https://vulnerability.circl.lu/bundles/feed.atom Most recent bundles. 2025-03-28T08:19:13.059512+00:00 Vulnerability-Lookup info@circl.lu python-feedgen Contains only the most 10 recent bundles. https://vulnerability.circl.lu/bundle/b0eb6548-dfb1-42e3-90a2-d9bf681ffc71 A triple-exploit chain. auth bypass (1) to exposed dbus interface (2) to command injection (3) (from @da_667@infosec.exchange) 2025-03-28T08:19:13.072314+00:00 Cédric Bonhomme http://vulnerability.circl.lu/user/cedric A triple-exploit chain. auth bypass (1) to exposed dbus interface (2) to command injection (3): https://www.exploit-db.com/exploits/45100 2025-01-23T08:14:00.851963+00:00 https://vulnerability.circl.lu/bundle/f16e4486-bb1e-424d-9c5e-24cd9c0be4c1 CMSimple 5.16 vulnerabilities leading to RCE 2025-03-28T08:19:13.072266+00:00 Cédric Bonhomme http://vulnerability.circl.lu/user/cedric #### Vulnerabilities in CMSimple 5.16 leading to RCE * CVE-2024-57546 - An issue in CMSimple v.5.16 allows a remote attacker to obtain sensitive information via a crafted script to the validate link function. * CVE-2024-57547 - Insecure Permissions vulnerability in CMSimple v.5.16 allows a remote attacker to obtain sensitive information via a crafted script to the Functionality of downloading php backup files. * CVE-2024-57548 - CMSimple 5.16 allows the user to edit log.php file via print page. * CVE-2024-57549 - CMSimple 5.16 allows the user to read cms source code through manipulation of the file name in the file parameter of a GET request. #### Original research [https://github.com/h4ckr4v3n/cmsimple5.16_research](https://github.com/h4ckr4v3n/cmsimple5.16_research) 2025-01-24T07:56:51.051542+00:00 https://vulnerability.circl.lu/bundle/d3075493-7100-4a9c-9b70-41f0581a825c Command injection and insecure default credentials vulnerabilities in certain legacy DSL CPE from Zyxel 2025-03-28T08:19:13.072218+00:00 Cédric Bonhomme http://vulnerability.circl.lu/user/cedric ## Summary Zyxel recently became aware of CVE-2024-40890 and CVE-2024-40891 being mentioned in a post on GreyNoise’s blog. Additionally, VulnCheck informed us that they will publish the technical details regarding CVE-2024-40891 and CVE-2025-0890 on their blog. We have confirmed that the affected models reported by VulnCheck, VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, are legacy products that have reached end-of-life (EOL) for years. Therefore, we strongly recommend that users replace them with newer-generation products for optimal protection. What are the vulnerabilities? ### CVE-2024-40890 **UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the CGI program of certain legacy DSL CPE models, including VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request. It is important to note that WAN access is disabled by default on these devices, and this attack can only be successful if user-configured passwords have been compromised. ### CVE-2024-40891 **UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the management commands of certain legacy DSL CPE models, including VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500. This vulnerability could allow an authenticated attacker to execute OS commands on an affected device via Telnet. It is important to note that WAN access and the Telnet function are disabled by default on these devices, and this attack can only be successful if the user-configured passwords have been compromised. ### CVE-2025-0890 **UNSUPPORTED WHEN ASSIGNED** Insecure default credentials for the Telnet function in certain legacy DSL CPE models, including VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500, could allow an attacker to log in to the management interface if the administrators have the option to change the default credentials but fail to do so. It is important to note that WAN access and the Telnet function are disabled by default on these devices. What should you do? The following models—VMG1312-B10A, VMG1312-B10B, VMG1312-B10E, VMG3312-B10A, VMG3313-B10A, VMG3926-B10B, VMG4325-B10A, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, SBG3300, and SBG3500—are legacy products that have reached EOL status for several years. In accordance with industry product life cycle management practices, Zyxel advises customers to replace these legacy products with newer-generation equipment for optimal protection. If you obtained your Zyxel product through an internet service provider (ISP), please contact the ISP for support. For ISPs, please contact your Zyxel sales or service representatives for further details. Additionally, disabling remote access and periodically changing passwords are proactive measures that can help prevent potential attacks. Coordinated Timeline: * 2024-07-13: VulnCheck notified Zyxel about vulnerabilities in the EOL CPE VMG4325-B10A without providing any reports. * 2024-07-14: Zyxel requested VulnCheck to provide a detailed report; however, VulnCheck did not respond. * 2024-07-31: VulnCheck published CVE-2024-40890 and CVE-2024-40891 on their blog without informing Zyxel. * 2025-01-28: GreyNoise published CVE-2024-40890 and CVE-2024-40891 on their blog. * 2025-01-29: Zyxel received VulnCheck’s report regarding CVE-2024-40890, CVE-2024-40891, and CVE-2025-0890. * 2025-01-29: Zyxel became aware of the vulnerabilities in certain legacy DSL CPE models. 