Threat Intelligence Report
3 VulnerabilitiesExecutive Summary
On this day, April 30, 2025, several critical security vulnerabilities have been brought to the forefront. First among them is a privilege escalation vulnerability in Rancher (CVE-2024-22031), for which a patch has now been released. This vulnerability could have allowed malicious actors to gain unauthorized access and control over the affected system, posing a serious threat to the integrity and confidentiality of data. Similarly, a high-severity denial of service (DoS) vulnerability was discovered in PowerDNS DNSdist (CVE-2025-30194), which could have potentially led to service disruption and subsequent business impact.
Furthermore, an unpatched Windows LNK vulnerability has been detected, which enables remote execution via UNC Path. PoC has been released, which means threat actors could potentially exploit this flaw to execute arbitrary code, providing an avenue for malware infection or data theft. Chrome users are also urged to update their browsers as a high-severity security flaw (CVE-2025-4096) has been fixed in the latest update. This flaw could have allowed attackers to run malicious code within the context of the browser, compromising the security of user data and privacy.
In addition to these, the Cybersecurity and Infrastructure Security Agency (CISA) has added a zero-day vulnerability in SAP NetWeaver (CVE-2025-31324) to its Known Exploited Vulnerabilities (KEV) Database. This addition is significant as it indicates active exploitation of the vulnerability, increasing the urgency for organizations to deploy necessary security measures to mitigate potential threats.
High Priority Threats
Critical Vulnerabilities
SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious …
CVSS: 10.0High Impact Threats
When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by …
CVSS: 7.5Heap buffer overflow in HTML in Google Chrome prior to 136.0.7103.59 allowed a remote attacker to potentially exploit heap corruption …
CVSS: 8.8Detailed Analysis
Related Vulnerabilities
Description:
SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system.
Affected Products
- SAP_SE SAP NetWeaver (Visual Composer development server)
Description:
When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.9 version. A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version. We would like to thank Charles Howes for bringing this issue to our attention.
Affected Products
- PowerDNS DNSdist
Description:
Heap buffer overflow in HTML in Google Chrome prior to 136.0.7103.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Affected Products
- Google Chrome