https://cve.circl.lu/comments/feed Most recent comment. 2025-03-24T17:29:55.932134+00:00 Vulnerability-Lookup info@circl.lu python-feedgen Contains only the most 10 recent comments. https://cve.circl.lu/comment/c2248f9d-e2e0-4af2-a57c-e3b393cffb55 Clarification from Fortinet 2025-03-24T17:29:55.947219+00:00 Alexandre Dulaunoy http://cvepremium.circl.lu/user/adulau UPDATE: Fortinet has informed us that the new CVE-2025-24472 flaw added to FG-IR-24-535 today is not a zero-day and was already fixed in January, but not disclosed then. Furthermore, even though the current advisory states that the listed flaws were exploited in attacks and includes workarounds, Fortinet says that only CVE-2024-55591, and not CVE-2025-24472. It appears that this new CVE is for a different pathway to exploiting the bug that was not previously disclosed and was just now added to the Fortinet advisory about the active exploitation of CVE-2024-55591, causing the confusion. We have updated this previous toot, changed the title of our article, and added an update to prevent confusion. Ref: https://infosec.exchange/@BleepingComputer/113986777248862223 2025-02-12T05:40:06.836557+00:00 https://cve.circl.lu/comment/cae05d8f-677d-4f75-9a64-811c17a16d2d Fortinet Clarification 2025-03-24T17:29:55.947047+00:00 Alexandre Dulaunoy http://cvepremium.circl.lu/user/adulau UPDATE: Fortinet has informed us that the new CVE-2025-24472 flaw added to FG-IR-24-535 today is not a zero-day and was already fixed in January, but not disclosed then. Furthermore, even though the current advisory states that the listed flaws were exploited in attacks and includes workarounds, Fortinet says that only CVE-2024-55591, and not CVE-2025-24472. It appears that this new CVE is for a different pathway to exploiting the bug that was not previously disclosed and was just now added to the Fortinet advisory about the active exploitation of CVE-2024-55591, causing the confusion. We have updated this previous toot, changed the title of our article, and added an update to prevent confusion. Ref: https://infosec.exchange/@BleepingComputer/113986777248862223 2025-02-12T05:40:36.908353+00:00 https://cve.circl.lu/comment/83590ea9-dd4d-4b41-a332-1519809ad219 securityonline.info - Chrome Update Addresses High-Severity Vulnerability: CVE-2025-0291 2025-03-24T17:29:55.946874+00:00 Alexandre Dulaunoy http://cvepremium.circl.lu/user/adulau # Chrome Update Addresses High-Severity Vulnerability: CVE-2025-0291 Ref: [https://securityonline.info/chrome-update-addresses-high-severity-vulnerability-cve-2025-0291/](https://securityonline.info/chrome-update-addresses-high-severity-vulnerability-cve-2025-0291/) <img src="https://cdn-0.securityonline.info/wp-content/uploads/2025/01/Screenshot-2025-01-08-082901.png" width="100%" /> Google has just released a critical security update for its Chrome web browser, addressing a high-severity vulnerability that could leave users open to attack. The update, rolling out to Windows, Mac, and Linux users over the next few days, patches a “Type Confusion” flaw in V8, the JavaScript engine that powers Chrome. This vulnerability, tracked as CVE-2025-0291, was discovered by security researcher Popax21 and reported to Google on December 11th, 2024. Type Confusion vulnerabilities are particularly dangerous as they can allow attackers to execute malicious code on a user’s system. This can lead to a range of consequences, from data theft and system crashes to complete takeover of the affected device. Google has awarded a bounty of $55,000 to Popax21 for the discovery and responsible disclosure of the bug. Type Confusion vulnerabilities occur when a program mistakenly treats data as a different type than originally intended. In the context of V8, this can lead to out-of-bounds memory access, allowing attackers to manipulate memory, crash the browser, or execute arbitrary code. Such vulnerabilities are often exploited in sophisticated attacks, making their timely resolution critical for user safety. Google urges all users to update their Chrome browsers to the latest version (131.0.6778.264/.265 for Windows and Mac, 131.0.6778.264 for Linux) as soon as possible. Here’s how: 1. **Open Chrome.