Loading HuntDB...

Threat Intelligence Report

6 Vulnerabilities
Wednesday, May 7, 2025 Report ID: 148
Actions:

Executive Summary

Today, the security landscape revealed several critical vulnerabilities that urgently require attention. A severe flaw was identified in AWS Amplify Studio, enabling remote code execution. If left unaddressed, this vulnerability could lead to unauthorized access and manipulation of sensitive data, leading to potentially catastrophic consequences for organizations using this service. It is strongly recommended that users update their systems immediately to mitigate the threat. Additionally, a critical Remote Code Execution (RCE) flaw (CVE-2025-24977) was discovered in the OpenCTI platform, exposing infrastructure to root-level attacks. This vulnerability could allow cybercriminals to gain unauthorized access and control over an entire system, making it a top priority for remediation.

In addition to these vulnerabilities, a critical whitelist bypass was reported in browser use (CVE-2025-47241), exposing internal services and putting data at risk. This issue underlines the importance of robust whitelisting practices and secure browser usage. An identified vulnerability in cpp-httplib (CVE-2025-46728) also exposes servers to potential denial of service attacks, disrupting operations and leading to significant downtime. An old botnet was spotted exploiting outdated GeoVision IoT devices via CVE-2024-6047 & CVE-2024-11120, highlighting the need for regular device updates and patching.

Lastly, a high-severity vulnerability (CVE-2025-25014, CVSS 9.1) was found in Kibana, enabling prototype pollution and opening a door to code execution. This vulnerability could lead to unauthorized control over the affected system, causing significant damage. Users are urged to patch their systems immediately to mitigate these risks. Today's security updates further underline the importance of regular system updates, robust security protocols, and the use of state-of-the-art security tools to protect against evolving cyber threats.

High Priority Threats

Critical Vulnerabilities

CVE-2024-6047

Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this …

CVSS: 9.8
CVE-2025-25014

A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting …

CVSS: 9.1
CVE-2024-11120

Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and …

CVSS: 9.8
CVE-2025-24977

OpenCTI is an open cyber threat intelligence (CTI) platform. Prior to version 6.4.11 any user with the capability `manage customizations` …

CVSS: 9.1

High Impact Threats

CVE-2025-46728

cpp-httplib is a C++ header-only HTTP/HTTPS server and client library. Prior to version 0.20.1, the library fails to enforce configured …

CVSS: 7.5

Detailed Analysis

The security landscape today, May 7, 2025, has been marked by several critical and high-severity vulnerabilities and threats that pose significant risk to systems and infrastructure. One of the most notable vulnerabilities identified today is a critical flaw within Amazon Web Services (AWS) Amplify Studio that allows for code execution. AWS Amplify Studio, a popular web development platform, is widely used for its streamlined design-to-code workflow. However, this vulnerability, if exploited, would enable malicious actors to execute arbitrary code, potentially compromising any system running the affected software. The implications of this flaw are substantial, as it could potentially disrupt web services and lead to unauthorized access to sensitive data. It is strongly advised that users update their AWS Amplify Studio to the patched version immediately to mitigate this risk. In addition, a critical remote code execution flaw has been detected in the OpenCTI platform, identified as CVE-2025-24977. OpenCTI, an open-source cybersecurity threat intelligence platform, is critical for many organizations in their defense against cyber threats. However, this vulnerability exposes infrastructure to root-level attacks, providing cybercriminals with a high level of control over affected systems. This vulnerability is of high severity and users are advised to apply the available patch immediately. A critical whitelist bypass in browser use, identified as CVE-2025-47241, has also been identified today. This vulnerability exposes internal services, presenting a significant threat to organizations' internal networks. A whitelist bypass can allow unauthorized users to gain access to services usually restricted to trusted entities, potentially leading to unauthorized data access or disruption of services. Further, a vulnerability in cpp-httplib has been found which exposes servers to denial of service attacks. Identified as CVE-2025-46728, this flaw could allow an attacker to overwhelm a server with traffic, rendering it unavailable to legitimate users. This highlights the need for organizations to ensure their servers are adequately protected against such attacks. Today's review also identified a botnet exploiting old GeoVision IoT devices via two vulnerabilities, CVE-2024-6047 and CVE-2024-11120. GeoVision, a manufacturer of IoT devices, had previously released patches for these vulnerabilities. However, it appears that many devices remain unpatched, making them an easy target for botnet exploitation. This situation underscores the importance of prompt patch management in IoT devices. Finally, a critical prototype pollution vulnerability has been identified in Kibana, an open-source visualization and analytics platform. Identified as CVE-2025-25014 and scoring a high severity rating of 9.1 on the CVSS scale, this vulnerability could allow attackers to execute arbitrary code. This could lead to unauthorized access to sensitive data and system disruption. Users are advised to update to the latest patched version of Kibana to mitigate this risk. In conclusion, today's security landscape has been marked by several critical vulnerabilities and threats. The common theme across all of these is the potential for unauthorized code execution and possible disruption of services. These findings emphasize the importance of maintaining a robust and up-to-date security posture, including prompt patch management and vigilant monitoring of security advisories.

