Critical Cyber Threats: Are You Safe Enough?




Critical Cybersecurity Vulnerabilities Alert: New Exploits and Ongoing Threats

Critical Cybersecurity Vulnerabilities Alert: New Exploits and Ongoing Threats

Recent discoveries in the cybersecurity landscape have unveiled a series of vulnerabilities across multiple platforms. From OS command injections and buffer overflows to active remote code execution exploits, these findings highlight the pressing challenges that security professionals face. In this article, we provide an in-depth look at the latest issues affecting Fujitsu, MongoDB, Apache Tomcat, Dell SmartFabric OS10, and more – along with warnings regarding ransomware and Gmail account lockouts.

Fujitsu FS010M OS Command Injection (CVE-2025-25220)

A critical vulnerability has been identified in the Fujitsu FS010M, affecting versions prior to V2.0.1_1101. The flaw centres on the improper neutralisation of special characters in shell commands, which may allow a remote, authenticated attacker to execute arbitrary operating system commands. With a severity rating of 8.8 out of 10, this weakness demands immediate attention from organisations utilising the affected systems.

MongoDB BSON Buffer Overflow (CVE-2025-0755)

The MongoDB C driver library is in the spotlight after researchers discovered that the bson_append functions are vulnerable to a buffer overflow. This issue can occur when operations exceed the maximum BSON document size defined by INT32_MAX, potentially leading to a segmentation fault and crashing of the application. Both legacy versions of the libbson library (prior to 1.27.5) and certain MongoDB Server releases (v8.0 prior to 8.0.1, and v7.0 prior to 7.0.16) are at risk. With a high severity score of 8.4, users should assess the need for urgent patches to safeguard their data.

Apache Tomcat Remote Code Execution Vulnerability

In an alarming development, a newly disclosed flaw in Apache Tomcat has already been spotted in the wild, with active exploitation commencing just 30 hours after the public advisory. The vulnerability, documented under CVE-2025-24813, exploits a weakness via PUT requests to enable remote code execution. Given the widespread usage of Apache Tomcat in web applications, administrators are urged to review their configurations and apply necessary security updates immediately.

Dell SmartFabric OS10 Vulnerabilities and Hive Credential Exposure

Dell SmartFabric OS10, a critical component in many modern data centres, is facing multiple security challenges. Three vulnerabilities have been reported in various versions:

  • Default Password Vulnerability (CVE-2024-49559): A flaw in versions 10.5.4.x through 10.6.0.x allows low-privileged remote attackers to gain unauthorised access due to the use of a default password. This issue comes with a severity rating of 8.8.
  • Hard-Coded Password Weakness (CVE-2024-48831): In version 10.5.6.x, the presence of hard-coded passwords could enable unauthenticated local attackers to bypass standard security controls, with a severity score of 8.4.
  • Execution with Unnecessary Privileges (CVE-2024-48013): This vulnerability, affecting the same range of versions as the default password issue, permits a low-privileged remote attacker to escalate privileges, assigned a severity rating of 8.8.

Additionally, a separate breach involving Hive – a component of the Multicluster Engine (MCE) and Advanced Cluster Management (ACM) – has exposed vCenter credentials. Documented as CVE-2025-2241, this flaw allows users with read access to ClusterProvision objects to retrieve sensitive credentials, potentially leading to unauthorised access and privilege escalation within vSphere environments. Rated as 8.2 in severity, this issue underscores the critical need for robust access controls in clustered deployments.

Ransomware Warning and Gmail Lockout Incidents

In parallel with the aforementioned vulnerabilities, federal authorities including the FBI and CISA have issued alerts about the Medusa ransomware. This threat has already compromised the data of over 300 individuals since February. Concurrently, user complaints regarding Gmail and Outlook accounts being locked out due to hacking attempts are on the rise. Google has confirmed that once an account is compromised, there is a narrow window of just seven days to regain access before significant damage is done. Users are advised to exercise caution by updating passwords, enabling two-factor authentication, and staying alert to unusual account activities.

In conclusion, the current landscape is riddled with high-severity vulnerabilities and active threats that could have wide-ranging implications for both enterprises and individual users. It is imperative for organisations to remain vigilant, update their systems promptly, and implement robust security measures. Stay informed, remain proactive, and ensure your cybersecurity defences are not compromised.


Share This Post:

Facebook
Twitter
LinkedIn
Pinterest
Email
WhatsApp
Picture of Adam Cooke
Adam Cooke
As the Operations and Compliance Manager, Adam oversees all aspects of the business, ensuring operational efficiency and regulatory compliance. Committed to high standards, he ensures everyone is heard and supported. With a strong background in the railway industry, Adam values rigorous standards and safety. Outside of work, he enjoys dog walking, gardening, and exploring new places and cuisines.
What our clients say:
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue