• CISA has issued an urgent security advisory, adding Microsoft Windows privilege escalation vulnerability CVE-2021-43226 to its Known Exploited Vulnerabilities (KEV) catalog on October 6, 2025. 

    The vulnerability affects the Microsoft Windows Common Log File System (CLFS) Driver and poses significant security risks to enterprise environments.

    The CVE-2021-43226 vulnerability resides within Microsoft’s Common Log File System Driver, a core Windows component responsible for managing transaction logging operations. 

    Microsoft Windows Privilege Escalation Flaw (CVE-2021-43226)

    This privilege escalation flaw allows local, authenticated attackers with existing system access to bypass critical security mechanisms and elevate their privileges to SYSTEM level access.

    According to Microsoft’s Security Response Center, the vulnerability stems from improper validation of user-supplied data within the CLFS driver’s memory management routines. 

    Attackers can exploit this weakness by crafting malicious CLFS log files that trigger buffer overflow conditions, leading to arbitrary code execution with elevated privileges. 

    The exploit requires local access and standard user privileges as prerequisites, making it particularly dangerous in enterprise environments where attackers have already gained an initial foothold through phishing or social engineering attacks.

    The vulnerability affects multiple Windows versions, including Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022. 

    Security researchers have identified proof-of-concept exploit code circulating in underground forums, increasing the likelihood of active exploitation campaigns.

    Risk FactorsDetails
    Affected ProductsMicrosoft Windows 10 (all versions)Microsoft Windows 11 (all versions)Windows Server 2016Windows Server 2019Windows Server 2022Windows Server 2008 R2 SP1Windows 7 SP1
    ImpactPrivilege Escalation
    Exploit PrerequisitesLocal access to target system, Authenticated user account, Ability to execute code locally, Standard user privileges minimum
    CVSS 3.1 Score7.8 (High)

    Mitigations 

    CISA has established a mandatory remediation deadline of October 27, 2025, requiring federal agencies and critical infrastructure organizations to implement security patches immediately. 

    The directive follows Binding Operational Directive (BOD) 22-01 guidelines, which mandate swift action against vulnerabilities with evidence of active exploitation.

    Organizations must apply Microsoft’s security updates through the standard Windows Update mechanism or Windows Server Update Services (WSUS) for enterprise deployments. 

    System administrators should prioritize patching domain controllers, file servers, and other critical infrastructure components first. 

    For systems unable to receive immediate updates, Microsoft recommends implementing Application Control policies and Windows Defender Exploit Guard as temporary mitigations.

    The vulnerability’s addition to CISA’s KEV catalog indicates confirmed exploitation in real-world attack scenarios, though specific ransomware campaign attribution remains unknown. 

    Security teams should monitor for suspicious Event ID 4656 and 4658 logs indicating unauthorized file system access attempts, particularly involving CLFS-related processes like clfs.sys and clfsw32.dll.

    Organizations should conduct immediate vulnerability assessments using tools like Microsoft Baseline Security Analyzer or third-party scanners to identify vulnerable systems across their infrastructure.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The hacker collective styling itself “Scattered Lapsus$ Hunters”—an alliance echoing elements of ShinyHunters, Scattered Spider, and Lapsus$—has launched an extortionware portal to pressure victims into paying for delisting and purported deletion of stolen data. The group’s leverage centers on Salesforce datasets, reflecting months of intrusions achieved via social engineering, OAuth abuse, and downstream supply chain […]

    The post Hackers Launch Leak Portal to Publish Data Stolen from Salesforce Instances appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical zero-day vulnerability in GoAnywhere MFT’s License Servlet is being actively exploited to deploy Medusa ransomware. On September 18, 2025, Fortra released an advisory disclosing CVE-2025-10035, a deserialization flaw with a perfect CVSS score of 10.0. Threat actors tracked as Storm-1175 have abused this issue to gain remote code execution (RCE) on exposed systems, […]

    The post GoAnywhere 0-Day RCE Actively Exploited to Deliver Medusa Ransomware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new command injection vulnerability in OpenSSH, tracked as CVE-2025-61984, has been disclosed, which could allow an attacker to achieve remote code execution on a victim’s machine.

