Aggregator
CVE-2025-48941 | MyBB up to 1.8.38 Search exposure of sensitive information through metadata (GHSA-f847-57xc-ffwr)
CVE-2025-48995 | XML-Security signxml up to 4.0.3 timing discrepancy (GHSA-gmhf-gg8w-jw42)
CVE-2025-48994 | XML-Security signxml up to 4.0.3 incorrect implementation of authentication algorithm (GHSA-6vx8-pcwv-xhf4)
U.S., Dutch Agencies Shut Down AVCheck Services Used by Threat Groups
Authorities with the United States, the Netherlands, and Finland shut down the AVCheck counter antivirus and two crypting services that were used by bad actors to obfuscate their malware and to test it to ensure it could not be detected by antivirus programs.
The post U.S., Dutch Agencies Shut Down AVCheck Services Used by Threat Groups appeared first on Security Boulevard.
CVE-2024-57459 | CloudClassroom PHP Project 1.0 mydetailsstudent.php myds sql injection (EUVD-2024-54626)
NSO appeals WhatsApp decision, says it can’t pay $168 million in ‘unlawful’ damages
Frequently Asked Questions About BadSuccessor
Frequently asked questions about “BadSuccessor,” a zero-day privilege escalation vulnerability in Active Directory domains with at least one Windows Server 2025 domain controller.
BackgroundTenable’s Research Special Operations (RSO) and the Identity Content team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding a newly disclosed zero-day in Active Directory called BadSuccessor.
FAQWhat is BadSuccessor?
BadSuccessor is the name of a zero-day privilege escalation vulnerability in Active Directory that was discovered and disclosed by Yuval Gordon, a security researcher at Akamai.
According to Gordon, the flaw exists in delegated Managed Service Accounts (dMSAs), a service account type in Active Directory (AD) that was introduced in Windows Server 2025 to enable the migration of non-managed service accounts.
What are the vulnerabilities associated with BadSuccessor?
As of June 2, Microsoft had not assigned a CVE identifier for BadSuccessor. Microsoft is the CVE Numbering Authority (CNA) for its products. Since there are currently no patches available for BadSuccessor, no CVE has been assigned. If Microsoft does assign a CVE alongside patches for it, we will update this blog accordingly.
How is BadSuccessor exploited?
To exploit BadSuccessor, an attacker needs to be able to access a user account with specific permissions in AD, and at least one domain controller in the domain needs to be running Windows Server 2025.
Based on Akamai’s research, even if an AD domain is not using dMSAs, nor operates at the 2025 functional level, all that is required is that a targeted user has either the permission to:
- Create a new dMSA (msDS-DelegatedManagedServiceAccount object class) in any container or organizational unit (OU)
- Abuse an existing dMSA by modifying its msDS-ManagedAccountPrecededByLink attribute
When was BadSuccessor first disclosed?
On May 21, Akamai published a blog post about BadSuccessor, which included a detailed overview of the flaw, as well as detection and mitigation guidance.
How severe is BadSuccessor?
BadSuccessor has the potential to be very severe, as exploitation could allow an attacker to achieve full domain, and then forest, compromise in an Active Directory environment. However, one mitigating factor is that it only affects domains with at least one Windows Server 2025 domain controller.
How prevalent are AD domains with at least one Windows Server 2025 domain controller?
Based on a subset of Tenable’s telemetry data, we found just 0.7% of AD domains have at least one Windows Server 2025 domain controller. This appears to be lower than other statistics we’ve seen reported.
Was BadSuccessor exploited as a zero-day?
As of June 2, there have been no indications that BadSuccessor has been exploited in the wild.
Why is it called BadSuccessor?
According to Gordon, the name “BadSuccessor” is tied to the fact that the user account (or dMSA) becomes the nefarious “successor” by inheriting the elevated privileges of another identity in the AD environment.
6/ We named this attack BadSuccessor, because that's exactly what the dMSA becomes - the unintended heir to a high-privilege identity.
A successor, with all the right keys.
— Yuval Gordon (@YuG0rd) May 21, 2025
Is there a proof-of-concept (PoC) available for BadSuccessor?
Yes, there are several proofs-of-concept (PoCs) for BadSuccessor available on GitHub, including a.NET implementation called SharpSuccessor. It is also available in NetExec, the successor to the infamous CrackMapExec hack tool. It was also added to BloodyAD, the Active Directory privilege escalation framework.
Are patches or mitigations available for BadSuccessor?
As of June 2, there were no patches available for BadSuccessor. However, in the Akamai blog post from May 21, Microsoft indicated they would “fix this issue in the future.” If and when a patch becomes available, we will update this section.
Akamai’s blog post includes details on detecting BadSuccessor as well as mitigation suggestions.
Has Tenable released any product coverage for these vulnerabilities?
While Microsoft has not yet released patches for BadSuccessor, Tenable Identity Exposure customers can utilize our recently released (v3.95) Indicator of Exposure (IoE) for BadSuccessor.
Once Microsoft assigns a CVE and releases patches, we will update this section with additional Tenable coverage.
Get more informationJoin Tenable's Research Special Operations (RSO) Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.
Учёные собрали батарею, которую не берут ни потери, ни хаос — квантовая топология в деле
Запретить нельзя — заменить: как Россия закрывает «брешь» WhatsApp
Google Chrome to distrust Chunghwa Telecom, Netlock certificates in August
Interlock
You must login to view this content
El Dorado
You must login to view this content
[Control systems] CISA ICS security advisories (AV25–308)
International operation takes down crypting sites used for testing malware
Уголовка по подписке: статья 272 почти полностью ушла в «Госуслуги»
Attackers breached ConnectWise, compromised customer ScreenConnect instances
A suspected “sophisticated nation state actor” has compromised ScreenConnect cloud instances of a “very small number” of ConnectWise customers, the company has revealed on Wednesday. “We have not observed any additional suspicious activity in ScreenConnect cloud instances since the patch was released on April 24,” they added on Friday. The patch in question fixes CVE-2025-3935, a ViewState deserialization vulnerability affecting ScreenConnect versions 25.2.3 and earlier, which can allow attackers to inject malicious code and achieve … More →
The post Attackers breached ConnectWise, compromised customer ScreenConnect instances appeared first on Help Net Security.
Ransomware Negotiation When and How to Engage Attackers
As ransomware attacks devastate organizations globally, many companies are turning to professional negotiators to engage directly with cybercriminals, despite strong government opposition to paying ransoms. This emerging practice has sparked intense debate about when negotiation becomes necessary and how organizations can protect themselves while navigating these high-stakes conversations with threat actors. When Negotiation Becomes Necessary […]
The post Ransomware Negotiation When and How to Engage Attackers appeared first on Cyber Security News.