• A proof-of-concept (PoC) exploit has been released for a critical vulnerability in Microsoft’s Windows Server Update Services (WSUS), enabling unauthenticated attackers to execute remote code with SYSTEM privileges on affected servers.

    Dubbed CVE-2025-59287 and assigned a CVSS v3.1 score of 9.8, the flaw stems from unsafe deserialization of untrusted data in WSUS’s AuthorizationCookie handling.

    Disclosed as part of Microsoft’s October 2025 Patch Tuesday, this vulnerability poses severe risks to enterprise update infrastructures, potentially allowing widespread compromise.​

    WSUS is a server role in Windows Server that helps IT administrators deploy Microsoft updates across networks, ensuring systems remain patched and secure.

    Despite being deprecated for new features, WSUS remains widely used in production environments and receives ongoing security support.

    The vulnerability affects all supported Windows Server versions from 2012 to 2025, where the GetCookie() endpoint processes encrypted AuthorizationCookie objects without adequate validation.​

    At its core, CVE-2025-59287 exploits a deserialization issue in the EncryptionHelper.DecryptData() method. Incoming cookie data, encrypted with AES-128-CBC, is decrypted and then passed directly to .NET’s BinaryFormatter for deserialization.

    This legacy serializer lacks type restrictions, allowing attackers to craft malicious payloads that trigger arbitrary code execution upon processing. Microsoft classified the flaw as “Exploitation More Likely,” highlighting its wormable potential across networked WSUS servers.​

    The Attack Flow and PoC

    The exploit begins with an unauthenticated HTTP POST request to the WSUS ClientWebService endpoint on port 8530. Attackers send a SOAP envelope containing a tampered AuthorizationCookie with a PlugInId of “SimpleTargeting” and encrypted payload data.

    The server decrypts the cookie using a hardcoded key (“877C14E433638145AD21BD0C17393071”), strips the IV block, and deserializes the result via BinaryFormatter.​

    A publicly available PoC, shared by researcher “hawktrace” on GitHub, demonstrates payload generation in C#. It serializes a malicious delegate to launch “calc.exe” or similar commands, encrypts it without padding, and outputs a Base64-encoded string for the SOAP request.

    The trace reveals the call chain from Client.GetCookie() through AuthorizationManager to DecryptData(), where the deserialization occurs under SYSTEM context. No user interaction is needed, making it highly dangerous for exposed WSUS instances.​

    This RCE could enable supply-chain attacks, where compromised WSUS servers distribute malicious updates to clients. While no active exploits in the wild have been reported, the PoC’s availability increases the urgency for patching.

    Microsoft credits researcher “MEOW” for the discovery and urges immediate application of the October 2025 security updates via Windows Update or WSUS itself.​

    Organizations should isolate WSUS servers, enable firewalls to restrict access, and monitor for anomalous SOAP traffic. Long-term, Microsoft recommends migrating away from BinaryFormatter to safer alternatives like JSON or XML serializers with strict validation.

    As WSUS underpins critical update mechanisms, delaying patches risks broad network breaches in an era of escalating ransomware and nation-state threats.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post PoC Exploit Released for Windows Server Update Services Remote Code Execution Vulnerability appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • China on Sunday accused the U.S. National Security Agency (NSA) of carrying out a “premeditated” cyber attack targeting the National Time Service Center (NTSC), as it described the U.S. as a “hacker empire” and the “greatest source of chaos in cyberspace.” The Ministry of State Security (MSS), in a WeChat post, said it uncovered “irrefutable evidence” of the agency’s involvement in the intrusion

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new tool called DefenderWrite exploits whitelisted Windows programs to bypass protections and write arbitrary files into antivirus executable folders, potentially enabling malware persistence and evasion.

    Developed by cybersecurity expert Two Seven One Three, the tool demonstrates a novel technique for penetration testers and red teams to drop payloads in highly protected locations without needing kernel-level access.​

    This development highlights ongoing challenges in antivirus self-protection mechanisms, where folders housing AV executables are typically shielded from modifications to prevent tampering.

    By identifying system programs that antivirus vendors whitelist for updates and installations, attackers can leverage these exceptions to inject malicious DLLs, turning the AV’s own safeguards against it.

    The tool’s release, shared via GitHub, has sparked discussions on the balance between operational necessities for AV software and security risks in enterprise environments.​

    Exploiting Whitelisted Programs for Arbitrary Writes

    The core innovation behind DefenderWrite lies in systematically scanning Windows executables to find those permitted to access AV folders.

    By enumerating all .exe files in directories like C:\Windows, then use process creation and remote DLL injection to test write capabilities into protected paths.

