https://vulnerability.circl.lu/bundles/feed.atomMost recent bundles.2025-03-28T08:19:13.059512+00:00Vulnerability-Lookupinfo@circl.lupython-feedgenContains only the most 10 recent bundles.https://vulnerability.circl.lu/bundle/b0eb6548-dfb1-42e3-90a2-d9bf681ffc71A triple-exploit chain. auth bypass (1) to exposed dbus interface (2) to command injection (3) (from @da_667@infosec.exchange)2025-03-28T08:19:13.072314+00:00Cédric Bonhommehttp://vulnerability.circl.lu/user/cedricA triple-exploit chain. auth bypass (1) to exposed dbus interface (2) to command injection (3):
https://www.exploit-db.com/exploits/451002025-01-23T08:14:00.851963+00:00https://vulnerability.circl.lu/bundle/f16e4486-bb1e-424d-9c5e-24cd9c0be4c1CMSimple 5.16 vulnerabilities leading to RCE2025-03-28T08:19:13.072266+00:00Cédric Bonhommehttp://vulnerability.circl.lu/user/cedric#### Vulnerabilities in CMSimple 5.16 leading to RCE
* CVE-2024-57546 - An issue in CMSimple v.5.16 allows a remote attacker to obtain sensitive information via a crafted script to the validate link function.
* CVE-2024-57547 - Insecure Permissions vulnerability in CMSimple v.5.16 allows a remote attacker to obtain sensitive information via a crafted script to the Functionality of downloading php backup files.
* CVE-2024-57548 - CMSimple 5.16 allows the user to edit log.php file via print page.
* CVE-2024-57549 - CMSimple 5.16 allows the user to read cms source code through manipulation of the file name in the file parameter of a GET request.
#### Original research
[https://github.com/h4ckr4v3n/cmsimple5.16_research](https://github.com/h4ckr4v3n/cmsimple5.16_research)2025-01-24T07:56:51.051542+00:00https://vulnerability.circl.lu/bundle/d3075493-7100-4a9c-9b70-41f0581a825cCommand injection and insecure default credentials vulnerabilities in certain legacy DSL CPE from Zyxel2025-03-28T08:19:13.072218+00:00Cédric Bonhommehttp://vulnerability.circl.lu/user/cedric## Summary
Zyxel recently became aware of CVE-2024-40890 and CVE-2024-40891 being mentioned in a post on GreyNoise’s blog. Additionally, VulnCheck informed us that they will publish the technical details regarding CVE-2024-40891 and CVE-2025-0890 on their blog. We have confirmed that the affected models reported by VulnCheck, VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, are legacy products that have reached end-of-life (EOL) for years. Therefore, we strongly recommend that users replace them with newer-generation products for optimal protection.
What are the vulnerabilities?
### CVE-2024-40890
**UNSUPPORTED WHEN ASSIGNED**
A post-authentication command injection vulnerability in the CGI program of certain legacy DSL CPE models, including VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request. It is important to note that WAN access is disabled by default on these devices, and this attack can only be successful if user-configured passwords have been compromised.
### CVE-2024-40891
**UNSUPPORTED WHEN ASSIGNED**
A post-authentication command injection vulnerability in the management commands of certain legacy DSL CPE models, including VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500. This vulnerability could allow an authenticated attacker to execute OS commands on an affected device via Telnet. It is important to note that WAN access and the Telnet function are disabled by default on these devices, and this attack can only be successful if the user-configured passwords have been compromised.
### CVE-2025-0890
**UNSUPPORTED WHEN ASSIGNED**
Insecure default credentials for the Telnet function in certain legacy DSL CPE models, including VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, could allow an attacker to log in to the management interface if the administrators have the option to change the default credentials but fail to do so. It is important to note that WAN access and the Telnet function are disabled by default on these devices.
What should you do?
The following models—VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500—are legacy products that have reached EOL status for several years. In accordance with industry product life cycle management practices, Zyxel advises customers to replace these legacy products with newer-generation equipment for optimal protection. If you obtained your Zyxel product through an internet service provider (ISP), please contact the ISP for support. For ISPs, please contact your Zyxel sales or service representatives for further details.
Additionally, disabling remote access and periodically changing passwords are proactive measures that can help prevent potential attacks.
Coordinated Timeline:
* 2024-07-13: VulnCheck notified Zyxel about vulnerabilities in the EOL CPE VMG4325-B10A without providing any reports.
* 2024-07-14: Zyxel requested VulnCheck to provide a detailed report; however, VulnCheck did not respond.
* 2024-07-31: VulnCheck published CVE-2024-40890 and CVE-2024-40891 on their blog without informing Zyxel.
* 2025-01-28: GreyNoise published CVE-2024-40890 and CVE-2024-40891 on their blog.
