Close Menu
TechReport.grTechReport.gr
  • Phones
    • iPhone – iOS
    • Android
    • Samsung
  • Computer
  • Internet
    • Security
  • Entertainment
    • Gaming
  • Business
  • Economics
    • Cryptos
  • Gadgets
  • Technology
    • Science
    • Reviews
    • How-To
  • Health
    • Psychology

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot
Top 20 Most Exploited Vulnerabilities of 2025

Top 20 Most Exploited Vulnerabilities of 2025

12 Δεκεμβρίου 2025
Τα Βιβλία Google Play λαμβάνουν μια τεράστια αναβάθμιση παραγωγικότητας

Τα Βιβλία Google Play λαμβάνουν μια τεράστια αναβάθμιση παραγωγικότητας

12 Δεκεμβρίου 2025
Cosmote Gigamax Unlimited Π: Η ΕΚΠΛΗΚΤΙΚΗ αύξηση που θα σου αλλάξει τα δεδομένα!

Cosmote Gigamax Unlimited Π: Η ΕΚΠΛΗΚΤΙΚΗ αύξηση που θα σου αλλάξει τα δεδομένα!

12 Δεκεμβρίου 2025
Facebook X (Twitter) Instagram
  • Home
  • Πολιτική απορρήτου
  • Σχετικά με εμάς
  • Contact With TechReport
  • Greek Live Channels IPTV 2025
Facebook X (Twitter) Instagram Pinterest Vimeo
TechReport.grTechReport.gr
  • Phones
    • iPhone – iOS
    • Android
    • Samsung
  • Computer
  • Internet
    • Security
  • Entertainment
    • Gaming
  • Business
  • Economics
    • Cryptos
  • Gadgets
  • Technology
    • Science
    • Reviews
    • How-To
  • Health
    • Psychology
TechReport.grTechReport.gr
Αρχική » Top 20 Most Exploited Vulnerabilities of 2025
Security

Top 20 Most Exploited Vulnerabilities of 2025

Marizas DimitrisBy Marizas Dimitris12 Δεκεμβρίου 2025Δεν υπάρχουν Σχόλια24 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Top 20 Most Exploited Vulnerabilities of 2025
Top 20 Most Exploited Vulnerabilities of 2025
Share
Facebook Twitter LinkedIn Pinterest Tumblr Telegram WhatsApp Email


The cybersecurity landscape of 2025 has been marked by an unprecedented surge in vulnerability exploitation, with threat actors leveraging critical flaws across enterprise software, cloud infrastructure, and industrial systems.

This comprehensive analysis examines the twenty most dangerous exploited vulnerabilities of the year, highlighting their technical details, exploitation methods, and the urgent need for organizations to prioritize patching and defense strategies.

These vulnerabilities represent a combined CVSS severity rating averaging 8.5, with two achieving the maximum score of 10.0, underscoring the critical nature of these security flaws.

