Threat Intelligence Report
4 VulnerabilitiesExecutive Summary
Today's security landscape has unveiled several critical and high-severity vulnerabilities, with the potential to pose significant threats if left unaddressed. Firstly, a critical vulnerability has been discovered in Quick Agent Software, potentially exposing Ricoh Multifunction Printers (MFPs) to remote attacks. This vulnerability, if exploited, could allow unauthorized users to gain control of the device, which could lead to data theft or malware deployment. Another severe vulnerability, CVE-2025-3200, has been identified in Wiesemann & Theis Com-Server devices, caused by the use of deprecated TLS protocols. This vulnerability could allow attackers to intercept and decipher encrypted data, jeopardizing the integrity and confidentiality of information transmitted through these devices.
Further, Quantum, a leading expert in scale-out storage, archive and data protection, has issued a critical patch to address Remote Code Execution (RCE) vulnerabilities (CVE-2025-46616, CVE-2025-46617) in its StorNext Graphical User Interface (GUI). Without this patch, attackers could exploit these vulnerabilities to execute arbitrary code, leading to a complete system compromise. In addition, a minuscule but potent bug in the Linux Kernel, CVE-2025-21756, can lead to a full root exploit, with proofs of concept (PoCs) already being released. This vulnerability, if left unpatched, could provide attackers with the highest level of access to the Linux system, leading to potential unauthorized data access or system manipulation.
Lastly, Apache Tomcat has remediated two significant flaws that could have enabled Denial of Service (DoS) attacks and bypass of rewrite rules, potentially impacting the availability and security of web applications. In contrast, a zero-click NTLM Authentication Bypass has been discovered in Microsoft Telnet Server, with PoCs released. Unfortunately, no patch is currently available for this issue, which could allow an attacker to bypass authentication procedures and gain unauthorized access to systems and sensitive information. These
High Priority Threats
Critical Vulnerabilities
Quantum StorNext Web GUI API before 7.2.4 allows potential Arbitrary Remote Code Execution (RCE) via upload of a file. This …
CVSS: 9.9An unauthenticated remote attacker could exploit the used, insecure TLS 1.0 and TLS 1.1 protocols to intercept and manipulate encrypted …
CVSS: 9.1High Impact Threats
Quantum StorNext Web GUI API before 7.2.4 grants access to internal StorNext configuration and unauthorized modification of some software configuration …
CVSS: 7.2In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; …
CVSS: 7.8Detailed Analysis
Related Vulnerabilities
Description:
Quantum StorNext Web GUI API before 7.2.4 allows potential Arbitrary Remote Code Execution (RCE) via upload of a file. This affects StorNext RYO before 7.2.4, StorNext Xcellis Workflow Director before 7.2.4, and ActiveScale Cold Storage.
Affected Products
- Quantum StorNext
Description:
An unauthenticated remote attacker could exploit the used, insecure TLS 1.0 and TLS 1.1 protocols to intercept and manipulate encrypted communications between the Com-Server and connected systems.
Affected Products
- Wiesemann & Theis Com-Server++
- Wiesemann & Theis Com-Server PoE 3x Isolated
- Wiesemann & Theis Com-Server 20mA
- ... and 2 more
Description:
Quantum StorNext Web GUI API before 7.2.4 grants access to internal StorNext configuration and unauthorized modification of some software configuration parameters via undocumented user credentials. This affects StorNext RYO before 7.2.4, StorNext Xcellis Workflow Director before 7.2.4, and ActiveScale Cold Storage.
Affected Products
- Quantum StorNext
Description:
In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect(). Prevents socket unbinding during a transport reassignment, which fixes a use-after-free: 1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2) 2. transport->release() calls vsock_remove_bound() without checking if sk was bound and moved to bound list (refcnt=1) 3. vsock_bind() assumes sk is in unbound list and before __vsock_insert_bound(vsock_bound_sockets()) calls __vsock_remove_bound() which does: list_del_init(&vsk->bound_table); // nop sock_put(&vsk->sk); // refcnt=0 BUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730 Read of size 4 at addr ffff88816b46a74c by task a.out/2057 dump_stack_lvl+0x68/0x90 print_report+0x174/0x4f6 kasan_report+0xb9/0x190 __vsock_bind+0x62e/0x730 vsock_bind+0x97/0xe0 __sys_bind+0x154/0x1f0 __x64_sys_bind+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Allocated by task 2057: kasan_save_stack+0x1e/0x40 kasan_save_track+0x10/0x30 __kasan_slab_alloc+0x85/0x90 kmem_cache_alloc_noprof+0x131/0x450 sk_prot_alloc+0x5b/0x220 sk_alloc+0x2c/0x870 __vsock_create.constprop.0+0x2e/0xb60 vsock_create+0xe4/0x420 __sock_create+0x241/0x650 __sys_socket+0xf2/0x1a0 __x64_sys_socket+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 2057: kasan_save_stack+0x1e/0x40 kasan_save_track+0x10/0x30 kasan_save_free_info+0x37/0x60 __kasan_slab_free+0x4b/0x70 kmem_cache_free+0x1a1/0x590 __sk_destruct+0x388/0x5a0 __vsock_bind+0x5e1/0x730 vsock_bind+0x97/0xe0 __sys_bind+0x154/0x1f0 __x64_sys_bind+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e refcount_t: addition on 0; use-after-free. WARNING: CPU: 7 PID: 2057 at lib/refcount.c:25 refcount_warn_saturate+0xce/0x150 RIP: 0010:refcount_warn_saturate+0xce/0x150 __vsock_bind+0x66d/0x730 vsock_bind+0x97/0xe0 __sys_bind+0x154/0x1f0 __x64_sys_bind+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e refcount_t: underflow; use-after-free. WARNING: CPU: 7 PID: 2057 at lib/refcount.c:28 refcount_warn_saturate+0xee/0x150 RIP: 0010:refcount_warn_saturate+0xee/0x150 vsock_remove_bound+0x187/0x1e0 __vsock_release+0x383/0x4a0 vsock_release+0x90/0x120 __sock_release+0xa3/0x250 sock_close+0x14/0x20 __fput+0x359/0xa80 task_work_run+0x107/0x1d0 do_exit+0x847/0x2560 do_group_exit+0xb8/0x250 __x64_sys_exit_group+0x3a/0x50 x64_sys_call+0xfec/0x14f0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e
Affected Products
- Linux Linux
- Linux Linux