** 2. **Click the three vertical dots** in the top right corner. 3. Go to **Help > About Google Chrome.** 4. Chrome will automatically **check for updates** and install the latest version. 5. **Relaunch Chrome** to complete the update. ### Related Posts: * [New Chrome 0-Day Bug Under Active Attack](https://securityonline.info/cve-2022-4262-chrome-0-day-vulnerability/) * [New WiFi Flaw Leaves All Devices Vulnerable to ‘SSID Confusion’ Attacks](https://securityonline.info/cve-2023-52424-new-wifi-flaw-leaves-all-devices-vulnerable-to-ssid-confusion-attacks/) * [Chrome will no longer flag HTTPS pages as secure sites](https://securityonline.info/chrome-will-no-longer-flag-https-pages-as-secure-sites/) 2025-02-12T06:52:50.539121+00:00 https://cve.circl.lu/comment/b2a6b85e-5b0d-4ac4-b7a4-9227e3ff28e0 SonicWall Firewall Vulnerability Exploited After PoC Publication 2025-03-24T17:29:55.946682+00:00 Cédric Bonhomme http://cvepremium.circl.lu/user/cedric Threat actors started exploiting a recent SonicWall firewall vulnerability this week, shortly after proof-of-concept (PoC) code targeting it was published. According to Bishop Fox, approximately 4,500 internet-facing SonicWall SSL VPN servers had not been patched against CVE-2024-53704 by February 7. 2025-02-17T08:57:05.680592+00:00 https://cve.circl.lu/comment/6b5acef0-e6ed-4fe9-9181-33b50f601ae5 Palantir - Security Bulletin - CVE-2024-49581 - Palantir’s External Artifacts service (versions 105.110.1 through 105.115.0) 2025-03-24T17:29:55.946487+00:00 Cédric Bonhomme http://cvepremium.circl.lu/user/cedric Restricted Views backed objects (OSV1) could be bypassed under specific circumstances due to a software bug, this could have allowed users that didn't have permission to see such objects to view them via Object Explorer directly. The affected service have been patched and automatically deployed to all Apollo-managed Foundry instances. 2025-02-18T21:41:17.332565+00:00 https://cve.circl.lu/comment/b45703d4-11a4-4f18-a2f4-8929ea2f08d2 2025-02: Out-of-Cycle Security Bulletin: Session Smart Router, Session Smart Conductor, WAN Assurance Router: API Authentication Bypass Vulnerability (CVE-2025-21589) 2025-03-24T17:29:55.946321+00:00 Alexandre Dulaunoy http://cvepremium.circl.lu/user/adulau This issue affects Session Smart Router, Session Smart Conductor, WAN Assurance Managed Router. Severity Critical Severity Assessment (CVSS) Score CVSS: v3.1: 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) SEVERITY:CRITICAL CVSS: v4.0: 9.3 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) SEVERITY:CRITICAL Problem An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router may allow a network-based attacker to bypass authentication and take administrative control of the device. This issue affects Session Smart Router: from 5.6.7 before 5.6.17, from 6.0.8, from 6.1 before 6.1.12-lts, from 6.2 before 6.2.8-lts, from 6.3 before 6.3.3-r2; This issue affects Session Smart Conductor: from 5.6.7 before 5.6.17, from 6.0.8, from 6.1 before 6.1.12-lts, from 6.2 before 6.2.8-lts, from 6.3 before 6.3.3-r2; This issue affects WAN Assurance Managed Routers: from 5.6.7 before 5.6.17, from 6.0.8, from 6.1 before 6.1.12-lts, from 6.2 before 6.2.8-lts, from 6.3 before 6.3.3-r2. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. This issue was found during internal product security testing or research Solution The following software releases have been updated to resolve this issue: Session Smart Router: SSR-5.6.17, SSR-6.1.12-lts, SSR-6.2.8-lts, SSR-6.3.3-r2 and subsequent releases. It is suggested to upgrade all affected systems to one of these versions of software. In a Conductor-managed deployment, it is sufficient to upgrade only the Conductor nodes and the fix will be applied automatically to all connected routers. As practical, the routers should still be upgraded to a fixed version however they will not be vulnerable once they connect to an upgraded Conductor. Router patching can be confirmed once the router reaches the “running" (on 6.2 and earlier) or “synchronized” (on 6.3+) state on the Conductor". This vulnerability has been patched automatically on devices that operate with WAN Assurance (where configuration is also