Table Detailing Most Exploited Vulnerabilities of 2025

CVE IDVulnerability TitleCVSS v3.1 ScoreAffected ProductVulnerability TypeAuthentication RequiredActive ExploitationDisclosure DateCISA KEV StatusPrimary Attack Vector
CVE-2025-55182React2Shell – React Server Components RCE10.0 (Critical)React Server Components (Meta)Deserialization / Unauthenticated RCENo (Unauthenticated)Yes – Mesh Agent Malware, Cryptocurrency MinersDecember 3, 2025Added December 2025Network / Web Application
CVE-2025-62221Windows Cloud Files Mini Filter Driver Use-After-Free7.8 (High)Windows Cloud Files Mini Filter DriverUse-After-Free / Memory CorruptionYes (Authenticated Local)Yes – Patch Tuesday December 2025December 9, 2025Added December 2025Local System Access
CVE-2025-6218WinRAR Path Traversal Remote Code Execution7.8 (High)WinRAR 7.11 and earlierPath Traversal / Arbitrary File ExtractionNo (Unauthenticated – Archive File)Yes – APT-C-08, GOFFEE, Bitter GroupsMarch 2025 / June 2025 PatchAdded December 2025User Interaction (Archive File)
CVE-2025-48633Android Framework Information DisclosureHigh (Not Specified)Android 13-16 FrameworkInformation Disclosure / Sandbox BypassNo (Malicious App)Yes – State Actors (Limited Targeted)December 2, 2025Added December 2025Mobile Application / Malicious App
CVE-2025-48572Android Framework Privilege EscalationHigh (Not Specified)Android 13-16 FrameworkPrivilege Escalation / Unauthorized ActivityNo (Malicious App)Yes – State Actors (Limited Targeted)December 2, 2025Added December 2025Mobile Application / Malicious App
CVE-2025-5777CitrixBleed 2 – Citrix NetScaler Memory Disclosure9.3 (Critical)Citrix NetScaler ADC/GatewayOut-of-Bounds Read / Session HijackingNo (Unauthenticated)Yes – RansomHub, Multiple Threat GroupsJune 17, 2025Added July 2025 (24-hr deadline)Network / VPN Gateway
CVE-2025-48384Git Arbitrary File Write on Non-Windows Systems8.0-8.1 (High)Git on macOS and LinuxArbitrary File Write / Git Hook ExecutionNo (Unauthenticated – Repository Clone)Yes – Sophisticated Social EngineeringJuly 8, 2025Added August 2025Network / Git Repository
CVE-2025-41244VMware Aria Tools Local Privilege Escalation7.8 (High)VMware Aria Operations, VMware ToolsUntrusted Search Path / LocalPrivEscYes (Local User)Yes – State Actor UNC5174 (Chinese APT)September 29, 2025State Actor Exploitation (Not KEV)Local System Access
CVE-2025-9242WatchGuard Firebox IKEv2 Out-of-Bounds Write9.3 (Critical)WatchGuard Firebox (Fireware OS)Out-of-Bounds Write / Stack OverflowNo (Unauthenticated)Yes – Confirmed KEV ListingSeptember 17, 2025Added November 2025Network / VPN IKEv2 Protocol
CVE-2025-12480Gladinet Triofox Improper Access Control9.1 (Critical)Gladinet TriofoxImproper Access Control / Authentication BypassNo (Unauthenticated)Yes – UNC6485 ClusterNovember 12, 2025 (Public)Added November 2025Network / HTTP Access
CVE-2025-62215Windows Kernel Race Condition Privilege Escalation7.0 (High)Windows Kernel (All Supported OS)Race Condition / Double Free Heap CorruptionYes (Authenticated Local)Yes – Confirmed KEV ListingNovember 11, 2025Added November 2025Local System Access
CVE-2025-4664Google Chrome Cross-Origin Data Leak8.8 (High)Google ChromeCross-Origin Data Leak / Referrer Policy BypassNo (Unauthenticated – User Interaction)Yes – Confirmed KEV ListingMay 14, 2025Added May 2025Network / Web Browser
CVE-2025-59287Microsoft WSUS Deserialization Remote Code Execution9.8 (Critical)Microsoft WSUS (Windows Server Update Services)Unsafe Deserialization / Gadget Chain RCENo (Unauthenticated)Yes – Widespread Exploitation POCOctober 23, 2025 (Emergency Patch)Added October 2025Network / WSUS Port 8530/8531
CVE-2025-32463Sudo Chroot Privilege Escalation9.3 (Critical)Sudo 1.9.14-1.9.17Relative Path Traversal / Privilege EscalationYes (Local User)Yes – Confirmed KEV ListingJune 2025Added October 2025Local System Access
CVE-2025-20333Cisco ASA/FTD Buffer Overflow Remote Code Execution9.9 (Critical)Cisco ASA/FTDBuffer Overflow / VPN Authentication BypassYes (Authenticated VPN)Yes – ArcaneDoor (UAT4356) State SponsorSeptember 24, 2025Added September 2025 (Emergency Directive)Network / VPN Authentication
CVE-2025-20362Cisco ASA/FTD Missing Authorization Authentication Bypass6.5 (Medium)Cisco ASA/FTDMissing Authorization / Access Control FlawNo (Unauthenticated)Yes – ArcaneDoor Chain with CVE-2025-20333September 24, 2025Added September 2025 (Emergency Directive)Network / Firewall Management
CVE-2025-10585Google Chrome V8 Type Confusion Remote Code Execution8.8 (High)Google ChromeType Confusion / Memory Corruption RCENo (Unauthenticated – User Interaction)Yes – Google TAG ConfirmedSeptember 16, 2025Added September 2025Network / Web Browser
CVE-2025-5086DELMIA Apriso Deserialization of Untrusted Data RCE9.0 (Critical)DELMIA Apriso (2020-2025 Release)Unsafe Deserialization / Gadget Chain RCENo (Unauthenticated)Yes – SANS ISC ObservedJune 2, 2025 (Patch), September 11 (KEV)Added September 2025Network / HTTP SOAP Request
CVE-2025-53690Sitecore ViewState Deserialization Remote Code Execution9.0 (Critical)Sitecore Experience Manager/PlatformViewState Deserialization / Gadget Chain RCENo (Unauthenticated – Known Machine Key)Yes – Mandiant Threat Defense ConfirmedSeptember 2, 2025Added September 2025Network / Web Application
CVE-2025-32433Erlang/OTP SSH Daemon Pre-Authentication RCE10.0 (Critical)Erlang/OTP SSH DaemonSSH Protocol Parsing / Pre-Auth RCENo (Pre-Authentication)Yes – OT Environment TargetingApril 16, 2025Confirmed Active ExploitationNetwork / SSH Protocol

Most Exploited Vulnerabilities of 2025

CVE-2025-55182: React2Shell

The most critical vulnerability of 2025, CVE-2025-55182, dubbed “React2Shell,” represents a watershed moment in web application security. Disclosed on December 3, 2025, by Meta, this unauthenticated remote code execution flaw in React Server Components achieved the maximum CVSS score of 10.0. The vulnerability stems from insecure deserialization within the React Server Components (RSC) Flight protocol, where the server processes RSC payloads without adequate validation.​

According to Wiz Research, 39% of cloud environments contain vulnerable instances, making this one of the most widespread critical vulnerabilities in recent history.

The flaw affects React versions 19.0, 19.1.0, 19.1.1, and 19.2.0, as well as downstream frameworks like Next.js. Security researchers confirmed that default configurations are vulnerable, meaning standard Next.js applications created with create-next-app can be exploited without any code changes by developers.​

Rapid7 validated working proof-of-concept exploits within 48 hours of disclosure, and by December 8, 2025, exploitation attempts were detected on honeypots worldwide.

