Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Vulnerabilities and Exploits. Show all posts

Foxit Publishes Security Patches for PDF Editor Cloud XSS Bugs


 

In response to findings that exposed weaknesses in the way user-supplied data was processed within interactive components, Foxit Software has issued a set of security fixes intended to address newly identified cross-site scripting vulnerabilities. 

Due to the flaws in Foxit PDF Editor Cloud and Foxit eSign, maliciously crafted input could be rendered in an unsafe manner in the user's browser, potentially allowing arbitrary JavaScript execution during authenticated sessions. 

The fundamental problem was an inconsistency in input validation and output encoding in some UI elements (most notably file attachment metadata and layer naming logic), which enabled attacker-controlled payloads to persist and be triggered during routine user interactions. 

Among these issues, the most important one, CVE-2026-1591, affected the File Attachments list and Layers panel of Foxit PDF Editor Cloud, thus emphasizing the importance of rigorously enforcing client-side trust boundaries in order to prevent the use of seemingly low-risk document features as attack vectors. 

These findings were supported by Foxit's confirmation that the identified weaknesses were related to a specific way in which certain client-side components handled untrusted input within a cloud environment. Affected functionality allowed for the processing of user-controlled values — specifically file attachment names and PDF layer identifiers — without sufficient validation or encoding prior to rendering in the browser. 

By injecting carefully constructed payloads into the application's HTML context, carefully constructed payloads could be executed upon the interaction between an authenticated user and the affected interface components. In response to these security deficiencies, Foxit published its latest security updates, which it described as routine security and stability enhancements that require no remediation other than ensuring deployments are up to date. 

The advisory also identifies two vulnerabilities, tracked as CVE-2026-1591 and CVE-2026-1592, which are both classified under CWE-79 for cross-site scripting vulnerabilities. Each vulnerability has a CVSS v3.0 score of 6.3 and is rated Moderate in severity according to the advisory. 

Foxit PDF Editor Cloud is impacted by CVE-2026-1591, which has a significant impact on its File Attachments and Layers panels due to insufficient input validation and improper output encoding which can allow arbitrary JavaScript execution from the browser. 

The vulnerability CVE-2026-1592 poses a comparable risk through similar paths to data handling. Both vulnerabilities were identified and responsibly disclosed by Novee, a security researcher. However, the potential consequences of exploitation are not trivial, even if user interaction is required. In order to inject a script into a trusted browser context, an attacker would have to persuade a logged-in user to open or interact with a specially crafted attachment or altered layer configuration. 

By executing this script, an attacker can hijack a session, obtain unauthorized access to sensitive document data, or redirect the user to an attacker-controlled resource. As a result, the client-side trust assumptions made by document collaboration platforms pose a broader risk, particularly where dynamic document metadata is not rigorously sanitized. 

During the disclosure period, the source material did not enumerate specific CVE identifiers for each individual flaw, apart from those referenced in the advisory. The vulnerability involved in cross-site scripting has been extensively documented across a wide array of web-based applications and is routinely cataloged in public vulnerability databases such as MITRE's CVE repository.

XSS vulnerabilities in unrelated platforms, such as those described in CVE-2023-38545 and CVE-2023-38546, underscore the broader mechanics and effects of this attack category. This type of example is not directly related to Foxit products, but nevertheless is useful for gaining an understanding of how similar weaknesses may be exploited when web-rendered interfaces mishandle user-controlled data. 


Technically, Foxit PDF Editor Cloud is exploitable via the way it ingests, stores, and renders user-supplied metadata within interactive components like the File Attachments list and Layers dialog box. If input is not rigorously validated, an attacker may embed executable content (such as script tags or event handlers) into attachment filenames or layer names embedded within a PDF file without rigorous input validation. 

Upon presenting these values to the browser without appropriate output encoding, the application unintentionally enables the browser to interpret the injected content as active HTML or JavaScript as opposed to inert text. As soon as the malicious script has been rendered, it is executed within the security context of the authenticated user's session. 

The attacker can exploit the execution environment to gain access to session tokens and other sensitive browser information, manipulate the on-screen content, or redirect the user to unauthorized websites. Foxit cloud environments can be compromised with scripts that can perform unauthorized actions on behalf of users in more advanced scenarios. 

It is important to note that the risk is heightened by the low interaction threshold required to trigger exploitation, since simply opening or viewing a specially crafted document may trigger an injected payload, emphasizing the importance of robust client-side sanitization in cloud-based document platforms. 