managed) connected to the Mist Cloud. As practical, the routers should still be upgraded to a version containing the fix. It is important to note that when the fix is applied automatically on routers managed by a Conductor or on WAN assurance, it will have no impact on data-plane functions of the router. The application of the fix is non-disruptive to production traffic. There may be a momentary downtime (less than 30 seconds) to the web-based management and APIs. This issue is being tracked as I95-59677. Note: Juniper SIRT's policy is not to evaluate releases which are beyond End of Engineering (EOE) or End of Life (EOL). Workaround There are no known workarounds for this issue. Severity Assessment Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories." Modification History 2024-02-11: Initial Publication Related Information KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin Publication Process KB16765: In which releases are vulnerabilities fixed? KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories Report a Security Vulnerability - How to Contact the Juniper Networks Security Incident Response Team 2025-02-19T16:52:08.947558+00:00 https://cve.circl.lu/comment/e2a22b2f-4064-4f7f-a7c5-6b9f4b3cd280 Formal Vulnerability Disclosure for iPhone 15 Pro Max (iOS 18.3.1) 2025-03-24T17:29:55.946160+00:00 Cédric Bonhomme http://cvepremium.circl.lu/user/cedric ### Executive Summary This report updates the findings on CVE-2025-24085, a use-after-free vulnerability affecting Apple's IDS subsystem and iMessage's BlastDoor sandboxing. Findings (As of February 20, 2025) iOS 18.3.1 remains vulnerable despite Apple's February 19, 2025, mitigation deadline. BlastDoor is bypassed, enabling unsandboxed iMessage processing. Privilege escalation attempts detected, suggesting a possible kernel exploit. Unauthorized decryption and authentication tampering observed, raising concerns about iMessage interception and data exposure. The exploit remains active in the wild, requiring immediate action. https://github.com/orgs/community/discussions/152523 2025-02-27T08:00:55.964879+00:00 https://cve.circl.lu/comment/9fd019c6-b2d5-454c-88b2-2c693681e47f PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices 2025-03-24T17:29:55.945895+00:00 Cédric Bonhomme http://cvepremium.circl.lu/user/cedric French cybersecurity company Sekoia observed the unknown threat actors deploying a backdoor by leveraging CVE-2023-20118 (CVSS score: 6.5), a critical security flaw impacting Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers that could result in arbitrary command execution on susceptible devices. CVE-2023-20118 is leading to a webshell installation. 2025-03-03T21:30:27.513197+00:00 https://cve.circl.lu/comment/a9f2cad3-dbfc-4703-9c5f-9af054301f88 Apache Pinot Improper Neutralization of Special Elements Authentication Bypass Vulnerability 2025-03-24T17:29:55.943098+00:00 Alexandre Dulaunoy http://cvepremium.circl.lu/user/adulau CVE ID CVE-2024-56325 CVSS SCORE 9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H AFFECTED VENDORS Apache AFFECTED PRODUCTS Pinot VULNERABILITY DETAILS This vulnerability allows remote attackers to bypass authentication on affected installations of Apache Pinot. Authentication is not required to exploit this vulnerability. The specific flaw exists within the AuthenticationFilter class. The issue results from insufficient neutralization of special characters in a URI. An attacker can leverage this vulnerability to bypass authentication on the system. ADDITIONAL DETAILS Fixed in version 1.3.0 2025-03-11T05:25:53.938762+00:00 https://cve.circl.lu/comment/ee7a81f6-1013-4ce2-9180-897e57934f51 Apple fixes WebKit zero-day exploited in ‘extremely sophisticated’ attacks 2025-03-24T17:29:55.939976+00:00 Cédric Bonhomme http://cvepremium.circl.lu/user/cedric Apple has released emergency security updates to patch a zero-day bug the company describes as exploited in "extremely sophisticated" attacks. The vulnerability is tracked as CVE-2025-24201 and was found in the WebKit cross-platform web browser engine used by Apple's Safari web browser and many other apps and web browsers on macOS, iOS, Linux, and Windows. 2025-03-12T08:35:57.565406+00:00