The exploitation methodology involves crafting malicious RSC payloads that trigger server-side execution logic, allowing attackers to execute privileged JavaScript code with SYSTEM-level access. Organizations observed attackers deploying Mesh Agent malware and cryptocurrency miners via PowerShell commands executed through the vulnerability.​

CVE-2025-32433: Erlang/OTP SSH Zero-Day Crisis

CVE-2025-32433 represents another maximum severity vulnerability (CVSS 10.0) affecting the Erlang/OTP SSH daemon, disclosed on April 16, 2025. This pre-authentication remote code execution flaw allows attackers to execute arbitrary code without completing the SSH authentication process, exploiting improper handling of SSH protocol messages during the pre-authentication phase.​

The vulnerability affects Erlang/OTP versions 27.3.2 and earlier, 26.2.5.10 and earlier, 25.3.2.19 and earlier, and all versions from OTP 17.0 and older. Erlang/OTP is foundational technology used by organizations including Ericsson, Cisco, and WhatsApp, making this vulnerability particularly dangerous for telecommunications, messaging platforms, IoT infrastructure, and financial services.​

Palo Alto Networks reported that between May 1 and May 9, 2025, exploitation attempts surged sharply, with 70% of observed detections coming from firewalls safeguarding operational technology environments. The attack methodology involves sending SSH_MSG_CHANNEL_OPEN messages before authentication to initiate session channels, followed by SSH_MSG_CHANNEL_REQUEST with malicious “exec” payloads. If the SSH daemon runs with elevated privileges such as root, successful exploitation grants complete system control.​

CVE-2025-59287: Microsoft WSUS Deserialization Vulnerability

Microsoft Windows Server Update Services became a prime target in 2025 through CVE-2025-59287, a critical remote code execution vulnerability with a CVSS score of 9.8. Disclosed with an out-of-band emergency patch on October 23, 2025, this flaw stems from unsafe deserialization of untrusted data in the WSUS service.​

The vulnerability allows unauthenticated attackers to send crafted requests to WSUS endpoints on ports 8530 and 8531, achieving code execution with SYSTEM privileges. According to Huntress and Unit 42, attackers exploited the flaw by targeting the GetCookie() endpoint and ReportingWebService, causing improper deserialization of AuthorizationCookie objects using insecure BinaryFormatter and SoapFormatter.​

Initial exploitation was observed in the wild with process chains showing wsusservice.exe and w3wp.exe spawning cmd.exe and powershell.exe to execute Base64-encoded reconnaissance commands. Attackers collected information using whoami, net user /domain, and ipconfig /all commands, exfiltrating data to remote webhook endpoints.

The vulnerability was added to CISA’s Known Exploited Vulnerabilities catalog immediately following disclosure, with a public proof-of-concept exploit accelerating widespread attacks.​

CVE-2025-62221: Windows Cloud Files Driver Zero-Day

Microsoft’s December 2025 Patch Tuesday included fixes for CVE-2025-62221, a use-after-free elevation of privilege vulnerability in the Windows Cloud Files Mini Filter Driver that was actively exploited as a zero-day. With a CVSS score of 7.8, this vulnerability allows authenticated local attackers to escalate privileges to the SYSTEM level without user interaction.​

The flaw stems from a use-after-free condition where a program attempts to use a block of memory that has already been returned to system control. CISA confirmed active exploitation by adding the vulnerability to its Known Exploited Vulnerabilities catalog on December 9, 2025, mandating Federal Civilian Executive Branch agencies to apply updates by December 30, 2025.​

Security researchers noted that the vulnerability is particularly dangerous because it affects the Cloud Files Mini Filter Driver, a core Windows component managing cloud storage integration, present even if applications like OneDrive, Google Drive, or iCloud aren’t installed.

The low attack complexity and minimal privilege requirements make exploitation accessible to many potential attackers, enabling threat actors to disable security tooling, access sensitive information, move laterally across networks, and establish persistent high-privilege access.​

CVE-2025-62215: Windows Kernel Race Condition Zero-Day

November 2025’s Patch Tuesday addressed CVE-2025-62215, a race condition vulnerability in the Windows Kernel with a CVSS score of 7.0, actively exploited in the wild. The vulnerability, discovered by Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC), allows authenticated attackers with low-level privileges to elevate their access to SYSTEM-level privileges.​

The race condition vulnerability involves concurrent execution using shared resources with improper synchronization (CWE-362). Attackers exploit this by running specially crafted programs that repeatedly provoke timing errors, forcing multiple threads to access the same kernel resource without proper synchronization. This confuses the kernel’s memory handling, causing it to free the same memory block twice, a “double free” condition that corrupts the kernel heap and provides attackers a path to overwrite memory and seize control of execution flow.​

Security experts assess that CVE-2025-62215 is primarily being used after initial compromise via phishing, RCE, or sandbox escape to elevate privileges, harvest credentials, and move laterally. The vulnerability affects all currently supported Windows OS editions, including Windows 10, Windows 11, Windows Server 2019 through Windows Server 2025, and Windows 10 Extended Security Updates (ESU). CISA set a remediation date of December 3, 2025, for federal agencies.​

