<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Vulnerability Reports &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/vulnerability-reports/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Mon, 23 Mar 2026 06:33:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Vulnerability Reports &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Angular XSS Vulnerability in i18n Handling Exposes Web Applications</title>
		<link>https://firsthackersnews.com/angular-xss-vulnerability-i18n/</link>
					<comments>https://firsthackersnews.com/angular-xss-vulnerability-i18n/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 17 Mar 2026 18:27:27 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Vulnerability Reports]]></category>
		<category><![CDATA[#AngularSecurity]]></category>
		<category><![CDATA[#AngularXSS]]></category>
		<category><![CDATA[#AppSec]]></category>
		<category><![CDATA[#CVE202632635]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#FrontendSecurity]]></category>
		<category><![CDATA[#JavaScriptSecurity]]></category>
		<category><![CDATA[#SecureCoding]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[#WebSecurity]]></category>
		<category><![CDATA[#XSS]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11476</guid>

					<description><![CDATA[<p>Angular XSS vulnerability in i18n handling exposes web applications to script injection when unsafe attributes are improperly bound.This</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/angular-xss-vulnerability-i18n/">Angular XSS Vulnerability in i18n Handling Exposes Web Applications</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Angular XSS vulnerability</strong> in i18n handling exposes web applications to script injection when unsafe attributes are improperly bound.<br>This issue exists in core Angular components and can allow attackers to inject malicious scripts if applications are not properly handling user input.</p>



<p>The problem occurs when developers use i18n with sensitive attributes like links or resource paths. Normally, Angular protects applications by sanitizing input, but in this case, that protection can be bypassed. If untrusted data is directly bound to these attributes, attackers can execute scripts within the application context.</p>



<p>Commonly affected attributes include href, src, action, background, data, and formaction. Applications running versions between 17.x and early 22.x releases are particularly at risk, especially if they rely on user-controlled data in these areas.</p>



<h2 class="wp-block-heading"><strong>Impact and Mitigation</strong></h2>



<p>Successful exploitation allows attackers to run malicious scripts inside a user’s browser session, which can lead to serious security issues such as:</p>



<ul class="wp-block-list">
<li>Session hijacking through stolen cookies or tokens</li>



<li>Extraction of sensitive user data</li>



<li>Performing actions on behalf of users without consent</li>
</ul>



<p>Angular has released fixes in newer versions, and upgrading to patched releases is the most effective solution. However, older versions (like 17 and 18) still require additional precautions.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>To reduce risk, teams should follow these key practices:</p>



<ul class="wp-block-list">
<li>Avoid binding untrusted user input directly to sensitive HTML attributes</li>



<li>Do not combine i18n with attributes that handle URLs or actions</li>



<li>Apply manual sanitization using Angular’s security utilities before rendering data</li>
</ul>



<p>Overall, this vulnerability highlights how small configuration changes can weaken built-in protections, making secure coding practices and timely updates critical for Angular applications.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/angular-xss-vulnerability-i18n/">Angular XSS Vulnerability in i18n Handling Exposes Web Applications</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/angular-xss-vulnerability-i18n/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft 365 Copilot AI Summary Flaw Exposes Emails</title>
		<link>https://firsthackersnews.com/copilot-dlp-bypass-email-summaries/</link>
					<comments>https://firsthackersnews.com/copilot-dlp-bypass-email-summaries/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 19 Feb 2026 09:25:05 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Vulnerability Reports]]></category>
		<category><![CDATA[#AISecurity]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#Compliance]]></category>
		<category><![CDATA[#Copilot]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataLossPrevention]]></category>
		<category><![CDATA[#DataProtection]]></category>
		<category><![CDATA[#DLPPassBypass]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Microsoft365]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11199</guid>

					<description><![CDATA[<p>A security weakness in Microsoft 365 Copilot is allowing the AI assistant to generate summaries of emails that</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/copilot-dlp-bypass-email-summaries/">Microsoft 365 Copilot AI Summary Flaw Exposes Emails</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A security weakness in Microsoft 365 Copilot is allowing the AI assistant to generate summaries of emails that are marked as confidential. This happens even when Data Loss Prevention (DLP) controls are configured to block access to sensitive content.</p>



<p>Because of this flaw, protected email data may be processed by Copilot and surfaced inside AI chat responses, creating a risk of unintended exposure.</p>



<p>The issue is tracked by Microsoft under reference <strong>CW1226324</strong> and was first identified on February 4, 2026. It affects the Copilot <strong>“Work Tab” Chat</strong> feature.</p>



