Talk With an Expert

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Tuesday, May 13, 2025

Apple Patches; Unipi Technologies Scans; Output Messenger Vulnerability, Commvault Correction

https://isc.sans.edu/podcastdetail/9448

Apple Updates Everything

Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS.

https://isc.sans.edu/diary/31942

It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities

Versions of the Mirai botnet are attacking devices made by Unipi Technology. These devices are using a specific username and password combination. In addition, this version of the Mirai botnet will also attempt exploits against an old Netgear vulnerability.

https://isc.sans.edu/diary/It+Is+2025+And+We+Are+Still+Dealing+With+Default+IoT+Passwords+And+Stupid+2013+Router+Vulnerabilities/31940

Output Messenger Vulnerability

The internal messenger application ‘Output Messenger’ is currently used in sophisticated attacks. Attackers are exploiting a path traversal vulnerability that has not been fixed.

https://www.outputmessenger.com/cve-2025-27920/

Commvault Correction

Commvault’s patch indeed fixes the recent vulnerability. The ‘Pioneer Release’ Will Dormann used to experiment will only offer patches after it has been registered, which leads to an error when assessing the patch’s efficacy.

https://www.darkreading.com/application-security/commvault-patch-works-as-intended

SANS Internet Storm Center StormCast Monday, May 12, 2025

Steganography Challenge; End-of-Life Routers; ASUS DriverHub; RV-Tools SEO Poisoning

https://isc.sans.edu/podcastdetail/9446

Steganography Challenge

Didier revealed the solution to last weekend’s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed.

https://isc.sans.edu/diary/Steganography+Challenge+My+Solution/31912

FBI Warns of End-of-life routers

The FBI is tracking larger botnets taking advantage of unpatched routers. Many of these routers are end-of-life, and no patches are available for the exploited vulnerabilities. The attackers are turning the devices into proxies, which are resold for various criminal activities.

https://www.ic3.gov/PSA/2025/PSA250507

ASUS Driverhub Vulnerability

ASUS Driverhub software does not properly check the origin of HTTP requests, allowing a CSRF attack from any website leading to arbitrary code execution.

https://mrbruh.com/asusdriverhub/

RV-Tools SEO Poisoning

Varonis Threat Labs observed SEO poisoning being used to trick system administrators into installing a malicious version of RV Tools. The malicious version includes a remote access tool leading to the theft of credentials

https://www.varonis.com/blog/seo-poisoning#initial-access-and-persistence

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive