<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Remote code execution &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/vulnerability/remote-code-execution/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Thu, 13 Nov 2025 08:20:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Remote code execution &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Lite XL Text Editor Vulnerability Allows Remote Code Execution</title>
		<link>https://firsthackersnews.com/lite-xl/</link>
					<comments>https://firsthackersnews.com/lite-xl/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 13 Nov 2025 08:17:02 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[Lite XL]]></category>
		<category><![CDATA[remote code execution]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[Text editor]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10636</guid>

					<description><![CDATA[<p>A new vulnerability has been discovered in Lite XL, a lightweight open-source text editor, that could let attackers</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lite-xl/">Lite XL Text Editor Vulnerability Allows Remote Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new vulnerability has been discovered in <strong>Lite XL</strong>, a lightweight open-source text editor, that could let attackers run arbitrary code on affected systems.</p>



<p>Researchers from Carnegie Mellon University identified this flaw as CVE-2025-12120, affecting Lite XL versions 2.1.8 and earlier. The issue lies in how the editor handles project configuration files.</p>



<h2 class="wp-block-heading"><strong>How the Vulnerability Works</strong></h2>



<p>When a user opens a project folder, Lite XL automatically runs the <code>.lite_project.lua</code> file inside that directory — without asking for any confirmation.</p>



<p>This file is designed to store project-specific settings, but it can also contain executable Lua code. Because there’s no verification step before execution, an attacker can embed malicious Lua code inside this file.</p>



<p>If a user opens a malicious project directory, the code executes instantly with the same privileges as the Lite XL application.</p>



<h2 class="wp-block-heading"><strong>Impact and Risk</strong></h2>



<p>Attackers can share infected project folders through <strong>GitHub</strong>, <strong>file-sharing services</strong>, or other developer platforms. Once opened in Lite XL, the malicious file runs silently, allowing attackers to:</p>



<ul class="wp-block-list">
<li>Steal sensitive data</li>



<li>Modify or delete files</li>



<li>Install malware</li>



<li>Further compromise the system</li>
</ul>



<p>This makes the vulnerability especially dangerous, as many developers trust files from familiar sources or repositories without closely checking them.</p>



<p>The level of impact depends on the user’s permissions — if Lite XL runs with elevated privileges, the attacker gains the same access.</p>



<h3 class="wp-block-heading"><strong>Affected Versions</strong></h3>



<figure class="wp-block-table"><table><thead><tr><th>CVE ID</th><th>Product</th><th>Affected Versions</th><th>Vulnerability Type</th></tr></thead><tbody><tr><td>CVE-2025-12120</td><td>Lite XL Text Editor</td><td>2.1.8 and earlier</td><td>Arbitrary Code Execution (ACE)</td></tr></tbody></table></figure>



<h2 class="wp-block-heading"><strong>How to Stay Safe</strong></h2>



<ul class="wp-block-list">
<li>Update Lite XL to the latest version as soon as a patch becomes available.</li>



<li>Avoid opening untrusted project directories in Lite XL.</li>



<li>Check the <code>.lite_project.lua</code> file for suspicious code before using projects from unknown or public sources.</li>



<li>Developers recommend that Lite XL should include a confirmation prompt before running project files or disable automatic execution completely.</li>
</ul>



<p>This vulnerability highlights the importance of understanding how configuration files work — especially when they can execute code.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lite-xl/">Lite XL Text Editor Vulnerability Allows Remote Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/lite-xl/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical Command Injection Flaw Found in F5 BIG-IP Systems (CVE-2025-31644)</title>
		<link>https://firsthackersnews.com/cve-2025-31644/</link>
					<comments>https://firsthackersnews.com/cve-2025-31644/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 13 May 2025 16:25:01 +0000</pubDate>
				<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Command Injection Flaw]]></category>
		<category><![CDATA[CVE-2025-31644]]></category>
		<category><![CDATA[F5 BIG-IP]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10189</guid>

					<description><![CDATA[<p>A critical vulnerability, CVE-2025-31644, has been discovered in F5 BIG-IP systems running in Appliance mode. The flaw allows</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2025-31644/">Critical Command Injection Flaw Found in F5 BIG-IP Systems (CVE-2025-31644)</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical vulnerability, CVE-2025-31644, has been discovered in F5 BIG-IP systems running in Appliance mode. The flaw allows authenticated administrators to run arbitrary system commands, bypassing key security protections.</p>



