IBM has resolved two critical vulnerabilities in its AIX operating system that could allow command execution. The list of shortcomings, which impact AIX versions 7.2 and 7.3, is below:
CVE-2024-56346 (CVSS score: 10.0) – A vulnerability that allows a remote attacker to run any commands through the AIX nimesis NIM master service.
By infosecbulletin
/ Friday , March 21 2025
IBM has resolved two critical vulnerabilities in its AIX operating system that could allow command execution. The list of shortcomings,...
Read More
By infosecbulletin
/ Wednesday , March 19 2025
WhatsApp has patched a zero-click, zero-day vulnerability used to install Paragon's Graphite spyware following reports from security researchers at the...
Read More
By infosecbulletin
/ Wednesday , March 19 2025
CISA has issued a critical alert about a critical vulnerability in Fortinet’s FortiOS and FortiProxy systems. CVE-2025-24472, an authentication bypass...
Read More
By infosecbulletin
/ Wednesday , March 19 2025
11 nation-state groups from North Korea, China, and Russia are exploiting a vulnerability in a common feature of Microsoft Windows....
Read More
By infosecbulletin
/ Tuesday , March 18 2025
Attackers are actively targeting OpenAI, exploiting CVE-2024-27564, a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s ChatGPT infrastructure. Veriti’s latest research...
Read More
By infosecbulletin
/ Tuesday , March 18 2025
A critical vulnerability, CVE-2024-540385, has been found in HPE Cray XD670 servers using the AMI BMC Redfish API, allowing remote...
Read More
By infosecbulletin
/ Tuesday , March 18 2025
CVE-2025-24813, a critical remote code execution vulnerability, is actively exploited, enabling attackers to control vulnerable Apache Tomcat servers with a...
Read More
By infosecbulletin
/ Monday , March 17 2025
MIST Cyber Security Club hosted an exciting MIST CyberTron 2025, featuring a CTF competition, hacking sessions, live demonstrations, and real-world...
Read More
By infosecbulletin
/ Monday , March 17 2025
Cybersecurity researchers unveil a critical remote code execution vulnerability (CVE-2025-24016) in Wazuh, a popular open-source SIEM platform. The vulnerability has...
Read More
By infosecbulletin
/ Monday , March 17 2025
A recent report from Elastic reveals that threat actors misuse Amazon Web Services (AWS) Simple Notification Service (SNS) for malicious...
Read More
CVE-2024-56347 (CVSS score: 9.6) – a vulnerability that allows remote attackers to run commands through the AIX nimsh service’s security features.
Although there is no evidence of these critical flaws being exploited, users should quickly apply the necessary patches to protect against potential threats.
Veeam has issued security updates to fix a critical vulnerability in its Backup & Replication software that could allow remote code execution.
The vulnerability CVE-2025-23120 has a CVSS score of 9.9 out of 10 and affects version 12.3.0.310 and earlier builds of version 12.
“A vulnerability allowing remote code execution (RCE) by authenticated domain users,” the company said in an advisory released Wednesday.
Security researcher Piotr Bazydlo from watchTowr discovered and reported a flaw that has been fixed in version 12.3.1 (build 12.3.1.1139).
CVE-2025-23120, identified by Bazydlo and Sina Kheirkhah, arises from Veeam’s inconsistent deserialization handling. This issue allows a permitted class to enable inner deserialization that uses a blocklist to prevent the deserialization of risky data.
A threat actor could exploit deserialization gadgets not on the blocklist, specifically Veeam.Backup.EsxManager.xmlFrameworkDs and Veeam.Backup.Core.BackupSummary, to execute remote code.
“These vulnerabilities can be exploited by any user who belongs to the local users group on the Windows host of your Veeam server,” the researchers said. “Better yet – if you have joined your server to the domain, these vulnerabilities can be exploited by any domain user.”
Veeam’s patch adds two gadgets to the blocklist, but the solution could still be at risk if new deserialization gadgets are found.