A new maximum-severity zero-day vulnerability in Cisco AsyncOS was published in emergency fashion on Wednesday, December 17th. Cisco has indicated that the flaw, tracked as CVE-2025-20393, has been actively exploited in the wild by Chinese-nexus APT actors since late November 2025, and that it has been aware of the activity for at least a week prior to disclosure. Exploitation is limited to AsyncOS configurations with Spam Quarantine enabled and exposed to remote access. No patch is yet available from the vendor.

The OPENVAS ENTERPRISE FEED now includes remote version detection checks for CVE-2025-20393. A free trial of Greenbone’s OPENVAS BASIC is available for defenders to scan their IT systems infrastructure for emerging threats, including CVE-2025-20393.

CVE-2025-20393-cisco-spam-filter

CVE-2025-20393 (CVSS 10) is a critical vulnerability in Cisco Secure Email Gateway (SEG) and Cisco Secure Email and Web Manager (SEWM) appliances if they are running Cisco AsyncOS and the Spam Quarantine feature [1][2] is both enabled and internet-accessible. Cisco’s official advisory and Talos blog post describe known exploit campaigns, but only contain sparse technical details about the vulnerability itself. CVE-2025-20393 has been classified as an improper input validation [CWE-20] flaw and reportedly allows attackers unauthenticated root-level remote code execution (RCE).

On December 17th, Cisco announced it had been aware of exploitation since December 10th, and that the attacks likely started in late November. Notably, when the EU’s Cyber Resilience Act (CRA) reporting obligations come into force in September 2026, known vulnerabilities and exploits must be reported to ENISA within 24 hours. Talos indicates the attacks are part of a cyberespionage campaign conducted by Chinese-nexus APT UAT-9686. However, no references to UAT-9686 exist on the internet prior to the exploitation of CVE-2025-20393.

CISA immediately added CVE-2025-20393 to its Known Exploited Vulnerabilities (KEV) list. Germany’s BSI and Canada’s Centre for Cyber Security have issued emergency alerts [3][4]. No ransomware activity has been reported and PoC exploit code is not yet publicly available for CVE-2025-20393.

The Spam Quarantine feature acts as a mechanism for retaining spam messages rather than automatically deleting them. This allows administrators and end users to review suspected spam for false positives. Although the Spam Quarantine feature is not enabled by default on Cisco devices, the setup guides for SEG and SEWM include clear instructions for enabling it and configuring remote access [1][2]. Remote access to the Spam Quarantine feature allows administrators and end users to review and manage quarantined messages via a web interface, which is typically enabled on port 82 for HTTP and port 83 for HTTPS access.

Cisco Products Affected by CVE-2025-20393

According to the vendor advisory, all versions of Cisco AsyncOS are affected by CVE-2025-20393:

  • Cisco Secure Email Gateway (SEG): Both physical appliances and virtual appliances are affected. The SEG was previously named the Cisco Email Security Appliance (ESA) [1].
  • Cisco Secure Email and Web Manager (SEWM): Both physical appliances and virtual appliances are affected. The SEWM device was previously named the Content Security Management Appliance (SMA) [2].

CVE-2025-20393 is only exploitable when enabling the IP interface for remote browser access to the Spam Quarantine feature.

Mitigating Attacks Against CVE-2025-20393

No patch is currently available for CVE-2025-20393. Users who have enabled Spam Quarantine must either disable the service or implement workaround mitigation until a patch is released. These compensating measures may include:

  • Ensuring the Spam Quarantine web interface is not exposed to the public internet.
  • Restricting access with strict firewall and ACL rules to only authorised IP addresses.
  • If compromise is suspected, Cisco indicates that a full rebuild of the appliance is the only effective way to remove the attacker’s persistent foothold. Rebuilding the affected appliance from a known good image is required, since malware may be persistent against configuration changes. If complete restoration of the appliance is not possible, Cisco recommends contacting TAC.

After breaching a device, attackers have deployed persistent backdoors [TA0003], established covert remote access [TA0011], and employed detection evasion techniques [TA0005]. Cisco’s reports claim CVE-2025-20393 is being used to deploy the AquaShell persistence malware, AquaTunnel and Chisel reverse tunnelling tools, and the AquaPurge log-clearing utility. However, these Aqua-branded malware families have not been publicly documented by security researchers prior to this campaign. Cisco has released Indicators of Compromise (IoC) related to the observed attacks.

Summary

On Wednesday, December 17th, Cisco made an emergency disclosure of CVE-2025-20393, a maximum-severity, actively exploited zero-day affecting Cisco Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances having Spam Quarantine both enabled and exposed. The flaw enables unauthenticated root-level RCE. Cisco Talos has attributed the observed exploitation to Chinese-nexus espionage activity.

With no patch available, immediate compensating mitigation is critical. Greenbone’s OPENVAS ENTERPRISE FEED has provided detection for CVE-2025-20393 within 24 hours of its public disclosure. A free trial of Greenbone’s OPENVAS BASIC is available for defenders to scan their IT infrastructure for emerging threats, including CVE-2025-20393. Once affected devices have been identified, mitigation primarily depends on either disabling the Spam Quarantine feature entirely or restricting access to its web interface until a patch becomes available.

Users appreciate when software can easily integrate into their existing IT environment. For vendors, this means supporting a cross-platform mix of operating systems and infrastructure. We’re excited to expand our virtualization platform support, bringing Proxmox VE into our family of supported hypervisors. This addition enables more flexibility for deploying OPENVAS SCAN in diverse IT environments. A free trial of Greenbone’s OPENVAS BASIC is available for Proxmox VE users and others to scan their IT infrastructure for vulnerabilities and stay ahead of cyber attacks.

Threat Report Mai 2025

For maximum security and reliable performance, Greenbone’s enterprise edition of OPENVAS SCAN must run inside the Greenbone Operating System (GOS). However, this is hardly a limitation since there are many ways to deploy Greenbone products. Firstly, Greenbone is the only provider worldwide to offer ready-to-use, dedicated hardware appliances. As for the virtual appliance editions of our products, the wide range of supported hypervisors ensures you can run our solution within all major OS platforms. OPENVAS SECURITY INTELLIGENCE is truly cross-platform. For a full breakdown of our product offerings, check out our solution comparison.

Now, we are expanding our hypervisor support to include Proxmox VE. In the rest of this article, we will discuss getting started with the OPENVAS SCAN virtual appliance in the Proxmox VE Type-1 hypervisor.

The OPENVAS SCAN Virtual Appliance Now Supports Proxmox VE Type-1 Hypervisor

Greenbone is excited to add support for Proxmox VE virtualization. Proxmox VE is a Debian-Linux based Type-1 hypervisor. As a Type-1 hypervisor, Proxmox VE runs directly on the host’s hardware. This puts virtualized appliances closer to the underlying hardware and delivers improved performance, lower latency, and more efficient use of resources. The overall impact is a faster and more reliable virtualization environment. By contrast, Type-2 hypervisors run on top of the host operating system, adding an extra layer between the hardware and the VMs.

Proxmox VE itself saw its first public release in April 2008, bringing together the Linux kernel’s KVM hypervisor and QEMU for hardware emulation via a Debian-based management platform. QEMU has been an open-source machine emulator since 2003 and is now maintained by the QEMU Project community. Linux KVM appeared in the mainline kernel in February 2007, and continues to support the Linux virtualization ecosystem.

Whether you are an existing Greenbone enterprise customer looking for new virtualization options, or already a Proxmox VE user waiting for support, we now have you covered.

How to Set up OPENVAS SCAN on Proxmox VE?

Customers can request a Proxmox VE-ready instance of the OPENVAS SCAN virtual appliance from a member of the Greenbone sales team. This specialized image, delivered as a .zst backup file, is optimized for Proxmox. Once you receive the .zst file, complete the following steps to install and configure the OPENVAS SCAN virtual appliance:

  1. Use the SSH secure copy command (scp) to move the .zst file to the appropriate folder on your Proxmox VE system. This is usually the /var/lib/vz/dump folder. So, a typical command would be:

$ scp /path/to/vzdump-qemu-greenbone-enterprise-basic-24.10.6-proxmox.vma.zst root@192.168.1.123:/var/lib/vz/dump

  1. The backup image will now appear in the Proxmox VE web interface on the left-side under Storage -> local (pve) -> Backups.
  2. Highlight the uploaded file and click the Restore button. The OPENVAS SCAN virtual appliance is pre-configured with the optimal virtual hardware settings and required minimum resources. If more performance is desired, you can increase the resources, such as CPU and RAM before or after importing the appliance.
  3. Once imported, the VM will appear in the Virtual Machine tab on the left of the Proxmox VE web interface. You can highlight the VM and click Start at the far right.
  4. Finally, you can open a NoVNC console to the running VM from the >_ Console button at the far right and complete the OPENVAS SCAN setup process.

Which Hypervisors Does the OPENVAS SCAN Virtual Appliance Support?

To help users choose the best deployment method for their environment, the information below provides an overview of OPENVAS SCAN’s required resources and hypervisor support.

The OPENVAS SCAN virtual appliance requires the following resources:

  • 2 virtual CPUs
  • 12 GB RAM
  • 500 GB virtual hard disk (can be dynamically allocated)

The following hypervisors are officially supported:

Hypervisor Type
Proxmox VE Type-1 hypervisor
VMware vSphere (ESXi) Type-1 hypervisor
Huawei FusionCompute v8.0 Type-1 hypervisor
Microsoft Hyper-V v5.0 or higher Type-1 hypervisor
Oracle VirtualBox v6.1 or higher Type-2 hypervisor
VMware Workstation Pro v16.0 or higher Type-2 hypervisor

Summary

Greenbone has added support for deploying our OPENVAS SCAN virtual appliance on the Proxmox VE Type-1 hypervisor, giving customers a faster, more flexible, and hardware-efficient way to run enterprise vulnerability scanning. This new capability extends the virtualization options, ensuring users can confidently integrate OPENVAS SCAN into diverse IT environments. A free trial of Greenbone’s OPENVAS BASIC is available for Proxmox VE users and others to scan their IT infrastructure for emerging threats and stay ahead of cyber attacks.

!

Update

Three additional React Server Components (RSC) flaws have been identified, which require further patching:

  • CVE-2025-55184 CVSS 7.5 and CVE-2025-67779 CVSS 7.5: Both flaws allow pre-authenticated Denial of Service (DoS). CVE-2025-67779 is considered a bypass of the original React2Shell patch. However, exploitation does not allow remote code execution (RCE).
  • CVE-2025-55183 CVSS 5.3: Exploitation can allow limited source code exposure.

Vendors have released new fixes and users are advised to upgrade to React 19.0.3, 19.1.4, or 19.2.3 to fully mitigate the flaws. Vercel has released guidance for patching these flaws in Next.js.

Greenbone’s ENTERPRISE FEED includes detection for all additional CVEs referenced above [1] [2] [3].

On December 3rd 2025, a new maximum CVSS software flaw affecting React (aka ReactJS), exploded onto the cybersecurity landscape. Dubbed React2Shell, CVE-2025-55182 is already actively exploited. Users are urged to verify their exposure and patch immediately if affected. React is the most popular JavaScript library for building modern web-application user interfaces (UIs) implying that the global impact could be widespread. A free trial of Greenbone’s OPENVAS BASIC is available for defenders to scan their enterprise IT infrastructure for emerging threats, such as React2Shell.

Critical: React2Shell

CVE-2025-55182 (CVSS 10.0) allows unauthenticated server-side remote code execution (RCE) in default configurations of React 19. The flaw exists in the React Server Components (RSC) “Flight” protocol. RSC is a framework and set of libraries that enable React 19 apps to pass application logic back to the server for processing rather than execution in the client browser. The Flight protocol is React’s serialization format for transporting RSC payloads.

React2Shell allows Flight payloads to be unsafely deserialized on the server [CWE-502], enabling unauthenticated shell command execution. Exploitation potentially offers attackers full compromise of the target, including remote control.
                       

The threat landscape is active and escalating. AWS was the first cloud vendor to attribute active exploitation. Since then, multiple IaaS vendors have reported active attacks. Reports have uncovered campaigns seeking to install remote access tools [T1219], proxy traffic relays [T1090], and botnet agents [T1583.004], and to leverage infected hosts for cryptocurrency mining [T1496]. GreyNoise has tracked hundreds of unique IP addresses attempting exploitation and The Shadowserver Foundation reports ~160,000 vulnerable instances globally.