2025-02-05T18:29:21.812438+00:00 https://vulnerability.circl.lu/bundle/52db1232-3e47-4bf4-a6ed-a4b863f96ab9 Unauthenticated RCE on Some Netgear WiFi Routers, PSV-2023-0039 2025-03-28T08:19:13.072169+00:00 Cédric Bonhomme http://vulnerability.circl.lu/user/cedric NETGEAR has released fixes for an unauthenticated RCE security vulnerability on the following product models: * XR1000 fixed in firmware version 1.0.0.74 * XR1000v2 fixed in firmware version 1.1.0.22 * XR500 fixed in firmware version 2.3.2.134 NETGEAR strongly recommends that you download the latest firmware as soon as possible. 2025-02-10T18:09:14.246689+00:00 https://vulnerability.circl.lu/bundle/26561a4f-d892-4f81-a2d1-231d4980d359 disabling cert checks: "we have not learned much" from @bagder@mastodon.social 2025-03-28T08:19:13.072118+00:00 Cédric Bonhomme http://vulnerability.circl.lu/user/cedric <img src="https://daniel.haxx.se/blog/wp-content/uploads/2022/08/bad-mistakes-ahead.jpg" width="100%" /> The article "Disabling cert checks: we have not learned much" by Daniel Stenberg, published on February 11, 2025, discusses the persistent issue of developers disabling SSL/TLS certificate verification in applications, despite the security risks involved. Stenberg reflects on the history of SSL/TLS usage, emphasizing that since 2002, curl has verified server certificates by default to prevent man-in-the-middle attacks. He highlights common challenges that lead developers to disable certificate verification, such as development environment mismatches, outdated CA stores, or expired certificates. Despite efforts to educate and design APIs that encourage secure practices, the problem persists, indicating a need for continued emphasis on the importance of proper certificate verification in software development. A quick CVE search immediately reveals security vulnerabilities for exactly this problem published only last year: * CVE-2024-32928 – The libcurl CURLOPT_SSL_VERIFYPEER option was disabled on a subset of requests made by Nest production devices. * CVE-2024-56521 – An issue was discovered in TCPDF before 6.8.0. If libcurl is used, CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER are set unsafely. * CVE-2024-5261 – In affected versions of Collabora Online, in LibreOfficeKit, curl’s TLS certificate verification was disabled (CURLOPT_SSL_VERIFYPEER of false). 2025-02-12T07:00:09.866541+00:00 https://vulnerability.circl.lu/bundle/fa564b90-570e-4019-98ec-06e92280bea5 A Mirai botnet is attempting exploitation in the wild using a new (at least to us) set of CVEs 2025-03-28T08:19:13.072063+00:00 Cédric Bonhomme http://vulnerability.circl.lu/user/cedric A Mirai botnet is attempting exploitation in the wild using a new set of CVEs, focusing mostly on IoT devices. Includes: - Tenda CVE-2024-41473 - Draytek CVE-2024-12987 - HuangDou UTCMS V9 CVE-2024-9916 - Totolink CVE-2024-2353 CVE-2024-24328 CVE-2024-24329 - (likely) Four-Faith CVE-2024-9644 Source: The Shadowserver Foundation 2025-02-12T13:38:55.560603+00:00 https://vulnerability.circl.lu/bundle/f7d3e0a5-0b01-4120-b61f-763c0f94f7c7 Potential privilege escalation in IDPKI (CVE-2024-39327, CVE-2024-39328, CVE-2024-51505) 2025-03-28T08:19:13.072008+00:00 Cédric Bonhomme http://vulnerability.circl.lu/user/cedric A security assessment of IDPKI implementation revealed a weakness potentially allowing an operator to exceed its privileges. In the course of a pentest security assessment of IDPKI, some security measures protecting internal communications were found potentially compromised for an internal user with high privileges. None of these vulnerabilities put Certificate Authority (CA) private key at risk. Eviden analyzed the root cause of the weakness. It revealed two separate vulnerabilities. During validation of the fix, an additional vulnerability of similar nature was identified, leveraging some race condition to alter an internal automata state and achieve a system privilege escalation: * CVE-2024-39327: The vulnerability could allow the possibility to obtain CA signing in an illegitimate way. * CVE-2024-39328: Highly trusted role (Config Admin) could exceed their configuration privileges in a multi-partition environment and access some confidential data. Data integrity and availability is not at risk. * CVE-2024-51505: Highly trusted role (Config Admin) could leverage a race condition to escalate privileges. * CVE-2024-39327 correction has been validated and published. * CVE-2024-39328 correction has been validated and published. This vulnerability has no impact in mono-partition nor in SaaS environments. * CVE-2024-51505 risk is increased if the last fixes are not applied, as a lower privileged role is required. A fix is available and published. 