Articles tagged with: #privilege-escalation Clear filter
CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks

CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks

Cyber Security News cybersecuritynews.com

CISA has issued an urgent security advisory, adding Microsoft Windows privilege escalation vulnerability CVE-2021-43226 to its Known Exploited Vulnerabilities (KEV) catalog on October 6, 2025. The vulnerability affects the Microsoft Windows Common Log File System (CLFS) Driver and poses significant security risks to enterprise environments. The CVE-2021-43226 vulnerability resides within Microsoft's Common Log File System

PoC Exploit Released for Sudo Vulnerability that Enables Attackers to Gain Root Access

PoC Exploit Released for Sudo Vulnerability that Enables Attackers to Gain Root Access

Cyber Security News cybersecuritynews.com

A publicly available proof-of-concept (PoC) exploit has been released for CVE-2025-32463, a local privilege escalation (LPE) flaw in the Sudo utility that can grant root access under specific configurations. Security researcher Rich Mirch is credited with identifying the weakness, while a functional PoC and usage guide have been published in an open GitHub repository, accelerating

Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code

Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code

Cyber Security News cybersecuritynews.com

Unity Technologies has issued a critical security advisory warning developers about a high-severity vulnerability affecting its widely used game development platform. The flaw, designated CVE-2025-59489, exposes applications built with vulnerable Unity Editor versions to unsafe file loading attacks that could enable local code execution and privilege escalation across multiple operating systems. The vulnerability stems from

Crypto24 Ransomware Campaign Analysis

Crypto24 Ransomware Campaign Analysis

cybersecurity www.reddit.com

Crypto24 has been active since late 2023, evolving into a mature operation against large enterprises in Asia, Europe, and the us. Recent analysis shows: persistence through scheduled tasks, fake windows services, and privileged account creation privilege escalation via runas, psexec, and group modifications deployment of a custom tool ("realblindingedr") to disable major av/edr drivers lateral movement with psexec, rdp registry tweaks, firewall rules, and ip scanning keylogging via...

Multiple Vulnerabilities in VMware Aria Operations and VMware Tools Could Allow for Privilege Escalation

Multiple Vulnerabilities in VMware Aria Operations and VMware Tools Could Allow for Privilege Escalation

Cyber Security Advisories - MS-ISAC www.cisecurity.org

Multiple vulnerabilities have been discovered in VMware Aria Operations and VMware Tools, the most severe of which could allow for privilege escalation to root. VMware Aria is a multi-cloud management platform that provides automation, operations, and cost management for applications and infrastructure across private, public, and hybrid cloud environments. Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation to root. An attacker could then...

VMware Tools and Aria 0-Day Vulnerability Exploited for Privilege Escalation and Code Execution

VMware Tools and Aria 0-Day Vulnerability Exploited for Privilege Escalation and Code Execution

Cyber Security News cybersecuritynews.com

A zero-day local privilege escalation vulnerability in VMware Tools and VMware Aria Operations is being actively exploited in the wild. The flaw, tracked as CVE-2025-41244, allows an unprivileged local attacker to gain root-level code execution on affected systems. On September 29, 2025, Broadcom disclosed the vulnerability, which exists within VMware's guest service discovery features. However,

HTB Puppy MachineWalkthrough | Easy HackTheBox Guide for Beginners

HTB Puppy MachineWalkthrough | Easy HackTheBox Guide for Beginners

cybersecurity www.reddit.com

I wrote a detailed walkthrough for the newly retired machine Puppy, which showcases abusing GenericWrite & GenericAll ACE, cracking KeePass version 4, which requires simple scripting, and for privilege escalation, extracting DPAPI credentials. https://medium.com/@SeverSerenity/htb-puppy-machinewalkthrough-easy-hackthebox-guide-for-beginners-3bbb9ef5b292 submitted by /u/Civil_Hold2201 [link] [comments]

CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild

CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild

Cyber Security News cybersecuritynews.com

CISA has issued an Emergency Directive mandating immediate action to mitigate two critical zero-day vulnerabilities, CVE-2025-20333 and CVE-2025-20362, actively exploited against Cisco Adaptive Security Appliances (ASA) and select Firepower platforms. The vulnerabilities allow unauthenticated remote code execution and privilege escalation, enabling advanced threat actors to modify read-only memory (ROM) for persistence through reboot and system upgrades. Exploit Cisco ASA

Trivial trick on Cisco ESA/SEG for root privilege escalation still exploitable after 5 - 6 years

Trivial trick on Cisco ESA/SEG for root privilege escalation still exploitable after 5 - 6 years

cybersecurity www.reddit.com

Last week I posted a video on YouTube (inspired by a thread in italian opened here on Reddit) in which I talked about the principle of least privilege, and about the fact that despite being a concept known for more than 50 years , vendors struggle to apply it correctly. Violations are countless and this translates into trivial vulnerabilities that immediately grant remote access as root. This is a major problem especially in edge devices (SSL VPNs, firewalls, network gateways, etc.), now the...

Cross-Agent Privilege Escalation: When Agents Free Each Other

Cross-Agent Privilege Escalation: When Agents Free Each Other

Embrace The Red embracethered.com

During the Month of AI Bugs, I described an emerging vulnerability pattern that shows how commonly agentic systems have a design flaw that allows an agent to overwrite its own configuration and security settings. This allows the agent to break out of its sandbox and escape by executing arbitrary code. My research with GitHub Copilot, AWS Kiro and a few others demonstrated how this can be exploited by an adversary with an indirect prompt injection.

Salesforce CLI Installer Vulnerability Let Attackers Execute Code and Gain SYSTEM-Level Access

Salesforce CLI Installer Vulnerability Let Attackers Execute Code and Gain SYSTEM-Level Access

Cyber Security News cybersecuritynews.com

A critical vulnerability in the Salesforce CLI installer (sf-x64.exe) enables attackers to achieve arbitrary code execution, privilege escalation, and SYSTEM-level access on Windows systems. Tracked as CVE-2025-9844, the flaw stems from improper handling of executable file paths by the installer, allowing malicious files to be executed in place of legitimate binaries when the software is

Hackers Exploits IMDS Service to Gain Initial Access to a Cloud Environment

Hackers Exploits IMDS Service to Gain Initial Access to a Cloud Environment

Cyber Security News cybersecuritynews.com

Threat actors were manipulating the Instance Metadata Service (IMDS), a core component designed to securely furnish compute instances with temporary credentials to infiltrate and navigate cloud infrastructures. By compelling unsuspecting applications to query IMDS endpoints, attackers harvest short-lived tokens, enabling credential theft, lateral movement, and privilege escalation within victim environments. Exploit IMDS Service Wiz reports

Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants

Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants

The Hacker News thehackernews.com

A critical token validation failure in Microsoft Entra ID (previously Azure Active Directory) could have allowed attackers to impersonate any user, including Global Administrators, across any tenant. The vulnerability, tracked as CVE-2025-55241, has been assigned the maximum CVSS score of 10.0. It has been described by Microsoft as a privilege escalation flaw in Azure Entra. There is no

HTB Fluffy Machine Walkthrough | Easy HackTheBox Guide for Beginners

HTB Fluffy Machine Walkthrough | Easy HackTheBox Guide for Beginners

cybersecurity www.reddit.com

I wrote a detailed walkthrough for the newly retired machine, Fluffy, which showcases exploiting CVE in Windows Explorer and abusing GenericAll ACE for privilege escalation and exploiting ESC16 certificate template vulnerability. https://medium.com/@SeverSerenity/htb-fluffy-machine-walkthrough-easy-hackthebox-guide-for-beginners-96703a596d54 submitted by /u/Civil_Hold2201 [link] [comments]