The flaw has been added to CISA’s Known Exploited Vulnerabilities (KEV) list, and numerous other national CERT alerts have been issued globally for CVE-2025-55182 [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17]. Several public PoC exploits are available [18][19][20], including one from Lachlan Davidson [21], the security researcher who identified and disclosed the React2Shell flaw. These public PoCs increase the risk of evolving attacks.

How Does React2Shell (CVE-2025-55182) Work?

JavaScript prototype pollution [CWE-1321] was found to be possible in React 19 because the deserialization logic did not sufficiently validate serialized object parameters. When RSC reconstructs JavaScript objects from Flight payloads, attacker-controlled special keys can misconfigure the prototype chain. This can cause runtime changes beyond the immediately reconstructed object. In the case of CVE-2025-55182, this includes calling native Node.js functions such as child_process.execSync to execute shell commands on the target server.

What Products Are Affected by React2Shell (CVE-2025-55182)?

According to official advisories from React [1][2], React2Shell impacts the react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack components of React versions 19.0, 19.1.0, 19.1.1, and 19.2.0. These components are enabled in the default configuration. React2Shell also impacts major frameworks that include React 19’s RSC, such as the very popular Next.js web framework.

React 19.0.0, released on December 5th 2024, was the first release to include non-experimental RSC functionality. This means that CVE-2025-55182 largely affects newer websites and organizations that diligently upgrade their web server infrastructure. Because RSC are enabled by default, all endpoints are potentially vulnerable, even if the Server Functions are not implemented.

According to the official react.dev blog post, other affected frameworks include:

Mitigating React2Shell (CVE-2025-55182)

Website back-end developers should assess their infrastructure to determine whether React 19 is part of their web stack. To detect vulnerable instances, the OPENVAS ENTERPRISE FEED includes a remote version check for Vercel Next.js and an active check that sends an HTTP request to verify whether targets are vulnerable.

The strongest mitigation is to upgrade to a patched version of React in your release line. These are React 19.0.1, 19.1.2, or 19.2.1. Exploitation can also be mitigated via web-application firewall (WAF), and many cloud IaaS providers have published WAF rules for mitigation [1][2][3][4][5].

The patched versions of React and Next.js for each release line are:

Users of Next.js 14.3.0-canary.77 or a later canary release should downgrade to the latest stable 14.x release. According to the official advisory from Next.js, Next.js 13.x, Next.js 14.x stable, Pages Router applications, and the Edge Runtime are not affected. Instructions for updating other affected third-party frameworks are available in React’s official advisory.

Summary

React2Shell (CVE-2025-55182) is a CVSS 10.0, unauthenticated RCE in the React 19 Server Components Flight protocol. The root cause is unsafe server-side deserialization in the Flight protocol. React2Shell also impacts major frameworks that include React 19’s RSC, such as the very popular Next.js web framework.

The vulnerability is considered actively exploited, with publicly available PoCs and a broad number of national CERT advisories globally. Defenders should conduct an exposure assessment and if possible implement WAF rules to temporarily mitigate exploitation, while planning urgent upgrades to patched versions of React 19, and other affected frameworks in use. A free trial of Greenbone’s OPENVAS BASIC is available for defenders to scan their enterprise IT infrastructure for emerging threats such as React2Shell.

Q-Day marks the moment when quantum computers will render classical cryptography standards obsolete. The risks posed by quantum computers demand a migration to Post Quantum Cryptography (PQC). Greenbone is proactively preparing for this future—upgrading our internal infrastructure, auditing partners, and enhancing the OPENVAS SECURITY INTELLIGENCE platform with upgraded detection and new auditing features. The goal is to ensure that our digital operations and our customers’ can achieve Post Quantum Security (PQS). Greenbone is becoming quantum-ready—inside and out. We are taking vulnerability detection and management to a new level—the quantum level.

Quantum computing promises unprecedented and almost unfathomable computing power [1]. The quantum singularity (known as “Q-Day”) represents the transition from a theoretical quantum threat to real, operational risk—when a quantum enabled adversary can cause irreparable harm to an organization [2][3]. For high-security applications, Germany’s BSI works under the hypothesis that Q-Day will become relevant in the early 2030s [4]. Efforts to develop and standardize PQC have been underway for more than a decade. While quantum R&D has been a global effort, NIST is leading the charge to finalize global standards by 2027 [5][6].

The primary goal for cyber defenders is to achieve PQS by migrating high-security systems to the new globally qualified PQC standards. In some cases, this requires phasing out support for pre-quantum algorithms. In other cases, it simply means increasing the key-length for established classical algorithms. By upgrading to PQS standards, organizations will be ready in advance of Q-Day’s arrival.

As both a consumer of digital products and a vendor of the OPENVAS SECURITY INTELLIGENCE platform, Greenbone is preparing for Q-Day and the post quantum age. Our responsibilities are two-fold: firstly, our internal operations and digital products must be resilient against attack. Secondly, we must outfit our security products with new capabilities; adding new detection, auditing, and reporting capabilities to support our customers’ push for PQS compliance. Read on to learn about the PQS future and how Greenbone is preparing for the post quantum age!

Greenbone Is Getting Quantum Ready – Inside and Out

As a vendor of digital products, Greenbone must implement the established PQC standards to protect both our own IT operations and help our customers defend their own. Internally, Greenbone’s journey toward PQS is governed by several factors. Among these are our commitments to the highest standards for IT security; our ISO/IEC 27001 and ISO 9001:2025 achievements [1]. Our exceptional detection coverage also motivates our efforts to maintain our leadership role.

Technical guidelines published by accredited government bodies, such as the TR-02102 series from Germany’s BSI, define the scope of the PQS landscape; other national governments have published their own forecasts and guidelines [2][3][4][5][6]. Our team at Greenbone analyzes such forecasts to architect PQS compliance across our digital infrastructure and plan upgrades to our OPENVAS SECURITY INTELLIGENCE line of products and the OPENVAS ENTERPRISE FEED. Our efforts also extend to auditing third-party ICT providers to ensure full compliance across our digital operations. As the quantum threat advances, we remain committed to keeping pace with evolving PQS standards.

Upgrading OPENVAS SCAN’s Detection and Compliance Profiles

As an industry-leading vulnerability scanning and management platform, Greenbone needs to detect non-compliance with established PQS standards. To meet these expectations, we are adding new detection tests to our OPENVAS ENTERPRISE FEED. This includes new NASL scripts for auditing the implementation of PQC and provisioning a dedicated PQS compliance scan. Other upgrades include a Cryptography Bill of Materials (CBOM) for tracking all identified encryption methods per IT asset, providing improved visibility, and specialized reporting in a structured format.

These upgrades will outfit our customers with clear proof of PQS compliance and report non-compliant services. Following the guidance from NIST CSWP 48, OPENVAS SCAN detection will support network services, cloud services, end-user systems and servers, applications, and software packages and libraries. By implementing discovery for PQS, organizations can achieve compliance with the IT security standards that govern their operational requirements.

OPENVAS SCAN will detect PQS compliance for many common protocols, including:

Protocol / Family

Industry Usage

Quantum Threats

TLS

DNS over HTTPS (DoH) & DNS over TLS (DoT) provide secure resolution; TLS/mTLS underpins secure communications at OSI application layer.

Certificate private key compromise, passive decryption of recorded TLS             sessions after quantum breakthrough, and impersonation through signature forgery.

SSH

Enabling secure network channel for operating system administration, file transfer, and remote execution.

Client credential exposure, compromise of user key material, and loss of forward secrecy through quantum key recovery.

IPSec/IKEv2

A VPN protocol suite that provides network-layer encryption and                        authentication via Encapsulating Security Payload (ESP) and Authentication Header (AH).

The exchange is handled by IKE using RSA or ECDH, which are vulnerable to quantum attacks using Shor’s algorithm.

Kerberos

Authentication system using symmetric cryptography for secure key exchange between clients and services.

Post-quantum attacks could break pre-shared keys or compromise ticket-granting services if weak encryption is used.

PGP

Enables end-to-end e-mail encryption and digital signing between individuals and organizations.

Compromise of private keys through quantum attacks could expose historical encrypted correspondence.

OAUTH/OpenID Connect

Provides delegated authorization and federated identity management across             web applications and APIs.

Exposure of tokens and signatures to quantum attacks could allow unauthorized access or identity forgery.

DNSSEC

Provides integrity and authenticity for DNS responses through cryptographic signing.

Quantum attacks will break RSA/ECDSA-based DNSSEC signatures, allowing                           domain spoofing or redirection.

S/MIME

Encrypts and signs e-mail messages for enterprise communication security.

Quantum attacks could decrypt stored e-mails and forge sender signatures if RSA or ECC keys are used.

Hardware Security Modules (HSMs)

Provide tamper-resistant cryptographic key storage and secure operations for PKI and signing.

Vulnerable to stored-key extraction if classical algorithms (RSA, ECC) are compromised by quantum computing.

Timeline for Implementing PQS Standards

The UK’s National Cyber Security Centre (NCSC) has provided a generalized timeline for migrating IT infrastructure to PQS compliant standards [1].

Figure 1: A generalized timeline for migrating to PQS

Timeline         

Activities

To 2028

Conduct discovery and assessment of all cryptographic implementations. Develop a migration plan with priorities, dependencies, investments, and hardware root of trust updates. Communicate requirements to suppliers and third-party ICT providers.

 

From 2028 to 2031   

Implement high-priority migrations and prepare infrastructure for             PQC readiness. Refine the roadmap for full migration by 2035.

From 2031 to 2035   

Finalize the transition to PQC while strengthening overall cybersecurity resilience across systems.

The Impact of Quantum Compute on Cryptographic Primitives

Cryptographic primitives are the basic building blocks of secure digital communication. Each cryptographic function has a different role in maintaining safe online transactions: remote authentication, ensuring the confidentiality, integrity, and authenticity of data-in-transit and data-at-rest, and non-repudiation. Although well-established standards exist for defending against classical silicon-based cryptographic attacks, adversarial quantum technologies are expected to significantly impact their resilience. As a result, quantum capable adversaries will be able to conduct covert espionage campaigns and digital impersonation of both human and non-human entities against mechanisms that don’t meet new PQS standards.

Further complicating security posture, Harvest Now Decrypt Later (HNDL) attacks allow adversaries to record messages now and decrypt them later — when the attacker obtains sufficiently advanced quantum technology. HNDL attacks make timely implementation of PQC more important, especially for highly sensitive data. According to the NIST Post-Quantum Cryptography Standardization, here’s how quantum computers are expected to impact each cryptographic primitive:

The Impact of Q-Day on Symmetric Encryption (AES, ChaCha20)

Threat level: Moderate — reduced effective key strength

Quantum computers using Grover’s algorithm are capable of searching a key space in roughly √N time, instead of N required by conventional brute force cryptographic attacks [1]. This effectively halves the strength of symmetric key security; a 128-bit key offers only ≈64 bits of post-quantum security, and a 256-bit key results in ≈128 bits.

The following table provides an overview of how symmetric keys are affected by Grover’s algorithm [2][3][4].

Algorithm / Key Length

Classical Security     

Quantum-Equivalent (Grover’s algorithm)

PQS Status

AES-128

128-bit security

≈ 64-bit equivalent                              

Vulnerable — not sufficient for PQS.         

AES-192

192-bit security

≈ 96-bit equivalent

Vulnerable — not sufficient for PQS.

AES-256

256-bit security

≈ 128-bit equivalent

 

The minimum recommended bit strength for PQS.

ChaCha20

256-bit security

≈ 128-bit equivalent

Comparable to AES-256.

Furthermore, while experts agree that current encryption algorithms like AES become sufficiently quantum-resistant by simply increasing the bit-strength of secret keys, this approach places increased burden on classical silicone-based CPUs. Therefore, there is a need to develop new algorithms that are both efficient for silicon-based computing and robust against quantum-based cryptographic analysis.

