Loading HuntDB...

Threat Intelligence Report

4 Vulnerabilities
Tuesday, April 29, 2025 Report ID: 140
Actions:

Executive Summary

Today's security landscape has unveiled several critical and high-severity vulnerabilities, with the potential to pose significant threats if left unaddressed. Firstly, a critical vulnerability has been discovered in Quick Agent Software, potentially exposing Ricoh Multifunction Printers (MFPs) to remote attacks. This vulnerability, if exploited, could allow unauthorized users to gain control of the device, which could lead to data theft or malware deployment. Another severe vulnerability, CVE-2025-3200, has been identified in Wiesemann & Theis Com-Server devices, caused by the use of deprecated TLS protocols. This vulnerability could allow attackers to intercept and decipher encrypted data, jeopardizing the integrity and confidentiality of information transmitted through these devices.

Further, Quantum, a leading expert in scale-out storage, archive and data protection, has issued a critical patch to address Remote Code Execution (RCE) vulnerabilities (CVE-2025-46616, CVE-2025-46617) in its StorNext Graphical User Interface (GUI). Without this patch, attackers could exploit these vulnerabilities to execute arbitrary code, leading to a complete system compromise. In addition, a minuscule but potent bug in the Linux Kernel, CVE-2025-21756, can lead to a full root exploit, with proofs of concept (PoCs) already being released. This vulnerability, if left unpatched, could provide attackers with the highest level of access to the Linux system, leading to potential unauthorized data access or system manipulation.

Lastly, Apache Tomcat has remediated two significant flaws that could have enabled Denial of Service (DoS) attacks and bypass of rewrite rules, potentially impacting the availability and security of web applications. In contrast, a zero-click NTLM Authentication Bypass has been discovered in Microsoft Telnet Server, with PoCs released. Unfortunately, no patch is currently available for this issue, which could allow an attacker to bypass authentication procedures and gain unauthorized access to systems and sensitive information. These

High Priority Threats

Critical Vulnerabilities

CVE-2025-46616

Quantum StorNext Web GUI API before 7.2.4 allows potential Arbitrary Remote Code Execution (RCE) via upload of a file. This …

CVSS: 9.9
CVE-2025-3200

An unauthenticated remote attacker could exploit the used, insecure TLS 1.0 and TLS 1.1 protocols to intercept and manipulate encrypted …

CVSS: 9.1

High Impact Threats

CVE-2025-46617

Quantum StorNext Web GUI API before 7.2.4 grants access to internal StorNext configuration and unauthorized modification of some software configuration …

CVSS: 7.2
CVE-2025-21756

In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; …

CVSS: 7.8

Detailed Analysis

The security landscape on this April 29, 2025, is marked by several critical and high-severity vulnerabilities, active threats, and significant security events. One of the most serious vulnerabilities is found in the Quick Agent Software, which exposes Ricoh MFPs to remote attacks. This vulnerability allows attackers to gain unauthorized access and to remotely control the affected devices. The potential impact of this vulnerability is significant, given the widespread use of Ricoh MFPs in various industries. Businesses and organizations that rely on these devices should promptly apply any available patches or follow recommended mitigation strategies to protect their networks. In addition, Wiesemann & Theis Com-Server Devices suffer from a critical vulnerability (CVE-2025-3200) due to their use of deprecated TLS protocols. The vulnerability exposes these devices to potential attacks, which could compromise the integrity, confidentiality, and availability of the information they handle. It is crucial for organizations using these devices to update their protocols and apply patches as soon as possible. Similarly, Quantum's StorNext GUI is affected by two critical remote code execution vulnerabilities (CVE-2025-46616, CVE-2025-46617). These vulnerabilities allow an attacker to execute arbitrary code on the target system, potentially leading to a complete system takeover. Quantum has already issued a critical patch, and all users are strongly advised to apply the update without delay. A tiny bug in the Linux kernel (CVE-2025-21756) has led to a full root exploit, with proof of concept (PoC) releases now available. This vulnerability can allow an attacker to gain root access, thereby taking full control of the system. Given the ubiquity of Linux-based systems and the severity of this vulnerability, it is crucial for all users to update their systems immediately. The Apache Tomcat security update fixes two vulnerabilities that could lead to denial of service (DoS) and rewrite rule bypass flaws. These vulnerabilities could disrupt services and bypass security measures, potentially leading to unauthorized access to sensitive data. Users of Apache Tomcat should apply this update as soon as possible to mitigate these risks. Lastly, a 0-click NTLM authentication bypass vulnerability affects the Microsoft Telnet Server. With PoC releases now available and no patch yet released, this vulnerability poses a significant risk. It allows an attacker to bypass authentication mechanisms, potentially gaining unauthorized access to systems and data. Users are advised to keep a close eye on updates from Microsoft and to consider temporary mitigation strategies until a patch is released. In conclusion, today's security landscape is marked by a number of serious vulnerabilities and potential threats. It is crucial for organizations to stay informed about these developments and take prompt action to protect their systems and data.