<p>The issue was reported by security researcher Matei “Mal” Badanoiu from Deloitte, and F5 has now released patches to fix the problem.</p>



<p>The vulnerability stems from improper input handling in an internal iControl REST endpoint and the TMOS Shell (tmsh), which lets attackers execute bash commands if they have admin access.</p>



<p>Exploiting this flaw lets attackers create or delete files and run system commands through the BIG-IP management port or self IPs. While this affects the control plane, F5 confirmed there’s no impact on the data plane.</p>



<h2 class="wp-block-heading"><strong>Who’s Affected and How Severe Is It?</strong></h2>



<p>This flaw affects BIG-IP systems in Appliance mode, including those licensed for it or running on vCMP guest instances. It carries a high severity score—8.7 under CVSS v3.1.</p>



<p>F5 tracked the issue under internal IDs 1778741, 1702565, and 15832011.</p>



<p>Other F5 products are <em>not</em> affected, including:</p>



<ul class="wp-block-list">
<li>BIG-IP Next</li>



<li>BIG-IQ Centralized Management</li>



<li>F5 Distributed Cloud</li>



<li>F5OS</li>



<li>NGINX</li>
</ul>



<h2 class="wp-block-heading"><strong>Recommended Mitigation Steps</strong></h2>



<p>F5 has released updates to fix the vulnerability in BIG-IP:</p>



<ul class="wp-block-list">
<li><strong>17.x branch</strong>: update to <strong>17.1.2.2</strong></li>



<li><strong>16.x branch</strong>: update to <strong>16.1.6</strong></li>



<li><strong>15.x branch</strong>: update to <strong>15.1.10.7</strong></li>
</ul>



<p>Admins are strongly encouraged to upgrade as soon as possible.</p>



<p>If you can’t update right away, F5 recommends temporary workarounds:</p>



<ul class="wp-block-list">
<li>Limit admin access to trusted users only, since the attack requires authentication.</li>



<li>Block iControl REST access from self IPs by setting <strong>Port Lockdown</strong> to <strong>“Allow None.”</strong></li>



<li>Restrict SSH access using similar network rules.</li>



<li>Use firewalls or packet filters to limit access to the management interface.</li>
</ul>



<p>F5 provides full guidance in support articles K46122561 and K693540491.</p>



<p>Note: Some of these steps may affect high availability (HA) setups, so review carefully before applying changes.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2025-31644/">Critical Command Injection Flaw Found in F5 BIG-IP Systems (CVE-2025-31644)</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cve-2025-31644/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Wazuh SIEM vulnerability enables remote code execution</title>
		<link>https://firsthackersnews.com/wazuh-siem/</link>
					<comments>https://firsthackersnews.com/wazuh-siem/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 17 Mar 2025 17:01:10 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[CVE-2025-24016]]></category>
		<category><![CDATA[remote code execution]]></category>
		<category><![CDATA[SIEM vulnerability]]></category>
		<category><![CDATA[Wazuh SIEM vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9800</guid>

					<description><![CDATA[<p>A critical vulnerability, CVE-2025-24016, has been found in the Wazuh SIEM platform, affecting versions 4.4.0 to 4.9.0. Wazuh</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wazuh-siem/">Wazuh SIEM vulnerability enables remote code execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical vulnerability, CVE-2025-24016, has been found in the Wazuh SIEM platform, affecting versions 4.4.0 to 4.9.0. </p>



<h2 class="wp-block-heading"><strong>Wazuh SIEM vulnerability</strong></h2>



<p>It allows attackers with API access to remotely execute arbitrary Python code, potentially compromising the system. The issue arises from unsafe deserialization of Distributed API (DAPI) parameters used for communication between Wazuh components, according to CVE reports.</p>



<p>The table below shows key details about the CVE-2025-24016 vulnerability and the affected Wazuh products:</p>



<figure class="wp-block-table"><table><thead><tr><th>CVE ID</th><th>Affected Software</th><th>Versions</th><th>Vulnerability Type</th><th>Severity (CVSSv3.1)</th><th>Patch Version</th></tr></thead><tbody><tr><td>CVE-2025-24016</td><td>Wazuh SIEM Platform</td><td>4.4.0 to 4.9.0</td><td>Remote Code Execution</td><td>9.9 (Critical)</td><td>4.9.1</td></tr></tbody></table></figure>



<p>The vulnerability is found in the <code>as_wazuh_object</code> function within the <code>framework/wazuh/core/cluster/common.py</code> file. This function deserializes JSON data from the Distributed API. The code snippet before the patch is shown below:</p>