These flaws are especially apparent in enterprise settings where Foxit PDF Editor Cloud is frequently integrated into day-to-day collaboration workflows. In such environments, employees exchange and modify documents sourced from customers, partners, and public repositories frequently, thereby increasing the risk that maliciously crafted PDFs could enter the ecosystem undetected. 

As part of its efforts to mitigate this broader risk, Foxit also publicly revealed and resolved a related cross-site scripting vulnerability in Foxit eSign, tracked as CVE-2025-66523, which was attributed to improper handling of URL parameters in specially constructed links. 

By enabling users to access these links with authenticated access, the untrusted input could be introduced into JavaScript code paths and HTML attributes without sufficient encoding, which could result in privilege escalation or cross-domain data exposure. A fix for this problem was released on January 15, 2026. 

Foxit confirmed that all identified vulnerabilities, including CVE-2026-1591, CVE-2026-1592, and CVE-2025-66523, have been fully addressed thanks to updates that strengthen both input validation and output encoding across all affected components. As a result of Foxit PDF Editor Cloud's automated updates or standard update mechanisms, customers are not required to perform any additional configuration changes. 

However, organizations are urged to verify that all instances are running the latest version of the application and remain alert for indicators such as unexpected JavaScript execution, anomalous editor behavior, or irregular entries in application logs which may indicate an attempt at exploitation.

Based on aggregate analysis, these issues are the result of a consistent breakdown in the platform's handling of user-controlled metadata during rendering of the File Attachments list and Layers panel. Insufficient validation controls allow attackers to introduce executable content through seemingly benign fields, such as attachment filenames or layer identifiers, through which malicious content may be introduced. This content, since it is not properly encoded, is interpreted by the browser as active code rather than plain text due to the lack of proper output encoding.

The injected JavaScript executes within the context of an authenticated session when triggered, resulting in a variety of outcomes, including data disclosure, interface manipulation, forced navigation, and unauthorised actions under the user's privilege. In addition to the low interaction threshold, the operational risks posed by these flaws are also highlighted by their limited access. 

While Foxit's remediation efforts address the immediate technical deficiencies, effective risk management extends beyond patch deployment alone. Organizations must ensure that all cloud-based instances are operating on current versions by applying updates promptly. 

In addition to these safeguards, other measures can be taken to minimize residual exposure, such as restricting document collaboration to trusted environments, enforcing browser content security policies, and monitoring application behavior for abnormal script execution.

Additional safeguards, such as web application firewalls and intrusion detection systems, are available at the perimeter of the network to prevent known injection patterns from reaching end users. Together with user education targeted at handling unsolicited documents and suspicious links, these measures can mitigate the broader threat posed by client-side injection vulnerabilities in collaborative documents.

Iconics SCADA Flaw Enables Privileged File Abuse and Windows DoS

 

A newly disclosed flaw in Mitsubishi Electric’s Iconics Suite SCADA platform, tracked as CVE-2025-0921, exposes critical industrial environments to denial-of-service attacks by abusing privileged file system operations in Windows-based engineering workstations. Rated with a CVSS score of 6.5, the vulnerability affects GENESIS64 deployments on Microsoft Windows versions 10.97.2 and earlier and could be combined with other weaknesses to corrupt essential system binaries and halt operations.

Researchers from Unit 42 discovered CVE-2025-0921 during an assessment of Iconics Suite, following an earlier set of five vulnerabilities they reported in versions 10.97.3 and below that enabled privilege escalation and system disruption. The latest bug resides in the way multiple Iconics services perform file system operations with elevated privileges, creating an opportunity for attackers with local, non‑admin access to direct these operations toward sensitive files. In industrial sectors such as automotive, energy and manufacturing, where Iconics SCADA is used to monitor and control processes, such misuse could severely impact system integrity and availability.

The core issue is a privileged file system operations vulnerability centered on the Pager Agent component of AlarmWorX64 MMX, which handles custom alerting via SMS and other pager protocols. Administrators configure SMS alerts using the PagerCfg.exe utility, including the path for an SMSLogFile where every SMS operation is logged. Under normal circumstances, the configuration file storing this path, IcoSetup64.ini in C:\ProgramData\ICONICS, should not be writable by standard users; however, when the legacy GenBroker32 component is installed, a previously documented flaw, CVE-2024-7587, grants any user full read-write access to this directory.

