Tag: remote-code-execution
-
AirBorne flaws can lead to fully hijack Apple devices
by
in SecurityNewsVulnerabilities in Apple’s AirPlay protocol and SDK exposed Apple and third-party devices to attacks, including remote code execution. Oligo Security found serious flaws, collectively tracked as AirBorne, in Apple’s AirPlay protocol and SDK, affecting Apple and third-party devices. Attackers can exploit the vulnerabilities to perform zero-/one-click RCE, bypass ACLs, read local files, steal data, and…
-
Wormable AirPlay Zero-Click RCE Flaw Allows Remote Device Hijack via Wi-Fi
by
in SecurityNewsA major set of vulnerabilities-collectively named “AirBorne”-in Apple’s AirPlay protocol and SDK have been unveiled, enabling an array of severe attack vectors. Most critically, these flaws allow zero-click “wormable” Remote Code Execution (RCE), meaning attackers can take over Apple and third-party devices via Wi-Fi without any user interaction. The impact spans billions of devices globally, including…
-
AirBorne and Dangerous: Hacking Through the Soundwaves
by
in SecurityNewsResearchers Uncover Bugs in Apple’s AirPlay, Risking Takeover of Smart Devices. Vulnerabilities in wireless streaming protocol AirPlay could expose Apple operating system devices to remote code execution by enabling attackers to infiltrate networks through trusted connections. The flaws are in the software development kit used by third-party manufacturers. First seen on govinfosecurity.com Jump to article:…
-
Apple ‘AirBorne’ flaws can lead to zero-click AirPlay RCE attacks
by
in SecurityNews
Tags: apple, attack, data-breach, flaw, programming, rce, remote-code-execution, software, vulnerabilityA set of security vulnerabilities in Apple’s AirPlay Protocol and AirPlay Software Development Kit (SDK) exposed unpatched third-party and Apple devices to various attacks, including remote code execution. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/apple-airborne-flaws-can-lead-to-zero-click-airplay-rce-attacks/
-
Enterprise-specific zero-day exploits on the rise, Google warns
by
in SecurityNews
Tags: access, apple, apt, attack, china, cisco, cloud, crime, crimes, cyberespionage, detection, endpoint, exploit, finance, flaw, google, group, Hardware, incident response, injection, Internet, ivanti, korea, lessons-learned, mandiant, microsoft, mitigation, network, north-korea, remote-code-execution, russia, service, strategy, technology, threat, tool, update, vpn, vulnerability, zero-daySurge in network edge device exploitation: Of the 33 zero-day vulnerabilities in enterprise-specific products, 20 targeted hardware appliances typically located at the network edge, such as VPNs, security gateways, and firewalls. Notable targets last year included Ivanti Cloud Services Appliance, Palo Alto Networks’ PAN-OS, Cisco Adaptive Security Appliance, and Ivanti Connect Secure VPN.Targeted attacks against…
-
SAP fixes suspected Netweaver zero-day exploited in attacks
by
in SecurityNewsSAP has released out-of-band emergency NetWeaver updates to fix a suspected remote code execution (RCE) zero-day flaw actively exploited to hijack servers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/sap-fixes-suspected-netweaver-zero-day-exploited-in-attacks/
-
Critical Commvault Flaw Rated 10/10: CSA Urges Immediate Patching
by
in SecurityNewsThe Cyber Security Agency of Singapore (CSA) has warned users about a critical vulnerability affecting the Commvault Command Center. This Commvault vulnerability, identified as CVE-2025-34028, has been rated with a severity score of 10 out of 10 on the Common Vulnerability Scoring System (CVSS v3.1). It allows unauthenticated remote code execution, posing a direct risk…
-
Multiple Cisco Tools at Risk from Erlang/OTP SSH Remote Code Execution Flaw
by
in SecurityNews
Tags: advisory, cisco, cloud, cyber, flaw, infrastructure, network, remote-code-execution, risk, tool, vulnerabilityCisco has issued a high-severity advisory (cisco-sa-erlang-otp-ssh-xyZZy) warning of a critical remote code execution (RCE) vulnerability in products using Erlang/OTP’s SSH server. The flaw, tracked as CVE-2025-32433, allows unauthenticated attackers to execute arbitrary code on vulnerable devices, posing systemic risks to enterprise networks, cloud infrastructure, and telecom systems. Vulnerability Overview The flaw stems from improper handling…
-
Commvault RCE Vulnerability Exploited”, PoC Released
by
