Overview
Description
Statistics
- 22 Posts
- 9 Interactions
Fediverse
Dell warns of a max-severity flaw (CVE-2026-22769) in RecoverPoint for VMs, already exploited for root access in the wild. 🔓💻 Security teams are urged to patch or apply mitigations immediately. Details: https://cyberinsider.com/dell-warns-of-max-severity-flaw-in-recoverpoint-exploited-by-hackers/ #cybersecurity #infosec #Dell #Newz
Critical Dell RecoverPoint Exploit Exposed Since 2024
A zero-day Dell RecoverPoint exploit, CVE-2026-22769, has been actively exploited since mid-2024. Patch immediately to avoid data breaches.
Read more: https://thefinancialstandard.com/dell-recoverpoint-exploit/
The activity involves the exploitation of CVE-2026-22769 (CVSS score: 10.0), a case of hard-coded credentials affecting versions prior to 6.0.3.1 HF1. Other products, including RecoverPoint Classic, are not vulnerable to the flaw. https://thehackernews.com/2026/02/dell-recoverpoint-for-vms-zero-day-cve.html
🚨 Mandiant have identified zero-day exploitation of a high-risk vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769.
RecoverPoint can be detected using this Nuclei template:
https://github.com/projectdiscovery/nuclei-templates/pull/15377/changes
Very limited exposure to the internet.
Dell recommends upgrading to version 6.0.3.1 HF1 or later. Mitigations are also available.
Mandiant report:
https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day
A suspected China-linked cyberespionage group, UNC6201, has been exploiting a Dell zero-day vulnerability (CVE-2026-22769) in RecoverPoint for Virtual Machines since mid-2024, deploying backdoors like BRICKSTORM and GRIMBOLT and a webshell called SLAYSTYLE. The attackers leveraged default credentials to gain access and deployed stealthy tactics, including novel methods to pivot into VMware virtual infrastructure.
https://www.helpnetsecurity.com/2026/02/18/exploited-dell-zero-day-cve-2026-22769-brickstorm-grimbolt/
⚠️ Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
https://thehackernews.com/2026/02/dell-recoverpoint-for-vms-zero-day-cve.html
Bluesky
Description
Statistics
- 15 Posts
- 4 Interactions
Fediverse
Яндекс браузер, похоже, уязвим.
Вот PoC: https://github.com/huseyinstif/CVE-2026-2441-PoC
Bluesky
Overview
- Grandstream
- GXP1610
Description
Statistics
- 6 Posts
- 8 Interactions
Fediverse
🚨 CVE-2026-2329: CRITICAL stack buffer overflow in Grandstream GXP1610 series (all models) via /cgi-bin/api.values.get. Unauth RCE possible — restrict HTTP API access, segment devices, and monitor traffic. Patch ASAP when available. https://radar.offseq.com/threat/cve-2026-2329-cwe-121-stack-based-buffer-overflow--e34cb0a5 #OffSeq #VoIP #RCE #Security
A critical security flaw (CVE-2026-2329) has been discovered in Grandstream GXP1600 series VoIP phones, enabling unauthenticated remote code execution with root privileges. This vulnerability, present in the device's web-based API, affects multiple models and has been addressed in a firmware update (version 1.0.7.81).
https://thehackernews.com/2026/02/grandstream-gxp1600-voip-phones-exposed.html
Bluesky
Overview
- Microsoft
- Windows Admin Center
Description
Statistics
- 2 Posts
- 2 Interactions
Bluesky
Overview
- berocket
- Advanced AJAX Product Filters
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
🔒 CVE-2026-1426: HIGH severity PHP Object Injection in berocket Advanced AJAX Product Filters (WordPress, <=3.1.9.6). Requires Author access + Live Composer, and a gadget chain in another plugin/theme. Update or audit now! https://radar.offseq.com/threat/cve-2026-1426-cwe-502-deserialization-of-untrusted-d5d3ff22 #OffSeq #WordPress #PHP
Overview
Description
Statistics
- 2 Posts
Fediverse
🚨 Active exploitation confirmed for a new unauthenticated RCE in Ivanti - CVE-2026-1281
With a CVSS of 9.8 and part of CISA KEV, attackers need *zero* credentials to use this CVE and exploit legacy bash scripts and gain root access.
So we updated Pentest-Tools.com to help you confirm the risk:
📡 Network Scanner - detects exposed Ivanti EPMM instances on your perimeter.
🎯 Sniper Auto-Exploiter - safely demonstrates the RCE to prove the risk is real (and urgent).
Find more info for your rapid response flows here: https://pentest-tools.com/vulnerabilities-exploits/ivanti-endpoint-manager-mobile-remote-code-execution_28881
#offensivesecurity #ethicalhacking #infosec #cybersecurity #vulnerabilitymanagement
The German BSI on the recently patched Ivanti Endpoint Manager Mobile (EPMM) vulnerability CVE-2026-1281: "the BSI has evidence that a exploitation of the vulnerability may have taken place at least since summer 2025." (Translated)
Kudo's to them for making this public.
#cybersecurity #vulnerability #CVE-2026-1281
Overview
Description
Statistics
- 4 Posts
- 1 Interaction
Fediverse
Gitlab vulnerability CVE-2021-22175 got added to the CISA KEV. But this vuln is just a more complete patch to CVE-2021-22214. Likewise CVE-2021-39935 covers even more case where the CI Lint function could be used without authentication. In fact, the exploit code identical for all vulnerabilites. CVE-2021-39935 was already on the list, CVE-2021-22175 got added today and CVE-2021-22214 is still missing.
Bluesky
Overview
Description
Statistics
- 1 Post
- 5 Interactions
Fediverse
If you're using firebase/php-jwt v6, surprise!
GitHub Advisory GHSA for CVE-2025-45769 ignores NVD "Disputed" status, blocks all php-jwt v6 users.
Details here:
Overview
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
#OT #Advisory VDE-2026-0001
JBL: DoS vulnerability in Flip 4
Any attacker in radio range can send malicious messages to cause the device to crash.
#CVE CVE-2025-41725
https://certvde.com/en/advisories/vde-2026-0001/
#CSAF https://harman.csaf-tp.certvde.com/.well-known/csaf/white/2026/hbsa-2025-0003.json #oCSAF
Overview
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
@TheBreadmonkey Fun fact: In the movie the The Matrix Reloaded - Trinity executes a real world exploit (CVE-2001-0144) against an SSH server using nmap.
Not So Fun Fact: There's probably some system somewhere exposed to Mr. Internet still running that vulnerable version of SSH