Unit 42 showed how an attacker could chain CVE-2025-0921 with CVE-2024-7587 to achieve a reliable denial-of-service condition on Windows. A local attacker first inspects IcoSetup64.ini to learn the SMSLogFile path, then creates a symbolic link from that log file to a critical binary, such as the cng.sys driver used by Microsoft’s Cryptography API: Next Generation. When an administrator later sends a test SMS or an alert fires automatically, the Pager Agent writes log data through the symbolic link into C:\Windows\System32\cng.sys, corrupting the driver so that the operating system fails to boot and becomes stuck in repair mode on reboot.

Even without the GenBroker32 installer misconfiguration, the researchers warn that CVE-2025-0921 remains dangerous if an attacker can make the log file path writable through other errors, alternative bugs or social engineering that changes permissions. They stress that privileged file system behaviors in OT environments are often underestimated, despite their potential to cause total system outages. Mitsubishi Electric has released an advisory and workarounds that address this and the previously reported issues, while Palo Alto Networks recommends hardening OT engineering workstations, segmenting SCADA systems with next-generation firewalls and leveraging OT security tools to detect and limit exploitation attempts.

Security Analysts Warn of Shadow Directory Techniques Targeting WordPress


 

Several theme-level vulnerabilities coupled with evolving abuse tactics are demonstrating once again how vulnerable WordPress becomes when multiple vulnerabilities are aligned. An unauthenticated file access and deletion vulnerability has been disclosed in the WPLMS theme-tracked as CVE-2024-10470 and assigned a CVSS score of 9.8-which has exposed thousands of learning management deployments. 

A significant risk exists as a result of the issue in more than 28,000 active installations, which enables attackers to read or remove sensitive files such as wp-config.php, thereby lowering the barrier to full site compromise, data exposure, and operational disruption. 

Not only does the vulnerability itself pose a serious threat, but its intersection with a broader wave of hostile activity that has already targeted WordPress ecosystems at a significant scale makes this threat particularly acute. This is in keeping with recent research by Sucuri that shows threat actors are utilizing malicious JavaScript injections to weaponize distributed brute-force campaigns against compromised sites. 

Instead of attacking targets directly, injected code quietly conscripts unsuspecting web browsers, creating a distributed attack platform based on normal web traffic. Earlier campaigns were focused on crypto drainers and Web3 phishing redirects, but the latest iteration, which has been observed on over 700 websites, uses leaked and commonly used credentials to systematically brute-force additional WordPress installations, representing a dramatic shift from these earlier campaigns. 

This development demonstrates how critical theme vulnerabilities and indirect attack mechanisms are being combined to amplify impact, accelerate lateral spread, and undermine trust in compromised WordPress environments by chaining together critical theme vulnerabilities and indirect attack mechanisms.

It was discovered that the attackers had manipulated the way pages were rendered to specific visitors, rather than altering visible site content. During search engine results, valid titles and descriptions were replaced with casino- and gambling-related text, suggesting that this was done deliberately to poison the indexing of search engines. 

Notably, the spam did not appear on highly trafficked areas, such as the homepage or blog posts. In place of static, low-maintenance pages, it appeared on static, low-maintenance pages like About Us, Contact Us, Privacy Policy, and Terms & Conditions—sections that are generally static and rarely examined. Consequently, the placement alone indicates a deliberate attempt to avoid detection while maximising SEO abuse. 

Verification of the affected pages through the WordPress administrative interface revealed no signs of compromise. They retained their expected permalinks and the content displayed within the editor was entirely valid. Based on a direct review of the underlying database, including the records in the wp_posts table, it was determined that no unauthorized modifications had occurred to the content storage system. 

In the present state, there is little to explain why search engines index spam, while human visitors only see benign content, since neither the page source nor the database indicate any anomalies. A turning point occurred when investigators altered the browser’s User-Agent string to emulate a crawler’s behavior.

Consequently, the same URLs exhibited entirely different content when viewed under these conditions. Instead of displaying standard corporate or legal information, pages previously showing standard corporate or legal information appeared full-screen casino spam, confirming that cloaking has been implemented. 

By using this conditional delivery mechanism, attackers were able to target search engine bots selectively and conceal the malicious payload from site administrators and regular users. A deeper technical review indicated that the compromise extends beyond simple content injection and that it involves a more advanced method for manipulating the permalinks and page rendering logic within WordPress itself without leaving conventional forensic traces. 