The Impact of Q-Day on Asymmetric Encryption and Digital Signatures (RSA, DSA, ECC)

Threat level: Severe — completely broken

Shor’s algorithm allows quantum computers to efficiently factor large integers and solve discrete logarithms [1][2] — the mathematical foundation of RSA, the Digital Signature Algorithm (DSA), and Elliptic Curve Cryptography (ECC). Therefore, the classical algorithms relied upon for asymmetric encryption and digital signatures must be completely replaced with quantum resilient ones. In August 2024, NIST published FIPS 204 to finalize ML-DSA (CRYSTALS-Dilithium) and FIPS 205 for SLH-DSA (SPHINCS+) as US federal standards. FIPS 206 to formally standardize FN-DSA (Falcon) is in development [3][4][5].

The following table provides an overview of how classical and PQC asymmetric cryptographic algorithms are affected by Shor’s algorithm [6][7][8].

Algorithm

PQS Status

RSA (1024 / 2048 / 4096-bit)

 

Vulnerable — use only in hybrid transition period.

 

Digital Signature Algorithm (DSA)

 

Vulnerable — not recommended even in hybrid configurations.

 

ML-DSA

 

NIST-standardized for digital signatures. Recommended for general-purpose authentication.

 

FN-DSA                                  

 

NIST-standardized for digital signatures. Recommended for general-purpose authentication.

 

SLH-DSA

 

NIST-standardized for digital signatures in high-security environments.

 

The Impact of Q-Day on Real-Time Key Establishment

Threat level: Severe — Diffie–Hellman and ECC are broken

Since pre-quantum real-time key establishment mechanisms like Diffie–Hellman (DH) and Elliptic-Curve Diffie–Hellman (ECDH) rely on public-key cryptography, they are also impacted by Shor’s algorithm. Therefore, these classical mechanisms must be replaced by post-quantum Key Encapsulation Mechanisms (KEM). By definition, KEM differs from other key exchange mechanisms because one party generates a random symmetric key, then encapsulates it using the other party’s public key. Contrastingly, in DH and ECDH, both sides independently compute part of the final shared symmetric key and both sides are responsible for combining these parts into a final shared key.

Hybrid key exchanges are preferred during the transitional phase towards full post-quantum key establishment. Hybrid key exchanges employ both a classical algorithm such as ECDH and a post-quantum KEM. That way, even if an attack is discovered for one algorithm, session establishment remains secure.

In August 2024, NIST finalized FIPS-203 standardizing ML-KEM (based on the CRYSTALS-Kyber algorithm) for quantum-resilient key establishment. Most recently, in 2025 NIST added the Hamming Quasi-Cyclic (HQC) algorithm to the list of PQS key establishment standards [1].

The following table describes the quantum threat to classical real-time key establishment mechanisms, and the PQS compliant hybrid, and ML-KEM algorithms [4][5][6].

Algorithm

PQS Status

Diffie–Hellman (DH) 

Vulnerable — replace or use only in hybrid with a PQ KEM during transition.

Elliptic-Curve Diffie–Hellman (ECDH)

Vulnerable — replace or use only within a hybrid ECDH+PQ KEM until full PQ migration.

Hybrid key establishment (e.g., ECDH + ML-KEM)

Strongly recommended during migration to hedge against unforeseen breaks. Remains secure if one component is broken.                      

ML-KEM (512, 768, and 1024 bit strengths)

NIST-standardized for key establishment. ML-KEM-512 is recommended for classical 128-bit level use cases. ML-KEM-768 is recommended for higher security in enterprise profiles and ML-KEM-1024 is recommended for the highest security scenarios.

HQC (128, 192, and 256 relative bit-strengths)

NIST-standardized for key establishment. HQC-128, HQC-192, and HQC-256 correspond to NIST security levels 1, 3, and 5. Each provides quantum-resilient protection roughly equivalent to AES-128, AES-192, and AES-256 security strengths, respectively.

The Impact of Q-Day on Hashing Algorithms (SHA-2, SHA-3)

Threat level: Low — mildly weakened

Quantum attacks, such as Grover’s and the Brassard–Høyer–Tapp (BHT) algorithms, effectively cut collision resistance to roughly one-third of its classical strength [1]. Similar to symmetric key encryption, no special functions have been developed with intrinsic properties for PQS. Therefore, the effective strategy will be to increase output length. For hashing, bit strength refers to how many computational operations (on average) are required to break either preimage resistance or collision resistance [2].

The following table provides an overview of how hashing algorithms are impacted by Grover’s algorithm using a quantum computer [3][4][5].

Hash Function

Quantum-Equivalent (Grover’s algorithm)

Status

SHA-256

≈ 85-bit collision equivalent

 

Acceptable short-term, but not recommended for long-term PQS

SHA-384

≈ 128-bit collision equivalent

Medium-term PQS resilience.

SHA-512

≈ 171-bit collision equivalent

Recommended baseline for PQS resilience.

SHA-3-256

≈ 85-bit collision equivalent

Medium-term PQS resilience.

SHA-3-512

≈ 171-bit collision equivalent

Recommended as the most resilient hash function for PQS.

Summary

As Q-Day approaches, organizations must migrate to new PQC standards to maintain resilience in the form of privacy for their online communication and data loss protection. Greenbone is taking decisive steps to achieve full PQS compliance—modernizing internal operations, aligning with established standards, and equipping our OPENVAS SECURITY INTELLIGENCE platform with PQC detection and robust compliance auditing tools. Greenbone is becoming quantum-ready—inside and out. We are taking vulnerability detection and management to a new level—the quantum level.

Was November 2025 a quiet month for cyber security? No, of course not. Fallout from the Oracle EBS ransomware campaigns, which began in October, was widespread; over 29 organizations have been claimed by the Cl0p syndicate alone, with over 100 victims in total. This included Envoy Air (an American Airlines subsidiary), Cox Enterprises, Logitech, Harvard University, The Washington Post, Allianz UK, Schneider Electric, Mazda, Canon, the UK’s National Health Service (NHS), University of the Witwatersrand, Dartmouth College, and others. A free trial of Greenbone’s OPENVAS BASIC offers defenders access to essential cyber security capabilities. Scan your IT environment with Greenbone’s OPENVAS ENTERPRISE FEED to enjoy industry-leading coverage today.

In this month’s threat report, we will review the latest emerging threats to enterprise cyber security in November 2025, including some of the most risky new software vulnerabilities. Data theft and extortion are also hot topics as ransomware attacks continue to increase in 2025. New regulations and civil legal precedents are also coming into play, increasing the potential financial costs to organizations that leak private data.

It’s Time to Talk About Data Theft Again

The May 2025 Threat Report: Hack, Rinse, Repeat reviewed how stolen data is enabling subsequent cyber attacks by providing context for targeted social engineering campaigns, and sensitive information about an organization’s IT infrastructure. Alternatively, stolen data may be used directly for payment card fraud or identity theft, negatively impacting individual victims.

Every day, multiple major data breaches are disclosed globally. The Identity Theft Resource Center (ITRC) tracked 1,732 publicly reported data compromises in the first half of 2025 (≈9.6 per day) in the U.S. alone. The ENISA Threat Landscape 2025 report, released in October, tracked 4,875 incidents in the EU from July 2024 to June 2025 (≈13.4 per day). CrowdStrike’s 2025 European Threat Landscape Report claims that 92% of EU-based ransomware victims were listed on a Data Leak Site (DLS) associated with encryption-based extortion and data theft extortion tactics, while 8% of victims were listed on DLS of ransomware gangs that solely rely on data theft.

So where is this all going? Firstly, new EU regulations are poised to impose punitive incentives on organizations to encourage stronger cyber security posture. DORA (the Digital Operational Resilience Act) demands that financial entities assess both their own cyber security posture and that of third-party ICT providers. The German Bundesrat has now effectively approved the NIS 2 Implementation Act, a law that imposes financial penalties and even personal liability on the managing directors and boards of EU covered entities. NIS 2 enforcement is expected in late 2025 to early 2026.

The individuals impacted by data breaches are also making their voices heard. Breach-related litigation hit record levels in 2024 (≈124 per month) and continued growing into 2025. In early 2025, Conduent Business Solutions announced the theft of Personal Health Information (PHI) belonging to more than 10.5 million Americans. In October 2025, victims were notified and ten class action lawsuits have since been filed. In November, a U.S. Fourth Circuit Court ruled that the public leak of driver’s license numbers online equates to “concrete” harm, further widening the risk for companies who leak data.

One way or another, the powers that be are imposing greater financial costs on organizations who fail to implement appropriate cyber security measures. As a fundamental IT security control, risk-based vulnerability management provides widespread benefits: reducing unauthorized initial access to critical IT assets, deflecting mass exploitation attacks, preventing Denial of Service (DoS) attacks, contributing to the mitigation of advanced social engineering attacks, and reducing the blast radius of a breach if one does occur.

Rogue Devices: Another Reason to Scan Your IT Infrastructure

Emerging software vulnerabilities are not the only reason to conduct continuous scans of your organization’s IT infrastructure. A recent criminal case involving Nordex, a Dutch wind farm operator, demonstrates how easily rogue devices can slip into production networks. According to the ruling, a company manager secretly connected three cryptocurrency mining rigs and two Helium network nodes to internal systems at two sites. The now convicted operator plugged miners into a substation router and hid the wireless hotspots inside wind turbines. The rogue devices were only discovered during Nordex’s recovery from a Conti-linked ransomware incident that took place in 2022.

Continuous infrastructure scanning matters: unauthorized hardware could indicate minor policy violations, but may also represent malicious insiders or external attackers who have gained unauthorized access. OPENVAS SCAN is equipped with discovery scan configurations to alert when new devices appear on a network or when critical systems are down.

DNS Risk from New BIND 9 Cache-Poisoning Flaw

CVE-2025-40778 and CVE-2025-40780 (both CVSS 8.6) are unauthenticated vulnerabilities in BIND 9 recursive resolvers that enable remote DNS cache poisoning and record forgery. A third flaw, CVE-2025-8677 (CVSS 7.5) allows Denial of Service via CPU-exhaustion. Cache-poisoning bugs target the way recursive resolvers cache answers in memory. If an attacker can poison a resolver with a malicious DNS record, users will be redirected to the malicious IP until the TTL expires.

BIND 9 is a widely deployed, open-source DNS server developed and maintained by the Internet Systems Consortium (ISC). It is especially common for on-prem and ISP/enterprise deployments. Although in-the-wild exploitation has not been reported, CVE-2025-40778 has a public proof-of-concept (PoC) available [1] and numerous national CERT alerts have been issued globally [2][3][4][5][6][7][8].

Greenbone provides detection checks for all three CVEs across multiple Linux distributions and hardware devices. Broadly speaking, many BIND 9 versions between 9.11 and 9.21, including some Supported Preview (S1) builds, are vulnerable. See ISC’s security advisories for specific affected product information [9][10][11].

2-Year-Old Linux Use-After-Free Flaw Now a Ransomware Threat

CVE-2024-1086 (CVSS 7.8, EPSS > 99th pctl), published in early 2024, is now being leveraged in ransomware attacks. The CVE has been on CISA’s KEV list since mid-2024 and was flagged for use in ransomware attacks in November 2025. CVE-2024-1086 is a use-after-free [CWE-416] flaw that enables a local attacker to escalate privileges to root and achieve kernel-level arbitrary code execution. The flaw resides in Linux kernel netfilter/nf_tables and affects kernels prior to v6.1.77. A public PoC has been available since March 2024 [1].

Greenbone’s OPENVAS ENTERPRISE FEED and COMMUNITY FEED have provided detection for CVE-2024-1086 across multiple Linux distributions since early 2024.

CVE-2025-12480: Gladinet Triofox Flaw Under Active Attack

CVE-2025-12480 (CVSS 9.1, EPSS >98th pctl) is an improper access control flaw [CWE-284] in Gladinet Triofox that allows unauthenticated remote code execution (RCE). The flaw is being actively exploited by the UNC6485 threat group. Although successful ransomware attacks are not yet reported, analysis shows that attackers are importing remote access tools [T1219] and scanning for lateral-movement opportunities [T1046]. A full technical analysis has been published by Google’s Mandiant, increasing the risk of expanding exploitation.

