Threat Intelligence Report
5 VulnerabilitiesExecutive Summary
Today's security landscape is marked by several critical vulnerabilities. A significant vulnerability, CVE-2025-31498, was identified and subsequently patched in the c-ares DNS Library. This library is widely used in applications that require DNS lookup functionality, making this vulnerability a potential threat to a vast number of systems. Likewise, a severe vulnerability in Arista EOS (CVE-2024-12378) that exposes cleartext transmission was also identified, potentially leaving sensitive information open to interception.
In the realm of content management systems, Joomla users have been alerted to critical SQL Injection and Multi-Factor Authentication (MFA) bypass vulnerabilities. Such vulnerabilities could enable attackers to manipulate database queries or bypass security measures, leading to unauthorized access and potentially, data breaches. Concurrently, Jenkins Docker images were found to be vulnerable to SSH Host Key reuse, a weakness that could compromise the security of SSH communications. Moreover, details of a zero-day exploit (CVE-2025-22457) in Ivanti's products were released, potentially putting a wide range of enterprise systems at risk.
On a positive note, Microsoft announced enhanced security measures for Exchange and SharePoint through the integration of Anti-Malware Scan Interface (AMSI), which will strengthen these platforms' resilience against malware attacks. Nevertheless, today's security findings underscore the constant need for vigilance, timely patch management, and robust security measures in the face of evolving threats.
High Priority Threats
Critical Vulnerabilities
On affected platforms running Arista EOS with secure Vxlan configured, restarting the Tunnelsec agent will result in packets being sent …
CVSS: 9.1A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA …
CVSS: 9.0High Impact Threats
Detailed Analysis
Related Vulnerabilities
Description:
On affected platforms running Arista EOS with secure Vxlan configured, restarting the Tunnelsec agent will result in packets being sent over the secure Vxlan tunnels in the clear.
Affected Products
- Arista Networks CloudVision Portal
Exploitation Risk
Probability of exploitation in next 30 days
Description:
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.
Affected Products
- Ivanti Connect Secure
- Ivanti Policy Secure
- Ivanti Neurons for ZTA gateways
Exploitation Risk
Probability of exploitation in next 30 days
Description:
Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions. Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution
Affected Products
- Spotfire Spotfire Statistics Services
- Spotfire Spotfire Analyst
- Spotfire Deployment Kit used in Spotfire Server
- ... and 5 more
Exploitation Risk
Probability of exploitation in next 30 days
Description:
Code Execution via Malicious Files: Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise. Sandbox Bypass Vulnerability: A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls.
Affected Products
- Spotfire Spotfire Enterprise Runtime for R
- Spotfire Spotfire Statistics Services
- Spotfire Spotfire Analyst
- ... and 4 more
Exploitation Risk
Probability of exploitation in next 30 days
Description:
c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5.
Affected Products
- c-ares c-ares
Exploitation Risk
Probability of exploitation in next 30 days