As a result of a deeper technical analysis, the root cause was determined to be an envato-setup-export.php component of the WPLMS theme which lacked critical security controls. In this code, the zip_file parameter is not validated or sanitized, which enables an attacker to reference any file located on the server arbitrarily.

Once a target file is selected, the application logic proceeds to read its contents using the readfile() function before deleting it using the unlink() function. By executing this unsafe sequence, unauthenticated attackers are effectively capable of removing critical configuration files, including WordPress' configuration file, user-generated content, and other important assets from the site, thereby significantly weakening the site's security posture. This vulnerability has a broader impact than deleting isolated files. 

Upon removing the WordPress config.php file, WordPress will be placed in an installation state, as it will be disconnected from the existing database. By exploiting the setup process, an attacker can link the site with a database under his/her control, allowing full administrative control of the website. 

A file-handling vulnerability that initially appears to be a vulnerability is transformed into a complete site compromise that can result in data exfiltration, persistent backdoors, and abuse of trust among users. As the theme is widely deployed across multiple sectors, the vulnerability is a high-value target for both opportunistic and coordinated attacks, thereby amplifying the threat. 

Initially disclosed by security researcher Foxyyyy through Wordfence's Bug Bounty Program, Foxyyyy received a $900 bounty. Following this publication, Wordfence has issued a recommendation for all WPLMS users to upgrade to version 4.963 or later, which contains a fix for the vulnerability known as CVE-2024-10470. Because the flaw is global in scope and severe, administrators are encouraged to prioritize patching. 

As part of enhancing baseline defenses, security teams should harden servers and applications, maintain offline backups, enforce strong authentication practices, such as unique passwords and multi-factor authentication, and make sure that operating systems, plugins, and security signatures are fully updated. 

When similar vulnerabilities arise in the future, these measures are critical to reducing exploitation risk and limiting the blast radius. The malicious functionality was found to be completely hidden within an index.php file placed in fabricated directories which reflected legitimate WordPress permalinks as a result of the subsequent investigation. 

A traffic gatekeeper file serves as a dynamic gatekeeper, determining whether to serve authentic-looking content or spam payloads based on the nature of incoming requests. As a result of conditional logic, routine visits by site owners and regular users did not raise any immediate suspicion, while search engine crawlers were selectively given content that was designed to be indexed. 

A bot-detection routine, which was embedded at the heart of this mechanism, was designed to efficiently identify search engine traffic with an extremely high level of precision. The attackers specifically targeted multiple Google-related User-Agent strings in order to effectively differentiate search engine crawlers from human traffic. 

By identifying these identifiers in a request, the malware bypasses the legitimate page altogether and loads a secondary file directly into the browser, readme.txt, rendering its contents directly in the browser. 

While this file appeared harmless, it contained a complete HTML document containing spam content specifically designed to influence the rankings of search engines. In order to conceal the compromise, the malicious script instead included indexx.php, an HTML static capture of the original page for non-bot traffic. This approach portrayed the site as entirely normal to administrators and users, effectively cloaking the compromise. 

In addition, the readme.txt payload further emphasized the sophisticated nature of the campaign by providing deceptive information. A file containing more than 600 lines of HTML, JavaScript, and stolen styling elements impersonated a high authority online retail site spanning more than 600 lines. 

In addition to reusing CSS, metadata, and structural elements related to Etsy, the attackers attempted to add credibility to the webpage by using underlying content that promoted Indonesian gambling schemes referred to as "Slot Gacor." The attackers also inserted extensive Schema Markup, using JSON-LD, to enhance visibility in search results. 

In addition to creating fabricated product listings, aggregate ratings, and pricing information, the attackers effectively manipulated how search engine snippets portrayed the pages. Consequently, what was in fact a cloaked spam page could appear in search results presenting itself as an attractive, highly rated product, leading to an increase in click-through rates and an extension of infection lifespan. 

Instead of treating symptoms individually, remediation efforts focused on fully removing the malicious infrastructure. As a result of identifying and deleting all unauthorized directories that replicated WordPress permalinks, as well as the associated malicious files, the site was then tested using multiple User-Agent configurations, ensuring that content delivery was consistent and no longer dependent on the User-Agent configuration. 

A complete review of file permissions, resetting of all administrative, hosting, FTP, and database credentials was performed in parallel with the site owner's advice to request a fresh index from search engines upon completion of the cleanup. 