<h3 class="wp-block-heading">Vulnerability Details</h3>



<figure class="wp-block-table"><table><thead><tr><th>Field</th><th>Details</th></tr></thead><tbody><tr><td>Tracking Reference</td><td>CW1226324</td></tr><tr><td>Affected Feature</td><td>Copilot “Work Tab” Chat</td></tr><tr><td>Security Issue</td><td>Bypass of DLP enforcement</td></tr><tr><td>Technical Cause</td><td>Processing logic defect in folder handling</td></tr><tr><td>Impacted Mail Folders</td><td>Sent Items, Drafts</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Technical Cause and Security Impact</h3>



<p>Microsoft’s investigation found that a defect in how Copilot processes certain mail folders is responsible for the issue.</p>



<p>Due to this error, emails stored in <strong>Sent Items</strong> and <strong>Drafts</strong> can be accessed by Copilot even if confidentiality sensitivity labels are applied.</p>



<p>Normally, sensitivity labels combined with DLP rules should block AI tools from reading or summarizing restricted emails. However, the defect prevents those protections from being properly enforced for the affected folders.</p>



<p>As a result, confidential information may appear in Copilot-generated summaries.</p>



<p>This is especially concerning for sectors such as healthcare, financial services, and government agencies, where strict email protection is tied to regulatory compliance.</p>



<p>The NHS has internally logged the matter as <strong>INC46740412</strong>, confirming operational impact within public sector environments.</p>



<p>Allowing an AI system to process labeled content despite DLP rules represents a serious breakdown in data governance controls.</p>



<h3 class="wp-block-heading">Remediation Status</h3>



<p>Microsoft began deploying a fix on February 11, 2026, and is contacting certain affected customers to confirm the resolution.</p>



<p>The update is still rolling out, and not all tenants may have received the fix yet.</p>



<p>Organizations using Microsoft 365 Copilot with email sensitivity labels enabled could be impacted until remediation is fully completed.</p>



<h3 class="wp-block-heading">Recommended Actions</h3>



<p>Administrators should monitor the Microsoft 365 Admin Center for updates related to reference CW1226324.</p>



<p>It is also recommended to review Copilot audit logs for unexpected access to labeled email content.</p>



<p>Until Microsoft confirms full deployment of the fix, organizations handling highly sensitive communications may consider temporarily limiting Copilot access to reduce exposure risk.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/copilot-dlp-bypass-email-summaries/">Microsoft 365 Copilot AI Summary Flaw Exposes Emails</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/copilot-dlp-bypass-email-summaries/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical Flaws in F5 BIG-IP and NGINX Prompt Urgent Security Patches</title>
		<link>https://firsthackersnews.com/f5-bigip-nginx-critical-vulnerabilities-security-fixes/</link>
					<comments>https://firsthackersnews.com/f5-bigip-nginx-critical-vulnerabilities-security-fixes/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 06 Feb 2026 09:05:56 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Vulnerability Reports]]></category>
		<category><![CDATA[BIG-IP Advanced WAF]]></category>
		<category><![CDATA[F5 BIG-IP]]></category>
		<category><![CDATA[NGINX products]]></category>
		<category><![CDATA[NGINX Prompt]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11113</guid>

					<description><![CDATA[<p>F5 has released its latest security update, fixing several vulnerabilities across its products. Although F5 lists some of</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-bigip-nginx-critical-vulnerabilities-security-fixes/">Critical Flaws in F5 BIG-IP and NGINX Prompt Urgent Security Patches</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>F5 has released its latest security update, fixing several vulnerabilities across its products. Although F5 lists some of these issues as “medium” under its internal scale, the newer CVSS v4.0 system rates the main ones at <strong>8.2</strong>, which is considered <strong>high risk</strong> for enterprise environments.</p>



<p>The update mainly affects <strong>BIG-IP Advanced WAF</strong>, <strong>NGINX products</strong>, and <strong>BIG-IP Container Ingress Services</strong>. Since these systems often handle incoming application traffic, leaving them unpatched could expose organizations to serious attacks.</p>



<h2 class="wp-block-heading"><strong>All about the vulnerability</strong></h2>



<p><strong>BIG-IP Advanced WAF &amp; ASM (CVE-2026-22548)</strong><br>This flaw affects the Web Application Firewall and Application Security Manager modules on BIG-IP devices. Attackers could potentially bypass security protections or disrupt services. It impacts versions <strong>17.1.0 to 17.1.2</strong>, and the fix is included in <strong>17.1.3</strong>.</p>



<p><strong>NGINX Vulnerability (CVE-2026-1642)</strong><br>A major issue was found across the NGINX ecosystem, including NGINX Plus, Open Source, and the Ingress Controller. Because NGINX often runs at the edge of networks as a reverse proxy or load balancer, vulnerable systems could become easy targets. This issue also carries a <strong>high severity score</strong>.</p>



<p><strong>BIG-IP Container Ingress Services (CVE-2026-22549)</strong><br>For organizations using Kubernetes or OpenShift, a vulnerability affects Container Ingress Services versions <strong>2.0.0 through 2.20.1</strong>. A patched version is available in <strong>2.20.2</strong>.</p>