CVE-2025-48572 and CVE-2025-48633: Android Framework Zero-Days

Google’s December 2025 Android Security Bulletin addressed over 100 vulnerabilities, including two high-severity zero-days in the Android Framework that CISA added to its KEV catalog on December 2, 2025. CVE-2025-48572 is an elevation of privilege vulnerability allowing malicious apps to launch unauthorized activities from the background without user interaction. CVE-2025-48633 is an information disclosure flaw enabling apps to access sensitive system memory, potentially bypassing Android’s sandboxing protections.​

Both vulnerabilities affect Android versions 13 through 16 and have been confirmed under “limited, targeted exploitation” in the wild, likely by state actors or commercial surveillance tools targeting high-value individuals. CVE-2025-48633 exists in the hasAccountsOnAnyUser method of DevicePolicyManagerService.java, where a logic error allows attackers to add a Device Owner after provisioning, leading to local escalation of privilege. CVE-2025-48572 stems from a permissions bypass in the Android Frameworks Base package, allowing unauthorized background activity launches.​

Security researchers note that these vulnerabilities are particularly dangerous when chained together, with CVE-2025-48633 used to exfiltrate sensitive data or escape the application sandbox, while CVE-2025-48572 is leveraged to gain system-level privileges. Federal agencies were mandated to apply patches by December 23, 2025.​

CVE-2025-5777: CitrixBleed 2

CVE-2025-5777, dubbed “CitrixBleed 2” due to its similarities with the 2023 CitrixBleed vulnerability (CVE-2023-4966), represents a critical out-of-bounds read vulnerability in Citrix NetScaler ADC and Gateway with a CVSS score of 9.3. Disclosed on June 17, 2025, and added to CISA’s KEV catalog on July 11 with an unprecedented 24-hour patching deadline, this vulnerability allows attackers to leak sensitive memory data, including authentication tokens and session cookies.​

The vulnerability affects NetScaler devices configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. According to security researcher Kevin Beaumont, exploitation started as far back as mid-June 2025, with one of the IP addresses linked to RansomHub ransomware activity. GreyNoise data shows exploitation efforts originating from 10 unique malicious IP addresses located in Bulgaria, the United States, China, Egypt, and Finland over 30 days, primarily targeting the United States, France, Germany, India, and Italy.​

Attackers send specially crafted HTTP requests to vulnerable Citrix appliances, which respond with chunks of memory containing session data. Using leaked session tokens, attackers can hijack active VPN sessions, bypass multi-factor authentication, and access internal systems without credentials. Horizon3.ai researchers identified suspicious changes in the nsppe binary (NetScaler Packet Parsing Engine) and discovered that configuration utilities administrators use to manage NetScaler Gateway endpoints also utilize vulnerable memory space, making session tokens belonging to the “nsroot” user vulnerable to theft.​

CVE-2025-20333 and CVE-2025-20362: Cisco Firewall Exploitation Chain

Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) suffered from two critical vulnerabilities exploited in the wild as zero-days before patches became available. CVE-2025-20333, with a CVSS score of 9.9, is a buffer overflow vulnerability in the VPN web server component, allowing authenticated attackers to execute arbitrary code as root. CVE-2025-20362, with a CVSS score of 6.5, is a missing authorization vulnerability enabling unauthenticated attackers to access restricted URL endpoints.​

CISA issued Emergency Directive 25-03 on September 25, 2025, confirming active exploitation and widespread scanning. The agency attributed exploitation to the same threat actor behind ArcaneDoor (UAT4356), a state-sponsored espionage campaign first observed in 2024. The U.K. National Cyber Security Centre (NCSC) reported attacks delivering malware such as RayInitiator and LINE VIPER.​

The exploitation chain involves attackers using CVE-2025-20362 to bypass authentication through crafted HTTP(S) requests, then chaining it with CVE-2025-20333 to achieve root-level remote code execution. On November 5, 2025, Cisco warned of a new attack variant causing unpatched devices to unexpectedly reload, leading to denial-of-service conditions. The vulnerabilities affect Cisco ASA versions 9.16–9.23 and Cisco FTD versions 7.0–7.7.​

CVE-2025-9242: WatchGuard Firebox Out-of-Bounds Catastrophe

WatchGuard Firebox firewalls faced critical exploitation through CVE-2025-9242, an out-of-bounds write vulnerability in the iked process of WatchGuard Fireware OS with a CVSS score of 9.3. Disclosed on September 17, 2025, and added to CISA’s KEV catalog on November 12, 2025, this vulnerability allows remote unauthenticated attackers to execute arbitrary code.​

The vulnerability affects both mobile user VPN with IKEv2 and branch office VPN using IKEv2 when configured with a dynamic gateway peer. WatchTowr Labs researchers identified the flaw as a stack-based buffer overflow in 2025, noting the lack of modern exploit mitigations in the enterprise-grade appliance. The vulnerability affects Fireware OS versions 11.10.2 through 11.12.4_Update1, 12.0 through 12.11.3, and 2025.1.​

Security analysis revealed suspicious changes within /usr/bin/iked, specifically in the ike2_ProcessPayload_CERT function where missing length validation allows attackers to overflow buffers with crafted IKEv2 packets. The unauthenticated portion of the IKE protocol consists of two initial packet exchanges, with the vulnerable code processed during IKE_SA_AUTH, meaning attackers need only deliver two packets to reach the vulnerable code path.