    The vulnerability is a bypass of a previous fix for a similar issue (CVE-2023-51385) and exploits how the ProxyCommand feature interacts with the underlying system shell when handling specially crafted usernames.

    The core of the vulnerability lies in OpenSSH’s failure to properly sanitize control characters, such as newlines, within usernames. An attacker can create a username that includes a newline character followed by a malicious command.

    This username is then passed to the shell via SSH’s ProxyCommand. While OpenSSH filters many dangerous shell metacharacters, it does not filter characters that could force a syntax error in certain shells.

    When a shell like Bash, Fish, or csh processes the ProxyCommand, the crafted syntax error on the first line, the command fails, but the shell does not exit.

    Instead, it proceeds to execute the command on the next line, which is the malicious payload supplied by the attacker. This behavior effectively bypasses security measures intended to prevent command execution, opening the door for an RCE.

    The Git Submodule Attack Vector

    The most practical exploitation scenario for CVE-2025-61984 involves a malicious Git repository. An attacker can configure a submodule within their repository to use a URL containing the malicious, multi-line username.

    If a victim clones this repository recursively (git clone --recursive), Git will attempt to connect via SSH to fetch the submodule. This triggers the vulnerability ProxyCommand if the user has a specific configuration.

    The exploit requires two conditions on the victim’s machine: a shell that continues execution after a syntax error (like Bash) and an SSH configuration file (~/.ssh/config) with a ProxyCommand that uses the %r token to include the remote username.

    Notably, the secure shell Zsh is not vulnerable to this technique as it terminates upon encountering such errors. Tools like Teleport have been found to generate SSH configurations that use this vulnerable pattern, potentially increasing the attack surface.

    Mitigations

    The OpenSSH project has released a patch in version 10.1 that fully addresses this vulnerability by disallowing control characters in usernames. All users are strongly urged to upgrade to this version or newer.

    For systems that cannot be immediately updated, several mitigations can be implemented.

    Users can edit their SSH configurations to enclose the %r token in single quotes ('%r') within any ProxyCommand directive, which prevents the shell from interpreting the special characters.

    Another effective defense-in-depth measure is to configure Git to restrict the automatic use of SSH for submodules.

    This vulnerability serves as a critical reminder of the complex security risks that can emerge from the interactions between trusted developer tools.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code – PoC Released appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The notorious Cl0p ransomware group has been actively exploiting a critical zero-day vulnerability in Oracle’s E-Business Suite (EBS), targeting enterprise customers through CVE-2025-61882. This sophisticated attack campaign has prompted Oracle to issue an emergency security advisory after reports surfaced that multiple organizations received extortion emails from the threat actors. Critical Zero-Day Vulnerability Exposed Oracle confirmed the exploitation […]

    The post Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The sophisticated China-linked threat actor Mustang Panda has refined its cyber espionage arsenal with an advanced DLL side-loading technique specifically targeting the Tibetan community, according to recent analysis of a campaign first identified by IBM’s X-Force in June 2025. This politically motivated operation demonstrates how threat actors continuously evolve their obfuscation methods to bypass security controls and […]

    The post Mustang Panda Adopts New DLL Side-Loading Method to Deploy Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Oracle has issued an emergency security alert for a critical zero-day vulnerability (CVE-2025-61882) in its E-Business Suite after the notorious Cl0p ransomware group began extorting customers who failed to patch their systems. 

    The vulnerability, carrying a maximum CVSS score of 9.8, affects the Business Intelligence Publisher (BI Publisher) Integration component and enables remote code execution without authentication.