<p>def as_wazuh_object(dct: Dict):<br>try:<br>if &#8216;<strong>wazuh_datetime</strong>&#8216; in dct:<br>return datetime.datetime.fromisoformat(dct[&#8216;<strong>wazuh_datetime</strong>&#8216;])<br>elif &#8216;<strong>unhandled_exc</strong>&#8216; in dct:<br>exc_data = dct[&#8216;<strong>unhandled_exc</strong>&#8216;]<br>return eval(exc_data[&#8216;<strong>class</strong>&#8216;])(*exc_data[&#8216;<strong>args</strong>&#8216;])<br>return dct<br>except (KeyError, AttributeError):<br>return dct</p>



<p>This code uses the eval function to run arbitrary Python code from the class and args fields, making it highly exploitable.</p>



<h2 class="wp-block-heading"><strong>Impact and Exploitation</strong></h2>



<p>An attacker can exploit this vulnerability by sending a malicious JSON payload to the Wazuh server via the API. The payload must include the unhandled_exc key, along with class and args values to specify the code to execute. For example:</p>



<p>When processed by the as_wazuh_object function, the payload executes the command <code>os.system("touch /tmp/pwned")</code>, creating a /tmp/pwned file on the Wazuh server.</p>



<p>{<br>&#8220;<strong>unhandled_exc</strong>&#8220;: {<br>&#8220;<strong>class</strong>&#8220;: &#8220;os.system&#8221;,<br>&#8220;<strong>args</strong>&#8220;: [&#8220;touch /tmp/pwned&#8221;]<br>}<br>}</p>



<h2 class="wp-block-heading"><strong>Mitigation</strong></h2>



<p>The vulnerability was fixed in Wazuh version 4.9.1 by replacing the unsafe eval function with <code>ast.literal_eval</code>, which safely evaluates a string containing a Python literal to prevent arbitrary code execution. Here’s the updated code snippet:</p>



<p>def as_wazuh_object(dct: Dict):<br>try:<br>if &#8216;<strong>wazuh_datetime</strong>&#8216; in dct:<br>return datetime.datetime.fromisoformat(dct[&#8216;<strong>wazuh_datetime</strong>&#8216;])<br>elif &#8216;<strong>unhandled_exc</strong>&#8216; in dct:<br>exc_data = dct[&#8216;<strong>unhandled_exc</strong>&#8216;]<br>exc_dict = {exc_data[&#8216;<strong>class</strong>&#8216;]: exc_data[&#8216;<strong>args</strong>&#8216;]}<br>return ast.literal_eval(json.dumps(exc_dict))<br>return dct<br>except (KeyError, AttributeError):<br>return dct</p>



<p>To reduce the risk of CVE-2025-24016, organizations should take the following actions:</p>



<ul class="wp-block-list">
<li>Upgrade to Wazuh version 4.9.1 or later.</li>



<li>Restrict API access to authorized users and systems.</li>



<li>Implement strong authentication, such as multi-factor authentication.</li>



<li>Monitor API traffic for unusual activity.</li>



<li>Regularly review and update security settings.</li>



<li>Use network segmentation to limit attack impact.</li>



<li>A Web Application Firewall (WAF) can help detect and block malicious requests before they reach the Wazuh server.</li>
</ul>



<p>Exploiting CVE-2025-24016 can lead to severe consequences, including:</p>



<ul class="wp-block-list">
<li>Full control of the Wazuh server, allowing attackers to access sensitive data and change configurations.</li>



<li>Compromise of the entire Wazuh cluster by taking over the master server.</li>



<li>Disruption of security monitoring, enabling further undetected attacks.</li>



<li>Theft of sensitive data, including logs and alerts.</li>



<li>Using the Wazuh server as a launch point for other network attacks.</li>
</ul>



<p>Timely patching and strong security measures are essential to prevent such attacks.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wazuh-siem/">Wazuh SIEM vulnerability enables remote code execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/wazuh-siem/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>10,000+ WordPress sites exposed by donation plugin vulnerability</title>
		<link>https://firsthackersnews.com/plugin-vulnerability/</link>
					<comments>https://firsthackersnews.com/plugin-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 05 Mar 2025 17:04:10 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[plugin vulnerability]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[wordpress site]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9741</guid>