Because attack potential includes disabling security tooling, accessing sensitive information, moving laterally across networks, and establishing persistent high-privilege access, organizations were urged to prioritize patching outside normal patch cycles.​

CVE-2025-6218: WinRAR Path Traversal Exploitation

WinRAR, one of the most popular file archiving utilities worldwide, suffered from CVE-2025-6218, a critical path traversal vulnerability with a CVSS score of 7.8 affecting versions 7.11 and earlier. Disclosed in March 2025 and patched in WinRAR 7.12 Beta 1 in June 2025, the vulnerability was added to CISA’s KEV catalog on December 10, 2025, following confirmation of active exploitation by multiple threat groups.​

The vulnerability stems from improper path validation in WinRAR’s RARReadHeader and RARProcessFile routines, which fail to normalize or validate relative path components like ‘../’ and ‘..’. Malicious archives containing crafted paths can extract files outside the intended folder, such as placing executables in the Windows Startup folder for automatic execution upon login. The flaw is exploitable whether the archive entry’s stored path is absolute or relative.​

Multiple threat actors have been observed exploiting this vulnerability, including GOFFEE (Paper Werewolf), Bitter (APT-C-08/Manlinghua), and Gamaredon. SecPod researchers documented a targeted cyber-espionage campaign attributed to APT-C-08, focusing on government organizations in South Asia, using phishing emails with malicious RAR archives. The attack payload included a C# trojan designed to contact external servers for command-and-control, enabling keylogging, screenshot capture, RDP credential harvesting, and file exfiltration.​

CVE-2025-48384: Git Arbitrary File Write Vulnerability

The widely used Git version control system faced exploitation through CVE-2025-48384, a high-severity vulnerability (CVSS 8.0–8.1) affecting macOS and Linux installations, disclosed on July 8, 2025. CISA added this vulnerability to its KEV catalog on August 26, 2025, with a remediation deadline of September 15, 2025, after confirming active exploitation.​

The vulnerability stems from Git’s inconsistent handling of carriage return characters when parsing configuration files and submodule paths. When reading a config value, Git strips trailing carriage return and line feed (CRLF) characters, but when writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. Attackers craft malicious .gitmodules files with submodule paths ending in carriage returns, and when repositories are recursively cloned via git clone –recursive, the path parsing inconsistency allows arbitrary file writes to attacker-specified paths.​

CrowdStrike identified active exploitation combining sophisticated social engineering tactics with malicious Git repository cloning operations. The exploitation involves strategically placing symlinks and leveraging carriage return confusion to write malicious content directly to the Git submodule’s hooks directory, which Git automatically executes as part of the normal submodule checkout process. DataDog researchers noted that the vulnerability could also be abused to overwrite victims’ Git configuration files, exfiltrating intellectual property such as proprietary source code to attacker servers transparently.​

CVE-2025-12480: Gladinet Triofox Improper Access Control

Gladinet Triofox, an on-premises and hybrid file-sharing platform widely used by managed service providers and enterprises, suffered from CVE-2025-12480, an improper access control vulnerability with a CVSS score of 9.1. While Gladinet patched the flaw on July 26, 2025, in version 16.7.10368.56560, the vulnerability wasn’t publicly disclosed until November 12, 2025, when it was added to CISA’s KEV catalog following active exploitation observations.​

Mandiant Threat Defense discovered that threat cluster UNC6485 exploited the flaw as early as August 24, 2025, nearly a month after the patch was released, but without public CVE disclosure. The vulnerability allows attackers to abuse HTTP Host header validation to access the management/AdminDatabase.aspx setup workflow, create native administrative accounts with no credentials, and then configure the product’s anti-virus executable path to run malicious scripts.​

The exploitation chain involved modifying the Host header field to bypass access controls, successfully accessing AdminAccount.aspx, which redirects to InitAccount.aspx for creating new admin accounts. Once authenticated with the newly created Admin account, attackers uploaded malicious files and executed them using the built-in anti-virus feature, with the configured anti-virus path inheriting Triofox parent process privileges and running under the SYSTEM account context. Observed attack activity included deploying PLINK to tunnel RDP externally and downloading files to staging directories like C:\WINDOWS\Temp.​

CVE-2025-32463: Sudo Privilege Escalation via Chroot

A critical vulnerability (CVSS 9.3) was discovered in Sudo versions 1.9.14 through 1.9.17, reported by Rich Mirch from Stratascale Cyber Research Unit in June 2025. CVE-2025-32463 allows local users to obtain root access by exploiting the –chroot option, where /etc/nsswitch.conf from a user-controlled directory is used.​

The vulnerability stems from a change introduced in sudo 1.9.14 that allowed path resolution via chroot() using a user-specified root directory while the sudoers file was still being evaluated. An attacker could prepare a writable directory (for example under /tmp), place a fake /etc/nsswitch.conf and a malicious libnss_*.so library there, then invoke sudo with the –chroot option, causing sudo to load the attacker’s code with root privileges.​

Major Linux distributions, including Ubuntu, Red Hat, SUSE, and Debian, issued security advisories and patches. The vulnerability was fixed in sudo version 1.9.17p1, reverting the change from sudo 1.9.14 and marking the chroot feature as deprecated. CISA added the vulnerability to its KEV catalog in October 2025, emphasizing the severity for enterprise Linux environments.​

