Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025

The US Demonrates Danabot Malf

May 23, 2025

Duo Gitlab’s vulnerability allowed the attackers to steal AI with hidden tips

May 23, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Unslaw the deficiencies of the Versa concert allow the attackers to avoid the dockery and the compromise host
Global Security

Unslaw the deficiencies of the Versa concert allow the attackers to avoid the dockery and the compromise host

AdminBy AdminMay 22, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 22, 2025Red LakshmananVulnerability / safety software

Cybersecurity researchers have identified several critical security vulnerabilities that affect the Versa Concerto security platform and the SD-Wan orchestration platform that can be used to take control of sensitive instances.

It is worth noting that on February 13, 2025, the identified deficiencies remained unwavering, causing public issues after the expiration of the 90-day term.

“These vulnerabilities, when chained together, can allow the attacker to fully jeopardize both the application and the main system of the host” – Note In a report that shared with Hacker News.

Cybersecurity

Security defects are given below –

  • Cve-2025-34025 (CVSS assessment: 8.6) – Escalation of privileges and vulnerability of the Docker Docker container, caused by a dangerous default binary tract and can be used to obtain the code on the main owner
  • Cve-2025-34026 (CVSS assessment: 9.2) – Vulnerability of Authentification Passage in the back -proxy configuration – TRAEFIK Editing, which allows the attacker to access administrative end points, which can then be used to access the bumpy landfills and magazines using an internal spring boot point Cve-2024-45410
  • Cve-2025-34027 (CVSS assessment: 10.0) – vulnerability of the authentication passage in back -proxy -Prox configuration, which allows the attacker to access administrative end points, which can then be used to achieve the remote code using the final point associated with the package (“/Porthalapi/V1/Pack/Said/Download/Download”) Files “) using arbitration files”) using the package “) using the package (portalop/pack/spoke/boot”) via arbitration files associated with arbitration files “) through arbitral files”))

Successful CVE-2025-34027 operations can allow the attacker to use the race conditions and write malicious files on the disk, causing the deleted code using the LD_PRELOAD and the reverse shell.

“Our approach envisaged a rewrite ../../../../…/etc/ld.so.Preload with the way indicating the /tmp/hook.so,” the researchers said. “At the same time we downloaded /tp/hook.so, which contained a compiled C Binary for the back. Since our request has summoned two file recording operations, we used this to make sure that both files were written within one request.”

Cybersecurity

“Once these files have been successfully recorded, any team execution in the system, while both are stored, will lead to /tp/hook.so, thus giving us the back.”

In the absence of official correction, the users are advised to block the comma in the way URL and the drop requests where the connection title contains the X-Real-I value. It is also recommended to control network traffic and magazines for any suspicious activity.

The Hacker News addressed Versa Networks for comments and we will update the story when we hear back.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025

The US Demonrates Danabot Malf

May 23, 2025

Duo Gitlab’s vulnerability allowed the attackers to steal AI with hidden tips

May 23, 2025

CISA warns of suspicion of extensive Saas attacks that exploit app secrets and incorrect cloud settings

May 23, 2025

Chinese hackers operate the shortage of CityWorks Trimble to penetrate the US public networks

May 22, 2025

Learn how to create a reasonable and legitimate defense program

May 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025

The US Demonrates Danabot Malf

May 23, 2025

Duo Gitlab’s vulnerability allowed the attackers to steal AI with hidden tips

May 23, 2025

CISA warns of suspicion of extensive Saas attacks that exploit app secrets and incorrect cloud settings

May 23, 2025

Chinese hackers operate the shortage of CityWorks Trimble to penetrate the US public networks

May 22, 2025

Unslaw the deficiencies of the Versa concert allow the attackers to avoid the dockery and the compromise host

May 22, 2025

Learn how to create a reasonable and legitimate defense program

May 22, 2025

Critical vulnerability Windows Server 2025 DMSA provides compromise Active Directory

May 22, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025

The US Demonrates Danabot Malf

May 23, 2025

Duo Gitlab’s vulnerability allowed the attackers to steal AI with hidden tips

May 23, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.