* 2025-01-29: Zyxel received VulnCheck’s report regarding CVE-2024-40890, CVE-2024-40891, and CVE-2025-0890.
* 2025-01-29: Zyxel became aware of the vulnerabilities in certain legacy DSL CPE models.
2025-02-05T18:29:21.812438+00:00https://vulnerability.circl.lu/bundle/52db1232-3e47-4bf4-a6ed-a4b863f96ab9Unauthenticated RCE on Some Netgear WiFi Routers, PSV-2023-00392025-03-28T08:19:13.072169+00:00Cédric Bonhommehttp://vulnerability.circl.lu/user/cedricNETGEAR has released fixes for an unauthenticated RCE security vulnerability on the following product models:
* XR1000 fixed in firmware version 1.0.0.74
* XR1000v2 fixed in firmware version 1.1.0.22
* XR500 fixed in firmware version 2.3.2.134
NETGEAR strongly recommends that you download the latest firmware as soon as possible.2025-02-10T18:09:14.246689+00:00https://vulnerability.circl.lu/bundle/26561a4f-d892-4f81-a2d1-231d4980d359disabling cert checks: "we have not learned much" from @bagder@mastodon.social2025-03-28T08:19:13.072118+00:00Cédric Bonhommehttp://vulnerability.circl.lu/user/cedric<img src="https://daniel.haxx.se/blog/wp-content/uploads/2022/08/bad-mistakes-ahead.jpg" width="100%" />
The article "Disabling cert checks: we have not learned much" by Daniel Stenberg, published on February 11, 2025, discusses the persistent issue of developers disabling SSL/TLS certificate verification in applications, despite the security risks involved. Stenberg reflects on the history of SSL/TLS usage, emphasizing that since 2002, curl has verified server certificates by default to prevent man-in-the-middle attacks. He highlights common challenges that lead developers to disable certificate verification, such as development environment mismatches, outdated CA stores, or expired certificates. Despite efforts to educate and design APIs that encourage secure practices, the problem persists, indicating a need for continued emphasis on the importance of proper certificate verification in software development.
A quick CVE search immediately reveals security vulnerabilities for exactly this problem published only last year:
* CVE-2024-32928 – The libcurl CURLOPT_SSL_VERIFYPEER option was disabled on a subset of requests made by Nest production devices.
* CVE-2024-56521 – An issue was discovered in TCPDF before 6.8.0. If libcurl is used, CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER are set unsafely.
* CVE-2024-5261 – In affected versions of Collabora Online, in LibreOfficeKit, curl’s TLS certificate verification was disabled (CURLOPT_SSL_VERIFYPEER of false).
2025-02-12T07:00:09.866541+00:00https://vulnerability.circl.lu/bundle/fa564b90-570e-4019-98ec-06e92280bea5A Mirai botnet is attempting exploitation in the wild using a new (at least to us) set of CVEs2025-03-28T08:19:13.072063+00:00Cédric Bonhommehttp://vulnerability.circl.lu/user/cedricA Mirai botnet is attempting exploitation in the wild using a new set of CVEs, focusing mostly on IoT devices. Includes:
- Tenda CVE-2024-41473
- Draytek CVE-2024-12987
- HuangDou UTCMS V9 CVE-2024-9916
- Totolink CVE-2024-2353 CVE-2024-24328 CVE-2024-24329
- (likely) Four-Faith CVE-2024-9644
Source: The Shadowserver Foundation2025-02-12T13:38:55.560603+00:00https://vulnerability.circl.lu/bundle/f7d3e0a5-0b01-4120-b61f-763c0f94f7c7Potential privilege escalation in IDPKI (CVE-2024-39327, CVE-2024-39328, CVE-2024-51505)2025-03-28T08:19:13.072008+00:00Cédric Bonhommehttp://vulnerability.circl.lu/user/cedricA security assessment of IDPKI implementation revealed a weakness potentially allowing an operator to exceed its privileges.
In the course of a pentest security assessment of IDPKI, some security measures protecting internal communications were found potentially compromised for an internal user with high privileges.
None of these vulnerabilities put Certificate Authority (CA) private key at risk.
Eviden analyzed the root cause of the weakness. It revealed two separate vulnerabilities. During validation of the fix, an additional vulnerability of similar
nature was identified, leveraging some race condition to alter an internal automata state and achieve a system privilege escalation:
* CVE-2024-39327: The vulnerability could allow the possibility to obtain CA signing in an illegitimate way.
* CVE-2024-39328: Highly trusted role (Config Admin) could exceed their configuration privileges in a multi-partition environment and access some confidential data. Data integrity and availability is not at risk.
* CVE-2024-51505: Highly trusted role (Config Admin) could leverage a race condition to escalate privileges.
* CVE-2024-39327 correction has been validated and published.
* CVE-2024-39328 correction has been validated and published. This vulnerability has no impact in mono-partition nor in SaaS environments.