CVE-2025-4664: Chrome Cross-Origin Data Leak

Google Chrome was exploited via CVE-2025-4664, a high-severity vulnerability (CVSS 8.8) affecting versions prior to 136.0.7103.113, which was disclosed and patched on May 14, 2025. CISA added the vulnerability to its KEV catalog on May 15, 2025, with a remediation due date of June 5, 2025, confirming active exploitation.​

The vulnerability stems from insufficient policy enforcement in the Chrome Loader component, allowing remote attackers to leak cross-origin data through crafted HTML pages. The issue lies in how Chrome handles the Link HTTP header on sub-resource requests such as images and scripts, honoring the referrer-policy directive even on sub-resources behavior not shared by other major browsers. Attackers can abuse this header by setting a looser policy like unsafe-url, causing Chrome to leak full referrer URLs including sensitive tokens or credentials to third-party domains.​

Security researcher Vsevolod Kokorin (“slonser_”) noted that the Link header can set a referrer-policy with unsafe-url specification, capturing full query parameters that can contain sensitive data. In OAuth flows, this might lead to account takeover, as developers rarely consider the possibility of stealing query parameters via an image from a third-party resource. The vulnerability required user interaction (opening malicious HTML pages), but that step is relatively easy to achieve through phishing or compromised websites.​

CVE-2025-10585: Chrome V8 Type Confusion Zero-Day

Google released emergency security updates in September 2025 to address CVE-2025-10585, an actively exploited type confusion vulnerability in the V8 JavaScript and WebAssembly engine. Discovered and reported by Google’s Threat Analysis Group (TAG) on September 16, 2025, the vulnerability achieved a high-severity rating and was confirmed under active exploitation.​

Type confusion vulnerabilities occur when Chrome doesn’t verify the object type it’s handling and uses it incorrectly, mistaking one type of data for another, like treating a list as a single value or a number as text. This can cause unpredictable behavior and allow attackers to manipulate memory and run code remotely through crafted JavaScript on malicious or compromised websites. The vulnerability affects Chrome versions prior to 140.0.7339.185/.186 on Windows/macOS and 140.0.7339.185 on Linux.​

CVE-2025-10585 represents the sixth Chrome zero-day publicly tied to active exploitation in 2025, following CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, CVE-2025-6554, and CVE-2025-6558. Security researchers emphasized that type confusion bugs in V8 are particularly powerful, as tricking the engine into misinterpreting memory layout allows attackers to corrupt memory, crash the browser, or gain code execution on the host, all just by getting users to load malicious pages or content. Because proof-of-concept exploits were available, unpatched systems faced immediate risk from widespread exploitation attempts.​

CVE-2025-5086: DELMIA Apriso Deserialization Catastrophe

Dassault Systèmes’ DELMIA Apriso manufacturing operations management platform suffered from CVE-2025-5086, a critical deserialization of untrusted data vulnerability with a CVSS score of 9.0. The vulnerability affects DELMIA Apriso versions from Release 2020 through Release 2025 and was patched on June 2, 2025, but not before active exploitation began.​

CISA added the vulnerability to its KEV catalog on September 11, 2025, after the SANS Internet Storm Center reported observing real-world exploitation attempts on September 3, 2025. The vulnerability allows remote, unauthenticated attackers to execute arbitrary code without authentication through malicious SOAP/HTTP requests to vulnerable endpoints. Security researcher Johannes Ullrich observed attacks originating from IP address 156.244.33[.]162, with payloads consisting of Base64-encoded, GZIP-compressed .NET executables embedded within XML.​

The malicious payload has been identified as a Windows executable classified by researchers as “Trojan.MSIL.Zapchast.gen,” a program designed for cyber espionage activities including keylogging, screenshot capture, and gathering active application lists. DELMIA Apriso is utilized in production processes for digitalization and monitoring, with widespread deployment in automotive, aerospace, electronics, high-tech, and industrial machinery sectors, supporting functions including production scheduling, quality management, resource allocation, and warehouse management. The exploitation represents a significant threat to operational technology environments and manufacturing critical infrastructure.​

CVE-2025-41244: VMware Privilege Escalation by State Actors

VMware Aria Operations and VMware Tools contained CVE-2025-41244, a local privilege escalation vulnerability with a CVSS score of 7.8 that was exploited by state-linked actors before public disclosure. The vulnerability was disclosed on September 29, 2025, but NVISO researchers confirmed that sophisticated Chinese state-sponsored threat actor UNC5174 had been covertly leveraging the flaw since at least mid-October 2024.​

The vulnerability affects systems with VMware Tools installed and managed by Aria Operations with Service Discovery Management Pack (SDMP) enabled, allowing malicious local actors with non-administrative privileges to escalate privileges to root on the same VM. The flaw exists in the service discovery feature within the get-versions.sh shell script’s get_version function, which uses broad-matching regular expressions that can match non-system binaries in user-writable directories, leading to untrusted search path vulnerabilities (CWE-426).​

When successfully exploited, attackers gain elevated privileges, enabling complete control over affected systems. The vulnerability impacts VMware Aria Operations versions prior to 8.18.5, VMware Cloud Foundation Operations versions prior to 9.0.1.0, and VMware Tools versions prior to 13.0.5.0, 13.0.5, and 12.5.4. Broadcom’s failure to disclose active exploitation at the time of the advisory drew criticism from the cybersecurity community, with researchers emphasizing that organizations were left unaware of the real-world threat level.​

