Tag

Remote Code Execution

All articles tagged with #remote code execution

Active Exploitation of Critical Windows Server Update Service Vulnerability

Originally Published 2 months ago — by Unit 42

Featured image for Active Exploitation of Critical Windows Server Update Service Vulnerability
Source: Unit 42

A critical remote code execution vulnerability in Microsoft WSUS (CVE-2025-59287) was actively exploited in the wild shortly after an emergency patch was released. The flaw allows unauthenticated attackers to execute arbitrary code on affected servers, primarily impacting systems with the WSUS role enabled. Microsoft recommends immediate patching or applying workarounds such as disabling the WSUS role or blocking high-risk ports to mitigate the risk.

Microsoft Releases Urgent Patch for Critical WSUS Vulnerability Exploited in the Wild

Originally Published 2 months ago — by The Hacker News

Featured image for Microsoft Releases Urgent Patch for Critical WSUS Vulnerability Exploited in the Wild
Source: The Hacker News

Microsoft released urgent out-of-band security updates for a critical WSUS vulnerability (CVE-2025-59287) that is actively being exploited in the wild, allowing remote code execution through unsafe deserialization. Users are advised to apply the patch immediately and follow recommended mitigations to prevent attacks.

Microsoft Releases Urgent Patch for Actively Exploited WSUS Vulnerability

Originally Published 2 months ago — by theregister.com

Featured image for Microsoft Releases Urgent Patch for Actively Exploited WSUS Vulnerability
Source: theregister.com

Microsoft released a critical out-of-band update for Windows Server Update Services (WSUS) to fix a severe vulnerability (CVE-2025-59287) that allows remote code execution, affecting servers with the WSUS role enabled. The update is urgent, especially as WSUS is deprecated, prompting Microsoft to recommend switching to cloud-based solutions like Intune. A reboot is required, and administrators are advised to disable the role or block specific ports if immediate patching isn't possible.

TARmageddon: Major Security Flaw in Popular Rust Library

Originally Published 2 months ago — by Phoronix

A critical security vulnerability named TARmageddon (CVE-2025-62518) has been disclosed in the popular Rust async-tar library and its forks, allowing remote code execution through file overwriting, despite Rust's usual safety guarantees. The vulnerability affects downstream projects like uv Python package manager, and patching efforts are underway due to the lack of upstream maintenance for some forks.

PoC Exploit Unveiled for Windows Server Update Services RCE Flaw

Originally Published 2 months ago — by CyberSecurityNews

Featured image for PoC Exploit Unveiled for Windows Server Update Services RCE Flaw
Source: CyberSecurityNews

A PoC exploit has been released for a critical vulnerability in Windows Server Update Services (CVE-2025-59287), allowing unauthenticated attackers to execute remote code with SYSTEM privileges by exploiting unsafe deserialization in the AuthorizationCookie handling. The flaw affects all supported Windows Server versions and poses a severe risk of widespread compromise, prompting Microsoft to urge immediate patching and mitigation measures.

Google Releases September Android Security Update to Fix 120 Flaws and Zero-Days

Originally Published 4 months ago — by CyberSecurityNews

Featured image for Google Releases September Android Security Update to Fix 120 Flaws and Zero-Days
Source: CyberSecurityNews

Google has released a critical security update for Android to patch actively exploited 0-day vulnerabilities, including a zero-interaction remote code execution flaw and a kernel privilege escalation bug, urging users and manufacturers to update immediately to protect devices.

WhatsApp Addresses Zero-Click iPhone Vulnerability Exploited in Targeted Attacks

Originally Published 4 months ago — by CybersecurityNews

Featured image for WhatsApp Addresses Zero-Click iPhone Vulnerability Exploited in Targeted Attacks
Source: CybersecurityNews

CISA warns of a critical zero-day vulnerability in WhatsApp (CVE-2025-55177) that allows attackers to manipulate device synchronization messages, potentially leading to remote code execution and content spoofing. Users and organizations are urged to apply the September 2 patch or suspend WhatsApp use until secure updates are implemented.

Zoom and Xerox Launch Security Updates to Fix Critical Flaws

Originally Published 5 months ago — by The Hacker News

Featured image for Zoom and Xerox Launch Security Updates to Fix Critical Flaws
Source: The Hacker News

Zoom and Xerox have released critical security updates to fix vulnerabilities that could allow privilege escalation and remote code execution, affecting Zoom Windows clients and Xerox FreeFlow Core, with the latter's issues being highly severe and exploitable for arbitrary command execution.

