaus.abuse.ch/host/172.237.

Releated IOCs 🦊:
threatfox.abuse.ch/browse/tag/

  • 0
  • 1
  • 0
  • 2h ago
Profile picture

⚠️ Podverse Alpha Update ⚠️

I'm shutting off the Alpha website for the night, as there is a critical security vulnerability with the version of Next.js it is using (CVE-2025-55182).

Should have it redeployed and patched tomorrow.

Good video explaining the CVE: youtube.com/watch?v=s81dVUM-cQM

Thanks to @suorcd or notifying me.

#podverse #pv2

  • 0
  • 1
  • 0
  • Last hour
Profile picture

We haven't seen a CVSS 10.0 this scary since . 🚨
So we launched the exploit and here is the proof. 👇👇👇

Everyone talks about detecting (CVE-2025-55182). But detection can only take you so far.

To *truly* know if you are exposed to this CVSS 10.0 RCE, you need to validate it.

So we launched the exploit.

We updated our offensive security suite to safely execute the full attack chain against your infrastructure.

Here is how you validate your risk in seconds (see the evidence below 👇):

🚀 Validate directly with Sniper: Auto-Exploiter

Action: Launch Sniper: Auto-Exploiter on the target.

Result: The smoking gun. It executes the payload and confirms RCE.

Proof: As you can see from the report highlights, it achieves code execution as user Next.js and captures full command history.

This isn't a simulation. It's a confirmed RCE path on a Linux target running Next.js.

Why this matters: Standard scanners might flag your safe apps as vulnerable (FPs) or miss modified instances (false negatives). Validation removes the doubt.

Don't guess. Exploit it (safely) before they do.

Run the validation now pentest-tools.com/exploit-help

  • 0
  • 0
  • 0
  • 15h ago
Profile picture

has elaborated on the critical vulnerability, CVE-2025-55182, that affects React 19.x and related server-side frameworks such as Next.js 15.x/16.x. The vulnerability enables unauthenticated remote code execution via malicious HTTP requests targeting the server’s decoding process. Exploitation allows attackers to gain full control over application servers...

blog.checkpoint.com/securing-t

  • 0
  • 0
  • 0
  • 14h ago
Profile picture

🚨 Execute arbitrary code on the server and even compromise the underlying infrastructure. This is what an attacker can do by exploiting CVE-2025-55182.

How can the exploitation of be prevented, detected, and mitigated? 👇🏻

tarlogic.com/blog/cve-2025-551

  • 0
  • 0
  • 0
  • 11h ago
Profile picture

Find out if you are vulnerable to the React2Shell vulnerability, covering both official tracking IDs:

• React Server Component exposure – CVE-2025-55182
• Next.js App Router RCE chain – CVE-2025-66478

#secpoint #secpointpenetrator #nextrce #react2shell #cve #cybersecurity #vulnerabilityscanning #nextjs #react