In addition, security specialists recommended that an extensive post-incident hardening process be implemented, including the removal of unknown user accounts, checking core WordPress files such as index.php and .htaccess, and regularly monitoring server logs for suspicious outbound connections. 

As part of the recommendations, additional safeguards were emphasized, including maintaining offline backups, updating all components, scanning administrator devices for malware, and deploying a Web Application Firewall to prevent cloaking-based campaigns from taking hold in the future, and reducing the likelihood of reinfection. 

According to the findings of subsequent investigation, the malicious functionality was completely contained within an index.php file located in fabricated directories that mimicked legitimate WordPress permalinks. By dynamically analyzing the nature of the incoming request, this file determined whether to serve authentic-looking page content or spam payload. 

Using conditional logic, routine visits by site owners and regular users did not raise suspicion, while search engine crawlers were given manipulated content intended for indexing selectively. As a key component of this methodology, a bot-detection routine was developed which was capable of identifying search engine traffic with high precision. 

As a result of the attackers' explicit targeting of multiple Google-related User-Agent strings, they have been able to identify crawlers from human users reliably. In response to a request matching these identifiers, the malware bypassed the legitimate site entirely and loaded a secondary file, readme.txt, which was displayed directly in the browser. 

However, the file contained an entire HTML document with spam content designed to influence search engine rankings despite its seemingly innocent name. In order to conceal the compromise, the malicious script instead included indexx.php, an HTML static capture of the original page for non-bot traffic. This approach portrayed the site as entirely normal to administrators and users, effectively cloaking the compromise.

In addition, the readme.txt payload further emphasized the sophisticated nature of the campaign by providing deceptive information. A file containing more than 600 lines of HTML, JavaScript, and stolen styling elements impersonated a high authority online retail site spanning more than 600 lines. 

In addition to reusing CSS, metadata, and structural elements related to Etsy, the attackers attempted to add credibility to the webpage by using underlying content that promoted Indonesian gambling schemes referred to as "Slot Gacor." The attackers also inserted extensive Schema Markup, using JSON-LD, to enhance visibility in search results. 

In addition to creating fabricated product listings, aggregate ratings, and pricing information, the attackers effectively manipulated how search engine snippets portrayed the pages. Due to this, what was in fact a cloaked spam page appeared in search results as a product that was perceived as legitimate and highly rated, resulting in increased click-throughs and prolonged infection.

In contrast to treating symptoms in isolation, remediation efforts focused on eliminating the malicious infrastructure completely. A comprehensive investigation of all unauthorized directories replicating WordPress permalinks was conducted, together with the associated malicious files, and all unauthorized directories were deleted. 

Following the verification of consistent content delivery, multiple User-Agent configurations were used to verify that any conditionality was eliminated. In parallel, file permissions were reviewed, all administrative, hosting, FTP, and database credentials were reset, and the website owner was instructed to request that search engines refresh their index once the cleanup had been completed.

Additionally, security specialists recommend that all WordPress user accounts be removed, core WordPress files such as index.php and .htaccess be verified, and server logs for suspicious outbound connections be monitored regularly. 

It is important to maintain offline backups, keep all components updated, scan administrator devices for malware, and deploy a Web Application Firewall as additional safeguards so that reinfection will be reduced and similar cloaking-based campaigns will not occur again. 

Overall, the investigation indicates how a number of weaknesses were purposefully chained together to create a highly resilient and covert compromise. This attack did not utilize overt defacement or obvious content injection, but rather exploited a critical WordPress theme vulnerability combined with cloaking techniques to manipulate WordPress' rendering of content in accordance with the visitor's identity. 

Using CVE-2024-10470 in the WPLMS theme, they were able to remove or access sensitive files, weakening the security of the site and creating conditions for deeper manipulation of data without altering it. Several recent Sucuri findings confirm the shift towards indirect abuse mechanisms in WordPress-focused attacks, which correspond with the broader campaign. 

A malicious JavaScript injection was used by threat actors to manipulate unsuspecting visitors' browsers, effectively converting legitimate traffic into a distributed attack network via JavaScript injections. The most recent phase of this activity was observed across over 700 compromised sites.

It utilised leaked and commonly used credentials to brute-force additional WordPress installations, despite earlier iterations focusing on crypto drainers and Web3 phishing redirections. This evolution shows a deliberate movement toward techniques that are scalable and low-noise, thus maximizing reach and minimizing immediate detection.

