Threat Intelligence Report
2 VulnerabilitiesExecutive Summary
Today's summary of critical security findings is headlined by Siemens' remediation of a significant SQL injection vulnerability in its TeleControl Server Basic. These 66 flaws had the potential to allow an attacker to manipulate SQL queries, potentially leading to unauthorized access to sensitive data, data corruption, or even system shutdown, thereby posing a significant threat to operational efficiency. The swift remediation of these flaws is a step towards bolstering the security posture of Siemens' TeleControl Server Basic.
Hitachi Vantara also patched a critical resource injection flaw in Pentaho, addressing a potential vector for malicious entities to manipulate system resources or inject malicious code. Furthermore, there has been an alarming discovery of a Linux Kernel flaw (CVE-2024-53141) that enables privilege escalation. A proof-of-concept (PoC) has been released, raising the urgency to patch this vulnerability. An equally critical PoC was released for Erlang/OTP SSH vulnerability (CVE-2025-32433) that could enable remote code execution. This potentially puts systems at risk of being compromised and used as a launch pad for further attacks.
To conclude, today's critical security findings underline the necessity for organizations to maintain an up-to-date, robust security infrastructure and to respond promptly to vulnerability reports. Ensuring regular patch management and security audits can mitigate the implications of these high-severity vulnerabilities, thereby safeguarding valuable organizational data and resources.
High Priority Threats
Critical Vulnerabilities
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH …
CVSS: 10.0High Impact Threats
Detailed Analysis
Related Vulnerabilities
Description:
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.
Affected Products
- erlang otp
Description:
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists, the values of ip and ip_to are slightly swapped. Therefore, the range check for ip should be done later, but this part is missing and it seems that the vulnerability occurs. So we should add missing range checks and remove unnecessary range checks.
Affected Products
- Linux Linux
- Linux Linux
Exploitation Risk
Probability of exploitation in next 30 days