    A custom DLL performs the file write operation and reports success or failure, allowing the tool to pinpoint exploitable processes like msiexec.exe without triggering defenses.​

    In testing on Windows 11 24H2 with Microsoft Defender version 4.18.25070.5-0, the method identified four such programs: msiexec.exe, Register-CimProvider.exe, svchost.exe, and lsass.exe.

    For instance, launching msiexec.exe and injecting the DLL enables writing a file directly into Defender’s installation directory, as demonstrated in lab experiments.

    This approach extends beyond Microsoft Defender; similar whitelisting vulnerabilities were confirmed in BitDefender, TrendMicro Antivirus Plus, and Avast, though specific details remain undisclosed to encourage independent verification.

    DefenderWrite supports key parameters for targeted operations, including TargetExePath for the host executable, FullDLLPath for the injectable library, and FileToWrite for the destination path within the AV folder. An optional “c” flag simplifies copying the DLL to the specified location remotely.

    Accompanying the binary is a PowerShell script, Run_Check.ps1, which automates scanning C:\Windows executables and logging whitelisted ones for further exploitation.

    Users can customize the script for their environment, making it suitable for red team simulations or defensive assessments.

    The GitHub repository provides full source code and documentation, emphasizing ethical use in authorized testing only. Two Seven One Three, active on X as @TwoSevenOneT, shares additional pentest insights and encourages community experiments to strengthen AV resilience.​

    Once a malicious payload resides in an AV folder, it benefits from the same exceptions that shield legitimate files, evading scans and potentially achieving long-term persistence.

    This technique underscores the need for vendors to audit whitelisting policies and implement stricter process isolation during updates. While not a zero-day vulnerability, DefenderWrite reveals systemic gaps that could aid real-world attacks if unaddressed.​

    Organizations should monitor AV update mechanisms and consider layered defenses beyond traditional file permissions. With the tool’s open availability, expect broader adoption in security research circles to push for improved protections across popular antivirus solutions.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post New DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft’s latest cumulative update for Windows 11, KB5066835, is causing significant disruptions for users, most notably by rendering USB keyboards and mice useless within the Windows Recovery Environment (WinRE). The patch, released on October 14, 2025, affects Windows 11 versions 24H2 and 25H2, along with Windows Server 2025, creating a critical roadblock for system troubleshooting […]

    The post Windows 11 24H2/25H2 Update Breaks Mouse and Keyboard in Recovery Mode appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Volkswagen Group is investigating claims from the 8Base ransomware group, which asserts it has stolen sensitive company data. While the German automaker has stated that its core IT systems are secure, its response leaves open the possibility of a breach through a third-party supplier, raising concerns about the full extent of the incident. The Ransomware […]

    The post Volkswagen Allegedly Hacked in Ransomware Attack as 8Base Claims Data Leak appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A high-severity vulnerability in the Pluggable Authentication Modules (PAM) framework was assigned the identifier CVE-2025-8941.

    This vulnerability stems from the heart of Linux operating systems, enabling attackers with local access to exploit symlink attacks and race conditions for full root privilege escalation.

    Root access, the ideal of control in Unix-like environments, could open doors to widespread system compromise and data breaches, underscoring the risks in even the most trusted open-source tools.

    Security researchers warn that this issue demands immediate attention, especially for servers and desktops relying on Linux-PAM for user authentication.

    Local users might become superusers, raising concerns for both corporate networks and personal devices. The disclosure of this flaw shows the ongoing difficulties in securing authentication systems as threats continue to change.

    CVE-2025-8941 earns a high severity rating of 7.8 on the CVSS v3.1 scale, reflecting its potential for devastating effects. It requires local access and low privileges but demands some user interaction, making it a stealthy risk in shared environments.

    AspectDetails
    CVE IDCVE-2025-8941
    SeverityHigh (7.8 CVSS Score)
    Attack VectorLocal
    Privileges RequiredLow
    User InteractionRequired
    ImpactSystem compromise, data leakage

    Affected systems include all versions of Linux-PAM prior to the latest patches, spanning distributions like Ubuntu, Fedora, and Red Hat Enterprise Linux. No remote exploitation is possible, but the local pathway amplifies dangers in multi-user setups.

    According to Ameeba’s blog, the vulnerability resides in the pam_namespace module, which manages namespaces for user sessions.

    A mishandling of user-controlled paths allows crafty attackers to insert symbolic links that hijack directory creation processes.

    By exploiting a race condition where timing aligns perfectly, the attacker tricks the system into building sensitive structures on the root filesystem.

