Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

@Edent what's so bad about <div> ... or: Why do you want to avoid them?

Uncategorized
684 347 6.6k

Gli ultimi otto messaggi ricevuti dalla Federazione
Post suggeriti
  • Exploits and vulnerabilities in Q4 2025

    Uncategorized
    1
    11
    0 Votes
    1 Posts
    1 Views
    Exploits and vulnerabilities in Q4 2025The fourth quarter of 2025 went down as one of the most intense periods on record for high-profile, critical vulnerability disclosures, hitting popular libraries and mainstream applications. Several of these vulnerabilities were picked up by attackers and exploited in the wild almost immediately.In this report, we dive into the statistics on published vulnerabilities and exploits, as well as the known vulnerabilities leveraged with popular C2 frameworks throughout Q4 2025.Statistics on registered vulnerabilitiesThis section contains statistics on registered vulnerabilities. The data is taken from cve.org.Let’s take a look at the number of registered CVEs for each month over the last five years, up to and including the end of 2025. As predicted in our last report, Q4 saw a higher number of registered vulnerabilities than the same period in 2024, and the year-end totals also cleared the bar set the previous year.Total published vulnerabilities by month from 2021 through 2025 (download)Now, let’s look at the number of new critical vulnerabilities (CVSS > 8.9) for that same period.Total number of published critical vulnerabilities by month from 2021 to 2025< (download)The graph shows that the volume of critical vulnerabilities remains quite substantial; however, in the second half of the year, we saw those numbers dip back down to levels seen in 2023. This was due to vulnerability churn: a handful of published security issues were revoked. The widespread adoption of secure development practices and the move toward safer languages also pushed those numbers down, though even that couldn’t stop the overall flood of vulnerabilities.Exploitation statisticsThis section contains statistics on the use of exploits in Q4 2025. The data is based on open sources and our telemetry.Windows and Linux vulnerability exploitationIn Q4 2025, the most prevalent exploits targeted the exact same vulnerabilities that dominated the threat landscape throughout the rest of the year. These were exploits targeting Microsoft Office products with unpatched security flaws.Kaspersky solutions detected the most exploits on the Windows platform for the following vulnerabilities:CVE-2018-0802: a remote code execution vulnerability in Equation Editor.CVE-2017-11882: another remote code execution vulnerability, also affecting Equation Editor.CVE-2017-0199: a vulnerability in Microsoft Office and WordPad that allows an attacker to assume control of the system.The list has remained unchanged for years.We also see that attackers continue to adapt exploits for directory traversal vulnerabilities (CWE-35) when unpacking archives in WinRAR. They are being heavily leveraged to gain initial access via malicious archives on the Windows operating system:CVE-2023-38831: a vulnerability stemming from the improper handling of objects within an archive.CVE-2025-6218 (formerly ZDI-CAN-27198): a vulnerability that enables an attacker to specify a relative path and extract files into an arbitrary directory. This can lead to arbitrary code execution. We covered this vulnerability in detail in our Q2 2025 report.CVE-2025-8088: a vulnerability we analyzed in our previous report, analogous to CVE-2025-6218. The attackers used NTFS streams to circumvent controls on the directory into which files were being unpacked.As in the previous quarter, we see a rise in the use of archiver exploits, with fresh vulnerabilities increasingly appearing in attacks.Below are the exploit detection trends for Windows users over the last two years.Dynamics of the number of Windows users encountering exploits, Q1 2024 – Q4 2025. The number of users who encountered exploits in Q1 2024 is taken as 100% (download)The vulnerabilities listed here can be used to gain initial access to a vulnerable system. This highlights the critical importance of timely security updates for all affected software.On Linux-based devices, the most frequently detected exploits targeted the following vulnerabilities:CVE-2022-0847, also known as Dirty Pipe: a vulnerability that allows privilege escalation and enables attackers to take control of running applications.CVE-2019-13272: a vulnerability caused by improper handling of privilege inheritance, which can be exploited to achieve privilege escalation.CVE-2021-22555: a heap overflow vulnerability in the Netfilter kernel subsystem.CVE-2023-32233: another vulnerability in the Netfilter subsystem that creates a use-after-free condition, allowing for privilege escalation due to the improper handling of network requests.Dynamics of the number of Linux users encountering exploits, Q1 2024 – Q4 2025. The number of users who encountered exploits in Q1 2024 is taken as 100% (download)We are seeing a massive surge in Linux-based exploit attempts: in Q4, the number of affected users doubled compared to Q3. Our statistics show that the final quarter of the year accounted for more than half of all Linux exploit attacks recorded for the entire year. This surge is primarily driven by the rapidly growing number of Linux-based consumer devices. This trend naturally attracts the attention of threat