Tag

Remote Code Execution

All articles tagged with #remote code execution

Critical pre-auth RCE in BeyondTrust remote-support tools prompts urgent patch
technology18 days ago

Critical pre-auth RCE in BeyondTrust remote-support tools prompts urgent patch

BeyondTrust warns of CVE-2026-1731, a pre-auth remote code execution flaw in Remote Support (RS) 25.3.1 and Privileged Remote Access (PRA) 24.3.4 and earlier, allowing unauthenticated attackers to run OS commands; patches are available by upgrading to RS 25.3.2+ and PRA 25.1.1+ (or enabling automatic updates). Cloud systems have been secured; about 11,000 instances are exposed online, with roughly 8,500 on-premises potentially vulnerable if not patched; no active exploitation is reported yet.

One-Click RCE Flaw Lets Attackers Hijack OpenClaw Gateways
technology24 days ago

One-Click RCE Flaw Lets Attackers Hijack OpenClaw Gateways

OpenClaw faces a high-severity vulnerability (CVE-2026-25253, CVSS 8.8) that enables one-click remote code execution via a crafted malicious link by exfiltrating the gateway token through a cross-site WebSocket hijack, granting attacker control of the gateway API and the ability to run commands on the host; a fix is in version 2026.1.29 (Jan 30, 2026).

Ivanti EPMM hit by two critical zero-days, with patches and risk guidance issued
security28 days ago

Ivanti EPMM hit by two critical zero-days, with patches and risk guidance issued

Ivanti disclosed two critical RCE zero-day flaws in Endpoint Manager Mobile (CVE-2026-1281 and CVE-2026-1340) exploited in the wild at a limited number of customers. Both flaws score 9.8 and can run arbitrary code remotely without authentication. Ivanti released RPM-based mitigations for affected EPMM versions, noting no downtime is required but hotfixes must be reapplied after any version upgrade; a permanent fix arrives with EPMM 12.8.0.0 in Q1 2026. Exploitation can reveal administrator and user data, device details, and location (if enabled), and attackers could alter configurations via the API or web console. Defenders can detect activity via a specific Apache access-log regex, though logs can be altered by attackers. Recovery guidance includes restoring from a known-good backup or rebuilding, resetting local and service accounts' passwords, rotating certificates, and reviewing Sentry logs. CISA has added CVE-2026-1281 to KEV; federal agencies must patch or decommission affected systems by Feb 1, 2026.

Fortinet patches critical FortiSIEM flaw enabling unauthenticated remote code execution
security1 month ago

Fortinet patches critical FortiSIEM flaw enabling unauthenticated remote code execution

Fortinet released patches for FortiSIEM to fix CVE-2025-64155, an unauthenticated OS command injection that could let an attacker execute code via crafted requests to the phMonitor service on port 7900, potentially enabling a reverse shell and root-level control. The flaw affects multiple FortiSIEM versions; users should upgrade to fixed releases or restrict access to port 7900 as a workaround. The advisory also patches a separate FortiFone vulnerability (CVE-2025-47855).

Critical FortiOS/FortiSwitchManager flaw enables remote code execution
cybersecurity1 month ago

Critical FortiOS/FortiSwitchManager flaw enables remote code execution

Fortinet disclosed a critical heap-based buffer overflow vulnerability in the cw_acd daemon affecting FortiOS and FortiSwitchManager that allows remote, unauthenticated attackers to execute arbitrary code by sending specially crafted requests. Fortinet has issued advisories and patches across multiple FortiOS branches, FortiSASE, and FortiSwitchManager, and urges immediate upgrades to mitigate risk of full-system compromise (no CVE assigned yet). In the meantime, mitigations include disabling fabric access on interfaces and blocking CAPWAP-CONTROL traffic (UDP ports 5246–5249) via local-in policies, along with monitoring cw_acd activity and segmenting management interfaces.