Related Vulnerabilities

CRITICAL CVSS: 9.8 KEV

Description:

Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.

Affected Products
  • GeoVision GV_DSP_LPR_V2
  • GeoVision GV_IPCAMD_GV_BX1500
  • GeoVision GV_IPCAMD_GV_CB220
  • ... and 35 more
Exploitation Risk
EPSS: 75.0%

Probability of exploitation in next 30 days

CRITICAL CVSS: 9.1

Description:

A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints.

Affected Products
  • Elastic Kibana
Exploitation Risk
EPSS: 0.0%

Probability of exploitation in next 30 days

CRITICAL CVSS: 9.8 KEV

Description:

Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.

Affected Products
  • GeoVision GV-VS12
  • GeoVision GV-VS11
  • GeoVision GV-DSP_LPR_V3
  • ... and 7 more
Exploitation Risk
EPSS: 55.0%

Probability of exploitation in next 30 days

CRITICAL CVSS: 9.1

Description:

OpenCTI is an open cyber threat intelligence (CTI) platform. Prior to version 6.4.11 any user with the capability `manage customizations` can execute commands on the underlying infrastructure where OpenCTI is hosted and can access internal server side secrets by misusing the web-hooks. Since the malicious user gets a root shell inside a container this opens up the the infrastructure environment for further attacks and exposures. Version 6.4.11 fixes the issue.

Affected Products
  • OpenCTI-Platform opencti
Exploitation Risk
EPSS: 0.0%

Probability of exploitation in next 30 days

HIGH CVSS: 7.5

Description:

cpp-httplib is a C++ header-only HTTP/HTTPS server and client library. Prior to version 0.20.1, the library fails to enforce configured size limits on incoming request bodies when `Transfer-Encoding: chunked` is used or when no `Content-Length` header is provided. A remote attacker can send a chunked request without the terminating zero-length chunk, causing uncontrolled memory allocation on the server. This leads to potential exhaustion of system memory and results in a server crash or unresponsiveness. Version 0.20.1 fixes the issue by enforcing limits during parsing. If the limit is exceeded at any point during reading, the connection is terminated immediately. A short-term workaround through a Reverse Proxy is available. If updating the library immediately is not feasible, deploy a reverse proxy (e.g., Nginx, HAProxy) in front of the `cpp-httplib` application. Configure the proxy to enforce maximum request body size limits, thereby stopping excessively large requests before they reach the vulnerable library code.

Affected Products
  • yhirose cpp-httplib
Exploitation Risk
EPSS: 0.0%

Probability of exploitation in next 30 days

MEDIUM CVSS: 4.0

Description:

In browser-use (aka Browser Use) before 0.1.45, URL parsing of allowed_domains is mishandled because userinfo can be placed in the authority component.

Affected Products
  • browser-use browser-use
Exploitation Risk
EPSS: 0.0%

Probability of exploitation in next 30 days

Generated: May 7, 2025 06:00
Copied to clipboard!