Thousands of Axis Surveillance Devices Exposed to Critical Security Flaws

Originally Published 5 months ago — by The Hacker News

Featured image for Thousands of Axis Surveillance Devices Exposed to Critical Security Flaws
Source: The Hacker News

Cybersecurity researchers have identified critical vulnerabilities in Axis Communications' surveillance products, exposing over 6,500 servers globally, including nearly 4,000 in the U.S., which could allow attackers to take control of cameras and compromise internal networks. These flaws involve remote code execution and authentication bypass issues, though no exploits have been observed in the wild.

Vulnerabilities in Cursor IDE's MCP and AI Coding Tools Pose RCE and Supply Chain Risks

Originally Published 5 months ago — by Check Point Software

Featured image for Vulnerabilities in Cursor IDE's MCP and AI Coding Tools Pose RCE and Supply Chain Risks
Source: Check Point Software

A security vulnerability in Cursor IDE's Model Context Protocol (MCP) allows attackers to silently modify trusted configurations to execute arbitrary commands, leading to persistent remote code execution. The flaw stems from the IDE's trust model, which only prompts for approval once, enabling malicious modifications to go unnoticed and be re-executed every time a project is opened or synchronized. The issue was responsibly disclosed and addressed in Cursor version 1.3, with recommendations to update to the latest version to mitigate risks.

Active Exploits Target Cisco ISE and Security Flaws, CISA Alerts

Originally Published 5 months ago — by BleepingComputer

Featured image for Active Exploits Target Cisco ISE and Security Flaws, CISA Alerts
Source: BleepingComputer

Security researcher Bobby Gould has published a detailed exploit chain for a critical remote code execution vulnerability (CVE-2025-20281) in Cisco ISE, which was actively exploited in attacks after Cisco issued patches. The exploit demonstrates how attackers can achieve root access by exploiting unsafe deserialization and command injection, emphasizing the importance of applying security updates immediately. Although the exploit isn't weaponized, it provides hackers with the technical details needed to recreate the attack, potentially increasing malicious activity.

Microsoft Urgently Patches SharePoint Zero-Day Exploited in Global Cyberattacks

Originally Published 5 months ago — by The Hacker News

Featured image for Microsoft Urgently Patches SharePoint Zero-Day Exploited in Global Cyberattacks
Source: The Hacker News

Microsoft has released urgent security patches for actively exploited vulnerabilities in on-premises SharePoint servers, including a critical RCE flaw (CVE-2025-53770) and a spoofing flaw (CVE-2025-53771), amid ongoing cyber attacks targeting organizations like banks, universities, and government agencies. The vulnerabilities, which do not affect SharePoint Online, have been exploited since July, prompting urgent recommendations for organizations to update, rotate keys, and enhance defenses to prevent further breaches.

Microsoft Releases July 2025 Security Updates with Critical Patches and Improvements

Originally Published 6 months ago — by The Hacker News

Featured image for Microsoft Releases July 2025 Security Updates with Critical Patches and Improvements
Source: The Hacker News

Microsoft released updates fixing 130 vulnerabilities in its products, including critical flaws in SPNEGO and SQL Server, ending a streak of patching exploited zero-days; the most severe is a remote code execution flaw in SPNEGO that could be wormable, requiring immediate attention from users and administrators.

Hunk Companion Plugin Exploit Threatens Thousands of WordPress Sites

Originally Published 1 year ago — by The Hacker News

Featured image for Hunk Companion Plugin Exploit Threatens Thousands of WordPress Sites
Source: The Hacker News

A critical vulnerability in the WordPress Hunk Companion plugin, tracked as CVE-2024-11972, is being exploited by attackers to install other vulnerable plugins, leading to potential Remote Code Execution (RCE) and other attacks. The flaw affects all versions before 1.9.0 and allows unauthorized plugin installations, posing significant security risks. This vulnerability is a patch bypass for a similar flaw, CVE-2024-9707, and highlights the importance of securing WordPress components. Additionally, a high-severity flaw in the WPForms plugin has been disclosed, affecting millions of sites.

Critical Palo Alto Firewall Vulnerabilities Actively Exploited

Originally Published 1 year ago — by The Hacker News

Featured image for Critical Palo Alto Firewall Vulnerabilities Actively Exploited
Source: The Hacker News

Palo Alto Networks has identified a critical zero-day vulnerability in its PAN-OS firewall management interface, which is being actively exploited to deploy web shells for persistent remote access. The flaw, with a CVSS score of 9.3, allows unauthenticated remote command execution and requires no user interaction. While patches are not yet available, users are urged to secure their management interfaces. The vulnerability is distinct from other recent critical flaws in Palo Alto Networks products, and there is no evidence linking the activities.