The attack chain works by providing a malicious GET request that specifies localhost in the Host header. The HTTP Host header is used for routing on the server side, but can be spoofed because it is not used for routing across the internet. CVE-2025-12480 may also be considered an Origin Validation Error [CWE-346] because Triofox automatically trusts requests to localhost without proper verification. This spoofing attack subsequently allows access to the AdminAccount.aspx route, sensitive installation scripts, and configuration pages. RCE is finally achieved by supplying Triofox’s antivirus engine with a path to attacker-generated scripts.

Italy’s national cyber agency, the ACN, and Taiwan’s TWCERT have issued alerts for CVE-2025-12480 [1][2]. Greenbone’s OPENVAS ENTERPRISE FEED includes both an active check and version check to identify vulnerable systems. Users should upgrade to Triofox version 16.7.10368.56560 or higher immediately. Mitigation may also be achieved by configuring a WAF to reject external requests that specify localhost in the Host header.

CVE-2025-61757: Unauthenticated RCE in Oracle Identity Manager

CVE-2025-61757 (CVSS 9.8, EPSS > 98th pctl), is a pre-authentication RCE flaw in Oracle Identity Manager (OIM) and Oracle Identity Governance (OIG). OIM is Oracle’s core provisioning and identity lifecycle engine, while OIG includes additional governance features such as access reviews, role/SoD controls, analytics, and more. CVE-2025-61757 is actively exploited, at least one public PoC exploit exists, and a detailed technical analysis is available.

Exploitation for initial access against internet-exposed OIM instances is considered trivial; an attacker can bypass authentication with a single HTTP request. By either adding ?WSDL to the URL or appending ;.wadl as a path parameter, the SecurityFilter skips authentication checks. Researchers used this unauthorized API access to abuse an endpoint designed to syntax check Groovy scripts by compiling them. Although the Groovy script itself isn’t executed (just compiled), code annotations within the script are executed at compile time, providing RCE.

Several national CERT alerts have been issued for CVE-2025-61757 globally [1][2][3][4]. Greenbone’s OPENVAS ENTERPRISE FEED includes an active check to verify vulnerability to CVE-2025-61757 with a specially crafted HTTP request. Versions 12.2.1.4.0 and 14.1.2.1.0 of OIM and OIG are affected.

CentOS Web Panel (CWP) Under Active Attack for RCE

CVE-2025-48703 (CVSS 9.0, EPSS >98th pctl) is a pre-auth remote command injection vulnerability [CWE-78] in Control Web Panel / CentOS Web Panel (CWP). Exploitation requires knowledge of a valid non-root username. The flaw is caused by an authentication bypass in the file-manager changePerm endpoint combined with OS command injection via the unsanitized t_total chmod parameter. As a result, an attacker could spawn a reverse shell as a valid user. A full technical description and PoC was published by Fenrisk, who discovered and reported the flaw.

In November, CISA flagged CVE-2025-48703 as actively exploited and Taiwan’s TWCERT has issued an alert [1]. Given CWP’s widespread use and the large number of internet-exposed instances, CVE-2025-48703 poses a high-risk globally. Greenbone’s OPENVAS ENTERPRISE FEED includes an authenticated version detection check to identify vulnerable CWP servers, allowing users to take immediate action. All versions of CWP before 0.9.8.1205 are affected.

Unpatched Microsoft Office is Exposed to New Social Engineering Attacks

CVE-2025-60724 (CVSS 9.8) is a new critical GDI+ heap overflow flaw [CWE-122] affecting the graphics component of Microsoft Office and Windows. RCE can be triggered on a victim’s computer if an attacker convinces them to open a specially crafted document or metafile. Microsoft has patched the flaw with its November Patch Tuesday rollout. Vulmon lists two public PoC exploits, but both have since been taken down by GitHub.

Sophisticated social engineering attacks often convince users to open a malicious file, which seeks to exploit a local software flaw. For a better understanding of how cyber adversaries execute this tactic, read our recent blog post, Greenbone Helps Defend Against Advanced Social Engineering Attacks. Greenbone includes detection for CVE-2025-60724 and other CVEs disclosed in Microsoft’s monthly patch cycle.

PoC Exploit Published for New Flaws in N-Central

Horizon.ai has published PoC exploit code and a detailed technical analysis for a new attack chain exploiting CVE-2025-9316 and CVE-2025-11700 in N-Able’s N-Central. N-Central is a managing and monitoring (RMM) software used by large enterprises and managed service providers (MSPs) to easily manage fleets of IT infrastructure including configuration, patching, and reporting and analytics. N-Central sits in the “blast radius” category of software; compromise could easily lead to downstream third-party breaches.

Belgium’s CERT.be and Italy’s ACN have issued CERT alerts for the new CVEs [1][2]. Two other critical severity CVEs in N-Central were disclosed and quickly saw active exploitation in August this year; further evidence that attackers consider N-Central a high-value target. Here is a brief summary of the two new exploitable CVEs in N-Central and another new high-risk CVE for the product:

The CVEs are fixed in N-Central 2025.4. Greenbone’s OPENVAS ENTERPRISE FEED includes a remote banner check to identify all three CVEs referenced above, and an additional active check for CVE-2025-9316.

Summary

November 2025 was anything but quiet for cyber security. Ransomware campaigns targeting Oracle EBS flaws expanded to 100+ victims. Breach volumes keep rising and class action lawsuits on behalf of private victims are keeping pace. The EU’s DORA and NIS 2 are shifting into focus, increasing corporate and personal liability for management. On the vulnerability front, new actively exploited flaws in BIND 9, Linux, Triofox, N-Central, and more ensure that the ransomware war is far from its last act.

A free trial of Greenbone’s OPENVAS BASIC offers defenders access to essential cyber security capabilities. Scan your IT environment with Greenbone’s OPENVAS ENTERPRISE FEED to gain industry-leading coverage today.

Urgency, fear, curiosity, trust, greed, sympathy — social engineering has been wildly successful in exploiting human emotions in cyber attacks. Social engineering attacks have been identified as a top root cause in a high number of breaches. Most breach analysis reports place social engineering among the top initial-access techniques. The recent rise in AI-enabled phishing attacks and data theft further gives adversaries the upper hand with contextual personal data and sensitive business information at their disposal.

Verizon’s 2025 Data Breach and Investigations Report (DBIR) attributes “Social Engineering” incident-class with roughly 17% of breaches globally and 20% in the Asia-Pacific (APAC). According to Sprinto, in 2025, social engineering was the initial access vector in ~36% of incidents. For enterprises, the consequences could be disastrous; ransomware, data theft, and operational downtime can induce revenue-shattering outcomes.

Among the most advanced social engineering campaigns lies a critical one-two punch: psychological manipulation combined with sophisticated exploitation of software flaws. Attack trajectories go beyond the “classical” phishing attack to steal a target’s username and password. They seek immediate unauthorized access to their victim’s computer, lateral movement within the local network, and data exfiltration—with one wrong click, in one fell swoop.

In this article, we will look at some sophisticated social engineering campaigns from the recent past; attacks that combine human deception with exploiting unpatched software flaws. Read on to find out more about the social engineering landscape and how proactive vulnerability management with OPENVAS SECURITY INTELLIGENCE supports a defense-in-depth cyber security strategy, including protection against advanced social engineering attacks.

Advanced Social Engineering Attacks Require a “Defense In Depth” Approach

The most sophisticated social engineering attacks blend human deception with technical exploitation. The classic “phishing attack” [T1566] tricks users into entering their credentials, including MFA codes, into a well-crafted, spoofed website. However, in more advanced variants of social engineering attacks, adversaries can achieve remote code execution (RCE) directly on the victim’s system for full system compromise, install persistent malware, or even move laterally within an organization’s internal network [T1210].

Here’s how sophisticated social engineering attacks work:

  • Phishing messages deliver malicious file attachments [T1566.001] or links [T1566.002] along with a social context urging the victim to click them [T1204].
  • Once clicked, the attacker’s malicious payload is executed. Depending on the design, it may attempt to steal data [T1003][T1005], exploit exposed software weaknesses on the victim’s local system [T1203], or pivot to accessible network services [T1210].
  • In some cases, attackers don’t need to communicate with their targets directly. By making malicious resources available on the public Internet [T1189], victims may confront them through deceptive ads [008] or while executing documents or software applications they believe to be safe [T1189][T1204].
  • Even if the first-stage social engineering attack does not directly exploit a software vulnerability, adversaries can import malware [T1105] for remote access to the victim’s computer.
  • Once inside, adversaries quickly seek to extend their unauthorized access; gain persistence [TA0003], escalate their privileges [TA0004], and move laterally within the network [TA0008].

In all these cases, unpatched software often means the difference between a benign security incident and an expensive data breach scenario. Defense-in-depth cyber security controls including vulnerability management, patching, and network segmentation help ensure that even if a social engineering attempt succeeds, the attacker cannot extend their reach. By continuously identifying and mitigating exploitable weaknesses, vulnerability management limits the blast radius of initial access and stops localized compromises from spreading across the environment.

How Greenbone Helps Defend Against Advanced Social Engineering Attacks

Greenbone helps organizations increase their resilience to advanced social engineering attacks by empowering defenders to close technical security gaps. Greenbone’s OPENVAS ENTERPRISE FEED includes over 200,000 individual vulnerability tests — truly an industry-leading detection engine. The feed is updated daily to ensure coverage of the latest emerging CVEs. A free trial of Greenbone’s OPENVAS BASIC is available for defenders to scan their enterprise IT infrastructure for emerging threats, including vulnerabilities exploited in advanced social engineering attacks.

Vulnerability management is considered a fundamental security activity [1][2][3]. By maintaining a continuous vulnerability management process, organizations can significantly reduce the likelihood that a single phishing email or malicious attachment turns into a full-scale breach. Scanning an IT environment allows security teams to identify and remediate flaws that could provide attackers with initial access, but can also help prevent attackers from escalating privileges, moving laterally, or deploying malware after an initial breach. With Greenbone’s new OPENVAS REPORT product offering, enterprises gain clear risk insights across their entire IT infrastructure and can quickly compile advanced compliance reports.

Social Engineering Campaigns Exploiting Unpatched Software

Many advanced social engineering campaigns are known to exploit unpatched software flaws. In this section we will review some real-world campaigns that leverage advanced exploit chaining via file-attachment and link-based attacks. However, the campaigns described below only scratch the surface of known campaigns and new attacks emerge on a continuous basis.

CVE-2025-8088: WinRAR Allows Attackers to Create Malicious Files

In mid-July 2025, ESET observed active exploitation of CVE-2025-8088 (CVSS 8.8), affecting WinRAR, in ongoing social engineering attacks. CVE-2025-8088 allows unauthorized attackers to copy malicious files into sensitive directories, including the Windows Startup folder, to be executed automatically when the victim logs in. The technical details for this campaign were covered in detail on the Greenbone blog in August.

Attacks were attributed to the RomCom (aka Storm-0978, Tropical Scorpius, UNC2596), a Russian-aligned threat actor known for operating its own signature malware (RomCom RAT). During the recent campaign leveraging CVE-2025-8088 in WinRAR, spearphishing emails delivered weaponized RAR archives to target financial, manufacturing, defense, and logistics companies in Europe and Canada. Greenbone’s OPENVAS ENTERPRISE FEED includes detection for CVE-2025-8088.

CVE-2025-27915: Malicious Calendar Links to Exploit Zimbra Collaboration Suite

In September 2025, a campaign targeted the Brazilian Military, delivering poisoned .ICS calendar files specially designed to exploit CVE-2025-27915 (CVSS 5.4), a stored cross-site scripting (XSS) vulnerability [CWE-79], in Zimbra Collaboration Suite. The phishing emails were disguised as legitimate invitations from foreign political entities. The .ICS files contained embedded JavaScript that executed automatically when viewed in Zimbra’s Classic Web Client. The iCalendar standard has an extensive history of security risks including XSS vulnerabilities across a number of enterprise software applications.

In the most recent campaign, attackers were able to steal session cookies, email content, contact lists, and create malicious email forwarding rules to continuously exfiltrate communications from victims. Unpatched systems remain vulnerable and continue to be exploited in targeted attacks. Greenbone’s OPENVAS ENTERPRISE FEED includes detection for CVE-2025-27915.