An extremely sophisticated cloaking component was implemented in the attack Malicious logic was incorporated into index.php files located in fabricated directories that were intended to mirror legitimate WordPress permalinks, providing access to legitimate permalinks as well as identifying search engine crawlers using multiple Google-specific User-Agent strings to serve as traffic gatekeepers. 

Upon identifying crawler traffic, an additional payload was served from a file deceptively titled readme.txt which contained a fully formatted HTML document that was optimized for search engine indexing. However, human visitors and site administrators received indexx.php, a static HTML snapshot of the legitimate page, thereby ensuring that the site appeared normal during routine inspections. 

Over 600 lines of code were incorporated into the spam payload in an effort to fool automated systems. Combining HTML, JavaScript, and stolen design elements created the illusion of an e-commerce platform with high authority. 

A number of technical components associated with Etsy, including CSS, metadata, and structural components, were reused by the attackers, together with extensive JSON-LD schema markup that contained fabricated product data, ratings, and pricing. As a result, the attackers manipulated how search engines interpreted and displayed the pages. 

The result was the presentation of cloaked gambling content-promoting Indonesian "Slot Gacor" schemes-as seemingly legitimate, highly rated listings in search results, increasing click-through rates and extending the lifespan of the infection. 

Rather than addressing individual symptoms, remediation efforts focused on dismantling the attack infrastructure as a whole. A thorough examination was conducted to identify and remove all unauthorized directories that replicated WordPress permalinks along with the malicious files associated with them.

Tests were conducted using a variety of user agents to confirm the removal of conditional content delivery. Additionally, site owners were advised to request re-indexing by search engines following cleanup by reviewing file permissions, resetting all administrative, hosting, FTP, and database credentials, as well as re-adjusting all administrative credentials.

The security specialists reiterated that post-incident hardening is extremely important in order to prevent recurrences. It was recommended that unknown user accounts be audited and removed, core WordPress files such as index.php and .htaccess be verified for integrity, server logs for suspicious outbound connections be monitored, offline backups be maintained, all components are kept up to date, malware is scanned on administrator systems, and a web application firewall be implemented. 

Collectively, these steps play a critical role in reducing the risk of reinfection and defending against future cloaking-related campaigns that increasingly blur the boundaries between content abuse, SEO manipulation, and the compromise of the entire site.

Threat Actors Target Misconfigured Proxies for Paid LLM Access

 

GreyNoise, a cybersecurity company, has discovered two campaigns against the infrastructure of large language models (LLMs) where the attackers used misconfigured proxies to gain illicit access to commercial AI services. Starting late December 2025, the attackers scanned over 73 LLM endpoints and had more than 80,000 sessions in 11 days, using harmless queries to evade detection. These efforts highlight the growing threat to AI systems as attackers begin to map vulnerable systems for potential exploitation. 

The first campaign, which started in October 2025, focused on server-side request forgery (SSRF) vulnerabilities in Ollama honeypots, resulting in a cumulative 91,403 attack sessions. The attackers used malicious registry URLs via Ollama’s model pull functionality and manipulated Twilio SMS webhooks to trigger outbound connections to their own infrastructure. A significant spike during Christmas resulted in 1,688 sessions over 48 hours from 62 IP addresses in 27 countries, using ProjectDiscovery’s OAST tools, indicating the involvement of grey-hat researchers rather than full-fledged malware attacks.

The second campaign began on December 28 from IP addresses 45.88.186.70 and 204.76.203.125. This campaign systematically scanned endpoints that supported OpenAI and Google Gemini API formats. The targets included leading providers such as OpenAI’s GPT-4o, Anthropic’s Claude series, Meta’s Llama 3.x, Google’s Gemini, Mistral, Google’s Gemini, Alibaba’s Qwen, Alibaba’s DeepSeek-R1, and xAI’s Grok. The attackers used low-noise queries like basic greetings or factual questions like “How many states in the US?” to identify models while avoiding detection systems. 

GreyNoise links the scanning IPs to prior CVE exploits, including CVE-2025-55182, indicating professional reconnaissance rather than casual probing.While no immediate exploitation or data theft was observed, the scale signals preparation for abuse, like free-riding on paid APIs or injecting malicious prompts. "Threat actors don't map infrastructure at this scale without plans to use that map," the report warns.