  • 0
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture
Update on React Server Components CVE-2025-55182: over 165K IPs & 644K domains with vulnerable code found on 2025-12-08 after scan targeting improvements! See: dashboard.shadowserver.org/statistics/c... Check for compromise & patch! Thank you to Validin & LeakIX for the collaboration!
  • 7
  • 12
  • 0
  • 14h ago
Profile picture
👀 React2Shell attacker profiles fresh from GreyNoise telemetry: info.greynoise.io/hubfs/PDFs-S..., don't miss the latest contribution from GreyNoise Labs on React2Shell: www.labs.greynoise.io/grimoire/202... #React2Shell #Nextjs #CVE202555182 #CVE #GreyNoise
  • 5
  • 8
  • 0
  • 12h ago
Profile picture
“CVE-2025-55182 (“React2Shell”) is a critical (CVSS 10.0), unauthenticated remote code execution vulnerability in React Server Components that is under active exploitation.” Brett Leatherman, FBI Assistant Director, Cyber Division: www.linkedin.com/posts/bleath...
  • 1
  • 1
  • 0
  • 17h ago
Profile picture
"EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks" published by Sysdig. #CVE-2025-55182, #EtherRAT, #React2Shell, #DPRK, #CTI https://www.sysdig.com/blog/etherrat-dprk-uses-novel-ethereum-implant-in-react2shell-attacks
  • 1
  • 0
  • 0
  • 17h ago
Profile picture
The Nextjs Nightmare: How a Single Query Parameter Can Give Hackers Root Access Introduction: A critical Server-Side Template Injection (SSTI) vulnerability, tracked as CVE-2025-55182, in Next.js versions 16.0.0 to 16.2.4 allows unauthenticated remote code execution. This flaw transforms a simple…
  • 0
  • 1
  • 0
  • 22h ago
Profile picture
World map of vulnerable IPs: dashboard.shadowserver.org/statistics/c... CVE-2025-55182 tracker: dashboard.shadowserver.org/statistics/c... #CyberCivilDefense
  • 0
  • 1
  • 0
  • 14h ago
Profile picture
> Weekly Report: JPCERT/CCが「React Server Componentsの脆弱性(CVE-2025-55182)について」を公開 https://www.jpcert.or.jp/wr/2025/wr251210.html#3
  • 0
  • 1
  • 0
  • 3h ago
Profile picture
The Nextjs Nightmare: How CVE-2025-55182 Exposes Your Web Apps and How This New Tool Automates the Exploit Introduction: A critical path traversal vulnerability, designated CVE-2025-55182, has been identified in Next.js, the popular React framework. This flaw allows unauthenticated attackers to…
  • 0
  • 1
  • 0
  • 3h ago
Profile picture
CVE-2025-55182 Analysis Report (Honeypot data, indicators)
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
React Server Componentsにおける脆弱性について(CVE-2025-55182) | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構 https://www.ipa.go.jp/security/security-alert/2025/alert20251209.html
  • 0
  • 0
  • 1
  • 23h ago
Profile picture
巨洞復現:CVE-2025-55182
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations https://cstu.io/a4f459 #developer #techno #programmer
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
> React Server Componentsにおける脆弱性について(CVE-2025-55182) https://www.ipa.go.jp/security/security-alert/2025/alert20251209.html
  • 0
  • 0
  • 1
  • 21h ago
Profile picture
"Multiple China-linked threat actors began exploiting the CVE-2025-55182, also known as the React2Shell flaw, within hours, according to AWS Security" securityaffairs.com/185436/secur... "help customers running React or Next.js applications in their own environments take immediate action" #cybersec
  • 0
  • 0
  • 0
  • 17h ago
Profile picture
The React2Shell Paradox: When a Helpful Hacker Patches Your Servers, Should You Panic? Introduction: A new and unusual threat actor is actively exploiting the critical React2Shell vulnerability (CVE-2025-55182) in exposed React Server Components, but with a bizarre twist: after gaining access,…
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
📌 North Korean Hackers Suspected in React2Shell Attacks Exploiting CVE-2025-55182 https://www.cyberhub.blog/article/16561-north-korean-hackers-suspected-in-react2shell-attacks-exploiting-cve-2025-55182
  • 0
  • 0
  • 0
  • 7h ago
Profile picture
Protect against React RSC CVE-2025-55182 with Azure Web Application Firewall (WAF) by Yuval Pery techcommunity.microsoft.com/t5/azure-net...
  • 0
  • 0
  • 0
  • 5h ago
Profile picture
vercel.com/changelog/cve-2... Summary of CVE-2025-55182 - Vercel
  • 0
  • 0
  • 0
  • 2h ago
Profile picture
Exploitation of recent React RCE vul (CVE-2025-55182 - #React2Shell) leading to #Mirai infection ⤵️ Botnet Mirai C2 domains 📡: fuckphillipthegerman .ru Botnet Mirai C2 servers , all hosted at FORTIS 🇷🇺: 138.124.72.251:52896 138.124.69.154:60328 5.144.176.19:60328
  • 0
  • 0
  • 0
  • 2h ago
Profile picture
www.wiz.io/blog/critical-v... React2Shell (CVE-2025-55182): Critical React Vulnerability | Wiz Blog
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Ivanti
  • Endpoint Manager

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.6)
EPSS
Pending

KEV

Description

Stored XSS in Ivanti Endpoint Manager prior to version 2024 SU4 SR1 allows a remote unauthenticated attacker to execute arbitrary JavaScript in the context of an administrator session. User interaction is required.