CVE-2025-2783: Chrome Sandbox Escape to Deploy Spyware

In March 2025, phishing emails with invites to a Russian policy forum were used to lure victims into clicking on a malicious file. Once executed, the malicious files leveraged CVE-2025-2783 (CVSS 8.3), a sandbox bypass flaw in the Mojo component of Google Chrome for Windows to deploy spyware. The campaign was nicknamed Operation ForumTroll.

CVE‑2025‑2783 stems from a flaw in the Mojo IPC handle-management and only affects the Windows implementation of Google Chrome that allows attackers to bypass Chrome’s sandbox protection to access Windows OS. Greenbone’s OPENVAS ENTERPRISE FEED includes detection for CVE-2025-2783 for Windows [1].

CVE-2025-24054: Windows NTLM Hash Leak Targeted Against European Entities

In March 2025, phishing emails with attached .library-ms files were delivered in attacks targeting government and private firms in Poland and Romania. The attacks targeted a newly disclosed vulnerability, CVE-2025-24054 (CVSS 5.4) impacting Windows NTLM; exploitation began days after the flaw was disclosed.

.library-ms files are Library Description schemas used to define Windows libraries. The malicious .library-ms files contained links to attacker-controlled resources and were delivered inside ZIP archives or linked via Dropbox. Viewing the file exploited the Windows SMB auth feature to steal NTLM authentication hashes and replayed the hashes to achieve domain compromise and lateral movement in the victims’ networks.

CVE‑2024‑21412: Windows SmartScreen Bypass by DarkGate Operators

In mid-January 2024, the threat-actor group behind DarkGate malware began exploiting CVE-2024-21412 (CVSS 8.1), a bypass of Microsoft Defender SmartScreen caused by incorrect internet-shortcut handling. Phishing emails delivered PDF attachments with embedded links, diverting victims to .URL shortcut files which loaded fake software installers. The installers masqueraded as legitimate software (such as NVIDIA or iTunes) and sideloaded a malicious DLL to deploy DarkGate RAT malware.

The campaign targeted financial organizations across North America, Europe, Asia, and Africa. Microsoft issued a patch for CVE-2024-21412 on February 13th, 2024. However, this campaign wasn’t the first campaign exploiting Windows SmartScreen in social engineering attacks. In 2023, CVE-2023-36025 was similarly observed under active exploitation. Greenbone’s OPENVAS ENTERPRISE FEED includes detection for CVE-2024-21412 [1][2][3][4][5].

CVE-2024-42009: Roundcube Webmail XSS Flaw Exploited by UNC1151

In June 2025, a sophisticated spear-phishing campaign targeted Polish organizations via CVE‑2024‑42009 (CVSS 9.3) affecting the Roundcube Webmail vulnerability. The flaw is a critical cross-site scripting (XSS) flaw that allows arbitrary JavaScript execution in a user’s browser when simply opening a specially crafted email.

In these attacks, the UNC1151 threat group sent invoice-themed emails which triggered the flaw to register a malicious Service Worker on the victim’s browser. The malware then proxied the legitimate Roundcube login page while silently harvesting credentials, stealing address-books, and executing Business Email Compromise (BEC) attacks. Greenbone’s OPENVAS ENTERPRISE FEED provides detection for CVE‑2024‑42009.

CVE-2023-36884: Windows Search Exploited for RCE by Storm-0978

In mid-2023, threat actors leveraged social engineering to exploit CVE-2023-36884 (CVSS 7.5), a race condition flaw [CWE-362] in Windows Search. The campaign, attributed to the RomCom threat actor, distributed Word documents and exploited urgency surrounding the Ukrainian World Congress targeting staff at defense and government entities in Europe and North America. Once opened, the documents downloaded scripts, injected iframes and staged remote malware to exploit CVE-2023-36884.

The campaign resulted in financial losses, data theft, and operational disruption for targeted organizations while enabling espionage via credential compromise and deployment of persistent remote access malware. Greenbone’s OPENVAS ENTERPRISE FEED includes detection for CVE-2023-36884.

Isn’t User Awareness Training Enough?

Many organizations begin user awareness training programs with high hopes. However, the effectiveness has been called into question. While some findings indicate that training significantly improves recognition of phishing attempts, these gains were found to fade over time without continuous reinforcement [1][2][3]. Improvement was also shown to differ by individual and require time to become effective [4]. Another study found that combining user awareness training with technical controls (e.g., MFA/OTPs and URL/barrier filters) yields better prevention outcomes than training alone [5]. Other studies demonstrated negative findings associated with user awareness training:

  • A large-scale study in 2025 found no significant benefits of training on click-rates or reporting rates [6].
  • 43% users executed at least one dangerous action over the course of a 15 month study [7].
  • Inconsistent reinforcement or unrealistic simulations risk normalizing artificial behaviors, decreasing effectiveness against real-world attacks over time [8].
  • While user awareness training showed a slightly positive effect in reducing susceptibility to social engineering, the resulting p-value (0.141) was non-significant [9].
  • Annual awareness training did not reduce phishing susceptibility, while simulation-based training resulted in a statistically significant but very small improvement. Furthermore, training has low engagement rates; 75–90% spend less than one minute on training [10].

Therefore, while user awareness training may provide some protection against the most basic social engineering attacks, it is little comfort against highly targeted, sophisticated campaigns.  For high resilience, defenders must plan additional security measures. Vulnerability management is a fundamental defense-in-depth security control for mitigating the impact of sophisticated social engineering attacks. By prioritizing vulnerability patches for assets impacted by flaws identified in active exploitation campaigns, organizations can reduce their risk of unauthorized initial access and prevent a widespread breach.

Summary

The most advanced social engineering attacks are not just out to steal usernames and passwords. Sophisticated social engineering campaigns combine sensitive information to build highly effective triggers. They also deploy technical payloads that seek to exploit software vulnerabilities on the victim’s computer, and within the target’s network. To protect against the worst outcomes, defenders need to use a defense-in-depth strategic approach to cyber security, including continuous vulnerability management. A free trial of Greenbone’s OPENVAS BASIC is available for defenders to scan their enterprise IT infrastructure for emerging threats, including vulnerabilities exploited in advanced social engineering attacks.

Using Greenbone’s suite of security tools, defenders are better positioned to detect software vulnerabilities at scale within their IT environments, prioritize, and patch exposed attack surfaces that APT adversaries are poised to exploit. A free trial of OPENVAS BASIC is a great opportunity to put Greenbone’s security capabilities to the test; OPENVAS SECURITY INTELLIGENCE allows organizations to experience first-hand how automated vulnerability scanning, daily feed updates, and clear risk reporting can empower defenders against evolving social engineering and other exploitation campaigns.

Just over 4,100 new CVEs emerged in October 2025, representing new attack surfaces and placing pressure on defenders to identify and patch. For operational resilience, organizations need to scan their IT infrastructure often and prioritize mitigation efforts.

A free trial of Greenbone’s OPENVAS BASIC lets defenders scan their enterprise IT estate and stay on top of emerging threats. The trial includes access to Greenbone’s OPENVAS ENTERPRISE FEED, delivering industry-leading coverage for CVEs and other IT security vulnerabilities. This month’s threat report will cover some of the most critical new vulnerabilities being actively exploited, and emerging high-risk CVEs with widespread exposure.

Oracle EBS Exploited in Two Separate Ransomware Campaigns

CVE-2025-61882 (CVSS 9.8, EPSS ~99th pctl) is an unauthenticated remote code execution (RCE) flaw in Oracle E-Business Suite (EBS), actively exploited since at least August 9, 2025 [1][2]. The CVE is being used in mass exploitation campaigns for data-theft and extortion by the Cl0p ransomware [S0611] operator. Public PoC exploits appeared in early October and a detailed technical analysis is available.

Besides CVE-2025-61882, CVE-2025-61884 (CVSS 7.5, EPSS ~93rd pctl), a Server-Side Request Forgery (SSRF) flaw [CWE-918], also in Oracle EBS, was actively exploited in October 2025. CVE-2025-61884 was added to CISA KEV and has been used to deploy ransomware [T1486]. Attacks leveraging CVE-2025-61882 reportedly used data theft for extortion. However, attacks exploiting CVE-2025-61884 have used file encryption for ransom impact.

Both CVEs received alerts from numerous national CERT entities globally [3][4][5][6][7][8][9][10]. Greenbone’s OPENVAS ENTERPRISE FEED includes an active check and remote version check for CVE-2025-61882, and a remote version check for CVE-2025-61884 allowing defenders to identify vulnerable assets. According to Oracle’s official advisories [11][12], versions 12.2.3 to 12.2.14 of EBS are affected.

Smartbedded Meteobridge Now Actively Exploited Via CVE-2025-4008

CVE-2025-4008 (CVSS 8.8, ~97th pctl), published on May 13, 2025, is a remote unauthenticated command injection vulnerability [CWE-77] in Smartbedded Meteobridge, now actively exploited. The flaw resides in the template.cgi script of the Meteobridge web interface, which insecurely implements eval() calls. Exploitation allows attackers to execute arbitrary commands with root privileges on affected devices. Smartbedded Meteobridge is a gateway that connects personal weather stations to public networks. Shodan reveals roughly 70–130 devices exposed on the public internet.

A proof-of-concept (PoC) exploit and full technical write-up were published by ONEKEY, which discovered the flaw during firmware analysis. While the vendor’s official advisory claims that Internet exposure is a “precondition for exploiting any security vulnerability”, insider attacks can also present high risk to organizations. Greenbone is able to detect vulnerable instances of Smartbedded Meteobridge with an active check and remote version check. Users should upgrade to version 6.2 or later.

RediShell: A 13-Year-Old Lua Flaw Allows RCE in Redis

CVE-2025-49844 (CVSS 9.9, EPSS ~90th pctl) allows authenticated RCE on all unpatched Redis instances with Lua scripting enabled. The flaw, nicknamed RediShell, is caused by a use-after-free vulnerability [CWE-416] in the Lua garbage collector. Lua scripting is enabled by default, often with authentication disabled, increasing the risk of weak configuration.

Redis is prevalent in cloud environments and has been a hot target for cryptomining [T1496] and ransomware [T1486] leveraging P2PInfect, Redigo, HeadCrab, and Migo malware. A PoC exploit for CVE-2025-49844 confirms exploitability, along with two additional Lua engine flaws:

Multiple national security alerts have been issued for the CVEs [1][2][3][4][5][6]. OPENVAS ENTERPRISE FEED includes authenticated security checks to identify exposure across many Linux environments. Redis has issued a patch and additional mitigations can be found in the vendor’s official advisory.

Emergency Out-of-Band Patch for Windows Server Update Service and More Microsoft Risks Emerge

Microsoft’s October security update disclosed a total of 201 new CVEs. Two were flagged as “Exploitation Detected” and 14 as “Exploitation more likely”. In addition to these disclosures, an emergency alert was issued by CISA for CVE-2025-59287, affecting the Windows Server Update Service (WSUS). Here are brief descriptions of the most high-risk emerging threats to Microsoft products:

  • CVE-2025-59287 (CVSS 9.8, EPSS ~70th pctl): A flaw in WSUS allows unauthorized RCE when untrusted data is deserialized [CWE-502]. Numerous national CERT alerts have been published, many referencing a public PoC exploit [1][2][3][4][5][6][7][8][9]. Microsoft’s official advisory also acknowledges a PoC exploit exists.
  • CVE-2025-33073 (CVSS 8.8, EPSS ~97th pctl): A Windows SMB vulnerability allows an authorized attacker to remotely achieve privilege escalation [CWE-284] to SYSTEM level. The flaw was added to CISA KEV.
  • CVE-2025-59230 (CVSS 7.8, EPSS ~95 pctl): An elevation of privilege vulnerability [CWE-284] in the Windows Remote Access Connection Manager has been added to CISA KEV.
  • CVE-2025-24990 (CVSS 7.8, EPSS ~91st pctl): The end-of-life (EOL) third party Agere Modem driver in Microsoft Windows is now considered actively exploited. The flaw is due to an untrusted pointer dereference [CWE-822] which can lead to arbitrary code execution.
  • CVE-2025-55315 (CVSS 9.9): A security feature bypass vulnerability in NET Core can lead to HTTP request smuggling [CWE-444]. An authenticated attacker could exploit the flaw to bypass front-end security controls, hijack user sessions, perform request-forgery attacks. A technical description is available increasing the risk. See the official security advisory for affected versions and patches.
  • CVE-2025-59502 (CVSS 7.5, EPSS ~81 pctl): An unauthorized attacker can remotely induce uncontrolled resource consumption [CWE-400] in Windows Remote Procedure Call (RPC) resulting in Denial of Service (DoS). Microsoft classifies the CVE as “Exploitation More Likely”.
  • CVE-2025-47827 (CVSS 4.6): Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature [CWE-324]. The flaw allows a malicious root filesystem to be mounted from an unverified SquashFS image. Even though the vulnerability arises in IGEL OS, the attack chain has implications for Windows/UEFI systems. Microsoft has flagged this flaw as actively exploited and a technical description with PoC exploit is available.

