Loading HuntDB...

Threat Intelligence Report

2 Vulnerabilities
Friday, April 18, 2025 Report ID: 129
Actions:

Executive Summary

Today's summary of critical security findings is headlined by Siemens' remediation of a significant SQL injection vulnerability in its TeleControl Server Basic. These 66 flaws had the potential to allow an attacker to manipulate SQL queries, potentially leading to unauthorized access to sensitive data, data corruption, or even system shutdown, thereby posing a significant threat to operational efficiency. The swift remediation of these flaws is a step towards bolstering the security posture of Siemens' TeleControl Server Basic.

Hitachi Vantara also patched a critical resource injection flaw in Pentaho, addressing a potential vector for malicious entities to manipulate system resources or inject malicious code. Furthermore, there has been an alarming discovery of a Linux Kernel flaw (CVE-2024-53141) that enables privilege escalation. A proof-of-concept (PoC) has been released, raising the urgency to patch this vulnerability. An equally critical PoC was released for Erlang/OTP SSH vulnerability (CVE-2025-32433) that could enable remote code execution. This potentially puts systems at risk of being compromised and used as a launch pad for further attacks.

To conclude, today's critical security findings underline the necessity for organizations to maintain an up-to-date, robust security infrastructure and to respond promptly to vulnerability reports. Ensuring regular patch management and security audits can mitigate the implications of these high-severity vulnerabilities, thereby safeguarding valuable organizational data and resources.

High Priority Threats

Critical Vulnerabilities

CVE-2025-32433

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH …

CVSS: 10.0

High Impact Threats

Detailed Analysis

The security landscape of April 18, 2025, presents a number of high-severity vulnerabilities and active threats that require immediate attention and remediation. Among the most pressing security issues are those related to Siemens TeleControl Server Basic, Hitachi Vantara's Pentaho, Linux Kernel, and the Erlang/OTP SSH. Siemens has addressed a significant security concern with its TeleControl Server Basic. A staggering number of 66 SQL injection flaws were discovered and subsequently fixed. SQL injection, a code injection technique that attackers use to exploit security vulnerabilities in a database layer of an application, could lead to unauthorized access to sensitive data. This significant number of flaws in a single product underlines the necessity for robust and continual security checks in all software applications, especially those handling sensitive data. Similarly, Hitachi Vantara has patched a critical resource injection flaw in Pentaho, its data integration and business analytics platform. The vulnerability could allow an attacker to inject malicious resources, such as harmful scripts, into a program, potentially leading to data breaches or system compromise. The quick response from Hitachi Vantara to patch this flaw showcases the company's commitment to ensuring the security of its software. The Linux Kernel, the core component of Linux operating systems, has been found to have a flaw that enables privilege escalation. Identified as CVE-2024-53141, this vulnerability could allow an attacker to gain higher-level permissions on a computer or network, potentially leading to further exploits. The release of a Proof of Concept (PoC) increases the urgency to patch this vulnerability, as it provides a practical demonstration and blueprint for exploiting the flaw. Lastly, a critical vulnerability, CVE-2025-32433, in Erlang/OTP SSH has been discovered, and a PoC has been released. SSH, or Secure Shell, is a cryptographic network protocol for secure data communication. The vulnerability could enable Remote Code Execution (RCE), a dangerous exploit where an attacker can run arbitrary code on a victim's system. The release of the PoC has effectively put systems running Erlang/OTP SSH at a higher risk, necessitating immediate patching and safeguards. In conclusion, today's critical security findings underline the continuous and evolving nature of threats in the digital world. The presence of high-severity vulnerabilities in such widely used systems and applications highlights the importance of proactive security measures, frequent vulnerability assessments, and swift response to identified threats. It is crucial for organizations to stay abreast of these developments and implement necessary patches and updates promptly to maintain their security posture.

Related Vulnerabilities

CRITICAL CVSS: 10.0 Exploit Available

Description:

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.

Affected Products
  • erlang otp

Description:

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists, the values of ip and ip_to are slightly swapped. Therefore, the range check for ip should be done later, but this part is missing and it seems that the vulnerability occurs. So we should add missing range checks and remove unnecessary range checks.

Affected Products
  • Linux Linux
  • Linux Linux
Exploitation Risk
EPSS: 0.0%

Probability of exploitation in next 30 days

Generated: April 18, 2025 06:00
Copied to clipboard!