<h2 class="wp-block-heading"><strong>Affected Components</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th>CVE</th><th>Product</th><th>Severity</th><th>Affected Versions</th></tr></thead><tbody><tr><td>CVE-2026-22548</td><td>BIG-IP Advanced WAF / ASM</td><td>High</td><td>17.1.0 – 17.1.2</td></tr><tr><td>CVE-2026-1642</td><td>NGINX (Plus, Open Source, Ingress)</td><td>High</td><td>Multiple versions</td></tr><tr><td>CVE-2026-22549</td><td>BIG-IP Container Ingress</td><td>Medium</td><td>2.0.0 – 2.20.1</td></tr></tbody></table></figure>



<p>F5 also warned about a configuration risk related to SMTP settings in BIG-IP systems. This isn’t a software bug but could allow misuse if not properly secured. Administrators should review and harden their configurations.</p>



<h2 class="wp-block-heading">What Organizations Should Do</h2>



<ul class="wp-block-list">
<li>Identify all BIG-IP and NGINX systems in use</li>



<li>Check installed versions against the affected list</li>



<li>Apply updates as soon as possible</li>



<li>Review and secure SMTP configurations on BIG-IP devices</li>
</ul>



<p>Because these products sit at key network entry points, patching them quickly is critical to reducing exposure.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-bigip-nginx-critical-vulnerabilities-security-fixes/">Critical Flaws in F5 BIG-IP and NGINX Prompt Urgent Security Patches</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/f5-bigip-nginx-critical-vulnerabilities-security-fixes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Security Gaps in TP-Link Devices Expose Users to Full Control Attacks</title>
		<link>https://firsthackersnews.com/tp-link-devices/</link>
					<comments>https://firsthackersnews.com/tp-link-devices/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 05 Feb 2026 06:55:35 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Vulnerability Reports]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[device security]]></category>
		<category><![CDATA[firmware update]]></category>
		<category><![CDATA[home network security]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[router security]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[tp-link]]></category>
		<category><![CDATA[wifi router]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11109</guid>

					<description><![CDATA[<p>TP-Link has disclosed multiple serious security flaws in its Archer BE230 v1.2 Wi-Fi router. These vulnerabilities allow attackers</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/tp-link-devices/">Security Gaps in TP-Link Devices Expose Users to Full Control Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>TP-Link has disclosed multiple serious security flaws in its <strong>Archer BE230 v1.2 Wi-Fi router</strong>. These vulnerabilities allow attackers with administrative access to run system commands and take complete control of the device.</p>



<p>Security researchers identified <strong>nine separate command injection issues</strong> affecting different parts of the router software, including web management, VPN services, cloud communication, and configuration features.</p>



<h2 class="wp-block-heading"><strong>What’s the Core Problem?</strong></h2>



<p>The router firmware does not properly validate certain inputs. Because of this, attackers can inject malicious operating system commands through authenticated interfaces.</p>



<p>Most of the vulnerabilities require access from the local network with high privileges. However, one flaw can be triggered remotely by importing a specially crafted configuration file, increasing the risk.</p>



<h2 class="wp-block-heading"><strong>What Could Happen?</strong></h2>



<p>If exploited, attackers could:</p>



<ul class="wp-block-list">
<li>Take full administrative control of the router</li>



<li>Change network settings</li>



<li>Intercept internet traffic</li>



<li>Install backdoors for long-term access</li>



<li>Move deeper into internal networks</li>
</ul>



<p>This could affect both home users and organizations using the device.</p>



<h2 class="wp-block-heading"><strong>Affected Versions</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th>Device Model</th><th>Affected Firmware Versions</th><th>Fixed Version</th></tr></thead><tbody><tr><td>Archer BE230 v1.2</td><td>All versions <strong>before 1.2.4 Build 20251218</strong></td><td>1.2.4 Build 20251218 or later</td></tr></tbody></table></figure>



<h2 class="wp-block-heading"><strong>Vulnerability Overview</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th>CVE ID</th><th>Affected Area</th><th>Severity</th><th>Access Required</th></tr></thead><tbody><tr><td>CVE-2026-0630</td><td>Web Modules</td><td>High (8.5)</td><td>Adjacent Network</td></tr><tr><td>CVE-2026-22222</td><td>Web Modules</td><td>High (8.5)</td><td>Adjacent Network</td></tr><tr><td>CVE-2026-0631</td><td>VPN Modules</td><td>High (8.5)</td><td>Adjacent Network</td></tr><tr><td>CVE-2026-22221</td><td>VPN Modules</td><td>High (8.5)</td><td>Adjacent Network</td></tr><tr><td>CVE-2026-22223</td><td>VPN Modules</td><td>High (8.5)</td><td>Adjacent Network</td></tr><tr><td>CVE-2026-22224</td><td>Cloud Communication</td><td>High (8.5)</td><td>Adjacent Network</td></tr><tr><td>CVE-2026-22225</td><td>VPN Connection Service</td><td>High (8.5)</td><td>Adjacent Network</td></tr><tr><td>CVE-2026-22226</td><td>VPN Server Configuration</td><td>High (8.5)</td><td>Adjacent Network</td></tr><tr><td>CVE-2026-22227</td><td>Configuration Backup</td><td>High (8.5)</td><td>Adjacent Network</td></tr><tr><td>CVE-2026-22229</td><td>Config File Import</td><td>High (8.6)</td><td>Network (Remote)</td></tr></tbody></table></figure>