Greenbone provides robust detection for Microsoft’s recent security updates. The OPENVAS ENTERPRISE FEED includes detection for 156 (78%) of the 201 newly disclosed CVEs affecting Microsoft products.

Defenders Still “Living On the Edge”: Constant Flow of Perimeter Device Flaws

Greenbone’s June 2024 Threat Report first began tracking high-risk vulnerabilities in perimeter network devices. Since then, edge vulnerabilities have continued to surface without abate. In this section, we will review emerging threats to devices meant to protect internal networks from attacks.

F5 Hack: Multiple New Vulnerabilities in F5 Products Disclosed

In October 2025, F5 claimed a “highly sophisticated nation-state” adversary had long-term, persistent access to internal systems, indicating dwell time of at least 12 months. The attackers stole BIG-IP source code and internal vulnerability information. The data theft prompted an urgent publication of CVEs triaged in the F5 vulnerability pipeline.

In total, 44 new CVEs were published for F5 products in October 2025, several were subject of national CERT alerts [1][2][3][4][5][6][7][8][9][10]. Active exploitation has not been reported and no PoC exploits have been published. However, F5 vulnerabilities are often used in ransomware attacks. In response, Greenbone added new security tests for F5 devices, covering 32 (73%) of the 44 new CVEs.

Fresh CVEs in Ivanti Products for Defenders to Patch

Trend Micro’s Zero Day Initiative (ZDI) publicly disclosed 14 unpatched vulnerabilities in Ivanti Endpoint Manager (EPM) after months of unsuccessful coordination with Ivanti. According to reports, Ivanti requested six months to address the flaws. ZDI’s disclosure effectively exposed these flaws as “zero-day” vulnerabilities, meaning attackers could now exploit them before patches are available.

Greenbone is able to detect all of ZDI’s newly disclosed CVEs and Ivanti CVEs disclosed by other security researchers. Greenbone’s OPENVAS ENTERPRISE FEED includes detection tests for all 17 Ivanti CVEs disclosed in October 2025.

Fortinet’s Products Exposed to 32 New CVEs in October

In total, 32 CVEs were published for Fortinet products in October 2025. However, only 17 of these are listed on the vendor’s official advisory page. Greenbone added checks for 21 of the 32 new CVEs, providing high detection coverage for defenders using Fortinet devices. Fortinet has 20 CVEs listed in CISA’s KEV catalog; 13 of these are associated with ransomware attacks indicating high risk for customers.

Critical Unauthenticated RCE in WatchGuard Fireware OS

CVE-2025-9242 (CVSS 9.3, EPSS ~90th pctl) affecting WatchGuard Fireware OS allows unauthenticated RCE. Fireware OS supports the vendor’s firewalls, VPN gateways, policy enforcement and intrusion prevention systems (IPS). Watchtowr security researchers have published a technical description and PoC exploit increasing the risk.

Several alerts have been issued from government agencies regarding CVE-2025-9242 [1][2][3]. The OPENVAS ENTERPRISE FEED includes a remote version check to identify affected appliances. Users should update to version 12.3.1_Update3, 12.5.13, 12.11.4, 2025.1.1 or later and review the vendor’s official advisory for more information.

CVE-2025-59978: Junos Space Flaw Lets Authenticated Attackers Inject Malicious Scripts

CVE-2025-59978 (CVSS 9.0) is a stored XSS flaw [CWE-79] in Juniper Networks’ Junos Space. Junos Space is a network‑management and orchestration that provides centralized management of Juniper’s routers, switches and security devices. The vulnerability lets a low-privileged authenticated attacker inject JavaScript <script> tags which execute with a viewing admin’s privileges. No active exploitation or public PoCs are yet known. Greenbone’s OPENVAS ENTERPRISE FEED includes a remote version check to identify vulnerable instances.  All Junos Space versions before 24.1R4 are affected. See the official security advisory for more information.

Local Privilege Escalation Flaw in VMware Exploited In-The-Wild

CVE-2025-41244 (CVSS 7.8), published in September 2025, is now flagged as actively exploited. Multiple sources have linked in-the-wild exploitation to UNC5174, a China-linked threat actor. The flaw is a local privilege escalation [CWE-284] when VMware Tools is managed by Aria Operations with SDMP enabled. Successful exploitation allows a local attacker to escalate privileges to root on the same VM. A technical analysis and PoC exploit are available increasing the risk.

The VMware platform has appeared on CISA KEV 26 times including this latest CVE; 8 of these entries indicate use in ransomware attacks. CERT advisories have been issued from various countries [1][2][3][4]. So far in 2025, a total of 40 CVEs have been issued across all VMware platforms. In response, Greenbone has added detection to both the OPENVAS ENTERPRISE FEED and COMMUNITY feed, covering  36 (90%) of VMware’s 2025 vulnerabilities.

To mitigate attacks, Windows users should update to VMware Tools 12.5.4 (Windows 32-bit: 12.4.9). Linux users should update to vendor-provided open-vm-tools. If you can’t patch immediately, disable SDMP and strictly limit guest access. Specific versions of VMware Aria Operations, VMware Tools, VMware Cloud Foundation, VMware Telco Cloud Platform and VMware Telco Cloud Infrastructure are affected. See the official advisory for more details.

Gladinet CentreStack Flaw Allows Machine Key Theft and RCE

CVE-2025-11371 (CVSS 9.8, EPSS 89th pctl) is an unauthenticated Local File Inclusion (LFI) flaw [CWE-552] that allows remote attackers to read arbitrary files, including the Web.config in Gladinet CentreStack and Triofox. In the wild attacks have been observed where the LFI flaw was exploited to retrieve the machine key from Web.config, then forge ASP.NET ViewState payloads. For RCE, attackers are exploiting another ViewState deserialization: CVE-2025-30406 (CVSS 9.8, EPSS ~99th pctl). A detailed technical description and attack chain analysis is publicly available.

Greenbone’s OPENVAS ENTERPRISE FEED has included detection tests for both CVEs described above since April 2025 [1][2]. CentreStack has published patches for users to prevent exploitation. According to Gladinet’s official advisory, users who can’t patch should disable the temp handler in UploadDownloadProxy’s Web.config to block the unauthenticated /storage/t.dn endpoint abused for LFI.

Zimbra Zero-Day Used to Target Brazilian Military

CVE-2025-27915 (CVSS 5.4, EPSS 97th pctl) is a stored cross-site scripting (XSS) vulnerability [CWE-79] in Zimbra Collaboration Suite (ZCS). The flaw is caused by insufficient sanitization of HTML content contained in .ICS calendar files. As a result, attackers can launch phishing attacks with malicious .ICS calendar invites [T1566.001] to execute arbitrary JavaScript within a victim’s webmail session.

The CVE has been exploited in targeted attacks against the Brazilian military and added to CISA KEV. Belgium’s CERT.be has published a security advisory. ZCS is highly targeted by threat actors; CISA KEV contains 14 CVEs; five associated with ransomware attacks [T1486]. Greenbone’s OPENVAS ENTERPRISE FEED includes remote banner check to identify vulnerable instances. The flaw affects ZCS versions 9.0, 10.0, and 10.1. Users should upgrade to the latest version and be especially cautious handling email attachments.

Critical Kentico Xperience Flaws are Actively Exploited

CVE-2025-2746 and CVE-2025-2747 (both CVSS 9.8) allow unauthenticated remote attackers to gain full administrative control of Kentico Xperience via an authentication bypass [CWE-288] flaw. Both CVEs are actively exploited. Exploitation enables attackers to manipulate or exfiltrate CMS data and deploy malicious payloads with administrative privileges.

A full technical description, and PoC exploits increase the risk of near future exploitation. Multiple national CERT advisories have been published for the new CVEs [1][2][3]. The OPENVAS ENTERPRISE FEED includes an active check for CVE-2025-2746 and an active check and remote version check for CVE-2025-2747. Versions through 13.0.172 and 13.0.178 are affected and the vendor has published hotfixes for mitigation.

New High-Severity Flaw in Zoho ManageEngine ADManager Plus

CVE-2025-10020 (CVSS 8.8, EPSS ~73rd pctl) is an authenticated command injection vulnerability [CWE-77] in the Custom Script component of ManageEngine ADManager Plus. The flaw allows attackers with low-privileged access to gain arbitrary RCE. ManageEngine is a widely used on-prem solution for system administrators, IT operations teams, and security engineers to monitor, automate, and secure IT infrastructures.

Despite no active exploitation, public technical description, or PoC exploit, ManageEngine has historically attracted attention from cyber adversaries. This makes CVE-2025-10020 high risk when combined with stolen credentials or insider attacks. The ManageEngine platform is listed on CISA KEV nine times; twice for ransomware attacks (CVE-2022-47966 and CVE-2021-40539). Updating to version 8024 is strongly recommended.

The OPENVAS ENTERPRISE FEED provides:

  • A remote version check to detect servers vulnerable to CVE-2025-10020
  • Detection tests for all Zoho vulnerabilities listed in CISA KEV including CVE-2022-47966 and CVE-2021-40539 used in ransomware attacks [T1486]
  • Detection tests for >70% of CVEs affecting Zohocorp products from 2021 onward

Flowise Server Gives Attackers RCE and Access to Secrets

CVE-2025-61913 (CVSS 9.9) is a path traversal flaw [CWE-22] in Flowise that lets low-privileged, authenticated attackers read and write arbitrary files, potentially leading to RCE. Flowise is a drag & drop user interface and backend server for building customized large language model (LLM) applications.

CVE-2025-61913 stems from improper input validation of the file_path parameter in WriteFileTool and ReadFileTool. The flaw enables access to sensitive files such as /root/.flowise/encryption.key and /root/.flowise/database.sqlite in Docker, or /etc/passwd, /etc/shadow, and /root/.ssh/id_rsa in non-Docker setups. The vendor has published a full PoC exploit themselves, and at least one other PoC exploit exists [1]. However, in-the-wild exploitation has not been confirmed.

Several other new high-risk CVEs also impact Flowise Server:

Germany’s BSI has issued WID-SEC alerts for all CVEs described above [2][3][4][5]. The OPENVAS ENTERPRISE FEED includes two remote version detection checks which address all aforementioned CVEs affecting Flowise [6][7][8]. Users should update to version 3.0.8 or later and disable ALLOW_BUILTIN_DEP during installation. See the vendor’s official advisory for more information.

CVE-2025-37729: Critical RCE Vulnerability in Elastic Cloud Enterprise

CVE-2025-37729 (CVSS 9.1) affecting Elastic Cloud Enterprise (ECE) allows RCE to authenticated attackers with admin privileges. Exploitation could allow exfiltration of sensitive data due to improper handling of Jinjava template expressions. The vulnerability poses a significant insider threat, particularly in hybrid and multi-cloud environments where ECE is deployed. Spain’s INCIBE CERT has issued a security alert. Greenbone’s OPENVAS ENTERPRISE FEED includes a remote banner check to identify vulnerable instances. According to the vendor’s official advisory, versions 2.5.0 through 3.8.1 and 4.0.0 through 4.0.1 are affected.

Summary

The October 2025 Threat Report only scratches the surface of new software flaws emerging in the past month—and OPENVAS SECURITY INTELLIGENCE’s ability to detect them. October 2025 saw 4,100 new CVEs and novel cyber attack campaigns leveraging both fresh vulnerabilities and already known ones. This past month, high-impact flaws drove ransomware, data-theft, and operational downtime leading to attempts at corporate extortion and lost revenue. Greenbone’s OPENVAS BASIC free trial plus the OPENVAS ENTERPRISE FEED include detection modules for many emerging and legacy CVEs, helping security teams find, triage, and fix vulnerable IT assets.