actors, making the installation of security patches critically important.Most common published exploitsThe distribution of published exploits by software type in Q4 2025 largely mirrors the patterns observed in the previous quarter. The majority of exploits we investigate through our monitoring of public research, news, and PoCs continue to target vulnerabilities within operating systems.Distribution of published exploits by platform, Q1 2025 (download)Distribution of published exploits by platform, Q2 2025 (download)Distribution of published exploits by platform, Q3 2025 (download)Distribution of published exploits by platform, Q4 2025 (download)In Q4 2025, no public exploits for Microsoft Office products emerged; the bulk of the vulnerabilities were issues discovered in system components. When calculating our statistics, we placed these in the OS category.Vulnerability exploitation in APT attacksWe analyzed which vulnerabilities were utilized in APT attacks during Q4 2025. The following rankings draw on our telemetry, research, and open-source data.TOP 10 vulnerabilities exploited in APT attacks, Q4 2025 (download)In Q4 2025, APT attacks most frequently exploited fresh vulnerabilities published within the last six months. We believe that these CVEs will remain favorites among attackers for a long time, as fixing them may require significant structural changes to the vulnerable applications or the user’s system. Often, replacing or updating the affected components requires a significant amount of resources. Consequently, the probability of an attack through such vulnerabilities may persist. Some of these new vulnerabilities are likely to become frequent tools for lateral movement within user infrastructure, as the corresponding security flaws have been discovered in network services that are accessible without authentication. This heavy exploitation of very recently registered vulnerabilities highlights the ability of threat actors to rapidly implement new techniques and adapt old ones for their attacks. Therefore, we strongly recommend applying the security patches provided by vendors.C2 frameworksIn this section, we will look at the most popular C2 frameworks used by threat actors and analyze the vulnerabilities whose exploits interacted with C2 agents in APT attacks.The chart below shows the frequency of known C2 framework usage in attacks against users during Q4 2025, according to open sources.TOP 10 C2 frameworks used by APTs to compromise user systems in Q4 2025 (download)Despite the significant footprints it can leave when used in its default configuration, Sliver continues to hold the top spot among the most common C2 frameworks in our Q4 2025 analysis. Mythic and Havoc were second and third, respectively. After reviewing open sources and analyzing malicious C2 agent samples that contained exploits, we found that the following vulnerabilities were used in APT attacks involving the C2 frameworks mentioned above:CVE-2025-55182: a React2Shell vulnerability in React Server Components that allows an unauthenticated user to send commands directly to the server and execute them from RAM.CVE-2023-36884: a vulnerability in the Windows Search component that allows the execution of commands on a system, bypassing security mechanisms built into Microsoft Office applications.CVE-2025-53770: a critical insecure deserialization vulnerability in Microsoft SharePoint that allows an unauthenticated user to execute commands on the server.CVE-2020-1472, also known as Zerologon, allows for compromising a vulnerable domain controller and executing commands as a privileged user.CVE-2021-34527, also known as PrintNightmare, exploits flaws in the Windows print spooler subsystem, enabling remote access to a vulnerable OS and high-privilege command execution.CVE-2025-8088 and CVE-2025-6218 are similar directory-traversal vulnerabilities that allow extracting files from an archive to a predefined path without the archiving utility notifying the user.The set of vulnerabilities described above suggests that attackers have been using them for initial access and early-stage maneuvers in vulnerable systems to create a springboard for deploying a C2 agent. The list of vulnerabilities includes both zero-days and well-known, established security issues.Notable vulnerabilitiesThis section highlights the most noteworthy vulnerabilities that were publicly disclosed in Q4 2025 and have a publicly available description.React2Shell (CVE-2025-55182): a vulnerability in React Server ComponentsWe typically describe vulnerabilities affecting a specific application. CVE-2025-55182 stood out as an exception, as it was discovered in React, a library primarily used for building web applications. This means that exploiting the vulnerability could potentially disrupt a vast number of applications that rely on the library. The vulnerability itself lies in the interaction mechanism between the client and server components, which is built on sending serialized objects. If an attacker sends serialized data containing malicious functionality, they can execute JavaScript commands directly on the server, bypassing all client-side request validation. Technical details about this vulnerability and an example of how Kaspersky solutions detect it can be found in our article.CVE-2025-54100: command injection during the execution of curl (Invoke-WebRequest)This vulnerability represents a data-handling flaw that occurs when retrieving information