CVE-2025-53690: Sitecore Deserialization Attacks

Sitecore Experience Manager (XM) and Experience Platform (XP) faced critical exploitation through CVE-2025-53690, a deserialization of untrusted data vulnerability (CVSS 9.0) affecting versions through 9.0. Mandiant Threat Defense discovered active ViewState deserialization attacks leveraging a sample machine key that had been exposed in Sitecore deployment guides from 2017 and earlier.​

The vulnerability affects customers who deployed any version of multiple Sitecore products using the sample key exposed in publicly available deployment guides, specifically Sitecore XP 9.0 and Active Directory 1.4 and earlier versions. Sitecore confirmed that updated deployments automatically generate unique machine keys and notified affected customers. The vulnerability enables attackers to inject and execute arbitrary code by exploiting insecure deserialization of untrusted data.​

Initial compromise was achieved by exploiting the ViewState Deserialization vulnerability on affected internet-facing Sitecore instances, resulting in remote code execution. A decrypted ViewState payload contained WEEPSTEEL malware designed for internal reconnaissance. Following successful exploitation, threat actors archived the root directory of the web application to obtain sensitive files such as web.config, deployed EARTHWORM network tunnel tools, DWAGENT remote access tools, and SHARPHOUND Active Directory reconnaissance tools. The attackers created local administrator accounts, dumped SAM/SYSTEM registry hives to compromise cached administrator credentials, and enabled lateral movement via RDP.​

The twenty most exploited vulnerabilities of 2025 demonstrate the evolving sophistication of threat actors and the persistent challenges organizations face in securing modern IT infrastructure. With an average CVSS score of 8.5 and multiple vulnerabilities achieving the maximum severity rating of 10.0, these flaws represent critical risks to enterprise security posture.

Several key trends emerge from this analysis. First, deserialization vulnerabilities continue to plague enterprise applications, accounting for six of the twenty most exploited flaws (CVE-2025-55182, CVE-2025-59287, CVE-2025-5086, CVE-2025-53690).

Second, privilege escalation vulnerabilities targeting operating system kernels and drivers remain attractive to attackers seeking to establish persistent access (CVE-2025-62221, CVE-2025-62215, CVE-2025-48572, CVE-2025-48633, CVE-2025-41244, CVE-2025-32463).

Third, network infrastructure devices, including firewalls, VPNs, and gateways, face persistent targeting by state-sponsored actors (CVE-2025-5777, CVE-2025-20333, CVE-2025-20362, CVE-2025-9242).​

Organizations must adopt a multi-layered defense strategy, prioritizing several key actions. Immediate patching of systems exposed to the internet or handling untrusted data should be the highest priority, particularly for maximum severity vulnerabilities like CVE-2025-55182 and CVE-2025-32433.

Implementation of network segmentation to isolate critical systems and limit lateral movement opportunities is essential, especially for operational technology environments vulnerable to CVE-2025-5086 and CVE-2025-41244. Enhanced monitoring and logging to detect exploitation attempts, particularly for deserialization attacks and privilege escalation behaviors, provides critical early warning capabilities.​

Federal agencies must comply with CISA KEV catalog deadlines, with all twenty vulnerabilities either already added to the catalog or confirmed under active exploitation. Private sector organizations should treat KEV additions as urgent security priorities requiring accelerated patch deployment outside normal maintenance windows.

The rapid exploitation timelines observed in 2025, with proof-of-concept exploits appearing within hours of disclosure for CVE-2025-55182 and CVE-2025-48384, underscore the critical importance of proactive security postures and prepared incident response capabilities.​

As the cybersecurity landscape continues to evolve, organizations must recognize that vulnerability management is not merely a technical challenge but a strategic imperative requiring executive attention, adequate resource allocation, and continuous vigilance.

The exploitation trends observed in 2025 will likely continue into 2026, with threat actors increasingly targeting supply chain dependencies, cloud infrastructure, and operational technology systems. Only through comprehensive defense-in-depth strategies, timely patching, and continuous monitoring can organizations hope to mitigate the risks posed by these critical vulnerabilities.



VIA: cybersecuritynews.com

Related Posts


Lessons from Oracle E-Business Suite Hack That Allegedly Compromises Nearly 30 Organizations Worldwide
Security

Φήμες ότι το πρώτο iPhone Fold θα διαθέτει κάμερα 24MP κάτω από την οθόνη
Technology

Το Pixel 6 και νεότερα μοντέλα αποκτούν λειτουργία εγγραφής κλήσεων
Technology
android cyber security cyber security news Meta technology update
Share. Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram WhatsApp Email
Previous ArticleΤα Βιβλία Google Play λαμβάνουν μια τεράστια αναβάθμιση παραγωγικότητας
Marizas Dimitris
  • Website
  • Facebook

Ο Δημήτρης είναι παθιασμένος με την τεχνολογία και τις καινοτομίες. Λατρεύει να εξερευνά νέες ιδέες, να επιλύει σύνθετα προβλήματα και να βρίσκει τρόπους ώστε η τεχνολογία να γίνεται πιο ανθρώπινη, απολαυστική και προσιτή για όλους. Στον ελεύθερο χρόνο του ασχολείται με το σκάκι και το poker, απολαμβάνοντας την στρατηγική και τη δημιουργική σκέψη που απαιτούν.

