The Week in Vulnerabilities: Open-Sources Fixes Urged by Cyble
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,了解其主要内容。 文章主要讨论了最近一周发现的漏洞,包括n8n、OpenSSL和GNU Inetutils等。威胁者和安全研究人员都在关注这些漏洞。文中提到有1147个漏洞被追踪,其中超过128个已经有公开的PoC,增加了实际攻击的可能性。还有108个被CVSS v3.1评为严重,54个被v4.0评为严重。 接下来是具体的漏洞例子:n8n的远程代码执行漏洞CVE-2025-68613,WinRAR的路径遍历漏洞CVE-2025-8088,OpenSSL的堆栈溢出CVE-2025-15467等。此外,CISA新增了多个已知被利用的漏洞到KEV目录中。 结论部分强调了开源软件供应链的风险,并给出了最佳实践建议,如优先处理高风险漏洞、保护网络资产、加强访问控制等。 现在我需要将这些信息浓缩到100字以内。要突出关键点:漏洞数量、影响范围、严重性评分、具体例子以及应对措施。 可能的结构是:上周发现大量漏洞,涉及多个软件;多个漏洞已有PoC;部分被评为严重;包括n8n、OpenSSL等;建议采取措施如优先处理高风险、保护资产等。 确保语言简洁明了,不使用“文章内容总结”之类的开头。 </think> 上周报告了大量新漏洞,包括影响n8n、OpenSSL和GNU Inetutils等软件的高危问题。超过128个漏洞已有公开概念验证代码(PoC),显著增加了实际攻击风险。其中108个被CVSS v3.1评为严重级别,54个被CVSS v4.0评为严重级别。研究人员建议优先处理这些高风险漏洞,并采取保护网络资产、加强访问控制等措施以降低风险。 2026-2-3 13:16:11 Author: cyble.com(查看原文) 阅读量:7 收藏

Vulnerabilities affecting n8n, OpenSSL and GNU Inetutils are among the flaws being noticed by threat actors and security researchers alike.

Cyble Vulnerability Intelligence researchers tracked 1,147 vulnerabilities in the last week, and more than 128 of the disclosed vulnerabilities already have a publicly available Proof-of-Concept (PoC), significantly increasing the likelihood of real-world attacks. 

A total of 108 vulnerabilities were rated as critical under the CVSS v3.1 scoring system, while 54 received a critical severity rating based on the newer CVSS v4.0 scoring system. 

Below are some of the IT vulnerabilities flagged by Cyble threat intelligence researchers for prioritization by security teams in recent reports to clients. 

The Week’s Top IT Vulnerabilities 

Cyble’s network of honeypot sensors detected attack attempts on CVE-2025-68613, a critical remote code execution flaw in the n8n open-source workflow automation platform. Workflow expressions supplied by authenticated users could execute in an insufficiently isolated context under the Improper Control of Dynamically-Managed Code Resources flaw, potentially enabling arbitrary code execution with n8n privileges and potential full system compromise. The issue is fixed in versions 1.120.4, 1.121.1, and 1.122.0. 

Vulnerabilities generating discussion in open-source communities included CVE-2025-8088, a high-severity path traversal vulnerability in WinRAR that exploits Alternate Data Streams (ADS) in crafted RAR archives. The vulnerability was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog last August, but recent reports reveal that multiple actors, including nation-state adversaries and financially motivated groups, are exploiting the flaw to establish initial access and deploy a diverse array of payloads. 

Also under active discussion is CVE-2025-15467, a critical stack buffer overflow in OpenSSL’s CMS (Cryptographic Message Syntax) AuthEnvelopedData parsing when using AEAD ciphers like AES-GCM. OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to the issue, while FIPS modules and OpenSSL 1.1.1 and 1.0.2 are not. 

report-ad-banner

Among the recent additions to CISA’s Known Exploited Vulnerabilities (KEV) catalog were CVE-2026-24858, an authentication bypass vulnerability in Fortinet products; CVE-2025-68645, a Local File Inclusion (LFI) vulnerability in the Webmail Classic UI of Zimbra Collaboration Suite (ZCS); and CVE-2026-1281, an Ivanti Endpoint Manager Mobile (EPMM) Code Injection vulnerability. 

CVE-2026-24061 is another recent CISA KEV addition, a critical authentication bypass vulnerability in GNU Inetutils telnetd. The flaw lies in the improper neutralization of argument delimiters, specifically allowing an attacker to inject the “-f root” value into the USER environment variable. After successful exploitation, a remote unauthenticated attacker can bypass authentication mechanisms to gain immediate root-level access to the system over the network. Cyble dark web researchers have observed threat actors on underground forums discussing weaponizing the vulnerability. 

Another vulnerability under discussion by threat actors on the dark web is CVE-2025-27237, a high-severity local privilege escalation vulnerability affecting Zabbix Agent and Agent 2 on Windows. The vulnerability is caused by an uncontrolled search path that loads the OpenSSL configuration file from a directory writable by low-privileged users. By modifying this configuration file and injecting a malicious DLL, a local attacker could elevate their privileges to the SYSTEM level on the affected Windows host. 

CVE-2026-22794, a critical authentication bypass vulnerability in Appsmith, is also under active discussion by threat actors. The flaw occurs because the application trusts a user-controlled HTTP “Origin” header during security-sensitive workflows, such as password resets. An attacker could use this to generate fraudulent links that, when clicked by a victim, send secret authentication tokens to an attacker-controlled domain, enabling full account takeover of any user, including administrators. 

Among industrial control system (ICS) vulnerabilities of note, Festo Didactic SE MES PCs shipped with Windows 10 include a copy of XAMPP that contains around 140 vulnerabilities from third-party open-source applications, CISA said in a recent advisory. The issues can be fixed by replacing XAMPP with Festo Didactic’s Factory Control Panel application. 

Conclusion 

The high number of number of open-source vulnerabilities this week highlights the ever-present threat of software supply chain attacks, requiring constant vigilance by both security and development teams. Best practices aimed at reducing cyber risk and improving resilience include: 

  • Protecting web-facing assets.  
  • Segmenting networks and critical assets.  
  • Hardening endpoints and infrastructure.  
  • Strong access controls, allowing no more access than is required, with frequent verification.  
  • A strong source of user identity and authentication, including multi-factor authentication and biometrics, as well as machine authentication with device compliance and health checks.  
  • Encryption of data at rest and in transit.  
  • Ransomware-resistant backups that are immutable, air-gapped, and isolated as much as possible.  
  • Honeypots that lure attackers to fake assets for early breach detection.  
  • Proper configuration of APIs and cloud service connections.  
  • Monitoring for unusual and anomalous activity with SIEM, Active Directory monitoring, endpoint security, and data loss prevention (DLP) tools.  
  • Routinely assessing and confirming controls through audits, vulnerability scanning, and penetration tests.  

Cyble’s comprehensive attack surface management solutions can help by scanning network and cloud assets for exposures and prioritizing fixes, in addition to monitoring for leaked credentials and other early warning signs of major cyberattacks.  

Additionally, Cyble’s third-party risk intelligence can help organizations carefully vet partners and suppliers, providing an early warning of potential risks. 


文章来源: https://cyble.com/blog/top-it-vulnerabilities-weekly-cyble/
如有侵权请联系:admin#unsafe.sh