Threat Intelligence Report
6 VulnerabilitiesExecutive Summary
Today, the security landscape revealed several critical vulnerabilities that urgently require attention. A severe flaw was identified in AWS Amplify Studio, enabling remote code execution. If left unaddressed, this vulnerability could lead to unauthorized access and manipulation of sensitive data, leading to potentially catastrophic consequences for organizations using this service. It is strongly recommended that users update their systems immediately to mitigate the threat. Additionally, a critical Remote Code Execution (RCE) flaw (CVE-2025-24977) was discovered in the OpenCTI platform, exposing infrastructure to root-level attacks. This vulnerability could allow cybercriminals to gain unauthorized access and control over an entire system, making it a top priority for remediation.
In addition to these vulnerabilities, a critical whitelist bypass was reported in browser use (CVE-2025-47241), exposing internal services and putting data at risk. This issue underlines the importance of robust whitelisting practices and secure browser usage. An identified vulnerability in cpp-httplib (CVE-2025-46728) also exposes servers to potential denial of service attacks, disrupting operations and leading to significant downtime. An old botnet was spotted exploiting outdated GeoVision IoT devices via CVE-2024-6047 & CVE-2024-11120, highlighting the need for regular device updates and patching.
Lastly, a high-severity vulnerability (CVE-2025-25014, CVSS 9.1) was found in Kibana, enabling prototype pollution and opening a door to code execution. This vulnerability could lead to unauthorized control over the affected system, causing significant damage. Users are urged to patch their systems immediately to mitigate these risks. Today's security updates further underline the importance of regular system updates, robust security protocols, and the use of state-of-the-art security tools to protect against evolving cyber threats.
High Priority Threats
Critical Vulnerabilities
Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this …
CVSS: 9.8A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting …
CVSS: 9.1Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and …
CVSS: 9.8OpenCTI is an open cyber threat intelligence (CTI) platform. Prior to version 6.4.11 any user with the capability `manage customizations` …
CVSS: 9.1High Impact Threats
cpp-httplib is a C++ header-only HTTP/HTTPS server and client library. Prior to version 0.20.1, the library fails to enforce configured …
CVSS: 7.5Detailed Analysis
Related Vulnerabilities
Description:
Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
Affected Products
- GeoVision GV_DSP_LPR_V2
- GeoVision GV_IPCAMD_GV_BX1500
- GeoVision GV_IPCAMD_GV_CB220
- ... and 35 more
Exploitation Risk
Probability of exploitation in next 30 days
Description:
A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints.
Affected Products
- Elastic Kibana
Exploitation Risk
Probability of exploitation in next 30 days
Description:
Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.
Affected Products
- GeoVision GV-VS12
- GeoVision GV-VS11
- GeoVision GV-DSP_LPR_V3
- ... and 7 more
Exploitation Risk
Probability of exploitation in next 30 days
Description:
OpenCTI is an open cyber threat intelligence (CTI) platform. Prior to version 6.4.11 any user with the capability `manage customizations` can execute commands on the underlying infrastructure where OpenCTI is hosted and can access internal server side secrets by misusing the web-hooks. Since the malicious user gets a root shell inside a container this opens up the the infrastructure environment for further attacks and exposures. Version 6.4.11 fixes the issue.
Affected Products
- OpenCTI-Platform opencti
Exploitation Risk
Probability of exploitation in next 30 days
Description:
cpp-httplib is a C++ header-only HTTP/HTTPS server and client library. Prior to version 0.20.1, the library fails to enforce configured size limits on incoming request bodies when `Transfer-Encoding: chunked` is used or when no `Content-Length` header is provided. A remote attacker can send a chunked request without the terminating zero-length chunk, causing uncontrolled memory allocation on the server. This leads to potential exhaustion of system memory and results in a server crash or unresponsiveness. Version 0.20.1 fixes the issue by enforcing limits during parsing. If the limit is exceeded at any point during reading, the connection is terminated immediately. A short-term workaround through a Reverse Proxy is available. If updating the library immediately is not feasible, deploy a reverse proxy (e.g., Nginx, HAProxy) in front of the `cpp-httplib` application. Configure the proxy to enforce maximum request body size limits, thereby stopping excessively large requests before they reach the vulnerable library code.
Affected Products
- yhirose cpp-httplib
Exploitation Risk
Probability of exploitation in next 30 days
Description:
In browser-use (aka Browser Use) before 0.1.45, URL parsing of allowed_domains is mishandled because userinfo can be placed in the authority component.
Affected Products
- browser-use browser-use
Exploitation Risk
Probability of exploitation in next 30 days