Threat Intelligence Report
3 VulnerabilitiesExecutive Summary
In the realm of cybersecurity, May 1, 2025, has been fraught with high-severity vulnerabilities, necessitating urgent attention. Foremost among these is the CVE-2025-32444, a critical remote code execution (RCE) flaw in vLLM’s Mooncake Integration. With a CVSS score of 10, this vulnerability poses a significant risk as it exposes AI infrastructure to potential malicious attacks, thus emphasizing the growing challenges in securing AI technologies. Immediate patching is highly recommended to mitigate the risks associated with this flaw.
Another critical concern arises from the CVE-2025-29906 flaw in Finit’s Bundled Getty, which allows authentication bypass on Linux systems. This vulnerability could potentially allow unauthorized users to gain access to sensitive information, thus posing significant threats to data confidentiality and integrity. Furthermore, the zero-click RCE vulnerability in Synology DiskStation (CVE-2024-10442), which also carries a CVSS score of 10, has seen a proof-of-concept publish today. This development underscores the imminent threat and need for immediate remediation. On a similarly pressing note, SonicWall has confirmed active exploitation of SMA 100 vulnerabilities, urging users to apply patches as soon as possible. This event underlines the constant need for vigilance and swift action in the ever-evolving landscape of cybersecurity.
High Priority Threats
Critical Vulnerabilities
Off-by-one error vulnerability in the transmission component in Synology Replication Service before 1.0.12-0066, 1.2.2-0353 and 1.3.0-0423 and Synology Unified Controller …
CVSS: 10.0vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.6.5 and prior to 0.8.5, …
CVSS: 10.0High Impact Threats
Finit is a fast init for Linux systems. Versions starting from 3.0-rc1 and prior to version 4.11 bundle an implementation …
CVSS: 8.6Detailed Analysis
Related Vulnerabilities
Description:
Off-by-one error vulnerability in the transmission component in Synology Replication Service before 1.0.12-0066, 1.2.2-0353 and 1.3.0-0423 and Synology Unified Controller (DSMUC) before 3.1.4-23079 allows remote attackers to execute arbitrary code, potentially leading to a broader impact across the system via unspecified vectors.
Affected Products
- Synology Unified Controller (DSMUC)
- Synology Replication Service
Description:
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.6.5 and prior to 0.8.5, having vLLM integration with mooncake, are vulnerable to remote code execution due to using pickle based serialization over unsecured ZeroMQ sockets. The vulnerable sockets were set to listen on all network interfaces, increasing the likelihood that an attacker is able to reach the vulnerable ZeroMQ sockets to carry out an attack. vLLM instances that do not make use of the mooncake integration are not vulnerable. This issue has been patched in version 0.8.5.
Affected Products
- vllm-project vllm
Description:
Finit is a fast init for Linux systems. Versions starting from 3.0-rc1 and prior to version 4.11 bundle an implementation of getty for the `tty` configuration directive that can bypass `/bin/login`, i.e., a user can log in as any user without authentication. This issue has been patched in version 4.11.
Affected Products
- troglobit finit