Related Vulnerabilities

CRITICAL CVSS: 9.9

Description:

Quantum StorNext Web GUI API before 7.2.4 allows potential Arbitrary Remote Code Execution (RCE) via upload of a file. This affects StorNext RYO before 7.2.4, StorNext Xcellis Workflow Director before 7.2.4, and ActiveScale Cold Storage.

Affected Products
  • Quantum StorNext
CRITICAL CVSS: 9.1

Description:

An unauthenticated remote attacker could exploit the used, insecure TLS 1.0 and TLS 1.1 protocols to intercept and manipulate encrypted communications between the Com-Server and connected systems.

Affected Products
  • Wiesemann & Theis Com-Server++
  • Wiesemann & Theis Com-Server PoE 3x Isolated
  • Wiesemann & Theis Com-Server 20mA
  • ... and 2 more
HIGH CVSS: 7.2

Description:

Quantum StorNext Web GUI API before 7.2.4 grants access to internal StorNext configuration and unauthorized modification of some software configuration parameters via undocumented user credentials. This affects StorNext RYO before 7.2.4, StorNext Xcellis Workflow Director before 7.2.4, and ActiveScale Cold Storage.

Affected Products
  • Quantum StorNext
HIGH CVSS: 7.8

Description:

In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect(). Prevents socket unbinding during a transport reassignment, which fixes a use-after-free: 1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2) 2. transport->release() calls vsock_remove_bound() without checking if sk was bound and moved to bound list (refcnt=1) 3. vsock_bind() assumes sk is in unbound list and before __vsock_insert_bound(vsock_bound_sockets()) calls __vsock_remove_bound() which does: list_del_init(&vsk->bound_table); // nop sock_put(&vsk->sk); // refcnt=0 BUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730 Read of size 4 at addr ffff88816b46a74c by task a.out/2057 dump_stack_lvl+0x68/0x90 print_report+0x174/0x4f6 kasan_report+0xb9/0x190 __vsock_bind+0x62e/0x730 vsock_bind+0x97/0xe0 __sys_bind+0x154/0x1f0 __x64_sys_bind+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Allocated by task 2057: kasan_save_stack+0x1e/0x40 kasan_save_track+0x10/0x30 __kasan_slab_alloc+0x85/0x90 kmem_cache_alloc_noprof+0x131/0x450 sk_prot_alloc+0x5b/0x220 sk_alloc+0x2c/0x870 __vsock_create.constprop.0+0x2e/0xb60 vsock_create+0xe4/0x420 __sock_create+0x241/0x650 __sys_socket+0xf2/0x1a0 __x64_sys_socket+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 2057: kasan_save_stack+0x1e/0x40 kasan_save_track+0x10/0x30 kasan_save_free_info+0x37/0x60 __kasan_slab_free+0x4b/0x70 kmem_cache_free+0x1a1/0x590 __sk_destruct+0x388/0x5a0 __vsock_bind+0x5e1/0x730 vsock_bind+0x97/0xe0 __sys_bind+0x154/0x1f0 __x64_sys_bind+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e refcount_t: addition on 0; use-after-free. WARNING: CPU: 7 PID: 2057 at lib/refcount.c:25 refcount_warn_saturate+0xce/0x150 RIP: 0010:refcount_warn_saturate+0xce/0x150 __vsock_bind+0x66d/0x730 vsock_bind+0x97/0xe0 __sys_bind+0x154/0x1f0 __x64_sys_bind+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e refcount_t: underflow; use-after-free. WARNING: CPU: 7 PID: 2057 at lib/refcount.c:28 refcount_warn_saturate+0xee/0x150 RIP: 0010:refcount_warn_saturate+0xee/0x150 vsock_remove_bound+0x187/0x1e0 __vsock_release+0x383/0x4a0 vsock_release+0x90/0x120 __sock_release+0xa3/0x250 sock_close+0x14/0x20 __fput+0x359/0xa80 task_work_run+0x107/0x1d0 do_exit+0x847/0x2560 do_group_exit+0xb8/0x250 __x64_sys_exit_group+0x3a/0x50 x64_sys_call+0xfec/0x14f0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Affected Products
  • Linux Linux
  • Linux Linux
Generated: April 29, 2025 06:00
Copied to clipboard!