Talk With an Expert

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Friday, May 16, 2025

Increase in SonicWall Scans; RVTools Compromised?; RoundPress

https://isc.sans.edu/podcastdetail/9454

Web Scanning SonicWall for CVE-2021-20016 - Update

Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from 'Global Host', a low-cost virtual hosting provider.

https://isc.sans.edu/diary/Web+Scanning+SonicWall+for+CVE202120016+Update/31952

Google Update Patches Exploited Chrome Flaw

Google released an update for Chrome. The update fixes two specific flaws reported by external researchers, CVE-2025-4664 and CVE-2025-4609. The first flaw is already being exploited in the wild.

https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html

https://x.com/slonser_/status/1919439373986107814

RVTools Bumblebee Malware Attack

Zerodaylabs published its analysis of the RV-Tools Backdoor attack. It suggests that this may not be solely a search engine optimization campaign directing victims to the malicious installer, but that the RVTools distribution site was compromised.

https://zerodaylabs.net/rvtools-bumblebee-malware/

Operation RoundPress

ESET Security wrote up a report summarizing recent XSS attacks against open-source webmail systems

https://www.welivesecurity.com/en/eset-research/operation-roundpress/

SANS Internet Storm Center StormCast Thursday, May 15, 2025

Google Open Redirects; Adobe, Ivanti, and Samsung patches

https://isc.sans.edu/podcastdetail/9452

Another day, another phishing campaign abusing google.com open redirects

Google’s links from its maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages.

https://isc.sans.edu/diary/Another+day+another+phishing+campaign+abusing+googlecom+open+redirects/31950

Adobe Patches

Adobe patched 12 different applications. Of particular interest is the update to ColdFusion, which fixes several arbitrary code execution and arbitrary file read problems.

https://helpx.adobe.com/security/security-bulletin.html

Samsung Patches magicInfo 9 Again

Samsung released a new patch for the already exploited magicInfo 9 CMS vulnerability. While the description is identical to the patch released last August, a new CVE number is used.

https://security.samsungtv.com/securityUpdates#SVP-MAY-2025

Ivanti Patches Critical Ivanti Neurons Flaw

Ivanti released a patch for Ivanti Neurons for ITSM (on-prem only) fixing a critical authentication bypass vulnerability. Ivanti also points to its guidance to secure the underlying IIS server to make exploitation of flaws like this more difficult

https://www.bleepingcomputer.com/news/security/ivanti-warns-of-critical-neurons-for-itsm-auth-bypass-flaw/

https://thehackernews.com/2025/05/ivanti-patches-epmm-vulnerabilities.html

SANS Internet Storm Center StormCast Wednesday, May 14, 2025

Microsoft Patch Tuesday; 0-Days patched for Ivanti Endpoint Manager and Fortinet Products

https://isc.sans.edu/podcastdetail/9450

Microsoft Patch Tuesday

Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode.

https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+May+2025/31946

Security Advisory Ivanti Endpoint Manager Mobile (EPMM) May 2025 (CVE-2025-4427 and CVE-2025-4428)

Ivanti patched an authentication bypass vulnerability and a remote code execution vulnerability. The authentication bypass can exploit the remote code execution vulnerability without authenticating first.

https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM?language=en_US

Fortinet Patches Exploited Vulnerability in API (CVE-2025-32756)

Fortinet patched an already exploited stack-based buffer overflow vulnerability in the API of multiple Fortinet products. The vulnerability is exploited via crafted HTTP requests.

https://fortiguard.fortinet.com/psirt/FG-IR-25-254

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive
European Union Vulnerability Database Launches; Security Updates: Microsoft, Adobe, Juniper, VMWare, and Zoom