Aggregator
CVE-2025-40130 | Linux Kernel up to 6.17.2 ufshcd_pm_qos_exit use after free
CVE-2025-40124 | Linux Kernel up to 6.17.2 copy_from_user return value
CVE-2025-40122 | Linux Kernel up to 6.17.2 intel_pmu_acr_late_setup privilege escalation
CVE-2025-40169 | Linux Kernel up to 6.6.111/6.12.52/6.17.2 bpf check_alu_op privilege escalation
CVE-2025-40117 | Linux Kernel up to 6.17.2 misc pci_endpoint_test_ioctl buffer under-read
四步三利:如何判断一个终端安全需求的价值
CVE-2025-40166 | Linux Kernel up to 6.12.54/6.17.4/6.18-rc1 exec_destroy state issue
CVE-2025-40160 | Linux Kernel up to 6.6.112/6.12.53/6.17.3 find_virq privilege escalation
CVE-2025-40146 | Linux Kernel up to 6.17.2 blk-mq nr_requests deadlock
CVE-2025-40123 | Linux Kernel up to 6.1.155/6.6.111/6.12.52/6.17.2 bpf_prog_test_run_xdp null pointer dereference
CVE-2025-40163 | Linux Kernel up to 6.17.4/6.18-rc1 deadline dl_server stack-based overflow
Microsoft Investigating Teams Issue that Disables Users from Opening Apps
Microsoft has confirmed it is investigating a significant issue affecting Microsoft Teams for Education, which is particularly impacting users’ ability to access critical features such as assignments and grades. The problem, which initially appeared limited to administrators in Europe, has since expanded to affect all users with educational accounts worldwide potentially. The outage stems from […]
The post Microsoft Investigating Teams Issue that Disables Users from Opening Apps appeared first on Cyber Security News.
Ransom House
You must login to view this content
INC
You must login to view this content
INC
You must login to view this content
MastaStealer Exploits Windows LNK to Launch PowerShell and Bypass Defender
Windows LNK files remain a preferred vector for attackers seeking to establish initial access on target systems. Recently, security researchers identified a sophisticated MastaStealer campaign that exploits these shortcut files to deliver a full-featured C2 beacon while simultaneously turning off critical endpoint protections. The infection begins with a spear-phishing email containing a ZIP archive with […]
The post MastaStealer Exploits Windows LNK to Launch PowerShell and Bypass Defender appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ИИ стал самостоятельным хакером. Теперь данные будет вымогать не школьник, а самообучающийся алгоритм
Update: Implementation Guidance for Emergency Directive on Cisco ASA and Firepower Device Vulnerabilities
CISA has released Emergency Cisco Directive 25-03 Implementation Guidance to assist federal agencies in addressing critical vulnerabilities in Cisco Adaptive Security Appliances (ASA) and Firepower devices. Emergency Directive 25-03: Identify and Mitigate Potential Compromise of Cisco Devices, issued on Sept. 25, identified known vulnerabilities CVE-2025-20333 and CVE-2025-20362, and mandated immediate action to mitigate risks. Threat actors continue to target these devices, posing significant risk to all organizations.
The implementation guidance provides information on the minimum software versions that address these vulnerabilities and direct federal agencies to conduct corrective patching measures on devices that are not compliant with these requirements. CISA is aware of multiple organizations that believed they had applied the necessary updates but had not in fact updated to the minimum software version. CISA recommends all organizations verify the correct updates are applied. For agencies with ASA or Firepower devices not yet updated to the necessary software versions or devices that were updated after September 26, 2025, CISA recommends additional actions to mitigate against ongoing and new threat activity. CISA urges all agencies with ASAs and Firepower devices to follow this guidance.
See Emergency Directive 25-03 Implementation Guidance and Temporary Risk Mitigation Guidance for Agencies in the Process of ED 25-03 Compliance for detailed recommendations and CISA’s RayDetect scanner to examine ASA core dumps for evidence of RayInitiator compromise.
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2025-9242 WatchGuard Firebox Out-of-Bounds Write Vulnerability
- CVE-2025-12480 Gladinet Triofox Improper Access Control Vulnerability
- CVE-2025-62215 Microsoft Windows Race Condition Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.