in SecurityNewsEnterprises and managed service providers globally are now facing urgent security concerns following the disclosure of a major pre-authenticated remote code execution (RCE) vulnerability in Commvault’s on-premise backup and recovery software. The issue, tracked as CVE-2025-34028, has rocked the cybersecurity world, particularly after researchers published a fully working proof-of-concept (PoC) exploit. With attackers actively probing…
-
Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028)
by
in SecurityNewsIf your organization is using Commvault Command Center for your data protection, backup creation, configuration and restoration needs, you should check whether your on-premise … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/04/24/critical-commvault-rce-vulnerability-fixed-poc-available-cve-2025-34028/
-
Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication
by
in SecurityNews
Tags: authentication, cyber, exploit, firewall, flaw, network, rce, remote-code-execution, vulnerability, zyxelSecurity researcher Alessandro Sgreccia (aka >>rainpwn
-
Critical Langflow Flaw Enables Malicious Code Injection Technical Breakdown Released
by
in SecurityNews
Tags: ai, cve, cvss, cyber, endpoint, flaw, injection, malicious, open-source, remote-code-execution, risk, vulnerabilityA critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score of 9.8, has been uncovered in Langflow, an open-source platform widely used for visually designing AI-driven agents and workflows. This flaw, residing in the platform’s /api/v1/validate/code endpoint, poses a significant risk to organizations leveraging Langflow in their AI development ecosystems. The…
-
CVE-2025-32433: Erlang/OTP SSH Unauthenticated Remote Code Execution Vulnerability
by
in SecurityNews
Tags: access, advisory, ai, attack, chatgpt, cve, data, exploit, firewall, flaw, germany, mitigation, remote-code-execution, update, vulnerabilityProof-of-concept code has been released after researchers disclosed a maximum severity remote code execution vulnerability in Erlang/OTP SSH. Successful exploitation could allow for complete takeover of affected devices. Background On April 16, Fabian Bäumer, Marcus Brinkmann, Marcel Maehren, and Jörg Schwenk of the Ruhr University Bochum in Germany disclosed a critical vulnerability in Erlang/OTP SSH…
-
SonicWall SMA VPN devices targeted in attacks since January
by
in SecurityNewsA remote code execution vulnerability affecting SonicWall Secure Mobile Access (SMA) appliances has been under active exploitation since at least January 2025, according to cybersecurity company Arctic Wolf. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/sonicwall-sma-vpn-devices-targeted-in-attacks-since-january/
-
Critical AnythingLLM Vulnerability Exposes Systems to Remote Code Execution
by
in SecurityNews
Tags: ai, cve, cyber, cybersecurity, exploit, flaw, malicious, open-source, remote-code-execution, vulnerabilityA critical security flaw (CVE-2024-13059) in the open-source AI frameworkAnythingLLMhas raised alarms across cybersecurity communities. The vulnerability, discovered in February 2025, allows attackers with administrative privileges to execute malicious code remotely, potentially compromising entire systems. Detail Description CVE ID CVE-2024-13059 Severity Critical (CVSS 9.1) EPSS Score 0.04% (Low exploitation probability) Affected Versions AnythingLLM versions <…
-
Cisco Webex bug lets hackers gain code execution via meeting links
by
in SecurityNewsCisco has released security updates for a high-severity Webex vulnerability that allows unauthenticated attackers to gain client-side remote code execution using malicious meeting invite links. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisco-webex-bug-lets-hackers-gain-code-execution-via-meeting-links/
-
PoC Released for Critical Erlang/OTP SSH RCE Vulnerability
by
in SecurityNewsSecurity teams across industries are urgently patching systems following the public release of a proof-of-concept (PoC) exploit for a newly disclosed critical remote code execution (RCE) vulnerability in Erlang/OTP’s SSH implementation. The flaw, tracked as CVE-2025-32433 and assigned a maximum CVSS score of 10.0, enables unauthenticated attackers to execute arbitrary code, potentially taking complete control of affected systems.…
-
Critical Erlang/OTP SSH pre-auth RCE is ‘Surprisingly Easy’ to exploit, patch now
by
in SecurityNewsA critical vulnerability in the Erlang/OTP SSH, tracked as CVE-2025-32433, has been disclosed that allows for unauthenticated remote code execution on vulnerable devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/critical-erlang-otp-ssh-pre-auth-rce-is-surprisingly-easy-to-exploit-patch-now/
-
Researchers Find CVSS 10.0 Severity RCE Vulnerability in Erlang/OTP SSH
by
