Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Research warning of “severe risks” when using AI therapy chatbots

UK launches a £500 million package to support diverse and underrated investors and founders

California creates a residential-focused agency | Planetizen News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The flaws in the unpatched concerto will cause attackers to escape Docker and escape the host of compromise
Identity

The flaws in the unpatched concerto will cause attackers to escape Docker and escape the host of compromise

userBy userMay 22, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 22, 2025Ravi LakshmananVulnerabilities/Software Security

Cybersecurity researchers have revealed several critical security vulnerabilities affecting Versa Compato Network Security and SD-WAN orchestration platforms that can be exploited to control instances of sensitivity.

It should be noted that despite responsible disclosure on February 13, 2025, the identified drawbacks do not remain, despite prompting the issue to be published after the 90-day deadline.

“These vulnerabilities could allow attackers to compromise both their applications and the underlying host system when chained,” Project Decker researchers Harsh Jaiswal, Rahul Maini and Parth Malhotra said in a report shared with Hacker News.

Cybersecurity

The security flaws are listed below –

CVE-2025-34025 (CVSS score: 8.6) – Privilege escalation and docker container escape vulnerability that can be exploited to acquire code execution on the underlying host machine CVE-2025-34026, which is caused by an insecure default mount of host binary paths, and that can be exploited to acquire code execution on the underlying host machine CVE-2025-34026, allowing the management endpoint to be accessed. It may then be utilized to access heap dumps and trace logs by leveraging the internal spring boot actuator endpoint via CVE-2024-45410 CVE-2025-34027 (CVSS score: 10.0). It can be exploited to achieve remote code execution by exploiting endpoints related to uploading packages (“/portalapi/v1/package/spack/upload”) via any file.

The successful exploitation of CVE-2025-34027 allows attackers to take advantage of the race conditions to write malicious files to disk, and ultimately use LD_PRELOAD and a reverse shell to perform remote code execution.

“Our approach included overriding. ../../../../etc/ld.so.preload has a path pointing to /tmp/hook.so,” the researcher said. “At the same time, I uploaded /tmp/hook.so containing the C binary compiled for the reverse shell. The request triggered two file write operations, so I leveraged this so that both files were written within the same request.”

Cybersecurity

“If these files are written successfully, the command execution on the system will run /tmp/hook.so while both persistent command executions, which will result in a reverse shell.”

Without official fixes, users are advised to block semicolons in the URL path and block drop requests when the connection header contains the value x-real-ip. It is also recommended to monitor network traffic and logs for suspicious activity.

Hacker News has reached out to the Versa network for comments and will update the story if there is a reply.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUniversity of Bristol Semiconductor Devices Unlock 6G Infrastructure
Next Article Hong Kong passes the Stubcoin bill as more governments recognize digital assets
user
  • Website

Related Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Research warning of “severe risks” when using AI therapy chatbots

UK launches a £500 million package to support diverse and underrated investors and founders

California creates a residential-focused agency | Planetizen News

Baker Creek Pavilion: A blend of nature and architecture in Knoxville

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.