<h2 class="wp-block-heading"><strong>Fix Available</strong></h2>



<p>TP-Link released <strong>firmware version 1.2.4 Build 20251218</strong> that fixes all these issues. Users should update immediately through official TP-Link support channels. Devices left unpatched remain at risk.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/tp-link-devices/">Security Gaps in TP-Link Devices Expose Users to Full Control Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/tp-link-devices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PoC Released for GNU Telnetd RCE, 800K+ Still Exposed</title>
		<link>https://firsthackersnews.com/cve-2026-24061/</link>
					<comments>https://firsthackersnews.com/cve-2026-24061/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 27 Jan 2026 05:39:10 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Vulnerability Reports]]></category>
		<category><![CDATA[attack surface management]]></category>
		<category><![CDATA[CVE-2026-24061]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cybersecurity alert]]></category>
		<category><![CDATA[Enterprise Security]]></category>
		<category><![CDATA[exposed telnet servers]]></category>
		<category><![CDATA[GNU Inetutils]]></category>
		<category><![CDATA[infrastructure security]]></category>
		<category><![CDATA[insecure services]]></category>
		<category><![CDATA[internet-wide exposure]]></category>
		<category><![CDATA[legacy protocol security]]></category>
		<category><![CDATA[network security threat]]></category>
		<category><![CDATA[PoC released]]></category>
		<category><![CDATA[port 23 risk]]></category>
		<category><![CDATA[proof of concept exploit]]></category>
		<category><![CDATA[remote code execution]]></category>
		<category><![CDATA[security operations]]></category>
		<category><![CDATA[security patching]]></category>
		<category><![CDATA[system compromise risk]]></category>
		<category><![CDATA[telnet exploit]]></category>
		<category><![CDATA[Telnet RCE]]></category>
		<category><![CDATA[telnet security risk]]></category>
		<category><![CDATA[telnetd vulnerability]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[unencrypted protocols]]></category>
		<category><![CDATA[Vulnerability Disclosure]]></category>
		<category><![CDATA[Vulnerability Management]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11051</guid>

					<description><![CDATA[<p>A working proof-of-concept exploit has been made public for CVE-2026-24061, a critical remote code execution vulnerability affecting GNU</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2026-24061/">PoC Released for GNU Telnetd RCE, 800K+ Still Exposed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A working proof-of-concept exploit has been made public for <strong>CVE-2026-24061</strong>, a critical remote code execution vulnerability affecting GNU Inetutils <strong>telnetd</strong>. </p>



<p>Security researchers warn that the impact could be widespread, as more than 800,000 telnet services are still directly reachable from the internet. With exploit code now available, the barrier to attack is much lower, increasing the likelihood of large-scale scanning and exploitation.</p>



<h2 class="wp-block-heading"><strong>Why this vulnerability is a serious threat</strong></h2>



<p>The flaw allows remote attackers to execute commands on vulnerable systems without authentication. In other words, an attacker does not need valid credentials to gain control. </p>



<p>The root cause is improper input validation in the telnet daemon, which can be abused to bypass security checks and run arbitrary commands on the host.</p>



<p>Telnet itself is a legacy remote access protocol that sends all traffic, including usernames and passwords, in plain text. This has long made it a weak point in network security. When combined with a remote code execution vulnerability, exposed telnet services become extremely high-risk. Attackers can use them not only for initial access, but also for deploying malware, stealing credentials, moving laterally inside networks, or adding compromised systems to botnets.</p>



<p>The release of public exploit code changes the risk level significantly. Threat actors no longer need to develop their own tools, making automated attacks more likely. Internet-wide scans continue to show hundreds of thousands of systems with telnet open on common ports, proving that outdated services are still running in production environments.</p>



<p><strong>Recommended actions for organizations</strong></p>



<ul class="wp-block-list">
<li>Identify all systems exposing Telnet, including port 23 and alternate ports such as 2323</li>



<li>Immediately disable telnet services on internet-facing systems</li>



<li>Migrate remote administration to secure alternatives like SSH</li>



<li>Use firewalls and network segmentation to restrict access to legacy systems that cannot yet be removed</li>