* CVE-2024-51505 risk is increased if the last fixes are not applied, as a lower privileged role is required. A fix is available and published.
2025-02-18T21:49:43.930268+00:00https://vulnerability.circl.lu/bundle/fdda4963-0aa7-4d15-8a8f-969db8f304caBlack Basta’s Leaked Chat Logs2025-03-28T08:19:13.071950+00:00Cédric Bonhommehttp://vulnerability.circl.lu/user/cedricLeaked ransomware chat logs reveal Black Basta’s targeted CVEs.
On February 11, 2025, a major leak exposed BLACKBASTA's internal Matrix chat logs. The leaker claimed they released the data because the group was targeting Russian banks. This leak closely resembles the previous Conti leaks.
Cybercrime group focused on Microsoft vulnerabilities as well as flaws in network edge devices and communications software.
We have sightings from MISP and The Shadowserver fundation related to the rejected CVE:
* CVE-2024-21683
* ghsa-vr88-2hv2-5jvf2025-03-01T00:04:35.920280+00:00https://vulnerability.circl.lu/bundle/11268897-8798-4ec2-bcac-b23fe0715823Cyber Threat Overview 2024 from CERT-FR2025-03-28T08:19:13.071851+00:00Cédric Bonhommehttp://vulnerability.circl.lu/user/cedric> In this fourth edition of the Cyber Threat Overview, The French Cybersecurity Agency (ANSSI) addresses prevalent cybersecurity threats and the pivotal incidents which occurred in 2024. In line with the previous years, ANSSI estimates that attackers associated with the cybercriminal ecosystem and reputedly linked to China and Russia are three of the main threats facing both critical information systems and the national ecosystem as a whole.
>
> This past year was also marked by the hosting of the Paris Olympic and Paralympic Games and by the number and the impact of vulnerabilities affecting information systems’ security edge devices.
| CVE | SCORE CVSS3.x | ÉDITEUR | RISQUE | RÉFÉRENCE CERT-FR |
|-----------------|--------------|--------------|------------------------------------------------------|--------------------------------------------|
| CVE-2024-21887 | 9.1 | IVANTI | Remote execution of arbitrary code, security policy and authentication bypass, access to restricted resources on different security and VPN gateways | CERTFR-2024-ALE-001, CERTFR-2024-AVI-0109, CERTFR-2024-AVI-0085 |
| CVE-2023-46805 | 8.2 | IVANTI | Remote execution of arbitrary code, security policy and authentication bypass on different security and VPN gateways | CERTFR-2024-ALE-0097 |
| CVE-2024-21893 | 8.2 |IVANTI | | |
| CVE-2024-3400 | 10.0 | PALO ALTO NETWORKS | Remote execution of arbitrary code on different security devices | CERTFR-2024-ALE-006, CERTFR-2024-AVI-0307 |
| CVE-2022-42475 | 9.8 | FORTINET | Remote execution of arbitrary code on different SSL VPN gateways | CERTFR-2022-ALE-012, CERTFR-2022-AVI-1090 |
| CVE-2024-8963 | 9.4 | IVANTI | Remote execution of arbitrary code and security policy bypass on different security and VPN gateways | CERTFR-2024-ALE-013, CERTFR-2024-AVI-0796, CERTFR-2024-AVI-0917 |
| CVE-2024-8190 | 7.2 | IVANTI | | CERTFR-2024-ALE-014, CERTFR-2024-AVI-0917 |
| CVE-2024-47575 | 9.8 | FORTINET | Remote execution of arbitrary code on different security devices | CERTFR-2024-ALE-014, CERTFR-2024-AVI-0917 |
| CVE-2024-21762 | 9.8 | FORTINET | Remote execution of arbitrary code on different security devices | CERTFR-2024-ALE-004, CERTFR-2024-AVI-0108 |
| CVE-2021-44228 | 10.0 | APACHE | Remote execution of arbitrary code | CERTFR-2021-ALE-022 |
| CVE-2024-24919 | 8.6 | CHECK POINT | Breach of data confidentiality | CERTFR-2024-ALE-008, CERTFR-2024-AVI-0449 |
2025-03-11T20:42:51.574321+00:00https://vulnerability.circl.lu/bundle/788f36f8-de85-4779-b4e3-6815a156b903Critical authentication bypass vulnerabilities (CVE-2025-25291 + CVE-2025-25292) were discovered in ruby-saml up to version 1.17.02025-03-28T08:19:13.069742+00:00Cédric Bonhommehttp://vulnerability.circl.lu/user/cedricCritical authentication bypass vulnerabilities (CVE-2025-25291 + CVE-2025-25292) were discovered in ruby-saml up to version 1.17.0.
More information: https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials/2025-03-13T05:57:30.908420+00:00