					<description><![CDATA[<p>A serious flaw in the popular GiveWP Donation Plugin has put over 10,000 WordPress sites at risk of</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/plugin-vulnerability/">10,000+ WordPress sites exposed by donation plugin vulnerability</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A serious flaw in the popular GiveWP Donation Plugin has put over 10,000 WordPress sites at risk of remote code execution since March 3, 2025.</p>



<p>Known as CVE-2025-0912, this bug lets attackers take over sites without logging in by exploiting a deserialization issue in versions 3.19.4 and earlier.</p>



<h2 class="wp-block-heading"><strong>All about the plugin vulnerability</strong></h2>



<p>The flaw comes from improper handling of the <strong>card_address</strong> field in donation forms.</p>



<p>Hackers can inject harmful PHP objects, using a technique called POP (Property-Oriented Programming) to run their own code and take full control of affected sites.</p>



<p>With a critical CVSS score of 9.8, this bug allows attackers to steal donor data, install backdoors, or hijack payments without needing to log in.</p>



<p>Researcher <strong>dream hard</strong> found the issue while reviewing the plugin’s code, warning that it’s easy to exploit and could lead to defaced sites, stolen funds, or full admin access within minutes.</p>



<p>GiveWP, used by nonprofits, religious groups, and political campaigns, handles millions in donations each year. A compromised site could face:</p>



<ul class="wp-block-list">
<li>Payment fraud through altered gateways</li>



<li>Donor data leaks (names, emails, billing info)</li>



<li>SEO poisoning with malicious redirects</li>



<li>Full site takeover for phishing attacks</li>
</ul>



<p>Wordfence detected active scans for vulnerable sites starting March 4, with at least three different attack methods seen. The plugin’s wide use by critical organizations makes timely patching essential.</p>



<h2 class="wp-block-heading"><strong>Mitigation and Response</strong></h2>



<p>GiveWP released version 3.20.0 on March 4, fixing the flaw. Site admins should:</p>



<ul class="wp-block-list">
<li>Update to version 3.20.0</li>



<li>Check logs for suspicious POST requests to <code>/wp-json/give/v1/donations</code></li>



<li>Revoke and regenerate payment API keys</li>
</ul>



<p>Wordfence warns older versions should assume compromise and recommends full malware scans and donor account monitoring.</p>



<p>Critics noted the patch came 48 hours after public disclosure, raising concerns about plugin security.</p>



<p>As of March 5, over 7,000 sites are still unpatched, while proof-of-concept exploits are already circulating. Immediate action is crucial to avoid major damage.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/plugin-vulnerability/">10,000+ WordPress sites exposed by donation plugin vulnerability</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/plugin-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical IBM Cloud Pak Vulnerabilities Expose Systems to Remote Code Execution</title>
		<link>https://firsthackersnews.com/cloud-pak/</link>
					<comments>https://firsthackersnews.com/cloud-pak/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 06 Feb 2025 00:01:58 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[IBM Cloud Pak Vulnerabilities]]></category>
		<category><![CDATA[remote code execution]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9576</guid>

					<description><![CDATA[<p>IBM released critical updates for Cloud Pak for Business Automation, fixing vulnerabilities that could expose sensitive data, disrupt</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cloud-pak/">Critical IBM Cloud Pak Vulnerabilities Expose Systems to Remote Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>IBM released critical updates for Cloud Pak for Business Automation, fixing vulnerabilities that could expose sensitive data, disrupt operations, or compromise systems. The updates apply to versions 21.0.3 and 24.0.0, affecting both old and current components.</p>



<p>These issues arise from flaws in libraries like OpenSSL, Node.js, and Java SDKs, as well as misconfigurations in underlying frameworks. </p>



<p>The main security risks include Remote Code Execution (RCE), which lets attackers run malicious code, and unauthorized access to sensitive business data. Denial of Service (DoS) attacks could also disrupt system availability. </p>



<p>IBM Cloud Pak for Business Automation is used across industries like finance, healthcare, and manufacturing to automate workflows and manage sensitive processes. Exploiting these vulnerabilities could lead to data loss, financial damage, and reputational harm.</p>



<h2 class="wp-block-heading"><strong>Affected Versions</strong></h2>



<p>The following versions are impacted:</p>



<ul class="wp-block-list">
<li>Version 24.0.0 – IF003: Apply iFix 24.0.0-IF004 or upgrade to version 24.0.1.</li>



<li>Versions 23.x.x: Upgrade to 24.0.0-IF004 or later for all fixes.</li>



<li>Version 21.0.3 – IF038: Apply iFix 21.0.3-IF039 or upgrade to version 24.0.x.</li>



