Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Georgetown scholars recall the “die process ock ha ha” of immigration prisons

Top Startup and Tech Funding News – May 22, 2025

Federal judges stop immigration authorities from revoking the legal status of international students

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » The flaws in the unpatched concerto will cause attackers to escape Docker and escape the host of compromise
Identity

The flaws in the unpatched concerto will cause attackers to escape Docker and escape the host of compromise

userBy userMay 22, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 22, 2025Ravi LakshmananVulnerabilities/Software Security

Cybersecurity researchers have revealed several critical security vulnerabilities affecting Versa Compato Network Security and SD-WAN orchestration platforms that can be exploited to control instances of sensitivity.

It should be noted that despite responsible disclosure on February 13, 2025, the identified drawbacks do not remain, despite prompting the issue to be published after the 90-day deadline.

“These vulnerabilities could allow attackers to compromise both their applications and the underlying host system when chained,” Project Decker researchers Harsh Jaiswal, Rahul Maini and Parth Malhotra said in a report shared with Hacker News.

Cybersecurity

The security flaws are listed below –

CVE-2025-34025 (CVSS score: 8.6) – Privilege escalation and docker container escape vulnerability that can be exploited to acquire code execution on the underlying host machine CVE-2025-34026, which is caused by an insecure default mount of host binary paths, and that can be exploited to acquire code execution on the underlying host machine CVE-2025-34026, allowing the management endpoint to be accessed. It may then be utilized to access heap dumps and trace logs by leveraging the internal spring boot actuator endpoint via CVE-2024-45410 CVE-2025-34027 (CVSS score: 10.0). It can be exploited to achieve remote code execution by exploiting endpoints related to uploading packages (“/portalapi/v1/package/spack/upload”) via any file.

The successful exploitation of CVE-2025-34027 allows attackers to take advantage of the race conditions to write malicious files to disk, and ultimately use LD_PRELOAD and a reverse shell to perform remote code execution.

“Our approach included overriding. ../../../../etc/ld.so.preload has a path pointing to /tmp/hook.so,” the researcher said. “At the same time, I uploaded /tmp/hook.so containing the C binary compiled for the reverse shell. The request triggered two file write operations, so I leveraged this so that both files were written within the same request.”

Cybersecurity

“If these files are written successfully, the command execution on the system will run /tmp/hook.so while both persistent command executions, which will result in a reverse shell.”

Without official fixes, users are advised to block semicolons in the URL path and block drop requests when the connection header contains the value x-real-ip. It is also recommended to monitor network traffic and logs for suspicious activity.

Hacker News has reached out to the Versa network for comments and will update the story if there is a reply.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUniversity of Bristol Semiconductor Devices Unlock 6G Infrastructure
Next Article Hong Kong passes the Stubcoin bill as more governments recognize digital assets
user
  • Website

Related Posts

Chinese hackers exploit Trimble CityWorks flaws to infiltrate US government networks

May 22, 2025

Critical Windows Server 2025 DMSA vulnerability allows for active directory compromise

May 22, 2025

Chinese hackers exploit Ivanti EPMM bug in global enterprise network attacks

May 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Georgetown scholars recall the “die process ock ha ha” of immigration prisons

Top Startup and Tech Funding News – May 22, 2025

Federal judges stop immigration authorities from revoking the legal status of international students

Top $Trump holder heads for an exclusive crypto dinner with the president

Trending Posts

Lebanon PM condemns wave of attacks on Lebanon in southern Israel | Israel attacks Lebanon News

May 22, 2025

Russia says it received a list of Ukrainian names for major prisoner swaps | News of the Russian-Ukraine War

May 22, 2025

Trump blocks Harvard’s ability to register international students Donald Trump News

May 22, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top Startup and Tech Funding News – May 22, 2025

Psy develops the first unreliable bridge from Dogecoin to Solana

Founder of Amazon’s PillPack Launch General Medicine, a new startup tackling healthcare frustration in the US

HALO Security achieves SOC 2 Type 1 compliance and validates security controls of the attack surface management platform

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.