<li>Monitor logs and network traffic for unusual command execution or unauthorized access attempts</li>



<li>Prioritize patching and remediation as part of urgent risk reduction efforts</li>
</ul>



<p>Because the exploit is public and the exposed attack surface is so large, this vulnerability presents a real risk of mass exploitation. Organizations that continue to operate telnet services should act quickly to reduce exposure and prevent potential system compromise.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2026-24061/">PoC Released for GNU Telnetd RCE, 800K+ Still Exposed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cve-2026-24061/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apache Airflow Flaws Risk Exposure of Sensitive Data</title>
		<link>https://firsthackersnews.com/apache-airflow/</link>
					<comments>https://firsthackersnews.com/apache-airflow/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 21 Jan 2026 05:55:13 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Vulnerability Reports]]></category>
		<category><![CDATA[Airflow Security]]></category>
		<category><![CDATA[Apache Airflow]]></category>
		<category><![CDATA[Apache Airflow Vulnerabilities]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Credential Leakage]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Data Pipeline Security]]></category>
		<category><![CDATA[DevOps Security]]></category>
		<category><![CDATA[Open Source Security]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[Sensitive Data Exposure]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11023</guid>

					<description><![CDATA[<p>Multiple vulnerabilities in Apache Airflow versions prior to 3.1.6 could lead to the exposure of sensitive credentials through</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apache-airflow/">Apache Airflow Flaws Risk Exposure of Sensitive Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Multiple vulnerabilities in <strong>Apache Airflow versions prior to 3.1.6</strong> could lead to the exposure of sensitive credentials through task logs and the web interface. The issues are caused by improper masking of secrets during logging and template rendering.</p>



<p>These flaws may expose proxy credentials, database passwords, API keys, and other secrets in production environments.</p>



<h2 class="wp-block-heading">Vulnerability Summary</h2>



<figure class="wp-block-table"><table><thead><tr><th>CVE ID</th><th>Affected Versions</th><th>Severity</th><th>Exposure Location</th></tr></thead><tbody><tr><td>CVE-2025-68675</td><td>&lt; 3.1.6</td><td>Low</td><td>Task logs</td></tr><tr><td>CVE-2025-68438</td><td>3.1.0 – 3.1.6</td><td>Low</td><td>Rendered Templates UI</td></tr></tbody></table></figure>



<h2 class="wp-block-heading">Proxy Credentials Exposure via Task Logs</h2>



<p>The first issue affects how Apache Airflow handles proxy configurations inside Connection objects. Proxy URLs can include embedded authentication details, such as usernames and passwords.</p>



<p>These proxy fields were not marked as sensitive, which prevented Airflow’s automatic masking from hiding credentials when connections were rendered or logged during task execution. As a result, proxy credentials could appear in plain text within task logs.</p>



<p>Since task logs are often accessible to multiple users and stored in centralized logging systems, this creates a risk of credential misuse and unauthorized access.</p>



<p>The second vulnerability impacts the Rendered Templates section of the Airflow web UI. When templated fields exceed the configured size limit, the masking process may not apply custom secret-masking rules correctly.</p>



<p>This can cause sensitive values, such as API keys or database passwords, to be partially displayed in clear text in the UI. Any user with access to the Airflow web interface could potentially view these exposed values.</p>



<p>Although both issues require authenticated access, they introduce insider-threat risks and can support lateral movement within environments. Long log retention policies can extend exposure if leaked credentials remain stored in archived logs.</p>



<h2 class="wp-block-heading"><strong>Mitigation and Recommendation</strong></h2>



<p>Apache Airflow <strong>version 3.1.6</strong> resolves both issues by properly classifying proxy fields as sensitive and ensuring secret-masking rules are applied before data is rendered or truncated.</p>



<p>Organizations are strongly advised to upgrade as soon as possible. If immediate upgrades are not feasible, restricting access to task logs and the Airflow web UI can help reduce exposure.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apache-airflow/">Apache Airflow Flaws Risk Exposure of Sensitive Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/apache-airflow/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical Cal.com Vulnerability Enables Account Takeover</title>
		<link>https://firsthackersnews.com/cal-com/</link>
					<comments>https://firsthackersnews.com/cal-com/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 15 Jan 2026 18:59:24 +0000</pubDate>
				<category><![CDATA[Vulnerability Reports]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10992</guid>

					<description><![CDATA[<p>A newly disclosed critical vulnerability in Cal.com, an open-source scheduling and booking platform, could allow attackers to bypass</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cal-com/">Critical Cal.com Vulnerability Enables Account Takeover</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly disclosed critical vulnerability in Cal.com, an open-source scheduling and booking platform, could allow attackers to bypass authentication and take over user accounts without valid credentials.</p>