    To understand the mechanics, let’s look at a simplified example in pseudocode:

    text# Attacker creates a symlink in a user-controlled path
    ln -s /root /tmp/victim/symlink
    
    # Race condition triggers during pam_namespace directory creation
    # If timed correctly, the directory lands in root's domain
    # Attacker escalates via modified permissions
    chmod 777 /root
    

    Real-world exploitation would require sophisticated scripting and precise synchronization, but success grants root-level control, enabling malware deployment or data exfiltration.

    The best defense is swift patching from distribution vendors, expected imminently for most Linux variants. Until then, administrators should audit local user privileges, disable unnecessary pam_namespace features, and monitor for suspicious symlink activity using tools like auditd.

    While web application firewalls (WAFs) or intrusion detection systems (IDS) offer partial shields against related threats, they fall short of local exploits that bypass network layers. Experts urge organizations to prioritize this in their patch management cycles to avert potential chaos.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • WatchGuard has disclosed a critical out-of-bounds write vulnerability in its Fireware OS, enabling remote unauthenticated attackers to execute arbitrary code via IKEv2 VPN connections.

    Designated CVE-2025-9242 under advisory WGSA-2025-00015, the flaw carries a CVSS 4.0 score of 9.3, highlighting its potential for high-impact exploitation on Firebox appliances.

    Published on September 17, 2025, and updated two days later, this issue affects versions from 11.10.2 to 11.12.4_Update1, 12.0 to 12.11.3, and 2025.1, exposing thousands of small and midsize enterprises to risks like full system compromise.

    WatchGuard, which secures over 250,000 organizations and 10 million endpoints, urges immediate patching to mitigate threats from ransomware or other malicious actors targeting perimeter defenses.

    The vulnerability resides in the IKE process of Fireware OS, which handles IKEv2 negotiations for mobile users and branch office VPNs configured with dynamic gateway peers.

    WatchGuard VPN Vulnerability

    An attacker can send crafted IKE_SA_INIT and IKE_SA_AUTH packets to trigger an out-of-bounds write in the ike2_ProcessPayload_CERT function, where attacker-controlled identification data overflows a 520-byte stack buffer without sufficient bounds checking.

    Even deleted VPN configurations may leave residual vulnerabilities if static peers remain active, allowing pre-authentication access over UDP port 500.

    Security researchers at WatchTowr Labs, crediting btaol for discovery, reverse-engineered the code through patch diffing between vulnerable 12.11.3 and patched 12.11.4 versions, revealing a simple length check addition as the fix.

    This stack-based buffer overflow, a primitive dating back to 1996, persists in 2025 enterprise gear lacking modern mitigations like PIE or stack canaries, though NX is enabled.

    Exploiting CVE-2025-9242 involves fingerprinting the firmware version via a custom Vendor ID payload in IKE_SA_INIT responses, which embeds base64-encoded details like “VN=12.11.3 BN=719894” for easy identification.

    Attackers then negotiate transforms such as AES-256 and Diffie-Hellman Group 14 before sending an oversized identification payload in IKE_SA_AUTH to corrupt registers and hijack control flow, leading to a segmentation fault or ROP chain.

    WatchTowr demonstrated remote code execution by chaining gadgets to invoke mprotect for stack execution, deploying reverse TCP shellcode that spawns a root Python interpreter, potentially enabling filesystem remounts or BusyBox downloads for full shell access.

    Firebox devices, often the internet-facing boundary, amplify risks; a breach could pivot to internal networks, data exfiltration, or persistent backdoors in environments without robust segmentation.

    Mitigations

    WatchGuard has resolved the issue in updated releases: 2025.1.1 for the 2025 branch, 12.11.4 for 12.x, 12.5.13 for T15/T35 models, and 12.3.1_Update3 for FIPS-certified 12.3.1, with 11.x now end-of-life.

    Affected products span Firebox families, including T20 to M690 series, Cloud, and NV5/V models.

    As a temporary workaround, organizations should secure IPSec/IKEv2 branch office VPNs per WatchGuard’s KB article on access controls, disabling unnecessary IKEv2 if possible.

    No in-the-wild exploits are confirmed yet, but the unauthenticated nature and detailed public analysis heighten urgency; users must monitor logs for anomalous IKE traffic and apply patches promptly to safeguard VPN concentrators serving as critical gateways.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post WatchGuard VPN Vulnerability Let Remote Attacker Execute Arbitrary Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Europol on Friday announced the disruption of a sophisticated cybercrime-as-a-service (CaaS) platform that operated a SIM farm and enabled its customers to carry out a broad spectrum of crimes ranging from phishing to investment fraud. The coordinated law enforcement effort, dubbed Operation SIMCARTEL, saw 26 searches carried out, resulting in the arrest of seven suspects and the seizure of

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Volkswagen Group has issued a statement addressing claims by the ransomware group 8Base, which alleges it has stolen and leaked sensitive data from the automaker.