<li>Older Versions (18.x.x – 20.x.x): Upgrade to at least version 21.0.3-IF039 or higher.</li>
</ul>



<p>IBM’s timely security patches highlight the importance of proactive vulnerability management. Users should apply the recommended fixes or upgrade their software to maintain security and operational stability.</p>



<p>For more details on remediation and technical documentation, visit IBM’s official support page. This bulletin emphasizes the need for organizations to stay updated with security patches and maintain strong cybersecurity practices.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cloud-pak/">Critical IBM Cloud Pak Vulnerabilities Expose Systems to Remote Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cloud-pak/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical OpenSSH Vulnerability (CVE-2024-6387) Exploit Released</title>
		<link>https://firsthackersnews.com/cve-2024-6387/</link>
					<comments>https://firsthackersnews.com/cve-2024-6387/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 06 Jan 2025 18:12:36 +0000</pubDate>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[arbitrary code]]></category>
		<category><![CDATA[CVE-2024-6387]]></category>
		<category><![CDATA[OpenSSH Vulnerability]]></category>
		<category><![CDATA[PoC exploit]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9364</guid>

					<description><![CDATA[<p>A PoC exploit for the critical OpenSSH vulnerability CVE-2024-6387 has been released, enabling remote attackers to execute arbitrary</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2024-6387/">Critical OpenSSH Vulnerability (CVE-2024-6387) Exploit Released</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A PoC exploit for the critical OpenSSH vulnerability CVE-2024-6387 has been released, enabling remote attackers to execute arbitrary code on vulnerable servers, posing serious risks to users.</p>



<h2 class="wp-block-heading"><strong>CVE-2024-6387</strong></h2>



<p>The vulnerability is a race condition in OpenSSH&#8217;s server daemon (sshd). If a client fails to authenticate within the LoginGraceTime, the system&#8217;s signal handler can trigger unsafe function calls.</p>



<p>The PoC exploit, created by GitHub user YassDEV221608, targets 32-bit OpenSSH servers on Linux systems using GNU C Library (glibc). OpenBSD systems are not affected by this flaw.</p>



<p>According to Exploit Finder, the exploit exploits a race condition in sshd’s SIGALRM handler, triggered after failed authentication attempts. This flaw can allow attackers to execute code and gain root access.</p>



<p>Although the exploit requires multiple attempts to succeed, cybersecurity expert Schwartz highlights its severe potential impact. OpenSSH developers have confirmed that only certain versions are affected and recommend applying patches promptly.</p>



<p>For those investigating the exploit, a vulnerable OpenSSH environment can be set up using Docker. A sample Dockerfile is provided for this purpose.</p>



<h2 class="wp-block-heading"><strong>PoC Script Targeting CVE-2024-6387</strong></h2>



<p>CVE-2024-6387.py: A PoC Script for Scanning and Exploiting Vulnerable Servers</p>



<p>import argparse</p>



<p>import threading</p>



<p>import socket</p>



<p>import time</p>



<p>def exploit_vulnerability(target_ip, target_port):</p>



<pre class="wp-block-code"><code># Logic to exploit CVE-2024-6387

# (This is a simplified demonstration)

print(f"Exploiting target: {target_ip}:{target_port}")

# Add actual exploitation code here...
def main():

    parser = argparse.ArgumentParser(description='CVE-2024-6387 PoC Exploit Script')

    parser.add_argument('-T', '--targets', required=True, help='Target IP addresses or domain names')

    parser.add_argument('-p', '--port', default=22, help='Port number to exploit (default: 22)')

    args = parser.parse_args()

    targets = args.targets.split(',')

    threads = &#91;]

    for target in targets:

        thread = threading.Thread(target=exploit_vulnerability, args=(target, args.port))

        threads.append(thread)

        thread.start()

    for thread in threads:

        thread.join()

if __name__ == "__main__":

    main()


Admins should update OpenSSH to the latest patched versions to address CVE-2024-6387. Limiting login attempts and improving logging can further reduce risks. Organizations are urged to check for vulnerabilities and apply updates promptly to stay secure. 
</code></pre>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2024-6387/">Critical OpenSSH Vulnerability (CVE-2024-6387) Exploit Released</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cve-2024-6387/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SonicWall Flaws Enable Remote Code Execution</title>
		<link>https://firsthackersnews.com/sonicwall/</link>
					<comments>https://firsthackersnews.com/sonicwall/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 06 Dec 2024 17:53:55 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[remote code execution]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[SonicWall Flaws]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9192</guid>