2025-02-18T21:49:43.930268+00:00 https://vulnerability.circl.lu/bundle/fdda4963-0aa7-4d15-8a8f-969db8f304ca Black Basta’s Leaked Chat Logs 2025-03-28T08:19:13.071950+00:00 Cédric Bonhomme http://vulnerability.circl.lu/user/cedric Leaked ransomware chat logs reveal Black Basta’s targeted CVEs. On February 11, 2025, a major leak exposed BLACKBASTA's internal Matrix chat logs. The leaker claimed they released the data because the group was targeting Russian banks. This leak closely resembles the previous Conti leaks. Cybercrime group focused on Microsoft vulnerabilities as well as flaws in network edge devices and communications software. We have sightings from MISP and The Shadowserver fundation related to the rejected CVE: * CVE-2024-21683 * ghsa-vr88-2hv2-5jvf 2025-03-01T00:04:35.920280+00:00 https://vulnerability.circl.lu/bundle/11268897-8798-4ec2-bcac-b23fe0715823 Cyber Threat Overview 2024 from CERT-FR 2025-03-28T08:19:13.071851+00:00 Cédric Bonhomme http://vulnerability.circl.lu/user/cedric > In this fourth edition of the Cyber Threat Overview, The French Cybersecurity Agency (ANSSI) addresses prevalent cybersecurity threats and the pivotal incidents which occurred in 2024. In line with the previous years, ANSSI estimates that attackers associated with the cybercriminal ecosystem and reputedly linked to China and Russia are three of the main threats facing both critical information systems and the national ecosystem as a whole. > > This past year was also marked by the hosting of the Paris Olympic and Paralympic Games and by the number and the impact of vulnerabilities affecting information systems’ security edge devices. | CVE | SCORE CVSS3.x | ÉDITEUR | RISQUE | RÉFÉRENCE CERT-FR | |-----------------|--------------|--------------|------------------------------------------------------|--------------------------------------------| | CVE-2024-21887 | 9.1 | IVANTI | Remote execution of arbitrary code, security policy and authentication bypass, access to restricted resources on different security and VPN gateways | CERTFR-2024-ALE-001, CERTFR-2024-AVI-0109, CERTFR-2024-AVI-0085 | | CVE-2023-46805 | 8.2 | IVANTI | Remote execution of arbitrary code, security policy and authentication bypass on different security and VPN gateways | CERTFR-2024-ALE-0097 | | CVE-2024-21893 | 8.2 |IVANTI | | | | CVE-2024-3400 | 10.0 | PALO ALTO NETWORKS | Remote execution of arbitrary code on different security devices | CERTFR-2024-ALE-006, CERTFR-2024-AVI-0307 | | CVE-2022-42475 | 9.8 | FORTINET | Remote execution of arbitrary code on different SSL VPN gateways | CERTFR-2022-ALE-012, CERTFR-2022-AVI-1090 | | CVE-2024-8963 | 9.4 | IVANTI | Remote execution of arbitrary code and security policy bypass on different security and VPN gateways | CERTFR-2024-ALE-013, CERTFR-2024-AVI-0796, CERTFR-2024-AVI-0917 | | CVE-2024-8190 | 7.2 | IVANTI | | CERTFR-2024-ALE-014, CERTFR-2024-AVI-0917 | | CVE-2024-47575 | 9.8 | FORTINET | Remote execution of arbitrary code on different security devices | CERTFR-2024-ALE-014, CERTFR-2024-AVI-0917 | | CVE-2024-21762 | 9.8 | FORTINET | Remote execution of arbitrary code on different security devices | CERTFR-2024-ALE-004, CERTFR-2024-AVI-0108 | | CVE-2021-44228 | 10.0 | APACHE | Remote execution of arbitrary code | CERTFR-2021-ALE-022 | | CVE-2024-24919 | 8.6 | CHECK POINT | Breach of data confidentiality | CERTFR-2024-ALE-008, CERTFR-2024-AVI-0449 | 2025-03-11T20:42:51.574321+00:00 https://vulnerability.circl.lu/bundle/788f36f8-de85-4779-b4e3-6815a156b903 Critical authentication bypass vulnerabilities (CVE-2025-25291 + CVE-2025-25292) were discovered in ruby-saml up to version 1.17.0 2025-03-28T08:19:13.069742+00:00 Cédric Bonhomme http://vulnerability.circl.lu/user/cedric Critical authentication bypass vulnerabilities (CVE-2025-25291 + CVE-2025-25292) were discovered in ruby-saml up to version 1.17.0. More information: https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials/ 2025-03-13T05:57:30.908420+00:00