<p>The issue affects Cal.com versions 3.1.6 through 6.0.6 and has been patched in version 6.0.7. Hosted Cal.com environments were secured shortly after the flaw was reported.</p>



<p>The vulnerability was discovered by GitHub researcher pedroccastro and tracked as GHSA-7hg4-x4pr-3hrg.<br>It originates from a logic flaw in Cal.com’s custom NextAuth JWT callback, which is used to manage user sessions.</p>



<p>When a session update event is triggered, the application incorrectly trusts client-supplied input and writes it directly into the JSON Web Token (JWT) without server-side verification.</p>



<p>An attacker can abuse this behavior by sending a crafted API request that updates the session email field to that of another user. Because ownership of the email is never validated, the JWT is silently modified.</p>



<h2 class="wp-block-heading">How the Attack Works</h2>



<p>The attack works by abusing how Cal.com handles session updates in its authentication logic. An attacker only needs a valid, low-privilege account to trigger a session update request that includes a different user’s email address. </p>



<p>Because Cal.com’s custom NextAuth JWT callback trusts client-supplied data during an “update” event, it writes the attacker-controlled email directly into the JSON Web Token without verifying ownership. </p>



<p>This silently alters the JWT so that it now contains the victim’s email. On subsequent requests, Cal.com identifies the user based solely on the email value stored in the token, causing the backend to treat the attacker as the victim. </p>



<p>As a result, the attacker gains full authenticated access to the victim’s account without knowing the password, possessing a valid session, or passing two-factor authentication, leading to complete account takeover with minimal effort.</p>



<h2 class="wp-block-heading">Potential Impact on Affected Accounts</h2>



<p>An attacker who successfully exploits this flaw could gain access to:</p>



<ul class="wp-block-list">
<li>Booking schedules and calendar data</li>



<li>Personal and organizational event types</li>



<li>Connected services (Google Calendar, Zoom, etc.)</li>



<li>Organization roles and permissions</li>



<li>Billing and administrative features</li>
</ul>



<p>Because the bypass occurs <strong>after authentication checks</strong>, traditional security controls like 2FA offer no protection in this scenario.</p>



<h2 class="wp-block-heading">Patch Status and Recommendations</h2>



<p>Cal.com has confirmed that:</p>



<ul class="wp-block-list">
<li><strong>No active exploitation</strong> has been observed so far</li>



<li><strong>Hosted instances were patched immediately</strong></li>
</ul>



<h3 class="wp-block-heading">Recommended Actions</h3>



<ul class="wp-block-list">
<li>Upgrade self-hosted Cal.com deployments to version 6.0.7 or later</li>



<li>Review API usage and access logs for unusual session updates</li>



<li>Rotate API keys or tokens if exposure is suspected</li>



<li>Apply strict validation for identity fields in custom authentication logic</li>
</ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cal-com/">Critical Cal.com Vulnerability Enables Account Takeover</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cal-com/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Elastic Security Updates Address File Theft and DoS Risks</title>
		<link>https://firsthackersnews.com/elastic/</link>
					<comments>https://firsthackersnews.com/elastic/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 14 Jan 2026 10:30:23 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Vulnerability Reports]]></category>
		<category><![CDATA[Elastic]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10975</guid>

					<description><![CDATA[<p>Elastic has released new security updates to fix multiple vulnerabilities across its platform, including a high-severity issue that</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/elastic/">Elastic Security Updates Address File Theft and DoS Risks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Elastic has released new security updates to fix <strong>multiple vulnerabilities</strong> across its platform, including a <strong>high-severity issue</strong> that could allow attackers to read arbitrary files from affected systems.</p>



<p>The vulnerabilities impact Kibana and related components, affecting how files, inputs, and system resources are handled. Elastic strongly recommends updating to the latest versions to reduce exposure.</p>



<h2 class="wp-block-heading">Most Critical Issue: Arbitrary File Disclosure</h2>



<p>The most serious flaw, tracked as <strong>CVE-2026-0532</strong>, affects connector configurations and combines two weaknesses: improper file path handling and server-side request forgery (SSRF).</p>



<p>An authenticated attacker with permission to create or modify connectors could abuse this flaw to trigger unauthorized network requests and read files from the underlying system. This issue has a <strong>CVSS score of 8.6</strong>, placing it in the high-severity category.</p>