					<description><![CDATA[<p>SonicWall warns of critical flaws in SMA 100 series appliances, enabling remote code execution, authentication bypass, and system</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sonicwall/">SonicWall Flaws Enable Remote Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>SonicWall warns of critical flaws in SMA 100 series appliances, enabling remote code execution, authentication bypass, and system compromise.</p>



<p>SonicWall advises users to update their SMA 200, 210, 400, 410, and 500v appliances running firmware 10.2.1.13-72sv or earlier. SMA1000 series devices are not affected.</p>



<h2 class="wp-block-heading"><strong>Vulnerability List </strong>:</h2>



<ol class="wp-block-list">
<li><strong>CVE-2024-38475: Path Traversal</strong><br>This vulnerability leverages Apache HTTP Server’s <code>mod_rewrite</code> module to map URLs to restricted filesystem locations. Attackers can use this flaw to access sensitive files, potentially compromising system security and data integrity.</li>



<li><strong>CVE-2024-40763: Heap-Based Buffer Overflow</strong><br>A flaw in SMA100 devices’ memory management leads to a heap-based buffer overflow. By exploiting this, attackers can execute malicious code remotely or cause a system crash, disrupting services.</li>



<li><strong>CVE-2024-45318: Stack-Based Buffer Overflow</strong><br>Found in the SMA100 web management interface, this vulnerability allows attackers to trigger a stack-based buffer overflow. If exploited, it can result in arbitrary code execution, granting full control over the device.</li>



<li><strong>CVE-2024-45319: Certificate Authentication Bypass</strong><br>This flaw permits attackers to bypass the certificate requirement during authentication, providing unauthorized access to sensitive systems and potentially exposing critical resources.</li>



<li><strong>CVE-2024-53702: Insecure Randomness</strong><br>The SMA100 devices’ backup mechanism uses a weak pseudo-random number generator (PRNG). Attackers can predict its output, potentially leading to the exposure of sensitive information like encryption keys or backup data.</li>



<li><strong>CVE-2024-53703: Stack-Based Buffer Overflow in Apache</strong><br>This vulnerability exists in the <code>mod_httprp</code> library used by SMA100 devices running Apache. Exploiting this stack overflow allows attackers to execute arbitrary code remotely, posing a significant threat to the system.</li>
</ol>



<h2 class="wp-block-heading"><strong>Affected Products :</strong></h2>



<ul class="wp-block-list">
<li><strong>Impacted Models</strong>: SonicWall SMA 100 series (SMA 200, 210, 400, 410, 500v).</li>



<li><strong>Vulnerable Firmware</strong>: Version 10.2.1.13-72sv and earlier.</li>
</ul>



<p><strong>Details</strong>:</p>



<figure class="wp-block-table"><table><thead><tr><th><strong>Product Series</strong></th><th><strong>Models</strong></th><th><strong>Affected Versions</strong></th></tr></thead><tbody><tr><td>SMA 100</td><td>SMA 200, SMA 210</td><td>10.2.1.13-72sv and earlier</td></tr><tr><td>SMA 100</td><td>SMA 400, SMA 410</td><td>10.2.1.13-72sv and earlier</td></tr><tr><td>SMA 100</td><td>SMA 500v</td><td>10.2.1.13-72sv and earlier</td></tr><tr><td>SMA 1000</td><td>All models</td><td><strong>Not affected</strong></td></tr></tbody></table></figure>



<ul class="wp-block-list">
<li><strong>Action Required</strong>: SonicWall recommends updating to the latest firmware immediately.</li>



<li><strong>Exploitation Status</strong>: No active exploitation reported yet, but due to the severity, prompt action is critical.</li>
</ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sonicwall/">SonicWall Flaws Enable Remote Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/sonicwall/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Trend Micro Deep Security Flaw Allows Remote Code Execution</title>
		<link>https://firsthackersnews.com/cve-2024-51503/</link>
					<comments>https://firsthackersnews.com/cve-2024-51503/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 20 Nov 2024 18:02:09 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[CVE-2024-51503]]></category>
		<category><![CDATA[remote code execution]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[trend micro]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9089</guid>

					<description><![CDATA[<p>Trend Micro has revealed a critical vulnerability in Deep Security 20 Agent that could allow remote code execution</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2024-51503/">Trend Micro Deep Security Flaw Allows Remote Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Trend Micro has revealed a critical vulnerability in Deep Security 20 Agent that could allow remote code execution on affected systems.</p>