Statistics

  • 5 Posts

Last activity: Last hour

Fediverse

Profile picture

Here We Go Again With Another Critical Ivanti Endpoint Manager Bug

I feel like this is groundhog day as we have yet another critical Ivanti Endpoint Manager bug to deal with. This time around versions 2024 SU4 and below are vulnerable to stored cross-site scripting enabling attackers to remotely execute JavaScript code. Tracked as CVE-2025-10573 with a CVSS score of 9.6 out of 10. The vulnerability was patched on December 9, 2025 so you should patch all the things now.

itnerd.blog/2025/12/09/here-we

  • 0
  • 0
  • 0
  • 10h ago
Profile picture

🚨 CRITICAL: Fortinet, Ivanti, SAP patch auth bypass & code exec flaws (e.g. CVE-2025-59718, CVE-2025-10573, CVE-2025-42880). Affects FortiOS, FortiWeb, Ivanti Endpoint Manager, SAP Solution Manager. Patch ASAP & disable risky features! radar.offseq.com/threat/fortin

  • 0
  • 0
  • 0
  • Last hour

Bluesky

Profile picture
🚨 Earlier this year, Rapid7 researchers discovered a stored cross-site scripting (XSS) vuln. in #Ivanti Endpoint Manager (EPM) – affecting versions 2024 SU4 and below. Now patched, CVE-2025-10573 has been assigned a CVSS score of 9.6. More in our blog: r-7.co/4rN6TWo
  • 0
  • 0
  • 0
  • 13h ago
Profile picture
Ivanti warns of critical Endpoint Manager code execution flaw (CVE-2025-10573) #patchmanagement
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
Ivanti、EPMの重大なRCE欠陥について警告(CVE-2025-10573) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/42995/
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Apache Software Foundation
  • Apache Tika core
  • org.apache.tika:tika-core

04 Dec 2025
Published
05 Dec 2025
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. Second, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the "org.apache.tika:tika-parsers" module.

Statistics

  • 3 Posts

Last activity: 2 hours ago

Bluesky

Profile picture
📌 Critical XXE Vulnerability in Apache Tika (CVE-2025-66516) Poses Severe Risk https://www.cyberhub.blog/article/16531-critical-xxe-vulnerability-in-apache-tika-cve-2025-66516-poses-severe-risk
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
Critical CVE-2025-66516 Exposes Apache Tika to XXE Attacks Across Core and Parser Modules #Apache #ApacheVulnerability #Criticalsecurityflaw
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
Critical CVE-2025-66516 Exposes Apache Tika to XXE Attacks Across Core and Parser Modules - CySecurity News - Latest Information Security and Hacking Incidents https://www.cysecurity.news/2025/12/critical-cve-2025-66516-exposes-apache.html
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
Pending

KEV

Description

Improper neutralization of special elements used in a command ('command injection') in Windows PowerShell allows an unauthorized attacker to execute code locally.

Statistics

  • 3 Posts
  • 2 Interactions

Last activity: Last hour

Fediverse

Profile picture

As Microsoft explains, this mitigates a high-severity PowerShell remote code execution vulnerability (CVE-2025-54100), which primarily affects enterprise or IT-managed environments that use PowerShell scripts for automation, since PowerShell scripts are not as commonly used
2/3

  • 0
  • 0
  • 0
  • Last hour
Profile picture

Here are the publicly disclosed ones.