<h3 class="wp-block-heading">Vulnerability Summary</h3>



<figure class="wp-block-table"><table><thead><tr><th>CVE ID</th><th>Issue Type</th><th>Severity</th><th>CVSS</th><th>Affected Versions</th></tr></thead><tbody><tr><td>CVE-2026-0532</td><td>File path control + SSRF</td><td>High</td><td>8.6</td><td>8.15.0–8.19.9, 9.0.0–9.2.3</td></tr><tr><td>CVE-2026-0543</td><td>Input validation flaw (Email connector)</td><td>Medium</td><td>6.5</td><td>7.x, 8.0.0–8.19.9, 9.0.0–9.2.3</td></tr><tr><td>CVE-2026-0531</td><td>Resource exhaustion (Fleet)</td><td>Medium</td><td>6.5</td><td>7.10.0+, 8.x, 9.x</td></tr><tr><td>CVE-2026-0530</td><td>Resource exhaustion (Fleet)</td><td>Medium</td><td>6.5</td><td>7.10.0+, 8.x, 9.x</td></tr></tbody></table></figure>



<h2 class="wp-block-heading">Email Connector and Fleet DoS Issues</h2>



<p>Another issue, <strong>CVE-2026-0543</strong>, affects Kibana’s email connector. Improper input validation allows attackers with execution privileges to submit malformed email parameters, potentially exhausting memory and causing a <strong>denial-of-service (DoS)</strong> condition that requires manual intervention to recover.</p>



<p>In addition, two related flaws in <strong>Kibana Fleet</strong> (<strong>CVE-2026-0531</strong> and <strong>CVE-2026-0530</strong>) allow logged-in users to trigger excessive resource usage through repeated requests. These flaws can also lead to service disruption, and <strong>no temporary workarounds are available</strong>.</p>



<h2 class="wp-block-heading">Mitigation and Recommended Action</h2>



<p>Elastic has released fixed versions and advises users to upgrade immediately to:</p>



<ul class="wp-block-list">
<li><strong>8.19.10</strong></li>



<li><strong>9.1.10</strong></li>



<li><strong>9.2.4</strong></li>
</ul>



<p>Elastic Cloud Serverless deployments are not affected due to continuous updates. For self-managed environments where immediate upgrades are not possible, Elastic suggests restricting connector permissions and applying tighter access controls as a temporary risk reduction measure.</p>



<p>These vulnerabilities highlight the importance of regularly updating Elastic deployments, especially in environments that rely heavily on connectors and Fleet management. Organizations running affected versions should review their exposure and apply patches as soon as possible to prevent file disclosure or service disruption.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/elastic/">Elastic Security Updates Address File Theft and DoS Risks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/elastic/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apache NuttX Bug Allows Remote System Crashes</title>
		<link>https://firsthackersnews.com/apache-nuttx-rtos/</link>
					<comments>https://firsthackersnews.com/apache-nuttx-rtos/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 02 Jan 2026 09:51:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Vulnerability Reports]]></category>
		<category><![CDATA[Apache NuttX]]></category>
		<category><![CDATA[Apache Security]]></category>
		<category><![CDATA[CVE-2025-48769]]></category>
		<category><![CDATA[cybersecurity and infrastructure agency]]></category>
		<category><![CDATA[Embedded Security]]></category>
		<category><![CDATA[Firmware Security]]></category>
		<category><![CDATA[IoT Security]]></category>
		<category><![CDATA[RTOS Security]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[System Crash]]></category>
		<category><![CDATA[Use After Free]]></category>
		<category><![CDATA[VFS Vulnerability]]></category>
		<category><![CDATA[Vulnerability Disclosure]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10903</guid>

					<description><![CDATA[<p>A newly disclosed vulnerability in Apache NuttX RTOS could allow attackers to crash systems or trigger unexpected file</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apache-nuttx-rtos/">Apache NuttX Bug Allows Remote System Crashes</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly disclosed vulnerability in <strong>Apache NuttX RTOS</strong> could allow attackers to crash systems or trigger unexpected file operations. The issue affects devices running network-exposed services and has prompted security warnings for impacted users.</p>



<p>The flaw is tracked as CVE-2025-48769 and was publicly disclosed on December 31, 2025. It has been rated moderate severity but impacts a wide range of NuttX versions.</p>



<h2 class="wp-block-heading">Vulnerability Details and Impact</h2>



<p>The issue exists in the Virtual File System (VFS), specifically within the <code>fs/vfs/fs_rename</code> code. A flaw in how memory is handled during recursive operations can result in a <strong>use-after-free</strong> condition, leading to system instability.</p>



<p><strong>Key details:</strong></p>



<ul class="wp-block-list">
<li><strong>CVE ID:</strong> CVE-2025-48769</li>



<li><strong>Vulnerability Type:</strong> Use After Free (CWE-416)</li>



<li><strong>Affected Product:</strong> Apache NuttX RTOS</li>



<li><strong>Affected Component:</strong> Virtual File System (VFS)</li>



<li><strong>Affected Versions:</strong> 7.20 through 12.10.0</li>
</ul>



<p>In certain situations, this flaw can cause unintended file rename or move operations, which may result in crashes. Systems running virtual filesystem services with write access are especially at risk, particularly when exposed over network protocols such as <strong>FTP</strong>.</p>