    The vulnerability CVE-2025-61882 represents a significant threat to Oracle E-Business Suite deployments worldwide. Security researchers have confirmed that public proof-of-concept exploits are now available, dramatically increasing the risk for unpatched systems. 

    The flaw affects Oracle EBS versions 12.2.3 through 12.2.14, requiring organizations to implement Oracle’s October 2023 CPU as a prerequisite before applying the latest security patches.

    Tenable investigation revealed that Cl0p ransomware operators have been systematically targeting Oracle E-Business Suite installations, leveraging this zero-day vulnerability to gain unauthorized access to enterprise systems. 

    Cl0p Exploiting Unpatched Oracle EBS Vulnerability

    The attack campaign came to light when multiple Oracle customers received extortion emails from the Cl0p group, claiming to have successfully infiltrated their EBS environments and stolen sensitive business data.

    Tenable stated that the Oracle Concurrent Processing component vulnerability allows attackers to execute arbitrary code remotely without requiring authentication credentials, making it an attractive target for cybercriminals. 

    Security experts emphasize that the combination of widespread Oracle EBS deployment in enterprise environments and the vulnerability’s high severity score creates a perfect storm for large-scale attacks.

    The Cl0p ransomware group, also known as TA505 and FIN11, has established a pattern of targeting zero-day vulnerabilities in enterprise file transfer and business application software. 

    Previous campaigns successfully exploited vulnerabilities in Accellion, MOVEit Transfer, GoAnywhere, and Cleo platforms, demonstrating the group’s sophisticated capability to identify and weaponize high-impact security flaws.

    Risk FactorsDetails
    Affected ProductsOracle E-Business Suite, Business Intelligence Publisher (BI Publisher) Integration 12.2.3 through 12.2.14
    ImpactRemote Code Execution
    Exploit PrerequisitesNetwork access to Oracle EBS instance, No authentication required
    CVSS 3.1 Score9.8 (Critical)

    Mitigations

    Oracle’s security advisory includes multiple indicators of compromise (IOCs) to help organizations detect potential intrusions. 

    The company has released patches addressing not only CVE-2025-61882 but also nine additional vulnerabilities from the July 2025 Critical Patch Update that may have been exploited in conjunction with the zero-day flaw.

    Security teams must prioritize immediate patching of affected Oracle EBS systems, particularly given the availability of public exploits. 

    Organizations should also implement network monitoring for suspicious activity targeting the BI Publisher Integration component and review access logs for unauthorized administrative actions. 

    The incident underscores the critical importance of maintaining current patch levels and implementing defense-in-depth strategies to protect against zero-day exploitation campaigns.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day Vulnerability in the Wild appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The UK National Cyber Security Centre (NCSC) has issued a security alert following confirmation of active exploitation of a critical 0-day vulnerability, tracked as CVE-2025-61882, in Oracle E-Business Suite (EBS). Oracle has released an urgent security update to address the issue, underscoring the immediate risk to organisations running affected EBS versions. Critical Remote Code Execution Flaw in […]

    The post NCSC Issues Alert on Active Exploitation of Oracle E-Business Suite 0-Day Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A remote code execution vulnerability discovered in Redis, the widely-used in-memory data structure store, has sent shockwaves through the cybersecurity community. The flaw, designated CVE-2025-49844 and dubbed “RediShell” by researchers, carries the maximum CVSS 3.1 severity score of 10.0 and affects all Redis versions worldwide. 13-Year-Old Bug Creates Modern Security Crisis Wiz Research uncovered this […]

    The post 13-Year-Old Redis RCE Flaw Lets Attackers Seize Complete Host Control appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CrowdStrike on Monday said it’s attributing the exploitation of a recently disclosed security flaw in Oracle E-Business Suite with moderate confidence to a threat actor it tracks as Graceful Spider (aka Cl0p), and that the first known exploitation occurred on August 9, 2025. The exploitation involves the exploitation of CVE-2025-61882 (CVSS score: 9.8), a critical vulnerability that facilitates

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