<h2 class="wp-block-heading"><strong>All about the Vulnerability &#8211;  CVE-2024-51503</strong></h2>



<p>The vulnerability, identified as CVE-2024-51503, was discovered on November 18, 2024, and has a high severity rating with a CVSS 3.0 score of 8.0.</p>



<p>The security flaw, known as ZDI-CAN-25215, is a command injection vulnerability affecting Windows-based Deep Security Agent versions before 20.0.1-21510 and Deep Security Notifier on DSVA version 20.0.0-8438.</p>



<p>This issue could allow an attacker to escalate privileges and execute arbitrary code on affected machines. The vulnerability is caused by an OS Command Injection weakness (CWE-78).</p>



<p>The vulnerability allows attackers with domain access to inject commands remotely to other machines within the same domain. However, exploiting it requires the attacker to first run low-privileged code on the target system.</p>



<p>Trend Micro has released a fix for this issue. Version 20.0.1-21510 (20 LTS Update 2024-10-16) is now available for Windows platforms.</p>



<p>Users of the Deep Security Notifier on DSVA should update to the DSA 20.0.1 full package or later to fix the Notifier function.</p>



<p>Cybersecurity experts stress the importance of applying patches promptly. While exploiting this vulnerability requires access to the machine, Trend Micro urges customers to update to the latest versions.</p>



<p>Organizations should also review remote access policies for critical systems and ensure perimeter security is up-to-date.</p>



<p>The vulnerability was discovered by Simon Zuckerbraun of Trend Micro’s Zero Day Initiative, highlighting the ongoing efforts to address cybersecurity risks. Experts recommend regular software updates and strong security practices to protect digital assets.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2024-51503/">Trend Micro Deep Security Flaw Allows Remote Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cve-2024-51503/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Linux CUPS has multiple vulnerabilities that allow remote code execution</title>
		<link>https://firsthackersnews.com/linux-cups/</link>
					<comments>https://firsthackersnews.com/linux-cups/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 30 Sep 2024 21:19:33 +0000</pubDate>
				<category><![CDATA[Linux Malware]]></category>
		<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[RCE Flaw]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Linux CUPS]]></category>
		<category><![CDATA[remote code execution]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8816</guid>

					<description><![CDATA[<p>Developers of the Linux printing system CUPS recently disclosed several vulnerabilities that could allow attackers to execute arbitrary</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/linux-cups/">Linux CUPS has multiple vulnerabilities that allow remote code execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Developers of the Linux printing system CUPS recently disclosed several vulnerabilities that could allow attackers to execute arbitrary code. Although these flaws require specific conditions to be exploited, their high volume raises concerns about potential real-world exploitation prior to the announcement. </p>



<p>On September 26, 2024, rumors about these flaws circulated on Twitter, and an official announcement confirmed on September 27 revealed four high-severity RCE vulnerabilities in CUPS.</p>



<h2 class="wp-block-heading"><strong>All about the Linux CUPS vulnerabilities</strong></h2>



<p>CVE-2024-47117 (CVSS 9.1) is a command injection vulnerability that can allow attackers to execute arbitrary code by improperly handling PPD files. This happens when the software executes the FoomaticRIPCommandLine parameter, which can be manipulated to run malicious code.</p>



<p>This exploitation is possible due to CVE-2024-47176 (CVSS 8.4), which lacks identity verification for Internet Printing Protocol (IPP) senders. CUPS mistakenly trusts all packages from any source, enabling hackers to send a printer info request to a remote server. This could lead to the creation of a fake printer instance under their control, allowing them to gain persistence in the network printing environment and execute arbitrary code.</p>



<p>The IPP verification vulnerability is accompanied by two other flaws, CVE-2024-47175 and CVE-2024-47076 (CVSS 8.6). These allow malicious PPD files to inject harmful code into other parts of the CUPS system, expanding their network presence. The problem arises from improper input sanitization, as the libppd function executes any code in the PPD file input &#8220;as is.&#8221; Analysts state these vulnerabilities are effective only when combined with one or both of the earlier flaws.</p>



<h2 class="wp-block-heading"><strong>Fixes for Linux CUPS</strong></h2>



<p>Along with the disclosure, OpenPrinting released potential mitigation measures for the vulnerabilities. There is no official patch; instead, they suggest stopping a specific CUPS service that contains the bug. This can be done with the following Linux commands:</p>