<h2 class="wp-block-heading">Mitigation and Recommendations</h2>



<p>The Apache NuttX team has released <strong>version 12.11.0</strong>, which fully fixes the vulnerability. Users running affected versions are strongly advised to upgrade as soon as possible.</p>



<p>For environments where an immediate upgrade is not possible, temporary risk reduction steps include:</p>



<ul class="wp-block-list">
<li>Restricting network access to virtual filesystem services</li>



<li>Limiting or disabling write access where feasible</li>



<li>Closely monitoring embedded and IoT devices exposed to FTP or similar services</li>
</ul>



<p>No active exploitation has been reported so far. However, timely patching is recommended to prevent potential stability and security issues.</p>



<p>The vulnerability was reported by Richard Jiayang Liu of the University of Illinois, with the fix reviewed and coordinated by the Apache NuttX maintainers and security team.</p>



<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apache-nuttx-rtos/">Apache NuttX Bug Allows Remote System Crashes</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/apache-nuttx-rtos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IBM API Connect Flaw Enables Authentication Bypass</title>
		<link>https://firsthackersnews.com/cve-2025-13915/</link>
					<comments>https://firsthackersnews.com/cve-2025-13915/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 31 Dec 2025 09:23:53 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Vulnerability Reports]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[authentication bypass]]></category>
		<category><![CDATA[critical vulnerability]]></category>
		<category><![CDATA[cve-2025-13915]]></category>
		<category><![CDATA[cvss 9.8]]></category>
		<category><![CDATA[Enterprise Security]]></category>
		<category><![CDATA[ibm api connect]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10891</guid>

					<description><![CDATA[<p>IBM has disclosed a critical security flaw in its API Connect platform that allows attackers to bypass authentication</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2025-13915/">IBM API Connect Flaw Enables Authentication Bypass</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>IBM has disclosed a critical security flaw in its API Connect platform that allows attackers to bypass authentication entirely. The vulnerability is tracked as CVE-2025-13915 and has been assigned a CVSS score of 9.8, placing it in the critical severity category.</p>



<p>The issue is caused by a weakness in how API Connect handles primary authentication. An attacker does not need valid credentials, user interaction, or elevated privileges to exploit it. Network access to a vulnerable instance is enough to gain unauthorized access.</p>



<h3 class="wp-block-heading">Key Details</h3>



<ul class="wp-block-list">
<li><strong>CVE ID:</strong> CVE-2025-13915</li>



<li><strong>Severity:</strong> Critical</li>



<li><strong>CVSS Score:</strong> 9.8</li>



<li><strong>Weakness Type:</strong> Authentication bypass (CWE-305)</li>



<li><strong>Attack Complexity:</strong> Low</li>



<li><strong>Privileges Required:</strong> None</li>
</ul>



<h3 class="wp-block-heading">Affected Versions</h3>



<p>The vulnerability impacts the following IBM API Connect versions:</p>



<ul class="wp-block-list">
<li>10.0.8.0</li>



<li>10.0.8.1</li>



<li>10.0.8.2</li>



<li>10.0.8.3</li>



<li>10.0.8.4</li>



<li>10.0.8.5</li>



<li>10.0.11.0</li>
</ul>



<p>IBM API Connect is commonly used to control authentication, authorization, and security policies for enterprise APIs. A successful authentication bypass at this layer can expose:</p>



<ul class="wp-block-list">
<li>Backend API services</li>



<li>Sensitive business data</li>



<li>Internal application logic</li>



<li>Downstream systems connected to APIs</li>
</ul>



<p>Because the flaw sits at the gateway level, exploitation could have a broad impact across environments.</p>



<h3 class="wp-block-heading">Mitigation and Recommendations</h3>



<p>IBM strongly advises customers to apply security updates immediately.</p>



<ul class="wp-block-list">
<li>Users on <strong>10.0.8.x</strong> should install the available interim fixes (iFixes).</li>



<li>Users on <strong>10.0.11.0</strong> should apply the released security patch.</li>
</ul>



<p>If patching cannot be done right away, IBM recommends disabling <strong>self-service sign-up</strong> on the Developer Portal to reduce exposure. This is a temporary measure and does not fully remove the risk.</p>



<h3 class="wp-block-heading">What Organizations Should Do Now</h3>



<ul class="wp-block-list">
<li>Identify all IBM API Connect instances in use</li>



<li>Apply patches or interim fixes as a priority</li>



<li>Review API access and authentication logs for unusual activity</li>



<li>Limit external exposure until updates are completed</li>
</ul>



<p>Given the high severity score and ease of exploitation, this vulnerability should be addressed <strong>immediately</strong>, not deferred.</p>



<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2025-13915/">IBM API Connect Flaw Enables Authentication Bypass</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cve-2025-13915/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