Command injection in GitHub Copilot for JetBrains:

msrc.microsoft.com/update-guid

an command injection in PowerShell:

msrc.microsoft.com/update-guid

  • 0
  • 2
  • 0
  • 13h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
Pending

Description

Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 2 hours ago

Fediverse

Profile picture

Here's the EITW one. It's an LPE in Cloud Files Mini Filter Driver.

msrc.microsoft.com/update-guid

  • 0
  • 1
  • 0
  • 13h ago

Bluesky

Profile picture
「この内 CVE-2025-62221 の脆弱性について、Microsoft 社では悪用の事実を確認済みと公表しており、今後被害が拡大するおそれがあるため、至急、セキュリティ更新プログラムを適用してください。」
  • 0
  • 0
  • 0
  • 2h ago
Profile picture
マイクロソフト、2025年12月の月例パッチで悪用されるゼロデイ含む脆弱性57件を修正(CVE-2025-62221ほか) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/42977/
  • 0
  • 0
  • 0
  • 2h ago
Profile picture
~Cisa~ CISA adds actively exploited WinRAR (CVE-2025-6218) and Windows (CVE-2025-62221) vulnerabilities to its KEV catalog, requiring federal remediation. - IOCs: CVE-2025-6218, CVE-2025-62221 - #CISA #KEV #ThreatIntel
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Pending

Pending
Published
03 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This CVE is a duplicate of CVE-2025-55182.

Statistics

  • 2 Posts

Last activity: 2 hours ago

Fediverse

Profile picture

Find out if you are vulnerable to the React2Shell vulnerability, covering both official tracking IDs:

• React Server Component exposure – CVE-2025-55182
• Next.js App Router RCE chain – CVE-2025-66478

#secpoint #secpointpenetrator #nextrce #react2shell #cve #cybersecurity #vulnerabilityscanning #nextjs #react

  • 0
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture
nextjs.org/blog/CVE-2025-66478 Security Advisory: CVE-2025-66478
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • RARLAB
  • WinRAR

21 Jun 2025
Published
10 Dec 2025
Updated

CVSS v3.0
HIGH (7.8)
EPSS
0.49%

Description

RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.

Statistics

  • 2 Posts

Last activity: 5 hours ago

Fediverse

Profile picture

🚨 CVE-2025-6218: RARLAB WinRAR Path Traversal Vulnerability has been added to the CISA KEV Catalog

CVSS: 7.8

darkwebinformer.com/cisa-kev-c

  • 0
  • 0
  • 0
  • 5h ago

Bluesky

Profile picture
~Cisa~ CISA adds actively exploited WinRAR (CVE-2025-6218) and Windows (CVE-2025-62221) vulnerabilities to its KEV catalog, requiring federal remediation. - IOCs: CVE-2025-6218, CVE-2025-62221 - #CISA #KEV #ThreatIntel
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • SAP_SE
  • SAP Solution Manager

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
0.05%

KEV

Description

Due to missing input sanitation, SAP Solution Manager allows an authenticated attacker to insert malicious code when calling a remote-enabled function module. This could provide the attacker with full control of the system hence leading to high impact on confidentiality, integrity and availability of the system.

Statistics

  • 3 Posts

Last activity: Last hour

Fediverse

Profile picture

🚨 CRITICAL: Fortinet, Ivanti, SAP patch auth bypass & code exec flaws (e.g. CVE-2025-59718, CVE-2025-10573, CVE-2025-42880). Affects FortiOS, FortiWeb, Ivanti Endpoint Manager, SAP Solution Manager. Patch ASAP & disable risky features! radar.offseq.com/threat/fortin

  • 0
  • 0
  • 0
  • Last hour
Profile picture

SAP Solution Manager: risolta una falla critica di con Severity CVSS da 9.9

SAP ha appena pubblicato l’ultimo aggiornamento di sicurezza annuale, che riporta 14 nuovi bug di sicurezza sanati. Tra questi unasupport.sap.com/en/my-support/…falla critica di “iniezione di codice” nel SAP Solution Manager rappresenta un rischio elevato per l’integrità dei sistemi aziendali, con un indice di gravità molto vicino al massimo.

Questa vulnerabilità, che vanta un punteggio CVSS pari a 9,9, viene etichettata come “Critica”. La sua origine risiede nell’assenza di una corretta sanificazione degli input, ciò che permette ad un utente malintenzionato, una volta autenticato, di eseguire del codice dannoso attraverso la richiamata di un modulo di funzione che può essere abilitato da remoto.