Organizations should restrict Ollama pulls to trusted registries, implement egress filtering, and block OAST domains like *.oast.live at DNS. Additional defenses include rate-limiting suspicious ASNs (e.g., AS210558, AS51396), monitoring JA4 fingerprints, and alerting on multi-endpoint probes. As AI surfaces expand, proactive securing of proxies and APIs is crucial to thwart these evolving threats.

Cisco Patches ISE XML Flaw with Public Exploit Code

 

Cisco has recently addressed a significant security vulnerability in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC), tracked as CVE-2026-20029. This medium-severity issue, scored at 4.9 out of 10, stems from improper XML parsing in the web-based management interface. Attackers with valid admin credentials could upload malicious XML files, enabling arbitrary file reads from the underlying operating system and exposing sensitive data.

The flaw poses a substantial risk to enterprise networks, where ISE is widely deployed for centralized access control. Enterprises rely on ISE to manage who and what accesses their infrastructure, making it a prime target for cybercriminals seeking to steal credentials or configuration files.Although no wild exploitation has been confirmed, public proof-of-concept (PoC) exploit code heightens the urgency, echoing patterns from prior ISE vulnerabilities.

Past incidents underscore ISE's appeal to threat actors. In November 2025, sophisticated attackers exploited a maximum-severity zero-day (CVSS 10/10) to deploy custom backdoor malware, bypassing authentication entirely. Similarly, June 2025 patches fixed critical flaws with public PoCs, including arbitrary code execution risks in ISE and related platforms. These events highlight persistent scrutiny on Cisco's network access tools.

Mitigation demands immediate patching, as no workarounds exist. Affected versions require specific updates: migrate pre-3.2 releases to fixed ones; apply Patch 8 for 3.2 and 3.3; use Patch 4 for 3.4; and note 3.5 is unaffected.Administrators must verify their ISE version and apply the precise patch to prevent data leaks, especially given the admin-credential prerequisite that insiders or compromised accounts could fulfill.

Organizations should prioritize auditing ISE deployments amid rising enterprise-targeted attacks. Regular vulnerability scans, credential hygiene, and monitoring for anomalous XML uploads are essential defenses. As PoC code circulates, patching remains the sole bulwark, reinforcing the need for swift action in securing network identities.

Chrome WebView Flaw Lets Hackers Bypass Security, Update Urgently Advised

 

Google has rolled out an urgent security fix for the Chrome browser to address a high severity flaw in the browser’s WebView tag. According to the tech firm, the flaw allows hackers to evade major browser security features to gain access to user data. Identified as CVE-2026-0628, the vulnerability in the browser occurs due to inadequate policy enforcement in the browser’s WebView tag. 

WebView is a very common feature in applications, and its primary purpose is to display web pages within those applications without having to launch a web browser. Therefore, it becomes a major entry point for hackers if not handled appropriately. This weakness in WebView has a high potential to cause malicious web content to transcend its security boundaries and compromise any sensitive data that applications within those security boundaries are processing. 

To fix the issue, Google has released Chrome version 143.0.7499.192/.193, targeting Windows and Mac users, as well as Linux users, through the stable channel, denoted as version 143.0.7499.192. However, users should not expect to get the update immediately, as it will be rolled out over the next few days and weeks. Instead, users should manually check and install the update as quickly as possible. Until a majority of users have installed the patch, Google will not release detailed information regarding the vulnerability, as this will prevent hackers from exploiting the problem.

End users are strongly advised to update Chrome by navigating to Settings > Help > About Google Chrome, where the browser will automatically look for and install the latest security fixes. Organizations managing fleets of Chrome installations should prioritize rapid deployment of this patch across their infrastructure to minimize exposure in WebView‑dependent applications. Failing to update promptly could leave both consumer and enterprise applications open to targeted attacks leveraging this vulnerability. 

Additionally, Google credits external security researchers who reported the bug and points to its continued investment in high-fidelity detectors such as AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, AFL to find bugs in early stages. The company also reiterates the importance of its bug bounty program, and invites the security community to responsibly disclose vulnerabilities to help make Chrome more secure for billions of users. This event goes to show that continual collaboration between vendors and researchers is the key to keeping pace with emerging threats.

Korean Air Employee Data Exposed in Cl0p Ransomware Supply-Chain Attack

 

Korean Air has acknowledged the theft of sensitive data belonging to 30,000 current and former employees in a serious data breach. The breach occurred via a supply-chain compromise at KC&D Service, the airline's former catering subsidiary. Hackers exploited a critical flaw in Oracle E-Business Suite, tracked as CVE-2025-61882, that enabled code execution remotely without requiring any user interaction or authentication to login. Cl0p ransomware operators claimed responsibility for the attack, and after ransom demands were apparently ignored, they dumped almost 500 GB of stolen archives on their dark web site. 

