Loading HuntDB...

Threat Intelligence Report

5 Vulnerabilities
Friday, April 11, 2025 Report ID: 122
Actions:

Executive Summary

Today's security landscape is marked by several critical vulnerabilities. A significant vulnerability, CVE-2025-31498, was identified and subsequently patched in the c-ares DNS Library. This library is widely used in applications that require DNS lookup functionality, making this vulnerability a potential threat to a vast number of systems. Likewise, a severe vulnerability in Arista EOS (CVE-2024-12378) that exposes cleartext transmission was also identified, potentially leaving sensitive information open to interception.

In the realm of content management systems, Joomla users have been alerted to critical SQL Injection and Multi-Factor Authentication (MFA) bypass vulnerabilities. Such vulnerabilities could enable attackers to manipulate database queries or bypass security measures, leading to unauthorized access and potentially, data breaches. Concurrently, Jenkins Docker images were found to be vulnerable to SSH Host Key reuse, a weakness that could compromise the security of SSH communications. Moreover, details of a zero-day exploit (CVE-2025-22457) in Ivanti's products were released, potentially putting a wide range of enterprise systems at risk.

On a positive note, Microsoft announced enhanced security measures for Exchange and SharePoint through the integration of Anti-Malware Scan Interface (AMSI), which will strengthen these platforms' resilience against malware attacks. Nevertheless, today's security findings underscore the constant need for vigilance, timely patch management, and robust security measures in the face of evolving threats.

High Priority Threats

Critical Vulnerabilities

CVE-2024-12378

On affected platforms running Arista EOS with secure Vxlan configured, restarting the Tunnelsec agent will result in packets being sent …

CVSS: 9.1
CVE-2025-22457

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA …

CVSS: 9.0

High Impact Threats

Detailed Analysis

Today's security landscape is marked by several critical and high-severity vulnerabilities. Notably, a critical vulnerability CVE-2025-31498 has been patched in the c-ares DNS Library, a system that handles DNS requests for applications. This vulnerability had the potential to be extremely damaging as it could have led to remote code execution or denial of service attacks, compromising the security of applications dependent on this system. The cybersecurity community has also uncovered a critical vulnerability in Arista's EOS, a popular network operating system for large-scale networks. Designated as CVE-2024-12378, this vulnerability exposed cleartext transmission, making network communication susceptible to eavesdropping and data theft. The vulnerability has since been addressed, but it underscores the importance of implementing robust encryption measures in network communication. In response to ongoing threats, Microsoft has enhanced its Exchange and SharePoint security with the integration of Anti-Malware Scanning Interface (AMSI). This move is a proactive measure to strengthen the security of these widely used platforms against malware threats and potentially prevent high-profile breaches. Continuing with the theme of critical vulnerabilities, Spotfire products have been found to contain two critical vulnerabilities (CVE-2025-3114, CVE-2025-3115) that could allow malicious code execution. Spotfire, a data visualization tool, is commonly used in business intelligence and analytics, making these vulnerabilities particularly concerning for enterprises. In the sphere of web content management systems, Joomla has been hit with a security alert. A critical SQL injection vulnerability has been discovered, along with a multi-factor authentication bypass vulnerability. If exploited, these vulnerabilities could compromise the security of websites running on Joomla, potentially leading to unauthorized access and data breaches. In Docker-related news, Jenkins Docker images have been found to be vulnerable to SSH host key reuse. This vulnerability can allow an attacker to impersonate the Jenkins Docker image and potentially gain unauthorized access to sensitive information or systems. Jenkins has been notified of this vulnerability and is currently working on a patch. Lastly, the details of a zero-day exploit for a vulnerability in Ivanti (CVE-2025-22457) have been released. Ivanti, a software company specializing in IT management, has yet to release a patch for this vulnerability, leaving its users potentially exposed. Organizations using Ivanti's software should monitor developments closely and be prepared to take immediate action once a patch is released. In conclusion, today's security landscape is riddled with critical and high-severity vulnerabilities across a range of platforms and systems. These vulnerabilities underscore the importance of continuous monitoring, timely patching, and proactive defense measures in maintaining cybersecurity.

Related Vulnerabilities

CRITICAL CVSS: 9.1

Description:

On affected platforms running Arista EOS with secure Vxlan configured, restarting the Tunnelsec agent will result in packets being sent over the secure Vxlan tunnels in the clear.

Affected Products
  • Arista Networks CloudVision Portal
Exploitation Risk
EPSS: 0.0%

Probability of exploitation in next 30 days

CRITICAL CVSS: 9.0 KEV

Description:

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.

Affected Products
  • Ivanti Connect Secure
  • Ivanti Policy Secure
  • Ivanti Neurons for ZTA gateways
Exploitation Risk
EPSS: 26.0%

Probability of exploitation in next 30 days

Description:

Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions. Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution

Affected Products
  • Spotfire Spotfire Statistics Services
  • Spotfire Spotfire Analyst
  • Spotfire Deployment Kit used in Spotfire Server
  • ... and 5 more
Exploitation Risk
EPSS: 0.0%

Probability of exploitation in next 30 days

Description:

Code Execution via Malicious Files: Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise. Sandbox Bypass Vulnerability: A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls.

Affected Products
  • Spotfire Spotfire Enterprise Runtime for R
  • Spotfire Spotfire Statistics Services
  • Spotfire Spotfire Analyst
  • ... and 4 more
Exploitation Risk
EPSS: 0.0%

Probability of exploitation in next 30 days

Description:

c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5.

Affected Products
  • c-ares c-ares
Exploitation Risk
EPSS: 0.0%

Probability of exploitation in next 30 days

Generated: April 11, 2025 06:00
Copied to clipboard!