Greenbone is excited to announce new compliance policies for Huawei’s EulerOS and openEuler. These compliance policies are the result of close collaboration with Huawei to provide OPENVAS SCAN users with authenticated checks for over 200 key security controls. By thoroughly vetting security settings, defenders gain high degree security assurances and visibility into the security posture of their EulerOS infrastructure.

Out of the box, Operating Systems (OS) are configured for ease of use and flexibility. By default, operating systems are set up to handle almost any task without post-install adjustment. Many unnecessary kernel modules and services are enabled, and security settings are relaxed. For maximum security, organizations need to harden the default post-installation settings to keep critical data and operations secure. Compliance testing turns configuration guidance into verifiable controls so teams can audit security at scale. By verifying hardened security configurations, defenders gain high security assurances that their IT assets are resilient against cyber attack.

OPENVAS SCAN allows IT security teams to automate policy‑driven audits across their IT infrastructure. Our platform already includes a library of compliance profiles for CIS controls in critical cybersecurity areas such as Apache, IIS, NGINX, MongoDB, Oracle, PostgreSQL, Windows and Linux [1][2][3][4] and policies based on national guidance for encryption standards.

Now, we’re expanding our compliance auditing and reporting capabilities with new policy profiles for Huawei’s EulerOS family. These new offerings bring policy checks right into OPENVAS SCAN’s vulnerability management workflow. These security hardening controls apply to EulerOS, OpenEuler, HCE, and EulerOS Virtualization OSs. Once the policy scans have been executed in OPENVAS SCAN, the results can be viewed as a specialized audit report.

Read on to find out more about how these new compliance profiles help IT security teams harden their security posture against cyber attack.

OPENVAS SCAN Now Includes Compliance Profiles for Huawei EulerOS

Greenbone’s new compliance scans for Huawei EulerOS follow our existing policy deployment model. OPENVAS SCAN’s compliance policies are specialized scan configurations composed of targeted Vulnerability Tests (VTs) that evaluate whether hosts meet defined security requirements. The new compliance policies for EulerOS are distributed to OPENVAS SCAN instances via the OPENVAS ENTERPRISE FEED and COMMUNITY FEED.

The new compliance profile curates families of authenticated security checks specially tailored to EulerOS environments. Authenticated auditing ensures that accurate evidence is collected from each scanned endpoint, providing the highest visibility for security attestation. OPENVAS SCAN also offers customized reporting formats, including an executive compliance report suited for management oversight.

To execute an audit, users can configure remote access for authenticated scans,  select a policy, run the policy scan task, and view an evidence‑rich audit report that shows which controls passed, failed, or require further manual investigation. Policies are managed in OPENVAS SCAN’s Compliance Policies area and executed as vulnerability scans with the same level of control as other scan configurations: alerting, reporting, and scheduling to verify continuous compliance.

What Do the New Huawei EulerOS Compliance Policies Cover?

The new Huawei EulerOS profile’s goal is simple: reduce attack surface by verifying secure settings on every host. The policy scan aggregates over 200 of distinct security checks across Linux networking, services and local configuration. The policy tests resemble the CIS Benchmarks, while aligning with Huawei’s platform specifics requirements. The new EulerOS compliance policies can also be adjusted to support each organization’s internal policy needs.

The new EulerOS compliance policies include:

  • Service Hardening: Ensures unnecessary or insecure network services (e.g., DNS, NFS, RPC, SNMP, HTTP, Avahi) are disabled or not installed to reduce the system’s attack surface.
  • System Configuration and Kernel Security: Validates secure kernel parameters, sysctl settings, ICMP behavior, address space layout randomization (ASLR), and protection mechanisms like dmesg_restrict.
  • Authentication and Access Control: Enforces strong password policies, account lockout rules, sudo configurations, and user access restrictions to prevent unauthorized access.
  • File and Directory Permissions: Checks critical system files (e.g., /etc/passwd, /etc/shadow, SSH keys) and directories for proper ownership and secure permissions.
  • Password Policy Enforcement: Checks for password complexity, minimum length, expiration period, history count, retry limits, and lockout mechanisms to ensure strong authentication hygiene.
  • User Account and Privilege Management: Reviews active user accounts for unused, duplicate, or privileged users; ensures direct root login is disabled and only necessary users have shell access.
  • Boot and Initialization Security: Validates GRUB configurations, bootloader protections, secure boot settings, and kernel module restrictions.
  • Firewall and Network Traffic Control: Ensures proper iptables/nftables/firewalld configurations for INPUT/OUTPUT policies and default zones to limit unauthorized network communication.
  • Package and Software Management: Checks for secure package management practices, disallows installation of unnecessary or insecure software, and confirms that package repositories are configured correctly.
  • CVE Discovery and Vulnerability Detection: Identifies known vulnerabilities (CVEs) present on the system by checking installed packages against vulnerability feeds. This helps prioritize remediation of exploitable software flaws based on real-world threat data.
  • Logging and Auditing: Verifies audit rules for privileged commands, tracks access to sensitive files, configures rsyslog for remote logging, and ensures audit logs are properly stored and managed.

These security checks are implemented as Vulnerability Tests (VTs), grouped into families, and referenced from the EulerOS policy object. OPENVAS SCAN ships with many other platform‑specific VT families—including Huawei EulerOS Local Security Checks—which are enabled inside of the new policies to collect host‑level evidence of CVE exposure in addition to configuration hardening.

Which Huawei EulerOS Distributions are Covered?

Greenbone’s new compliance profiles are designed for the EulerOS ecosystem including distributions for enterprise and cloud deployments. Delivery is simple: the new Huawei EulerOS compliance profiles are provided via OPENVAS COMMUNITY FEED for Greenbone’s OPENVAS SCAN product. Users receive them with routine feed updates similar to other default policies. This ensures your policy content stays up to date without additional maintenance.

Here is a description  of each EulerOS distribution covered in Greenbone’s new compliance profiles and a brief description of the OS-specific security coverage.

EulerOS (Traditional/Enterprise)

Coverage focuses on EulerOS 2.0 service packs published by Huawei. OPENVAS SCAN maps each compliance test to Huawei’s official EulerOS security advisories portal, the EulerOS Security Configuration Baseline, and EulerOS lifecycle information. This includes service packs SP9 and newer.

EulerOS Virtual (VM Editions)

For data centers that rely on EulerOS Virtual for x86_64 and ARM64 architecture, our new compliance profiles recognize EulerOS Virtual versions—including releases 2.9.x, 2.10.x, 2.11.x, 2.12.x, 2.13.x. They also include checks for virtualization‑specific packages and services accordingly (for example, KVM/QEMU components and their hardening/patch levels).

openEuler (Community)

For organizations that standardize on openEuler LTS, Greenbone consumes the CSAF‑formatted advisories published by the openEuler project and aligns compliance checks using OS version awareness. The openEuler lifecycle and downloads page document the available LTS releases and service packs. The compliance profiles support auditing versions 20.03, 22.03, 24.03 based on openEuler Security Configuration Baseline.

Huawei Cloud EulerOS (HCE)

For Huawei Cloud EulerOS (HCE) 2.0 and HCE 3.0 cloud deployments, our new compliance profiles leverage publicly available advisories to validate HCE package baselines and configuration hardening specific to cloud images and managed repositories—recognizing differences such as package managers and repo layout between.

Summary

Greenbone’s new compliance profiles for EulerOS distributions extend OPENVAS SCAN’s capabilities with policy‑driven audits. The policies can be used to attest the hardened security posture of EulerOS, EulerOS Virtual, openEuler and HCE. Delivered through the OPENVAS COMMUNITY FEED, the audits execute authenticated checks to verify secure baselines for a wide scope of attack surface. The profiles are also complemented with detailed technical and executive reporting for stakeholders. These new tools enhance OPENVAS SCAN as a reliable way to harden Huawei-based Linux fleets at enterprise scale.

Discussion of a new security issue affecting Fortinet’s FortiWeb began circulating online in early October 2025, when cyber deception firm Defused reported capturing a working exploit via honeypot. FortiWeb is Fortinet’s web application firewall (WAF) platform, designed to shield web applications from malicious activity. For over one month, Defused’s revelation mostly lurked in the shadows; no CVE assignment, no acknowledgment from Fortinet. Security researchers recently noted that Fortinet seems to have silently patched the flaw without notifying users beforehand.

The issue finally hit the mainstream on November 13th, when watchTowr Labs posted a full proof-of-concept (PoC) exploit. One day later, the vulnerability was assigned an ID: CVE-2025-64446 (CVSS 9.8, EPSS 97th pctl) is now officially recognized as an actively exploited, critical severity issue in Fortinet FortiWeb. The flaw allows attackers to create rogue admin accounts and execute administrative actions.

Fortinet officially classifies CVE-2025-64446 as a Relative Path Traversal issue [CWE-23]. However, it should also be considered an Authentication Bypass Using an Alternate Path flaw [CWE-288], since URL manipulation allows attackers to access a legacy Common Gateway Interface (CGI) processor, which does not implement proper authentication. Users should consult Fortinet’s official advisory, conduct an immediate assessment to determine their risk, and consider emergency mitigation for this flaw.

A free trial of Greenbone’s OPENVAS BASIC is available for defenders to scan their enterprise IT infrastructure for emerging threats such as CVE-2025-64446 in Fortinet’s FortiWeb appliances.

How the Exploit against CVE-2025-64446 Works

The exploit chain for CVE-2025-64446 combines two core design flaws in FortiWeb:

  • A Relative Path Traversal vulnerability [CWE-23] allows unprotected URL routing between the management interface’s REST API and its CGI processor. This incorrect routing serves as an alternative path to bypass authentication.
  • An Authentication Bypass Using an Alternate Path flaw [CWE-288] in the CGI processor does not perform proper authentication for data provided via a connecting client’s CGIINFO HTTP header.

watchTowr’s Python-based PoC demonstrates how attackers can circumvent FortiWeb’s intended API to  abuse the legacy CGI processor to create unauthorized admin accounts on the device. Here is how the exploit works:

  1. Attackers can communicate with FortiWeb management port over HTTPS (port 443) with certificate validation disabled to avoid hang-ups with self-signed, outdated, or otherwise invalid certificates.
  2. Unpatched FortiWeb appliances do not properly sanitize the URI before applying authorization rules. Unauthenticated users can achieve path traversal by starting their request URL with https://api/v2.0/… while also traversing via ../../../../../ to cgi-bin/fwbcgi.
  3. Source code analysis revealed that FortiWeb’s legacy CGI backend includes a function named cgi_auth(), that blindly trusts any authorization claims provided in the CGIINFO header if the username matches any existing user; including the built-in admin user. This means an unauthenticated attacker can spoof the admin user to gain elevated permissions.
  4. FortiWeb’s CGI processor then processes the rest of the request body with full administrative permissions.
  5. The attacker can submit a malicious JSON object that instructs the system to create a new administrator account with an arbitrary, attacker-controlled username and password to take full control of the device.

How to Mitigate the Emerging Fortinet Vulnerability

FortiWeb users should consult Fortinet’s advisory, conduct an immediate assessment to determine their risk, and consider emergency mitigation for this flaw. The vendor also officially recommends disabling HTTP and HTTPS for internet-facing interfaces until an upgrade can be performed. If a FortiWeb HTTP/HTTPS Management interface is only accessible from internal network endpoints, the risk is reduced.

Organizations running unpatched versions of FortiWeb should consider this a critical priority issue. The following versions of FortiWeb are affected:

  • FortiWeb 8.0.0 through 8.0.1
  • FortiWeb 7.6.0 through 7.6.4
  • FortiWeb 7.4.0 through 7.4.9
  • FortiWeb 7.2.0 through 7.2.11
  • FortiWeb 7.0.0 through 7.0.11
  • FortiWeb 6.4 through 6.4.3 (disclosed by watchTowr Labs [1])
  • FortiWeb 6.3 through 6.3.23 (disclosed by watchTowr Labs)

It’s important to note that Fortinet’s list of affected products is less comprehensive than the one provided by third-party security researchers. The EU’s Cyber Resilience Act (CRA) comes into effect in late 2026, bringing a new measure of legal accountability to software vendors that issue untimely or inaccurate security information to their users. The CRA will require software vendors to report known vulnerabilities and known exploits to ENISA within 24 hours.