The intrusion occurred at KC&D, which, though it was sold to Hahn & Company in 2020, was still handling in-flight meals and duty-free services. Korean Air continues to own a 20% stake and has continued sharing employee data through KC&D's ERP server. The attackers targeted Oracle EBS versions 12.2.3 through 12.2.14 to bypass authentication and reach sensitive systems. The vulnerability was publicly disclosed in early October 2025, after initial exploitation that started in August. Although Oracle promptly released patches, the combination of late detection and widespread exposure caused data exfiltration to spread across many victims. 

The stolen information includes full names and bank account numbers, which increases the risk of identity theft, financial fraud and phishing attacks for those whose information was compromised. Importantly, no customer data, including flight records or payment information, was compromised, preventing wider impact on operations. Korean Air on Dec. 29, 2025, advised the employees to be cautious of scams and took emergency security measures, disconnecting the KC&D servers and filing a report with the Korea Internet and Security Agency (KISA).

This attack is reminiscent of the 2023 MOVEit Transfer breach conducted by Cl0p, a similar file-transfer exploit that resulted in the compromise of millions of records from hundreds of companies. Dozens of EBS victims have surfaced, including Envoy Air, Harvard University, Schneider Electric, Emerson, Cox Enterprises, Logitech, and Barts Health NHS Trust, underscoring the campaign's global scale. Cl0p, a Russia-nexus extortion group linked to FIN11, prioritizes data theft over encryption for high-value targets. 

The incident emphasizes enduring supply-chain risk in aviation and enterprise software, underscoring the importance of timely patching, third-party risk assessments, and zero-trust architectures. Korean Air Vice Chairman Woo Kee-hong confirmed full dedication to breach scoping and support for its employees in the midst of South Korea's wave of cyberattacks, which also targeted Coupang and SK Telecom in recent days. Organizations around the globe need to review their Oracle EBS exposures and keep an eye on Cl0p leak sites in order to reduce risk.

Critical MongoDB Flaw Allows Unauthenticated Memory Data Leaks

 


A critical security flaw in MongoDB could allow unauthenticated attackers to extract sensitive data directly from server memory, prompting urgent patching warnings from security researchers and the database vendor. 

The vulnerability, tracked as CVE-2025-14847, affects MongoDB’s implementation of zlib compression and exposes uninitialized heap memory to remote attackers without requiring login credentials. 

Researchers say the issue significantly lowers the barrier for exploitation and could lead to large scale data leaks if left unaddressed. According to security analyses published this week, the flaw exists in MongoDB’s network message decompression logic. By sending specially crafted network packets, an attacker can trigger MongoDB servers to return fragments of memory that were never intended to be shared. 

This memory may contain sensitive information such as user data, credentials, cryptographic material or internal application secrets. The vulnerability impacts a broad range of MongoDB versions across several major releases. 

Affected versions include MongoDB 8.2.0 through 8.2.2, 8.0.0 through 8.0.16, 7.0.0 through 7.0.27, 6.0.0 through 6.0.26, 5.0.0 through 5.0.31 and 4.4.0 through 4.4.29. Older branches including versions 4.2, 4.0 and 3.6 are also affected and do not have backported fixes. 

MongoDB has released patched versions to address the issue, including 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32 and 4.4.30. Security teams are being urged to upgrade immediately, particularly for servers exposed to the internet or reachable through internal network movement. 

For organizations unable to patch right away, MongoDB has recommended temporary mitigations. These include disabling zlib compression in the database configuration or switching to alternative compression algorithms such as Snappy or Zstandard. 

Administrators are also advised to close unused ports and restrict network access to MongoDB instances wherever possible. Technical reviews of the fix show that the vulnerability stemmed from incorrect handling of buffer sizes during decompression. 

The original code returned the size of allocated memory rather than the actual length of decompressed data, leading to unintended memory disclosure. 

The patch corrects this behavior by ensuring only valid data lengths are returned. Security researchers warn that while exploiting the flaw to extract large volumes of meaningful data may require repeated requests over time, the risk increases the longer a vulnerable server remains exposed. Any MongoDB deployment handling sensitive or regulated data is considered at elevated risk.