In questa collection di fix emergono altre due note critiche:

  • Vulnerabilità di Apache Tomcat in Commerce Cloud: SAP ha corretto diverse vulnerabilità che interessano Apache Tomcat in SAP Commerce Cloud. Queste falle , tra cui CVE-2025-55754, hanno un punteggio CVSS critico di 9,6.
  • Deserializzazione in jConnect: è stata corretta una vulnerabilità di deserializzazione ad alto rischio nell’SDK SAP jConnect per ASE. Questa falla (CVE-2025-42928), classificata CVSS 9.1, poteva consentire a un utente privilegiato di avviare l’esecuzione di codice remoto in condizioni specifiche.

Una delle preoccupazioni più significative è rappresentata dal CVE-2025-42880, una falla di sicurezza di tipo Code Injection che interessa SAP Solution Manager, soprattutto nella versione ST 720.

La compromissione della riservatezza, dell’integrità e della disponibilità potrebbe essere totale se un aggressore ottenesse il pieno controllo del sistema grazie a uno sfruttamento efficace. Le conseguenze sarebbero infatti molto serie.

Oltre agli avvisi critici, sono stati affrontati diversi problemi di elevata gravità:

  • Esposizione di dati sensibili (CVE-2025-42878): è stato scoperto che SAP Web Dispatcher e Internet Communication Manager (ICM) possono potenzialmente esporre le interfacce di test interne. Se lasciati abilitati, gli aggressori non autenticati potrebbero “accedere alla diagnostica, inviare richieste contraffatte o interrompere i servizi”.
  • Denial of Service (DoS): sono state corrette due vulnerabilità DoS separate (CVE-2025-42874 e CVE-2025-48976): una in SAP NetWeaver (servizio remoto per Xcelsius) e l’altra in SAP Business Objects.
  • Corruzione della memoria (CVE-2025-42877): è stato risolto anche un difetto di corruzione della memoria che interessava Web Dispatcher, ICM e SAP Content Server.

E’ fortemente consigliato che gli amministratori esaminino e implementino queste patch, soprattutto la correzione critica per Solution Manager, al fine di assicurare che i loro ambienti SAP continuino a essere protetti anche nel corso del 2026.

L'articolo SAP Solution Manager: risolta una falla critica di con Severity CVSS da 9.9 proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 21h ago

Bluesky

Profile picture
SAP fixes three critical vulnerabilities across multiple products SAP has released its December security updates addressing 14 vulnerabilities across a range of products, including three critical-severity flaws. The most severe (CVSS score: 9.9) of all the issues is CVE-2025-42880, a code…
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 6 Interactions

Last activity: 20 hours ago

Fediverse

Profile picture

#OpenAI #Codex CLI war angreifbar - da hätte man alles rausziehen und unterjubeln können.

borncity.com/blog/2025/12/09/k

  • 4
  • 2
  • 0
  • 20h ago

Overview

  • Fortinet
  • FortiSwitchManager

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
Pending

KEV

Description

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

Statistics

  • 3 Posts

Last activity: Last hour

Fediverse

Profile picture

🚨 CRITICAL: Fortinet, Ivanti, SAP patch auth bypass & code exec flaws (e.g. CVE-2025-59718, CVE-2025-10573, CVE-2025-42880). Affects FortiOS, FortiWeb, Ivanti Endpoint Manager, SAP Solution Manager. Patch ASAP & disable risky features! radar.offseq.com/threat/fortin

  • 0
  • 0
  • 0
  • Last hour

Bluesky

Profile picture
Fortinet、FortiCloud SSOログイン認証バイパスの重大な脆弱性について警告(CVE-2025-59718、CVE-2025-59719) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/42981/
  • 0
  • 0
  • 0
  • 2h ago
Profile picture
Fortinet warns of critical FortiCloud SSO login auth bypass flaws (CVE-2025-59718 and CVE-2025-59719) #patchmanagement
  • 0
  • 0
  • 0
  • 1h ago
Showing 1 to 10 of 88 CVEs