Active Exploitation of Critical Windows Server Update Service Vulnerability
security4 months ago

Active Exploitation of Critical Windows Server Update Service Vulnerability

A critical remote code execution vulnerability in Microsoft WSUS (CVE-2025-59287) was actively exploited in the wild shortly after an emergency patch was released. The flaw allows unauthenticated attackers to execute arbitrary code on affected servers, primarily impacting systems with the WSUS role enabled. Microsoft recommends immediate patching or applying workarounds such as disabling the WSUS role or blocking high-risk ports to mitigate the risk.

Microsoft Releases Urgent Patch for Critical WSUS Vulnerability Exploited in the Wild
technology4 months ago

Microsoft Releases Urgent Patch for Critical WSUS Vulnerability Exploited in the Wild

Microsoft released urgent out-of-band security updates for a critical WSUS vulnerability (CVE-2025-59287) that is actively being exploited in the wild, allowing remote code execution through unsafe deserialization. Users are advised to apply the patch immediately and follow recommended mitigations to prevent attacks.

Microsoft Releases Urgent Patch for Actively Exploited WSUS Vulnerability
technology4 months ago

Microsoft Releases Urgent Patch for Actively Exploited WSUS Vulnerability

Microsoft released a critical out-of-band update for Windows Server Update Services (WSUS) to fix a severe vulnerability (CVE-2025-59287) that allows remote code execution, affecting servers with the WSUS role enabled. The update is urgent, especially as WSUS is deprecated, prompting Microsoft to recommend switching to cloud-based solutions like Intune. A reboot is required, and administrators are advised to disable the role or block specific ports if immediate patching isn't possible.

technology4 months ago

TARmageddon: Major Security Flaw in Popular Rust Library

A critical security vulnerability named TARmageddon (CVE-2025-62518) has been disclosed in the popular Rust async-tar library and its forks, allowing remote code execution through file overwriting, despite Rust's usual safety guarantees. The vulnerability affects downstream projects like uv Python package manager, and patching efforts are underway due to the lack of upstream maintenance for some forks.

PoC Exploit Unveiled for Windows Server Update Services RCE Flaw
technology4 months ago

PoC Exploit Unveiled for Windows Server Update Services RCE Flaw

A PoC exploit has been released for a critical vulnerability in Windows Server Update Services (CVE-2025-59287), allowing unauthenticated attackers to execute remote code with SYSTEM privileges by exploiting unsafe deserialization in the AuthorizationCookie handling. The flaw affects all supported Windows Server versions and poses a severe risk of widespread compromise, prompting Microsoft to urge immediate patching and mitigation measures.

WhatsApp Addresses Zero-Click iPhone Vulnerability Exploited in Targeted Attacks
technology5 months ago

WhatsApp Addresses Zero-Click iPhone Vulnerability Exploited in Targeted Attacks

CISA warns of a critical zero-day vulnerability in WhatsApp (CVE-2025-55177) that allows attackers to manipulate device synchronization messages, potentially leading to remote code execution and content spoofing. Users and organizations are urged to apply the September 2 patch or suspend WhatsApp use until secure updates are implemented.

Thousands of Axis Surveillance Devices Exposed to Critical Security Flaws
security6 months ago

Thousands of Axis Surveillance Devices Exposed to Critical Security Flaws

Cybersecurity researchers have identified critical vulnerabilities in Axis Communications' surveillance products, exposing over 6,500 servers globally, including nearly 4,000 in the U.S., which could allow attackers to take control of cameras and compromise internal networks. These flaws involve remote code execution and authentication bypass issues, though no exploits have been observed in the wild.

Vulnerabilities in Cursor IDE's MCP and AI Coding Tools Pose RCE and Supply Chain Risks
technology6 months ago

Vulnerabilities in Cursor IDE's MCP and AI Coding Tools Pose RCE and Supply Chain Risks

A security vulnerability in Cursor IDE's Model Context Protocol (MCP) allows attackers to silently modify trusted configurations to execute arbitrary commands, leading to persistent remote code execution. The flaw stems from the IDE's trust model, which only prompts for approval once, enabling malicious modifications to go unnoticed and be re-executed every time a project is opened or synchronized. The issue was responsibly disclosed and addressed in Cursor version 1.3, with recommendations to update to the latest version to mitigate risks.