from a remote server: when executing the curl or Invoke-WebRequest command, Windows launches Internet Explorer in the background. This can lead to a cross-site scripting (XSS) attack.CVE-2025-11001: a vulnerability in 7-ZipThis vulnerability reinforces the trend of exploiting security flaws found in file archivers. The core of CVE-2025-11001 lies in the incorrect handling of symbolic links. An attacker can craft an archive so that when it is extracted into an arbitrary directory, its contents end up in the location pointed to by a symbolic link. The likelihood of exploiting this vulnerability is significantly reduced because utilizing such functionality requires the user opening the archive to possess system administrator privileges.This vulnerability was associated with a wave of misleading news reports claiming it was being used in real-world attacks against end users. This misconception stemmed from an error in the security bulletin.RediShell (CVE-2025-49844): a vulnerability in RedisThe year 2025 saw a surge in high-profile vulnerabilities, several of which were significant enough to earn a unique nickname. This was the case with CVE-2025-49844, also known as RediShell, which was unveiled during a hacking competition. This vulnerability is a use-after-free issue related to how the load command functions within Lua interpreter scripts. To execute the attack, an attacker needs to prepare a malicious script and load it into the interpreter.As with any named vulnerability, RediShell was immediately weaponized by threat actors and spammers, albeit in a somewhat unconventional manner. Because technical details were initially scarce following its disclosure, the internet was flooded with fake PoC exploits and scanners claiming to test for the vulnerability. In the best-case scenario, these tools were non-functional; in the worst, they infected the system. Notably, these fraudulent projects were frequently generated using LLMs. They followed a standardized template and often cross-referenced source code from other identical fake repositories.CVE-2025-24990: a vulnerability in the ltmdm64.sys driverDriver vulnerabilities are often discovered in legitimate third-party applications that have been part of the official OS distribution for a long time. Thus, CVE-2025-24990 has existed within code shipped by Microsoft throughout nearly the entire history of Windows. The vulnerable driver has been shipped since at least Windows 7 as a third-party driver for Agere Modem. According to Microsoft, this driver is no longer supported and, following the discovery of the flaw, was removed from the OS distribution entirely.The vulnerability itself is straightforward: insecure handling of IOCTL codes leading to a null pointer dereference. Successful exploitation can lead to arbitrary command execution or a system crash resulting in a blue screen of death (BSOD) on modern systems.CVE-2025-59287: a vulnerability in Windows Server Update Services (WSUS)CVE-2025-59287 represents a textbook case of insecure deserialization. Exploitation is possible without any form of authentication; due to its ease of use, this vulnerability rapidly gained traction among threat actors. Technical details and detection methodologies for our product suite have been covered in our previous advisories.Conclusion and adviceIn Q4 2025, the rate of vulnerability registration has shown no signs of slowing down. Consequently, consistent monitoring and the timely application of security patches have become more critical than ever. To ensure resilient defense, it is vital to regularly assess and remediate known vulnerabilities while implementing technology designed to mitigate the impact of potential exploits.Continuous monitoring of infrastructure, including the network perimeter, allows for the timely identification of threats and prevents them from escalating. Effective security also demands tracking the current threat landscape and applying preventative measures to minimize risks associated with system flaws. Kaspersky Next serves as a reliable partner in this process, providing real-time identification and detailed mapping of vulnerabilities within the environment.Securing the workplace remains a top priority. Protecting corporate devices requires the adoption of solutions capable of blocking malware and preventing it from spreading. Beyond basic measures, organizations should implement adaptive systems that allow for the rapid deployment of security updates and the automation of patch management workflows.securelist.com/vulnerabilities…
  • 0 Votes
    1 Posts
    3 Views
    ❗ 𝗔𝗡𝗖𝗢𝗥𝗔 𝗨𝗡𝗔 𝗦𝗧𝗥𝗔𝗢𝗥𝗗𝗜𝗡𝗔𝗥𝗜𝗔 𝗦𝗖𝗢𝗣𝗘𝗥𝗧𝗔 𝗔 𝗥𝗢𝗠𝗔 ❗💀💀💀 𝗧𝗼𝗺𝗯𝗲 𝗮𝗳𝗳𝗿𝗲𝘀𝗰𝗮𝘁𝗲 𝗲 𝗰𝗼𝗹𝗼𝗺𝗯𝗮𝗿𝗶 𝗱𝗲𝗹𝗹’𝗲𝘁à 𝗶𝗺𝗽𝗲𝗿𝗶𝗮𝗹𝗲: spunta 𝘂𝗻𝗮 nuova 𝗻𝗲𝗰𝗿𝗼𝗽𝗼𝗹𝗶 𝗺𝗼𝗻𝘂𝗺𝗲𝗻𝘁𝗮𝗹𝗲 𝗹𝘂𝗻𝗴𝗼 𝗹𝗮 𝘃𝗶𝗮 𝗢𝘀𝘁𝗶𝗲𝗻𝘀𝗲#archeologia #Roma #necropoli #anticaRoma #scopertearcheologiche #storiaromana #viaOstiense➡️ L’articolo completo e le foto 📷 su Storie & Archeostorie: https://wp.me/p7tSpZ-csShttps://storiearcheostorie.com/2026/03/06/necropoli-via-ostiense-roma-scoperta/?utm_source=mastodon&utm_medium=jetpack_social
  • @crossgolf_rebel@moppels

    Uncategorized
    5
    0 Votes
    5 Posts
    1 Views
    @DerEmil @crossgolf_rebel also ich geh auch davon aus, dass es was spezifisches ist, ich bekomme auch weiterhin alle reactions und comments.habt ihr vor kurzem irgendwelche plugins installiert? anti-spam, security, ...?
  • 0 Votes
    2 Posts
    2 Views
    @akiro75.bsky.social La leggerei volentieri, ma è dietro un paywall.