Greenbone’s OPENVAS ENTERPRISE FEED Has Got You Covered

Greenbone’s vulnerability test development team assessed this emerging FortiWeb flaw before it was published as a CVE. A version check [1] and active check [2] are now available in the  OPENVAS ENTERPRISE FEED. These detection tests include both version-based checks and active checks that interact with appliances over HTTP to detect vulnerability to the flaw. This dual-layer approach ensures that organizations can reliably identify vulnerable FortiWeb instances.

As new details emerge, Greenbone will refine and expand coverage to ensure that customers can identify affected instances. A free trial of Greenbone’s OPENVAS BASIC is available for defenders to scan their enterprise IT infrastructure for emerging threats such as CVE-2025-64446 in Fortinet’s FortiWeb appliances.

In total, just over 4,500 CVEs were published in September, exposing defenders to new risk. For operational resilience, organizations need to scan their IT infrastructure to identify where hidden risk could impact their operations. A free trial of Greenbone’s OPENVAS BASIC allows defenders to scan their enterprise IT infrastructure to stay on top of emerging threats. This free trial includes access to Greenbone’s OPENVAS ENTERPRISE FEED, an industry-leading coverage for CVEs and other IT security vulnerabilities.

So far in September, our blog has covered three emerging cyber security events: SessionReaper, an unauthenticated RCE flaw in Adobe Commerce and Magento, CVSS 10 exposed in Fortra GoAnywhere MFT, and an ArcaneDoor espionage campaign actively exploiting a new vulnerability in Cisco ASA and FTD. In this edition of the monthly threat report, we will cover other high-risk threats from September 2025.

Emerging Threats to Linux Systems

Linux OS is the backbone of global IT infrastructure. As attackers increasingly target Linux environments, vulnerability scanning is essential for operational resilience and service continuity. Here are the top vulnerabilities to Linux disclosed in September 2025.

High-Severity Sudo Flaw is Now Actively Exploited

In July, the Greenbone Threat Report flagged an emerging threat: CVE-2025-32463 (CVSS 7.8) permits unauthorized privilege escalation [TA0004] to root by tricking the Linux sudo command (all releases ≥ 1.9.14 and before 1.9.17p1) into loading attacker-controlled shared libraries [T1129]. CVE-2025-32463 is now being actively exploited and has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. Canada’s Cyber Centre has issued a new CERT advisory, adding to the existing alerts [1][2][3]. Organizations cannot achieve high resilience while waiting for known vulnerabilities to be flagged as actively exploited. Greenbone added detection tests for CVE-2025-32463 to the OPENVAS ENTERPRISE FEED and COMMUNITY FEED immediately in July 2025, giving users advanced detection and the opportunity to patch.

CVE-2025-38352 POSIX CPU TOCTOU Race in the Linux Kernel
CVE-2025-38352 (CVSS 7.4, EPSS ~70th pctl) is a time-of-check to time-of-use (TOCTOU) flaw [CWE-367] in Linux kernel’s POSIX CPU timers. CVE-2025-38352 allows denial of service (DoS) [T1499] on affected systems and has been added to CISA’s KEV. While no public proof-of-concept (PoC) exploit is available, security researchers have published a detailed technical analysis.

The German BSI has issued two alerts for CVE-2025-38352: one for the Linux kernel [1] and one for Android [2]. Greenbone’s OPENVAS ENTERPRISE FEED and COMMUNITY FEED include patch-level checks for Linux distributions.

High-Severity Vulnerability in Linux UDisks Daemon
CVE-2025-8067 (CVSS 8.5) is a local, unauthenticated privilege escalation [TA0004] flaw in Red Hat Enterprise Linux’s (RHEL) UDisks daemon. The UDisks daemon is a system service for managing storage devices such as hard drives, SSDs, USB drives, optical media, and partitions. The root cause of CVE-2025-8067 is improper handling of negative integer indexes, which can trigger an out-of-bounds memory read [CWE-125]. Exploitation can result in DoS [T1499], or local privilege escalation [T1068] by mapping a loop device to a privileged local file [1].

There’s no indication of active exploitation, but PoC code has been published [2][3]. Germany’s BSI has issued a security advisory [4]. The OPENVAS ENTERPRISE FEED and COMMUNITY FEED include package patch-level checks for many Linux distributions. Patching is the only viable mitigation.

New ImageMagick CVEs Pose DoS and RCE Risks
CVE-2025-53014 (CVSS 9.8), CVE-2025-53019 (CVSS 7.5), and CVE-2025-53101 (CVSS 9.8) arise from improper processing of image filenames [CWE-66] in the ImageMagick packages for Linux. Exploitation could reportedly lead to DoS [T1499] and arbitrary code execution [T1203] in the case of CVE-2025-53101. Although these three CVEs aren’t known to be actively exploited in the wild, the German BSI has issued a CERT-Bund Advisory [WID-SEC-2025-1537]. The OPENVAS ENTERPRISE FEED and COMMUNITY FEED include detection checks across many Linux distributions.

Multiple High-Risk Security Issues in Cisco Products

CVE-2025-20352 and CVE-2025-20312 (both CVSS 7.7) capped off a tumultuous month for Cisco products. Both CVEs were published on September 24th, 2025. CVE-2025-20352 was discovered by Cisco while fulfilling a customer’s technical support case. The flaw was added to CISA KEV five days later and advisories have been issued by several national CERT agencies [1][2][3][4][5][6][7]. Both CVEs are in the Simple Network Management Protocol (SNMP).

CVE-2025-20352 is due to a stack overflow [CWE-121] in the SNMP subsystem of affected products: IOS/IOS XE (all SNMP versions) and Meraki MS390/Catalyst 9300 running Meraki CS 17 or earlier. Exploitation allows authenticated DoS and potentially root-level RCE, depending on the credentials possessed by the attacker. DoS is possible with an SNMPv1/v2c read-only community string or valid SNMPv3 user credentials. To achieve root-level RCE, administrative (privilege 15) credentials for the device are required.

CVE-2025-20312 allows an authenticated remote attacker to cause a DoS. The flaw is caused by improper error handling that allows the system to enter into an infinite loop when parsing crafted SNMP requests [CWE-835]. Exploitation requires a valid SNMP community string with either read-write or read-only permissions. Affected systems are limited to IOS XE switches with both SNMP enabled and WRED for MPLS EXP configured.

No public exploits are available for either CVE. Users who cannot patch may mitigate the vulnerability by limiting SNMP access to trusted network entities and disabling the vulnerable Object Identifiers (OIDs). Cisco has published advisories for each CVE separately [8][9];. The OPENVAS ENTERPRISE FEED provides both authenticated and remote version detection tests for the actively exploited CVE-2025-20352 [10][11] and a remote version detection check for CVE-2025-20312 [12].

Twice-Patched Flaw in SolarWinds Help Desk Still Vulnerable

CVE-2025-26399 (CVSS 9.8) is an unauthenticated RCE vulnerability in SolarWinds Web Help Desk 12.8.7 and all prior versions. The CVE is a patch bypass for CVE-2024-28988, which itself was a bypass for CVE-2024-28986. The original CVE-2024-28986 was added to CISA’s KEV catalog shortly after its disclosure. While there are no confirmed reports of this latest bypass being exploited in the wild, security experts believe exploitation is likely. The root cause remains the same: flawed deserialization of untrusted data [CWE-502] in the product’s AjaxProxy component.

National CERT advisories have been issued by Canada’s CCCS, CERT-FR, and Spain’s INCIBE-CERT. Greenbone’s OPENVAS ENTERPRISE FEED includes a remote banner version check, allowing security teams to identify affected instances. Given the critical severity and history of exploitation, applying the Web Help Desk 12.8.7 Hotfix 1 patch is strongly recommended.

Sitecore XM, XP, and XC Actively Exploited

CVE-2025-53690 (CVSS 9.0, EPSS ~95th pctl) is a deserialization vulnerability [CWE-502] affecting Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and some Managed Cloud instances. Unauthenticated attackers can craft malicious __VIEWSTATE payloads to achieve RCE with admin privileges. The vulnerability is under active attack and has been added to CISA’s KEV, joining other exploited SiteCore flaws. At least one Sitecore CVE is known to be leveraged in ransomware attacks.

Attackers are leveraging CVE-2025-53690 to deploy a novel reconnaissance malware dubbed “WEEPSTEEL”. The malware performs host and network discovery [TA0043], exfiltrates sensitive configuration files [TA0010], and escalates privileges [TA0004] by creating local Administrator accounts.

Techniques observed in the attacks include:

The OPENVAS ENTERPRISE FEED includes a remote banner version check for detecting affected Sitecore products. Sitecore’s official advisory strongly urges users to rotate machine keys, enable ViewState MAC, review IoCs, and audit for signs of compromise.

“Exploitation More Likely” for Nine CVEs in Microsoft’s September Patch Cycle

Microsoft’s September patch cycle addresses 97 flaws; 9 rated critical, with the majority rated Important. Affected products include the Windows OS, SMB, NTFS, and NTLM, Microsoft Office, Azure, SQL Server, Hyper-V, DirectX, and more. Microsoft flagged nine vulnerabilities with an “Exploitation More Likely” status:

  • CVE-2025-55234 (CVSS 9.8): Improper authentication [CWE-287] in Windows’ SMB services could allow attackers to replay stolen credentials to gain privileged access under certain conditions. Customers who have not enabled SMB hardening measures are advised to assess their environment and apply either SMB Server signing SMB Server Extended Protection for Authentication (EPA).
  • CVE-2025-55319 (CVSS 9.8): A command injection flaw [CWE-77] in Agentic AI integrations for Visual Studio Code (version 1.0.0 before 1.104.0) allows RCE for an unauthorized attacker. Users should update to the most recent version of Visual Studio Code [1].
  • CVE-2025-54110 (CVSS 8.8): A vulnerability in the Windows kernel involving an integer overflow / wraparound [CWE-190] can allow a local attacker to escape AppContainer Isolation. This can allow privilege escalation to the SYSTEM level and execution of arbitrary code [2].
  • CVE-2025-54918 (CVSS 8.8): An authentication flaw [CWE-287] in NTLM allows an authenticated attacker to remotely escalate privileges to the SYSTEM level, enabling full control of a Windows host [3].
  • CVE-2025-54916 (CVSS 7.8): A buffer handling bug [CWE-120] in the NTFS file system driver can be triggered by specially crafted input, leading to arbitrary code execution for an authenticated local attacker [4].
  • CVE-2025-54098 (CVSS 7.8): Hyper-V virtualization implements improper access control [CWE-284] that permits a malicious guest VM to escape to the host or gain elevated privileges within the hypervisor [5].
  • CVE-2025-54093 (CVSS 7.0): A TOCTOU race condition [CWE-367] in Windows TCP/IP could allow local attackers to gain elevated privileges via precise timing attacks [6].
  • CVE-2025-53803 (CVSS 5.5): A vulnerability in the Windows kernel results in error messages that leak sensitive information [CWE-209] to a local authenticated attacker, including sensitive memory addresses within kernel space [7].
  • CVE-2025-53804 (CVSS 5.5): An information-disclosure vulnerability [CWE-200] in the Windows kernel subsystem enables a local user to determine sensitive memory addresses within kernel space [8].

Organizations that do not attest patch levels across their IT infrastructure are at increased risk of harboring exploitable security gaps that attackers may exploit. Greenbone’s OPENVAS ENTERPRISE FEED frequently updates detection for the latest Microsoft vulnerabilities.

Summary

September 2025 underscored escalating cyber risks for many popular enterprise software platforms. Critical flaws in Fortra GoAnywhere MFT, Cisco ASA/FTD, and Sitecore were among thousands of new CVEs shaping the month’s threat landscape. Active cyber attack campaigns highlight the urgency of proactive vulnerability management. Regular scanning with Greenbone’s OPENVAS ENTERPRISE FEED enables defenders to detect and mitigate emerging risks before attackers exploit them. A free trial of Greenbone’s OPENVAS BASIC allows defenders to stay on top of emerging threats.