    The German carmaker maintains that its core IT infrastructure remains unaffected; however, the company’s vague response leaves questions about the full scope of the incident and raises concerns about a possible third-party compromise.​

    The ransomware operation 8Base, active since early 2023, surfaced in September 2024 with assertions of a major breach at Volkswagen, one of the world’s largest automakers.

    The group, known for its Phobos ransomware variant and double-extortion tactics, claimed to have exfiltrated a trove of confidential files on September 23, 2024, and threatened public release by September 26.

    8Base Ransomware Claim
    8Base Ransomware Claim

    Despite the deadline passing without leaked samples, 8Base listed the stolen data on its dark web site, including invoices, receipts, accounting documents, personal employee files, employment contracts, certificates, personnel records, and numerous confidentiality agreements.

    This alleged claim could encompass financial records and sensitive personal information from Volkswagen’s global operations, spanning brands like Audi, Porsche, Bentley, Lamborghini, Skoda, SEAT, and Cupra.​

    Security experts note that 8Base operates more as a data extortion crew than a traditional encryptor, focusing on theft and threats to pressure victims into payment.

    The group has targeted over 400 organizations since its emergence, often gaining initial access via phishing or buying credentials from initial access brokers. ​

    Volkswagen’s Response

    Volkswagen’s spokesperson confirmed awareness of the “incident” but emphasized no impact on the company’s primary IT systems, hinting at a possible compromise through a supplier, partner, or subsidiary.

    The automaker, headquartered in Wolfsburg, Germany, operates 153 production plants worldwide and employs hundreds of thousands, making any data exposure a high-stakes issue.

    While no customer data breach has been reported, the inclusion of personal and financial details raises alarms under the EU’s GDPR, potentially leading to fines up to 4% of global revenue if substantiated.​

    Cybersecurity firms urge enhanced third-party risk management and monitoring, as such attacks often exploit weaker links in supply chains.

    As investigations continue, the incident underscores the escalating threats to critical industries like automotive manufacturing.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Volkswagen Allegedly Hit by Ransomware Attack as 8Base Claims Sensitive Data Theft appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft’s latest security update has rendered USB keyboards and mice inoperable within the Windows Recovery Environment (WinRE).

    Released on October 14, 2025, as KB5066835 for OS Build 26100.6899, the patch affects Windows 11 versions 24H2 and 25H2, as well as Windows Server 2025.

    The glitch emerged shortly after installation, leaving users unable to navigate recovery options during system troubleshooting.

    The problem surfaces specifically in WinRE, a critical boot mode for repairing boot failures, resetting PCs, or restoring from backups. USB input devices function normally in everyday Windows sessions but fail entirely in this environment.

    Reports indicate that affected users see their mice and keyboards go unresponsive, blocking access to menus and commands. This issue was confirmed and publicly acknowledged by Microsoft on October 17, 2025, highlighting the urgency for those relying on stable recovery tools.

    Beyond the recovery issues, KB5066835 has triggered a flood of other problems. Network diagnostics reveal localhost connections refusing to establish, complicating local development and testing workflows.

    Installation attempts often fail with cryptic errors, forcing some users to roll back the update manually. File Explorer’s preview pane, a handy feature for quick file inspections, now displays blank or unresponsive previews, hampering productivity.

    User forums and social media buzz with complaints of sluggish performance, including delayed app launches and erratic multitasking. These reports span consumer laptops to enterprise servers, underscoring the update’s wide-reaching effects.

    For IT administrators, the WinRE blockage poses a real risk during outage responses, potentially escalating minor issues into major downtime.

    Microsoft’s Response and Workarounds

    Microsoft has acknowledged the flaws and is actively developing fixes, with a resolution expected in the coming days. In the interim, the company advises avoiding WinRE entry if possible and using alternative recovery methods, such as booting from installation media with working peripherals.

    For those already impacted, uninstalling KB5066835 via Settings > Update & Security > View update history offers temporary relief, though it reopens security vulnerabilities.

    This incident echoes past Windows update woes, reminding users to pause automatic patches during critical periods. As patches roll out, affected individuals should monitor official channels for updates to restore full functionality.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Windows 11 24H2/25H2 Update Blocks Mouse and Keyboard in Recovery Mode appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