in SecurityNewsSecurity researchers report CVE-2025-32433, a CVSS 10.0 RCE vulnerability in Erlang/OTP SSH, allowing unauthenticated code execution on exposed… First seen on hackread.com Jump to article: hackread.com/researchers-cvss-severity-rce-vulnerability-erlang-otp-ssh/
-
Critical Erlang/OTP SSH Vulnerability Allow Hackers Execute Arbitrary Code Remotely
by
in SecurityNewsA major security flaw has been uncovered in the widely used Erlang/OTP SSH implementation, drawing urgent attention from the cybersecurity community worldwide. The vulnerability, tracked as CVE-2025-32433, exposes systems to unauthenticated remote code execution, potentially allowing hackers to fully compromise affected servers with ease. Overview of the vulnerability The vulnerability was discovered by a research team…
-
CISA tags SonicWall VPN flaw as actively exploited in attacks
by
in SecurityNewsOn Wednesday, CISA warned federal agencies to secure their SonicWall Secure Mobile Access (SMA) 100 series appliances against attacks exploiting a high-severity remote code execution vulnerability. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-tags-sonicwall-vpn-flaw-as-actively-exploited-in-attacks/
-
Critical Flaw in PHP’s extract() Function Enables Arbitrary Code Execution
by
in SecurityNewsA critical vulnerability in PHP’sextract()function has been uncovered, enabling attackers to execute arbitrary code by exploiting memory corruption flaws. The issue affects PHP versions 5.x, 7.x, and 8.x, allowing malicious actors to trigger double-free (PHP 5.x) or use-after-free (PHP 7.x/8.x) conditions, ultimately leading to remote code execution (RCE). Technical Breakdown According to the SSD report, the flaw stems from…
-
Cisco Webex Vulnerability Lets Hackers Execute Code Through Malicious Meeting Links
by
in SecurityNewsCisco has disclosed a high-severity vulnerability in its widely used Webex App, warning users that attackers could exploit the flaw to execute arbitrary code on targeted computers. Tracked as CVE-2025-20236, the vulnerability arises from improper input validation in the app’s custom URL parser, exposing users to remote code execution simply by clicking a specially crafted meeting…
-
ActiveX blocked by default in Microsoft 365 because remote code execution is bad, OK?
by
in SecurityNewsStopping users shooting themselves in the foot with last century’s tech First seen on theregister.com Jump to article: www.theregister.com/2025/04/15/activex_microsoft_365/
-
CentreStack 0-Day Exploit Enables Remote Code Execution on Web Servers
by
in SecurityNewsA critical 0-day vulnerability has been disclosed in CentreStack, a popular enterprise cloud storage and collaboration platform, which could allow attackers to execute arbitrary code remotely on affected web servers. The vulnerability, tracked as CVE-2025-30406, leverages a flaw in the application’s handling of cryptographic keys responsible for securing sensitive ViewState data. Flaw in MachineKey Management…
-
Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability
by
in SecurityNewsA recently disclosed security flaw in Gladinet CentreStack also impacts its Triofox remote access and collaboration solution, according to Huntress, with seven different organizations compromised to date.Tracked as CVE-2025-30406 (CVSS score: 9.0), the vulnerability refers to the use of a hard-coded cryptographic key that could expose internet-accessible servers to remote code execution attacks First seen…
-
RCE Exploit Uncovered in Ivanti VPN After Silent Patch Oversight
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/rce-exploit-uncovered-in-ivanti-vpn-after-silent-patch-oversight
-
Exploitation of Ivanti VPN flaw to achieve RCE detailed
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/exploitation-of-ivanti-vpn-flaw-to-achieve-rce-detailed
-
Threat Actor Allegedly Selling Fortinet Firewall Zero-Day Exploit
by
in SecurityNewsA threat actor claims to offer a zero-day exploit for an unauthenticated remote code execution vulnerability in Fortinet firewalls. The post Threat Actor Allegedly Selling Fortinet Firewall Zero-Day Exploit appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/threat-actor-allegedly-selling-fortinet-firewall-zero-day-exploit/
-
FortiGate 0-Day Exploit Allegedly Up for Sale on Dark Web
by
in SecurityNewsA chilling new development in the cybersecurity landscape has emerged, as a threat actor has reportedly advertised an alleged zero-day exploit targeting Fortinet’s FortiGate firewalls on a prominent dark web forum. This exploit purportedly enables unauthenticated remote code execution (RCE) and full configuration access to FortiOS, unlocking the potential for attackers to seize control of…