<p><strong>sudo systemctl stop cups-browsed<br>sudo systemctl disable cups-browsed</strong></p>



<p>Disabling this vulnerable service is a fortunate aspect of the situation, as it can effectively block the threat. However, it’s not foolproof; if attackers have already gained access to the environment, they could easily restart the vulnerable service and exploit it for lateral movement.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/linux-cups/">Linux CUPS has multiple vulnerabilities that allow remote code execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/linux-cups/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical IBM QRadar Flaws Enable Remote Arbitrary Code Execution</title>
		<link>https://firsthackersnews.com/ibm-qradar-flaws/</link>
					<comments>https://firsthackersnews.com/ibm-qradar-flaws/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 16 Aug 2024 00:53:05 +0000</pubDate>
				<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[arbitrary code execution]]></category>
		<category><![CDATA[IBM QRadar Flaws]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8469</guid>

					<description><![CDATA[<p>IBM recently revealed critical vulnerabilities in QRadar Suite Software and IBM Cloud Pak for Security. Exploitation of these</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ibm-qradar-flaws/">Critical IBM QRadar Flaws Enable Remote Arbitrary Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>IBM recently revealed critical vulnerabilities in QRadar Suite Software and IBM Cloud Pak for Security. Exploitation of these flaws could let attackers execute arbitrary code remotely, posing serious security risks. IBM has released a fix and urges users to update their systems right away.</p>



<h2 class="wp-block-heading"><strong>All about the Vulnerability</strong></h2>



<p><strong>CVE-2024-28176</strong>: The Node.js <code>jose</code> module has a flaw in JWE decryption that can lead to a denial-of-service attack. Attackers can exploit this vulnerability by sending a specially crafted request, causing excessive CPU or memory usage. CVSS Base Score: 5.3.</p>



<p><strong>CVE-2024-34064</strong>: Jinja&#8217;s <code>xmlattr</code> filter is vulnerable to cross-site scripting due to accepting keys with non-attribute characters. This flaw can allow remote attackers to inject attributes into web pages, potentially stealing cookie-based authentication credentials. CVSS Base Score: 5.4.</p>



<p><strong>CVE-2024-3651</strong>: The <code>idea</code> module can cause a denial of service when a local user provides a specially crafted argument to the <code>idea.encode()</code> function. CVSS Base Score: 6.2.</p>



<p><strong>CVE-2024-25024</strong>: IBM QRadar Suite stores user credentials in plain text, which can be accessed by a local user. CVSS Base Score: 6.2.</p>



<p><strong>CVE-2024-37168</strong>: The gRPC module for Node.js has a memory allocation flaw that can lead to a denial of service attack if exploited by sending specially crafted messages. CVSS Base Score: 5.3.</p>



<p><strong>CVE-2024-30260</strong>: The Node.js <code>undici</code> module mishandles Authorization headers, allowing remote authenticated attackers to access sensitive information. CVSS Base Score: 3.9.</p>



<p><strong>CVE-2024-30261</strong>: The Node.js <code>undici</code> module has a security restriction bypass, allowing tampered requests with <code>fetch()</code>. CVSS Base Score: 2.6.</p>



<p><strong>CVE-2024-28799</strong>: IBM QRadar Suite Software improperly displays sensitive data during back-end commands, risking information disclosure. CVSS Base Score: 5.1.</p>



<p><strong>CVE-2024-39008</strong>: The <code>fast-loops</code> module by robinweser allows remote code execution due to a prototype pollution vulnerability. CVSS Base Score: 9.8.</p>



<p><strong>CVE-2024-29415</strong>: The Node.js <code>ip</code> module is vulnerable to server-side request forgery (SSRF), enabling attackers to conduct SSRF attacks. CVSS Base Score: 7.5.</p>



<h3 class="wp-block-heading"><strong>Affected Products and Versions</strong></h3>



<p>The following products and versions are affected:</p>



<ul class="wp-block-list">
<li><strong>IBM Cloud Pak for Security</strong>: 1.10.0.0 to 1.10.11.0</li>



<li><strong>QRadar Suite Software</strong>: 1.10.12.0 to 1.10.23.0</li>
</ul>



<p>Upgrade to version 1.10.24.0 or later to resolve these vulnerabilities.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ibm-qradar-flaws/">Critical IBM QRadar Flaws Enable Remote Arbitrary Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/ibm-qradar-flaws/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
