Loading HuntDB...

Threat Intelligence Report

4 Vulnerabilities
Thursday, April 24, 2025 Report ID: 135
Actions:

Executive Summary

A series of significant security vulnerabilities were revealed today, April 24, 2025, that carry profound implications for various sectors. Firstly, Grafana released a critical security update for a severe vulnerability (CVE-2025-3260) within its software. This vulnerability, if exploited, would allow an attacker to manipulate and exploit data in unauthorized ways. Similarly, NVIDIA's NeMo Framework was found to have high-risk vulnerabilities that could enable remote code execution, raising concerns about the potential for unauthorized access and control of affected systems. Other high-severity vulnerabilities were identified in GitLab, which could lead to cross-site scripting (XSS) and account takeovers if left unpatched, and in SonicWall's SSLVPN, where a vulnerability could lead to firewall crashes.

In addition to these individual vulnerabilities, a broader trend of increasing vulnerability exploitation was revealed in the Verizon 2025 Data Breach Investigations Report. This study indicates a surge in vulnerability exploitation and double the number of third-party breaches compared to previous years, suggesting an escalating risk environment. Specific vulnerabilities contributing to this trend include a critical flaw in Commvault Command Center (CVE-2025-34028) scoring a perfect 10 on the CVSS scale, a NetScaler console flaw (CVE-2024-6235) enabling admin access, and a backdoor in the xrpl.js SDK (CVE-2025-32965) that puts crypto wallets at risk. Lastly, a vulnerability in Redis servers has created potential for denial-of-service attacks. These findings underscore the urgency of prioritizing security measures and timely patches to mitigate potential threats.

High Priority Threats

Critical Vulnerabilities

CVE-2025-34028

The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when …

CVSS: 10.0

High Impact Threats

CVE-2025-3260

A security vulnerability in the /apis/dashboard.grafana.app/* endpoints allows authenticated users to bypass dashboard and folder permissions. The vulnerability affects all …

CVSS: 8.3

Detailed Analysis

Today's critical security findings reveal a series of high-severity vulnerabilities and active threats across a variety of platforms and frameworks. In the interest of maintaining coherence, these findings will be discussed in the order of their severity and potential impact. Firstly, a critical security update was issued for Grafana following the discovery of a high-risk vulnerability labelled as CVE-2025-3260. This vulnerability, along with others patched in the update, posed a significant threat to data integrity and confidentiality, potentially allowing unauthorized remote access to sensitive information. Businesses using Grafana are strongly advised to install this update promptly to mitigate the risk. The Verizon DBIR 2025 report was also released today, highlighting a surge in vulnerability exploitation and a doubling in third-party breaches. This underscores the growing importance of rigorous security measures, particularly in third-party interactions. The report’s findings should serve as an impetus for businesses to review and strengthen their current security policies, especially concerning third-party data sharing. In the realm of AI and machine learning, NVIDIA's NeMo Framework has been found to contain high-risk vulnerabilities that could allow remote code execution. This represents a significant threat to users of the framework, as it could potentially allow malicious actors to execute arbitrary code and take control of affected systems. NVIDIA is currently working on a patch to address these vulnerabilities. A serious flaw was discovered in the NetScaler Console (CVE-2024-6235) that enables admin access. The publication of a Proof of Concept (PoC) exacerbates the situation as it provides potential attackers with a blueprint for exploiting this vulnerability. Users of the NetScaler Console are urged to apply any available patches immediately to protect their systems from potential breaches. The most severe vulnerability identified today is in the Commvault Command Center, labelled CVE-2025-34028. Scoring a maximum CVSS score of 10, this critical RCE flaw poses a significant threat to Commvault users. Given the scoring, it is vital that users apply the security patch as soon as possible to avoid potential breaches. In cryptocurrency news, a backdoor was discovered in the xrpl.js SDK (CVE-2025-32965), posing a significant risk to crypto wallets. Crypto users are advised to update their SDK to the latest version to close this backdoor and secure their wallets. A high-severity vulnerability was found in SonicWall's SSLVPN which could lead to firewall crashes. This vulnerability not only compromises the security of data passing through the VPN, but could also lead to downtime, affecting business continuity. GitLab released a security update to patch flaws that could lead to XSS and account takeovers. Given the wide usage of GitLab, these vulnerabilities could have a widespread impact if left unpatched. Immediate application of the update is advised to prevent potential breaches. Lastly, a vulnerability in Redis was found to expose servers to denial-of-service attacks. This vulnerability could potentially disrupt services and negatively impact business operations. Redis users are advised to apply any available patches to mitigate this risk. In conclusion, today's critical security findings highlight the ever-evolving landscape of cyber threats, emphasizing the need for continuous vigilance, timely patching, and robust security measures to protect against high-severity vulnerabilities and active threats.

Related Vulnerabilities

CRITICAL CVSS: 10.0 KEV Exploit Available

Description:

The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.

Affected Products
  • Commvault Command Center Innovation Release
Exploitation Risk
EPSS: 63.0%

Probability of exploitation in next 30 days

HIGH CVSS: 8.3

Description:

A security vulnerability in the /apis/dashboard.grafana.app/* endpoints allows authenticated users to bypass dashboard and folder permissions. The vulnerability affects all API versions (v0alpha1, v1alpha1, v2alpha1). Impact: - Viewers can view all dashboards/folders regardless of permissions - Editors can view/edit/delete all dashboards/folders regardless of permissions - Editors can create dashboards in any folder regardless of permissions - Anonymous users with viewer/editor roles are similarly affected Organization isolation boundaries remain intact. The vulnerability only affects dashboard access and does not grant access to datasources.

Affected Products
  • Grafana Grafana
Exploitation Risk
EPSS: 0.0%

Probability of exploitation in next 30 days

Description:

Sensitive information disclosure in NetScaler Console

Affected Products
  • NetScaler NetScaler Console
  • citrix netscaler_console
Exploitation Risk
EPSS: 82.0%

Probability of exploitation in next 30 days

Description:

xrpl.js is a JavaScript/TypeScript API for interacting with the XRP Ledger in Node.js and the browser. Versions 4.2.1, 4.2.2, 4.2.3, and 4.2.4 of xrpl.js were compromised and contained malicious code designed to exfiltrate private keys. Version 2.14.2 is also malicious, though it is less likely to lead to exploitation as it is not compatible with other 2.x versions. Anyone who used one of these versions should stop immediately and rotate any private keys or secrets used with affected systems. Users of xrpl.js should pgrade to version 4.2.5 or 2.14.3 to receive a patch. To secure funds, think carefully about whether any keys may have been compromised by this supply chain attack, and mitigate by sending funds to secure wallets, and/or rotating keys. If any account's master key is potentially compromised, disable the key.

Affected Products
  • XRPLF xrpl.js
Exploitation Risk
EPSS: 0.0%

Probability of exploitation in next 30 days

Generated: April 24, 2025 06:00
Copied to clipboard!