Brutkey

cR0w
@cR0w@infosec.exchange
cR0w
@cR0w@infosec.exchange

This round includes yet another LPE in GlobalProtect.

https://security.paloaltonetworks.com/CVE-2025-2183

Shared default creds across Cortex Broker VMs is a dumb one:

https://security.paloaltonetworks.com/CVE-2025-2184

Exposed CAKs is just fun to say because I'm 12:

https://security.paloaltonetworks.com/CVE-2025-2182

And a few others in there. Happy hacking.

cR0w
@cR0w@infosec.exchange

PAN finally published their August advisory and they have some interesting ones. Remember that they use CVSS-BT to make their score "more accurate" ( read: lower ).

https://security.paloaltonetworks.com/

#patchTuesday

cR0w
@cR0w@infosec.exchange

Today's earworm.

https://www.youtube.com/watch?v=m4veL-eaN5g

cR0w
@cR0w@infosec.exchange

@wall_e@ioc.exchange @wurzelmann@mastodon.wurzelmann.at Really though, it was last week.

cR0w
@cR0w@infosec.exchange

Has it really been over a month now since we've had a sev:CRIT from Cisco?

knocks on wood

cR0w
@cR0w@infosec.exchange

Here's a bunch of Netis Router things for those that might be interested.

https://github.com/Chinesexilinyu

cc:
@Dio9sys@haunted.computer @da_667@infosec.exchange

#internetOfShit

cR0w
@cR0w@infosec.exchange

sev:HIGH LPE in linux-pam.

https://access.redhat.com/security/cve/CVE-2025-8941

A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.

cR0w
@cR0w@infosec.exchange

In true XKCD 927 fashion, Muddled Libra / UNC3944 / Scattered Spider / Lapsus$ / whatever new name the multi-billion dollar security companies are calling the kids these days is now going to be referred to as FEISTY CUMSTAIN.

#GAYINT #FURINT #threatIntel

cR0w
@cR0w@infosec.exchange

F5 put out their quarterly advisory, including a KB for MadeYouReset.

https://my.f5.com/manage/s/article/K000152635

#patchTuesday

cR0w
@cR0w@infosec.exchange

Check your HTTP/2 shit. Similar to the Rapid Reset vuln, this is another DoS in HTTP/2 they're calling Made You Reset.

https://www.imperva.com/blog/madeyoureset-turning-http-2-server-against-itself/

Patches in NGINX, Envoy, Apache, and HAProxy added thresholds for stream resets and behavioral analytics to flag clients abusing the protocol.
Tomcat also has an advisory for it:

https://lists.apache.org/thread/9ydfg0xr0tchmglcprhxgwhj0hfwxlyf
The MadeYouReset vulnerability was found to affect several widely used HTTP/2 server implementations, including Netty, Jetty, Apache Tomcat, IBM WebSphere, and BIG-IP.
https://deepness-lab.org/publications/madeyoureset/

cR0w
@cR0w@infosec.exchange

Here's the Netty advisory for this:

https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4