Related Posts

Τα Βιβλία Google Play λαμβάνουν μια τεράστια αναβάθμιση παραγωγικότητας
Android

Τα Βιβλία Google Play λαμβάνουν μια τεράστια αναβάθμιση παραγωγικότητας

12 Δεκεμβρίου 2025
iPhone Fold: Η άφιξή του αναμένεται να εδραιώσει την εποχή των book-style foldables
Technology

iPhone Fold: Η άφιξή του αναμένεται να εδραιώσει την εποχή των book-style foldables

12 Δεκεμβρίου 2025
Η παραβίαση δεδομένων του κολοσσού λιανικής Coupang επηρεάζει 33,7 εκατομμύρια πελάτες
Security

Η παραβίαση δεδομένων Coupang εντοπίστηκε σε πρώην εργαζόμενο που διατήρησε την πρόσβαση στο σύστημα

12 Δεκεμβρίου 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Οδηγός για το Πρόγραμμα «Ψηφιακές Συναλλαγές Β’» (2025) – Όσα πρέπει να γνωρίζουμε

13 Νοεμβρίου 20251.156 Views

Ο διαλογισμός έχει επικίνδυνες παρενέργειες. Τι λένε οι επιστήμονες;

30 Οκτωβρίου 2025570 Views
Αλλάζω Σύστημα Θέρμανσης και Θερμοσίφωνα οδηγός

Αλλάζω Σύστημα Θέρμανσης και Θερμοσίφωνα: Πλήρης Οδηγός για 100.000 Νέους Δικαιούχους

12 Νοεμβρίου 2025468 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest News
Top 20 Most Exploited Vulnerabilities of 2025 Security

Top 20 Most Exploited Vulnerabilities of 2025

Marizas Dimitris12 Δεκεμβρίου 2025
Τα Βιβλία Google Play λαμβάνουν μια τεράστια αναβάθμιση παραγωγικότητας Android

Τα Βιβλία Google Play λαμβάνουν μια τεράστια αναβάθμιση παραγωγικότητας

Marizas Dimitris12 Δεκεμβρίου 2025
Cosmote Gigamax Unlimited Π: Η ΕΚΠΛΗΚΤΙΚΗ αύξηση που θα σου αλλάξει τα δεδομένα! Technology

Cosmote Gigamax Unlimited Π: Η ΕΚΠΛΗΚΤΙΚΗ αύξηση που θα σου αλλάξει τα δεδομένα!

Marizas Dimitris12 Δεκεμβρίου 2025
Most Popular

Οδηγός για το Πρόγραμμα «Ψηφιακές Συναλλαγές Β’» (2025) – Όσα πρέπει να γνωρίζουμε

13 Νοεμβρίου 20251.156 Views

Ο διαλογισμός έχει επικίνδυνες παρενέργειες. Τι λένε οι επιστήμονες;

30 Οκτωβρίου 2025570 Views
Αλλάζω Σύστημα Θέρμανσης και Θερμοσίφωνα οδηγός

Αλλάζω Σύστημα Θέρμανσης και Θερμοσίφωνα: Πλήρης Οδηγός για 100.000 Νέους Δικαιούχους

12 Νοεμβρίου 2025468 Views
About TechReport.gr

Το TechReport.gr ιδρύθηκε με στόχο να αποτελέσει την πρώτη πηγή ενημέρωσης για όσους αναζητούν αξιόπιστη και εμπεριστατωμένη κάλυψη του τεχνολογικού κόσμου. Από την αρχή της λειτουργίας του, το site έχει δεσμευτεί στην παροχή ποιοτικού περιεχομένου που συνδυάζει ενημέρωση, ανάλυση και πρακτικές συμβουλές.
• Email: [email protected]
• Phone: +30 6980 730 713
Copyright © 2025| TechReport.gr | A project by: Δημήτρης Μάριζας
Λογότυπα, επωνυμίες, εμπορικά σήματα και γνωρίσματα ανήκουν στους νόμιμους ιδιοκτήτες.

Our Picks
Top 20 Most Exploited Vulnerabilities of 2025

Top 20 Most Exploited Vulnerabilities of 2025

12 Δεκεμβρίου 2025
Τα Βιβλία Google Play λαμβάνουν μια τεράστια αναβάθμιση παραγωγικότητας

Τα Βιβλία Google Play λαμβάνουν μια τεράστια αναβάθμιση παραγωγικότητας

12 Δεκεμβρίου 2025
Cosmote Gigamax Unlimited Π: Η ΕΚΠΛΗΚΤΙΚΗ αύξηση που θα σου αλλάξει τα δεδομένα!

Cosmote Gigamax Unlimited Π: Η ΕΚΠΛΗΚΤΙΚΗ αύξηση που θα σου αλλάξει τα δεδομένα!

12 Δεκεμβρίου 2025
Facebook X (Twitter) Instagram Pinterest
  • Phones
    • iPhone – iOS
    • Android
    • Samsung
  • Computer
  • Internet
    • Security
  • Entertainment
    • Gaming
  • Business
  • Economics
    • Cryptos
  • Gadgets
  • Technology
    • Science
    • Reviews
    • How-To
  • Health
    • Psychology
© 2025 TechReport.gr Designed and Developed by Dimitris Marizas.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.